text
stringlengths
0
3.53M
meta
dict
Q: LIKE doesn't return results I am trying to find "sam" inside FullName in the table users with this eloquent operation: $user = User::where('id', '=', $input)->orWhere('fullName', 'LIKE', "%$input%")->find(10); finding through id works as expected but the Where with LIKE isn't returning any results. (if $input is 1 the first where returns a result but if $input is sam the second where doesn't return anything) In the database fullName has the value "Sam Pettersson". Anything I am doing wrong? A: For some reason laravel doesn't want find() and like queries in the same query so using this instead worked: $user = User::where('id', '=', $input)->orWhere('fullName', 'LIKE', "%$input%")->take(10)->get();
{ "perplexity_score": 1822.1, "pile_set_name": "StackExchange" }
It's a common fact that losing weight fast is dangerous, but that doesn't seem to stop everybody. People are always doing things that they know are bad for them. For these people, the benefits outweigh the disadvantages. Why is Fast Weight Loss Dangerous? Losing weight quickly is dangerous for several reasons. These reasons depend on how you are trying to lose weight. Crash diets and diet pills have their own negative side effects, but no matter which kind of diet you choose, these side effects could be a factor in your weight loss results. Dangerous Crash Diets Malnutrition is a common side effect of dangerous fast weight loss, because people are going on crash diets. Eating just vegetables or drinking just a specific drink might help you lose weight, but your body will not get the nourishment that it needs. You will also end up losing quite a bit of muscle when you diet and not just fat. Losing muscle makes it harder for you to burn calories and get rid of extra fat. Along with muscle and fat, a lot of the weight that is lost is water weight. This might seem like a good idea since the body holds onto a lot of extra weight, but losing too much water can cause you to become severely dehydrated. Losing Weight Dangerously with Diet Pills Diet pills that are commonly used to get fast weight loss can have many dangerous side effects, like heart problems and high blood pressure. Other diet pills that attempt to suppress the appetite can actually end up slowing down your metabolism, which will make it harder for you to lose weight. It is important to remember that diet pills have not necessarily been proven safe to use just because they are available on the market. Is Dangerous Fast Weight Loss Worth It?
{ "perplexity_score": 292.8, "pile_set_name": "OpenWebText2" }
Q: Nothing after logging into account I tried to install java and few other upgrades, so I found this website: http://itsfoss.com/things-to-do-after-installing-ubuntu-14-04/ and did basically everything. After reboot screen with the encryption password has a small resolution, later logging screen is normal and after password and enter I just see the wallpaper and my mouse. I made before hotkeys for task manager and xkill but non of them works, either ctrl+alt+t Guest session doesn't work also. please help me.. I'm fighting with linux for over a week :( I just try to make it working and leave it like it is Things I have done: I have installed Nvidia drivers (official and tested) I updated software with canonical partners Installed Play encrypted DVD in Ubuntu 14.04 by: sudo apt-get install libdvdread4 sudo /usr/share/doc/libdvdread4/install-css.sh Installed rar sudo apt-get install rar Installed TLP sudo add-apt-repository ppa:linrunner/tlp sudo apt-get update sudo apt-get install tlp tlp-rdw sudo tlp start Installed Tweak Unity sudo apt-get install unity-tweak-tool Disabled shopping suggestions gsettings set com.canonical.Unity.Lenses disabled-scopes "['more_suggestions-amazon.scope', 'more_suggestions-u1ms.scope', 'more_suggestions-populartracks.scope', 'music-musicstore.scope', 'more_suggestions-ebay.scope', 'more_suggestions-ubuntushop.scope', 'more_suggestions-skimlinks.scope']" <- however something was wrong, didn't get the part with ebay-scope. Installed java sudo apt-get install icedtea-7-plugin openjdk-7-jre Edit: I read here that similar thing can happen when installed nvidia drivers without having nvidia, however I do have 720M and I have no idea how to write commands without logging in. Edit2: Logged in the root terminal in recovery mode, tried sudo apt-get remove unity-tweak-tool but it doesn't work. Not using locking for read only lock file /var/lib/dpkg/lock Edit3: I stopped messing with the recover (didn't know how does it work like) and I have logged in with ctrl+alt+f1. For other newbies like me: my login is from the capital letter, but here I had to write it from a small one :) I typed sudo apt-get remove unity-tweak-tool but it didn't help.. Should I use unity-tweak-tool --reset-unity ? I don't want to configure everything again if there is other option Edit4: Installed both of these jockey-common and ubuntu-drivers-common but non of the commands works. (--list) sudo apt-get install nvidia-current stops on 26% Unable to fetch some archives. apt-get update didn't help. A: I made it on my own! :) Maybe someone will use it. Answer is here, however second and third line didn't work for me. As always some archive problem. Neverthless it was because of the nvidia, I will never move it again. sudo apt-get purge nvidia-* sudo apt-get install --reinstall xserver-xorg-video-intel libgl1-mesa-glx libgl1-mesa-dri xserver-xorg-core sudo dpkg-reconfigure xserver-xorg sudo update-alternatives --remove gl_conf /usr/lib/nvidia-current/ld.so.conf But I made a new problem, I can't change brightness at all. Is there any end of configuring this system..?
{ "perplexity_score": 1130.9, "pile_set_name": "StackExchange" }
Q: NoClassDefFoundError no sense I'm discovering a problem with an Android application. My problem is that when I open the application it crashes giving NoClassDefFoundError. This is the stack trace: 09-24 19:37:14.542 32545-32545/? E/AndroidRuntime: FATAL EXCEPTION: main Process: it.bcv.invadelite, PID: 32545 java.lang.NoClassDefFoundError: com.electronwill.nightconfig.core.file.FormatDetector$$Lambda$0 at com.electronwill.nightconfig.core.file.FormatDetector.registerExtension(FormatDetector.java:27) at com.electronwill.nightconfig.json.JsonFormat.<clinit>(JsonFormat.java:66) at it.bcv.invade.appdb.ConfigAdapter.<init>(ConfigAdapter.java:39) at it.bcv.invade.appdb.Db.<init>(Db.java:51) at it.bcv.invade.appdb.Db.init(Db.java:75) at it.bcv.invadelite.activities.StartActivity.initDatabase(StartActivity.java:165) at it.bcv.invadelite.activities.StartActivity.onCreate(StartActivity.java:125) [...] and build.gradle file has following lines: // https://github.com/TheElectronWill/Night-Config implementation 'com.github.TheElectronWill.Night-Config:core:3.1.0' implementation 'com.github.TheElectronWill.Night-Config:json:3.1.0' The FormatDetector class is like this private static final Map<String, Supplier<ConfigFormat<?>>> registry = new ConcurrentHashMap<>(); /** * Registers a ConfigFormat for a specific fileExtension. * * @param fileExtension the file extension * @param format the config format */ public static void registerExtension(String fileExtension, ConfigFormat<?> format) { registry.put(fileExtension, () -> format); } while the JsonFormat class has this declaration private static final JsonFormat<FancyJsonWriter> FANCY = new JsonFormat<FancyJsonWriter>() { @Override public FancyJsonWriter createWriter() { return new FancyJsonWriter(); } @Override public ConfigParser<Config> createParser() { return new JsonParser(this); } }; static { FormatDetector.registerExtension("json", FANCY); } I've googled about this error and I found that could be due to the missing of some classes in the classpath. For this reason I've analyzed the apk with Android Studio analyzer and i found that in classes.dex there are both packages com.electronwill.nightconfig.core and com.electronwill.nightconfig.json that are the only two package that I'm using. I've debugged the application on many phones, and the only that is causing problems has Android 5.1.1. I don't know if other versions of Android can cause problems but I think that the Android version is not the core problem. Anyone can help me to solve this please? Anyone knows why I'm getting this error even with gradle and only in one phone? A: NightConfig author here. Android studio tools do work with lambdas, but older versions of Android don't have the Supplier class, which is used by my FormatDetector. This is probably what causes the error. You should use the new NightConfig *_android modules, which are adapted for older Android APIs.
{ "perplexity_score": 1747.4, "pile_set_name": "StackExchange" }
Visualization of hepatitis B virus entry - novel tools and approaches to directly follow virus entry into hepatocytes. Hepatitis B virus (HBV) is a widespread human pathogen, responsible for chronic infections of ca. 240 million people worldwide. Until recently, the entry pathway of HBV into hepatocytes was only partially understood. The identification of human sodium taurocholate cotransporting polypeptide (NTCP) as a bona fide receptor of HBV has provided us with new tools to investigate this pathway in more details. Combined with advances in virus visualization techniques, approaches to directly visualize HBV cell attachment, NTCP interaction, virion internalization and intracellular transport are now becoming feasible. This review summarizes our current understanding of how HBV specifically enters hepatocytes, and describes possible visualization strategies applicable for a deeper understanding of the underlying cell biological processes.
{ "perplexity_score": 341.5, "pile_set_name": "PubMed Abstracts" }
Independence Day Family Fireworks Cruise aboard The Infinity Yacht About Independence Day Family Fireworks Cruise aboard The Infinity Yacht - The Infinity Yacht Celebrate July 4th on the modern and spacious Infinity Yacht this year and enjoy a special July 4th celebration with your family. This July 4th NYC cruise is going to sail you around the city and treat you to an amazing view of the Macy’s Fireworks Show. Check out all that this July 4th NYC cruise has in stored for you and book your tickets on board today! July 4th NYC Cruise Aboard the Infinity Yacht The Infinity Yacht is a beautiful ship that’s perfect for celebrating July 4th with your family. This ship has a LED lit interior with state-of-the-art sound systems and climate-controlled decks. Enjoy this spacious yacht and views of the city skyline from inside of the yacht or the outside observation decks. Take in the sights of the city and all of its iconic landmarks as you celebrate July 4th with the sounds of a live DJ. Dance with your family to your favorite hits of the year as you wait to watch the July 4th fireworks like you never have. Keep the drinks pouring and make your way to the outer deck before the fireworks begin. Once the fireworks begin, the Infinity Yacht will treat you and your family to an unforgettable view as you watch each firework light up the night sky! Don’t miss out on the best way to celebrate July 4th this year and get on board this July 4th NYC cruise! The Infinity Yacht welcomes you and your family on board for an unforgettable July 4th celebration this year. Purchase Tickets for Independence Day Family Fireworks Cruise aboard The Infinity Yacht - The Infinity Yacht Price increase warning: July 4th ticket prices often go up significantly (100% +) the closer you get to July 4th. Also note that many July 4th Events will sell out well in advance of July 4th .
{ "perplexity_score": 807.2, "pile_set_name": "Pile-CC" }
Computer Services We currently work with a broad range of clientele; large corporations, home-based businesses, the neighborhood mechanic, local shops, stores and restaurants, etc… – we provide customized maintenance and IT services for PC, Mac and various other computer support systems to all. We look forward to providing the Santa Barbara area with continued excellent service, computer repair and computer support.
{ "perplexity_score": 340.1, "pile_set_name": "Pile-CC" }
Small step, wrong direction November 20, 2000 Back to Basics by Anil Agarwal The Kyoto Protocol, the 'only show in town,' is a poor one Every long journey begins with a small step. In that sense, the small step that the nations of the world took in Kyoto by agreeing to a protocol was a development that most will welcome. But while every journey is made up of small steps, it is important that the first step is in the right direction. Otherwise, we could easily end up being nowhere near our destination. The problem with the Kyoto Protocol is that it is likely to lead us in the wrong direction. Especially as the wise negotiators in Kyoto never told us what is the right direction to take to prevent a high order of global warming. In that sense the Kyoto Protocol was a very bad piece of law. First step, yes, but dear governments of the world, in which direction? The big reason for our fear that the Kyoto Protocol could take us in a wrong direction is the insistence of the US to look for least-cost options in the South through the so-called Clean Development Mechanism (CDM), which we believe can easily become an Unclean Development Mechanism. The trouble is that all least-cost options are in improving the 'fossil fuel sector' for reducing carbon emissions. Studies show that coal washing, for instance, can give a tonne of carbon dioxide reduction for as low as US $3. And indeed there is a lot of coal to be washed in the world. CDM could thus easily become a big subsidy for fossil fuels and lock the South further into fossil fuels and the world into global warming. Despite all the bravado of the US delegation here, the US is itself getting more and more locked into coal. The US liberalised energy markets and producers facing greater competition went in for improving the efficiency of coal-based power production using what is known as 'clean coal technologies' and reducing some carbon emissions in the process. The result: the US has, in the last few years, had record coal production. And it is clean coal technologies that the US wants to sell most to developing countries under CDM. Good for American companies, maybe even helpful to sell to the US Congress by showing that global warming mitigation means very low costs but is it good for the world? Why is all this a step in the wrong direction? Once we get out of the mind-sets of the negotiators here in The Hague mainly talking about about how to create a viable and verifiable carbon market - which is why we squabble all the time over additionality, fungibility, supplementarity, CERs, sinks and what not - and look at what it will take to reduce carbon emissions to sustainable level, we find that the only answer is moving as fast as possible towards zero-carbon energy production systems. In other words, governments have to get out of the 19th and 20th century energy system they have created and reinvent a new energy system. As industrialised countries are already locked into the carbon economy, improving energy efficiency for some time may help, but there is no reason why developing countries should first invent a fossil fuel economy and then a non-fossil fuel economy. Restricting CDM to zero-carbon systems would help us move in that direction. Once the market for zero-carbon systems grows and begins to compete with fossil fuels, we can go home. We would have started our journey towards a less carbon-burdened atmosphere. But - and this is a big but - the US will have to pay 4-5 times for each tonne of carbon credit it can get? It’s called putting your money where your mouth is.
{ "perplexity_score": 283.1, "pile_set_name": "Pile-CC" }
Do you want to know how to overcome low self-esteem and improve your self-image, self-love, self-worth, and self-respect? We all know that when it comes to success with women, attraction and seduction – Inner Game is way more important than Outer Game. We also know that high self-esteem and self respect is absolutely crucial if you want to become someone who is naturally attractive to women, and a likable person in general. But building confidence and overcoming low self-esteem is not a very easy thing to do, especially if you’re someone who’s currently socially awkward and hasn’t had much success with girls lately. You can’t just snap your fingers and make a complete shift in your way of thinking… People often e-mail me and ask me how to build and improve self esteem – so I’ll show you. Below, I’ll explain exactly what self-esteem is. I’ll show you what causes a person to develop a bad image of themselves, and what to do to overcome low self esteem issues and deal with them so that you can start building your general confidence levels up, and transform yourself into a better and more secure man who women naturally find attractive. But this is not just for success with women – it can apply to anything in life, for both women and men. If you have a high self-esteem and a good self-image, as well as a decent dose of self-respect – you will generally lead a much more happy and fulfilling life. You’ll be able to make better use of various relationship, business, leisure, and other opportunities in life. It’s going to be a very long and in-depth read – but if you’re someone who’s currently suffering from low self esteem and want to learn how to overcome it – this may be the most important article you’ll read on the subject. When I was a teenager, I used to have an abysmal sense of self-esteem. But then I realized a few things about life – and now I don’t. What is Self-Esteem? Self-esteem is an abstract psychological concept made up to describe a certain part of a person’s human nature. Its definition is simple – It is confidence in one’s own worth and abilities; self-respect. And with high confidence in your abilities and decent level of respect for yourself comes self-love, a high sense of self-worth, and a healthy self-image. All of these things combined make a person confident and secure in himself. That person derives his self worth from within, and is not affected by external things, especially those that he can’t control. What is Low Self-Esteem? It’s when we feel and think that we are unworthy as a human being, and that there must be something wrong with us. It’s when we feel that we are simply “not enough” being just the way we are, and that no one will ever love, respect, or even like us. We think and feel as though we deserve nothing. This feeling is incredibly gut-wrenching, and people often spiral into depression after having low self-esteem for too long, and become socially withdrawn. If you don’t learn how to improve your self esteem and confidence levels, you may eventually reach a point where you will think that life just isn’t worth living. A lot of people who struggle with this problem start neglecting themselves, become increasingly anxious, develop an inability to accept compliments, stop being fair to themselves, always accentuate negativity, treat themselves badly, stop trusting in their own opinion, and experience or do many other negative things. Many people have even committed suicide because of their insanely bad perception of their own self-worth and self image, due to their low self-esteem and lack of confidence. So it is crucial that people learn how to raise self esteem if they want to lead a happy and healthy life. What causes a Low Self-Esteem? There are many different things that can cause a person to have a low self-esteem, a bad image of themselves, and an awful sense of their own worth: When you fail at different tasks throughout your life When you don’t live up to your own expectations If you care too much about the opinions of others and especially what they think of you When you are unable cope with your problems in the right way When you frequently interact with disapproving authority figures If you have very uninvolved and preoccupied caregivers who show that they don’t care about you much or at all If you’re constantly being a victim of bullying, especially when in school If you encounter systematic punishment, neglect or abuse, particularly while being a child If you constantly fail to meet your parental or peer-group standards and expectations If you experience various random traumatic events in your life, horrible accidents, death of loved ones If you have internalized bad belief systems Not living up to society’s standards Being on the receiving end of other people’s stress or distress. Belonging to a family or social group that other people are prejudiced towards Experiencing a complete absence of praise, warmth, affection or interest from others Being the odd one out, at home, work, or at school. The list can go on and on – these are just a few of the main causes… Also, you may notice a distinct pattern in them – most of these involve other people! And if they don’t, they involve you, and no one else… That’s because pretty much everything that you do in life involves someone else, unless you’re living in a secluded cave in the mountains! There are over 7.5 Billion people on this planet, and being able to socialize with others is a key skill to have if you want to lead a happy and good life. And that’s where most people fail – because sadly, parents, teachers, and other influential guardians in your life usually don’t take the time to teach you the massive importance of social skills, and don’t teach you the skills themselves. As a result, people just wing it – they improvise as they go along, and the majority end up developing lackluster social skills and fail at interacting with other people the right way… And that’s what puts many individuals on the fast track to low self-esteem land! HOWEVER, the main cause of low self-esteem that people tend to forget – IS YOU! Yes, it’s all up to you and how you interpret the various events in your life, how you deal with them, and how you COPE with them. So I’m going to talk about one of the lesser-known but very important aspects of self-esteem: How you as a person CHOOSE to deal and cope with the various problems that come your way! This is one the most important concepts when it comes to building confidence and getting your self-esteem issues fixed and handled. If you can cope with your problems in the right way – you will develop a healthy self-esteem. Conversely, if you can’t cope with your problems, or cope with them in the wrong way – you develop a low and unhealthy self-esteem which you then have to work very hard to overcome… Which basically means something that I think you’ve suspected all along… That it’s all in your head! So, the better you can deal and then cope with your various problems in life, the more confident you become in your own worth and abilities, and the more self-respect you develop as a result. Sounds pretty straightforward so far, right? Well, it gets a bit more complicated than that… Let’s get this straight – Life isn’t fair! Life is not fair, and a lot of it depends on the circumstances that you were born under. Were your parents rich or poor? Did you end up with good or bad genes? Were you born in a rich and peaceful or a war-torn and poor country? What race card did you randomly draw? What opportunities randomly presented themselves in your life? The questions go on and on… Luck of the draw, in other words. And as people go through life, they want to succeed at various things that they do. Everyone wants all the best stuff for themselves; whether that stuff is money, love, fame, possessions, friendships, property, prosperity, enlightenment, and whatever else you can think of. And throughout your life, you go and interact with other people, and you make your wants and needs known to them. But here’s the kicker – you don’t always get what you want! In fact, you rarely do. And guess what that does to you, and everyone else? It knocks you down a peg, and often makes you realize that the world doesn’t revolve around you, and that there are other people in this world who want all of the same stuff that YOU want – to happen to them as well. Other people also want everything you want, and there are more than 7.5 BILLION of them running around this little planet we call Earth! So, when people don’t get what they want – they have to somehow cope with it. And the way they cope with these things is exactly what determines their eventual level of self-esteem! You can see this effect most profoundly at certain stages of a person’s life, particularly to individuals of certain ages when they experience radical shifts in their thinking, and are forced to socialize with others. For example, when a child enters the stage of early adolescence and starts going to primary school (or kindergarten), he starts interacting with other children and with teachers, and learns about life, and gradually sees and realizes just how unfair it is. How he interacts with these people will greatly determine what kind of self-esteem he’ll have. But, as mentioned above, this all HIGHLY depends on that particular child’s social skills. And since most people at that age have not been explicitly taught any social skills by their parents, peers, or anyone else – that’s where most problems begin! So, when he goes to kindergarten or primary school and interacts with everyone – if his peers like him and he makes many friends, if he gets a lot of praise, if he the gets attention, validation, and other similar things that he wants from others – he will develop a good self-image and sense of self worth – and naturally developing and building high self esteem becomes a piece of cake for him! Conversely, if he gets none of these things, or only very little – he’ll have a low self-esteem and will eventually start experiencing various psychological issues because of it. The Main Stage – High-School Ahh, High-School… the place where most boys and girls aged 14-18 go to get their self-esteem completely crushed and destroyed! For the majority of young people, it’s as close to survival of the smartest and the fittest as they will ever get to experience in our modern world… Most teens who go there don’t get what they want. They get denied friendships, dating opportunities, sex, money, acceptance, adoration, validation, and many other important things from other students. Again, everyone wants all the best things to happen to them – but since we’re not living in a fairy tale – we usually don’t get what we want. And when you get denied the things that you want – if you don’t know how to cope with all of that, you will develop a very low self-esteem, just like I did once. And here’s the funny part: High-school is around the time when most people’s hormones start raging and causing them a lot of unnecessary distress. It’s the time when a lot of guys discover their incredible hornyness and lust for the majority of girls that they see or meet. So what do they do? Some just suppress it because of past failures and a realization that they lack the social skills or the “coolness” of others around them, but others start approaching. But if the guys who approach haven’t naturally developed a lot of confidence along with good social skills by then – they’re pretty much screwed. In fact, a lot of different surveys conducted in the United States and some parts of Europe show that most guys are completely unhappy with their high-school experience, just because they didn’t get laid all that much or at all. Most guys don’t get laid in high-school, period. Even though they desperately want to! If you are socially awkward or a nerd – high-school will usually be one of the worst experiences in your life, which can destroy you as a person and cause you to have a low self-esteem for years to come. And that will carry on to college, to work, and to later stages of your life… and it’s exactly why a lot of people later seek professional psychological help and pay a lot of money for shrinks. When you’re in high-school and you start becoming very interested in girls, you naturally want to approach and talk to them, get to know them, and ask them out. But there are so many other people around you, that you know if you screw up – everyone’s going to see it! You start fearing rejection, fearing the reactions of others, imagining a lot of bad outcomes, and start feeling inadequate. Some people never end up approaching, but others do… And then BOOM – most guys in high-school get rejected, simply because they didn’t really know what to do when approaching, they haven’t developed their social skills enough, and didn’t know how to talk to girls. I’m sure that, just like me, you have been rejected a lot by girls. And how well will you cope with that rejection? This is the most important point that I am going to make – how well will you cope with the fact that you got rejected? I’m using rejection as a random example – to demonstrate this point. I could have just as easily used something else. In any case, if you cope with getting rejected like this in a healthy way, if you understand the fact that you can’t always get what you want, and that rejection is a normal and natural part of life, and that it’s actually good for you because it allows you to learn and improve yourself and prevents you from wasting your time on the people who reject you because they obviously want nothing to do with you – you will develop a high self-esteem and have no issues with women. However, if you cope with it in a bad way or a wrong way – like a lot of guys do at that age – you’ll pretty much end up here – wondering how to overcome low self-esteem… As an example, if you get rejected but think that you somehow DESERVE to have any girl that you want, and then get pissed or throw a hissy fit when that doesn’t happen. Or maybe you think that she didn’t like you because you were too ugly, too short, too thin, dorky, and various other random irrelevant things… Or if you start thinking that something must be wrong with you if everyone keeps rejecting you… Or maybe you got rejected and you started becoming AFRAID of asking other girls out, especially in front of other people…. Or maybe you got so affected by this rejection that you started feeling nervous around girls that you’re interested in, because you don’t want to get rejected anymore… The list can go on and on again – there are many bad ways to cope with this and similar problems. And it doesn’t matter what the real problem is – if you cope with them in a bad way, you’ll start developing insecurities and other psychological issues. And that’s where it all starts going downhill. So you see, low self-esteem and its various issues become deep-rooted as people develop them while growing up, through many, many years of various life stages and experiences – mostly negative ones that happened to them and they didn’t know how to cope with in a healthy way. Which means that these issues come from a person’s upbringing, from the way they lived their life and what problems they dealt with, and how they coped with those problems, and whether they knew how to cope with them in the right way or not. And who’s to blame? Again, sadly, your parents, teachers, and various caregivers are to blame… Why? Because they’ve never taught you when you were little about what self-esteem is, and how to increase it and raise it to high levels. No one has taught you how to cope with your problems. Because if you know how to cope with the negative stuff, these negative experiences will stop affecting your self-worth, and you will always determine your self-esteem yourself – and not base it on other external things. Especially the things that you have no control over! How to deal with your self-esteem issues, improve, and raise it Like I said, it’s all pretty much in your head. It has to do with your whole perception of the world, and heavily relies on the mindsets that you employ every day, and on the various belief systems and core beliefs that you’ve internalized. So in short, you have to change the way you think! But that’s not a very easy thing to do! One option is to apply Cognitive Behavioral Therapy (CBT), but it’s quite complicated, and requires a trained psychologist to help you. The core principles of CBT are identifying negative or false beliefs and testing or restructuring them. But that’s not a very accessible option for a lot of people, and requires a lot of time, money, and effort. Another way is to simply change how your mind works by yourself. But it involves doing some very weird mental gymnastics. For example, it’s about learning the reality of life: That there are some things that you can’t control and can’t change That you can’t have and will never have everything that you want That not everyone is going to like you, no matter what you do, no matter who you are, and no matter what you look like That there are always going to be people who simply don’t like you and want to harm you That there is a lot of injustice in the world, and you can’t help everyone That no one truly cares about you except you, and your family That you are not someone special – you are not the hero of the story, because there are no heroes, only individuals living their lives as best they can And many other important concepts. Getting a huge reality check can blow your gasket and break your whole worldview, but you need to grow the fuck up and accept this, and stop sheltering yourself from the realities of life. If you don’t get yourself in order, if you don’t pull your shit together – NO ONE WILL DO IT FOR YOU. And you will lead a mediocre, unhappy, unfulfilled life with no real value. This may sound depressing as shit, but these realizations are a little preparation for the next step: Learning how to deal with your insecurities You can’t fix, raise or improve your self-esteem if you first don’t get rid of your various insecurities. Stuff like nervousness, shyness, anxiety, fear, self-doubt, and many similar things. They are the key in learning how to overcome low self-esteem. Now, I’m not going to write the exact ways to fix all of these things here, because I have already done so, in a collection of articles. And I’ll give them to you right now, for absolutely nothing… I have created a full Inner Game Course, consisting of proven practical and mental ways to fix all of these problems and more. I used to sell it for 20$, but at some point, I realized that before learning any of the practical stuff of attraction and seduction, people have to first get their shit together and learn how to overcome low self-esteem and other inner game issues that prevent them from being great with women. So I’ll give you all of the lessons in my in-depth course for FREE, because I sincerely want you to succeed and avoid feeling like shit because of failures or inadequacy with women. All you have to do is sign up for the course by clicking the Red Paper Airplane Icon on your left, (or filling two fields below this article) and you’ll get it in your e-mail inbox. Each in-depth lesson will be sent to you once per day, but be sure to check your spam folder as it can land there. Also, they are automated to be sent at a set time each day, so don’t worry if you don’t receive it right away. The lessons in the course are: One – Boundaries Two – Anxiety Three – Nervousness Four – Fear Five – Changing Yourself and Negative Core Beliefs Six – How to Deal with Any Real or Perceived Shortcomings Seven – Grit Eight – Looks, Money, Status are Irrelevant Nine – Honesty and Genuine Authenticity Ten – Being Non-Judgmental Eleven – Yout Personal Value, and Your Values Twelve – Mastering your Emotions Thirteen – Fourteen – Fifteen, etc – In development (the course is not done yet) And a few other ones… And why is the first lesson titled Boundaries? That’s pretty simple, because dealing with most of your psychological issues starts at this critical point – learning how to set healthy and solid boundaries that other people won’t cross without consequences. Those consequences can simply include you removing the people who cross your boundaries from your life and not interacting with them again. In any case, if you as an individual cannot set healthy and solid boundaries, there is no point in learning how to deal with any of your other issues because you will usually just revert back to your old self again, once people start abusing you. And there you have it. I’m giving you the perfect way to solve your inner-game issues and to learn how to overcome low self-esteem. These lessons are very in-depth – pretty much like this article, except for one thing – they ALL contain at least one proven practical lesson that you can do which is guaranteed to help you solve that problem if you apply yourself to it. But you have to read them fully in order, as they all build on each previous one. Trust me, this is required reading if you want to get your Inner Game handled, and then focus on Outer Game. It helped hundreds of my private coaching students deal with their issues. That said, if you truly believe that you have your shit together and are ready for the practical stuff – something that me and my students use to get laid with literally hundreds of girls on the first date, consistently – then head on over to http://www.saulisdating.com and read it. Good luck!
{ "perplexity_score": 295.5, "pile_set_name": "OpenWebText2" }
The history of the aircraft industry has been marked with innovations that have contributed in varying measure to the development of the present day aircraft, with each innovation recognizing or anticipating a changing need as ground transport gradually gave way to air transport. Early innovations in this development were directed to the range, speed and cargo capacity of the aircraft, with later innovations aimed at improved maneuverability and lift as aircraft size and weight increased and as urban areas mushroomed to lessen the adequacy of the city-based airport. With the obsolescence of the city-based airport, new airports of more adequate acreage were established in areas remote from the cities, at distances ranging from 10 to 50 miles and frequently necessitating more land-travel time than flight time. Although aircraft accessibility was improved with the advent of air-shuttle and land-limousine services, the latter have provided but slight reduction in land-travel time, and air-shuttle service has remained out of the financial reach of the general public. With the advent of todays giant sized aircraft, even the remote-area airports have required expansion, with runways being lengthened to satisfy their take-off and landing requirements. In recognition of the lift limitations of the fixed wing aircraft and the cargo limitations of the helicopter, further innovation is required if present airport patterns are to be altered, with remote-area airports ever expanding to accommodate commercial aircraft, and with city airports remaining the exclusive property of private aircraft and helicopters. Attention then might well be directed to variable lift, cargo carrying aircraft that have the capability of taking off and landing on either the shorter runways of the city airport or the longer runways of remote-area airports, thereby preserving the utility of existing airports while at the same time bringing the ultimate destination of the traveler within more accessible and convenient reach, with land-travel time reduced to its former more proportionate ratio. Further attention might well be directed to an advancing-wing variable lift aircraft that has the lift advantages of the helicopter and the cargo capability of the commercial aircraft. Notwithstanding the recognized high land-travel time ratio referred to above, and the emphasis in cargo capacity that has dominated the development of the modern fixed-wing aircraft, the disadvantages of the fixed wing and of the helicopter have long been known. Whereas the fixed-wing aircraft relies on forward propulsion or thrust for lift, the helicopter relies on the rotation of its rotary wings or airfoils. Although the lift limitations of the fixed-wing aircraft have been overcome in part by the development of high powered propulsion engines, these power plants, in combination with increased cargo capacity, have mangified rather than solved the airport dilemma, and have rendered the ultimate destination of the traveler all the more inaccessible. On the other hand, the characteristic lift limitations of the rotary wing aircraft, with their variation in air speed from wing tip to rotor, render them inappropriate for cargo carrying purposes.
{ "perplexity_score": 411.2, "pile_set_name": "USPTO Backgrounds" }
1. Field of the Invention This invention relates in general to a computer implemented database system, and more particularly, to generating small footprint applications for mobile devices. 2. Description of Related Art Databases are computerized information storage and retrieval systems. A Relational Database Management System (RDBMS) is a database management system (DBMS) which uses relational techniques for storing and retrieving data. Relational databases are organized into tables which consist of rows and columns of data. The rows are formally called tuples. A database will typically have many tables and each table will typically have multiple tuples and multiple columns. The tables are typically stored on random access storage devices (RASD) such as magnetic or optical disk drives for semi-permanent storage. RDBMS software using a Structured Query Language (SQL) interface is well known in the art. The SQL interface has evolved into a standard language for RDBMS software and has been adopted as such by both the American National Standards Institute (ANSI) and the International Standards Organization (ISO). The SQL interface allows users to formulate relational operations on the tables either interactively, in batch files, or embedded in host languages, such as C and COBOL. SQL allows the user to manipulate the data. A variety of mobile devices such as Palm, Windows CE handheld devices, various embedded systems, and smart card, may utilize a RDBMS for storing and retrieving data. These types of mobile devices have become very popular and are increasingly being used by a wide spectrum of people. Unfortunately, these small devices have limited memory, a small display, and operate at slow speeds. Due to the limited memory of mobile devices, some users download small footprint database applications. The term footprint generally refers to the amount of disk space required by an application. Many of the footprint applications are still too large for the mobile devices"" limited memory. To solve the memory space dilemma, a user can modify the traditional footprint applications and create a customized footprint application that is designed for a particular mobile device. This customized footprint application tends to contain fewer functions than the traditional footprint applications, and hence, has a smaller memory requirement than the traditional footprint applications. Customizing a footprint application may involve providing a list of desired functions to a software developer who then develops a footprint application that contains the desired functions. The list of desired functions is typically based on both the memory constraints of a particular mobile device and on a user""s needs for a specific functionality. Mobile devices designed by different manufactures could have different memory constraints, and each individual user of these mobile devices could desire different functions. To comply with each device""s memory constraints and to satisfy each user""s functional needs, software developers may need to spend time developing several different versions of a footprint application. Thus, there is a definite need in the art for an improved technique of customizing footprint applications that eliminates the task of developing multiple versions of footprint applications. To overcome the limitations in the prior art described above, and to overcome other limitations that will become apparent upon reading and understanding the present specification, the present invention discloses a method, apparatus, and article of manufacture for generating a database application. In accordance with the present invention, a features list is built for the database application. The feature list contains user-selected functions. The database application is dynamically configured based on the built features list.
{ "perplexity_score": 267.8, "pile_set_name": "USPTO Backgrounds" }
Two years ago this week, Ross Ulbricht was sentenced to life in prison without parole for running the Silk Road, an unprecedented dark web bazaar for drugs and other contraband. The judge intended the sentence to serve as a warning to other would-be internet narcotraffickers. But new research suggests more clearly than ever before that the strategy of making an example of Ulbricht didn’t deter Silk Road users. In fact, it may have had the opposite effect. In a study published in a forthcoming issue of the British Journal of Criminology, Boston College sociologist Isak Ladegaard provides some of the strongest quantitative evidence yet that the dark web drug trade actually received a sales bump following the news of Ulbricht’s surprisingly harsh sentence. Starting in late 2014, Ladegaard used a software tool he built to trawl what was then the largest Silk Road–style dark web market daily for sales data. He focused on a 10-month window that included the time directly before and after Ulbricht’s sentencing, and found that following Ulbricht’s sentencing, the site experienced a significant increase in revenue. “The timing suggests that people weren’t discouraged from buying and selling drugs,” says Ladegaard. "The data suggests that trade increased. And one likely explanation is that all the media coverage only made people more aware of the existence of the Silk Road and similar markets.” That finding could draw scrutiny to the deterrence value of harsh sentences in little-understood computer crimes, particularly those where the risk of getting caught remains uncertain and where publicity can inspire copycat criminals. Boom Times The dark web has only grown in the years since the FBI seized the Silk Road’s servers and arrested its creator in late 2013. At that time, the site had roughly 12,000 listings, for items ranging from marijuana to ecstasy to heroin to counterfeit documents. The largest dark web market today, Alphabay, has well over 300,000 listings, including more than 240,000 for drugs alone. It also offers other wares—like weapons and stolen data—that the Silk Road didn't. But Ladegaard’s study shows more granular evidence that the dark web experienced a boost in sales in the immediate wake of Ulbricht’s punishment. Starting in November of 2014, Ladegaard used a Python script to pull sales listings and customer feedback information from Agora, then the largest dark web drug market. Since Agora transactions required user feedback, Ladegaard could combine public feedback on any given item with the item's listing and price to gauge total sales on the site over time. The resulting data showed that Agora's illicit business didn't just weather Ulbricht's life sentence. For vendors shipping their products from the US, sales more than doubled in the following days, rocketing from less than $40,000 a day to more than $100,000 daily in just two weeks. International sales increased even more dramatically, from $100,000 to $250,000 daily. Daily sales on the dark web drug site Agora before and after Ulbricht's sentencing. Isak Ladegaard That's a direct contradiction to the "deterrence" value that the judge in Ulbricht's case used to justify his sentence. "For those considering stepping into your shoes, carrying some ... misguided flag ... they need to understand very clearly and without equivocation that if you break the law this way there will be very, very severe consequences," Judge Katherine Forrest said in her courtroom sentencing statement. Subjective Risk Ladegaard concedes that he can't definitively explain those results. But he writes that sales bumps more generally followed media coverage of the dark web—and Ulbricht's life sentence was major news. (WIRED's story on the sentencing alone was read more than half a million times.) Over his 10 months of data, Ladegaard also collected 310 articles about the Silk Road and dark web drug sites, and found that weeks with more of that news—even about law enforcement action against the sites—correlated with more sales. The study is careful to note, however, that the severity of Ulbricht's life sentence may have prevented an even bigger bump. "It is possible that media coverage of the trial attracted new customers and vendors, who otherwise would not have known that cryptomarkets existed," Ladegaard writes, "but that the number of new registrants would have been much larger if Silk Road’s founder had been acquitted." Ladegaard went further in his analysis of dark web users' mindsets, though. He collected sentiments from the user forums of Agora and a separate site known as The Hub, designed to serve as a community forum across dark web markets. The conversations he observed in the wake of Ulbricht's sentencing suggested that buyers and sellers blamed Ulbricht himself for his arrest, not the power of law enforcement's investigative techniques. Rather than see Ulbricht's downfall as inevitable, the anonymous commenters distanced themselves, calling him "a scared shitless kid who ... was way out of his depth," "careless," "in over his head," and "arrogant." In other words, Ladegaard argues, the deterrence value of harsh sentencing for computer crimes like selling dark web drugs may differ from other crimes, given that criminals have wildly varying notions of the risk involved. "The objective risk of getting caught isn’t so important—it’s the subjective perception of the risk," says Ladegaard. "You might feel safe because you're doing stuff on your computer in the comfort of your living room chair, or you could be more paranoid because you don’t know what law enforcement is doing to track you down." In the case of Ulbricht's sentencing, at least, the more common reaction appears to be curiosity, and a sense of impunity, undiminished by Ulbricht's fate. The Silk Road's founder may languish in a New York prison, but his business model continues to thrive.
{ "perplexity_score": 288.5, "pile_set_name": "OpenWebText2" }
Q: django simplejson throwing keys must be a string error the error sounds very straight forward but am unable to fix it. I tried changing in my dictionary but am not going anywhere and I thought maybe someone in here can help me point out what I need to do to solve it. Below is my code blog_calendar = BlogI18n.objects.filter(language=request.LANGUAGE_CODE, blog__published_at__gte=datetime(year, month, 1), blog__published_at__lte=datetime(year, month, calendar.monthrange(year, month)[1]) ).order_by('-blog__published_at').select_related() try: calendar_response = {} calendar_response['properties'] = [] calendar_response['properties'].append({'next_url' : reverse('blog-archives-month-year', args=[(date(year, month, 1)-timedelta(days=31)).year, (date(year, month, 1)-timedelta(days=31)).month])} ) calendar_response['properties'].append({'prev_url' : reverse('blog-archives-month-year', args=[(date(year, month, 1)+timedelta(days=31)).year, (date(year, month, 1)+timedelta(days=31)).month])} ) calendar_response['current_month'] = [] calendar_response['current_month'].append({'month':'%s, %s' % (calendar.month_name[month], year)}) calendar_response['events'] = [] if blog_calendar: calendar_response['events'].append(dict((i.blog.published_at.date(), (i.blog.slug, i.title)) for i in blog_calendar)) else: calendar_response['events'].append(None) except Exception, e: print e.__str__() if request.is_ajax(): # try converting the dictionary to json try: from django.core.serializers.json import DjangoJSONEncoder return HttpResponse(simplejson.dumps(calendar_response, cls=DjangoJSONEncoder), mimetype="application/json") except Exception, e: return HttpResponse(e.__str__()) when converting its returning TypeError unable to convert to json (keys must be a string) when I comment out the following line calendar_response['events'].append(dict((i.blog.published_at.date(), (i.blog.slug, i.title)) for i in blog_calendar)) it works, so the problem is in this, any idea how i can rebuild my dictionary in a way that the simplejson would understand it? regards, A: You have to convert all your keys to strings. In this line: calendar_response['events'].append(dict((i.blog.published_at.date(), (i.blog.slug, i.title)) for i in blog_calendar)) The culprit is the i.blog.published_at.date() expression. Substitute it with something which returns a string, as for example: str(i.blog.published_at.date()) or: i.blog.published_at.date().isoformat()
{ "perplexity_score": 2267.1, "pile_set_name": "StackExchange" }
About this mod Regular adidas jacket, gopnik material. Permissions and credits Author's instructions File credits Pjeteh Donation Points system This mod is not opted-in to receive Donation Points INSTALL To install this mod you first need to modify your Fallout4.ini If you alredy has edit you Fallout4.ini to add texture mods skip this. Go to your Fallout4.ini file, located on Documents\My Games\Fallout4 and search for this line: sResourceDataDirsFinal Then, you want to replace it with this line: sResourceDataDirsFinal=STRINGS\, TEXTURES\ To install: copy and paste the <<texture>> folder to DATA folder at fallout4 location. If you don't have the Letterman's Jacket (Letterman's Jacket and Jeans) you can put this line on the console: player.additem 001574C7 1 This reskin is very Slavic, use with caution.
{ "perplexity_score": 1863.1, "pile_set_name": "OpenWebText2" }
We are one year on from Donald Trump's shock 2016 victory in the US elections and calls for his impeachment have only grown louder. It takes a majority vote in the House of Representatives to impeach a President and two-thirds of the Senate to convict him and remove him from office. Republicans control both the House and the Senate - and are of course less likely to vote to impeach Trump - but the tide might be changing. Trump might want to keep his eyes on the 2018 midterm elections. If the elections this month - which have been promising for the Democrats - are anything to go by, Republican control of the House of Representatives could be in real danger in 2018. If Republicans don't hold onto their majority in the House of Representatives next year, Mr Trump's Presidency could hang in the balance.
{ "perplexity_score": 266.9, "pile_set_name": "OpenWebText2" }
Marketing Yourself Careers for Non-RDs Student Resources 16 Dietetic Networking Mistakes You Don’t Want To Make By Sarah Koszyk, MA RDN October 1, 2016 16 Networking Mistakes You Don’t Want To Make Whether you are gearing up for the annual Food and Nutrition Conference and Expo in Boston or just attending a local networking event, you definitely don’t want to make these networking mistakes. NutritionJobs reached out to dietitians and got their great advice and tips on what not to do when networking. “Bring your business cards, yet don’t make it a ‘business’ handing out your card to everyone you meet. Talk Less and Listen more. Think about how you can help others succeed in their business and connect them to your circle of resources.” “Don’t forget to follow up with new contacts after the first meeting. At busy networking events, I’ll write a note on the back of the person’s business card to remind me of something personal to say when I write the follow up email or befriend them on social media the next day.” – Stephanie Brookshier, RDN, ACSM-CPT, founder of Stephanie Brookshier Twitter: @stephbrookshier “Networking is a conversation that may lead to a relationship. It’s as simple as that. Networking is not about trying to sell yourself or your products. You are there to meet people who share a mutual need or interest or someone you can help solve a problem.” – Jean Caton, MS, MBA, RDN, Host of Color My World Confident Podcast Twitter: @JeanCaton “After long conferences like FNCE, wait a few days before contacting a colleague you’ve networked with. When we’re out of the office, our email and voicemail inboxes fill up and we have a lot of catching up to do. There’s a high likelihood your message can get lost in the shuffle during that time frame.” – Mandy Enright, MS, RDN, RYT, creator of Nutrition Nuptials Twitter: @nutrinuptials “Not following up with new connections. If you have a little pile of business cards post networking event, go home and email your new connections with a little note. Then connect with them on LinkedIn. Don’t wait a few months to do this.” – Amy Gorin, MS, RDN, owner of Amy Gorin Nutrition Twitter: @amygorin “Think of it as networking. Just have a conversation and get to know people. Make friends, not contacts.” – Jamila Lepore, MS, RDN, CPT, Founder of No Nonsense Nutritionist Twitter: @n3_nutritionist “The biggest networking mistake I see people make is forgetting to introduce themselves when they meet new people. Many times I’ve heard people simply say, “Nice to meet you,” instead of saying, “My name is Jessica Levings. Nice to meet you.” Failing to introduce yourself makes the other person have to go through the entire conversation without knowing your name and walk away without knowing who you are. Don’t rely only on your name tag if wearing one.” “Yes, it’s important to look good but wear comfortable shoes. I had to take the time to buy a new pair during my first conference. There’s nothing worse than not being able to walk, and there’s a lot of walking.” “If your goal for networking is to build relationships of mutual value, don’t be too busy meeting lots of people at professional events. More time spent with a smaller number of people creates better connections and feels more genuine than collecting a bunch of business cards or gmail contacts.” – Michele Redmond, MS, RDN, Dietitian, Chef, and Taste Guide at The Taste Workshop Twitter: @Taste_Workshop “Networking mistake NOT to make: Not following up after meeting someone. Whenever you meet someone and exchange business cards, don’t let the connection stop there. Always follow up after the event with a personal email, referencing your conversation, and leaving the door open for communication in the future.” “Don’t try to ‘over-network.’ Rather than walking into a room of 200 people and becoming overwhelmed, set a goal to connect with 5-10 people. Chat with people. If there is no connection, move on. Find those who you can really make meaningful connections with.” “A networking mistake you don’t want to make is not reading, From Business Cards to Business Relationships: Personal Branding and Profitable NetworkingMade Easy, by Allison Graham. By far, one of the best books on demystifying the networking process.” – Sonja Stetzler, MA, RDN, CPC, founder of Effective Connecting Twitter: @sonjastetzler “The biggest networking mistake is to NOT GO to the event. Yes, it’s intimidating to go to an event alone when you don’t know a soul, but you have to ‘man up.’ Dietitians are actually super supportive. Not only do you leave the event with more contacts, but you will have more friends, too. Don’t be scared. Be excited. Networking events are the best.” Sarah Koszyk is founder of Family. Food. Fiesta. A family-based wellness program and blog focusing on recipes, family health tips, and videos with kids cooking in the kitchen. She is a Registered Dietitian and Nutrition Coach specializing in sports nutrition and adult and pediatric weight management. Connect with her on Facebook, Twitter, Instagram, Pinterest, or LinkedIn.
{ "perplexity_score": 490.9, "pile_set_name": "Pile-CC" }
(TCF, 1986) One of the great monsters of cinema, the Flying Eyeball is arguably the most famous creation of director John Carpenter outside the transformations of The Thing. Obtained directly from VFX...
{ "perplexity_score": 241, "pile_set_name": "Pile-CC" }
Given that Costa quote cruise only prices, and charge a lot more for flight options from the UK, you would probably be better off arranging your own flights and, if a practical option for you, go out a day early and enjoy the departure port. This has the added security of ensuring you don't miss the ship should your flight be delayed for any reason.
{ "perplexity_score": 549.3, "pile_set_name": "Pile-CC" }
Be-Yachad: Development of Educational Leadership & Content Learning- Local Jewish Camps in the FSU For many young people in the FSU, Jewish camping is their initial link to accessing and fostering their Jewish identities and their connections to Jewish life, peoplehood and the State of Israel. To ensure that the approximately 7,500 campers (a summer) who attend one of the more than 150 camps in the FSU have a uniquely outstanding Jewish experience, there is a real need to increase the level of professionalism of camp counselors and other camp staff. Currently, most of the local counselors at the summer camps are young, with little or no training and often work in Jewish camping for one to two years only. With the aim of further developing and strengthening Jewish camping in the FSU, the Israel-based Dor Camping Group is working in nine FSU countries (in 14 cities), operating trainings for camp educational personnel, developing curricula and content for these trainings, as well as programming for local camps. The results will produce a cadre of local and post-army Israeli Russian-speaking counselors and educational leaders, all of who are committed to working between two to five years in summer camps in the FSU. Group workshops and trainings will focus on Jewish Identity, Peoplehood and the connection to Israel and will cover practical and theoretical instruction. Trainings for 115 Russian-speaking Israeli counselors – 60 new counselors and 55 senior counselors – will take place in Israel. Training sessions for 210 new FSU-based counselors will take place in 14 cities across the region. The age range of local counselors will be between 16 and 25; most of the trainees being recruited are themselves former campers from local camps. Trainings will be run by Israeli experts and will include strengthening knowledge and skills and developing camp programming. In addition to trainings for counselors, the programs will also train 14 Israeli tutors and mentors who will provide support to camp staffers. The Pincus Fund for Jewish Education is a strong supporter of trainings for Jewish educators in formal and informal settings throughout the diaspora. The Pincus Fund is pleased to have the opportunity to impact so significantly on this generation of Jewish youngsters, so as to help safeguard a Jewish future in the FSU in the years to come.
{ "perplexity_score": 319.1, "pile_set_name": "Pile-CC" }
In the mobile IPv6 data transfer technology, every Mobile Node (MN) has a fixed Home Address (HoA), which is independent of the current location by which the MN accesses the Internet and is directly used in a home link of the MN. When the MN moves outside the home link, the current location information of the MN is provided over a Care of Address (CoA) acquired from a Foreign Agent (FA). A Communication Node (CN) is a communication opposite end of the MN. A bidirectional tunnel mode and a route optimization mode may be used for transferring data packets between the MN and the CN. In the route optimization mode, data packets are directly transferred between the MN and the CN supporting mobile IPv6, and the CN must know the new CoA of the MN after moving. In the bidirectional tunnel mode, data packets are transferred between the MN and the CN over a Home Agent (HA), and the CN need not know the new CoA of the MN after moving. For example, when the MN receives a data packet from the CN, the data packet will be sent to the HoA of the MN because the HoA of the MN is unchanged. The data packet is firstly sent from the CN to a Home Agent (HA), and then is forwarded to the MN by the HA. The bidirectional tunnel mode will result in a severe transfer delay because the data packet is forwarded over the HA while the route optimization mode eliminates such a disadvantage of the bidirectional tunnel mode. In order to implement the route optimization transfer of data packets between the MN and the CN supporting mobile IPv6, the MN needs to notify the new CoA of the MN to the HA and the CN once the location of the MN is changed. After the MN moves to a link apart from the home link, the procedure for the MN notifying the new CoA of the MN to the HA and the CN includes a Return Routable Procedure (RRP) and an exchange Binding Update/Binding Acknowledgement (BU/BA) procedure, which are implemented as follows. (1) Return Routable Procedure Firstly, the MN sends to the CN a CoA test initiation packet and sends to the CN a HoA test initiation packet over the HA. Secondly, the CN sends to the MN a CoA test response packet and sends to the MN a HoA test response packet over the HA. (2) Exchange Binding Update/Binding Acknowledgement Procedure After finishing the return routable procedure, the MN initiates the exchange binding update procedure and notifies the CN and the HA of the new CoA of the MN after moving. After receiving the new CoA, the CN adds an item for the MN in the binding buffer of the CN to store the new CoA. In other words, communication registration is finished. After receiving the new CoA, the HA adds an item for the MN in the binding agent of the HA to store the new CoA and home registration is finished. Hereafter, both the CN and the HA send to the MN an exchange binding update packet acknowledgement. In this way, the binding acknowledgement procedure is accomplished. After the communication registration and the home registration are accomplished, the new CoA of the MN is registered to the CN and the HA. Therefore, the route optimization mode may be used to transfer data packets between the MN and the CN. Before data packets are transferred between the MN and the CN, it is necessary to establish a Transport Control Protocol (TCP) connection between the MN and the CN. There are three procedures for establishing the TCP connection. In a network protected by a firewall, Node A protected by the firewall initiates, through the firewall, a TCP connection synchronization (SYN) request to Node B outside of the network protected by the firewall, and the SYN request contains the address of Node B, i.e. a destination address, the Port of Node B, i.e. a destination port, and the protocol number between Node A and Node B. Node B returns, through the firewall, to Node A an SYN request acknowledgement (SYN-ACK), and the SYN request acknowledgement contains the address of Node A, i.e. a source address, and the port of Node A, i.e. a source port. Up to now, a TCP connection is established between Node A and Node B. As can be seen easily, it is possible to establish a TCP connection successfully after a communication registration is finished between Node A and Node B. Additionally, in order to transfer data packets in security between the MN and the CN, a firewall (FW) is set between the MN and the CN for intercepting a malicious node. There are many varieties of firewalls. The state firewall (state FW) adopts a state packet filtering technology, and is widely applied due to the good security and the high speed. The following firewall is referred to as the state firewall. While establishing a TCP connection, a firewall will create an entry item according to five elements interacting in the TCP connection, including a source address, a destination address, a source port, a destination port and a protocol number, and the entry item includes the above-mentioned five elements. Therefore, when a data packet outside the network protected by the firewall traverses the firewall and enters the network protected by the firewall, if the destination address and the source address included in the header of the data packet are the same as the destination address and the source address in the entry item of the firewall respectively as well as the source port, the destination port and the protocol number of the data packet are also the same as the source port, the destination port and the protocol number in the entry item of the firewall, the firewall allows the data packet to traverse it; otherwise, the firewall intercepts the data packet and drops the intercepted data packet, which is also called filtering. At present, because the address of the MN will change with the change of the location of the MN, there are the following problems when a data packet traverses a firewall. Suppose the communication registration between the MN and the CN is successfully completed after the location of the MN changes, i.e., the CN has acquired a new CoA of the MN. For one example, the CN is in the network protected by the firewall and the MN is outside the network protected by the firewall. FIG. 1(a) is a schematic diagram for exchanging a data packet between a mobile node and a communication node through a firewall when the communication node is in the network protected by the firewall and the mobile node is outside the network protected by the firewall. The mobile node sends a data packet to the communication node from a new CoA of the mobile node. When traversing the firewall, the data packet is unable to pass the filtering of the firewall because there is no item matching the new CoA of the mobile node in the entry item of the firewall. Therefore, the data packet is dropped. In this way, the data packet sent to the communication node in the network protected by the firewall is lost when the mobile node outside the network protected by the firewall moves to a new link. In this case, if the communication node in the network protected by the firewall firstly sends a data packet to the mobile node outside the network protected by the firewall, the firewall will newly add an item in the entry item after the data packet traverses the firewall. The item includes such five elements as an address of the communication node, a new CoA of the mobile node, a port of the communication node, a new port of the mobile node, and a protocol number between the communication node and the mobile node. Therefore, when the mobile node resends a data packet to the communication node and the data packet traverses the firewall, the data packet may match the newly-added entry item of the firewall and pass the filtering of the firewall, thereby traversing the firewall successfully. For another example, the MN is in the network protected by the firewall and the CN is outside the network protected by the firewall. FIG. 1(b) is a schematic diagram for exchanging a data packet between a mobile node and a communication node through a firewall when the mobile node is in the network protected by the firewall and the communication node is outside the network protected by the firewall. If the communication node sends a data packet to the mobile node moving to a new link, the destination address of the data packet can not match the destination address in the entry item because the entry item of the firewall does not include the new CoA of the mobile node after moving, but only the address of the mobile node before moving when the data packet traverses the firewall, thereby the data packet fails to pass the filtering of the firewall, and the data packet is dropped. In this case, if the mobile node in the network protected by the firewall firstly sends a data packet to the communication node outside the network protected by the firewall, the firewall will newly add an item in the entry item after the data packet traverses the firewall. The item includes such five elements as an address of the communication node, a new CoA of the mobile node, a port of the communication node, a new port of the mobile node, and a protocol number between the communication node and the mobile node. Therefore, when the communication node resends a data packet to the mobile node and the data packet traverses the firewall, the data packet may match the newly-added entry item of the firewall and pass the filtering of the firewall, thereby traversing the firewall successfully. As can be seen from the above two cases, no matter whether the CN is in the network protected by the firewall and the MN is outside the network protected by the firewall or the MN is in the network protected by the firewall and the CN is outside the network protected by the firewall, there occurs the same problem that a data packet fails to traverse the firewall and is dropped due to the change of the address of the MN caused by the change of the location of the MN. However, the problem will not occur when the data packet in the network protected by the firewall traverses the firewall. Therefore, the following problem that a data packet traverses a firewall is the existing problem which occurs when the data packet outside the network protected by the firewall traverses the firewall. At present, in order to solve the problem, some solutions adopt a filtering method based on the home address of the MN. Because the HoA keeps unchanged when the MN moves, and the HoA is contained in a Home Address Destination Option of the data packet sent from the MN to the CN and is contained in a Type 2 Routing Header of the data packet sent from the CN to the MN, the entry item of the firewall always includes such five fixed elements as a source address, a destination address, a source port, a destination port and a protocol number for the MN and the CN. If the CN is in the network protected by the firewall and the MN is outside the network protected by the firewall, when the MN sends a data packet to the CN, five elements in the entry item of the firewall for matching includes: (1) a source address: the HoA of the MN, (2) a destination address: the address of the CN, (3) a source port: the port of the MN, (4) a destination port: the port of the CN, (5) a protocol number between the CN and the MN. Because the data packet sent from the MN to the CN contains the Home Address Destination Option, the firewall is able to extract the HoA of the MN from the Home Address Destination Option to replace the new CoA of the MN as a source address. Therefore, the changed source address of the MN is able to match the source address in the entry item. In this way, the data packet is able to pass the filtering of the firewall by the filtering method based on the HoA of the MN. If the MN is in the network protected by the firewall and the CN is outside the network protected by the firewall, when the CN sends a data packet to the MN, five elements in the entry item of the firewall for matching includes: (1) a source address: the address of the CN, (2) a destination address: the HoA of the MN, (3) a source port: the port of the CN, (4) a destination port: the port of the MN, (5) a protocol number between the CN and the MN. Because the packet sent from the CN to the MN contains the Type 2 Routing Header, the firewall is able to extract the HoA of the MN from the Type 2 Routing Header to replace the new CoA of the MN as a destination address. Therefore, the changed destination address of the MN is able to match the destination address in the entry item. In this way, the data packet is able to pass the filtering of the firewall by using the filtering method based on the HoA of the MN. FIG. 2 is a flowchart for the mobile IPv6 data outside a network protected by a firewall traversing the firewall in the prior art. Suppose the communication registration has been completed between an MN and a CN after the MN moves to a link apart from the home link, the port and protocol number of the MN match the port and protocol number of the CN, the address of the MN in the home link is the home address, the address of the MN in the link apart from the home link is the CoA, and the address of the CN is Home address 1. The method for mobile IPv6 data outside a network protected by the firewall traversing the firewall in the prior art includes the following steps. Steps 200˜201: The firewall intercepts a data packet outside a network protected by the firewall and determines whether the source address, the destination address, the source port, the destination port and the protocol number of the data packet match five elements in the entry item of the firewall; if the matching is successful, Step 208 is performed; otherwise, Step 202 is performed. This step is described by two examples. For one example, if the MN is outside the network protected by the firewall and the CN is in the network protected by the firewall, the entry item includes: a source home address, a destination home address 1, a source port, a destination port and a protocol number. If the MN is in the home link, the source address of the data packet sent from the MN to the CN is still the home address of the MN, i.e. the source home address, and the destination address is the address of the CN, i.e. the destination home address 1, which are able to match the source home address and the destination home address 1 in the entry item. Therefore, the data packet is able to pass the filtering of the firewall, and Step 208 is performed. If the MN moves to a link apart from the home link, the source address of the data packet sent from the MN to the CN is not the home address of the MN but a new CoA which is unable to match the source home address in the entry item. Therefore, the data packet is unable to pass the filtering of the firewall, and Step 202 is performed. For another example, if the CN is outside the network protected by the firewall and the MN is in the network protected by the firewall, the entry item includes: a source home address 1, a destination home address, a source port, a destination port and a protocol number. If the MN is in the home link, the source address of the data packet sent from the CN to the MN is still the address of the CN, i.e. the source home address 1, and the destination address is the home address of the MN, i.e. the destination home address, which are able to match the source home address 1 and the destination home address in the entry item. Therefore, the data packet is able to pass the filtering of the firewall, and Step 208 performed. If the MN moves to a link apart from the home link, the address of the MN is a new CoA, but the destination address of the data packet sent from the CN to the MN is still the home address of the MN. The destination address of the data packet is able to match the destination home address in the entry item. Therefore, the data packet is able to pass the filtering of the firewall. However, the data packet is unable to be sent to the MN because the address of the MN is changed to the CoA. In this case, even though passing the address matching and Step 208 is performed, the data packet will be dropped. Steps 202˜203: Query whether the data packet contains a Home Address Destination Option; if the data packet contains a Home Address Destination Option, extract the home address from the Home Address Destination Option to replace the source CoA of the data packet, and Step 204 is performed; otherwise, Step 205 is performed. In this step, if the data packet includes the Home Address Destination Option, it indicates that the data packet is sent from the MN to the CN, i.e., the MN is outside the network protected by the firewall and the CN is in the network protected by the firewall. Therefore, the five elements in the entry item includes a source home address, a destination home address 1, a source port, a destination port and a protocol number. Step 204: Match the replaced source address of the data packet, i.e. the home address of the MN with the source home address in the entry item; if the home address of the MN matches the source home address in the entry item, Step 208 is performed; otherwise, Step 209 is performed. In this step, the replaced source address of the data packet, i.e. the home address of the MN matches the source address in the entry item; if the home address of the MN matches the source address in the entry item, the matching is successful; otherwise, the matching is unsuccessful. Steps 205˜206: Query whether the data packet contains a Type 2 Routing Header; if the data packet contains a Type 2 Routing Header, extract the home address from the Type 2 Routing Header to replace the destination CoA of the data packet, and Step 207 is performed; otherwise, Step 209 is performed. In this step, if the data packet includes the Type 2 Routing Header, it indicates that the data packet is sent from the CN to the MN, i.e. the CN is outside the network protected by the firewall and the MN is in the network protected by the firewall. Therefore, the five elements in the entry item includes a source home address 1, a destination home address, a source port, a destination port and a protocol number. Step 207: Match the replaced destination address of the data packet, i.e. the home address of the MN with the destination home address in the entry item; if the home address of the MN matches the destination home address in the entry item, Step 208 is performed; otherwise, Step 209 is performed. In this step, the replaced destination address of the data packet, i.e. the home address of the MN matches the destination home address in the entry item; if the home address of the MN matches the destination address in the entry item, the matching is successful; otherwise, the matching is unsuccessful. Step 208: The data packet traverses the firewall successfully. Step 209: The data packet is dropped. The method mentioned above is for mobile IPv6 data outside a network protected by a firewall traversing the firewall. There are still disadvantages using the conventional filtering method based on the home address of the MN when a data packet is sent from the outside of the network protected by the firewall to the inside of the network protected by the firewall. For one thing, as can be seen from the procedure of FIG. 2, the conventional method needs to perform the matching for a data packet of which the current address is unable to match the corresponding address in the entry item by the filtering method based on the home address of the MN, i.e., the conventional method needs to query the option or header of the data packet, which needs a large amount of time and result a low efficiency of traversing the firewall; for another, as can be seen from the above method, when the MN is in the network protected by the firewall and the CN is outside the network protected by the firewall, even though the matching using the conventional filtering method based on the home address of the MN is successful, the data packet passing the filtering of the firewall will be dropped because the destination address changes, which makes the data packet unable to traverse the firewall normally. The detailed procedure has been described through the second example of Steps 200˜201. It should be noted that the above method is on how the current mobile IPv6 data outside a network protected by a firewall traverses the firewall and when the data packet is sent from the inside of the network protected by the firewall to the outside of the network protected by the firewall, the above filtering method based on the home address of the MN is able to filter the data packet normally; the problem that the data packet traverses the firewall does not occur.
{ "perplexity_score": 386.3, "pile_set_name": "USPTO Backgrounds" }
Endozoicomonas acroporae Endozoicomonas acroporae is a Gram-negative, rod-shaped, aerobic and non-motile bacterium from the genus of Endozoicomonas which has been isolated from the coral Acropora. References External links Type strain of Endozoicomonas acroporae at BacDive - the Bacterial Diversity Metadatabase Category:Oceanospirillales Category:Bacteria described in 2017
{ "perplexity_score": 99.9, "pile_set_name": "Wikipedia (en)" }
package com.tencent.mm.ui.chatting; import android.content.Context; import android.view.MenuItem; import com.tencent.mm.a.n; import com.tencent.mm.model.ax; import com.tencent.mm.plugin.report.service.j; import com.tencent.mm.q.l; import com.tencent.mm.sdk.platformtools.t; import com.tencent.mm.ui.base.bk.d; final class os implements bk.d { os(String paramString, Context paramContext) {} public final void d(MenuItem paramMenuItem, int paramInt) { paramMenuItem = paramMenuItem.getTitle(); t.i("!56@/B4Tb64lLpIXFj7yHqNALrvvAHq7Yqk22bT9FeAfy2TsmeBjP5KDgw==", "connector click[location]: to[%s] content[%s]", new Object[] { paramMenuItem, jcK }); com.tencent.mm.ab.h localh = new com.tencent.mm.ab.h(paramMenuItem, jcK, 48); ax.tm().d(localh); j.eJZ.f(10424, new Object[] { Integer.valueOf(48), Integer.valueOf(16), paramMenuItem }); com.tencent.mm.ui.base.h.aN(val$context, val$context.getString(a.n.app_saved)); } } /* Location: * Qualified Name: com.tencent.mm.ui.chatting.os * Java Class Version: 6 (50.0) * JD-Core Version: 0.7.1 */
{ "perplexity_score": 4031.7, "pile_set_name": "Github" }
Q: Thunderbolt 3 connecting to USB 3.1 I know that Thunderbolt 3 uses the USB Type-C port, and I know that you can plug a USB cable into a Thunderbolt port and it will function as USB or Thunderbolt depending on the peripheral. However, if I have a USB 3.1 Gen 2 Type-C Port and I plug a Thunderbolt 3 peripheral into it, will I get the 10 Gbps from USB 3.1 Gen 2, or will I get a slower speed. Or, will it just not work at all? A: USB 3 is a subset of Thunderbolt 3 host. So if a USB 3.1 device is plugged into TB3 port, it works. The opposite is not true. A TB3 device doesn't work in USB 3.1 host port. Charge function might work, but data connection will be refused.
{ "perplexity_score": 513.6, "pile_set_name": "StackExchange" }
# SPDX-License-Identifier: GPL-2.0 # =========================================================================== # Kernel configuration targets # These targets are used from top-level makefile PHONY += xconfig gconfig menuconfig config localmodconfig localyesconfig \ build_menuconfig build_nconfig build_gconfig build_xconfig ifdef KBUILD_KCONFIG Kconfig := $(KBUILD_KCONFIG) else Kconfig := Kconfig endif ifndef KBUILD_DEFCONFIG KBUILD_DEFCONFIG := defconfig endif ifeq ($(quiet),silent_) silent := -s endif # We need this, in case the user has it in its environment unexport CONFIG_ xconfig: $(obj)/qconf $< $(silent) $(Kconfig) gconfig: $(obj)/gconf $< $(silent) $(Kconfig) menuconfig: $(obj)/mconf $< $(silent) $(Kconfig) config: $(obj)/conf $< $(silent) --oldaskconfig $(Kconfig) nconfig: $(obj)/nconf $< $(silent) $(Kconfig) build_menuconfig: $(obj)/mconf build_nconfig: $(obj)/nconf build_gconfig: $(obj)/gconf build_xconfig: $(obj)/qconf localyesconfig localmodconfig: $(obj)/conf $(Q)perl $(srctree)/$(src)/streamline_config.pl --$@ $(srctree) $(Kconfig) > .tmp.config $(Q)if [ -f .config ]; then \ cmp -s .tmp.config .config || \ (mv -f .config .config.old.1; \ mv -f .tmp.config .config; \ $< $(silent) --oldconfig $(Kconfig); \ mv -f .config.old.1 .config.old) \ else \ mv -f .tmp.config .config; \ $< $(silent) --oldconfig $(Kconfig); \ fi $(Q)rm -f .tmp.config # These targets map 1:1 to the commandline options of 'conf' # # Note: # syncconfig has become an internal implementation detail and is now # deprecated for external use simple-targets := oldconfig allnoconfig allyesconfig allmodconfig \ alldefconfig randconfig listnewconfig olddefconfig syncconfig PHONY += $(simple-targets) $(simple-targets): $(obj)/conf $< $(silent) --$@ $(Kconfig) PHONY += savedefconfig defconfig savedefconfig: $(obj)/conf $< $(silent) --$@=defconfig $(Kconfig) defconfig: $(obj)/conf ifneq ($(wildcard $(srctree)/arch/$(SRCARCH)/configs/$(KBUILD_DEFCONFIG)),) @$(kecho) "*** Default configuration is based on '$(KBUILD_DEFCONFIG)'" $(Q)$< $(silent) --defconfig=arch/$(SRCARCH)/configs/$(KBUILD_DEFCONFIG) $(Kconfig) else @$(kecho) "*** Default configuration is based on target '$(KBUILD_DEFCONFIG)'" $(Q)$(MAKE) -f $(srctree)/Makefile $(KBUILD_DEFCONFIG) endif %_defconfig: $(obj)/conf $(Q)$< $(silent) --defconfig=arch/$(SRCARCH)/configs/$@ $(Kconfig) configfiles=$(wildcard $(srctree)/kernel/configs/$@ $(srctree)/arch/$(SRCARCH)/configs/$@) %.config: $(obj)/conf $(if $(call configfiles),, $(error No configuration exists for this target on this architecture)) $(Q)$(CONFIG_SHELL) $(srctree)/tools/kconfig/merge_config.sh -m .config $(configfiles) $(Q)$(MAKE) -f $(srctree)/tools/kconfig/Makefile.kconfig olddefconfig PHONY += kvmconfig kvmconfig: kvm_guest.config @: PHONY += xenconfig xenconfig: xen.config @: PHONY += tinyconfig tinyconfig: $(Q)$(MAKE) -f $(srctree)/Makefile allnoconfig tiny.config # CHECK: -o cache_dir=<path> working? PHONY += testconfig testconfig: $(obj)/conf $(PYTHON3) -B -m pytest $(srctree)/$(src)/tests \ -o cache_dir=$(abspath $(obj)/tests/.cache) \ $(if $(findstring 1,$(KBUILD_VERBOSE)),--capture=no) clean-files += tests/.cache # Help text used by make help help: @echo ' config - Update current config utilising a line-oriented program' @echo ' nconfig - Update current config utilising a ncurses menu based program' @echo ' menuconfig - Update current config utilising a menu based program' @echo ' xconfig - Update current config utilising a Qt based front-end' @echo ' gconfig - Update current config utilising a GTK+ based front-end' @echo ' oldconfig - Update current config utilising a provided .config as base' @echo ' localmodconfig - Update current config disabling modules not loaded' @echo ' localyesconfig - Update current config converting local mods to core' @echo ' defconfig - New config with default from ARCH supplied defconfig' @echo ' savedefconfig - Save current config as ./defconfig (minimal config)' @echo ' allnoconfig - New config where all options are answered with no' @echo ' allyesconfig - New config where all options are accepted with yes' @echo ' allmodconfig - New config selecting modules when possible' @echo ' alldefconfig - New config with all symbols set to default' @echo ' randconfig - New config with random answer to all options' @echo ' listnewconfig - List new options' @echo ' olddefconfig - Same as oldconfig but sets new symbols to their' @echo ' default value without prompting' @echo ' kvmconfig - Enable additional options for kvm guest kernel support' @echo ' xenconfig - Enable additional options for xen dom0 and guest kernel support' @echo ' tinyconfig - Configure the tiniest possible kernel' @echo ' testconfig - Run Kconfig unit tests (requires python3 and pytest)' # =========================================================================== # object files used by all kconfig flavours common-objs := confdata.o expr.o lexer.lex.o parser.tab.o preprocess.o \ symbol.o $(obj)/lexer.lex.o: $(obj)/parser.tab.h HOSTCFLAGS_lexer.lex.o := -I $(srctree)/$(src) HOSTCFLAGS_parser.tab.o := -I $(srctree)/$(src) # conf: Used for defconfig, oldconfig and related targets hostprogs-y += conf conf-objs := conf.o $(common-objs) # nconf: Used for the nconfig target based on ncurses hostprogs-y += nconf nconf-objs := nconf.o nconf.gui.o $(common-objs) HOSTLDLIBS_nconf = $(shell . $(obj)/nconf-cfg && echo $$libs) HOSTCFLAGS_nconf.o = $(shell . $(obj)/nconf-cfg && echo $$cflags) HOSTCFLAGS_nconf.gui.o = $(shell . $(obj)/nconf-cfg && echo $$cflags) $(obj)/nconf.o $(obj)/nconf.gui.o: $(obj)/nconf-cfg # mconf: Used for the menuconfig target based on lxdialog hostprogs-y += mconf lxdialog := $(addprefix lxdialog/, \ checklist.o inputbox.o menubox.o textbox.o util.o yesno.o) mconf-objs := mconf.o $(lxdialog) $(common-objs) HOSTLDLIBS_mconf = $(shell . $(obj)/mconf-cfg && echo $$libs) $(foreach f, mconf.o $(lxdialog), \ $(eval HOSTCFLAGS_$f = $$(shell . $(obj)/mconf-cfg && echo $$$$cflags))) $(addprefix $(obj)/, mconf.o $(lxdialog)): $(obj)/mconf-cfg # qconf: Used for the xconfig target based on Qt hostprogs-y += qconf qconf-cxxobjs := qconf.o qconf-objs := images.o $(common-objs) HOSTLDLIBS_qconf = $(shell . $(obj)/qconf-cfg && echo $$libs) HOSTCXXFLAGS_qconf.o = $(shell . $(obj)/qconf-cfg && echo $$cflags) $(obj)/qconf.o: $(obj)/qconf-cfg $(obj)/qconf.moc quiet_cmd_moc = MOC $@ cmd_moc = $(shell . $(obj)/qconf-cfg && echo $$moc) -i $< -o $@ $(obj)/%.moc: $(src)/%.h $(obj)/qconf-cfg $(call cmd,moc) # gconf: Used for the gconfig target based on GTK+ hostprogs-y += gconf gconf-objs := gconf.o images.o $(common-objs) HOSTLDLIBS_gconf = $(shell . $(obj)/gconf-cfg && echo $$libs) HOSTCFLAGS_gconf.o = $(shell . $(obj)/gconf-cfg && echo $$cflags) $(obj)/gconf.o: $(obj)/gconf-cfg # check if necessary packages are available, and configure build flags filechk_conf_cfg = $(CONFIG_SHELL) $< $(obj)/%conf-cfg: $(src)/%conf-cfg.sh FORCE $(call filechk,conf_cfg) clean-files += *conf-cfg
{ "perplexity_score": 1879, "pile_set_name": "Github" }
In The Court of Appeals Sixth Appellate District of Texas at Texarkana No. 06-14-00022-CV DENCO CS CORPORATION, Appellant V. BODY BAR, LLC, Appellee On Appeal from the 429th District Court Collin County, Texas Trial Court No. 429-01020-2013 Before Morriss, C.J., Carter and Moseley, JJ. Opinion by Justice Moseley OPINION Body Bar, LLC, desired to open an upscale Pilates studio and juice bar in Plano, Texas. 1 Toward that aim, Body Bar entered into a lease for commercial property owned by Regency Centers, L.P., the lease acknowledging that it would be Body Bar’s responsibility to construct the studio within the demised space and providing that Regency would pay $25,000.00 of the cost of doing so after the successful completion of the construction project. Body Bar had its plans and specifications for the improvements drafted by an outside consultant and included those plans and specifications in its advertisement for bids to accomplish the work. Denco CS Corporation responded to the advertisement for bids and was awarded the contract for the improvements as Body Bar’s contractor. On March 25, 2012, Denco and Body Bar entered into a contract to complete the project. Denco’s completion of the project was delayed, in part, due to the city’s determination that portions of the plans and specifications for the project failed to meet the city’s health code. In order to complete the project with as little delay as possible, Denco’s crewmen worked overtime and on weekends, thereby increasing Denco’s cost for the project by $28,933.40. Denco attempted to pass this cost along to Body Bar via an e-mail request for additional sums. Believing that its contract with Denco did not obligate it to pay more on the contract due to Denco’s decision to employ crewmen outside of normal business hours, Body Bar—which had paid each contractually prescribed invoice Denco submitted—did not acquiesce to Denco’s 1 Originally appealed to the Fifth Court of Appeals in Dallas, this case was transferred to this Court by the Texas Supreme Court pursuant to its docket equalization efforts. See TEX. GOV’T CODE ANN. § 73.001 (West 2013). We follow the precedent of the Fifth Court of Appeals in deciding this case. See TEX. R. APP. P. 41.3. 2 request for additional sums. In response, Denco took the steps it felt were necessary to perfect contractor’s liens under both the statutory scheme and the Texas constitutional contractor’s lien on the property it had improved. These liens were supported by the affidavit of Denco’s Director of Construction, Steven J. Smith, and stated, in part, that “the amount of $28,933.40 . . . remains unpaid and is due and owing to [Denco] under its agreement with Body Bar.” 2 Some two months after Denco and Body Bar entered into the construction agreement, Regency sold the premises to Bre Throne Preston Park, LLC, which purchased the property subject to Body Bar’s lease and the obligations of the landlord thereunder—including the responsibility of the lessor to reimburse Body Bar $25,000.00 of the cost of the improvements it made to the property. When Bre Throne discovered the existence of the lien affidavits filed by Denco, it withheld its reimbursement to Body Bar of the $25,000.00 specified in the lease agreement. When Bre Throne refused to pay the reimbursement, Body Bar filed suit against Denco. In its suit seeking declaratory relief, Body Bar’s petition (1) set out the existence of the contractual relationship into which it had entered with Denco; (2) alleged that Denco had breached its contract with Body Bar by requesting additional sums not contemplated to be paid by Body Bar under the contract; (3) requested the trial court to declare that the affidavits filed by Denco did not effectuate liens on the improved property because (a) Denco failed to provide the required statutory notice, (b) Denco failed to file its lien affidavits within the prescribed time, and (c) the lien affidavits were ineffective to affix a lien on the property because Denco had no 2 See TEX. PROP. CODE ANN. § 53.021 (West Supp. 2014). 3 privity of contact with Bre Thorne, the owner of the realty; (4) alleged that Denco’s act in filing fraudulent lien affidavits tortiously interfered with Body Bar’s lease with Bre Throne, causing damages in the amount of the $25,000.00 reimbursement prescribed in the lease agreement; and (5) sought to recover Body Bar’s attorney fees. Denco responded by filing counterclaims of its own, these counterclaims seeking relief for the alleged breach of contract, quantum meruit, unjust enrichment, and attorney fees, together with the relief of allowing it to foreclose the mechanic’s liens it alleged that it held. Body Bar filed a combination traditional and no-evidence motion for summary judgment. After reviewing the summary judgment evidence, the trial court (1) ruled that neither the constitutional mechanic’s lien nor the statutory mechanic’s lien alleged by Denco were valid and that neither was subject to foreclosure; (2) determined that Denco had breached its contract with Body Bar, that Denco was guilty of tortious interference with Body Bar’s contract with its lessor, and that Denco was not entitled to recovery under its claim of quantum meruit or unjust enrichment; 3 and (3) granted Body Bar recovery of $25,000.00 in damages, $16,451.00 in attorney fees and $491.00 in costs. Denco appeals the trial court’s ruling. In this case, we find that the summary judgment evidence (1) conclusively established that the statutory and constitutional liens were invalid, (2) conclusively established that Body Bar was entitled to summary judgment on all of Denco’s claims, (3) failed to conclusively establish that Body Bar sustained damages as a result of Denco’s breach, and (4) failed to conclusively establish tortious interference with the lease with Bre Thorne as a matter of law. In short, Body 3 See further discussion below. 4 Bar established its entitlement to summary judgment on its declaratory judgment and breach of contract claim as a matter of law. However, while Body Bar proved that Bre Thorne withheld reimbursement due to the invalid liens filed on the premises, Body Bar failed to prove that Bre Thorne would not pay the reimbursement once the liens were invalidated. Thus, while Body Bar demonstrated that it sustained some damage (including interest on the reimbursement had it been timely paid), the amount of damages actually sustained in light of our opinion remains speculative. 4 We further find (1) that Denco could not foreclose invalid liens, (2) that Denco failed to raise a genuine issue of material fact demonstrating that Body Bar was contractually obligated to pay the additional sums requested by Denco, and (3) that Denco’s equitable claims of unjust enrichment and quantum meruit were precluded as a matter of law because the labor used to complete the project was covered by the contract price. Because Denco failed to raise more than a scintilla of evidence on any of its claims, the trial court’s no-evidence motion for summary judgment was proper. We affirm the trial court’s judgment in part, but reverse (1) the finding that Body Bar established tortious interference as a matter of law, (2) the finding that Body Bar established breach of contract as a matter of law, and (3) the award of $25,000.00 to Body Bar, and remand these matters to the trial court for further proceedings consistent with this opinion. 4 We find that the amounts of attorney fees and costs were conclusively established by an affidavit filed by Body Bar’s counsel. 5 I. Standard of Review “We apply well-known standards in our review of traditional and no-evidence summary judgment motions.” W. Fork Advisors, LLC v. SunGard Consulting Servs., LLC, No. 05-13- 01289-CV, 2014 WL 3827937, at *2 (Tex. App.—Dallas Aug. 5, 2014, no pet. h.) (citing Timpte Indus., Inc. v. Gish, 286 S.W.3d 306, 310 (Tex. 2009); Nixon v. Mr. Prop. Mgmt. Co., 690 S.W.2d 546, 548 (Tex. 1985)). “With respect to a traditional motion for summary judgment, the movant has the burden to demonstrate that no genuine issue of material fact exists and it is entitled to judgment as a matter of law.” Id. (citing TEX. R. CIV. P. 166a(c); Nixon, 690 S.W.2d at 548–49). “We review a no-evidence summary judgment under the same legal sufficiency standard used to review a directed verdict.” Id. (citing TEX. R. CIV. P. 166a(i); Gish, 286 S.W.3d at 310). “To defeat a no-evidence summary judgment, the nonmovant is required to produce evidence that raises a genuine issue of material fact on each challenged element of its claim.” Id. (citing Gish, 286 S.W.3d at 310; see TEX. R. CIV. P. 166a(i)). “Within the framework of these standards, we review the trial court’s summary judgment de novo.” Id. (citing Travelers Ins. Co. v. Joachim, 315 S.W.3d 860, 862 (Tex. 2010)). II. The Summary Judgment Evidence Denco provided Body Bar with a proposed estimate, which (1) extensively detailed the work Denco would complete on the project, (2) included Denco’s overhead, (3) in a document titled “General Conditions,” included an estimate for “Lump Sum” “Labor Burden,” and ten hours of “Miscellaneous Labor,” and (4) provided $123,841.81 as the total cost for the project. When Denco won the bid, its bid proposal was incorporated into the contract with Body Bar. 6 The contract stated, “Only work explicitly listed in the Proposal is included. All other work is excluded. [Body Bar] shall request any clarification needed regarding the scope of work included in the Proposal.” The contract further explained, “Request for work in addition to the Proposal may be completed, and, even without a signed Change Order, will result at an additional cost to [Body Bar].” The contract also set forth the following payment schedule: “Payment shall be made as follows: 30% After demo and underground plumb / 30% After wall inspections / 30% Up building / Final 10% upon move in . . . .” Denco began work on the project on June 11, 2012. According to the terms of the contract’s payment schedule, Denco delivered Body Bar the first $37,152.54 invoice on June 25, the second $44,493.29 invoice on July 25, and the third $24,768.37 invoice on August 28, 2012. 5 Body Bar paid each of these invoices in full. Denco’s contract with Body Bar also stated, “Unless specified elsewhere in the Contract Documents, liquidated damages for work not completed on time shall not exceed $100 per day.” The projected opening date for the studio was August 4, 2012. On July 25, 2012, Emilie Shaulis, Denco’s office manager, e-mailed a delay log to Alison Bradley, human resources manager for Body Bar. The delay log indicated a 152-day delay and listed reasons for the delay that were outside of Denco’s control. A July 27, 2012, e-mail from Denco informed Body Bar and its design team that the “structure over juice bar,” exposed beams, and “ledgerstone accent band” in the bathrooms failed the city’s health inspection because they could not easily be wiped clean. On August 1, 2012, Denco’s President, Mark L. Boland, sent an e-mail to Body Bar’s design 5 Pursuant to an approved change order, Denco billed an additional $1,368.21 on August 1, and Body Bar paid the amount on August 22, 2012. 7 team stating, “A week ago I said we could complete in 3 weeks. That date will slip if materials cannot be delivered and design issues resolved in timely fashion.” The studio was opened on or about September 7, 2012, thirty-four days past the August 4 projected opening date. On September 13, 2012, after Denco had completed the project, Shaulis sent the following e-mail to Bradley: As a result of the delays on the Body Bar, Plano, TX, Denco has suffered financially. We are asking for you to review the attached documents and please consider additional compensation. . . . . As you can see the delays . . . only extend[ed] us 34 days past the original opening date. In cost for General Conditions we have calculated for the 34 days past the August 4, Opening Date. However our labor is much more extensive as we had a crew of 4 men working over 8 hours a day and Saturdays and Sundays. General Conditions for Days Past Original Schedule -$180.72 x34 days $6,144.48 . . . Normal hours -$17.00per Hr x 4men=$68.00hr@8hrs@34 days $18,496.00 Weekend and After Hours Labor -47 days @ 8hrs @ $11.42 hr $4,292.92 Total amount of additional monies from 34 days of Delays $28,933.40 If you have any questions at all, please do not hesitate to contact our office at your convenience. Again please review the documentation and consider additional compensation. On September 17, 2012, Shaulis sent Denco’s final $32,848.44 invoice to Bradley with the notation, “Per our earlier email. Here is the Final amount due, to Denco for the Body Bar, Plano, TX. This will be [the] billing for remaining balance of all [Proposed Change Orders (PCO)] as well as all new PCO’s as sent on Friday 9-14.” Later that day, Shaulis clarified, “The final invoice did not include the delay claim amount of $28[,]933.40 that was also sent over late last week. I[’]m hoping this amount is being considered.” 8 On October 3, 2012, Shaulis e-mailed Bradley to inquire about the “payment status of [Denco’s] Final Billing and Status of any monies to be paid on [its] Delay Claim.” Bradley responded, “The check is going out today for final billing.” On that date, Body Bar paid the final invoice—including additional sums for PCO’s—in full. In total, Body Bar paid Denco $140,630.85—$16,789.04 more than the amount included in the contract estimate. Denco accepted and applied Body Bar’s final payment and produced documentation showing that the account had a zero balance. On October 8, 2012, Shaulis thanked Bradley for payment of the final invoice, but wrote, “We would like to inquire with respect, on our Delay Claim that was sent on September 13, 2012. Our office worked diligently in order to keep the project moving forward in spite of all the delays that were presented. Has any consideration of additional funding been given?” On October 17, 2012, Smith again asked Bradley about the delay cost and pleaded, “The cost of said delays was substantial in fact at this point our cost exceeds the job income due to the delays out of our control. We are always thankful to be a part of any Team but believe we deserve some help with these cost[s].” On November 5, 2012, Smith pleaded with Body Bar’s majority shareholder, again reminding that the delays were the result of “incomplete designs or designs that do not meet city requirement[s]” and suggesting, “I say we pursue the claim and perhaps you will get paid with the Design Team errors and omission insurance.” On December 7, 2012, Smith executed a lien affidavit in which he swore that Denco had furnished labor and materials for improvement to real property under an agreement with Body Bar and that “$28,933.40 . . . remain[ed] unpaid and is due and owing to Claimant under its 9 agreement with Body Bar.” The lien affidavit and claim purporting to encumber the rental space with a lien was filed with the Clerk of Collin County, Texas, on December 13, 2012, in order to obtain both statutory and constitutional liens. Denco sent both Bre Thorne and Body Bar notice of the filing of the lien affidavit on December 26, 2012. On January 16, 2013, Body Bar’s counsel responded to Denco’s notice by arguing that the alleged liens were invalid because (1) they were based, in part, on work performed in June 2012 and the statutory deadline for filing liens expired in November 2012, 6 (2) Denco failed to provide Body Bar with notice of the lien as required by the Texas Property Code, (3) the contract did not provide for delay damages, and (4) Body Bar paid Denco in full for all invoices under the contract and all approved PCOs. 7 Denco did not take action to relieve the property of the cloud on the title cast by the lien affidavits. Body Bar sued Denco and, after adequate time for discovery, moved for summary judgment. In addition to documents demonstrating the facts recited above, Body Bar submitted Bradley’s affidavit as summary judgment evidence. Bradley’s affidavit swore (1) that Denco never requested additional compensation for the delays until after the project was completed, 8 (2) that “Denco further told [me] that the amount Denco sought in payment application number 6 “[T]he person claiming the lien must file an affidavit with the county clerk of the county in which the property is located . . . not later than the 15th day of the fourth calendar month after the day on which the indebtedness accrues.” TEX. PROP. CODE ANN. § 53.052(a) (West 2007). 7 The letter also warned, “Further, if DENCO’s actions in filing these fraudulent liens have in any way damaged Body Bar’s relationship with Premises owner Bre Thorne, Body Bar will seek full restitution of these damages from DENCO.” 8 Bradley’s affidavit contains a minor discrepancy because it states both that “Denco completed work on the Project on or about the 18th day of September 2012” and that “[o]n September 13, 2012, after completion of the Project, Denco requested Body Bar to consider additional compensation.” However, e-mails from Shaulis establish that the project was completed prior to submission of the final invoice. 10 four is the final amount Body Bar owed to Denco for the Project,” (3) that Body Bar never agreed to pay the delay charges in writing or otherwise, (4) that Denco merely requested payment of the delay claim and did not demand payment before filing the lien affidavits, (5) that Denco never provided documentation demonstrating that Body Bar was obligated to pay the delay claim, (6) that Body Bar paid all of Denco’s invoices and PCOs, and (7) that, as a result of the liens, Bre Thorne informed Body Bar that it was withholding the $25,000.00 tenant improvement allowance (reimbursement). Body Bar also submitted an attorney fees affidavit that detailed its attorneys’ hourly rates and work completed, attached counsels’ billing records, and concluded, “Body Bar has incurred a total of $16,451.00 in reasonable and necessary attorneys’ fees in this matter, and $491.10 in costs.” In response to Body Bar’s combination traditional and no-evidence summary judgment motion, Denco attached Shaulis’ affidavit, which stated, Additional work for this project was necessary due to multiple delays caused by Body Bar, LLC and its representatives, resulting in additional work beyond the scope of the original agreement to be completed by Denco, notice of these delays and additional expenses were timely documented by Denco and communicated to Body Bar, LLC both during the completion of this construction project and upon completion of the project.[9] Denco relied on the language in the contract stating, “Request for work in addition to the Proposal may be completed, and, even without a signed Change Order, will result at an additional cost to the Owner. It shall be the Owner’s responsibility to secure a written proposed Change Order before requesting additional work.” 9 At the summary judgment hearing, Denco’s counsel stated that the delay claim was for “additional work hours that were required to complete the project as per the contract.” 11 Based on this evidence, the trial court granted Body Bar’s traditional and no-evidence motion for summary judgment. III. Analysis of the Trial Court’s Entry of Summary Judgment A. Denco’s Affidavits Were Not Effective to Create a Valid Mechanic’s Lien Denco argues that Body Bar was not entitled to a declaratory judgment that the alleged liens were invalid. In its motion for summary judgment, Body Bar argued that “Denco had no legal right to place a lien on the fee interest of the landlord’s property” due to lack of privity of contract with Bre Thorne. We agree. Denco’s lien encumbered the following property: “PRESTON PARK VILLAGE, BLK A, LOT 1R, 26305 ACRES, CITY OF PLANO . . . (1900 PRESTON RD., SUITE 269).” 10 At the time that the liens were filed, the property was owned in fee by Bre Thorne. Texas law recognizes two possible types of mechanic’s liens: (1) a constitutional lien and (2) a statutory lien. TEX. CONST. art. XVI, § 37; TEX. PROP. CODE ANN. 53.001 (West 2007). “[A] constitutional lien requires a person to be in privity of contract with the property owner.” 11 Trinity Drywall Sys., LLC v. Toka Gen. Contrs., Ltd., 416 S.W.3d 201, 209 (Tex. App.—El Paso 2013, pet. filed); see Gibson v. Bostick Roofing & Sheet Metal Co., 148 S.W.3d 482, 493 (Tex. 10 We assume that the lien encumbered only 1900 Preston Road, Suite 269, and not the entire acreage set forth in the lien affidavit. 11 Article XVI, Section 37 of the Texas Constitution provides, Mechanics, artisans and material men, of every class, shall have a lien upon the buildings and articles made or repaired by them for the value of their labor done thereon, or material furnished therefor; and the Legislature shall provide by law for the speedy and efficient enforcement of said liens. TEX. CONST. art. XVI, § 37. 12 App.—El Paso 2004, no pet.). The same privity of contract with the property owner is required to establish a statutory lien that encumbers the owner’s property. See TEX. PROP. CODE ANN. § 53.021(a)(2) (West Supp. 2013) (A person has a statutory lien if “the person labors . . . or furnishes the labor or materials under or by virtue of a contract with the owner or the owner’s agent . . . .”); TEX. PROP. CODE ANN. § 53.001(7) (defining “Original Contractor” as “a person contracting with an owner either directly or through the owner’s agent”). Smith’s lien affidavit listed Bre Thorne as the owner of the property sought to be encumbered. Yet, there is no evidence in the record establishing that either Regency (who was the owner of the premises at the time the contract for improvements was entered) or Bre Thorne (the subsequent owner) contracted with Denco or that Body Bar was the agent of either at the time it entered into the contract for improvements or when Denco’s additional charges supposedly accrued. “[W]here the contract for labor, materials or construction is not made with the owner or his duly-authorized agent, a lien may not be fixed on his property.” Gibson, 148 S.W.3d at 494; see 2811 Assocs., Ltd. v. Metroplex Lighting & Elec., 765 S.W.2d 851, 853 (Tex. App.—Dallas 1989, writ denied). The mechanic’s lien affidavit was not filed until after Regency had sold to Bre Thorne. Because there was no evidence that Denco was in privity of contract with the owner of the premises, it was not entitled to a constitutional lien against Bre Thorne’s fee interest in the property. “[I]f a lessee contracts for construction, the mechanic’s lien attaches only to the leasehold interest, not to the fee interest of the lessor.” Diversified Mortg. Investor v. Lloyd D. Blaylock Gen. Contractor, Inc., 576 S.W.2d 794, 805 (Tex. 1978); see Bannum, Inc. v. Mees, 13 No. 07-12-00458-CV, 2014 WL 2918436, at **3–4 (Tex. App.—Amarillo Jun. 24, 2014, no pet. h.) (mem. op.); Terraces at Cedar Hill, L.L.C. v. Gartex Masonry & Supply, Inc., No. 05-10- 00226-CV, 2011 WL 1050852, at *2 (Tex. App.—Dallas Mar. 24, 2011, pet. denied) (mem. op.). Thus, the affidavit laying claim to statutory and constitutional mechanic’s liens—which were not limited to Body Bar’s leasehold interest—did not validly encumber the property. 12 Because the liens were not perfected, Denco was not entitled to foreclosure. B. Summary Judgment on Denco’s Breach of Contract Claims Was Proper “The elements of a breach of contract claim are (1) the existence of a valid contract, (2) the plaintiff’s performance or tendered performance, (3) the defendant’s breach of the contract, and (4) damages as a result of the breach.” Jespersen v. Sweetwater Ranch Apartments, 390 S.W.3d 644, 658 (Tex. App.—Dallas 2012, no pet.). Body Bar argues that it conclusively established compliance with its obligations under the contract and that Denco breached the contract by attempting to charge more than the contractual amount. 12 Body Bar argues that Denco failed to meet statutory requirements to perfect the lien. “A person who files an affidavit must send a copy of the affidavit by registered or certified mail to the owner or reputed owner . . . not later than the fifth day after the date the affidavit is filed with the county clerk.” TEX. PROP. CODE ANN. § 53.055(a) (West 2007). “A party must comply with chapter 53 to perfect a lien under the statute.” Addison Urban Dev. Partners, LLC v. Alan Ritchey Materials Co., LC, No. 05-13-00122-CV, 2014 WL 2946019, at *4 (Tex. App.— Dallas July 1, 2014, no pet. h.) (citing Morrell Masonry Supply, Inc. v. Lupe’s Shenandoah Reserve, LLC, 363 S.W.3d 901 (Tex. App.—Beaumont 2012, no pet.); TEX. PROP. CODE ANN. § 53.051). Here, Denco admitted that it failed to comply with Section 53.055(a). However, substantial compliance with Chapter 53 is sufficient, and “[c]ases interpreting the mechanic’s and materialman’s lien statutes counsel against invalidating a lien on a purely technical basis.” Id. (citing Ready Cable, Inc. v. RJP S. Comfort Homes, Inc., 295 S.W.3d 763, 765 (Tex. App.— Austin 2009, no pet.)). 14 The question of whether Body Bar tendered full performance under the contract requires contract interpretation. In this case, neither party argues that the contract is ambiguous. 13 The bid proposal included the following work: demolition, foundations/slabs/piers, masonry/brick– ledger stone veneer, structural steel, finish carpentry/millwork/trim carpentry, doors/frames, finish hardware, glazing/storefront, drywall/framing, ceilings, flooring, tape/bed/paint, fire extinguishers, HVAC/controls, plumbing, electrical, furnishings (installation only), granite tops, custom ceiling over bar, restroom makeover, replace restroom sink, temporary protection, small tools and miscellaneous expense, dumpster fees, final clean and make ready, and insurance. 14 Denco’s contract with Body Bar incorporated its $123,841.81 bid, specifically including all work required to complete the proposal, and the only provision it made for per-diem damages for delays was a fee that Denco would be assessed if it did not complete the project within a specified time. 15 The proposal’s General Conditions section specifically set forth a lump sum cost for the total labor burden, and a cost for ten additional hours of miscellaneous labor. By its plain terms, the contract included all of the labor required to complete the proposal. The delay logs demonstrate that the overtime labor was expended on completing work included in the proposal. As an example, the table below lists the reason for the delay included in the delay log, along with the work to be completed by Denco under the terms of the proposal: 13 “If a contract is worded such that it can be given a certain or definite legal meaning, we construe the contract as a matter of law.” Am. Bd. of Obstetrics & Gynecology, Inc. v. Yoonessi, 286 S.W.3d 624, 628 (Tex. App.—Dallas 2009, pet. denied). 14 The proposal also incorporated the cost of the following items for five weeks: truck and gas allowance, temporary phone, temporary data, project manager, project administrator, project superintendent. 15 The contract provided for per-diem liquidated damages in case Denco failed to complete the project on time. Perhaps Denco chose to hire overtime workers to complete the project to avoid assessment of a substantial amount of liquidated damages. 15 Reason for Delay Provided in Delay Log Proposal Work Item Impacted Permit Delay All Custom Glass Doors Delay Doors/Frames AC Unit Delay HVAC/Controls Juice Bar Ceiling, Not per City Code Finish Carpentry/Millwork/Trim Carpentry Interior Dimensions Drywall/Framing; Finish Carpentry/ Millwork/Trim Carpentry Quarry Tile Discontinued Flooring Granite Cambria Torquay is Millwork Backordered Candle Niche, Trim Out and Placement Millwork Air Conditioning into Reception Area HVAC/Controls Receipt of New Stone for Walls Flooring, Painting Finish Hardware for Custom Glass Finish Hardware Door Receipt of New Stone for Walls Flooring, Painting Denco’s response relies on a contract clause which states, “Request for work in addition to the Proposal may be completed, and, even without a signed Change Order, will result at an additional cost to [Body Bar]. It shall be [Body Bar’s]’s responsibility to secure a written proposed Charge Order before requesting additional work.” Denco argues that this clause applies because Shaulis’ affidavit “provide[s] evidence that there was additional work required to be completed by [Denco] outside of the scope of the contract.” 16 Shaulis’ affidavit stated, Additional work for this project was necessary due to multiple delays caused by Body Bar, LLC and its representatives, resulting in additional work beyond the scope of the original agreement to be completed by Denco, notice of these delays and additional expenses were timely documented by Denco and communicated to Body Bar, LLC both during the completion of this construction project and upon completion of the project. 16 We do not believe Denco is truly arguing that the work completed by its laborers was outside the scope of the contract. If that was so, Denco’s evidence was insufficient to raise a genuine issue of material fact on its claim for breach of contract. Rather, we believe Denco argues that additional work required was outside the scope of the bid proposal incorporated into the contract and that the contract provided a procedure by which Body Bar could be charged for additional work. 16 First, Shaulis’ statement that the work completed by the laborers constituted “additional work beyond the scope of the original agreement” is unfounded and incorrect. Body Bar objected to Shaulis’ affidavit at trial, claiming it is conclusory, and Body Bar reasserts that complaint on appeal. 17 “Conclusory statements in affidavits are not proper summary judgment evidence if there are no facts to support the conclusions.” James L. Gang & Assocs., Inc. v. Abbott Labs., Inc., 198 S.W.3d 434, 439 (Tex. App.—Dallas 2006, no pet.); see E.I. Du Pont De Nemours & Co. v. Shell Oil Co., 259 S.W.3d 800, 809 (Tex. App.—Houston [1st Dist.] 2007, pet. denied) (affidavit is conclusory when it expresses inference without stating underlying facts supporting inference). Because it does not raise fact issues, a conclusory affidavit is incompetent evidence that, as a matter of law, does not support a summary judgment. Ryland Grp., Inc. v. Hood, 924 S.W.2d 120, 122 (Tex. 1996) (per curiam) (conclusory affidavits “are not credible, nor susceptible to being readily controverted”); see Anderson v. Snider, 808 S.W.2d 54, 55 (Tex. 1991) (per curiam) (op. on reh’g). Without referencing the type of work completed during the overtime labor, Shaulis classified the work as “additional work” that was not contemplated by the bid proposal. Shaulis made this statement even though (1) the delay logs establish that the delay only impacted Denco’s ability to proceed with labor on items included in the proposal, and (2) the record is devoid of evidence showing that the laborers who worked overtime completed 17 Body Bar did not secure a ruling on this objection. However, “conclusory statements in affidavits are errors of substance and not form, and such defect is not waived on appeal by failure to object in the trial court, or as in this case, to obtain a ruling on the objection.” Clarendon Nat’l Ins. Co. v. Thompson, 199 S.W.3d 482, 490 n.7 (Tex. App.—Houston [1st Dist.] 2006, no pet.) (citing Ramirez v. Transcon. Ins. Co., 881 S.W.2d 818, 829 (Tex. App.— Houston [14th Dist.] 1994, writ denied)); see Strother v. City of Rockwall, 358 S.W.3d 462, 469 (Tex. App.—Dallas 2012, no pet.) (citing Thompson v. Curtis, 127 S.W.3d 446, 450 (Tex. App.—Dallas 2004, no pet.). 17 work that was not contemplated by the bid proposal. Because Shaulis’ conclusion was not supported by fact, we find this portion of Shaulis’ affidavit conclusory. Second, the contract clause upon which Denco relies only allowed Denco to charge an additional cost for “work in addition to the [p]roposal” that had been requested by Body Bar. Shaulis’ affidavit stated only that additional work was necessary, not that additional work was requested by Body Bar. Further, there is no other evidence that Body Bar requested additional work outside of the scope of the bid proposal. Thus, the clause upon which Denco relies to support its interpretation of the contract is inapplicable. Here, the summary judgment evidence conclusively established that all of the delay labor cost was included in the contract price. The evidence established that (1) while Body Bar was consistently informed about the project delays and reasons for the delay, Denco did not notify Body Bar that it was paying laborers overtime to speed up the project and did not seek payment for work completed by the laborers until after the project was completed; (2) Denco merely asked Body Bar to consider the damage claim and did not represent that Body Bar was required to pay the claim under the contract until after the lien affidavit was filed; (3) Denco excluded the delay claim from the last invoice; (4) Shaulis affirmed that the bid included all labor, and revealed that Denco underestimated the labor cost when she wrote, “In cost for General Conditions we have calculated for the 34 days past the August 4, Opening Date;” (5) Denco described its last invoice to Body Bar as the final invoice containing the “Final amount due, to Denco for the Body Bar” project; (6) Shaulis e-mailed Bradley and expressed her “hope” that the 18 delay amount was being considered; (7) Denco applied the final payment and produced documentation demonstrating that the Body Bar account had a zero balance. The summary judgment evidence further established that Body Bar fully paid all of the invoices submitted by Denco in accord with the contract. Because we have determined (1) that the cost for overtime labor was included in the contract price, (2) that the contract price was paid in full, and (3) that no evidence shows that Body Bar otherwise agreed to pay additional sums for the overtime labor, we find that Body Bar established its full performance under the contract as a matter of law and that Denco failed to raise a genuine issue of material fact that Body Bar breached the contract. Because Denco failed to raise a genuine issue of material fact on its breach of contract claim, the trial court’s ruling on the no-evidence motion for summary judgment was also proper. C. Body Bar Did Not Establish Damages Resulting from Denco’s Breach The summary judgment movant has the burden of establishing its right to summary judgment by conclusively proving all elements of its cause of action as a matter of law. Rhone- Poulenc, Inc. v. Steel, 997 S.W.3d 217, 223 (Tex. 1999). As our discussion in the previous section shows, Body Bar established as a matter of law the existence of a valid contract, Body Bar’s performance of the contract, and Denco’s breach of the contract by seeking to charge additional amounts to which it was not entitled. However, although Body Bar established that Denco breached its contract, it has not shown that it was damaged by that breach, an essential element of its cause of action. 19 First, it is undisputed that Body Bar never paid Denco the additional amounts it sought. Therefore, even though Denco may have technically breached the contract by seeking amounts to which it was not entitled, Body Bar did not suffer damages as a result of this breach. See Pegasus Energy Grp., Inc. v. Cheyenne Petroleum Co., 3 S.W.3d 112, 127 (Tex. App.—Corpus Christi 1999, pet. denied). Body Bar also alleged that it was damaged as a result of Denco’s filing of the lien affidavits. As we have seen, the filing of the lien affidavits was wrongful and placed a cloud on the title of the owner of the real estate. However, this did not directly injure Body Bar. Body Bar relied on Bradley’s affidavit to establish that Body Bar incurred damages as a result of Denco’s breach in the form of Bre Thorne’s withholding of the tenant improvement allowance or reimbursement. The affidavit stated, The landlord for the Premises previously notified Body Bar that it was withholding the tenant improvement allowance due and owing to Body Bar pursuant to the lease for the Premises due to the lien on the Premises filed by Denco. The amount of the tenant improvement allowance that the landlord refused to pay Body [B]ar is $25,000.00. So, Body Bar is claiming damages related to its landlord’s withholding payment under an unrelated contract. Clearly, these damages, if any, are only indirectly related to the wrongful filing of the lien affidavit, but not to Denco’s breach of contract. It was only after Body Bar’s landlord, the owner of the real estate, withheld payment because of the lien that Body Bar suffered any damage. This damage, however, was only indirectly the result of Denco’s actions. Further, Body Bar has not pointed to any provision in the contract that this filing allegedly breached. Since Body Bar has not shown that Denco’s filing of the lien affidavits was 20 a breach of its contract, it cannot rely on this action to support any breach of contract damages. Therefore, since Body Bar has not established as a matter of law that Denco’s breach caused it any damages, it was not entitled to summary judgment on its breach of contract claims. D. Body Bar Was Not Entitled to an Award of Damages At the summary judgment hearing, Denco argued that because Body Bar’s pleadings indicated that Bre Thorne would pay the reimbursement in the event that the liens were removed, an order requiring Denco to pay the $25,000.00 “would result in a double . . . resolution or a windfall.” In response, Body Bar admitted, Your Honor, real briefly regarding the $25,000 claim, that’s not anywhere. There’s no evidence of that fact. There’s no personal knowledge of that fact. The landlord has told us we’re not going to get the [$]25,000, and at this point, a year later, we do not know whether they’re going to give it to us or not. Certainly, we do not want a double recovery. Because (1) Bradley’s affidavit stated that Bre Thorne was withholding the reimbursement due to the liens, (2) the liens were properly declared invalid, and (3) the summary judgment evidence fails to establish whether Bre Thorne will continue to refuse to pay reimbursement once the liens are lifted, we find that Body Bar did not show entitlement to the $25,000.00 awarded to it in the trial court’s summary judgment as a matter of law. Accordingly, we reverse the trial court’s award of $25,000.00 to Body Bar and remand the issue of damages to the trial court for further proceedings. E. Tortious Interference Was Not Conclusively Established The elements of tortious interference with contractual relations are “(1) the existence of a contract subject to interference, (2) the act of interference was willful and intentional, (3) such 21 intentional act was a proximate cause of plaintiff's damage and (4) actual damage or loss occurred.” Victoria Bank & Trust Co. v. Brady, 811 S.W.2d 931, 939 (Tex. 1991); see Browning-Ferris, Inc. v. Reyna, 865 S.W.2d 925, 926 (Tex. 1993). Denco argues that Body Bar failed to introduce any evidence demonstrating that Denco knew of relevant lease terms or that Denco willfully and intentionally interfered with the lease agreement. We agree. See Sw. Bell Tel. Co. v. John Carlo Tex., Inc., 843 S.W.2d 470, 472 (Tex. 1992) (question is whether defendant desired to interfere with contract or believed interference was substantially certain to result from actions). Body Bar’s lease agreement with Bre Thorne is not included in the summary judgment record. Rather, the relevant terms of the lease are set forth in Bradley’s affidavit, but Bradley makes no mention of whether these lease terms were communicated to Denco. Thus, nothing in the record established willful and intentional interference with the lease agreement. Accordingly, the trial court’s summary judgment on this ground was improper and is reversed. F. Denco Was Not Entitled to Equitable Relief As a threshold issue, Denco argues that the trial court erred in resolving its claim for quantum meruit because Body Bar’s motion for summary judgment failed to address the claim. Under the heading “Quantum Meruit/Unjust Enrichment,” Denco pled, Defendant provided materials and labor for the construction project the subject of this suit. Plaintiff received a benefit, in the form of the labor and materials provided by defendant, which improved the structures and increased the value of this property. To date defendant has not received full payment for the labor and materials provided on this project. Plaintiff received a benefit from defendant’s labor and materials and it is unjust for them to retain this benefit without providing just compensation to Defendant for their labor and materials provided. 22 Defendant is entitled to restitution for the value of the benefit Plaintiff received through Defendant’s labor and materials provided for this project.[18] A party may recover under the unjust enrichment theory when one person has obtained a benefit from another by fraud, duress, or the taking of an undue advantage. Heldenfels Bros., Inc. v. City of Corpus Christi, 832 S.W.2d 39, 41 (Tex. 1992). Denco’s pleading does not allege, and Body Bar argued that there was no evidence demonstrating, that Body Bar benefited by fraud, duress, or the taking of unfair advantage. Body Bar’s initial summary judgment motion, however, did not specifically mention quantum meruit—“an equitable theory of recovery . . . based on an implied agreement to pay for benefits received.” Id. (citing Vortt Exploration Co. v. Chevron U.S.A., Inc., 787 S.W.2d 942, 944 (Tex. 1990)). 19 It appears that despite its third counter-claim heading, Denco’s petition only asserted quantum meruit, whereas Body Bar’s initial no evidence motion addressed only unjust enrichment. However, Body Bar filed a sur- reply prior to the summary judgment hearing arguing that Denco’s “quantum meruit claims fail[ed]” as a matter of law. In any event, aside from certain exceptions not relevant here, a plaintiff who seeks to recover the reasonable value of services rendered or materials supplied will be permitted to recover in quantum meruit or unjust enrichment only when there is no express contract covering those services or materials. Fortune Prod. Co. v. Conoco, Inc., 52 S.W.3d 671, 683–84 (Tex. 18 The trial court granted Body Bar’s no-evidence motion on “Denco’s [claim] for quantum meruit/unjust enrichment.” 19 “To recover under the doctrine of quantum meruit, a plaintiff must establish that: 1) valuable services and/or materials were furnished, 2) to the party sought to be charged, 3) which were accepted by the party sought to be charged, and 4) under such circumstances as reasonably notified the recipient that the plaintiff, in performing, expected to be paid by the recipient.” Heldenfels Bros., 832 S.W.2d at 41 (citing Vortt Exploration, 832 S.W.2d at 944). 23 2000); Truly v. Austin, 744 S.W.2d 934, 936 (Tex. 1988) (citing Black Lake Pipeline v. Union Construction Co., 538 S.W.2d 80, 86 (Tex. 1976), overruled on other grounds by Sterner v. Marathon Oil Co., 767 S.W.2d 686 (Tex.1989); Woodard v. Sw. States, Inc., 384 S.W.2d 674, 675 (Tex. 1964)). “That is because parties should be bound by their express agreements. When a valid agreement already addresses the matter, recovery under an equitable theory is generally inconsistent with the express agreement.” Fortune Prod., 52 S.W.3d at 684. Thus, as is the case here, “when a party claims that it is owed more than the payments called for under a contract, there can be no recovery for unjust enrichment [or quantum meruit] ‘“if the same subject is covered by [the] express contract.”’” Id. (quoting TransAm. Natural Gas Corp. v. Finkelstein, 933 S.W.2d 591, 600 (Tex. App.—San Antonio 1996, writ denied) (quoting Lone Star Steel Co. v. Scott, 759 S.W.2d 144, 154 (Tex. App.—Texarkana 1988, writ denied))). Because we determined that Body Bar’s contract with Denco included all sums for labor required to complete the proposal and that the overtime workers labored on items expressly included in the proposal, we find that Denco’s equitable claims were barred as a matter of law. Thus, the trial court’s entry of a ruling on the no-evidence summary judgment on Denco’s quasi- contractual claims was proper. IV. Conclusion We affirm the trial court’s summary judgment (1) granting Body Bar’s declaratory judgment claim and (2) disposing of all of Denco’s claims. We reverse the portion of the trial court’s summary judgment (1) finding that Body Bar established tortious interference as a matter of law, (2) granting Body Bar’s breach of contract claim, and (3) awarding $25,000.00 to Body 24 Bar and remand these matters to the trial court for further proceedings consistent with this opinion. Bailey C. Moseley Justice Date Submitted: August 22, 2014 Date Decided: September 26, 2014 25
{ "perplexity_score": 502.2, "pile_set_name": "FreeLaw" }
The challenge for a woman to find and marry a millionaire or very rich man nowadays is greater than ever! Gone are the days when a woman’s choice of seeking and dating a millionaire or rich man was limited to such a man from her own town, city or country. Now she can seek a rich man to be her life - partner or future husband from a multitude of places across the world. Global accessibility via the internet or social media such as Facebook or Twitter or Instagram offer almost instant access to find out everything she needs or wants to know about her potential millionaire partner. Yet, for all the advantages using the internet brings, it also brings a major disadvantage - any millionaire or rich man can do the same! Through one of the specialised millionaire dating sites, our rich man can aim to meet and date his beautiful new girlfriend from almost any country in the world. So, in view of greater competition from other females around the world, it’s more important than ever that a woman looking to marry a millionaire or very rich man has a clear and effective strategy. Therefore, some key things women may consider doing include: as a starter, try to identify the type of rich man you are looking to meet; is he ideally to be a man in, say, his forties or, maybe, over 60 (possibly much older than you!)? Should he be a rich man who keeps a low profile and simply gets on with his businesses, or maybe hobbies if he has taken early retirement? Or a prominent business man with a high profile in the media? there are two main ways to go once you have profiled the type of millionaire you are looking for: either research where this type of person is likely to dine, congregate with others of a similar nature and standing, or enjoy a night out. Or, (and probably a much more efficient and active route) join a reputable millionaire dating service specifically catering for those looking to date and marry rich men. an important key point is to have someone suitably qualified assess you, both in terms of how you present and how you act/behave; or, if no-one is available, objectively assess yourself. It goes without saying that most millionaires will be looking for an attractive, sophisticated woman to be their partner and it’s vital to some preparation and homework if you really want to impress and marry such a man. a couple of the key issues to focus on are: body language: how you behave in public, how confident you appear (especially important when you consider that many millionaires may be extra confident given that they regularly appear in the public eye). It’s essential that the rich man you hope to marry will see in you a woman he can be proud of and share his experience and worldliness with. overall presentation: this can be considered as one’s physical appearance (for example, clothes, hair make-up, accessories, poise); at all times they will need to be first-class. Of course, dating rich men and finally getting to marry such a millionaire will not all be that straightforward, but once you have determined the best strategy for you, go for it! And don’t let anyone side-track you from your goal of having millionaire husband!
{ "perplexity_score": 412, "pile_set_name": "OpenWebText2" }
Browsing Theses and Dissertations by Subject "Ports of entry--Security measures" Seguin, Robert James(Faculty of Graduate Studies and Research, University of Regina, 2012-06) Excessive delays at border crossings threaten the mobility of people and trading of goods. The management of transportation infrastructure generally requires continuous and real-time monitoring, formulation, and dissemination ...
{ "perplexity_score": 319.8, "pile_set_name": "Pile-CC" }
Idle (disambiguation) Idle generally refers to idleness, a lack of motion or energy. Idle or variation, may also refer to: Places Idle (GNR) railway station, in Idle, West Yorkshire Idle (L&BR) railway station, in Idle, West Yorkshire Idle, West Yorkshire, UK; a suburb of Bradford, England Idle railway station Idle and Thackley, a ward in Bradford Metropolitan District in the county of West Yorkshire, England, UK Idle railway station (Leeds and Bradford Railway) River Idle, a river flowing through Nottinghamshire, England People Mrs. Idle (born 1940), a stagename for Australian actress Lyn Ashley Christopher Idle (politician) (1771–1819), British politician Christopher Idle (hymnwriter) (born 1938), British hymnodist Eric Idle (born 1943), a comedian, sketch writer, and actor, member of Monty Python Graham Idle (born 1950), British rugby footballer Entertainment Music Idle, a 2000 demo album by the band Daylight Dies Video games Idle game, another name for an incremental game Technology Idle (engine), engine running without load Idle speed Idle (CPU), CPU non-utilisation or low-priority mode Synchronous Idle (SYN), the idle command to synchronize terminals System Idle Process Idle (programming language), a dialect of Lua IDLE, an integrated development environment for the Python programming language IMAP IDLE, an IMAP feature where an email server actively notifies a client application when new mail has arrived Other uses Indolent lesions of epithelial origin (IDLE), a classification of cancers See also Adle Christopher Idle (disambiguation) Ideal (disambiguation) Idel (disambiguation) Idle Hour (disambiguation) Idler (disambiguation) Idles (disambiguation) Idol (disambiguation) Idyl (disambiguation)
{ "perplexity_score": 256.5, "pile_set_name": "Wikipedia (en)" }
{-# LANGUAGE DeriveDataTypeable #-} {-# LANGUAGE OverloadedStrings #-} {-# OPTIONS_GHC -fno-warn-missing-fields #-} {-# OPTIONS_GHC -fno-warn-missing-signatures #-} {-# OPTIONS_GHC -fno-warn-name-shadowing #-} {-# OPTIONS_GHC -fno-warn-unused-imports #-} {-# OPTIONS_GHC -fno-warn-unused-matches #-} ----------------------------------------------------------------- -- Autogenerated by Thrift -- -- -- DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING -- @generated ----------------------------------------------------------------- module My.Namespacing.Extend.Test.ExtendTestService_Client(check) where import qualified My.Namespacing.Test.HsTestService_Client import Data.IORef import Prelude ( Bool(..), Enum, Float, IO, Double, String, Maybe(..), Eq, Show, Ord, concat, error, fromIntegral, fromEnum, length, map, maybe, not, null, otherwise, return, show, toEnum, enumFromTo, Bounded, minBound, maxBound, seq, succ, pred, enumFrom, enumFromThen, enumFromThenTo, (.), (&&), (||), (==), (++), ($), (-), (>>=), (>>)) import qualified Control.Applicative as Applicative (ZipList(..)) import Control.Applicative ( (<*>) ) import qualified Control.DeepSeq as DeepSeq import qualified Control.Exception as Exception import qualified Control.Monad as Monad ( liftM, ap, when ) import qualified Data.ByteString.Lazy as BS import Data.Functor ( (<$>) ) import qualified Data.Hashable as Hashable import qualified Data.Int as Int import Data.List import qualified Data.Maybe as Maybe (catMaybes) import qualified Data.Text.Lazy.Encoding as Encoding ( decodeUtf8, encodeUtf8 ) import qualified Data.Text.Lazy as LT import qualified Data.Typeable as Typeable ( Typeable ) import qualified Data.HashMap.Strict as Map import qualified Data.HashSet as Set import qualified Data.Vector as Vector import qualified Test.QuickCheck.Arbitrary as Arbitrary ( Arbitrary(..) ) import qualified Test.QuickCheck as QuickCheck ( elements ) import qualified Thrift import qualified Thrift.Types as Types import qualified Thrift.Serializable as Serializable import qualified Thrift.Arbitraries as Arbitraries import qualified My.Namespacing.Test.Hsmodule_Types as Hsmodule_Types import qualified My.Namespacing.Extend.Test.Extend_Types import qualified My.Namespacing.Extend.Test.ExtendTestService seqid = newIORef 0 check (ip,op) arg_struct1 = do send_check op arg_struct1 recv_check ip send_check op arg_struct1 = do seq <- seqid seqn <- readIORef seq Thrift.writeMessage op ("check", Types.M_CALL, seqn) $ ExtendTestService.write_Check_args op (ExtendTestService.Check_args{ExtendTestService.check_args_struct1=arg_struct1}) Thrift.tFlush (Thrift.getTransport op) recv_check ip = Thrift.readMessage ip $ \(fname,mtype,rseqid) -> do Monad.when (mtype == Types.M_EXCEPTION) $ Thrift.readAppExn ip >>= Exception.throw res <- ExtendTestService.read_Check_result ip return $ ExtendTestService.check_result_success res
{ "perplexity_score": 1246.3, "pile_set_name": "Github" }
With a population of 1.2bn people, many believe that India is the arena where the future direction of humanity is being played out. Mired in poverty and still bound by tradition, it is on an insatiable quest for modernity. Containing some 17 per cent of the global population, the route to development chosen by India may well impact the people living here and elsewhere throughout the planet. However, given current events, the future of humanity may not be determined in India, but by events in a much smaller country – Syria. When the Soviet Union fell apart, there was much talk from the US of a multi-polar world, where Washington would be just one influential player among many – a world where an autonomous India would play a vital role. It was nice sounding talk. But that’s all it was – talk. In the wake of the collapse of the USSR, the US has been hell-bent on achieving global superiority. The US’s orbit of influence has extended throughout Eastern Europe and into many of the former Soviet states in central Asia. While Bush senior was mouthing media-friendly words about multi-polarity, Dick Cheney was at the same time stating that the US sought world domination. Look no further to see the US track record by casting your mind back to events in the former Yugoslavia, Libya and Iraq. Look no further to see its role currently in Yemen, Afghanistan, Syria and Pakistan. To date, the US has been responsible for millions of deaths and maimings in its quest for superiority, but its project now appears to be reaching a critical point. Unfortunately for the Obama regime, it’s no longer the early 1990s when the US believed it reined supreme and Russia was in disarray and China still relatively weak. China has emerged as a genuine global player and Russia has a new-found confidence under Putin. If China and Russia thought Libya was worth sacrificing, they regard the more significant Syria as a different matter entirely. A former Soviet ally that still has strong links with Russia, Syria plays host to Russia’s only naval base outside of the former USSR. That in itself is something the Russians think is worth defending, given their build up of naval forces in the eastern Mediterranean and their military hardware supplies to Syria. Both Russia and China know that if the US, its allies and its proxy Free Syrian Army topple the Assad government, all roads then lead to Tehran. But the US will not stop with Iran. Moscow and Beijing are also firmly in Washington’s plans for destabilisation too via exploiting political and ethnic divisions, especially in the border regions of Russia and China. It’s a high-stakes game because some within the Pentagon think it’s better to draw China into a military conflict now, when it can still be defeated, rather than later. Of course, Washington knows that if military confrontation can be avoided, even better. And, to this end, much US foreign policy is now directed towards undermining China’s growth and outmaneuvering it across the globe. While China lost ground in Libya, it is loathe to do so in the much more strategically important countries of Syria, Iran and Pakistan. As far as India is concerned, the US regards it as a key pawn in its geo-political aims by containing China and not as some equal, autonomous partner in a mythological multi-polar world, despite what many in the Indian media may like to think. With this in mind, it is always revealing to see how the Indian media reacts when a high-ranking US politician visits its shores. Much of it turns sycophant. It happened when Obama visited in 2010, and it occurred again earlier this year as Hillary Clinton touched down in Kolkata for a three day visit to India. Media people hung on Clinton’s every utterance, looking for the odd phrase that, in their eyes, confirmed India as the great global power. According to many of the news anchors and columnists, Clinton’s decision to honour India with her presence implied that ‘we’ really matter – India as the US’s bilateral partner, engaged in forging an important strategic relationship for the century ahead. It’s a strange love affair, however; not a match made in heaven, but in a fool’s paradise. The US is pressurising India to reduce its imports of Iranian oil and to open up it economy further to its powerful corporate players, not least foreign direct investment in the retail sector. Economic growth in India is hitting the buffers, sovereignty is being ceded as foreign interests gain control, the poverty alleviation rate is as low as it was 20 years ago and the US-led ‘globalisation’ project has led to maximal gains for a minority but minimal gains for the great mass of ordinary folk, while causing great turmoil as state-corporate players gain free rein to loot the country for their own gains. The response by many well-off, middle class people to this is usually, “But look at the improvements in India,” a … they then proceed to state how economic neo-liberalism has led to an improvement in their own personal situation. By failing to account for the broader picture, such a response reminds me of a Noam Chomsky quote that goes something along the lines that even under slavery, the conditions of many slaves improved. Last month, on 15 August (India’s Independence Day), people wrapped themselves in the national flag and chanted “Mera pyara Bharat” (I love my India). Unfortunately, ‘independence’ for India is almost becoming a euphemism for living in the pocket of the US. But maybe India shouldn’t feel too alone. The old colonial master, Britain, among many others, is to be found there too. Originally from the northwest of England, Colin Todhunter has spent many years in India. He has written extensively for the Bangalore-based Deccan Herald, New Indian Express and Morning Star (Britain). His articles have also appeared in many other publications. His East by Northwest site is at: http://colintodhunter.blogspot.com*
{ "perplexity_score": 293.7, "pile_set_name": "OpenWebText2" }
A taxonomic revision of the seed-harvester ant genus Pogonomyrmex (Hymenoptera: Formicidae) on Hispaniola. We revise species of seed-harvester ants in the genus Pogonomyrmex (subfamily Myrmicinae) that occur on the Caribbean island of Hispaniola. Three species are recognized: P. aterrimus Wheeler (new status), P. saucius Wheeler and Mann, and P. schmitti Forel. Pogonomyrmex schmitti sublaevigatus Wheeler (= schmitti) and P. schmitti darlingtoni Wheeler (= aterrimus) are synonomized. We also describe the queen of P. aterrimus and P. saucius, and provide information on biology, distribution maps, and a key to workers and queens.
{ "perplexity_score": 234, "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention This invention relates to a minutely working method of and apparatus for forming a minute working pattern on a surface, and precisely manufacturing a lens sheet optical element such as a lenticular lens or a Fresnel lens, an orifice plate for an ink jet head, etc. 2. Related Background Art A transmission type screen used in a projection television set generally comprises a Fresnel lens sheet functioning to condense incident light and disposed on a light source side, and a lenticular lens sheet disposed on an observer side to diffuse the incident light in a horizontal direction. Also, a contrivance for heightening contrast as by forming a black light absorbing port is provided between lenticular lenses in the lenticular lens sheet. In recent years, however, the higher minuteness of the quality of clear vision, high vision, etc. has been advanced, and high resolution has also been required in the transmission type screen as described above. Accordingly, higher minuteness is also required of the aforementioned lens sheet, and with the higher minuteness of this lens sheet, the distance between lenses is shortened, and a thin lens sheet element is desired in order to shorten the optical path thereof. However, with the higher minuteness, the delicate minute working shape of the lens sheet such as the uniformity of the thickness thereof greatly affects the quality of image. Also, for an orifice plate for an ink jet head, liquid crystal polymer, polysulfone or the like excellent in oil resistance and heat resistance is generally used as an ink applying port with oil resistance and also heat resistance in a thermal ink jet printer taken into account. Further, a contrivance such as controlling the surface energy of resin film is provided to improve the detachability of ink liquid. In recent years, however, the resolution of the ink jet printer has been more and more improved and in the above-mentioned orifice plate or an orifice formed on the plate, it has become required to form a very minute shape highly accurately. As methods of manufacturing an optical element such as a lens sheet, a semiconductor element or an orifice plate there are known, for example, the following methods. (1) An extrusion heat melting molding method of subjecting a T die to minute working, and forming a continuous minute pattern in a taking-over direction, as described in Japanese Patent Application Laid-open No. 5-127258 and Japanese Patent Application Laid-open No. 9-043732, and a method of forming and transferring a continuous minute pattern on a take-up roll itself at that time. (2) A casting method called the cast method of applying a predetermined amount of resin soluble in an organic solvent or the like in a molten state or the precursor or ungulvanized material thereof itself in a dissolved state to the inner surface or the outer surface of a mold, subjecting it to a desolvent process, and further heat-treating it as required, and thereafter peeling it. (3) A photopolymer method using active energy ray curing type resin comprising ultraviolet ray curing type resin, as described in Japanese Patent Application Laid-open No. 8-328264. (4) A heating press method of again pressing and heating a primary worked article such as a sheet or film of transparent resin to thereby form a minute pattern. (5) A method of protecting only a necessary portion such as a resin plate, and removing an unnecessary portion by a solvent such as an acid or alkali or physical energy such as a laser beam, as described in Japanese Patent Application Laid-open No. 10-076668. However, to make an optical element of higher minuteness, thin wall and uniform film thickness or an orifice plate of a convex type rectangular parallelepiped required by the use of the above-described minutely working method, the following various problems are encountered. In the extrusion heat melting molding method of item (1) above, a continuous pattern of the same shape can be formed in the taking-over direction of the film or sheet, but a pattern in the non-taking-over direction cannot be formed. Also, it is difficult take up the extruded film or sheet by a roll machine or the like and therefore, to produce film or a sheet continuously, a very long take-over line is required and as the result, the cost is increased. Further, the uneven shape is crushed when the film or sheet passes the pressing roll. Also, in the casting method and the photopolymer method of items (2) and (3) above, liquid resin is used and therefore, to obtain a sheet or film of a uniform film thickness, there are difficult problems such as the control of the density of the solution, the adjustment of drying atmosphere, the control of the entrainment of air bubbles, the solvent processing cost in the drying step and the fine adjustment of the application intensity of the active energy such as ultraviolet rays, and as the result, the degree of freedom lacks remarkably. Further, the heating press method of item (4) above is a technique of reworking a primary molded article and is generally often used, but the heating press machine is very bulky and expensive and therefore, as the result, what is manufactured by the heating press method becomes expensive. Also, when in the heating press method, a sheet of a large area of 50 inches or greater is to be pressed, it is very difficult to uniformly maintain the temperature distribution of the entire surface, and the sheet becomes warped or the lens shape formed by a partial difference in the degree of crystallization may partly differ. Also, in the method of item (5) removing only the unnecessary portion, when for example, a convex minute pattern is to be formed, most of it is an unnecessary portion and is the object to be removed, and this is irrational in both of production and cost.
{ "perplexity_score": 525.6, "pile_set_name": "USPTO Backgrounds" }
Ono warns on profit after government halves price of cancer drug Opdivo Reuters Staff 2 Min Read TOKYO (Reuters) - Ono Pharmaceutical Co cut its annual profit outlook by a quarter on Wednesday, hit by the Japanese government’s decision to halve the price of cancer drug Opdivo that it co-developed with Bristol Myers Squibb Co. Last month, the government halved the price of Opdivo, which has been approved in Japan to treat advanced melanoma, non-small cell lung cancer and kidney cancer, on fears that a rapid uptake of the medicine would prove an intolerable burden on the national health insurance system. The cut, which will be effective from February, brought the price more into line with pricing in the United States and the Japanese government was widely seen as having initially priced it too high. Ono now expects a net profit of 41.8 billion yen ($355 million) for the year ending in March, down from its forecast of 55.8 billion yen forecast in May. A spokesman for Ono said that Bristol Myers Squibb is entitled to 4 percent of Opdivo’s revenue in Japan with the rest going to Ono. The situation is reversed in the United States with Ono receiving just 4 percent of Opdivo’s revenue there. Japan this week said it will step up the pace and expand the scope of drug price reviews, one of the most aggressive measures it is taking to rein in ballooning healthcare costs for a rapidly ageing nation.
{ "perplexity_score": 316.5, "pile_set_name": "Pile-CC" }
Q: Finding violations of the symmetry constraint Suppose I have a table Friends with columns Friend1ID, Friend2ID. I chose to represent each friendship with two records, say (John, Jeff) and (Jeff, John). Thus, each pair of friends should show up exactly twice in the table. Sometimes, this constraint is violated, i.e., a pair of friends shows up only once in the table. How do I write a query that will identify all such cases (ideally, using reasonably standard SQL)? In other words, I would like the query to return the list of rows in this table, for which there is no corresponding row with the swapped fields. An additional question: is there any way to enforce this referential integrity in MySQL? A: To find the rows, use a left outer join: select a.Friend1ID, a.Friend2ID, b.Friend1ID, b.Friend2ID from Friends a left join Friends b on (a.Friend1ID=b.Friend2ID and a.Friend2ID=b.Friend1ID) where b.friend1ID IS NULL ; A: The simplest approach is to store each relationship exactly once, and enforce that with a check constraint Friend1 CREATE VIEW AllFriendships AS SELECT Friend1, Friend2 FROM Friendships UNION ALL SELECT Friend1 AS Friend2, Friend2 AS Friend1 FROM Friendships If, however, you really need the table with both Friend1,Friend2 and Friend2,Friend1, you could create a self-referencing foreign key if MySql's implementation of constraints was more complete: FOREIGN KEY(Friend1,Friend2) REFERENCES Friendships(Friend2,Friend1) Once you have created this constraint, you will only be able to insert both rows in one statement. Unfortunately, this is does not work on MySql.
{ "perplexity_score": 1674, "pile_set_name": "StackExchange" }
Michelle Trachtenberg with the Vince Camuto Tara Tote Michelle Trachtenberg was spotted arriving at LAX airport sporting the Vince Camuto Tara Tote. Totes are always a good choice when travelling, as they are super spacious and very useful, making them the ideal hand luggage. What better choice than this Vince Camuto Tara version, in a fine beige and black combination of colors, with a luxe snakeskin front panel. The double zip feature on the front adds extra texture and detail. What’s more, this very tote is currently being sold at a slightly reduced price on the Vince Camuto website, in the equally glorious ‘midnight buffalo grain’ color. Why compromise on style when travelling because our favorite celebrities don’t and with this great offer you have the perfect excuse not to.
{ "perplexity_score": 741.8, "pile_set_name": "Pile-CC" }
EXTINCTION REBELLION SHEFFIELD WHO WE ARE We are a group of people in Sheffield taking part in the international Extinction Rebellion movement. This is a group aimed at promoting non-violent direct action & civil disobedience for action on the climate & ecological crisis. We have weekly meetings at Union St on Mondays. Food served for a recommended donation of £3 from 6pm. Meetings then begin at 6.45pm and continue until around 8pm. OUR 3 DEMANDS 1. That the Government must tell the truth about how deadly our situation is, it must reverse all policies not in alignment with that position and must work alongside the media to communicate the urgency for change including what individuals, communities and businesses need to do. ​​​ 2. The Government must enact legally-binding policies to reduce carbon emissions in the UK to net zero by 2025 and take further action to remove the excess of atmospheric greenhouse gases. It must cooperate internationally so that the global economy runs on no more than half a planet’s worth of resources per year. ​​​ 3. By necessity these demands require initiatives and mobilisation of similar size and scope to those enacted in times of war. We do not however, trust our Government to make the bold, swift and long-term changes necessary to achieve this and we do not intend to hand further power to our politicians. Instead we demand a Citizens’ Assembly to oversee the changes, as we rise from the wreckage, creating a democracy fit for purpose. WHY ARE WE 'REBELS'? Rebelling means that the members of this group are willing to make personal sacrifices and some are willing to be arrested for our cause. Therefore, we are going to fight peacefully with honour and resilience, against the elites and politicians, towards our vision of an inclusive world with thriving connections within our society and environment. We are very inclusive and we welcome people from all backgrounds to join our group. Our members have different beliefs and there is a place for everyone. You do not have to get actively involved in protesting or be at risk of being arrested if you don't want to. We hope to see you at one of our future meetings or actions soon! ​ ~Extinction Rebellion Sheffield HOW WE WORK To ensure we work according to Extincion Rebellion's Principles, the following ways of working have been agreed by the group:
{ "perplexity_score": 438.8, "pile_set_name": "Pile-CC" }
Q: My first app. Error: Invalid start tag LinearLayout. Why? It was working perfectly but then I made some minor edits and now it isn't working... Here's the main layout xml file... It gives an error in line 3. <?xml version="1.0" encoding="utf-8"?> <LinearLayout xmlns:android="http://schemas.android.com/apk/res/android" android:orientation="horizontal" android:layout_width="fill_parent" android:layout_height="fill_parent"> <LinearLayout android:layout_width="0dip" android:layout_height="fill_parent" android:orientation="vertical" android:layout_weight="6"> <TextView android:layout_width="fill_parent" android:layout_height="0dip" android:layout_weight="2" android:background="#FFFF00" android:text="@string/yellow" android:textColor="#FFFFFF" android:gravity="center_horizontal" /> <TextView android:layout_width="fill_parent" android:layout_height="0dip" android:layout_weight="1" android:background="#FFFFFF" android:text="@string/helo" android:textColor="#000000" android:gravity="center_horizontal" /> <TextView android:layout_width="fill_parent" android:layout_height="0dip" android:layout_weight="1" android:background="#FFFF00" android:text="@string/yellow" android:textColor="#FFFFFF" android:gravity="center_horizontal" /> </LinearLayout> <LinearLayout android:layout_width="0dip" android:layout_height="fill_parent" android:orientation="vertical" android:layout_weight="4"> <TextView android:layout_width="fill_parent" android:layout_height="0dip" android:text="@string/blue" android:layout_weight="3" android:textColor="#FFFFFF" android:background="#0000FF" /> <TextView android:background="#FFFFFF" android:text="@string/helo" android:layout_width="fill_parent" android:layout_height="0dip" android:textColor="#000000" android:layout_weight="1" /> <TextView android:layout_width="fill_parent" android:layout_height="0dp" android:layout_weight="1" android:textColor="#FFFFFF" android:text="@string/yellow" android:background="#FFFF00" /> <TextView android:layout_width="fill_parent" android:layout_height="0dp" android:layout_weight="1" android:text="@string/blue" android:background="#0000FF" android:textColor="#FFFFFF" /> </LinearLayout> </LinearLayout> A: I think that you have your file in the wrong directory. The layout file should be in a res/layout/ directory within your project. My guess is that you have it in some other res/ directory.
{ "perplexity_score": 2434, "pile_set_name": "StackExchange" }
The review you are about to read comes to you courtesy of H-Net -- its reviewers, review editors, and publishing staff. If you appreciate this service, please consider donating to H-Net so we can continue to provide this service free of charge.Prefer another language? Translate this review intoPlease note that this is an automated translation, and the quality will vary. Laura L. Lovett. Conceiving the Future: Pronatalism, Reproduction, and the Family in the United States, 1890-1938. Chapel Hill: University of North Carolina Press, 2007. xi + 236 pp. $59.95 (cloth), ISBN 978-0-8078-3107-6; $19.95 (paper), ISBN 978-0-8078-5803-5. Reviewed by Holly Allen (American Studies Program, Middlebury College) Published on H-Amstdy (November, 2007) Modernism, Pronatalism, and Nostalgia for the White Farm Family In Conceiving the Future: Pronatalism, Reproduction, and the Family in the United States, 1890-1938, Laura L. Lovett provides a refreshing perspective on American reproductive politics in the Populist and Progressive eras. While historians of American eugenics tend to focus on "negative" eugenic campaigns like forced sterilization and immigration restriction, Lovett examines the "positive" eugenic implications of various campaigns that celebrated the reproductive vitality and democratic promise of the rural white family. Indeed, Lovett persuasively links American pronatalism with racialized forms of American agrarianism from the late nineteenth century through the 1930s. Lovett argues that, while France and Germany overtly sponsored pronatalism through state programs and subsidies, American pronatalism was indirectly expressed in movements as diverse as Populism, campaigns for irrigation and land reclamation, conservationism, and "fitter family" contests. Lovett's project is broad in scope, encompassing the careers of five historical figures, each of whom, Lovett argues, contributed significantly to American pronatalism. These figures include Populist Mary Elizabeth Lease, George Maxwell of the National Irrigation Association, economist and sociologist Edward A. Ross, President Theodore Roosevelt, and Florence Sherbon, organizer of "fitter family" contests. Through her analysis of these figures and their work, Lovett asserts that American pronatalism thrived in the interstices between agrarian ideology, modernist reform politics, and the nostalgic embrace of the rural, white home. Throughout the project, Lovett analyzes the complex interplay of nostalgia for a rural past and faith in modern science and government that animated the careers of each of the five figures whom she studies. Lovett's concept of "nostalgic modernism," which she uses to describe how each of her figures invoked traditional rural ideals in support of scientific and governmental expertise, captures a crucial dialectic of reform and regulation in the Populist and Progressive eras. The first figure whom Lovett addresses is Mary Elizabeth Lease. In her chapter devoted to Lease, Lovett argues that Lease and other Populist women sought political and economic power through their central place in the rural producer-family. According to Lovett, Lease's maternalism justified her role as a female political leader, but it also reinforced a notion of motherhood that was both essentializing and implicitly racist. Lovett argues that Lease's maternalism idealized the rural producer family while lamenting the growth of America industrialism with it teeming immigrant populations. Lovett considers not only Lease's support for Populism but also her involvement with the Kansas State Board of Charities and a subsequent tropical colonization scheme. Taken together, Lovett argues, these aspects of Lease's career exemplify the interplay between agrarian ideology, scientific racism, and modern state regulation that characterized pronatalism in this period. Lovett's next chapter examines George Maxwell, his ties to the National Irrigation Association, and his idealization of the rural, male-headed home. That Lovett is able to identify pronatalism in the rhetoric and practices of the National Irrigation Association is a testament to the uniqueness and complexity of her analysis. Lovett writes that "land reclamation … was as much an effort at social engineering as it was hydrological engineering" (p. 13). She demonstrates that Maxwell used the ideal of the male-headed home situated in healthful, rural surroundings to promote irrigation and land reclamation, as well as to establish "homecroft" communities in the Midwest and elsewhere. Lovett contends that the success of national reclamation and irrigation legislation in 1902, which expanded federal authority over land use, owed much to the National Irrigation Association's rhetorical commitment to the rural, male-headed home. Following her chapter on Maxwell, Lovett considers economist and sociologist Edward A. Ross's concept of race suicide. Lovett notes that while Ross criticized feminists for reproducing too little and immigrants for reproducing too much, he also "idealized a natural order that nostalgically reconstructed the American rural family" (p. 79). Shaped by generations of frontier experience, Ross's rural family ideal represented the best of the "American race" at a time when farm life was giving way to "the deteriorating influence of city and factory" (p. 89). Lovett shows how Theodore Roosevelt extended the influence of Ross's ideas by taking up the theme of race suicide and actively promoting large rural families as an antidote to the growth of new immigrant populations in the nation's cities. Lovett's discussion of the new photographic conventions for representing the white family, which placed children in a stair-step formation that emphasized the close spacing of siblings, is particularly engaging. Next, Lovett examines Theodore Roosevelt's campaign to conserve both the nation's natural resources and its ideals of the rural family and country life. She focuses on two commissions launched in 1908: the National Conservation Commission and the Country Life Commission. While much has been made of Roosevelt's commitment to conservation, Lovett places that commitment in a broader, eugenic context, demonstrating that conservation commissioners like Gifford Pinchot and Sir William Plunkett were also involved in the preservation of country life and its most vital institution, the farm family. By demonstrating how women's groups like the General Federation of Women's Clubs and the Daughters of the American Revolution (DAR) promoted the welfare of farm wives, Lovett once again implicates maternalism in the scientific racism of the eugenics movement. A final section of the chapter addresses eugenic family studies of small New England towns, further reflecting how a nostalgic preoccupation with rural folkways was combined with a concern for rural families' scientific betterment. Lovett's final chapter, which focuses on Dr. Florence Sherbon and the "fitter family" contests of the 1920s, explicitly ties the idealization of rural life to the eugenics movement. According to Lovett, Sherbon organized better baby contests in Iowa and briefly worked for the Children's Bureau in the 1910s before organizing fitter family contests in Kansas and becoming a child welfare specialist at the University of Kansas in the 1920s. While other scholars have disregarded the fitter family competitions of the 1920s, Lovett argues that they carried broad cultural significance and helped to propagate a positive concept of eugenics that, like Lovett's other examples, drew on nostalgia for the rural white family while promoting expert intervention into Americans' reproductive practices. Lovett notes that while the families who participated in fitter family contests in Kansas were few in number, they enjoyed broad cultural visibility as exemplars of white, rural fecundity at time when many Americans remained apprehensive about the cosmopolitan cast of modern urban life. Sherbon's career further illustrates the intersections between maternalism, agrarianism, and scientific racism that Lovett identifies with Mary Elizabeth Lease, DAR President Mrs. Matthew T. Scott, and other female reformers. Lovett's research is impressive. Her intellectual portraits of Lease, Maxwell, Ross, Roosevelt, and Sherbon--each of which addresses the specific figure's simultaneous investment in reproductive politics and agrarianism--are detailed and engaging. In addition to analyzing a specific historical figure, each chapter also addresses a series of minor figures and related cultural developments. The scope of Lovett's study is therefore quite broad--so broad, at times, that her focus on pronatalism is diffused. Some of Lovett's figures seem more relevant to the history of pronatalism than others. Lovett's chapter on Mary Elizabeth Lease focuses primarily on Lease's maternalism, not on pronatalism per se. Certainly, Lease based her leadership claims on her ability to speak for mothers, children, and the ideal of the rural producer-family. Lovett also discusses how Lease's maternalism propelled her onto the Kansas State Board of Charities and informed her advocacy a tropical conlonization scheme. While Lovett's research into Lease's career is impressive, she could do more to establish and foreground Lease's contributions to pronatalist thought. Likewise, Lovett could do more to establish how George Maxwell's activism on behalf of irrigation and land reclamation constituted a significant contribution to American pronatalism. Lovett presents an engaging analysis of Maxwell's homecroft ideal, with its focus on the rural, male-headed home. Yet, Lovett stops short of calling Maxwell a pronatalist. Instead, she asserts that he "was sympathetic to American pronatalist concerns, and his family ideal acknowledged women's reproductive role" (p. 74). Neither Lease's maternalism nor Maxwell's homecroft movement was explicitly concerned with propagation of the white race in the way that Ross's social theory, Roosevelt's conservationism, and Sherbon's fitter family contests were. Indeed, Lovett could do more to explain how Lease's and Maxwell's relevance to American pronatalism is greater than that of other late-nineteenth-century reformers who touted traditional concepts of motherhood, family, and the home. Lovett's case for the "positive" eugenic influence of Ross, Roosevelt, and Sherbon is much stronger than it is for Lease and Maxwell. In these cases, Lovett persuasively illustrates how American pronatalism incorporated nostalgia for the rural, white family into its campaign on behalf of scientific racism and reproductive regulation. While Lease and Maxwell are less convincing as pronatalists, all of Lovett's chapters are rich and thought-provoking. Throughout Conceiving the Future, Lovett offers incisive intellectual portraits and a challenging analysis of how gender and race informed the dynamic of residual agrarianism and emergent scientific and governmental regulation in the Populist and Progressive eras. If there is additional discussion of this review, you may access it through the network, at: https://networks.h-net.org/h-amstdy. Citation: Holly Allen. Review of Lovett, Laura L., Conceiving the Future: Pronatalism, Reproduction, and the Family in the United States, 1890-1938. H-Amstdy, H-Net Reviews. November, 2007. URL: http://www.h-net.org/reviews/showrev.php?id=13803 Copyright © 2007 by H-Net, all rights reserved. H-Net permits the redistribution and reprinting of this work for nonprofit, educational purposes, with full and accurate attribution to the author, web location, date of publication, originating list, and H-Net: Humanities & Social Sciences Online. For any other proposed use, contact the Reviews editorial staff at [email protected].
{ "perplexity_score": 323.3, "pile_set_name": "OpenWebText2" }
Elections in Trinidad and Tobago Elections in Trinidad and Tobago gives information on election and election results in Trinidad and Tobago. Trinidad and Tobago elects on national level a House of Representatives (the Lower House of its legislature). The head of government the Prime Minister, is chosen from among the elected representatives on the basis of his/ her command of the support of the majority of legislators. The Parliament of the Republic of Trinidad and Tobago has two chambers. The House of Representatives has 41 members, elected for a maximum five-year term in single-seat constituencies. The Senate has 31 members: 16 Government Senators appointed on the advice of the Prime Minister, 6 Opposition Senators appointed on the advice of the Leader of the Opposition and 9 so-called Independent Senators appointed by the President to represent other sectors of civil society. The president is elected for a five-year term by an electoral college consisting of the members of both houses of Parliament. Other elected bodies include the Local Government bodies in Trinidad (2 cities, 3 boroughs, 9 Regional Corporations) and the Tobago House of Assembly which handles local government in the island of Tobago and is entrenched in the Constitution. Until 1925 Trinidad and Tobago was a British Colony ruled through a pure, unelected Crown Colony system, although elected Borough and Municipal Councils existed in Port of Spain and San Fernando. The first elections to the Legislative Council took place in 1925. Seven of the thirteen unofficial members were elected, six unofficials were nominated by the Governor, and twelve official members sat in the Legislative Council on an ex-officio basis. The Governor had the right to an ordinary vote and an additional casting vote, to break any tie. The franchise was determined by income, property and residence qualifications, and was limited to men over the age of 21 and women over the age of 30. The 1946 elections were the first with universal adult suffrage, during which time there existed an even number of elected and unelected members (excluding the Governor). Latest elections 2015 Trinidad and Tobago general election 2013 Tobago House of Assembly election 2010 Trinidad and Tobago local election General elections 2015 general elections 2010 general elections 2007 general elections 2002 general elections Summary of the 2002 election results 1956 federal elections 1950 general elections (A.P.T. James contested and won the Tobago seat on both a Butler Party and CSP ticket; James' votes are only counted in the Butler Party total). Local elections Trinidad 2003 local government elections |Summary of the 2003 Local Government election results !style="background-color:#E9E9E9" align=right|Votes !style="background-color:#E9E9E9" align=right|% !style="background-color:#E9E9E9" align=right|Seats |- |People's National Movement |align="right" |  ?? |align="right" |?? |align="right" |83 |- |United National Congress |align="right" | ?? |align="right" | |align="right" |43 |- |National Alliance for Reconstruction |align="right" |  |align="right" |?? |align="right" |00 |- |Independents |align="right" |  |align="right" |?? |align="right" |00 |- |style="background-color:#E9E9E9"|Total |width="75" align="right" style="background-color:#E9E9E9"|378,637 |width="30" align="right" style="background-color:#E9E9E9"|100 |width="30" align="right" style="background-color:#E9E9E9"|126 |} 1999 local government elections 1996 local government elections 1992 local government elections 1987 local government elections 1983 local government elections 1980 local government elections 1977 local government elections 1971 local government elections Election boycott 1968 local government elections 1959 county council elections Tobago See also Electoral calendar Electoral system List of Parliaments of Trinidad and Tobago References Matthias Catón: "Trinidad and Tobago" in: Elections in the Americas. A Data Handbook, vol. 1, ed. by Dieter Nohlen. Oxford University Press, Oxford, 2005: pp. 627–646 Kirk Meighoo: Politics in a Half Made Society: Trinidad and Tobago, 1925-2002, 2003 External links Adam Carr's Election Archive Elections & Boundaries Commission
{ "perplexity_score": 520, "pile_set_name": "Wikipedia (en)" }
Anxiety disorders are among the most common psychiatric conditions affecting children and adolescents. While antidepressants are frequently used to treat youth with anxiety disorders, sometimes, antidepressants may be poorly tolerated in children who are at high risk of developing bipolar disorder. Researchers at the University of Cincinnati (UC) are studying how cognitive therapy that uses mindfulness techniques, such as meditation, quiet reflection and facilitator-led discussion, may serve as an adjunct to pharmacological treatments. The study published in the Journal of Child and Adolescent Psychopharmacology, looked at brain imaging in youth before and after mindfulness based therapy and saw changes in brain regions that control emotional processing. It is part of a larger study by co-principal investigators Melissa DelBello, MD, Dr. Stanley and Mickey Kaplan Professor and Chair of the UC Department of Psychiatry and Behavioral Neuroscience, and Sian Cotton, PhD, associate professor of family and community medicine, director of the UC’s Center for Integrative Health and Wellness, looking at the effectiveness of mindfulness-based therapy. In a small group of youth identified with anxiety disorders (generalized, social and/or separation anxiety) and who have a parent with bipolar disorder, researchers evaluated the neurophysiology of mindfulness-based cognitive therapy in children who are considered at-risk for developing bipolar disorder. “Our preliminary observation that the mindfulness therapy increases activity in the part of the brain known as the cingulate, which processes cognitive and emotional information, is noteworthy,” says Jeffrey Strawn, MD, associate professor in the Department of Psychiatry and Behavioral Neuroscience, director of the Anxiety Disorders Research Program and co-principal investigator on the study. “This study, taken together with previous research, raises the possibility that treatment-related increases in brain activity [of the anterior cingulate cortex] during emotional processing may improve emotional processing in anxious youth who are at risk for developing bipolar disorder.” The study’s findings in regard to increases in activity in the part of the brain known as the insula, the part of the brain responsible for monitoring and responding to the physiological condition of the body, are of high interest, Strawn adds. In this pilot trial, nine participants ages 9 to 16 years, underwent functional magnetic resonance imaging (fMRI) while performing continuous performance tasks with emotional and neutral distractors prior to and following 12 weeks of mindful-based cognitive therapy. “Mindfulness-based therapeutic interventions promote the use of meditative practices to increase present-moment awareness of conscious thoughts, feelings and body sensations in an effort to manage negative experiences more effectively,” says Sian Cotton, PhD, an associate professor of family and community medicine at UC, director of the UC’s Center for Integrative Health and Wellness and a co-author on the study. “These integrative approaches expand traditional treatments and offer new strategies for coping with psychological distress.” “Clinician-rated anxiety and youth-rated trait anxiety were significantly reduced following treatment; the increases in mindfulness were associated with decreases in anxiety. Increasingly, patients and families are asking for additional therapeutic options, in addition to traditional medication-based treatments, that have proven effectiveness for improved symptom reduction. Mindfulness-based therapies for mood disorders is one such example with promising evidence being studied and implemented at UC.” “The path from an initial understanding of the effects of psychotherapy on brain activity to the identification of markers of treatment response is a challenging one, and will require additional studies of specific aspects of emotional processing circuits,” says Strawn.
{ "perplexity_score": 239, "pile_set_name": "OpenWebText2" }
While They Watched uses archival footage and defector interviews to accuse the world of ‘wilful blindness’ for failing to intervene A breaking news alert cuts across the screen announcing that North Korea “has fallen”. There are celebrations on the streets of Seoul, as analysts debate what will happen next. The opening scenes of While They Watched, a new film about North Korea, imagines what would happen were the regime to collapse. Set in an unspecified time in the near-future, it uses archive footage and interviews with former prison guards, defectors, and human rights activists to build up a picture of what we know about the totalitarian state – and to accuse the world of “wilful blindness” for failing to intervene. North Korea’s government stands accused of widespread atrocities and the country’s young leader, Kim Jong-un, has been warned by the United Nations that he could face charges for crimes against humanity. Yet the film points out that despite evidence from investigators and defectors alike, no real action has been taken. North Korea human rights abuses resemble those of the Nazis, says UN inquiry Read more Director Jake Smith said he had been a “naive Londoner” until he read Nothing to Envy, a damning book about life in North Korea written by Barbara Demick. “I decided to dig deeper,” he said. “I moved to South Korea and began meeting defectors and finding out if these things were true. I was shocked.” He decided to make the film as a plea to world leaders to take a stance. It got off the ground thanks to £1,500 pledged on crowd-funding site Indiegogo, before securing support from a South Korean production company. Facebook Twitter Pinterest Michael Kirby holds up the damming UN report in a clip from the film. Photograph: While They Watched/Handout In hard-hitting scenes, the trailer combines images of the Kim family being cheered by adoring crowds cut with archival footage of a Nazi-era concentration camp. Later, black-and-white images show Adolf Hitler enjoying similar adoration. It uses news clips of the UN’s Michael Kirby, the chair of a commission on human rights in North Korea, issuing stark warnings about the fate of the country’s citizens. Kirby’s report concluded that the government’s actions resembled those of Nazis during the second world war, and the film follows this narrative. Smith knows that the comparison between North Korea and Nazi Germany is controversial. More than six million people were killed during the holocaust, whereas estimates of the death toll at the hands of the North Korean government range from 200,000 to 3 million since 1990s – with starvation playing a key role. He invited Kirby to appear in the film, but the Australian judge declined on the grounds that he had to stay impartial. Countering apathy Three governments come in for the most criticism: China, over its forced repatriation of North Koreans who cross the border illegally, South Korea, for ignoring the problem north of the border, and the DPRK itself. After living in South Korea, spending time with defectors and shadowing campaigners, Smith said he was surprised by how little southerners know, or care, about the plight of their neighbours. “It’s on the news but no one talks about it... people have little interest,” he said. A 2014 public opinion survey found an increased level of detachment and apathy amongst young South Koreans about the situation facing people across the border. One of the stars of the film is Yeon-mi Park, a defector who has become an outspoken critic of the country. Yeon-mi, who was relatively unknown when filming started, gained global recognition for her “courageous” and “harrowing” speech at the One Young World Forum in Dublin, Ireland last year. Smith’s team had already secured exclusive access to film her. Such is the control over information that leaves the country, the outside world relies on defectors like Yeon-mi to fill in the gaps. This process is far from perfect: some testimonies, including Yeon-mi’s, have been questioned over their accuracy. It’s a dilemma Smith says he was well aware of, but believes it’s no coincidence that defectors stories paint the same picture of hardship and abuse at the hands of the regime. Facebook Twitter Pinterest Park Yeon-mi in the film, the young defector has been questioned over the accuracy of her story Photograph: While They Watched/Handout While the details may vary from the truth slightly, “people are missing the bigger picture: the trauma people went through and the stress they suffered”, said Smith. It’s not a question of a hidden agenda, he adds, “when they tell their stories I think they truly believe them”. The film will be shown to its main backers and supporters in Seoul tomorrow and is being submitted to the festival circuit in the UK later this year. Full details of the release will be available on the film’s website. Smith and his team have also set up a campaign page assisting people in “immediately and effectively alleviate the suffering of the North Korean people”. It includes links for more information, instructions on how to raise awareness and funds for platforms like Open Radio North Korea, an information programme that broadcasts over the the hermetically sealed border.
{ "perplexity_score": 221.7, "pile_set_name": "OpenWebText2" }
True Love Waits Stainless Steel Engravable Purity Ring Get it engraved!only $9 $26 Size Font {{ data.field_4016.value }} Engraving - Inside[ +$9.00 ] * = required field Product Description With everything going on in the world today, more teens and young adults are proudly chosing abstinence and displaying their choice with purity rings. This stainless steel purity ring simply states the phrase True Love Waits around the outside of the brushed steel band. Many people are embracing the notion of waiting until marriage, and this purity ring serves as a token of their commitment to this promise to themselves. Purity Rings and other styles of purity jewelry have become increasingly popular with young Hollywood. Size & Materials Metal stainless-steel Approx Weight 6.6 grams Dimensions Width: 6mm Item Type promise-rings Metal Stamp no-metal-stamp Gem Type NA Material NA Shipping Information • First Class - FREE on orders over $75 | $5.95 - 2 to 5 Business Days • Priority Mail - $8.95 - 2 to 3 Business Days • UPS 2 Day Air (lower 48 states) - $16.95 - 2 Business Days • UPS 2 Day Air (Alaska & Hawaii) - $19.95 - 2 Business Days • UPS Next Day - $24.95 - 1 Business Day • USPS First Class Canada - $7.95 | 7 to 10 Business Days • FedEx Canada - $19.95 - 1 to 3 Business Days • FedEx International - $24.95 - 1 to 3 Business Days Return Information Eve's Addiction.com wants you to be a happy customer. We want you to be completely satisfied with the sterling silver jewelry that you receive from us, as we only sell high quality silver and cubic zirconia cz jewelry. We do understand that you may not like your purchase for some reason. You may return or exchange your jewelry within 60 days of purchase if you are not satisfied with it. The jewelry must be returned in its original condition for a refund or exchange. Engraved, personalized, photo, monogram, name and initial, chocolate and clearance items are not returnable or exchangeable.
{ "perplexity_score": 1071.3, "pile_set_name": "Pile-CC" }
Q: SQL Query for returning only 1 record with 2 conditions satisfied WHERE (ADDR1 = '1500 Valley Rd' AND CUST_FLAG = 'P') -- 1 OR (ADDR1 = '1500 Valley Rd' AND CUST_FLAG = 'J') -- 2 Please help me with this piece of query. I need to show only the record with CUST_FLAG = 'P'. With the above Where clause I am getting both the records if both the conditions are satisfied. My Requirement is: If only 1st condition satisfies, then return the record with CUST_FLAG = 'P' If only 2nd condition satisfies, then return the record with CUST_FLAG = 'J' If both the conditions satisfies, then return only the record with CUST_FLAG = 'P'. A: This is a prioritization query. To do this in a single where clause, you can do: WHERE ADDR1 = '1500 Valley Rd' AND (CUST_FLAG = 'P' OR (CUST_FLAG = 'J' AND NOT EXISTS (SELECT 1 FROM t WHERE t.ADDR1 = outer.ADDR1 AND t.CUST_FLAG = 'J' )) Or a more typical way is to use ROW_NUMBER(): select t.* from (select t.*, row_number() over (partition by addr1 order by cust_flag desc) as seqnum from (<your query here>) t ) t where seqnum = 1;
{ "perplexity_score": 1516.7, "pile_set_name": "StackExchange" }
U NITED S TATES N AVY –M ARINE C ORPS C OURT OF C RIMINAL A PPEALS _________________________ No. 201800015 _________________________ UNITED STATES OF AMERICA Appellee v. RANDALL D. SHOOK Gas Turbine System Technician (Mechanical) Second Class (E-5), U.S. Navy Appellant _________________________ Appeal from the United States Navy -Marine Corps Trial Judiciary Military Judge: Commander Aaron C. Rugh, JAGC, USN. Convening Authority: Commanding Officer, USS Russell (DDG 59). For Appellant: Lieutenant Jacqueline M. Leonard, JAGC, USN. For Appellee: Brian K. Keller, Esq. _________________________ Decided 29 May 2018 _________________________ Before M ARKS , J ONES , and E LLINGTON , Appellate Military Judges _________________________ After careful consideration of the record, submitted without assignment of error, we affirm the findings and sentence as approved by the convening authority. Art. 66(c), Uniform Code of Military Justice, 10 U.S.C. § 866(c). For the Court R.H. TROIDL Clerk of Court
{ "perplexity_score": 64.5, "pile_set_name": "FreeLaw" }
realizes non-existence of god thanks to valid info on r/atheism goes to hell 5,609 shares
{ "perplexity_score": 1407.9, "pile_set_name": "OpenWebText2" }
Psychotria srilankensis Psychotria srilankensis is a species of flowering plant in the family Rubiaceae. It is endemic to Sri Lanka. References srilankensis Category:Endemic flora of Sri Lanka
{ "perplexity_score": 46.8, "pile_set_name": "Wikipedia (en)" }
Facebook now has 1 billion users Things you might also like You know what's cool? One billion friends. That's probably what Sean Parker would be saying to Mark Zuckerberg had Aaron Sorkin being writing today's announcement that Facebook now has 1 billion users. "This morning, there are more than one billion people using Facebook actively each month," said Zuckerberg, for real, on the company's blog boasting the new numbers. According to Zuckerberg: "Helping a billion people connect is amazing, humbling and by far the thing I am most proud of in my life." He assured us he was: "Committed to working every day to make Facebook better for you, and hopefully together one day we will be able to connect the rest of the world too." Facebook also said its users had shared some 219 billion photos and pressed the like button around the web more than 1.13 trillion times. Hopefully those 1billion people won't all ask to be your friend at once.
{ "perplexity_score": 481.7, "pile_set_name": "Pile-CC" }
This invention relates to thickened functional fluids characterized by substantially improved wear properties. It is known that antiwear additives such as zinc dialkyldithiophosphates reduce wear in thickened high-water hydraulic fluids. See for example U.S. Pat. No. 4,481,125. These fluids, however, are limited in their ability to operate in equipment, such as vane pumps, at pressures above 1,000 psi. New associative thickeners have been developed that can be used to prepare high-water hydraulic fluids which will operate in vane pumps at pressures greater than 2,000 psi. The problem is that the wear rate at these pressures is too high (generally more than 8 mg/hr) even though the fluids contain a traditionally used antiwear additive such as a zinc dialkydithiophosphate. The instant specification discloses that the addition of certain primary amine compounds will significantly reduce the wear rate. British Pat. No. 1,409,157 discloses reacting a metal dialkyl dithiophosphate with an amine. However, the British patent relates to a completely non-analogous art, namely, vulcanization of synthetic elastomers and has nothing to do with functional fluids. One group of useful primary amines is disclosed in U.S. Pat. No. 4,313,004. This patent describes certain diaminoalkoxy compounds having the following structural formula: ##STR1## wherein m and n are both numbers from 0 to about 25 and m+n equals at least 1 and R.sub.1 is selected from H and a lower alkyl group having from 1 to about 4 carbon atoms and R.sub.2 is selected from H and an alkyl group containing from 1 to 10 carbon atoms. At column 6, lines 9-10, the patent indicates that these compounds are generally used as epoxy curing agents. Other uses for the compounds are listed at column 6, lines 9-19, of the patent. It is disclosed that they can be used as oil and fuel adductive intermediates; for the formation of diisocyanate compositions; and to form polyamides. The patent, however, does not teach or suggest that such compounds can be used to reduce the wear rate of thickened hydraulic fluids which contain an antiwear additive.
{ "perplexity_score": 271.1, "pile_set_name": "USPTO Backgrounds" }
//--------------------------------------------------------------------------- // Greenplum Database // Copyright (C) 2012 EMC Corp. // // @filename: // CConstraintNegation.h // // @doc: // Representation of a negation constraint //--------------------------------------------------------------------------- #ifndef GPOPT_CConstraintNegation_H #define GPOPT_CConstraintNegation_H #include "gpos/base.h" #include "gpopt/base/CConstraint.h" namespace gpopt { using namespace gpos; using namespace gpmd; //--------------------------------------------------------------------------- // @class: // CConstraintNegation // // @doc: // Representation of a negation constraint // //--------------------------------------------------------------------------- class CConstraintNegation : public CConstraint { private: // child constraint CConstraint *m_pcnstr; // hidden copy ctor CConstraintNegation(const CConstraintNegation&); public: // ctor CConstraintNegation(CMemoryPool *mp, CConstraint *pcnstr); // dtor virtual ~CConstraintNegation(); // constraint type accessor virtual EConstraintType Ect() const { return CConstraint::EctNegation; } // child constraint CConstraint *PcnstrChild() const { return m_pcnstr; } // is this constraint a contradiction virtual BOOL FContradiction() const { return m_pcnstr->IsConstraintUnbounded(); } // is this constraint unbounded virtual BOOL IsConstraintUnbounded() const { return m_pcnstr->FContradiction(); } // scalar expression virtual CExpression *PexprScalar(CMemoryPool *mp); // check if there is a constraint on the given column virtual BOOL FConstraint ( const CColRef *colref ) const { return m_pcnstr->FConstraint(colref); } // return a copy of the constraint with remapped columns virtual CConstraint *PcnstrCopyWithRemappedColumns(CMemoryPool *mp, UlongToColRefMap *colref_mapping, BOOL must_exist); // return constraint on a given column virtual CConstraint *Pcnstr(CMemoryPool *mp, const CColRef *colref); // return constraint on a given column set virtual CConstraint *Pcnstr(CMemoryPool *mp, CColRefSet *pcrs); // return a clone of the constraint for a different column virtual CConstraint *PcnstrRemapForColumn(CMemoryPool *mp, CColRef *colref) const; // print virtual IOstream &OsPrint(IOstream &os) const; }; // class CConstraintNegation } #endif // !GPOPT_CConstraintNegation_H // EOF
{ "perplexity_score": 567.8, "pile_set_name": "Github" }
Changes are coming to the achievements you'll gain on your Xbox console. As for what those changes are exactly...your guess is as good as mine. Microsoft's Mike Ybarra hits fans with the typical flowery statements the company is known for below: “We are working towards a bigger, more meaningful change about somebody’s gaming accomplishments in history, as a gamer on Xbox [W]e can do a lot more to reflect and let people show their gaming history and their status. Whether it’s somebody who only plays multiplayer in Halo 5 at a professional level, maybe they only have 2,000 Gamerscore, you want to be able to celebrate that person.This person doesn’t play a lot of games, but they’re world top ten at Halo 5. All the way to people [with over a million gamerscore]. It’s that range that we really need to look at and celebrate… we’re going to go big in the area of letting people show off and represent their gaming history and the type of gamer that they are, far more than we do with Gamerscore.” That statement will undoubtedly spark the debate of whether or not Microsoft will actually start making achievements mean something, but I don't think that's what is being said here. To me, it sounds like Microsoft is looking for a way to highlight achievement in gaming beyond the typical achievement hunter model they've used in the past. I'm all for that, as having more data related to some of my gaming achievements would at least make me feel like I did something more important. What changes would you like to see Microsoft implement to achievements? EditorI started out as a loyal reader of Geektyrant before emailing Joey one day about the potential of writing for Geektyrant. Now six years later I'm the managing editor of Gametyrant.com and still living the dream and giving my opinion to the geek masses! Geektyrant is my life, and I hope that shows in everything I do!@G33kyMick // [email protected]
{ "perplexity_score": 474.8, "pile_set_name": "Pile-CC" }
Directions: From Cypress, FL go south on Hwy 275 (Church Road). When you get to Hwy 280 (Rocky Creek Road) turn right. Go to Hwy 264A (Mocking Bird Road) turn left and go one mile.Turn left on road between two fences. Go .2 mile and turn left. Cemetery is about 300 feet in the woods. There are 10 graves without identification. There are 3 graves with names but no dates. There are probably more unknown graves from depressions in the ground.
{ "perplexity_score": 505.9, "pile_set_name": "Pile-CC" }
// RUN: %clang_cc1 -std=c++1z -fcxx-exceptions -verify %s // RUN: %clang_cc1 -std=c++1z -fcxx-exceptions -verify %s -DCLASS #ifdef CLASS struct Outer { #endif template<typename> struct A {}; // Valid forms. A(int(&)[1]) -> A<int>; explicit A(int(&)[2]) -> A<int>; // Declarator pieces are not OK. *A(int(&)[3]) -> A<int>; // expected-error {{cannot specify any part of a return type in the declaration of a deduction guide}} &A(int(&)[4]) -> A<int>; // expected-error {{cannot specify any part of a return type in the declaration of a deduction guide}} A(int(&)[5])[3] -> A<int>; #ifdef CLASS // FIXME: These diagnostics are both pretty bad. // expected-error@-2 {{function cannot return array type}} expected-error@-2 {{';'}} #else // expected-error@-4 {{expected function body after function declarator}} #endif (A[3])(int(&)[5][1]) -> A<int>; // expected-error {{'<deduction guide for A>' cannot be the name of a variable}} #ifndef CLASS // expected-error@-2 {{declared as array of functions}} #endif (*A)(int(&)[5][2]) -> A<int>; // expected-error {{'<deduction guide for A>' cannot be the name of a variable}} (&A)(int(&)[5][3]) -> A<int>; // expected-error {{'<deduction guide for A>' cannot be the name of a variable}} (*A(int))(int(&)[5][4]) -> A<int>; // expected-error {{cannot specify any part of a return type in the declaration of a deduction guide}} // (Pending DR) attributes and parens around the declarator-id are OK. [[deprecated]] A(int(&)[6]) [[]] -> A<int> [[]]; A [[]] (int(&)[7]) -> A<int>; (A)(int(&)[8]) -> A<int>; // ... but the trailing-return-type is part of the function-declarator as normal (A(int(&)[9])) -> A<int>; #ifdef CLASS // FIXME: These diagnostics are both pretty bad. // expected-error@-2 {{deduction guide declaration without trailing return type}} expected-error@-2 {{';'}} #else // expected-error@-4 {{expected function body after function declarator}} #endif (A(int(&)[10]) -> A<int>); // expected-error {{trailing return type may not be nested within parentheses}} // A trailing-return-type is mandatory. A(int(&)[11]); // expected-error {{deduction guide declaration without trailing return type}} // No type specifier is permitted; we don't even parse such cases as a deduction-guide. int A(int) -> A<int>; // expected-error {{function with trailing return type must specify return type 'auto', not 'int'}} template<typename T> struct B {}; // expected-note {{here}} auto B(int) -> B<int>; // expected-error {{redefinition of 'B' as different kind of symbol}} // No storage class specifier, function specifier, ... friend A(int(&)[20]) -> A<int>; #ifdef CLASS // expected-error@-2 {{cannot declare a deduction guide as a friend}} #else // expected-error@-4 {{'friend' used outside of class}} #endif typedef A(int(&)[21]) -> A<int>; // expected-error {{deduction guide cannot be declared 'typedef'}} constexpr A(int(&)[22]) -> A<int>; // expected-error {{deduction guide cannot be declared 'constexpr'}} inline A(int(&)[23]) -> A<int>; // expected-error {{deduction guide cannot be declared 'inline'}} static A(int(&)[24]) -> A<int>; // expected-error {{deduction guide cannot be declared 'static'}} thread_local A(int(&)[25]) -> A<int>; // expected-error {{'thread_local' is only allowed on variable declarations}} extern A(int(&)[26]) -> A<int>; #ifdef CLASS // expected-error@-2 {{storage class specified for a member}} #else // expected-error@-4 {{deduction guide cannot be declared 'extern'}} #endif mutable A(int(&)[27]) -> A<int>; // expected-error-re {{{{'mutable' cannot be applied to|illegal storage class on}} function}} virtual A(int(&)[28]) -> A<int>; // expected-error {{'virtual' can only appear on non-static member functions}} const A(int(&)[31]) -> A<int>; // expected-error {{deduction guide cannot be declared 'const'}} const volatile static constexpr inline A(int(&)[29]) -> A<int>; // expected-error {{deduction guide cannot be declared 'static inline constexpr const volatile'}} A(int(&)[30]) const -> A<int>; // expected-error {{deduction guide cannot have 'const' qualifier}} // No definition is allowed. A(int(&)[40]) -> A<int> {} // expected-error {{deduction guide cannot have a function definition}} A(int(&)[41]) -> A<int> = default; // expected-error {{deduction guide cannot have a function definition}} expected-error {{only special member functions may be defaulted}} A(int(&)[42]) -> A<int> = delete; // expected-error {{deduction guide cannot have a function definition}} A(int(&)[43]) -> A<int> try {} catch (...) {} // expected-error {{deduction guide cannot have a function definition}} #ifdef CLASS }; #endif namespace ExplicitInst { // Explicit instantiation / specialization is not permitted. template<typename T> struct B {}; template<typename T> B(T) -> B<T>; template<> B(int) -> B<int>; // expected-error {{deduction guide cannot be explicitly specialized}} extern template B(float) -> B<float>; // expected-error {{deduction guide cannot be explicitly instantiated}} template B(char) -> B<char>; // expected-error {{deduction guide cannot be explicitly instantiated}} // An attempt at partial specialization doesn't even parse as a deduction-guide. template<typename T> B<T*>(T*) -> B<T*>; // expected-error 1+{{}} expected-note 0+{{}} struct X { template<typename T> struct C {}; template<typename T> C(T) -> C<T>; template<> C(int) -> C<int>; // expected-error {{deduction guide cannot be explicitly specialized}} extern template C(float) -> C<float>; // expected-error {{expected member name or ';'}} template C(char) -> C<char>; // expected-error {{expected '<' after 'template'}} }; }
{ "perplexity_score": 3098.2, "pile_set_name": "Github" }
// // SidebarAnimationController.m // Vesper // // Created by Brent Simmons on 8/8/14. // Copyright (c) 2014 Q Branch LLC. All rights reserved. // #import "SidebarAnimationController.h" @implementation SidebarAnimationController #pragma mark - UIViewControllerAnimatedTransitioning - (NSTimeInterval)transitionDuration:(id<UIViewControllerContextTransitioning>)transitionContext { return [app_delegate.theme timeIntervalForKey:@"sidebar.animationDuration"]; } - (void)animateTransition:(id<UIViewControllerContextTransitioning>)transitionContext { if ([[app_delegate.theme stringForKey:@"sidebar.animationStyle"] isEqualToString:@"fade"]) { [self animateFadeTransition:(id<UIViewControllerContextTransitioning>)transitionContext]; return; } UIViewController *fromVC = [transitionContext viewControllerForKey:UITransitionContextFromViewControllerKey]; UIViewController *toVC = [transitionContext viewControllerForKey:UITransitionContextToViewControllerKey]; UIViewController *sidebarViewController = nil; UIView *sidebarView = nil; if (self.presenting) { sidebarViewController = toVC; sidebarView = sidebarViewController.view; [transitionContext.containerView addSubview:sidebarView]; } else { sidebarViewController = fromVC; sidebarView = sidebarViewController.view; } sidebarView.frame = [transitionContext finalFrameForViewController:sidebarViewController]; CGAffineTransform presentedTransform = CGAffineTransformIdentity; CGAffineTransform dismissedTransform = CGAffineTransformMakeTranslation(-CGRectGetWidth(sidebarView.frame), 0.0); sidebarView.transform = self.presenting ? dismissedTransform : presentedTransform; CGFloat damping = [app_delegate.theme floatForKey:@"sidebar.animationSpringDampingRatio"]; CGFloat velocity = [app_delegate.theme floatForKey:@"sidebar.animationSpringVelocity"]; [UIView animateWithDuration:[self transitionDuration:transitionContext] delay:0.0 usingSpringWithDamping:damping initialSpringVelocity:velocity options:UIViewAnimationOptionBeginFromCurrentState animations:^{ if ([[app_delegate.theme stringForKey:@"sidebar.animationStyle"] isEqualToString:@"fade"]) { sidebarView.alpha = self.presenting ? 1.0f : 0.0f; } else { sidebarView.transform = self.presenting ? presentedTransform : dismissedTransform; } } completion:^(BOOL finished) { if (!self.presenting) { [sidebarView removeFromSuperview]; } sidebarView.transform = CGAffineTransformIdentity; [transitionContext completeTransition:YES]; }]; } - (void)animateFadeTransition:(id<UIViewControllerContextTransitioning>)transitionContext { UIViewController *fromVC = [transitionContext viewControllerForKey:UITransitionContextFromViewControllerKey]; UIViewController *toVC = [transitionContext viewControllerForKey:UITransitionContextToViewControllerKey]; UIViewController *sidebarViewController = nil; UIView *sidebarView = nil; if (self.presenting) { sidebarViewController = toVC; sidebarView = sidebarViewController.view; [transitionContext.containerView addSubview:sidebarView]; } else { sidebarViewController = fromVC; sidebarView = sidebarViewController.view; } sidebarView.frame = [transitionContext finalFrameForViewController:sidebarViewController]; if (self.presenting) { sidebarView.alpha = 0.0f; } else { sidebarView.alpha = 1.0f; } [UIView animateWithDuration:[self transitionDuration:transitionContext] delay:0.0 options:UIViewAnimationOptionCurveEaseOut animations:^{ sidebarView.alpha = self.presenting ? 1.0f : 0.0f; } completion:^(BOOL finished) { if (!self.presenting) { [sidebarView removeFromSuperview]; } sidebarView.transform = CGAffineTransformIdentity; [transitionContext completeTransition:YES]; }]; } @end
{ "perplexity_score": 6897, "pile_set_name": "Github" }
First, copy editing type nonsense: In sections 1.3, 1.4 and 1.6 the phrase "Q-Link Commodore 64" should read "Commodore 64 Q-Link" in order to correspond with the phrasing in the other definitions. In section 2.1 the phrase "...on the Q-Link under..." should read "...on the Q-Link system under..." Weird turns of phrase: In both 1.15. "Object Construction Kit" means the software to allow third- party developers to add new objects to the basic object set or advanced object set which Lucasfilm may develop as an enhancement to the Public MicroCosm system release. and 1.22. "Universe Construction Kit" means the software to allow third party developers to add new universes to the MicroCosm system which Lucasfilm may develop as an enhancement to the Public MicroCosm system release. What thing the pronoun "which" refers to is ambiguous. It should refer to "...the software..." but its placement in the sentence makes it appear to refer to something else, even though it doesn't really make sense for it to do so. In 14.2. If Quantum approves the Detailed Design Specifications, the balance of the contract price of Two Hundred Twenty-Five Thousand Dollars shall be paid to Lucasfilm in the amounts and at the times set forth in Exhibit B, upon satisfactory completion of the corresponding deliverables. It is not clear that you mean that the balance of the contract price *is* $225K. Rather, this implies that the contract price itself is $225K and that you are refering to what is left of that amount (i.e., in our case $200K if they already paid $25K). Terminology: Section 1.3 defines "Avatar Personalization Kit" and refers to "avatar" in the definition. Should we define avatar or is the attached specification exhibit sufficient to cover that? In section 4.16 it says "Develop demo of...". Is "demo" a proper word to use in a contract? In section 5.12 it says "The monthly reports shall continue until Beta-testing for the MicroCosm system is completed." What do we mean by "Beta-testing" and what does it mean for it to be completed? Misc: Section 1.8 defines "Commodore 64 Q-Link Subscriber" with reference to Commodore 64 and Commodore 128 computers. What about future Commodore 64 compatible machines that Commodore might produce (or ones produced by a third party equipment maker for that matter)? Sections 9.3, 16, 20 and 22 in my copy of the contract simply say "text to be supplied by LFL" or some such. This is fine by me, but I really want to see the text for section 16, Warranty Of Software Functions, before we sign. The Definitions: Other than the grammatical problems discussed I have few quibbles. However, the term "Story Elements" ought to be "Fantasy Elements" or something else similar to that, since what we are dealing with is not a story-oriented medium nor a story-like product. Also, the separation of MicroCosm into System Elements and Story (or Fantasy) Elements may solve some legal hassles for you guys, but I have some small problems with it since the dividing line between the two is VERY blurry. We need to discuss this in greater detail.
{ "perplexity_score": 648.9, "pile_set_name": "Github" }
SpaceX has signed on their first commercial customer for Falcon Heavy: Washington, DC / Hawthorne, CA May 29, 2012 – Today, Intelsat, the world’s leading provider of satellite services, and Space Exploration Technologies (SpaceX), the world’s fastest growing space launch company, announced the first commercial contract for the Falcon Heavy rocket. “SpaceX is very proud to have the confidence of Intelsat, a leader in the satellite communication services industry,” said Elon Musk, SpaceX CEO and Chief Designer. “The Falcon Heavy has more than twice the power of the next largest rocket in the world. With this new vehicle, SpaceX launch systems now cover the entire spectrum of the launch needs for commercial, civil and national security customers.” “Timely access to space is an essential element of our commercial supply chain,” said Thierry Guillemin, Intelsat CTO. “As a global leader in the satellite sector, our support of successful new entrants to the commercial launch industry reduces risk in our business model. Intelsat has exacting technical standards and requirements for proven flight heritage for our satellite launches. We will work closely with SpaceX as the Falcon Heavy completes rigorous flight tests prior to our future launch requirements.” This is the first commercial contract for SpaceX’s Falcon Heavy launch vehicle. Under the agreement, an Intelsat satellite will be launched into geosynchronous transfer orbit (GTO).
{ "perplexity_score": 222.2, "pile_set_name": "OpenWebText2" }
Communication via wired connections may comprise reception and/or transmission of radio frequency (RF) signals. In this regard, communication devices may transmit and/or receive RF signals carrying exchanged data, with the RF signals being configured in accordance with corresponding wired and/or wireless protocols or standards. Accordingly, signal processing (e.g., of RF signals) must be performed during wireless and/or wired communications to enable proper exchange of information. Exemplary signal processing operations may comprise filtering, amplification, up-convert/down-convert baseband signals, analog-to-digital and/or digital-to-analog conversion, encoding/decoding, encryption/decryption, and/or modulation/demodulation. Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of such systems with the present invention as set forth in the remainder of the present application with reference to the drawings.
{ "perplexity_score": 200.4, "pile_set_name": "USPTO Backgrounds" }
Multimedia Services Video: United Audio Video encoding, compression and streaming video solutions enable you to take your existing video content and digitize it. We can then take the digitized file and compress it into one or more digital media formats based on your needs. Encoded video files will be returned to you via file transfer, hard drive, flash drive or on a CD or DVD. For streaming or web distribution we will encode into most formats including QuickTime, Flash, Real Player, Windows Media, AVI, MPEG, Java Media, etc. We create Digital Cinema Package or DCP files. You can get your DCP file with or without encryption, which would depend on the sensitivity of the content and the security required when sending to a DCP projection site. We create password protected viewing sites. We will take your content and create a link, with or without password protection, and send the link to you via email. You can then distribute the link to the viewers of your choice to access/watch your video content without having to download it. The page accessed when a viewer logs in to your link can be generic with text or can include custom art. Audio: We offer audio encoding which digitizes your audio content. Encoded audio files will be returned to you via file transfer, hard drive, flash drive or on a CD or DVD. We will encode to most formats including MP3, WAV, Windows Media, RealMedia, QuickTime, etc.
{ "perplexity_score": 594.7, "pile_set_name": "Pile-CC" }
Q: jQuery if a link hasClass, apply a class to its parent I've got a simple list: <ol> <li><a href="#" class="on"> I'm on</a> </li> <li><a href="#"> I'm off</a> </li> <li><a href="#"> I'm off</a> </li> </ol> I want apply a class to the <li> if the <a> it contains has the class on. IE: I want to change from <li><a href="#" class="on"> I'm on</a> </li> to: <li class="active"><a href="#" class="on"> I'm on</a> </li> There's 100 better ways to do this using just css, but all involve refactoring a complicated slider I have setup. If I could use the a.on to affect its .parent(), I'd be all set. Le fiddle: http://jsfiddle.net/saltcod/GY2qP/1/ A: This should do it: $('a.on').parent('li').addClass('active'); http://jsfiddle.net/rdrsd/ A: You were settings the parent of all anchors inside lis to be yellow if any anchor ahd the class on. Use this instead: //remove on states for all nav links $("li a").removeClass("on"); $("li").removeClass("yellow"); //add on state to selected nav link $(this).addClass("on"); $(this).parent().addClass('yellow'); Updated JS Fiddle
{ "perplexity_score": 2133.8, "pile_set_name": "StackExchange" }
Q: Pick a unique random subset from a set of unique values C++. Visual Studio 2010. I have a std::vector V of N unique elements (heavy structs). How can efficiently pick M random, unique, elements from it? E.g. V contains 10 elements: { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 } and I pick three... 4, 0, 9 0, 7, 8 But NOT this: 0, 5, 5 <--- not unique! STL is preferred. So, something like this? std::minstd_rand gen; // linear congruential engine?? std::uniform_int<int> unif(0, v.size() - 1); gen.seed((unsigned int)time(NULL)); // ...? // Or is there a good solution using std::random_shuffle for heavy objects? A: Create a random permutation of the range 0, 1, ..., N - 1 and pick the first M of them; use those as indices into your original vector. A random permutation is easily made with the standard library by using std::iota together with std::random_shuffle: std::vector<Heavy> v; // given std::vector<unsigned int> indices(V.size()); std::iota(indices.begin(), indices.end(), 0); std::random_shuffle(indices.begin(), indices.end()); // use V[indices[0]], V[indices[1]], ..., V[indices[M-1]] You can supply random_shuffle with a random number generator of your choice; check the docu­men­tation for details. A: Most of the time, the method provided by Kerrek is sufficient. But if N is very large, and M is orders of magnitude smaller, the following method may be preferred. Create a set of unsigned integers, and add random numbers to it in the range [0,N-1] until the size of the set is M. Then use the elements at those indexes. std::set<unsigned int> indices; while (indices.size() < M) indices.insert(RandInt(0,N-1));
{ "perplexity_score": 1218.7, "pile_set_name": "StackExchange" }
Barrel TRiNiDAD Pro ModelGomez type10 steel The straight barrel that evolved from the Gomez Type 9. With steel tip in mind, this classical barrel was designed to the finest detail. The commemorative 10th edition of Yuki Yamada's barrel is a classical orthodox straight barrel that features triple ring cuts. In this model, the length, weight, cuts were all updated from the Gomez Type 9. To improve controllability, the weight was reduced by 0.7g down to 22g. The gripping area was changed to allow for a natural grip. The length was also reduced by 2mm. Although the triple ring cut was applied, it is unlike any other triple ring cut. The gap between the triple ring cuts varies ever so slightly. While the middle ring cut provides the most grip, the two ring cuts in front and the back have a broader cut that assists in providing the perfect grip and smooth release. As Yuki Yamada, grips his barrel mostly by feel, these triple ring cuts were applied throughout the barrel. Yuki Yamada competes in both soft tip as well as the steel tip scene. Hence, to closely emulate the 2BA barrel of soft tip model, the steel tip version's tungsten % was reduced to 80%. This increase the mass of the barrel and reduce the depth of the drilling required near the back of the barrel. By doing this, it allows the steel tip model to have a balance point that is similar to the soft tip version of the Gomez Type 10. As the 2nd instalment of the straight barrel in the Gomez series. You'll surely be able to experience the evolution of the Gomez.
{ "perplexity_score": 712.7, "pile_set_name": "Pile-CC" }
It is well known that many services are provided which enable users to display on screen digital data provided to subscribers. For example, subscribers can receive services related to business and stock market quotations, where the stock market prices are transmitted over telephone lines and are received by a modem at the subscriber's terminal. Having a computer and keyboard entry device enables the subscriber to selectively access digital data which is sent over the telephone lines in order to display this data on the computer screen. Many services of the type described in the previous paragraph are available, except that the expense of the service is not trivial. Also, the subscriber generally has to have a computer and a modem in order to be able to fully participate in the range of service offered to the subscribers. Many tv channels transmit programs including digital data for the purpose of close-captioning. The digital data is transmitted with the video signals and is stored in the vertical blanking interval (VBI). This data can be extracted using a decoder which then re-integrates the translated digital data to a regular video signal that can be displayed on the tv screen. This displays the captions on the screen simultaneously with the video picture. In more detail, an existing system is a teletext system authorized by the FCC in lines 10-18 of the transmission band. Teletext is a one way data transmision system that is sent out as part of a tv signal, whether the signal is sent out via satellite, cable, or regular broadcast tv. This teletext information is available free of charge to viewers, in contrast with the digital data sent to subscribers of various services of the type mentioned hereinabove. There are many types of teletext services being offered at this time covering topics such as cultural affairs, home and catalog shopping, sports, news, financial information, weather, and other types of statistics. Such teletext information is regularly offered by the major networks. As noted, teletext text and graphics are transmitted as digital data squeezed into a broadcast television signal in the vertical blanking interval. This interval is the time at the end of each television field when the cathode-ray beam is cut off while it returns to start the next field. The VBI is also used for the transmission of information other than teletext information. Such other uses include closed-captioned information, automatic color-balance information and broadcast test data. Teletext is sent as an endless loop of pages where the data for the pages are transmitted serially at the rate of 13,500 bits per second per VBI line used. The total rate of transmission is dependent upon the number of lines (up to 8) used to transmit the data. At the user end, a decoder is used to convert the teletext data to a regular video signal that can be displayed on a tv screen. Any of the pages in the loop can be accessed at random. However, because an endless-loop format is used, it takes time for each page to come around in the loop. This means that there is a slight delay between the time the page number is entered and the time that the page actually appears on the tv screen. In turn, this imposes a practical limit to the number of pages that a teletext service can offer. One way to alleviate this delay is to transmit the more important pages of information more than once within the endless loop, so that these pages will come up faster. For example, indices are transmitted several times in the loop, since these pages are more important to the users. When using teletext services, it is not possible to access any page of information without the attendant delay in being able to extract and display the digital information. Further, there is no provision for permanently storing a page of information that is interesting to the user. Rather, the endless loop of information is continuously updated and is often changed so that a desired page is no longer part of the loop of information that is transmitted. Since the presently available teletext decoders are rather expensive and further since the ease of extracting information is limited, such systems have not found great popularity. On the other hand, the online services, while solving many of the teletext services problems, require expensive equipment and are expensive due to their high subscription rates. Accordingly, it is an object of the present invention to provide an inexpensive apparatus for use with conventional tv sets which will economically enable consumers to utilize the digital data sent with video signals. It is another object of the present invention to provide a system for use with a conventional tv set which enables one to extract and use digital data sent with tv signals in a manner wherein such information can be extracted, permanently stored, and retrieved for display on a tv screen at any time. It is another object of the present invention to provide and apparatus enabling the ready extraction, storage, and retrieval for display on a tv screen of digital data sent along with video signals, where the restrictions of an endless-loop format are overcome. It is another object of this invention to provide an apparatus for extracting and storing digital data sent along with video signals, where the updating of the digital data sent with the video signal does not preclude the display on the tv screen of digital data which is no longer being transmitted with the video signals. It is another object of this invention to provide a system enabling expanded use of a conventional tv set wherein digital data sent with the tv signal can be selectively accessed and displayed on the tv screen.
{ "perplexity_score": 227.8, "pile_set_name": "USPTO Backgrounds" }
Q: Jackson, how to ignore some values I'd like to exclude all properties with values less than zero. Does Jackson have some ready to use solutions or I should create CustomSerializerFactory and BeanPropertyWriter? A: You can do this by using a filter - it's a little verbose but it does the job. First - you need to specify the filter on your entity: @JsonFilter("myFilter") public class MyDtoWithFilter { ...} Then, you need to specify your custom filter, which will look at the values: PropertyFilter theFilter = new SimpleBeanPropertyFilter() { @Override public void serializeAsField(Object pojo, JsonGenerator jgen, SerializerProvider provider, PropertyWriter writer) throws Exception { if (include(writer)) { if (writer.getName().equals("intValue")) { int intValue = ((MyDtoWithFilter) pojo).getIntValue(); if (intValue < 0) { writer.serializeAsField(pojo, jgen, provider); } } else { writer.serializeAsField(pojo, jgen, provider); } } else if (!jgen.canOmitFields()) { // since 2.3 writer.serializeAsOmittedField(pojo, jgen, provider); } } @Override protected boolean include(BeanPropertyWriter writer) { return true; } @Override protected boolean include(PropertyWriter writer) { return true; } }; This is done for a field called intValue but you can do the same for all your fields that need to be positive in a similar way. Finally, not you can marshall an object and test that it works: FilterProvider filters = new SimpleFilterProvider().addFilter("myFilter", theFilter); MyDtoWithFilter dtoObject = new MyDtoWithFilter(); dtoObject.setIntValue(12); ObjectMapper mapper = new ObjectMapper(); String dtoAsString = mapper.writer(filters).writeValueAsString(dtoObject); Hope this helps.
{ "perplexity_score": 1887.8, "pile_set_name": "StackExchange" }
Cytokines in infectious diseases. Cytokines are heterogeneous group of proteins that are produced by a wide variety of cells in the body and act as signals between the cells of the immune system. The recent discovery of two distinct subsets of T-helper cells led to the development of a conceptual framework of complex network of cytokine pathways in the regulation of immune responses against a variety of infectious agents. In this brief review, we have attempted to present a concise summary of the current state of knowledge of this complex interaction among cytokines that result in a cascade of biological events leading to inflammatory response and host defense against pathogens.
{ "perplexity_score": 102.4, "pile_set_name": "PubMed Abstracts" }
/* * Generated by class-dump 3.3.4 (64 bit). * * class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2011 by Steve Nygard. */ #import <DevToolsInterface/XCApplicationPropertiesInspectorPane.h> @class NSButton, NSMutableArray, NSMutableDictionary, NSTableView, PBXAddVariantPanel, XCExtendedArrayController, XCExtendedObjectController; @interface XCAutomatorActionPropertiesInspectorPane : XCApplicationPropertiesInspectorPane { NSButton *removeLocalizationButton; NSTableView *localizationsTableView; XCExtendedArrayController *_generalController; XCExtendedArrayController *_descriptionController; XCExtendedObjectController *_inputController; XCExtendedArrayController *_inputTypesController; XCExtendedObjectController *_outputController; XCExtendedArrayController *_outputTypesController; XCExtendedArrayController *_parametersController; XCExtendedArrayController *_keywordsController; XCExtendedArrayController *_resourcesController; XCExtendedArrayController *_warningsController; XCExtendedArrayController *_relatedActionsController; XCExtendedArrayController *_localizationsController; PBXAddVariantPanel *_addVariantPanel; NSMutableArray *_generalSettings; NSMutableArray *_descriptionSettings; NSMutableDictionary *_input; NSMutableArray *_inputTypes; NSMutableDictionary *_output; NSMutableArray *_outputTypes; NSMutableArray *_parameters; NSMutableArray *_keywords; NSMutableArray *_requiredResources; NSMutableArray *_warningSettings; NSMutableArray *_relatedActions; NSMutableArray *_localizations; long long _selectedTabViewIndex; } + (id)inspectableClasses; + (BOOL)canInspectItems:(id)arg1; + (void)initialize; - (BOOL)tableView:(id)arg1 shouldTrackCell:(id)arg2 forTableColumn:(id)arg3 row:(long long)arg4; - (void)tabView:(id)arg1 willSelectTabViewItem:(id)arg2; - (void)removeLocalization:(id)arg1; - (void)addLocalization:(id)arg1; - (void)_addVariantSheetDidEnd:(id)arg1 returnCode:(long long)arg2 contextInfo:(void *)arg3; - (id)stringsFileItemForLocalization:(id)arg1; - (void)openInfoPList:(id)arg1; - (void)openInfoPlistStringsFile:(id)arg1; - (void)contentDidChangeForArrayController:(id)arg1; - (void)contentDidChangeForObjectController:(id)arg1; - (void)currentInspectedItemsChanged:(id)arg1; - (void)rebuildAllSettingsWithProductSettings:(id)arg1; - (void)rebuildLocalizationsWithProductSettings:(id)arg1; - (void)rebuildRelatedActionsWithProductSettings:(id)arg1; - (void)rebuildWarningSettingsWithProductSettings:(id)arg1; - (void)rebuildRequiredResourcesWithProductSettings:(id)arg1; - (void)rebuildKeywordsWithProductSettings:(id)arg1; - (void)rebuildParametersWithProductSettings:(id)arg1; - (void)rebuildOutputTypesWithProductSettings:(id)arg1; - (void)rebuildOutputWithProductSettings:(id)arg1; - (void)rebuildInputTypesWithProductSettings:(id)arg1; - (void)rebuildInputWithProductSettings:(id)arg1; - (void)rebuildDescriptionSettingsWithProductSettings:(id)arg1; - (void)rebuildGeneralSettingsWithProductSettings:(id)arg1; - (id)newObjectBasedOnObject:(id)arg1 fromController:(id)arg2; - (void)viewDidLoad; - (id)containerTypes; - (long long)selectedTabViewIndex; - (void)setLocalizations:(id)arg1; - (id)localizations; - (void)setRelatedActions:(id)arg1; - (id)relatedActions; - (void)setWarningSettings:(id)arg1; - (id)warningSettings; - (void)setRequiredResources:(id)arg1; - (id)requiredResources; - (void)setKeywords:(id)arg1; - (id)keywords; - (void)setParameters:(id)arg1; - (id)parameters; - (void)setOutputTypes:(id)arg1; - (id)outputTypes; - (void)setOutput:(id)arg1; - (id)output; - (void)setInputTypes:(id)arg1; - (id)inputTypes; - (void)setInput:(id)arg1; - (id)input; - (void)setDescriptionSettings:(id)arg1; - (id)descriptionSettings; - (void)setGeneralSettings:(id)arg1; - (id)generalSettings; - (void)dealloc; @end
{ "perplexity_score": 2929.6, "pile_set_name": "Github" }
BUILDING rdiscount ================== You'll be needing Ruby, rake, and a basic build environment. Build the rdiscount extension for tests and local development: $ rake build Use your rdiscount working copy when running ruby programs: $ export RUBYLIB=~/rdiscount/lib:$RUBYLIB $ ruby some-program.rb Gathering changes from an upstream discount clone requires first grabbing the discount submodule into the root of the project and then running the rake gather task to copy discount source files into the ext/ directory: $ git submodule update --init Submodule 'discount' (git://github.com/davidfstr/discount.git) registered for path 'discount' Cloning into discount... $ cd discount $ ./configure.sh $ make # ensure it compiles $ cd .. $ rake gather $ rake build UPGRADING Discount ================== The most common maintenance task is upgrading the version of Discount that RDiscount is using. Before doing anything, make sure you can build the current (unmodified) version of RDiscount. See the section above for details. Update the Discount submodule to the desired version: $ cd discount $ git fetch $ git checkout v2.0.7.x # insert desired version $ cd .. Copy the new Discount sources to the appropriate directories for RDiscount: $ rake gather Update rdiscount.gemspec to include all *.c, *.h, and *.rb files in ext. This must be done manually. Here's a quick way to get the full list: $ echo ext/*.c ext/*.h ext/*.rb ext/blocktags ext/VERSION | tr ' ' "\n" | sort (There is an old Rakefile target called "rdiscount.gemspec" that looks like it is designed to perform an update of these files, however I haven't tested it.) Build the RDiscount gem. If you get errors related to missing files in ext, make sure you updated the gemspec correctly in the previous step. $ gem build rdiscount.gemspec Install this new gem locally. It is recommended that you use RVM to create an isolated installation environment. If you get an error after the line "Building native extensions", see the troubleshooting section below. $ rvm ruby@rdiscount --create # recommended; requires RVM $ gem install rdiscount-*.gem Make sure the gem can be imported: $ ruby -e 'require "rdiscount"' Make sure the tests (still) pass: $ rake test Worked? Swell! The hard part is past. Check the Discount release notes to determine whether it has gained any new features that should be exposed through the RDiscount Ruby interface (lib/rdiscount.rb), such as new MKD_* flags or configure flags. If so, update the Ruby interface. If the ./configure.sh line needs to be changed to support new features, you will need to port some #defines from discount/config.h to ext/config.h manually to get RDiscount's embedded Discount to use the same configure flags. For new Discount extensions via new MKD_* flags, you will need to update: * lib/rdiscount.rb with new accessors and * the rb_rdiscount__get_flags function in ext/rdiscount.c with new accessor-to-flag mappings for each new extension. You should also look for RDiscount-specific bugs & feature requests in the GitHub tracker and fix a few. If any bugs were fixed or features added be sure to also add new tests! And don't forget to rerun the preexisting tests. Update the CHANGELOG. Update rdiscount.gemspec with the new RDiscount version number and date. Also update the VERSION constant in lib/rdiscount.rb. Push that change as the final commit with a message in the format "2.0.7 release". Tag the release commit: $ git tag 2.0.7 # insert desired version Rebuild the gem file and push it to RubyGems. $ gem build rdiscount.gemspec $ gem push rdiscount-NEW_VERSION.gem Announce the new release! For releases with new features it is recommended to write a full blog post. Troubleshooting Native Extension Issues --------------------------------------- The most likely place where errors will crop up is when you attempt to build the C extension. If this happens, you will have to debug manually. Below are a few recommended sanity checks: Ensure the Makefile is generated correctly: $ cd ext $ ruby extconf.rb Ensure make succeeds: $ make If you get linker errors related to there being duplicate symbols for _main, you probably need to update the deploy target of the Rakefile to exclude new *.c files from Discount that have a main function. For issues related to config.h or extconf.rb, there was probably some change to Discount's configure.sh that broke them. You will probably need to update these files in ext/ manually. For other errors, you'll have to investigate yourself. Common error classes: * 'ext/configure.sh' fails: - Create a patch to the upstream Discount. * Some files missing from ext/ that are present in discount/: - Update 'rake deploy' target to copy more files. * Some files missing when `gem build` is run: - Update gemspec to enumerate the correct files in ext/.
{ "perplexity_score": 1207.2, "pile_set_name": "Github" }
Through Thursday, February 28th: Allen Ruppersberg’s ‘You & Me’ Presented by Friends of the High Line, High Line Art is pleased to announce that You & Me by acclaimed artist Allen Ruppersberg will be the next installation on HIGH LINE BILLBOARD, located within the Edison ParkFast parking lot next to the High Line at West 18th Street and 10th Avenue. On view from Friday, February 1 through Thursday, February 28, 2013, the artist’s iconic posters marks the eighth installment on HIGH LINE BILLBOARD, which has previously featured works by John Baldessari, Anne Collier, David Shrigley, Maurizio Cattelan and Pierpaolo Ferrari for Toilet Paper, Elad Lassry, Thomas Bayrle, and Paola Pivi. An American pioneer of Conceptual Art, Allen Ruppersberg began exhibiting in Los Angeles in the late 1960s, along with fellow artists John Baldessari, Ed Ruscha, and William Leavitt. This was a generation of artists whose practice attempted to bridge the distance between art and life through artistic languages which employed everyday objects such as magazines, commercial ads, postcards, and records. Since the beginning, Ruppersberg’s work displays an affinity for the written word and printed materials, and explores consumer society and mass media in a manner that is both playful and critical. For High Line Art, Ruppersberg presents You & Me, a collection of colorful posters never before shown in this configuration or scale. Similar posters have been featured in his work since the 1980s, and are typically seen on the streets of Los Angeles, where they promote neighborhood events such as wrestling matches, carnivals, and religious gatherings. Ruppersberg appropriates the distinctive background onto which he lays his peculiar form of spontaneous poetry. Arranged side by side on a grid to cover the entire surface of the 25-by-75-foot billboard, the posters display the many combinations of the words “you” and “me” with verses and absurd linguistic associations that can be read in different orders, allowing for unexpected connections between words and ideas.
{ "perplexity_score": 182.7, "pile_set_name": "Pile-CC" }
Q: Store table heading titles `THEAD` as jQuery variable? I'm trying to store the value (different for each tabe header column) of <th> as a variable in jQuery, how can I do this? I'm using a jQuery plugin called simpletip which creates the effect I want, but since I have 14 columns each with different titles, I want to store the title for each one on a "foreach" kind of basis but I'm not sure which direction to go... help? jQuery(document).ready(function() { $('thead th').simpletip({ var title = $(this).html(); // Configuration properties content: '<div class="info"><span><span>$title</span></span></div>', fixed: false }); }); A: Youve almost got it already... $('thead th').each(function(){ var th = $(this); th.simpletip({ fixed: false, content: '<div class="info"><span><span>'+th.html()+'</span></span></div>' }); });
{ "perplexity_score": 963, "pile_set_name": "StackExchange" }
Q: What libraries / approach should I have for connecting with ruby on rails system to a standard Microsoft Web service using the soap protocol? I am looking to connect with an API (documentation: http://carsolize.com/carsolize_API_v2.5.pdf). To get started in a good direction how would you do this? (What gems/methods would I use?, any tips highly appreciated!) A: I recommend using Savon: https://github.com/savonrb/savon it helps you create SOAP request neatly. Check out the documentation here.
{ "perplexity_score": 1325.2, "pile_set_name": "StackExchange" }
Do you want your own head on a superhero action figure? Of course you do, YOU'RE A NARCISSIST. One of the worst ones I've ever met (but admittedly most deserving. Geekologie: the feel good okay blog). And now Firebox will make an iffy looking version of your likeness into a 3-D printed action figure head that you can use to replace Superman's, Wonder Woman's, The Joker's, Batman's or Batgirl's. You just send them a head-on and profile shot along with $127 and three weeks later, BWAM!, I forgot I'd wasted money on this. Hit the jump for the different figures you can choose from and a link to the product site. Firebox Product Site Thanks to Linz, Johnathan, Romancing_The_Stoned (nice) and Katie, who agree for $127 those figures better come with a shit-ton of accessories.
{ "perplexity_score": 674.9, "pile_set_name": "OpenWebText2" }
Feeling sorry for machines is no joke - gilad https://www.theverge.com/tldr/2019/6/17/18681682/boston-dynamics-robot-uprising-parody-video-cgi-fake ====== bryanrasmussen I recently submitted Why do Children abuse robots? ([https://news.ycombinator.com/item?id=20195120](https://news.ycombinator.com/item?id=20195120)) which links this research [https://rins.st.ryukoku.ac.jp/~nomura/docs/CRB_HRI2015LBR2.p...](https://rins.st.ryukoku.ac.jp/~nomura/docs/CRB_HRI2015LBR2.pdf) which has some relevance to this.
{ "perplexity_score": 888.9, "pile_set_name": "HackerNews" }
The Las Vegas and Grand Canyon Adventure is the perfect trip for you, if you want to explore the beautiful National Parks of the Western USA! During the course of 12 days and 11 nights, you will be visiting Salt Lake City, Arches National Park, Monument Valley, Paria Canyon Ranch, Zion National Park, Grand Canyon and concluding your tour in Las Vegas. The tour starts from Salt Lake City, Utah. The tour includes transport, all meals and accommodation throughout the tour. About the Activity:Fixed Departures: 19th June 2016, 10th July 2016, 31st July 2016, 21st August 2016 Embark on a trip to one of the coldest nations of the world, Alaska. Often called "The Last Frontier", it is a favorite spot for adventure travelers due to the adventurous terrain and the beauty of it all. This tour explores the lower part of Alaska where the weather is pleasant and tour locations include Denali National Park, McLaren Glacier, St Elias National Park, Wrangell and Valdez.
{ "perplexity_score": 254.9, "pile_set_name": "Pile-CC" }
Q: Recursive linq query I have the following object structure. public class Study { public Guid? PreviousStudyVersionId { get; set; } public Guid StudyId { get; set; } //Other members left for brevity } It is persisted using entity Framework code first. It results in a table like this PreviousStudyVersionId StudyId EF90F9DC-C588-4136-8AAE-A00E010CE87B E4315CFD-9638-4225-998E-A00E010CEEEC NULL 1C965285-788A-4B67-9894-3D0D46949F11 1C965285-788A-4B67-9894-3D0D46949F11 7095B746-8D32-4CC5-80A9-A00E010CE0EA 7095B746-8D32-4CC5-80A9-A00E010CE0EA EF90F9DC-C588-4136-8AAE-A00E010CE87B Now I want to query all studyId's recursive. So I came up with the following solution: So when I call the method in my repository GetAllStudyVersionIds(new Guid("7095B746-8D32-4CC5-80A9-A00E010CE0EA")) it returns me all 4 the studyId's. public IEnumerable<Guid> GetAllStudyVersionIds(Guid studyId) { return SearchPairsForward(studyId).Select(s => s.Item1) .Union(SearchPairsBackward(studyId).Select(s => s.Item1)).Distinct(); } private IEnumerable<Tuple<Guid, Guid?>> SearchPairsForward(Guid studyId) { var result = GetAll().Where(s => s.PreviousStudyVersionId == studyId).ToList() .Select(s => new Tuple<Guid, Guid?>(s.StudyId, s.PreviousStudyVersionId)); result = result.Traverse(a => SearchPairsForward(a.Item1)); return result; } private IEnumerable<Tuple<Guid, Guid?>> SearchPairsBackward(Guid studyId) { var result = GetAll().Where(s => s.StudyId == studyId).ToList() .Select(s => new Tuple<Guid, Guid?>(s.StudyId, s.PreviousStudyVersionId)); result = result.Traverse(a => a.Item2.HasValue ? SearchPairsBackward(a.Item2.Value) : Enumerable.Empty<Tuple<Guid, Guid?>>()); return result; } This is the implementetion of my extension method. public static class MyExtensions { public static IEnumerable<T> Traverse<T>(this IEnumerable<T> source, Func<T, IEnumerable<T>> fnRecurse) { foreach (var item in source) { yield return item; var seqRecurse = fnRecurse(item); if (seqRecurse == null) continue; foreach (var itemRecurse in Traverse(seqRecurse, fnRecurse)) { yield return itemRecurse; } } } } Is there any way of moving this closer to the database (IQueryable) and optimize this code. A: I have done this by making a recursive table function pulling all parent records based on id and then creating a view to produce a list for each record and all the parents. Then I consume that in the EF model and associate to be able to use with LINQ.
{ "perplexity_score": 2382.2, "pile_set_name": "StackExchange" }
Modulation of the immune microenvironment by tumor-intrinsic oncogenic signaling. The development of cancer immunotherapies has been guided by advances in our understanding of the dynamics between tumor cells and immune populations. An emerging consensus is that immune control of tumors is mediated by cytotoxic CD8+ T cells, which directly recognize and kill tumor cells. The critical role of T cells in tumor control has been underscored by preclinical and clinical studies that observed that T cell presence is positively correlated with patient response to checkpoint blockade therapy. However, the vast majority of patients do not respond or develop resistance, frequently associated with exclusion of T cells from the tumor microenvironment. This review focuses on tumor cell-intrinsic alterations that blunt productive anti-tumor immune responses by directly or indirectly excluding effector CD8+ T cells from the tumor microenvironment. A comprehensive understanding of the interplay between tumors and the immune response holds the promise for increasing the response to current immunotherapies via the development of rational novel combination treatments.
{ "perplexity_score": 270.5, "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention The present invention relates to a radio frequency (RF) application circuit. More particularly, the present invention relates to a RF application circuit having a switch-block composed of a pair of bipolar junction transistors (BJTs) and applied in a capacitance unit of a LC resonance circuit. 2. Description of Related Art Conventionally, in the LC (inductance-capacitance) filter or the LC oscillator of a radio frequency (RF) circuit, the switch used in a capacitance bank of a LC resonance circuit is usually implemented with N-channel metal-oxide-semiconductor (NMOS) transistor. This is because the gate side and drain side of the NMOS transistor are separated from each other, thus the DC level of the NMOS transistor is not affected when the NMOS transistor is turned on/off. However, when the NMOS transistor is served as the switch in the capacitance bank of the LC resonance circuit, the NMOS transistor will be caused the RF circuit consuming a lot of power consumption, this is because the NMOS transistor with a high turned-on resistance value. In order to solve aforementioned problem, conventionally, a plurality of NMOS transistors, which are connected in parallel, can be reduced thereof turned-on resistance value. It is obviously, if the switch in the capacitance bank of the LC resonance circuit are utilized a plurality of NMOS transistors connected in parallel, the element size of the switch is increased, and the turned-off parasitic capacitance value thereof is also increased simultaneously. In accordance with described above, the increased turned-off parasitic capacitance value of the switch further will be decreased the resolution of the capacitance bank in the LC resonance circuit, and thus the performance of the RF circuit thereof is adversely affected.
{ "perplexity_score": 227.1, "pile_set_name": "USPTO Backgrounds" }
Background ========== The T-cell receptor zeta (TCR-ζ) chain plays an important role not only in the assembly of the TCR/CD3 complex but also in coupling cell surface receptors to downstream intracellular signalling pathways. We have recently identified a subset of T cells in the peripheral blood that expresses low levels of TCR zeta (TCR-ζ-dim). Since several groups have documented reduced expression of TCR-ζ chain in synovial-joint T cells from patients with rheumatoid arthritis, we set out to test the hypothesis that peripheral blood TCR-ζ-dim T cells represent a subset of circulating memory effector T cells. Objective ========= To characterise the cell surface markers and cytokine-producing capacity of the TCR-ζ-dim T cells. Methods ======= Three-colour staining and flow cytometry (FACS) were performed on fixed and permeabilised cells to study cell-surface markers and the expression of intracellular TCR-ζ. Intracellular TNF-α and IFN-γ expression were also detected by FACS after stimulation with phorbol ester and ionomycin in the presence of monensin, and the expression in TCR-ζ-bright and TCR-ζ-dim populations was compared. Results ======= Engagement of TCR on peripheral blood T cells *in vitro* led to down-regulation of TCR-ζ. Furthermore, levels of TCR-ζ from inflamed joints were also dramatically reduced in comparison with that from the peripheral blood. As expected, synovial-fluid and membrane T cells expressed more CD45RO, CD45RB-dull and CD62L-neg than peripheral blood T cells. In comparison with the CD3^+^ TCR-ζ-bright population, peripheral blood TCR-ζ-dim T cells were also enriched for CD45RO expression, and expressed the CD45RB-dull and CD62L-neg markers of memory T cells. A significant proportion of TCR-ζ-dim T cells were found to be CD28-negative. After stimulation *in vitro*, TCR-ζ-dim cells were found to be enriched for TNF-α and IFN-γ producers in comparison with the TCR-ζ-bright T-cell subset from the sample individual. Preliminary data suggest that TCR-ζ-bright and TCR-ζ-dim T-cell subsets can be distinguished on the basis of their relative expression of CD52. Conclusion ========== CD3^+^ TCR-ζ-dim cells are characteristic of T cells activated through the TCR and are enriched for cells capable of expressing TNF-α and IFN-γ. We postulate that this T-cell subset may represent circulating effector cells that may play a role in promoting the chronic inflammatory process.
{ "perplexity_score": 449.1, "pile_set_name": "PubMed Central" }
Jeff Gerstmann's Pro Skater 2-III We take a slight detour into some other EXTREME games that feature TWO wheels! How many benihanas can Jeff land as he plays through all the Tony Hawk games and an assortment of Tony Hawk knock-offs? Apr. 11 2019 Cast: Jeff, Brad, Ben Posted by: Jan
{ "perplexity_score": 1112.5, "pile_set_name": "OpenWebText2" }
A trio of Hollywood distributors — A24, Oscilloscope and Honora — are joining the launch of BitTorrent Now as pilot partners. The file-sharing service announced BitTorrent Now on Thursday as a refresh to the file-sharing service’s Bundle platform with a pilot program for ad-supported streaming releases across multiple platforms such as web, iOS, Apple TV and Android. Honora, A24 and Oscilloscope are among the pilot film partners with their own dedicated channels. Honora’s will include David Cross’ “Hits,” new series “We Are San Marino” and “The Specials,” a preview of upcoming series “Back On Track” and three short films from director Andy de Young. Oscilloscope’s Live on BitTorrent Now will include 13 feature films, including “Embrace of the Serpent,” “The Fits,” “12 O’Clock Boys,” “Dark Days” and “Le Tigre.” A24, which has released “Spring Breakers,” “The Spectacular Now,” “Ex Machina,” “Amy,” “Room” and “The Witch,” did not disclose what will be available on its channel. Other partners in BitTorrent Now include Yung Jake, Caleb Groh, Caveman, Kerli, Super Deluxe, iHeartComix, Factory25, Adam Bhala Lough, Letter Racer and Pizzaslime. BitTorrent said its three-year-old Bundle platform reaches a global audience of 200 million fans and is used by Thom Yorke, Major Lazer, G-Eazy, Soulection, Fool’s Gold Records, Red Bull Media, Drafthouse Films, Sony Pictures Classics and the BBC. It introduced paygates in 2014, touted as allowing creators to set the price they choose for their work while keeping 90% of the sale revenue. Variety reported on June 2 that BitTorrent was spinning off its Sync file synchronization tool into a separate company headed by former BitTorrent CEO Eric Klinker. Earlier this year, BitTorrent and its investors made the decision to double down on media in order to bring in new revenue streams through its new live streaming app and another media project code-named “BitTorrent Now.”
{ "perplexity_score": 277.7, "pile_set_name": "OpenWebText2" }
Q: How to change Default alert sound in iCal? I would like to change the default sound ("basso") that plays when an Alert is fired from iCal in the notification center? I have tried changing the sounds in notification center, but it seems to be overridden by the iCal settings. Can the sound be changed to "glass" or any other? One way, I can do it is by changing the Alert sound when I create a Calendar Event. This is just too cumbersome to do everytime. Please assist. A: There is a alternative way to do that. Go to System/Library/Sounds and create a sound file with the same name as Basso.aiff and it will supersede Basso without the need for deleting a system sound file.
{ "perplexity_score": 498.8, "pile_set_name": "StackExchange" }
librosa==0.6.2 pytube==9.5.2 requests==2.21.0 inflect==2.1.0 pocketsphinx==0.1.15 google-api-python-client==1.7.11 pydub==0.23.1
{ "perplexity_score": 3786.8, "pile_set_name": "Github" }
Q: Estimation of the bond angle of water We know from experimental data that $\ce{H-O-H}$ bond angle in water is approximately 104.5 degrees. If its two lone pairs were bonds (which is unfortunately impossible) also $\ce{O-H}$ bonds and a perfect tetrahedron resulted, then VSEPR theory would predict that the bond angle would be 109.5 degrees - this number can be easily derived using the geometry of a tetrahedron. However, how would people give estimates of the actual bonding angle of water, which is caused by a slightly greater repulsion by the lone pairs than there would be if they were bonds? What physics would be involved in the calculation? Thanks! A: how would people give estimates of the actual bonding angle of water What physics would be involved in the calculation Background That's a very good question. In many cases Coulson's Theorem can be used to relate bond angles to the hybridization indices of the bonds involved. $$\ce{1+\lambda_{i} \lambda_{j} cos(\theta_{ij})=0}$$ where $\ce{\lambda_{i}}$ represents the hybridization index of the $\ce{C-i}$ bond (the hybridization index is the square root of the bond hybridization) and $\ce{\theta_{ij}}$ represents the $\ce{i-C-j}$ bond angle. For example, in the case of methane, each $\ce{C-H}$ bond is $\ce{sp^3}$ hybridized and the hybridization index of each $\ce{C-H}$ bond is $\sqrt3$. Using Coulson's theorem we find that the $\ce{H-C-H}$ bond angle is 109.5 degrees. How can we use this approach to answer your question? Unlike methane, water is not a perfectly tetrahedral molecule, so the oxygen bonding orbitals and the oxygen lone pair orbitals will not be exactly $\ce{sp^3}$ hybridized. Since addition of s-character to an orbital stabilizes electrons in that orbital (because the s orbital is lower in energy than the p orbital) and since the electron density is higher in the lone pair orbital than the $\ce{O-H}$ orbital (because the electrons in the lone pair orbital are not being shared with another atom), we might expect that oxygen lone pair orbital will have more s-character and the oxygen $\ce{O-H}$ orbital will have less s-character. If we examine the case where the $\ce{O-H}$ bond is $\ce{sp^4}$ hybridized, we find from Coulson's Theorem that the $\ce{H-O-H}$ angle is predicted to be around 104.5°. So indeed, in agreement with our prediction, removing s-character from the oxygen $\ce{O-H}$ orbital gives rise to the observed bond angle. Note on reality For over 50 years students have been told that water is roughly $\ce{sp^3}$ hybridized. The general description is that there are two equivalent O-H sigma bonds and two equivalent lone pairs orbitals. The lone pair - lone pair repulsion is greater than the sigma bond - sigma bond repulsion, so the hybridization changes as described above and the lone pair-O-lone pair angle opens up slightly and the $\ce{H-O-H}$ angle closes down to the observed 104.5 degrees. With the advent of photoelectron spectroscopy it was found that the two lone pairs in water were not equivalent (2 signals were observed for the lone pairs). Now, the hybridization of water is described as follows: 2 $\ce{sp^4}$ O-H sigma bonds one lone pair in a p orbital and the second lone pair in an $\ce{sp}$ orbital A: As you said, lone pairs result in slightly more repulsion than bonds, because the lone pairs themselves expand a little around the atom. Common practice that I've learned is just to subtract about 2.5 degrees from the bond angle for every lone pair. For instance, a molecule such as NCl3 has 4 negative charge centers, giving it a tetrahedral group geometry, but it has one lone pair, giving it bond angles of about 107 degrees. Following this pattern, water would have bond angles of about 104.5 degrees. Here's a picture that sort of shows how the lone pairs expand, reducing the bond angles slightly.
{ "perplexity_score": 837.6, "pile_set_name": "StackExchange" }
File photo Following the train-bus collision that killed eight people in Bihar, Minister of State for Railways K.H. Muniyappa announced Thursday that there would be no unmanned railway crossing in the country by 2015-16."Railways has set a goal to convert all unmanned railway crossings into manned by 2015-16," Mr Muniyappa told media persons at Patna."There are about 14,000 unmanned railway crossings across the country. We have decided to work for safety of railway and its passengers," Mr Muniyappa said.Nine people, including two girls, were killed and dozens injured on Wednesday when a train rammed into an engineering college bus at a manned level crossing in Siwan district.The accident occurred at Chap Dhala railway crossing near Siwan railway station when the Howrah-Gorakhpur Bagh Express train rammed into the bus carrying over 25 students. The engine of the train derailed after the accident. The incident sparked protests as hundreds of local residents torched several bogies of the train and damaged railway property.
{ "perplexity_score": 438.5, "pile_set_name": "OpenWebText2" }
The presence of Amazon in Newark would transform higher education in New Jersey's largest city. Students and faculty at the New Jersey Institute of Technology and Rutgers-Newark would get a chance to assist in research and development side by side with the tech giant — an edge the institutions would use to attract more students. “When you work with a company like Amazon, the research goes across many, many disciplines, from artificial intelligence to information technology, computer science, mechanical engineering, manufacturing, business,” said Joel Bloom, president of the New Jersey Institute of Technology. “You’re dealing with a very large company that has many R-and-D needs as well as workforce needs,” he said. Newark’s research institutions hope they will get to meet those needs with their combined 24,000 enrolled students, 5,500 graduates in the city and hundreds of faculty. Dozens of universities in the region help to bolster the number of graduates to well over 100,000. More:Rutgers says President Robert Barchi has agreed to stay two more years More:Newark to Amazon: We're the socially responsible choice for new HQ A year ago, the e-commerce giant announced its search for a second headquarters it calls HQ2, which drew about 200 cities across the continent to submit bids. Newark surprised many when it made the top 20 list in January. The city’s bid highlighted the talent produced from the universities in the area. “Our talent pool is large enough to supply Amazon with enough employees for its initial phase as well as accommodating future growth,” the city’s 200-page proposal stated. Amazon has said it would invest $5 billion to construct its new headquarters, which could employ up to 50,000 people. A decision will be made before the end of the year, and the Brick City appears to be an underdog, according to some reports. But Bloom says he’s optimistic. NJIT and Rutgers-Newark pledged a well-trained workforce, in addition to continuing education and professional development for Amazon employees and state-of-the-art resources for research and development. “They’re a technology company and technology is changing extremely quickly,” Bloom said. “They want to make sure the people who they’re employing who’ve been with the company have the opportunity to continue to upgrade their skills and their knowledge.” Rutgers-Newark’s commitment to the tech giant would mirror the partnerships it has with other corporations in the area, such as Prudential Financial and Panasonic, Senior Vice Chancellor Arcelio Aponte said. “It’s important for Rutgers to partner with the corporate community and align with them, whether it’s Amazon or Prudential,” Aponte said. “This would give us an opportunity at more internships and educational opportunities to further educate the Amazon employees and our students.” More:Newark to Amazon: We're the socially responsible choice for new headquarters More:Kean: Amazon could be final piece for Newark Newark Mayor Ras Baraka said in an email that an Amazon headquarters in Newark could generate a new model for how “cities, major corporations and institutions of higher learning can collaborate and work together to move a city and its residents forward.” In meetings over the last year with the Seattle-based corporation, Bloom said Amazon proposed attractive offers to the higher education institutions that were in the room. Leaders in technology fields at Amazon could deliver guest lectures and some could instruct at the university, he said. Amazon “would also bring its considerable resources to assist colleges in a variety of their missions, from education to supporting student activities,” Baraka said. Story continues after gallery The multibillion-dollar company recently made a $10 million donation to the University of Washington to build its new computer-science building, which was expected to help double the enrollment of computer science graduates, according to the Seattle Times. In fact, just by naming Newark to its top 20 list, Amazon has already had an impact on the city's academic institutions. NJIT hosted the company’s Amazon Alexa conference in July, which drew more than 2,500 people to the campus. A tech-training nonprofit, Per Scholas, said it will be opening classrooms at the former New Jersey Bell Building on Broad Street to train 200 graduates for free and place them in tech jobs, according to NJBIZ. “By Amazon bringing this much attention to the city, it’s already created an environment that other businesses and industries are looking at as well,” Bloom said. “I think we have a lot of assets they’re interested in – the city’s growing, it has a very diverse population, and there aren’t many cities where you can get from downtown to the airport in 15 minutes.” Email: [email protected] RETAIL:Walmart, Amazon, other retailers try to capture toy dollars left behind by Toys R Us More:Online shopping in New Jersey will become a bit more expensive under new tax law
{ "perplexity_score": 313.2, "pile_set_name": "OpenWebText2" }
Online coupling of hydrophilic interaction/strong cation exchange/reversed-phase liquid chromatography with porous graphitic carbon liquid chromatography for simultaneous proteomics and N-glycomics analysis. In this study we developed a fully automated three-dimensional (3D) liquid chromatography methodology-comprising hydrophilic interaction separation as the first dimension, strong cation exchange fractionation as the second dimension, and low-pH reversed-phase (RP) separation as the third dimension-in conjunction downstream with additional complementary porous graphitic carbon separation, to capture non-retained hydrophilic analytes, for both shotgun proteomics and N-glycomics analyses. The performance of the 3D system alone was benchmarked through the analysis of the total lysate of Saccharomyces cerevisiae, leading to improved hydrophilic peptide coverage, from which we identified 19% and 24% more proteins and peptides, respectively, relative to those identified from a two-dimensional hydrophilic interaction liquid chromatography and low-pH RP chromatography (HILIC-RP) system over the same mass spectrometric acquisition time; consequently, the 3D platform also provided enhanced proteome and protein coverage. When we applied the integrated technology to analyses of the total lysate of primary cerebellar granule neurons, we characterized a total of 2201 proteins and 16,937 unique peptides for this primary cell line, providing one of its most comprehensive datasets. Our new integrated technology also exhibited excellent performance in the first N-glycomics analysis of cynomolgus monkey plasma; we successfully identified 122 proposed N-glycans and 135 N-glycosylation sites from 122 N-glycoproteins, and confirmed the presence of 38 N-glycolylneuraminic acid-containing N-glycans, a rare occurrence in human plasma, through tandem mass spectrometry for the first time.
{ "perplexity_score": 289.4, "pile_set_name": "PubMed Abstracts" }
Court of Appeals of the State of Georgia ATLANTA, January 31, 2017 The Court of Appeals hereby passes the following order A17D0238. AMGUARD INSURANCE v. MATTHEW KERKELA. Upon consideration of the Application for Discretionary Appeal, it is ordered that it be hereby GRANTED. The Appellant may file a Notice of Appeal within 10 days of the date of this order. The Clerk of Superior Court is directed to include a copy of this order in the record transmitted to the Court of Appeals. LC NUMBERS: 2016CV2527 Court of Appeals of the State of Georgia Clerk's Office, Atlanta, January 31, 2017. I certify that the above is a true extract from the minutes of the Court of Appeals of Georgia. Witness my signature and the seal of said court hereto affixed the day and year last above written. , Clerk.
{ "perplexity_score": 425, "pile_set_name": "FreeLaw" }
Q: Is this thread safe? Breakpoints get hit multiple times I have the following code: public class EmailJobQueue { private EmailJobQueue() { } private static readonly object JobsLocker = new object(); private static readonly Queue<EmailJob> Jobs = new Queue<EmailJob>(); private static readonly object ErroredIdsLocker = new object(); private static readonly List<long> ErroredIds = new List<long>(); public static EmailJob GetNextJob() { lock (JobsLocker) { lock (ErroredIdsLocker) { // If there are no jobs or they have all errored then get some new ones - if jobs have previously been skipped then this will re get them if (!Jobs.Any() || Jobs.All(j => ErroredIds.Contains(j.Id))) { var db = new DBDataContext(); foreach (var emailJob in db.Emailing_SelectSend(1)) { // Dont re add jobs that exist if (Jobs.All(j => j.Id != emailJob.Id) && !ErroredIds.Contains(emailJob.Id)) { Jobs.Enqueue(new EmailJob(emailJob)); } } } while (Jobs.Any()) { var curJob = Jobs.Dequeue(); // Check the job has not previously errored - if they all have then eventually we will exit the loop if (!ErroredIds.Contains(curJob.Id)) return curJob; } return null; } } } public static void ReInsertErrored(long id) { lock (ErroredIdsLocker) { ErroredIds.Add(id); } } } I then start 10 threads which do this: var email = EmailJobQueue.GetNextJob(); if (email != null) { // Breakpoint here } The thing is that if I put a breakpoint where the comment is and add one item to the queue then the breakpoint gets hit multiple times. Is this an issue with my code or a peculiarity with VS debugger? Thanks, Joe A: It appears as if you are getting your jobs from the database: foreach (var emailJob in db.Emailing_SelectSend(1)) Is that database call marking the records as unavailable for section in future queries? If not, I believe that's why you're hitting the break point multiple times. For example, if I replace that call to the database with the following, I see your behavior. // MockDB is a static configured as `MockDB.Enqueue(new EmailJob{Id = 1})` private static IEnumerable<EmailJob> GetJobFromDB() { return new List<EmailJob>{MockDB.Peek()}; } However, if I actually Dequeue from the mock db, it only hits the breakpoint once. private static IEnumerable<EmailJob> GetJobFromDB() { var list = new List<EmailJob>(); if (MockDB.Any()) list.Add(MockDB.Dequeue()); return list; }
{ "perplexity_score": 2456.7, "pile_set_name": "StackExchange" }
SARAJEVO - Bosnia is facing an outflow from its politically sensitive multi-ethnic armed forces (OSBiH) due to the failure of political institutions to approve adequate funding, the Balkan country's military commissioner warned on Tuesday. The formation of the OSBiH in 2005, assisted by NATO and the EU peacekeeping force EUFOR, has been hailed as the country's biggest achievement since the end of Bosnia's war in the 1990s, uniting former foes and promoting national stability. So far this year around 450 people, including those employed in civilian roles, have left the 11,000-strong armed forces, according to the defense ministry, though it noted many had retired, died or changed jobs. "The system is collapsing from within because status issues are not being resolved and the politicians are not interested to solve them," Bosko Siljegovic, the parliament's military commissioner, told Reuters on the margins of an international conference. The OSBiH, which brings together Bosniaks, Bosnian Serb and Bosnian Croat elements, is under the supreme command of the country's tripartite inter-ethnic presidency and the national parliament. For years the force has been praised as the prime example of reconciliation, but its dwindling appeal among the young is shown by a drop in applicants for each job to two from 13 previously. "Low salaries are the main problem, they are lower than in regional police forces or state services of the same rank," said Siljegovic. "That is why we have a major outflow of soldiers and officers from the OSBiH." Salaries of soldiers, which previously stood at around 400 euros a month, have been cut to about 300 euros. Lower-ranking army officers are paid around 400 euros and mid-officers around 550 euros. Legislation proposing a wage rise has been blocked in the national parliament, which has not been convening due to bickering over the formation of a cabinet after last October's national election. Bosnian Serb leader Milorad Dodik, who is serving as a Serb member in Bosnia's three-man presidency, has questioned the role of the OSBiH in Bosnia's autonomous Serb-dominated region, calling for a stronger regional police force instead.
{ "perplexity_score": 298.1, "pile_set_name": "OpenWebText2" }
var v : 1 .. 1000 ; assert v contains "abc"; assert v contains "cde"; assert v contains "deg";
{ "perplexity_score": 2605.2, "pile_set_name": "Github" }
A radio interview Sir Patrick Stewart did a couple of years ago that went mostly unnoticed has been making the rounds in the last week, featuring some brutally honest comments the actor made about life after Star Trek: The Next Generation. Stewart described what it was like being typecast, telling KPCC’s The Frame: Jean-Luc Picard was who I was. I did finally get into a room to meet with a director that I had been clamoring to meet, and he was doing a movie I wanted to be in as a supporting role, and we had a good meeting. At the end he said, “Look, you’re a terrific actor, and I would love to have you in my movie, but why would I want Jean-Luc Picard in my picture?” Stewart also said his success on Star Trek “really hurt” his career for a time, but noted how he was “fortunate” to be part of of the Trek franchise as well as the X-Men franchise. However, due to his experience with Star Trek, he had some hesitation before taking on the role of Professor Charles Xavier, saying: I was reluctant at first because the “Star Trek” movies were over and I was already beginning to experience a negative aspect of them. Close identification, partly through the television series, with one character can discourage directors or producers from wanting to employ you in other means, because the identification’s so strong. Stewart eventually ended up playing Professor “X” Charles Xavier in more movies than he played Jean-Luc Picard. Stewart: it was “over” for TNG after Insurrection It is also interesting that Sir Patrick talks about reluctance to take on Xavier “after” the Star Trek films were “over.” X-Men (his first time playing Xavier) was released in 2000, so it seems that Stewart considered his time with Trek done following 1998’s Star Trek: Insurrection. After that film failed to build on the success of Star Trek: First Contact, it did seem like it could be over for the TNG films, but Paramount eventually did another in 2002 with Star Trek: Nemesis. The box office failure of Nemesis put an end to the TNG movie series, and likely to Stewart, an end to Jean-Luc Picard on film. However, in recent years the actor has said he would be open to returning to the role if there was a “really good reason” and a “good script,” but he also acknowledges it is unlikely to happen as Picard is getting “rather elderly.” Then again, the aged hero angle worked for Stewart’s last return as Xavier in this year’s Logan. Keep up with all the Star Trek celeb news at TrekMovie.
{ "perplexity_score": 239.5, "pile_set_name": "OpenWebText2" }
Donald Trump Jr. has waded in to the Brexit endgame debate | Manny Carabel/Getty Images Donald Trump Jr: ‘Brexit and my father’s election are one and the same’ US president’s son attacks a ‘last-gasp attempt by those previously in power to cling on to what was once theirs.’ U.S. President Donald Trump's eldest son said the "establishment" is trying to "silence the voices" of those who voted for Brexit and elected his father. Writing in the Telegraph, Trump Jr. said British Prime Minister Theresa May has "promised on more than 50 separate occasions that Britain would leave the EU on March 29 2019. She needs to honour that promise." "But Mrs May ignored advice from my father, and ultimately, a process that should have taken only a few short months has become a years-long stalemate, leaving the British people in limbo." Trump Jr., whose net worth is reputed to be $200 million and who is executive vice president of his father's business empire, also said that "elites control London from Brussels" and that with the Brexit deadline fast approaching, "it appears that democracy in the UK is all but dead." Trump the younger also drew parallels between the Brexit vote and the election triumph of his father, saying they are "one and the same." "Why is this important for us Americans? Because Brexit is an example of how the establishment elites try to subvert the will of the people when they’re given the chance. "When my father beat the Washington establishment in a historic outcome in 2016, just a few months after the Brexit vote, we mistakenly presumed there would be a peaceful and respectful transition of power from the Democrats to the Republicans, just as there has always been in this country. "Instead, the Democrats and deep-state operatives in our justice system have been colluding to subvert the will of the American people, with high-level officials even discussing a scheme to try to remove him from office using the 25th Amendment of our constitution. "In a way, you could say that Brexit and my father’s election are one and the same — the people of both the UK and the US voted to uproot the establishment for the sake of individual freedom and independence, only to see the establishment try to silence their voices and overturn their mandates. "What we’re seeing now in Washington, London and Brussels is the desperate, last-gasp attempt by those previously in power to cling on to what was once theirs in the face of an overwhelming mandate for change."
{ "perplexity_score": 257.7, "pile_set_name": "OpenWebText2" }
Essential Las Vegas News, Tips, Deals and WTF. Monthly Archives: March 2017 It’s not as well known as the “Welcome to Fabulous Las Vegas” sign, but it was created by the same person. The iconic Blue Angel sign, designed by Betty Willis, has been taken down after six decades of keeping watch over the Blue Angel Motel. Here’s the Blue Angel in her original upright and locked position. The Blue Angel Motel was demolished in 2015, but the popular Blue Angel statue endured. We popped in as the Blue Angel sign was about to be sent to storage, on March 30, 2017. Well, halo there. While no timeline has been given, it’s expected the classic sign will be restored and put back in public view near its original location, near Fremont Street and Eastern Avenue in downtown Las Vegas. The Blue Angel statue sat atop a pedestal, where all women should be put, in our kiss-assy opinion. The Blue Angel statue is 16 feet tall and has taken a beating over the years. We got a close look at the statue, and it seems her insides were a frequent nesting spot for birds. We’ll spare you a closer look at the Blue Angel’s tainted lady parts. Which, come to think of it, would not be a bad band name. While large and heavy, the Blue Angel was fairly dexterous. The statue swiveled depending upon the direction of the wind. We feared the owners of the Blue Angel might just be giving lip service to the statue’s renovation and return, but it seems the restoration will be paid for by the city’s Centennial Commission, whatever that might actually be. She’s in good hands. We’re optimistic about seeing the Blue Angel again. But in the meantime, we weren’t going to pass up the opportunity to improve our luck. We totally telegraphed this with the “in good hands” thing, by the way. Please try and keep up. Hey, it works at Cleopatra’s barge! Oh, all right. Turnabout is fair play. Please be gentle. Two of our very favorite Las Vegas things are the new and the classic. While the Blue Angel doesn’t have any neon, we’re still a big fan. Because of her history. Because of her pedigree. And because, as an inanimate object, she can’t file a restraining order against us. Probably. A bar receipt from Indigo Lounge at Bally’s has stirred up heated discussion online, but the outrage, it turns out, is largely misguided. The receipt, posted by a customer to the Bally’s Facebook page, shows what many have mistaken as $3 charges for ice. Here’s the receipt in question. The receipt that inspired a thousand Facebook comments and angry reaction emoji thingys. When we first saw this receipt, we got worked up like everyone else, but quickly realized we are largely an idiot. It seems the term “rocks” has nothing to do with ice in this context. When a customer orders liquor on the rocks, it’s standard to pour an extra half-ounce of liquor. A standard pour is 1.5 ounces, but drinks on the rocks contain two ounces. The $3 charge, then, is for the additional liquor, not the ice. A common term for the additional charge is a “rocks bump.” Apparently, one of the motivations for this practice is 1.5 ounces of liquor doesn’t look like very much alcohol when poured into a rocks glass. Those in the bartending field say customers who order drinks on the rocks are well aware they’ll get a larger pour, and customers tend to feel they’re actually getting a decent deal because they’re getting a third more hooch for a nominal charge. If people would just stick to Captain and diet like we do, things like this wouldn’t happen in the first place. Note: Foliage optional. It seems listing “rocks” on the receipt is used more as an internal accounting notation than a description of what the customer is receiving. From what we can tell, a customer would be charged the rocks bump for a drink ordered “neat” (without ice) as well. In many bars, the upcharge for a stronger pour is included in a drink’s overall price, rather than being itemized separately, thereby sidestepping customer confusion and the furor Indigo’s receipt caused. So, the whole “rocks” thing was much ado about nothing. Nevertheless, there was a definite kerfuffle. How much of one? Check us out on KTNV talking about both the “ker” and the “fuffle.” Told you it was a thing. Perhaps the bigger story here is how ready people are to believe Las Vegas is giving them the shaft. We’ve certainly contributed to that climate by reporting about paid parking, smaller shot sizes, CNF charges and other changes to the Las Vegas landscape. Such revelations seem to be priming the pump, and many seem to be looking for any proof they’re being nickel-and-dimed, even if they’re jumping to the wrong conclusions about that “proof.” For now, we’re going with “Don’t shoot the messenger!” Along those lines, when we referred to “largely misguided,” we left a little wiggle room for outrage. First, man alive, drinks are expensive. In Vegas, $16 is the new $8. Just remember, you’re not paying for a drink, you’re paying for an experience, and that’s the story we’re sticking to. Second, look elsewhere on the receipt and you’ll find the ominous phrase, “Peak pricing may apply.” “Peak pricing” amounts to what’s called “surge pricing” in the rideshare world. The greater the demand, the higher the prices. We wrote about peak pricing awhile back as we noticed more and more Las Vegas restaurants leaving prices off their menus. Restaurants often do this so they have the flexibility to raise prices when it’s deemed necessary, like on Fridays and Saturdays. That means you can have the exact same meal on a Tuesday or Saturday night, but the price you pay could change dramatically. Peak pricing might not warrant outrage, per se, but it’s certainly worth asking about if you’re making a reservation. One of the best attractions in Las Vegas, the Neon Museum, has received a $425,000 grant for a major expansion. With some additional cash in its coffers from the city of Las Vegas, the Neon Museum has acquired an adjoining .27-acre parcel, and demolition of the existing structure is under way. Adios, gross building next to the Neon Museum’s awesome visitor center that also happens to have been the lobby of the historic La Concha Motel. Demolition crews should make quick work of the building, the former L.A. Street Market, just south of the Neon Museum. Here’s a better look at the whole shebang, a term we’re fairly sure hasn’t been used since 1961. This is the first major expansion of the Neon Museum since it opened in 2012. The expansion will allow the Neon Museum to display an additional 30-40 signs, currently in storage. The improvements will also include an open-air exhibit and events space. The Neon Museum expansion will be designed by SH Architecture. Hey, architectural rendering dude, don’t leave a lovely lady on a bench all by her lonesome. Not cool. The expansion will feature a covered patio canopied by a solar-paneled shade structure. Why one would need to power a shade structure, we have no idea. Then again we are a blog, not an architectural firm. And let’s just say some of the signs in storage a fairly epic. We captured this photo in an off-site storage area and it shows a huge section of one of the coolest Las Vegas casinos, ever, the Stardust. Yes, yes, there’s already a Stardust sign on display at the Neon Museum, but you can never have too many Googie stars. We told the folks at the Neon Museum we wouldn’t give away the location of this storage area, so this is all you’re getting. Signs expected to make the migration from storage to public viewing are from the Las Vegas Club, Spearmint Rhino, Longhorn Casino, Sahara Saloon, Opera House Saloon and Riviera. The Neon Museum is a nonprofit endeavor with more than 500 signs on display. The organization is dedicated to collecting and preserving iconic Las Vegas signs. And they occasionally let one slide that’s not particularly iconic. We’re looking at you, Spearmint Rhino sign. As a nonprofit, the Neon Museum is often strapped for funding, so kudos to the City of Las Vegas for seeing the value of this invaluable treasure trove of Las Vegas history. Learn more about this must-do Las Vegas attraction. The Neon Museum is expected to unveil it’s new space later this year, but it’s well worth visiting in the meantime. A new nightclub and bowling venue, The Nerd, is set to open on March 30, 2017, at downtown’s Neonopolis shopping complex. We grabbed this from a video. There’s a 65% probability it’s not the actual logo for The Nerd. The Nerd hasn’t really been on the radar to-date, and publicity about the opening has pretty much been non-existent (perhaps intentionally), but this new nightlife concept could very well be a breath of fresh air at Neonopolis. There’s a ribbon-cutting ceremony planned for 11:00 a.m. on March 30, and Mayor Carolyn Goodman is expected to attend. Here’s the video invitation. Which we didn’t actually receive, officially. We’ll try and get over it. Not too much is known about The Nerd, except it’s taking over the space formerly occupied by the wildly underrated Drink & Drag nightclub, a bar featuring (wait for it) drag queens. The space includes a 12-lane bowling alley and dance floor, and The Nerd will presumably take advantage of both. We caught a glimpse of some of the nightclub’s decor, and it appears “Breaking Bad” will play a part in the club’s decor. If your club has a meth-making suit from “Breaking Bad,” you can consider us a fan. From what we understand, employees had their first day of training on March 28. So, with an opening on March 30, it’s possible the establishment has made a conscious decision to keep its soft opening on the down-low. We caught a group of servers leaving the venue, and they were universally attractive and dressed in white shirts and black shorts or skirts. Most of the employees sport suspenders to add to the nerdy theme. Remember, it’s not creepy if you’re taking the photo for your blog. In fact, The Nerd is going so incognito, there are no signs whatsoever outside the club, other than a legacy sign from Hi Life Lanes from back in the day. We overheard a sign is set to arrive any day now. In the meantime, we’re honestly excited to have the Drink & Drag space back in action. It’s a challenging location for a business, but there are very few places to dance downtown, and this seems to fit the bill. Word is The Nerd is taking a lot of inspiration from the wildly successful Gold Spike, formerly a casino, but now a nightlife hangout for the cool kids that is pretty much printing money every weekend. The Nerd is the brainchild of Jonathan Borchetta, owner of the Voodoo Zip Line attraction at Rio Las Vegas. Here’s our recipe for success at The Nerd: Keep the price points right, adjust the music volume so we can hold a conversation, throw in some decent munchies and we’ll be there will our nerdy friends to drink, bowl and feebly attempt to dance the night away. We should say right up front, we are not a sports person. You might say we are to sports as the Amish are to vibrators. However, the nation is atwitter (especially on Twitter, ironically) with news the Oakland Raiders will relocate to Las Vegas after getting a 31-1 vote from NFL team owners. There’s nothing quite like that new football stadium smell. The sole hold-out in the vote was the Miami Dolphins. In time, the Dolphins will be viewed as either as clueless buzzkills or that Chinese guy who, armed with nothing more than shopping bags, stood before a row of tanks in defiance of tyranny in Tiananmen Square. In any event, it appears the Las Vegas Raiders are destined to be a thing. Typically, this would be where we rattle off a litany of reasons this is a horrible turn of events, but we’ve decided to just go along with the jubilation instead. No matter the claims of naysayers, they’re far outweighed by the fact a Raiders relocation has inspired a Pirate’s Booty Sports Brothel. We are not making this up. The NFL vote sets a number of things in motion, including building a $1.9 billion domed stadium near the Las Vegas Strip (at Russell Road and Interstate 15, to be specific), but the Raiders will probably play in Oakland for two more seasons. Unless, that is, butt-hurt Oakland gives the Raiders the boot, a distinct possibility. Whatever the specific timeline for the move, Las Vegas football fans are ecstatic about the Raiders move to Sin City. Optimists have suggested an NFL team in Las Vegas will pump hundreds of millions of dollars into the local economy. Critics think that assertion is what economists refer to as “hooey,” but again, now is the time to celebrate, not critic. Assuming that’s a verb. Please keep your eye on the ball. See? We can sport with the best of them. The new stadium’s retractable roof will come in handy during Sin City’s 180-degree summers, which lasts from mid-February through November. We’re going to set aside the fact the new, 65,000-seat Raiders stadium is being funded with $750 million in public money (some peg that contribution closer to a billion when all is said and done). That’s pocket change in Las Vegas! Besides, who needs education or public transportation when you can have tailgate parties, cheerleaders and traumatic brain injuries? While the Raiders won’t be the first professional sports team in Las Vegas, that distinction will be held by the NHL’s Vegas Golden Knights, there’s an undeniable cache to snagging a pro football team. Las Vegas wasn’t founded on ridiculous notions like “financial viability.” It was founded on optimism and big dreams. We’ve got an action-packed episode this week, so whip out that loyalty club card with the Slinky leash and take a listen. This week, we interview cast members of “Majestik Burlesque,” a saucy striptease show just off The Strip at Royal Resort. In this week’s show, we learn the history of the merkin. (Not shown, sadly.) The “Listicle of the Week” is “Six High-Tech Casino Security Measures,” where we share casino security secrets with mysterious names like Angel Eye, NORA and TableEye21. Fun fact: Everyone knows casinos use surveillance to monitor slot machines to catch cheaters, but did you know they also monitor guest frustration levels? This surveillance allows casinos to provide a better experience for their guests. We’ve got the latest scoop about the recent robbery at Bellagio, the newest Chick-fil-A in Las Vegas (opens March 30), the Vegas Golden Knights practice facility, an expansion at the Neon Museum and even some baseless speculation about Sigma Derby at The D and the upcoming demolition (notice we didn’t say “implosion”) of downtown’s Las Vegas Club. On March 30, 2017, Las Vegas gets its third Chick-fil-A, just a minute from The Strip. Now, you know where to find us. In our history segment, we talk about the Gaming Control Board (created on March 29, 1955) and Gaming Commission (created on March 30, 1959). By the time we’re done, you’ll be an expert about which is which and who does what. We also have a chat with Chris of the Faces and Aces podcast, back in the game after a hiatus and once again telling great Las Vegas stories. Post navigation Welcome to the Best Las Vegas Blog in the History of Ever Looking for things to do in Las Vegas? How about Las Vegas news, hotels, restaurants, shows and attractions? Welcome to the Las Vegas blog that's as exciting as Las Vegas itself. Your results may vary.
{ "perplexity_score": 360.6, "pile_set_name": "Pile-CC" }
Tracklist 01 - Release 02 - In The Name Of Love 03 - Is It A Dream 04 - Share My Life 05 - The Flow Of The River 06 - It`s No Good 07 - Falling Apart 08 - The Price Of Loneliness 09 - The Ocean 10 - For A Lifetime 11 - In The Name Of Love - BiTbear Remix 12 - Things That We Do For Love
{ "perplexity_score": 1680.2, "pile_set_name": "Pile-CC" }
Allium phariense Allium phariense is an Asian species of wild onion native to mountainous areas of Bhutan, Sichuan, and Tibet. It grows at elevations of 4400–5200 m. Allium phariense has 1-3 egg-shaped bulbs up to 10 15 mm in diameter. Scape is up to 15 cm long, usually nodding toward the tip. Leaves are about the same length as the scape. Umbel is a spherical cluster of many white flowers crowded together. References phariense Category:Onions Category:Flora of temperate Asia Category:Plants described in 1906
{ "perplexity_score": 111.4, "pile_set_name": "Wikipedia (en)" }
(Image: Job networking via Shutterstock)The great British economist the late Joan Robinson once observed that the only thing worse than being exploited by capitalism is not being exploited by capitalism. This truth is felt acutely by anyone who is unemployed and looking for work. As the pain of the economic crisis continues and millions struggle to find employment there is an obvious imperative to create jobs—any jobs. But we shouldn’t stop there. In Back to Full Employment, Robert Pollin makes the essential point that “a workable definition of full employment should refer to an abundance of decent jobs.” Poor jobs that keep workers minimally employed but leave them in precarious circumstances and unable to participate fully in civic and political life are better than no jobs at all. But in terms of public policy we can and should aim higher—especially as decent jobs not only benefit the workers that hold them but also the communities in which they live. Absent a stable economic base, community itself is compromised. Three elements of the instability challenge lend critical perspective to the issue. The first can be seen in the long-term results of the decline of manufacturing industry in the rust belt. We have in fact been quite literally “throwing away” entire cities—cities like Cleveland, Detroit and St. Louis. Since 1950, Cleveland and St. Louis have each lost half a million people, drops of more than 50 and 60 percent respectively; in Detroit, the fall in numbers has topped a million, more than 60 percent. The uncontrolled corporate decision-making that results in the elimination of jobs in one community—leaving behind empty houses, half-empty schools, roads, hospitals, public buildings, and so forth—implicitly requires that they be rebuilt in a different location. Quite apart from the human costs involved, the process is extremely costly in terms of capital and also of carbon content—and at a time when EPA studies show that greenhouse gas emissions caused by human activity in the United States are still moving in the wrong direction (having jumped by over 3 percent between 2009 and 2010 alone). A second aspect relates to democracy. Substantial local economic stability is clearly necessary if democratic decision-making is a priority. A local population tossed hither and yon by uncontrolled economic forces is unable to exercise any serious interest in the long-term health of the community. To the extent local budgets are put under severe stress by instability, local community decision-making (as political scientist Paul E. Peterson has shown) is so financially constrained as to make a mockery of democratic process. This becomes still more problematic if we recognize—as theorists from Alexis de Tocqueville and John Stuart Mill to Benjamin Barber, Jane Mansbridge, and Stephen Elkin have argued—that an authentic experience of local democratic practice is also absolutely essential for there to be genuine national democratic practice. Thirdly, and straightforwardly, it will be impossible to do serious local “sustainability planning”—mass transit, high-density housing, and so forth—that reduces a community’s carbon footprint if such planning is disrupted and destabilized by economic turmoil. So yes, we need jobs. And yes, we need good jobs. But we also need an approach to good jobs that will allow us to grapple with the challenges indicated above while at the same time begin tackling the grotesque maldistribution of wealth in this country—a distribution that has reached literally medieval proportions. The top 400 individuals now control as much wealth as the bottom 180 million Americans taken together. How to go about all this? As we—hopefully—begin to adopt smarter public policies aimed at reaching full employment, we should maximize the impact of these policies by choosing strategies likely to economically stabilize our cities and regions. A decent job should be understood as one which not only pays well, but which is anchored in a community, and which in turn anchors a worker and participant in the civic life of that community. If the culprit behind economic destabilization, and its catastrophic effects in terms of employment, is capital mobility, the solution will require increasing the proportion of capital held by actors with a long-term commitment to a given locality or region. The problem, however, is that major footloose corporations are not only able but willing to jump from one city to another as they chase “incentives”—and mayors and governors waste taxpayer dollars in endless bidding wars. This raises the question of alternative ownership forms (something Pollin also began to take up in a 2012 article in the Cambridge Journal of Regions, Economy and Society). By rooting ownership broadly in the community, jobs stay put. And jobs that stay put create more jobs, through the multiplier effect of money circulating within a community as well as by expanding the tax base of cash-strapped local governments. Worker and community ownership—whether through employee stock ownership plans or more egalitarian or community strategies—are forms of ownership relevant to thinking about jobs, job creation, and local economic stability. Crucially, community or cooperative ownership of jobs appears all but certain to yield more stable long-term employment than traditional corporate strategies, and is thus more valuable as part of a package of policies aimed at full employment. Companies owned by people who live in the community rarely if ever get up and move. Traditional employers also have an incentive to keep labor costs low and will use workers only for as long as they are needed on a particular job. A number of community enterprises now aim to maximize employment over the long term. Instead of treating employees as disposable, such employers seek ways to find new work for their workforce or share existing work. (The BBC recently provided a striking example of this in their coverage of the resilience of the Basque country’s Mondragón cooperatives. In the regions where Mondragón has a significant presence, the unemployment rate is around half that of the rest of Spain.) Worker ownership works in the US, as well. It’s not often realized that there are over 10 million Americans who work at jobs they also own—more than are members of unions in the private sector. In Cleveland an innovative complex of worker owned cooperatives, linked through a revolving fund and a non-profit corporation—and in part supported by procurement from non-profit hospitals and universities—has become a model for several other community efforts. A large part of this recent boom in worker ownership is due to federal policy; specifically, legislation that created substantial tax advantages for business owners who sell their ownership stake to their workers. Another example of how smart policy has been used to cost-effectively support a worker-ownership job retention strategy can be found in the Ohio Employee Ownership Center (OEOC). The OEOC has used a relatively modest amount of state and federal funding (less than $1 million annually) to facilitate worker takeovers of firms whose owners are retiring or that are threatened with closure. Such firms, owned by workers, are city (and tax base) stabilizers: they do not get up and move. The OEOC has created enormous economic returns—retaining jobs at a cost of less than $800 per job and helping stabilize thousands of jobs in Ohio cities. This is in sharp contrast to traditional economic subsidies aimed at job retention, which cost far more, deliver less, and often lead to a destructive—and destabilizing—subsidy arms-race between different cities and states. How might we begin, on a national level, to build a strategy to mobilize worker and community ownership as a means of reaching full employment? One policy intervention that could go a long way intersects with another of Robert Pollin’s concerns in Back to Full Employment. He notes that while successive rounds of economic stimulus have kept interest rates low, they have not always succeeded in making credit available to small businesses. Small worker owned businesses could benefit from policies that specifically expanded their access to credit. (In addition to the general reticence around lending Pollin highlights, these kinds of projects, especially cooperatives, have to deal with lending institutions that are often unfamiliar with or even hostile to democratized enterprises.) Legislation has also been proposed that would start to modestly address this problem: Chaka Fattah’s National Cooperative Act or Bernie Sanders’ United States Employee Ownership Bank Act. But there are also existing programs that could be expanded: the Small Business Administration, for example, is running a very interesting initiative, the Intermediary Lending Pilot Program, which leverages existing local and regional community-oriented nonprofits to decentralize the loan-making process. One of the intermediaries here is the Cooperative Fund of New England, which is using the funds made available to the program to fund cooperatives; we can imagine, with adequate support, similar local cooperative funding initiatives across the country. In short, if we’re serious about full employment, and about creating and preserving decent jobs, we shouldn’t limit ourselves to traditional conceptions of the kinds of companies that create jobs. Indeed, by leveraging worker and community ownership strategically, we’re not just embracing a potentially transformative strategy to democratize wealth in the long term, we’re picking potentially one of the most effective strategies available to support a long-term process of job creation that could lead us back both to full employment and community stability. At the same time, we can also help develop concrete ways to begin the long, hard task of democratizing the ownership of wealth in the United States.
{ "perplexity_score": 308.8, "pile_set_name": "OpenWebText2" }
Ottawa’s new skilled immigrant selection system must process applicants within two months if Canada hopes to outbid other countries in attracting the world’s best and brightest, warns a new report by the Ontario Chamber of Commerce. Immigration Minister Chris Alexander is set to launch the brand new “Expression of Interest” processing system (EOI) in early 2015 to replace the decades-old “first-in, first-out” mechanism for the federal skilled workers program. Although Alexander says the system could shorten processing time down to six months, the report points out that comparable systems, such as Australia’s, take as little as 58 days to bring in skilled immigrants. “The speed of the system is the single most important factor in determining whether employers will participate in the EOI system,” said the report to be released Tuesday. “The Government of Canada has signalled that the EOI system will process applications within approximately six months, from Invitation to Apply to arrival in Canada. That is too long.” MORE AT THESTAR.COM: Ottawa fails to deliver ‘just in time’ immigration Immigration Minister Chris Alexander forges ahead with reform More news on immigration The proposed system is viewed as a huge opportunity to reverse the decrease in skilled-worker immigration to Ontario, which has seen its share of economic immigrants decline by 49 per cent, from 95,091 in 2001 to 48,930 in 2012, due to federal policy changes. Ottawa has capped the number of skilled immigrants pre-screened and nominated by Ontario employers to 1,300 a year, a meagre 4.8 per cent of the overall allocation across Canada. The EOI system is expected to allow Ontario employers to tap into the talent pool to address labour shortages. “The current system is hurting our ability to attract talent,” said report author Josh Hjartarson, vice president of the Ontario Chamber of Commerce, which represents 60,000 businesses — many of them small and medium-sized operations eager to take advantage of the EOI. “The new system presents a hug opportunity for businesses,” Hjartarson said, “but only if it is designed in a way that works for small- and medium-sized employers.” The proposed system is a two-stage process. First, prospective immigrants file applications to “express interest” in immigrating to Canada and submit to a pre-screening to ensure they meet the minimum criteria to be placed in the pool of candidates. Loading... Loading... Loading... Loading... Loading... Loading... Second, qualified candidates will be selected by the federal government and provinces based on local labour market needs or identified by employers with a job offer. Only those who are selected will be given an “Invitation to Apply” to submit their applications for permanent residence. Unlike the Australian system, Ottawa has signalled that it will serve as the matchmaker and won’t allow employers to browse the profiles of the potential candidates, said Hjartarson. Instead, candidates are likely to be automatically matched with employers using a series of algorithms and a revamped Canada Job Bank. Hjartarson said this would prevent employers from properly assessing the best fit for the job based on the candidate’s “soft skills” such as critical thinking, teamwork and analytical skills, through means such as multi-stage interviews, tailored questionnaires and aptitude tests. In 2012, 87 per cent of candidates in New Zealand’s EOI system were already in the country as temporary workers or international students, the report says, and 92 per cent already had a job or job offer. The EOI is an opportunity to facilitate and expedite intracompany transfers and referrals from branches overseas, it said. The report also recommends that Ottawa follow other countries in using the EOI to accommodate employers with low and semi-skilled labour needs through “prioritization rules.” As much as employers want to hire Canadians first, Hjartarson said, labour mobility remains an issue. “Sudbury needs caregivers and there are potential Canadian workers, but they are not willing to move there. That’s the reality,” Hjartarson said. The chamber of commerce, in partnership with the Ontario Ministry of Citizenship and Immigration, surveyed employers across the province last year. It found 30 per cent of Ontario businesses experienced difficulty filling a job within the past 18 months because they could not find someone with the right qualifications. Read more about:
{ "perplexity_score": 303.3, "pile_set_name": "OpenWebText2" }
Seven arrested for human trafficking in Udupi The police arrested seven persons on the charge of being involved in human trafficking and rescued two women at Heri Kudru village, coming under Kundapur police station limits, at around 7.30 p.m. on January 13. The Kundapur police said on Monday that acting on a tip off, a police team arrested the accused and rescued the two women. All nine of them were travelling in a Tempo Traveller vehicle, headed towards Goa, when they were apprehended by the police at Heri Kudru village on National Highway 66. A case under the Immoral Traffic (Prevention) Act 1956 was registered at the Kundapur police station. Interim Bail All nine were produced before court at Kundapur on Monday. The seven accused got an interim bail, while the two women were sent to the State Home. “We are on the look-out for two more persons for their involvement in the case,” the police said.
{ "perplexity_score": 295.2, "pile_set_name": "Pile-CC" }
Dave Friedland — NJ State Senator and lawyer for Tony Pro — grew up a couple of blocks away from where I lived as a kid on Reservoir Ave. My uncle was friendly with Hoboken’s Martin Casella, who got locked up for — among many other things — plotting to kill John Gotti. As might be imagined, in this environment people tended not to be judgmental. Don Corleone’s “…how a man makes his living is none of my business” was something we all very well knew years before seeing the movie. One day during supper it occurred to me that there was an exception: spaghetti sauce in a jar. My mother would get visibly upset at the mere mention of the stuff, describing its use as a sin. Hearing the little oof sound when the Ragu cap’s seal gives way, I still feel guilty that I don’t spend all Saturday cooking up a pot of home made. One of my favorite memories of early-60s summers in the Jersey City Heights is going out first thing in the morning to get the paper and smelling all the cooking already well underway up and down the block. In that era before air conditioning, some grandmothers would wake up at dawn to get a jump on the preparation of dinner. This way, they avoided most of the use of the oven and range during the hottest part of the day. There will be a reading from BLACK TOM on Sunday, March 11th at 1pm in the Blue Comet Auditorium at Liberty State Park. Author Patrice Hannon will read from her novel about Jersey City and the terrible events of the Black Tom explosions. The reading will be followed by a book signing where patrons may buy a copy or bring their own to be signed by the author. Ms. Hannon is the author of BLACK TOM: A NOVEL OF SABOTAGE IN NEW YORK HARBOR, DEAR JANE AUSTEN: A HEROINE’S GUIDE TO LIFE AND LOVE (Plume, 2007), and 101 THINGS YOU DIDN’T KNOW ABOUT JANE AUSTEN (Adams Media, 2007). The last won the Jane Austen’s Regency World Award for “Best New Regency Know-How Book,” presented by The Jane Austen Centre in Bath. Patrice holds a B.A. from Saint Peter’s College and a Ph.D. from Rutgers University, both in English. During her nine years of full-time college teaching, she taught Austen’s novels and the works of other great writers to hundreds of students at several colleges, including Rutgers, Vassar College, and The Richard Stockton College of New Jersey. She has also taught literature classes at Makor, a branch of the 92nd Street Y in New York, and at The Morgan Library, where she was invited to lead the museum’s first reading group, initiated in conjunction with its stunning exhibition, “A Woman’s Wit: Jane Austen’s Life and Legacy.” The Federal prison system allows Native American Indian prisoners to conduct appropriate religious ceremonies. I joined their “movement” and was inducted as a member of their 12 man tribe at a institution in Florida. We were allowed to build 3 tepees — each for 4 Indians-on the side of the athletic field. Our 12 man tribe also built a sweat lodge, and fires to purify our spirits. Three of our members were Hells Angels-two Jews-two Black Panthers-the rest unknown. Each Tepee was permitted one turtle shell, one tom tom, red and white grease face and body paint, assorted feathers (from chickens) some ribbons, sage to burn, a peace pipe and corn cobs. Our request for bows and arrows, Spears, and Magic Mushrooms (Peyote), as well as a field trip to our sovereign /homelands- were all denied or never answered. One of our tribe was given an incident report when a guard thought we were smoking marijuana instead of sage in our peace pipe. Our ceremonies started on Saturday and concluded at 4pm on Sunday. So except for “the daily count” when we had to report to our cells-we were free to dance around in our war paint in front of our guards, whooping, purifying our spirits, helping the Sun rise and set, thumping our tom toms, and in general looking ridiculous. None of us were Native American Indians. I was the tribe Shaman -witch doctor-in charge of the turtle shell and other powerful totems and potions-responsible for returning these to the prison chaplain who had to file a form accounting for each turtle shell, feather etc. That all changed in 1987 when the Courts upheld restrictions on Indians -although they did not affect Jews-Christians-who continued to get wine for sacraments. I should add that I also registered as a member of the Jewish community-my Navajo name =Diyan Dawood. As the ’60s subsided and the ’70s ensued, the whole tenor of the numbers racket in Jersey City changed. Before, being a bookie to a large degree was a licensed profession. With the appropriate law enforcement tithing, arrests generally were avoided. And if someone with a badge saw themselves as the Hudson County Eliot Ness, judges were open minded — after the sight of an open wallet. This all changed when gambling cases began to go in front of Judge Lerner; suddenly jail time became expected instead of unknown. Locals in the biz thought that this was due to the state having started a legal lottery and so wanted to eliminate competition. And for an aftershock there was a police officer with the dream of retiring as the richest man in Puerto Rico. To reach this goal, he squeezed bookies — now no longer with any reason to be optimistic about a day in court — for all that they were worth. As this wasn’t enough to fund a grandiose retirement plan, the crooked cop then took over the numbers betting himself. This he did by locking up the bookies who’d paid for protection. The mobsters valued honor and so said nothing. Success didn’t satisfy the wayward policeman’s greed — if anything it increased it. A decade or so later there was big money to be had in cocaine and this seemed just as easy to grab as had been the illegal lottery. But this new environment’s compass was the law of the jungle, not the code of silence and the deceiver very quickly was himself deceived. Expecting to meet a “good” customer the holder of regal ambitions found himself greeted by a far from understanding group from the prosecutor’s strike force and was ordered by a superior officer to “empty your pockets.” The extended family of a significant Jersey City illegal numbers lottery figure like my uncle Gus enjoyed prosperity by association. Anyone out or work — or just experiencing a tight week — was welcome to bounce in for a substantial supper. As Gus made his rounds about Jersey City, Little Italy and even the entire Metro area, he’d stop at bakeries and fruit stands and buy whatever caught his eye. This might mean boxes full of delectables. On the way home, he’d make visits to his circle and present the items as gifts. Whatever he brought to the house, he’d send the dinner guests home with — along with a big plate of leftovers so they’d have something to put in their fridge. Before Christmas, everybody got two large babkas, one with cheese and one without, (I still remember the happy sight of those large light grey cardboard boxes.) and a container of chrusciki, the fried dough with powdered sugar Polish pastry. And for those without any income, there also was cash to be had. Students and others of the extended unemployed were able to expect an annual call. Gus would have a winning horse race ticket — either his or some Syndicate associate similarly allergic to declaring with the IRS. The tickets were cashed in the name of the financially challenged who then received 10% of the take as a thank you. www.thelincolnassociationofjerseycity.com The oldest such organization in the country dating back to the night of Lincoln’s death. Assisted in having the route of the Lincoln Highway marked in the County for the Highway’s 100th anniversary. Sponsors a presentation for the Lincoln High School Jr. ROTC of reenactors portraying the 26th US Colored Troops. On February 12 every year there is a ceremony at the monument on the Blvd. at the Park then a dinner at the Casino. Details are in the website. www.jclandmarks.org Founded by John Gomez, a teacher in Jersey City, they are interested in landmarking and preserving Jersey City’s architectural past. Members conduct walking tours in different sections of the City. Sponsor Preservation Month in May to give awards for preservation efforts in the City. www.hudsoncountynjgenealogy.org Family history oriented, they assist people looking for past records of their family. They also construct databases for general research. History articles in their blog. www.gwcsjc.org The George Washington Commemorative Society for the last 30 years has been involved with the preservation of the Apple Tree House near Bergen Square. It participates in ceremonies commemorating the Revolutionary War battle of Paulus Hook in Jersey City. On President’s Day they will be at the Apple Tree House at 11:00 AM. August 19 is the anniversary of the battle of Paulus Hook. The Paulus Hook Association usually sponsors a small parade and a presentation at the monument at Grand and Washington. www.gwcsjc.org The Morris Canal Greenway project in Jersey City which is waiting for funding .The canal reached here in 1836 and closed in 1924, you can walk the filled-in canal bed behind Country Village. The available funding allocated for this study of the Canal was used in planning the project. The proposal for the actual construction of the pathways and greenways did not receive the expected funding in 2014. We hope to have a tour in the Spring. Berry Lane Park along Garfield Ave. is built on part of it. More portions can be seen behind Tsigonia Paints on Communipauw Ave. www.lincolnhighwayassoc.org The Lincoln Highway, 100 years old in 2013, ran along Kennedy Blvd from Union City through Jersey City making a turn to the West through Lincoln Park and out to San Francisco. You can see pictures of some of the cars on the Centennial Tour on the website for the Lincoln Association of Jersey City that is mentioned above. www.njcivilwar150.org Celebrating the 150th anniversary of the Civil War and the contribution of NJ residents. Several books have been published and are available online. The official commemoration is now complete so I don’t know if there will be updates or how long the publications will be available. www.officialnj350.com The official website to commemorate the 350th year of New Jersey. In addition, if you GOOGLE “jersey city african american museum”, you will go to a Jersey City site that will then get you to an interesting site operated by local computer expert, history buff, and book exchanger, Anthony Olszewski. The museum is the only museum in Jersey City, the other City sponsored museum is closed due to funding problems. My father told me that in all the years he served as an Assemblyman he was not able , not once, to get any of the Bills he sponsored released from committee , much less voted upon. When I was first elected, I was determined to break the back of that system. For most of pre-modern New Jersey, the Senate was controlled by Republicans. There were 21 counties and 21 Senators. The smallest county, Cape May had 58,000 or so voters. The Senate Republican Caucus was ruled over by Senator Hap Farley. He needed only 7 votes from the 7 Southern Counties to block all legislation. His 7 Senatorial votes were elected by voters in Counties having in total less population than Essex and Hudson combined. Thus for most of the history of New Jersey , it was impossible for the large urban areas to get any legislation passed. The minimum wage, and most legislation granting urban aid, languished while bill after bill passed appropriating money to kill Gypsy Moths, or to build highways, or schools in the Southern Counties. That is how the Republicans held on to their power. As you know in 1963-1964 I started the One Man One Vote case that changed all that. I was a young lawyer. I asked Chris Jackman (who was then a client of our law firm) to serve as Plaintiff. He hesitated, fearing to look ridiculous. In the days following the filing of the lawsuit, we were ridiculed in the State Newspapers. The Jersey Journal and Star Ledger carried comments by some of the State’s most prominent attorneys claiming that my lawsuit was frivolous foolish vexatious litigation instituted by a boy lawyer. They opined that I had NO chance of winning. After all New Jersey had the little federal system. How could a Court possibly declare unconstitutional the very system permitted for federal elections? Jackman twice threatened to withdraw. Later he claimed the suit was his own idea. I argued the suit before the New Jersey Supreme Court. I left feeling like a nudist in a mosquito colony punctured by the Courts deft questions, I was deflated and certain I had lost. The Chief Justice called my father and congratulated him “You should be proud of your son, Jake- he made an excellent argument” I called the Chief the following day to complain. I told him that I was very upset that he said I had done well. He asked “Why?” I said ” Mr. Chief Justice, when I left the Court, I was depressed. I went home. I told my wife that I done miserably and certainly lost the case and as a result ruined my career. Beth never questions my legal opinions. Now my father will tell her about your call. My wife will never trust my opinions again. He laughed. Shortly after the argument the Senate adopted a weight voting rule. Under it, we would still have 21 Senators but some Senators would have twice or even three times the vote of others. I filed another suit to have that declared unconstitutional. The Chief asked me to describe the progress of the Legislature in obeying the Court’s Mandate. I said ” Chief Justice, the legislature has not moved forward, nor has it moved backwards. It moved sideways, slowly…. like a crab!” The Court declared the weighted voting system unconstitutional. The rest is history. Both houses of the legislature were redistricted. The Senate was increased to 40. Hudson received additional assemblymen and senators. For the first time in New Jersey’s History the large urban counties had legislative power and shortly took control of the assembly with Maurice Brady (another of my clients ) as Speaker. The suit actually changed the dynamics of South Jersey politics as well and in recent years Democrats were elected in counties that had never failed to elect republicans. Indeed many of the Democrats who later castigated me for the deal I made with Tom Kean, were elected to seats created by the suit I brought. Hap Farley era had ended forever. Or so I thought! I reintroduced updated versions of most of the bills my father had fought for unsuccessfully during his 12 year stint in the legislature, including a number of my own. And waited. I could not get my bills out of committee for a vote. Maury Brady , my own client, and Speaker would not allow my bills to be voted upon. So, I did the unthinkable. I challenged and then upbraided the Speaker publicly, and literally caused parliamentary chaos. It became so heated, Brady complained to Kenny. Kenny called me into the hospital. Asked me what I was doing. I told him. He laught. He said “Go for it kid! The result? Bill Musto reintroduced some of my bills under his own name, and allowed me to cosponsor them. They passed! In or about the same time I was retained by Lenny Bruce to argue the appeal of his conviction for pornography in New York. He wanted me to argue that the only word in his act that was NOT obscene was the word “mother-fucker” He said he uttered it in the idiom of the negroes, and as such it was a term of affection. He told me. “The only word in my act that is obscene is the word ‘BUT’. It is the universal subtractor. It denies meaning whenever it is used. I love you….but. I would do that for you but……..” The Jersey City Heights being what it is, Bryna Raeburn is perhaps best remembered here as the Josephine XV who did the follow-up record to They’re Coming to Take Me Away, Ha-Haaa! Bryna Raeburn lived one block away from us. One day while waiting for a taxi at Journal Square, my mother noticed Bryna at the end of the line and so suggested that she ride with us. In the cab, my mother asked Bryna Raeburn about her work. What followed was like a daytime seance with a multitude of different voices filling the air.
{ "perplexity_score": 388.3, "pile_set_name": "Pile-CC" }
Sign of the Beefcarver in Dearborn closes Ann Zaniewski | Detroit Free Press The Sign of the Beefcarver on Michigan Avenue in Dearborn is closing Monday after more than 50 years of serving up freshly sliced roast beef and other comfort foods. Employees were told at a meeting Monday morning that the day would be the restaurant's last, manager Russell Talbert said. "We were happy to be here for as long as we were," Talbert told the Free Press. "We’re sorry for all the customers that are finding out this way. There’s a lot of people that have been coming here since they were kids." Talbert said declining business is to blame for the closure of the eatery that opened in the 1960s. "We’re just losing business. We couldn’t keep the business up. ... For me personally, I do the books at night, I can see that we’re not making a lot of money," he said. "For a lot of other people, it came as a shock." A message to the restaurant's corporate offices was not immediately returned. Read more: The Sign of the Beefcarver, a chain of American-themed cafeteria-style restaurants with waitress service, began in 1957, according to its website. There were once several locations in metro Detroit. The only other remaining location, on Woodward Avenue in Royal Oak, is scheduled to remain open. On yelp.com, the 20 reviews of the Dearborn location earned it 4 out of 5 stars. "I've been coming here since I was a kid and the food has always been amazing," one Dearborn woman wrote Saturday in its most recent review. "Roast beef dinner with mashed potatoes is my go-to." It's unclear whether any of the Dearborn restaurant's 30 to 35 employees will be offered jobs at the Royal Oak location. Talbert said the owners of the restaurant have sold the building. There are plans to redevelop the site into a strip mall, he said. The phone at the restaurant was ringing like crazy once people learned about the closure through social media, Talbert said. Talbert marked the restaurant's final day by enjoying a plate of roast beef. "I'll miss that," he said. Contact staff writer Ann Zaniewski at 313-222-6594 or [email protected]. Follow her on Twitter: @AnnZaniewski.
{ "perplexity_score": 318.6, "pile_set_name": "OpenWebText2" }
Getting School Essays law essay writing services uk How is The Greatest Low-cost Essay Writing Services Supplier in the Australian Marketplace? The vast majority of pupils had mba essay writing services been able to consider university courses with no leaving their higher faculty campus by means of the concurrent enrollment model, which makes use of college-accepted high university instructors to instruct higher education classes. In excess of 3-quarters (seventy seven%) of twin enrollment college students have been taught at secondary college spots, such as profession centers run by the general public faculty system. At 89% per cent of large faculties the place educational higher education programs are offered on internet site, substantial school instructors deliver some or all of the higher education courses.The greater part of learners compose their position papers to express an opinion on the topic and overlook the opportunity to check out a contrasting viewpoint. It helps make the whole analysis one particular-sided, whilst you may possibly want to find out the opposite assertion. You do not need to have to modify your situation to satisfy the audience, just make certain you comply with the task. Generate an Buy – Inserting an buy is Original. Place in all the details of your paper and wait for the bids to look. The tale often has a moral Demonstrate how you use creative imagination to solve and find solutions to issues Place Report Read through out the content material extensively. Study every single solitary and little thing integrated in the references. This can help you a lot more in writing the exceptional bibliography in Vancouver Type. The structure of the bibliography requirements to be followed in the chronological get. Why Decide on Us – a bulleted listing – why need to the agency decide on your firm? Stylewriter by Editor Software (Windows) An individual to write my philosophy composing all best essay writing service online current varieties of them need help college students. Why do you need to get university papers from specialist writers? This is a concern that most students ask when searching for a custom made essay producing support to assist them publish top quality essays, research papers, term papers, capstone and dissertation for their university assignments. It is important to efficiently comprehensive your university schooling in buy essay writing services uk to be confident a vibrant foreseeable future and effectively-being. Unfortunately, university amount schooling is not for the faint hearted, but for the sturdy willed who can endure tough assignments and race towards limited deadlines. Our University Paper Creating Aid is the ideal choice for you if you are in such a predicament. See More on Journal Insights A scholar with component time employment can’t feasible take time out for investigation. deal with demanding and essential issues with the potential for lengthy-time period and real-planet impact What indicators or indicators do you discover that advise that you are not like other children? Mail surveys are a expense powerful technique of accumulating data. They are best for large sample measurements, or when the sample arrives from a extensive geographic region. They price a tiny considerably less than phone interviews, nevertheless, they get more than 2 times as extended to full (eight to twelve weeks). Due to the fact there is no interviewer, there is no likelihood of interviewer bias. The main downside is the inability to probe respondents for more thorough details. Literature overview. This is a possibility to speak about the areas of study you are heading to be endeavor. Point out the key books or publications you will be using. You have to spend your weekly HAP hire contribution to the neighborhood authority – if not, the neighborhood authority will quit paying out your landlord Dedicated London-dependent educational consultants accessible in man or woman or by mobile phone or e-mail to support you Began by: hkrstu accomplished research or results, arguments websites to write essays introduced in scientific literature the typical bibliographic information about the textual content compose in the right format for your referencing design as you go alongside – this will be really valuable when you come to produce the final bibliography Analyze the visual very carefully and thoroughly. Begin your essay with a sentence or two about the creator, the date and title of the textual content, the situation for which the text was written, and the common topic of the document. In a footnote or endnote, provide a full citation for the textual content (see beneath). You may possibly offer you a very transient statement about the writer at the time for the duration of which websites for essays the textual content was written. In your introductory paragraph, present a transient summary of your interpretation of the author’s point of view, strategy, and purpose in creating the textual content. The summary may possibly have a collection of statements that guide up to your thesis statement. You do not need to have to describe the process of critical analysis your essay need to existing the benefits of that process. Speak to the consumer support associates before buying a paper on the internet. Spend focus to the way they reply to your queries. Do they appear dependable? You’ll recognize that the reliability of the assistance program is an crucial part of every essay producing services evaluation. That is because you cannot get continual updates on the development or revisions if the website does not supply rock-strong assist. Productive material essay writing sites uk based on an authentic research March 2016 (four) Get inexpensive essay aid as we know the financial circumstances of the college students specifically Web pages start off at $eighteen 36. IIM (Ahmedabad) We are constantly on time. Possessing redirected your vital or urgent jobs to our specialists, you can be certain: by the appointed time, you will get what you need with no any reminders or delays. We benefit your time. Giving our essay writing assist, we aim at creating a significant contribution to your academic development, which means we will simplify your load. Our clients have the time necessary to seem it by means of, ask for revisions (if required) and discover the content. “Martin Luther King’s position in the group was beneath fireplace.” (Casey Kuklick) First assist places and procedures in the occasion of hearth and other emergencies Find out significance of preserving complete, detailed, and exact documentation and when and how to apply that expertise. This system essay writing service uk follows up on the IT Assist Troubleshooting training course by delving further into the scenario management method and figuring out the key problems that need to have to be documented all through the evolution of a circumstance. You will understand the reasons why documentation is so vital in the field of IT Support, the various varieties of concerns to ask, and why it is so critical to seize all viewpoints in circumstance documentation, from the support agent, to the buyer, and to any other inside resource who may get involved. Our initial difference is regardless of whether the examine is analytic or non-analytic. A non-analytic or descriptive examine does not try out to quantify the relationship but attempts to give us a photo of what is taking place in a inhabitants, e.g., the prevalence, incidence, or encounter of a team. Descriptive scientific studies consist of scenario reviews, scenario-series, qualitative research and surveys (cross-sectional) research, which measure the frequency of many aspects, and hence the size of the difficulty. They may possibly at times also contain analytic operate (comparing elements “” see below). Write my coursework happens to be a single of the most searched phrases academic writing services uk on the internet as students of all tutorial levels look for help in the composing of their coursework. The moment you uncover yourself asking this concern, get an specialist from our web site to help you in the writing of your coursework. Getting expert coursework writers that have labored on quite a lot of coursework papers for students is anything that makes it really straightforward for us to supply this kind of solutions to students in a hitchless manner. Views and statements this sort of as “who will write my coursework” need to thus not disturb you any more. This is the right and only trustable and reputable system that you’ll really get support in the writing of your coursework. Corporate Finance Analyst Income and Occupation Description So, you have got done the function and what is being is simply to edit, nevertheless you are more and more becoming charged an arm and a leg to own your perform modified? We will not provide you with site that writes essays for you any one particular of that pressure, because we acknowledge that you have truly restricted economic electricity presented that you will be nonetheless education. Therefore, simply because we recognize your economic placement, we now have personalized our enhancing companies to match your investing prepare. Our firm is incredibly inexpensive, that must make us your editors of desire. Our papers are composed by Ph.D. professionals, who are ready to meet even rigid deadlines. There are thousands of grateful testimonies around the net about our creating business, and we preserve escalating that variety constantly. The amount of our normal buyers is absolutely wonderful, and we want you to be the element of our family. Spot your get today and get your paper delivered in time. Charging Administrative/Clerical and Programmatic Income Charges (Sections and ) Final Report: You need to get ready a meeting-type report on your undertaking with optimum quality essay writing services size of fifteen web pages (ten pt font or larger, one or two columns, 1 inch margins, one or double spaced — more is not much better). Your report must introduce and inspire the dilemma your undertaking addresses, explain associated perform in the spot, examine the elements of your remedy, and current results that evaluate the habits, efficiency, or functionality of your technique (with comparisons to other related techniques as suitable.) Follow your strict demands attempting to meet up with your expectations from the firm Because entire body paragraphs for an essay should be centered close to one particular primary notion that relates the thesis, generating a obvious matter sentence is valuable for equally the writer and the reader. For the writer, a matter sentence helps make it simpler to stay on subject matter and essay writing site develop the principal idea with no getting off keep track of. For the reader, subject sentences announce what the paragraph will be about and show how distinct paragraphs and suggestions are connected to every other. Have an individual read through your personal essay just before you send university essay writing service uk it. This is not just to “proof” it. Alternatively, it is to aid you understand what it is saying about you. Do not question your evidence reader if they favored it. A very good pal will likely inform that they do. You want genuine suggestions! Ask them to inform you the a few critical factors that it suggests about you, which includes why you want to grow to be a pharmacist. Make them level to in which these are articulated in your essay. At times we turn out to be too hooked up to the issues we compose. An exterior reader can give us a various see of what it is we are declaring. I search at tips recommended to me by 1000s, Best dependable essay Excellent good quality on the internet essay. Your goal earth inventory impact is an added issue you want with your not top essay writing services uk considerably if you at any time are seeking at large quality fantastic offer to aim. Unwell foundation and argue in opposition to a contemporary college in the summary.I look at concepts endorsed to me by many quantities, Greatest trustworthy essay Outstanding high quality on the net essay. Your intention entire world inventory perception is however one more motive you want in your nothing should you are thinking about specialist great deal to strategy. Unwell basis and argue versus a modern faculty on the resolution.
{ "perplexity_score": 816.7, "pile_set_name": "Pile-CC" }
More than 10,000 supporters of Humane Society International/Canada have signed a letter to British Columbia premier Christy Clark, asking her to ban the grizzly hunt. Photo by Ray Rafiti 897 shares It’s an image that millions of people who’ve watched it won’t soon forget: a majestic grizzly bear thrashing in confused agony as she tumbles down a hill, her blood smearing the snow, while the men who shot her cheer at the misery and suffering they’ve delivered. An investigator might have filmed the horrible spectacle to expose it and remind regular citizens what some people are capable of doing. But they filmed the bleeding animals themselves, as some sort of Kodak moment, which they’d presumably watch for pleasure in the years ahead. It’s become all too commonplace in the Canadian province of British Columbia, where the government allows trophy hunters to slaughter hundreds of grizzly bears a year — the biggest toll of grizzlies in all of North America. But according to reputable polls, more than 90 percent of B.C. residents oppose the trophy hunt of the province’s grizzlies. Because of that nearly unanimous opposition to this government-sanctioned policy, it may be the next thing that comes crashing down. B.C.’s provincial election is on May 9th, and the New Democratic Party, which is neck and neck with the governing Liberals in the polls, has promised to ban the trophy hunt of grizzly bears across the province if elected. Even the Liberals have made vague promises to look into ending the hunt in a portion of the grizzlies range – in the Great Bear Forest in the west of the vast province. More than 10,000 supporters of Humane Society International/Canada have signed a letter to B.C. premier Christy Clark, asking her to ban the hunt. And along with partner groups Pacific Wild, LUSH Cosmetics, and Wildlife Defence League, HSI/Canada participated in the delivery of over 70,000 signatures to the B.C. legislature this week, calling for a ban on grizzly bear trophy hunting. Many shot bears don’t succumb quickly to the hunters’ bullets. All too often, injured bears run off, suffering for hours before blood loss or shock or sepsis overcomes them. Perhaps most tragic is the fate of the countless bear cubs who slowly starve to death while they wait in their dens for their slaughtered mothers who will never return. British Columbia is home to the second largest grizzly bear population in the world, and grizzlies are an iconic species for both the province and for all of Canada. Every year, tourists from around the world flock to B.C.’s lush forests to participate in bear viewing expeditions, which have been shown to bring in up to 10 times more direct revenue to the province than trophy hunting. Bear viewing is a much larger industry than bear killing, and the latter business threatens the former. Bear viewing operations have noted that demand for bear viewing has grown to the point where they’re reaching capacity, but they cannot access the vast majority of grizzly bear territory, because most of it is set aside for trophy hunters. Furthermore, they point out that nobody wants to view a bear that they know is likely to be slaughtered for head and hide. The provincial government estimates that the grizzly populations number up to 15,000, but leading scientists from the University of Victoria and Simon Frasier University have been critical of the methods used to census bears. The actual count may be half the current estimate. Those same scientists also found that hunters were exceeding their kill quotas in half of the populations they studied. But even with current government estimates, we know that at least nine of the province’s 57 grizzly populations are threatened. It’s clear that this trophy hunt is not just poorly monitored and managed, but that there’s no compelling rationale for it whatsoever. From every angle one looks at the issue – whether it is animal welfare, conservation, or economics – it’s clear that there is no good reason for this hunt to continue. Let’s hope that after May 9, the party that commands the majority makes the decision that more than 90 percent of British Columbians polled want them to make: putting an end to the grizzly hunt, thereby reversing the damage done to the province’s economy and reputation.
{ "perplexity_score": 253.6, "pile_set_name": "OpenWebText2" }
Joachim Nitsche Joachim A. Nitsche (September 2, 1926 – January 12, 1996) was a German mathematician and professor of mathematics in Freiburg, known for his important contributions to the mathematical and numerical analysis of partial differential equations. The duality argument for estimating the error of the finite element method and a scheme for the weak enforcement of Dirichlet boundary conditions for Poisson's equation bear his name. Biography Education Nitsche graduated from school at Bischofswerda in 1946. Starting in summer 1947, he studied mathematics the University of Göttingen, where he received his Diplom (under supervision of Franz Rellich) after only six semesters. In 1951, he received his degree (Dr. rer. nat.) at the Technical University of Berlin-Charlottenburg (nowadays TU Berlin). After only two years, he received his Habilitation at the Free University of Berlin. Marriage and children In 1952, Nitsche married Gisela Lange, with whom he had three children. Professional career From 1955 to 1957, Nitsche held a teaching position at the Free University of Berlin, which he left for a position at IBM in Böblingen. He became professor at the Albert Ludwigs University of Freiburg in 1958 and received the chair for Applied Mathematics there in 1962. He remained in this position until he became emeritus in 1991. Works Contributions Quasi-optimal error estimates for the finite element method Point-wise error estimates for the finite element method Publications Praktische Mathematik, BI Hochschulskripten 812*, Bibliographisches Institut, Mannheim, Zurich, 1968. References Amann, H., Helfrich, H.-P., Scholz, R. "Joachim A. Nitsche (1926-1996)", Jahresbericht der Deutschen Mathematikervereinigung 99 (1997) 90-100. Category:1926 births Category:1996 deaths Category:20th-century German mathematicians Category:IBM employees
{ "perplexity_score": 118.9, "pile_set_name": "Wikipedia (en)" }