text
stringlengths 0
3.53M
| meta
dict |
---|---|
Man v. Food Season 5
Food lover, actor and restaurant business veteran Casey Webb is a new man and he is ready to taste the nation's most epic eats in the reboot of "Man v. Food." One of the most popular shows on Travel Channel, the series premieres on Monday, August 7 at 9:00 p.m. ET/PT with Webb as the lead man continuing the pursuit of gastronomic glory - and crisscrossing America to uncover tasty treats and tackle the country's iconic eating challenges. | {
"perplexity_score": 167.9,
"pile_set_name": "Pile-CC"
} |
1
of
7
Thai-Style Kohlrabi Stir-Fry
A close cousin of cabbage and kale, kohlrabi has a very distinct appearance—the large bulb (which looks like a root, but is actually a stem!) can be either green, white, or purple, and is crowned with spindly stalks that culminate in large, floppy leaves (it reminds us of the golden snitch from the Harry Potter movies).
The leaves and bulb are edible—the stalks are pretty tough, so discard them or save them for the compost pile. This Thai-inspired stir-fry showcases both the leaves and bulb. To make it vegan-friendly, swap out the fish sauce for soy. To make it gluten-free, swap soy for tamari.
Advertisement
Advertisement
2
of
7
Kohlrabi Fritters
If you’ve never tasted kohlrabi, this is the perfect recipe to start with! The kohlrabi bulb is starchy, so it grates into sturdy shreds that hold up well to pan-frying. A food processor makes this super easy, and you can even grate the kohlrabi in advance, because it doesn’t turn brown like potatoes.
Paired with a sweet and tangy mixture of sour cream and applesauce, this low-carb riff on latkes makes a great party appetizer.
3
of
7
Kohlrabi and Sausage Skillet
Call on your cast-iron skillet to whip up this one-dish dinner. Crunchy kohlrabi brings gut-friendly fiber to the table; lean turkey sausage delivers heart-healthy protein. If you’d like to tame down the heat and make this dish more kid friendly, pick up mild turkey sausage. Serve over your favorite mashed potatoes or quick-sauteed greens.
Advertisement
4
of
7
Roasted Kohlrabi With Savory Garlic Sauce
Upgrade your steak dinner game by adding this super-savory side. Don’t be scared of anchovy fillets; they’re a mega umami bomb that drenches these oven-tender kohlrabi wedges with rich flavor. When shopping for kohlrabi, choose bulbs that are firm and smooth; they’re the freshest.
5
of
7
Greek Stuffed Dolmades With Kohlrabi Slaw
Sturdy kohlrabi leaves stand in for the traditional grape leaves in this riff on the classic beef-and-rice stuffed Greek appetizer—and use the rest to make a delicious side slaw.
Although we love using brown rice whenever we can, it's important to use the quicker-cooking white rice here to retain moisture and keep the beef from overcooking. This process is a little time consuming for a weeknight, but it makes a fun weekend cooking project. Whip up the slaw while the dolmades are cooking so everything’s done on time.
6
of
7
Kohlrabi and Apple Quick Pickles
Upgrade your pickle game with these crunchy and zesty fast-fix pickles. Great for topping tacos, stir fries, salads, or snazzing up an appetizer board, these crunchy pickles deliver a pop of flavor to everyday dishes. Don’t be alarmed by the amount of sugar in this recipe—just a small amount gets absorbed by the pickles. If you have a mandolin, use it to slice the kohlrabi—it gets the job done much faster than a sharp knife. | {
"perplexity_score": 522.2,
"pile_set_name": "Pile-CC"
} |
Dell PowerEdge
The Dell PowerEdge (PE) line is Dell's server computer product line.
Most PowerEdge servers use the x86 architecture. The early exceptions to this, the PowerEdge 3250, PowerEdge 7150, and PowerEdge 7250, used Intel's Itanium processor, but Dell abandoned Itanium in 2005 after failing to find adoption in the marketplace. The partnership between Intel and Dell remained close, with Intel remaining the exclusive source of processors in Dell's servers until 2006. In May 2006 Dell announced that it also intended to develop servers using AMD Opteron processors.
The first Opteron-based PowerEdge systems, the PowerEdge 6950 and the PowerEdge SC1435, appeared in October 2006.
PowerEdge machines come configured as tower, rack-mounted, or blade servers. Dell uses a consistent chip-set across servers in the same generation regardless of packaging, allowing for a common set of drivers and system-images.
Original equipment manufacturers (OEMs) and value-added resellers also offer solutions based on PowerEdge servers. Loaded with custom software and with minor cosmetic changes, Dell's servers form the underlying hardware in certain appliances from IronPort,
Google,
Exinda Networks, and Enterasys.
In 2007 the PowerEdge line accounted for approximately 15% of Dell's overall revenue from computer-hardware sales. In subsequent years Dell made the transition from a pure hardware vendor to a solutions-provider and services company, as evidenced, for example, by the acquisition of Perot Systems and KACE Networks and the setup of a special global services department within Dell.
PowerEdge RAID Controller
Dell uses the name PowerEdge RAID Controller (PERC) for proprietary versions of its RAID computer storage controllers. The related software in the PERC Fault Management Suite offered facilities such as the Background Patrol read, which aims to fix bad sectors on online RAID disks running under some of the PERC controllers around 2006.
These cards were equipped with hardware from LSI Corporation or Intel, 256 MBytes of memory (upgradeable on the 5/i to 512 MB), support up to 8x SATA 3.0 Gbit/s drives without the use of expanders. They had an optional Battery Backup Unit (BBU) to allow more flexible use of the memory during writes, enhancing performance in RAID5 and 6, and operate over the PCI Express interface.
Chassis systems
Although PowerEdge is mainly used to refer to servers there are a few systems where the term PowerEdge refers to systems of which servers are (just) a part. Examples of these usages are:
PowerEdge M1000e - the Dell blade-server system where the complete system uses the term PowerEdge, and M1000e refers to the chassis and the complete combination of components in them. The individual non-server components have also their own name in their 'own' family such as PowerConnect M-switches or EqualLogic blade-SAN.
PowerEdge VRTX - the converged system consisting of (up to) 4 PowerEdge M-blade servers, the built-in storage solution and the I/O networking module.
Model naming convention
Since the introduction of the generation 10 servers in 2007 Dell adopted a standardized method for naming their servers; the name of each server is represented by a letter followed by 3 digits. The letter indicates the type of server: R (for Rack-mountable) indicates a 19" rack-mountable server, M (for Modular) indicates a blade server, while T (for Tower) indicates a stand-alone server.
This letter is then followed by 3 digits:
The first digit refers to the number of CPU sockets in the system: 1 to 3 for one socket, 4 to 7 for two sockets, and 9 for four sockets. 8 can be either two or four sockets depending on generation and CPU maker
The second digit refers to the generation: 0 for Generation 10, 1 for Generation 11, and so on.
The third digit indicates the maker of the CPU: 0 for Intel or 5 for Advanced Micro Devices (AMD).
For example: The Dell PowerEdge M610 was a two-socket server of the 11th generation using an Intel CPU while the R605 was a two-socket AMD-based rack-server of the 10th generation.
Prior to the Generation 10 servers, the naming convention was as follows:
First digit – Height of the server in rack units
Second digit – Generation of server (up to 9th generation)
Third digit – Server type (5 for rack server, 0 for tower server, although tower servers could be outfitted with a rack chassis)
Fourth digit – Indicated whether blade or independent box (5 for blade, 0 for normal independent box)
Example 1: PowerEdge 2650 (
2 = 2U server,
6 = 6th generation,
5 = rack server,
0 = normal )
Example 2: PowerEdge 6950 (
6 = 4U server,
9 = 9th generation,
5 = rack server,
0 = normal )
Example 3: PowerEdge 2800 (
2 = [based on] 2U server 2850,
8 = 8th generation,
0 = tower server,
0 = normal )
Example 4: PowerEdge 1855 (
1 = 1U server,
8 = 8th generation,
5 = rack server,
5 = blade )
Most servers had a tower equivalent. For example, the PowerEdge 2800 was the tower equivalent of the 2850. The naming applies to the tower version too, but the tower version will usually be between 5U and 6U.
See also
List of Dell PowerEdge Servers
References
External links
Dell Server Documentation
Using a PowerEdge tower on its side in a rack
Review Dell PowerEdge R810
Review Dell PowerEdge R815
PowerEdge
Category:Server hardware
PowerEdge | {
"perplexity_score": 502.9,
"pile_set_name": "Wikipedia (en)"
} |
Raman microscopy and X-ray diffraction, a combined study of fibrillin-rich microfibrillar elasticity.
Fibrillin-rich microfibrils are essential elastic structures contained within the extracellular matrix of a wide variety of connective tissues. Microfibrils are characterized as beaded filamentous structures with a variable axial periodicity (average 56 nm in the untensioned state); however, the basis of their elasticity remains unknown. This study used a combination of small angle x-ray scattering and Raman microscopy to investigate further the packing of microfibrils within the intact tissue and to determine the role of molecular reorganization in the elasticity of these microfibrils. The application of relatively small strains produced no overall change in either molecular or macromolecular microfibrillar structure. In contrast, the application of larger tissue extensions (up to 150%) resulted in a markedly different structure, as observed by both Raman microscopy and small angle x-ray scattering. These changes occurred at different levels of architecture and are interpreted as ranging from alterations in peptide bond conformation to domain rearrangement. This study demonstrates the importance of molecular elasticity in the mechanical properties of fibrillin-rich microfibrils in the intact tissue. | {
"perplexity_score": 275.2,
"pile_set_name": "PubMed Abstracts"
} |
Q:
Crossfilter producing negative values with positive dataset when sorting data
I am using crossfilter wrong but cannot spot where.
I have a dataset which I am filtering. When I supply a sorting function to sort the data by day of the week, the result displays negative values.
If I skip the sorting, everything works as it should.
The data looks something like this
dataEg=[{"attr1": "A", "date":" Thu Apr 12 2018 00:00:00 GMT+0100 (BST)", "attr2": "a", "attr3": 25.11, "dayOfWeek": "Thu"},
{"attr1": "B", "date":" Sun Apr 01 2018 00:00:00 GMT+0100 (BST)", "attr2": "b", "attr3": 6.67, "dayOfWeek": "Sun"}];
I use crossfilter to select by attribute
var crossFilter = (function () {
var filter = {};
filter.ndx = crossfilter(dataEg);
filter.attr2Dim = filter.ndx.dimension(function (d) { return d.attr2; });
filter.dayOfWeekDim = filter.ndx.dimension(function (d) { return d.dayOfWeek; });
filter.attr1Dim = filter.ndx.dimension(function (d) { return d.attr1; });
filter.costPerDayOfWeek = filter.dayOfWeekDim.group().reduceSum(function (d) { return d.attr3; });
filter.costPerattr2 = filter.attr2Dim.group().reduceSum(function (d) { return d.attr3 });
filter.costPerattr1 = filter.attr1Dim.group().reduceSum(function (d) { return d.attr3 });
return filter;
})();
When filtering for some atteribute
crossFilter.attr1Dim.filter(function (d) {
return d === "B";
});
everything works unless I sort the date by day first using this filter
function DaySorter (keyLocator) {
if (keyLocator === undefined) {
keyLocator = function (item) {
return item;
};
}
return function (a, b) {
var order = {
"Mon": 0, "Tue": 1, "Wed": 2, "Thu": 3, "Fri": 4, "Sat": 5, "Sun": 6
};
var aVal = order[keyLocator(a)];
var bVal = order[keyLocator(b)];
var comp = 0;
if (aVal > bVal) {
comp = 1;
}
else if (aVal < bVal) {
comp = -1;
}
return comp;
};
}
However, I do not see where I am making a mistake. The filter seems to work correctly and follows the documentation.
A minimal JSFiddle can be found here.
A:
Finally found the problem.
I was sorting the data in the chart so that it is displayed in the order of the Day of Week. However, this somehow interfered with the interals of CrossFilter.
Doing a deep copy of the data before sorting it in the chart solved the problem (here using JQuery).
data =[];
$.extend(true, data, dataOrg); | {
"perplexity_score": 1836.4,
"pile_set_name": "StackExchange"
} |
Hamstead Lock
Hamstead Lock is a lock on the Kennet and Avon Canal, at Hamstead Marshall between Kintbury and Newbury, Berkshire, England.
The lock has a rise/fall of 6 ft 5 in (1.96 m).
It is a grade II listed building.
References
See also
Locks on the Kennet and Avon Canal
Category:Grade II listed buildings in Berkshire
Category:Locks on the Kennet and Avon Canal
Category:Locks of Berkshire
Category:Grade II listed canals | {
"perplexity_score": 89.5,
"pile_set_name": "Wikipedia (en)"
} |
Marko Klasinc
Marko Klasinc (born 14 May 1951) is Slovenian chess problemist.
He composed almost 200 chess problems, mostly heterodox and retrograde ones (12 included in FIDE Album). He has title FIDE solving master and international judge of FIDE for chess composition. As a good solver he represented Yugoslavia 1982 in Varna, where the team became World Champion solving chess problems.
He is the president of Committee for Chess Compositions of Chess Federation of Slovenia.
References
Notes
Bibliography
Drinovec, Aleš (editor). Slovenski šah. Šahovska zveza Slovenije, Ljubljana 2002.
External links
Website
PDB Server
Category:1951 births
Category:Living people
Category:Chess composers
Category:International Judges of Chess Compositions
Category:Slovenian chess players | {
"perplexity_score": 77.1,
"pile_set_name": "Wikipedia (en)"
} |
In a storage area network (SAN), remote computer storage devices such as disk arrays can be made accessible to host computers so that the storage devices appear as if they are locally attached to the host computer's operating system. SANs may be implemented using Small Computer System Interface (SCSI) storage devices, in which SCSI protocol entities perform input/output (I/O) operations (e.g., data reads and writes) and are exposed through a unique identifier such as a logical unit number (LUN) on a path. A given LUN typically corresponds to a logical volume, and may be represented within the host computer's operating system as a device. Interaction with a LUN is initiated by a SCSI initiator port on a host computer, which can issue various I/O request types to the LUN on a target data storage device.
The description above is presented as a general overview of related art in this field and should not be construed as an admission that any of the information it contains constitutes prior art against the present patent application. | {
"perplexity_score": 150.2,
"pile_set_name": "USPTO Backgrounds"
} |
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
import com.adobe.test.Assert;
// var SECTION = "RegExp";
// var VERSION = "as3";
// var TITLE = "https://bugzilla.mozilla.org/show_bug.cgi?id=550269";
// CVE-2008-0674: large number of characters with Unicode code points greater than 255
var utf8RegExp:String = "[^ABCDEFGHIJKLMNOPQRSTUVWXYZÀÃÂÃÄÅÆÇÈÉÊËÌÃÃŽÃÃÑÒÓÔÕÖØÙÚÛÜÃÞĀĂĄĆĈĊČĎÄÄ’Ä”Ä–Ä˜ÄšÄœÄžÄ Ä¢Ä¤Ä¦Ä¨ÄªÄ¬Ä®Ä°Ä²Ä´Ä¶Ä¹Ä»Ä½Ä¿ÅŃŅŇŊŌŎÅŒŔŖŘŚŜŞŠŢŤŦŨŪŬŮŰŲŴŶŸŹŻŽÆƂƄƆƇƉƊƋƎÆÆƑƓƔƖƗƘƜÆÆŸÆ Æ¢Æ¤Æ¦Æ§Æ©Æ¬Æ®Æ¯Æ±Æ²Æ³ÆµÆ·Æ¸Æ¼Ç„Ç‡ÇŠÇÇÇ‘Ç“Ç•Ç—Ç™Ç›ÇžÇ Ç¢Ç¤Ç¦Ç¨ÇªÇ¬Ç®Ç±Ç´Ç¶Ç·Ç¸ÇºÇ¼Ç¾È€È‚È„È†ÈˆÈŠÈŒÈŽÈÈ’È”È–È˜ÈšÈœÈžÈ È¢È¤È¦È¨ÈªÈ¬È®È°È²ÈºÈ»È½È¾ÉΆΈΉΊΌΎÎΑΒΓΔΕΖΗΘΙΚΛΜÎÎžÎŸÎ Î¡Î£Î¤Î¥Î¦Î§Î¨Î©ÎªÎ«Ï’Ï“Ï”Ï˜ÏšÏœÏžÏ Ï¢Ï¤Ï¦Ï¨ÏªÏ¬Ï®Ï´Ï·Ï¹ÏºÏ½Ï¾Ï¿Ð€ÐЂЃЄЅІЇЈЉЊЋЌÐÐŽÐÐБВГДЕЖЗИЙКЛМÐОПРСТУФХЦЧШЩЪЫЬÐÐ®Ð¯Ñ Ñ¢Ñ¤Ñ¦Ñ¨ÑªÑ¬Ñ®Ñ°Ñ²Ñ´Ñ¶Ñ¸ÑºÑ¼Ñ¾Ò€ÒŠÒŒÒŽÒÒ’Ò”Ò–Ò˜ÒšÒœÒžÒ Ò¢Ò¤Ò¦Ò¨ÒªÒ¬Ò®Ò°Ò²Ò´Ò¶Ò¸ÒºÒ¼Ò¾Ó€ÓÓƒÓ…Ó‡Ó‰Ó‹ÓÓÓ’Ó”Ó–Ó˜ÓšÓœÓžÓ Ó¢Ó¤Ó¦Ó¨ÓªÓ¬Ó®Ó°Ó²Ó´Ó¶Ó¸Ô€Ô‚Ô„Ô†ÔˆÔŠÔŒÔŽÔ±Ô²Ô³Ô´ÔµÔ¶Ô·Ô¸Ô¹ÔºÔ»Ô¼Ô½Ô¾Ô¿Õ€ÕÕ‚ÕƒÕ„Õ…Õ†Õ‡ÕˆÕ‰ÕŠÕ‹ÕŒÕÕŽÕÕՑՒՓՔՕՖႠႡႢႣႤႥႦႧႨႩႪႫႬá‚ႮႯႰႱႲႳႴႵႶႷႸႹႺႻႼႽႾႿჀáƒáƒ‚ჃჄჅḀḂḄḆḈḊḌḎá¸á¸’ḔḖḘḚḜḞḠḢḤḦḨḪḬḮḰḲḴḶḸḺḼḾṀṂṄṆṈṊṌṎá¹á¹’ṔṖṘṚṜṞṠṢṤṦṨṪṬṮṰṲṴṶṸṺṼṾẀẂẄẆẈẊẌẎáºáº’ẔẠẢẤẦẨẪẬẮẰẲẴẶẸẺẼẾỀỂỄỆỈỊỌỎá»á»’ỔỖỘỚỜỞỠỢỤỦỨỪỬỮỰỲỴỶỸἈἉἊἋἌá¼á¼Žá¼á¼˜á¼™á¼šá¼›á¼œá¼á¼¨á¼©á¼ªá¼«á¼¬á¼á¼®á¼¯á¼¸á¼¹á¼ºá¼»á¼¼á¼½á¼¾á¼¿á½ˆá½‰á½Šá½‹á½Œá½á½™á½›á½á½Ÿá½¨á½©á½ªá½«á½¬á½á½®á½¯á¾¸á¾¹á¾ºá¾»á¿ˆá¿‰á¿Šá¿‹á¿˜á¿™á¿šá¿›á¿¨á¿©á¿ªá¿«á¿¬á¿¸á¿¹á¿ºá¿»abcdefghijklmnopqrstuvwxyzªµºßà áâãäåæçèéêëìÃîïðñòóôõöøùúûüýþÿÄăąćĉċÄÄđēĕėęěÄğġģĥħĩīÄįıijĵķĸĺļľŀłńņňʼnŋÅÅőœŕŗřśÅşšţťŧũūÅůűųŵŷźżžſƀƃƅƈƌƃƕƙƚƛƞơƣƥƨƪƫÆưƴƶƹƺƽƾƿdžljnjǎÇǒǔǖǘǚǜÇǟǡǣǥǧǩǫÇǯǰdzǵǹǻǽǿÈȃȅȇȉȋÈÈȑȓȕȗșțÈȟȡȣȥȧȩȫÈȯȱȳȴȵȶȷȸȹȼȿɀÉɑɒɓɔɕɖɗɘəɚɛɜÉÉžÉŸÉ É¡É¢É£É¤É¥É¦É§É¨É©ÉªÉ«É¬ÉɮɯɰɱɲɳɴɵɶɷɸɹɺɻɼɽɾɿʀÊʂʃʄʅʆʇʈʉʊʋʌÊÊŽÊÊʑʒʓʔʕʖʗʘʙʚʛʜÊÊžÊŸÊ Ê¡Ê¢Ê£Ê¤Ê¥Ê¦Ê§Ê¨Ê©ÊªÊ«Ê¬ÊʮʯÎάÎήίΰαβγδεζηθικλμνξοπÏςστυφχψωϊϋόÏÏŽÏϑϕϖϗϙϛÏϟϡϣϥϧϩϫÏϯϰϱϲϳϵϸϻϼабвгдежзийклмнопрÑтуфхцчшщъыьÑÑŽÑÑёђѓєѕіїјљњћќÑўџѡѣѥѧѩѫÑѯѱѳѵѷѹѻѽѿÒÒ‹ÒÒÒ‘Ò“Ò•Ò—Ò™Ò›ÒÒŸÒ¡Ò£Ò¥Ò§Ò©Ò«ÒүұҳҵҷҹһҽҿӂӄӆӈӊӌӎӑӓӕӗәӛÓÓŸÓ¡Ó£Ó¥Ó§Ó©Ó«ÓÓ¯Ó±Ó³ÓµÓ·Ó¹ÔÔƒÔ…Ô‡Ô‰Ô‹ÔÔÕ¡Õ¢Õ£Õ¤Õ¥Õ¦Õ§Õ¨Õ©ÕªÕ«Õ¬ÕÕ®Õ¯Õ°Õ±Õ²Õ³Õ´ÕµÕ¶Õ·Õ¸Õ¹ÕºÕ»Õ¼Õ½Õ¾Õ¿Ö€Öւփքօֆևᴀá´á´‚ᴃᴄᴅᴆᴇᴈᴉᴊᴋᴌá´á´Žá´á´á´‘ᴒᴓᴔᴕᴖᴗᴘᴙᴚᴛᴜá´á´žá´Ÿá´ ᴡᴢᴣᴤᴥᴦᴧᴨᴩᴪᴫᵢᵣᵤᵥᵦᵧᵨᵩᵪᵫᵬáµáµ®áµ¯áµ°áµ±áµ²áµ³áµ´áµµáµ¶áµ·áµ¹áµºáµ»áµ¼áµ½áµ¾áµ¿á¶€á¶á¶‚ᶃᶄᶅᶆᶇᶈᶉᶊᶋᶌá¶á¶Žá¶á¶á¶‘ᶒᶓᶔᶕᶖᶗᶘᶙᶚá¸á¸ƒá¸…ḇḉḋá¸á¸á¸‘ḓḕḗḙḛá¸á¸Ÿá¸¡á¸£á¸¥á¸§á¸©á¸«á¸á¸¯á¸±á¸³á¸µá¸·á¸¹á¸»á¸½á¸¿á¹á¹ƒá¹…ṇṉṋá¹á¹á¹‘ṓṕṗṙṛá¹á¹Ÿá¹¡á¹£á¹¥á¹§á¹©á¹«á¹á¹¯á¹±á¹³á¹µá¹·á¹¹á¹»á¹½á¹¿áºáºƒáº…ẇẉẋáºáºáº‘ẓẕẖẗẘẙẚẛạảấầẩẫáºáº¯áº±áº³áºµáº·áº¹áº»áº½áº¿á»á»ƒá»…ệỉịá»á»á»‘ồổỗộớá»á»Ÿá»¡á»£á»¥á»§á»©á»«á»á»¯á»±á»³á»µá»·á»¹á¼€á¼á¼‚ἃἄἅἆἇá¼á¼‘ἒἓἔἕἠἡἢἣἤἥἦἧἰἱἲἳἴἵἶἷὀá½á½‚ὃὄὅá½á½‘ὒὓὔὕὖὗὠὡὢὣὤὥὦὧὰάὲέὴήὶίὸόὺύὼώᾀá¾á¾‚ᾃᾄᾅᾆᾇá¾á¾‘ᾒᾓᾔᾕᾖᾗᾠᾡᾢᾣᾤᾥᾦᾧᾰᾱᾲᾳᾴᾶᾷιῂῃῄῆῇá¿á¿‘ῒΐῖῗῠῡῢΰῤῥῦῧῲῳῴῶῷâ²â²ƒâ²…ⲇⲉⲋâ²â²â²‘ⲓⲕⲗⲙⲛâ²â²Ÿâ²¡â²£â²¥â²§â²©â²«â²â²¯â²±â²³â²µâ²·â²¹â²»â²½â²¿â³â³ƒâ³…ⳇⳉⳋâ³â³â³‘ⳓⳕⳗⳙⳛâ³â³Ÿâ³¡â³£â³¤â´€â´â´‚ⴃⴄⴅⴆⴇⴈⴉⴊⴋⴌâ´â´Žâ´â´â´‘ⴒⴓⴔⴕⴖⴗⴘⴙⴚⴛⴜâ´â´žâ´Ÿâ´ ⴡⴢⴣⴤⴥffï¬ï¬‚ffifflſtstﬓﬔﬕﬖﬗ\d-_^]";
var evilRegExp:RegExp = new RegExp(utf8RegExp);
evilRegExp.exec("Hello World");
// If testcase runs then we are good, previously this would crash
Assert.expectEq(
"CVE-2008-0674",
true,
true
);
// CVE-2008-2371 begins with an option and contains multiple branches.
var optionsRegExp:String = "(?i)[\xc3\xa9\xc3\xbd]|[\xc3\xa9\xc3\xbdA]";
var evilRegExp2:RegExp = new RegExp(optionsRegExp);
evilRegExp2.exec("Hello World");
// If testcase runs then we are good, previously this would crash
Assert.expectEq(
"CVE-2008-2371",
true,
true
); | {
"perplexity_score": 41589.4,
"pile_set_name": "Github"
} |
The influence of soil characteristics on the extractability of Cd, Pb and Zn in upland and moorland soils.
A study was undertaken to investigate the feasibility of using existing data sets of total soil metal concentrations and soil parameters, such as pH, to predict available metal concentrations on a regional or national basis. The attraction of such an approach is that it would provide valuable data for initiatives requiring information on the availability and mobility of metals in soils without the need for costly soil sampling and analysis. Ninety-seven topsoil and subsoil samples were collected from 6 soil series in a catenary sequence in north Wales to provide data for the development of an empirical model. These were analysed for total, 0.01 M CaCl2-extractable and porewater metal concentrations and for a range of soil properties including pH, solid and dissolved organic matter and cation exchange capacity. Regression analysis showed that, of the soil parameters measured, pH was the most important predictor variable for the estimation of CaCl2-extractable Cd, Pb and Zn. pH accounted for up to 86% of the variance in the proportion of 'total' metals which were extracted by CaCl2, a reagent that is commonly used to estimate plant uptake of elements. However, the relationships recorded between soil parameters and Kd (total metal/porewater metal) were much weaker, indicating that porewater metal concentrations can less readily be predicted from total soil metal concentrations and soil properties. | {
"perplexity_score": 397.7,
"pile_set_name": "PubMed Abstracts"
} |
/*-------------------------------------------------------------------------
*
* buffile.c
* Management of large buffered temporary files.
*
* Portions Copyright (c) 1996-2020, PostgreSQL Global Development Group
* Portions Copyright (c) 1994, Regents of the University of California
*
* IDENTIFICATION
* src/backend/storage/file/buffile.c
*
* NOTES:
*
* BufFiles provide a very incomplete emulation of stdio atop virtual Files
* (as managed by fd.c). Currently, we only support the buffered-I/O
* aspect of stdio: a read or write of the low-level File occurs only
* when the buffer is filled or emptied. This is an even bigger win
* for virtual Files than for ordinary kernel files, since reducing the
* frequency with which a virtual File is touched reduces "thrashing"
* of opening/closing file descriptors.
*
* Note that BufFile structs are allocated with palloc(), and therefore
* will go away automatically at query/transaction end. Since the underlying
* virtual Files are made with OpenTemporaryFile, all resources for
* the file are certain to be cleaned up even if processing is aborted
* by ereport(ERROR). The data structures required are made in the
* palloc context that was current when the BufFile was created, and
* any external resources such as temp files are owned by the ResourceOwner
* that was current at that time.
*
* BufFile also supports temporary files that exceed the OS file size limit
* (by opening multiple fd.c temporary files). This is an essential feature
* for sorts and hashjoins on large amounts of data.
*
* BufFile supports temporary files that can be shared with other backends, as
* infrastructure for parallel execution. Such files need to be created as a
* member of a SharedFileSet that all participants are attached to.
*
* BufFile also supports temporary files that can be used by the single backend
* when the corresponding files need to be survived across the transaction and
* need to be opened and closed multiple times. Such files need to be created
* as a member of a SharedFileSet.
*-------------------------------------------------------------------------
*/
#include "postgres.h"
#include "commands/tablespace.h"
#include "executor/instrument.h"
#include "miscadmin.h"
#include "pgstat.h"
#include "storage/buf_internals.h"
#include "storage/buffile.h"
#include "storage/fd.h"
#include "utils/resowner.h"
/*
* We break BufFiles into gigabyte-sized segments, regardless of RELSEG_SIZE.
* The reason is that we'd like large BufFiles to be spread across multiple
* tablespaces when available.
*/
#define MAX_PHYSICAL_FILESIZE 0x40000000
#define BUFFILE_SEG_SIZE (MAX_PHYSICAL_FILESIZE / BLCKSZ)
/*
* This data structure represents a buffered file that consists of one or
* more physical files (each accessed through a virtual file descriptor
* managed by fd.c).
*/
struct BufFile
{
int numFiles; /* number of physical files in set */
/* all files except the last have length exactly MAX_PHYSICAL_FILESIZE */
File *files; /* palloc'd array with numFiles entries */
bool isInterXact; /* keep open over transactions? */
bool dirty; /* does buffer need to be written? */
bool readOnly; /* has the file been set to read only? */
SharedFileSet *fileset; /* space for segment files if shared */
const char *name; /* name of this BufFile if shared */
/*
* resowner is the ResourceOwner to use for underlying temp files. (We
* don't need to remember the memory context we're using explicitly,
* because after creation we only repalloc our arrays larger.)
*/
ResourceOwner resowner;
/*
* "current pos" is position of start of buffer within the logical file.
* Position as seen by user of BufFile is (curFile, curOffset + pos).
*/
int curFile; /* file index (0..n) part of current pos */
off_t curOffset; /* offset part of current pos */
int pos; /* next read/write position in buffer */
int nbytes; /* total # of valid bytes in buffer */
PGAlignedBlock buffer;
};
static BufFile *makeBufFileCommon(int nfiles);
static BufFile *makeBufFile(File firstfile);
static void extendBufFile(BufFile *file);
static void BufFileLoadBuffer(BufFile *file);
static void BufFileDumpBuffer(BufFile *file);
static void BufFileFlush(BufFile *file);
static File MakeNewSharedSegment(BufFile *file, int segment);
/*
* Create BufFile and perform the common initialization.
*/
static BufFile *
makeBufFileCommon(int nfiles)
{
BufFile *file = (BufFile *) palloc(sizeof(BufFile));
file->numFiles = nfiles;
file->isInterXact = false;
file->dirty = false;
file->resowner = CurrentResourceOwner;
file->curFile = 0;
file->curOffset = 0L;
file->pos = 0;
file->nbytes = 0;
return file;
}
/*
* Create a BufFile given the first underlying physical file.
* NOTE: caller must set isInterXact if appropriate.
*/
static BufFile *
makeBufFile(File firstfile)
{
BufFile *file = makeBufFileCommon(1);
file->files = (File *) palloc(sizeof(File));
file->files[0] = firstfile;
file->readOnly = false;
file->fileset = NULL;
file->name = NULL;
return file;
}
/*
* Add another component temp file.
*/
static void
extendBufFile(BufFile *file)
{
File pfile;
ResourceOwner oldowner;
/* Be sure to associate the file with the BufFile's resource owner */
oldowner = CurrentResourceOwner;
CurrentResourceOwner = file->resowner;
if (file->fileset == NULL)
pfile = OpenTemporaryFile(file->isInterXact);
else
pfile = MakeNewSharedSegment(file, file->numFiles);
Assert(pfile >= 0);
CurrentResourceOwner = oldowner;
file->files = (File *) repalloc(file->files,
(file->numFiles + 1) * sizeof(File));
file->files[file->numFiles] = pfile;
file->numFiles++;
}
/*
* Create a BufFile for a new temporary file (which will expand to become
* multiple temporary files if more than MAX_PHYSICAL_FILESIZE bytes are
* written to it).
*
* If interXact is true, the temp file will not be automatically deleted
* at end of transaction.
*
* Note: if interXact is true, the caller had better be calling us in a
* memory context, and with a resource owner, that will survive across
* transaction boundaries.
*/
BufFile *
BufFileCreateTemp(bool interXact)
{
BufFile *file;
File pfile;
/*
* Ensure that temp tablespaces are set up for OpenTemporaryFile to use.
* Possibly the caller will have done this already, but it seems useful to
* double-check here. Failure to do this at all would result in the temp
* files always getting placed in the default tablespace, which is a
* pretty hard-to-detect bug. Callers may prefer to do it earlier if they
* want to be sure that any required catalog access is done in some other
* resource context.
*/
PrepareTempTablespaces();
pfile = OpenTemporaryFile(interXact);
Assert(pfile >= 0);
file = makeBufFile(pfile);
file->isInterXact = interXact;
return file;
}
/*
* Build the name for a given segment of a given BufFile.
*/
static void
SharedSegmentName(char *name, const char *buffile_name, int segment)
{
snprintf(name, MAXPGPATH, "%s.%d", buffile_name, segment);
}
/*
* Create a new segment file backing a shared BufFile.
*/
static File
MakeNewSharedSegment(BufFile *buffile, int segment)
{
char name[MAXPGPATH];
File file;
/*
* It is possible that there are files left over from before a crash
* restart with the same name. In order for BufFileOpenShared() not to
* get confused about how many segments there are, we'll unlink the next
* segment number if it already exists.
*/
SharedSegmentName(name, buffile->name, segment + 1);
SharedFileSetDelete(buffile->fileset, name, true);
/* Create the new segment. */
SharedSegmentName(name, buffile->name, segment);
file = SharedFileSetCreate(buffile->fileset, name);
/* SharedFileSetCreate would've errored out */
Assert(file > 0);
return file;
}
/*
* Create a BufFile that can be discovered and opened read-only by other
* backends that are attached to the same SharedFileSet using the same name.
*
* The naming scheme for shared BufFiles is left up to the calling code. The
* name will appear as part of one or more filenames on disk, and might
* provide clues to administrators about which subsystem is generating
* temporary file data. Since each SharedFileSet object is backed by one or
* more uniquely named temporary directory, names don't conflict with
* unrelated SharedFileSet objects.
*/
BufFile *
BufFileCreateShared(SharedFileSet *fileset, const char *name)
{
BufFile *file;
file = makeBufFileCommon(1);
file->fileset = fileset;
file->name = pstrdup(name);
file->files = (File *) palloc(sizeof(File));
file->files[0] = MakeNewSharedSegment(file, 0);
file->readOnly = false;
return file;
}
/*
* Open a file that was previously created in another backend (or this one)
* with BufFileCreateShared in the same SharedFileSet using the same name.
* The backend that created the file must have called BufFileClose() or
* BufFileExportShared() to make sure that it is ready to be opened by other
* backends and render it read-only.
*/
BufFile *
BufFileOpenShared(SharedFileSet *fileset, const char *name, int mode)
{
BufFile *file;
char segment_name[MAXPGPATH];
Size capacity = 16;
File *files;
int nfiles = 0;
files = palloc(sizeof(File) * capacity);
/*
* We don't know how many segments there are, so we'll probe the
* filesystem to find out.
*/
for (;;)
{
/* See if we need to expand our file segment array. */
if (nfiles + 1 > capacity)
{
capacity *= 2;
files = repalloc(files, sizeof(File) * capacity);
}
/* Try to load a segment. */
SharedSegmentName(segment_name, name, nfiles);
files[nfiles] = SharedFileSetOpen(fileset, segment_name, mode);
if (files[nfiles] <= 0)
break;
++nfiles;
CHECK_FOR_INTERRUPTS();
}
/*
* If we didn't find any files at all, then no BufFile exists with this
* name.
*/
if (nfiles == 0)
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not open temporary file \"%s\" from BufFile \"%s\": %m",
segment_name, name)));
file = makeBufFileCommon(nfiles);
file->files = files;
file->readOnly = (mode == O_RDONLY) ? true : false;
file->fileset = fileset;
file->name = pstrdup(name);
return file;
}
/*
* Delete a BufFile that was created by BufFileCreateShared in the given
* SharedFileSet using the given name.
*
* It is not necessary to delete files explicitly with this function. It is
* provided only as a way to delete files proactively, rather than waiting for
* the SharedFileSet to be cleaned up.
*
* Only one backend should attempt to delete a given name, and should know
* that it exists and has been exported or closed.
*/
void
BufFileDeleteShared(SharedFileSet *fileset, const char *name)
{
char segment_name[MAXPGPATH];
int segment = 0;
bool found = false;
/*
* We don't know how many segments the file has. We'll keep deleting
* until we run out. If we don't manage to find even an initial segment,
* raise an error.
*/
for (;;)
{
SharedSegmentName(segment_name, name, segment);
if (!SharedFileSetDelete(fileset, segment_name, true))
break;
found = true;
++segment;
CHECK_FOR_INTERRUPTS();
}
if (!found)
elog(ERROR, "could not delete unknown shared BufFile \"%s\"", name);
}
/*
* BufFileExportShared --- flush and make read-only, in preparation for sharing.
*/
void
BufFileExportShared(BufFile *file)
{
/* Must be a file belonging to a SharedFileSet. */
Assert(file->fileset != NULL);
/* It's probably a bug if someone calls this twice. */
Assert(!file->readOnly);
BufFileFlush(file);
file->readOnly = true;
}
/*
* Close a BufFile
*
* Like fclose(), this also implicitly FileCloses the underlying File.
*/
void
BufFileClose(BufFile *file)
{
int i;
/* flush any unwritten data */
BufFileFlush(file);
/* close and delete the underlying file(s) */
for (i = 0; i < file->numFiles; i++)
FileClose(file->files[i]);
/* release the buffer space */
pfree(file->files);
pfree(file);
}
/*
* BufFileLoadBuffer
*
* Load some data into buffer, if possible, starting from curOffset.
* At call, must have dirty = false, pos and nbytes = 0.
* On exit, nbytes is number of bytes loaded.
*/
static void
BufFileLoadBuffer(BufFile *file)
{
File thisfile;
/*
* Advance to next component file if necessary and possible.
*/
if (file->curOffset >= MAX_PHYSICAL_FILESIZE &&
file->curFile + 1 < file->numFiles)
{
file->curFile++;
file->curOffset = 0L;
}
/*
* Read whatever we can get, up to a full bufferload.
*/
thisfile = file->files[file->curFile];
file->nbytes = FileRead(thisfile,
file->buffer.data,
sizeof(file->buffer),
file->curOffset,
WAIT_EVENT_BUFFILE_READ);
if (file->nbytes < 0)
{
file->nbytes = 0;
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not read file \"%s\": %m",
FilePathName(thisfile))));
}
/* we choose not to advance curOffset here */
if (file->nbytes > 0)
pgBufferUsage.temp_blks_read++;
}
/*
* BufFileDumpBuffer
*
* Dump buffer contents starting at curOffset.
* At call, should have dirty = true, nbytes > 0.
* On exit, dirty is cleared if successful write, and curOffset is advanced.
*/
static void
BufFileDumpBuffer(BufFile *file)
{
int wpos = 0;
int bytestowrite;
File thisfile;
/*
* Unlike BufFileLoadBuffer, we must dump the whole buffer even if it
* crosses a component-file boundary; so we need a loop.
*/
while (wpos < file->nbytes)
{
off_t availbytes;
/*
* Advance to next component file if necessary and possible.
*/
if (file->curOffset >= MAX_PHYSICAL_FILESIZE)
{
while (file->curFile + 1 >= file->numFiles)
extendBufFile(file);
file->curFile++;
file->curOffset = 0L;
}
/*
* Determine how much we need to write into this file.
*/
bytestowrite = file->nbytes - wpos;
availbytes = MAX_PHYSICAL_FILESIZE - file->curOffset;
if ((off_t) bytestowrite > availbytes)
bytestowrite = (int) availbytes;
thisfile = file->files[file->curFile];
bytestowrite = FileWrite(thisfile,
file->buffer.data + wpos,
bytestowrite,
file->curOffset,
WAIT_EVENT_BUFFILE_WRITE);
if (bytestowrite <= 0)
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not write to file \"%s\": %m",
FilePathName(thisfile))));
file->curOffset += bytestowrite;
wpos += bytestowrite;
pgBufferUsage.temp_blks_written++;
}
file->dirty = false;
/*
* At this point, curOffset has been advanced to the end of the buffer,
* ie, its original value + nbytes. We need to make it point to the
* logical file position, ie, original value + pos, in case that is less
* (as could happen due to a small backwards seek in a dirty buffer!)
*/
file->curOffset -= (file->nbytes - file->pos);
if (file->curOffset < 0) /* handle possible segment crossing */
{
file->curFile--;
Assert(file->curFile >= 0);
file->curOffset += MAX_PHYSICAL_FILESIZE;
}
/*
* Now we can set the buffer empty without changing the logical position
*/
file->pos = 0;
file->nbytes = 0;
}
/*
* BufFileRead
*
* Like fread() except we assume 1-byte element size and report I/O errors via
* ereport().
*/
size_t
BufFileRead(BufFile *file, void *ptr, size_t size)
{
size_t nread = 0;
size_t nthistime;
BufFileFlush(file);
while (size > 0)
{
if (file->pos >= file->nbytes)
{
/* Try to load more data into buffer. */
file->curOffset += file->pos;
file->pos = 0;
file->nbytes = 0;
BufFileLoadBuffer(file);
if (file->nbytes <= 0)
break; /* no more data available */
}
nthistime = file->nbytes - file->pos;
if (nthistime > size)
nthistime = size;
Assert(nthistime > 0);
memcpy(ptr, file->buffer.data + file->pos, nthistime);
file->pos += nthistime;
ptr = (void *) ((char *) ptr + nthistime);
size -= nthistime;
nread += nthistime;
}
return nread;
}
/*
* BufFileWrite
*
* Like fwrite() except we assume 1-byte element size and report errors via
* ereport().
*/
void
BufFileWrite(BufFile *file, void *ptr, size_t size)
{
size_t nthistime;
Assert(!file->readOnly);
while (size > 0)
{
if (file->pos >= BLCKSZ)
{
/* Buffer full, dump it out */
if (file->dirty)
BufFileDumpBuffer(file);
else
{
/* Hmm, went directly from reading to writing? */
file->curOffset += file->pos;
file->pos = 0;
file->nbytes = 0;
}
}
nthistime = BLCKSZ - file->pos;
if (nthistime > size)
nthistime = size;
Assert(nthistime > 0);
memcpy(file->buffer.data + file->pos, ptr, nthistime);
file->dirty = true;
file->pos += nthistime;
if (file->nbytes < file->pos)
file->nbytes = file->pos;
ptr = (void *) ((char *) ptr + nthistime);
size -= nthistime;
}
}
/*
* BufFileFlush
*
* Like fflush(), except that I/O errors are reported with ereport().
*/
static void
BufFileFlush(BufFile *file)
{
if (file->dirty)
BufFileDumpBuffer(file);
Assert(!file->dirty);
}
/*
* BufFileSeek
*
* Like fseek(), except that target position needs two values in order to
* work when logical filesize exceeds maximum value representable by off_t.
* We do not support relative seeks across more than that, however.
* I/O errors are reported by ereport().
*
* Result is 0 if OK, EOF if not. Logical position is not moved if an
* impossible seek is attempted.
*/
int
BufFileSeek(BufFile *file, int fileno, off_t offset, int whence)
{
int newFile;
off_t newOffset;
switch (whence)
{
case SEEK_SET:
if (fileno < 0)
return EOF;
newFile = fileno;
newOffset = offset;
break;
case SEEK_CUR:
/*
* Relative seek considers only the signed offset, ignoring
* fileno. Note that large offsets (> 1 GB) risk overflow in this
* add, unless we have 64-bit off_t.
*/
newFile = file->curFile;
newOffset = (file->curOffset + file->pos) + offset;
break;
case SEEK_END:
/*
* The file size of the last file gives us the end offset of that
* file.
*/
newFile = file->numFiles - 1;
newOffset = FileSize(file->files[file->numFiles - 1]);
if (newOffset < 0)
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not determine size of temporary file \"%s\" from BufFile \"%s\": %m",
FilePathName(file->files[file->numFiles - 1]),
file->name)));
break;
default:
elog(ERROR, "invalid whence: %d", whence);
return EOF;
}
while (newOffset < 0)
{
if (--newFile < 0)
return EOF;
newOffset += MAX_PHYSICAL_FILESIZE;
}
if (newFile == file->curFile &&
newOffset >= file->curOffset &&
newOffset <= file->curOffset + file->nbytes)
{
/*
* Seek is to a point within existing buffer; we can just adjust
* pos-within-buffer, without flushing buffer. Note this is OK
* whether reading or writing, but buffer remains dirty if we were
* writing.
*/
file->pos = (int) (newOffset - file->curOffset);
return 0;
}
/* Otherwise, must reposition buffer, so flush any dirty data */
BufFileFlush(file);
/*
* At this point and no sooner, check for seek past last segment. The
* above flush could have created a new segment, so checking sooner would
* not work (at least not with this code).
*/
/* convert seek to "start of next seg" to "end of last seg" */
if (newFile == file->numFiles && newOffset == 0)
{
newFile--;
newOffset = MAX_PHYSICAL_FILESIZE;
}
while (newOffset > MAX_PHYSICAL_FILESIZE)
{
if (++newFile >= file->numFiles)
return EOF;
newOffset -= MAX_PHYSICAL_FILESIZE;
}
if (newFile >= file->numFiles)
return EOF;
/* Seek is OK! */
file->curFile = newFile;
file->curOffset = newOffset;
file->pos = 0;
file->nbytes = 0;
return 0;
}
void
BufFileTell(BufFile *file, int *fileno, off_t *offset)
{
*fileno = file->curFile;
*offset = file->curOffset + file->pos;
}
/*
* BufFileSeekBlock --- block-oriented seek
*
* Performs absolute seek to the start of the n'th BLCKSZ-sized block of
* the file. Note that users of this interface will fail if their files
* exceed BLCKSZ * LONG_MAX bytes, but that is quite a lot; we don't work
* with tables bigger than that, either...
*
* Result is 0 if OK, EOF if not. Logical position is not moved if an
* impossible seek is attempted.
*/
int
BufFileSeekBlock(BufFile *file, long blknum)
{
return BufFileSeek(file,
(int) (blknum / BUFFILE_SEG_SIZE),
(off_t) (blknum % BUFFILE_SEG_SIZE) * BLCKSZ,
SEEK_SET);
}
#ifdef NOT_USED
/*
* BufFileTellBlock --- block-oriented tell
*
* Any fractional part of a block in the current seek position is ignored.
*/
long
BufFileTellBlock(BufFile *file)
{
long blknum;
blknum = (file->curOffset + file->pos) / BLCKSZ;
blknum += file->curFile * BUFFILE_SEG_SIZE;
return blknum;
}
#endif
/*
* Return the current shared BufFile size.
*
* Counts any holes left behind by BufFileAppend as part of the size.
* ereport()s on failure.
*/
int64
BufFileSize(BufFile *file)
{
int64 lastFileSize;
Assert(file->fileset != NULL);
/* Get the size of the last physical file. */
lastFileSize = FileSize(file->files[file->numFiles - 1]);
if (lastFileSize < 0)
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not determine size of temporary file \"%s\" from BufFile \"%s\": %m",
FilePathName(file->files[file->numFiles - 1]),
file->name)));
return ((file->numFiles - 1) * (int64) MAX_PHYSICAL_FILESIZE) +
lastFileSize;
}
/*
* Append the contents of source file (managed within shared fileset) to
* end of target file (managed within same shared fileset).
*
* Note that operation subsumes ownership of underlying resources from
* "source". Caller should never call BufFileClose against source having
* called here first. Resource owners for source and target must match,
* too.
*
* This operation works by manipulating lists of segment files, so the
* file content is always appended at a MAX_PHYSICAL_FILESIZE-aligned
* boundary, typically creating empty holes before the boundary. These
* areas do not contain any interesting data, and cannot be read from by
* caller.
*
* Returns the block number within target where the contents of source
* begins. Caller should apply this as an offset when working off block
* positions that are in terms of the original BufFile space.
*/
long
BufFileAppend(BufFile *target, BufFile *source)
{
long startBlock = target->numFiles * BUFFILE_SEG_SIZE;
int newNumFiles = target->numFiles + source->numFiles;
int i;
Assert(target->fileset != NULL);
Assert(source->readOnly);
Assert(!source->dirty);
Assert(source->fileset != NULL);
if (target->resowner != source->resowner)
elog(ERROR, "could not append BufFile with non-matching resource owner");
target->files = (File *)
repalloc(target->files, sizeof(File) * newNumFiles);
for (i = target->numFiles; i < newNumFiles; i++)
target->files[i] = source->files[i - target->numFiles];
target->numFiles = newNumFiles;
return startBlock;
}
/*
* Truncate a BufFile created by BufFileCreateShared up to the given fileno and
* the offset.
*/
void
BufFileTruncateShared(BufFile *file, int fileno, off_t offset)
{
int numFiles = file->numFiles;
int newFile = fileno;
off_t newOffset = file->curOffset;
char segment_name[MAXPGPATH];
int i;
/*
* Loop over all the files up to the given fileno and remove the files
* that are greater than the fileno and truncate the given file up to the
* offset. Note that we also remove the given fileno if the offset is 0
* provided it is not the first file in which we truncate it.
*/
for (i = file->numFiles - 1; i >= fileno; i--)
{
if ((i != fileno || offset == 0) && i != 0)
{
SharedSegmentName(segment_name, file->name, i);
FileClose(file->files[i]);
if (!SharedFileSetDelete(file->fileset, segment_name, true))
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not delete shared fileset \"%s\": %m",
segment_name)));
numFiles--;
newOffset = MAX_PHYSICAL_FILESIZE;
/*
* This is required to indicate that we have deleted the given
* fileno.
*/
if (i == fileno)
newFile--;
}
else
{
if (FileTruncate(file->files[i], offset,
WAIT_EVENT_BUFFILE_TRUNCATE) < 0)
ereport(ERROR,
(errcode_for_file_access(),
errmsg("could not truncate file \"%s\": %m",
FilePathName(file->files[i]))));
newOffset = offset;
}
}
file->numFiles = numFiles;
/*
* If the truncate point is within existing buffer then we can just adjust
* pos within buffer.
*/
if (newFile == file->curFile &&
newOffset >= file->curOffset &&
newOffset <= file->curOffset + file->nbytes)
{
/* No need to reset the current pos if the new pos is greater. */
if (newOffset <= file->curOffset + file->pos)
file->pos = (int) (newOffset - file->curOffset);
/* Adjust the nbytes for the current buffer. */
file->nbytes = (int) (newOffset - file->curOffset);
}
else if (newFile == file->curFile &&
newOffset < file->curOffset)
{
/*
* The truncate point is within the existing file but prior to the
* current position, so we can forget the current buffer and reset the
* current position.
*/
file->curOffset = newOffset;
file->pos = 0;
file->nbytes = 0;
}
else if (newFile < file->curFile)
{
/*
* The truncate point is prior to the current file, so need to reset
* the current position accordingly.
*/
file->curFile = newFile;
file->curOffset = newOffset;
file->pos = 0;
file->nbytes = 0;
}
/* Nothing to do, if the truncate point is beyond current file. */
} | {
"perplexity_score": 2486.1,
"pile_set_name": "Github"
} |
Pages
Tuesday, February 11, 2014
Pismo Beach, PCH2
I awoke to a beautiful ocean sky resting peacefully atop a calm ocean, the world still for a moment. I stepped out of my car to stretch and take in the beauty. The waves gent ally crashed into the rocks below, seagulls sat perched on the concrete barrier, awaiting the tide to recede so they could dig up their next meal. I sat on the hood of my car and let the cold ocean breeze waft over my body as the sun slowly moved along it’s daily trek.
The view from where I slept.
It was still early when I hit the road, but traffic was already slugging along as I reached the outskirts of Santa Barbara. The town was still yawning as I drove thru downtown, shopkeepers were casually opening up for the day, as bikers sped along to work. I nestled into a cafe and had breakfast, watching as the empty diner filled up with morning patrons and then emptied again. I had planned on spending the day in Santa Barbara, but the city, which I had been to multiple times before, seemed dull so I headed up the coast, back along the Pacific Coast Highway.
For no particular reason I choose Pismo Beach as my next stop, about a two hour drive to the north. Once again the PCH turned inland, but this time instead of being surrounded by small towns, I was engulfed in a mountainous nothingness. Farmland stretched from the side of the highway to the foot of the mountains, the fresh vegetables adding a pleasant aroma to the cooler mountain air. The temperature had dropped 15 degrees from the coast to this inland valley, an amazing change for such an insignificant distance.
The landscape remained unchanged for miles, until eventually the road turned back west and the Ocean laid in the distance, beckoning me back to her shores. It was only midday when I reach Pismo Beach, a quaint beach town built along a sandy coastline, the economy obviously based on tourism. I continued on through town, having seen a sign for a place called Dinosaur Cave Park. Any park with the word Dinosaur in the title instantly has my attention and I excitedly cruised through town, confused as to what the coast of California could possibly have to do with dinosaurs.
The PCH meanders through Pismo Beach and it’s sister communities, the roadside a row of specialty shops and restaurants catering to the tourist who frequent the city. Pismo was filled with tourists, which was a strange change from my weeks on the road, where I had been all but alone. The masses of RVs struck me, but I just attributed it to the beautiful weather and continued on. Then I came to a bend in the road and I realized why everyone was here.
Cars were parked along the side of the highway, people running across the highway with cameras. the sky was covered with the fluttering of gentle wings. A kaleidoscope of butterflies drifted back and forth from one tree to another, searching for a mate. Thousands of orange and black monarchs flew blissfully in the warm summer sun. This was part of the famed Monarch Butterfly Migration, and according to a sign the grove at Pismo Grove this spot was home to the largest wintering population of Monarchs. The tree branches were covered, clusters of butterflies looking like leaves hanging onto the branches. Overhead the sky was filled with a ballet of delicate wings. I stood in awe of the massive display around me, couples of butterflies fell to the ground as the male tried to convince the female of his worth. If and when she excepted the male would hoist her up, carrying her high into the trees, above the largest clusters and would consummate the agreement.
I had read that the butterfly migration was this time of year, but in the masses of information I had stuffed into my mind I had forgotten, letting it be another pleasant surprise of life on the road. I continued on down the road to Dinosaur Cave Park, only to discover it was simply a bluff side park.
The reason for the name is that it had in the mid 20th century served as a tourist attraction, where the owner had built a dinosaur that served as the entrance to the cave. The cave collapsed in the 1970’s and the dinosaur burned down at some point, but the park’s legacy lives on in the name. The view from the park was amazing, seals laid in the sun on rocky outcrops as sea otters swam around in beds of seaweed, hunting and playing around. I walked down to the beach where tidal pools, filled with stagnant sea water in the low tide, housed an array of snails, crabs and giant sea slugs. The waves cashed against rocks in the small cove, spraying the beach. I sat on a large rock and watched pelicans hunting in the calmer waters away from shore.
It was magnificently warm, the sun cascading on the beach causing the fragments of shells, the only thing left by the group of shell hunting ladies who combed the sands, to glisten on the beach. A couple of men sat in the shade, casting their lines into the surf hoping to snag a fish. Above on the top of the bluffs, families snapped pictures with the coastline behind them.
I was getting hungry and decided to head back into Pismo Beach for lunch, a small cafe announced it had world famous Clam Chowder, a lofty claim, and one I was destined to investigate. The cafe was packed, and the prices were amazingly inexpensive, especially considering it’s proximity to the beach and the Pismo Beach Pier. I ordered a sandwich and some chowder and sat and waited. A group of teenage boys flirted with the girls making sandwiches until an older male employee, who I assumed to be a manager, came over and asked them to leave. The girls blushed as the boys scurried out the door.
One of the aforementioned blushing girls brought out my soup and sandwich and I dug in. The sandwich was made with amazingly thick cuts of pastrami and the chowder was thick, each bite contained fresh bits of clams, the famous Pismo Clams that are themselves a tourist draw in the area. I scarfed down the sandwich, sad they I hadn’t savored the flavor more, and headed out along the pier.
The pier was nearly empty save for a few fisherman standing along the sides. Surfers were out catching the last of the days waves. Out in the distance fog started to roll in, the only clouds in the sky were those hugging the ocean off in the distance, a wall of white approaching and sweeping over some of the mountains to the north. I decided to drive back to Dinosaur Cave Park for sunset, and found an empty bench at the top of the bluffs, where I watched the sun disappear into the fog cloud in the distance.
This is a butterfly, not a picture of elaborate fog.
I had decided to put in a little more driving before settling in and need to go up the coast a little ways to my campsite. As I drove the fog reached land, and soon I was driving in a cloud, the only visible landscape that to in my immediate vicinity, soon I entered the park and was instantly in a forest of ancient looking frees, the fog coursing between the dense foliage. The road drifted back and forth, taking me closer to the shoreline, the fog receding with each mile. Soon I found the campsite, the bright moon provided the only light as I set up my tent. The moonlight illuminated the remaining fog, obscuring the figures of the trees around the campsite.
After a short stroll I tucked in for the night. I have never spent a night alone in a tent, and each noise roused me from my dreams. The cadence of the wind flapping my tent sounded early like footsteps, but the sound of the waves crashing against the shore just down the way drowned up most sound and I drifted off to sleep for good. | {
"perplexity_score": 372.1,
"pile_set_name": "Pile-CC"
} |
Q:
Upload Image to server in android by Httppost
How to upload image at server by gallary or camera?
I try this link's code but it shows error like this
Error:(329, 24) error: cannot access AbstractBody
class file for org.apache.james.mime4j.message.AbstractBody not found
A:
You can upload image to the server using http post multi-part. Here is the link which will help you out.
https://vikaskanani.wordpress.com/2011/01/11/android-upload-image-or-file-using-http-post-multi-part/
http://www.codejava.net/java-se/networking/upload-files-by-sending-multipart-request-programmatically
And one more way to uploading image is, convert it into Base64 and than upload. Check the below link.
Android upload image to server using base64 | {
"perplexity_score": 1353.4,
"pile_set_name": "StackExchange"
} |
INTRODUCTION
============
The human placenta has both maternal and fetal blood circulations, which exchange gases, nutrients and waste through the surface of the villous tree without mixture \[[@R1]\]: the maternal blood from the uterine arteries flows slowly into the intervillous space and returns to the uterine veins while the fetal blood from the umbilical arteries flows into arteries within the chorionic plate, circulates through blood vessels in the villous tree, and returns to the umbilical veins. The influence of the maternal and fetal blood flows on the transport of substances has been reported previously \[[@R2], [@R3]\].
The villous tree is composed of stem villi, intermediate villi, terminal villi and mesenchymal villi. Stem villi are the main support of the villous tree between the two bounding surfaces of the placenta. The stem villi have the contractile cells, which surround the arterial and venous vessels and run along the longitudinal axis of the branch \[[@R4]-[@R11]\]. The contraction of the stem villi has been observed *in vitro* \[[@R5], [@R12]-[@R14]\], which is expected to help the circulations of the maternal and fetal bloods. The maximum velocity of the contraction was much smaller than that of uterus, and the peak isometric tension was 1.39 kPa for electrical tetanus and 1.32 kPa for KCl exposure on average \[[@R14]\]. The contraction directly assists the fetal blood flow in the vessels of the stem villi because the contractile cells surround the vessels axially. However, the fetal blood in the capillary of the villous tree and the maternal blood in the intervillous space are not surrounded by the contractile cells directly, and similarity in the directions between the blood flow and the contractile cells has not been clear. In the meantime, the mechanical properties of the human placenta were evaluated by tensile, compression and shear \[[@R15]\]: The elastic moduli measured by shear were much smaller than those by tensile and compression. The shear stress was less than 1 kPa when the strain was 1 (strain velocity \< 0.04 /s). Considering that the blood vessels were aligned with the direction of the force \[[@R15]\], the shear elastic moduli in the surroundings of the blood vessels would be much less than 1 kPa. Comparing the tension of the contractile cell with the shear elastic moduli, the displacement and its propagation in the placenta would occur although neither direct measurement nor prediction for the displacement is possible.
The conditions of the placenta, concerning the blood flow, are non-invasively observed by ultrasound and magnetic resonance (MR). The velocity of the blood flow in the umbilical artery is measured by ultrasound Doppler velocimetry and described as flow velocity waveforms (FVWs). The histological characteristics in the villous tree, including the distribution of the villous types and vascularization, can be estimated by FVW at end diastolic: positive, absent or reverse \[[@R16]-[@R18]\]. The oxygen environment, which is evaluated by oxygen-enhanced MRI and BOLD MRI \[[@R19]\], influenced the bifurcation pattern of the villous tree: hypoxia enhances the bifurcation \[[@R20], [@R21]\]. The magnitude of the perfusion in the placenta can be expressed as relative values by three-dimensional (3D) power Doppler \[[@R22]\] and contrast-enhanced MR images \[[@R23]\], but the direction is hardly measured.
In general, the normal mature placenta shows legions in some degree, such as infarctions, which can prevent the blood circulations in the placenta. 3D power Doppler indicated that the perfusion in the normal placenta was kept through the gestational ages, from 15 to 40 weeks \[[@R24]\]. In the meantime, the diameter, branching patterns and generation of the stem villi were previously reported \[[@R1], [@R25]\] so that a computational model of the villous tree with active contractions can be developed. If the displacement caused by the contraction is corresponding to the perfusion evaluated by 3D power Doppler or MRI, the direction of the blood flow can be estimated by changing the distribution of the shear elastic moduli as the pattern of the displacement in the placenta agrees with that of the perfusion. Assuming that the contraction force and shear elastic moduli of the region surrounding the stem villi are representative of the placental conditions, the results of the computation can be translated properly.
In this study, a computational model of the villous tree in the human placenta with active contractions was developed for estimating the blood flow condition. The shape of the stem villi was based on the previous reports \[[@R1], [@R25]\], and the surroundings of the stem villi were assumed as one continuum, where the displacement caused by the contraction propagated because the branching pattern of the villi around the stem villi, and the shape of the intervillous space, which is the space surrounded by the villi and the maternal blood passes through, are complicated. By using this model, it was examined whether or not the contraction could assist the fetal blood flow in the capillary and the maternal blood flow in the intervillous space. Moreover, the influence of the mechanical properties in the villous tree on the pattern of the displacement was also examined.
COMPUTATIONAL MODEL
===================
Stem Villi
----------
The stem villi are categorized into the three groups: truncus chorii, next to the chorionic plate; rami chorii, next to the truncus chorii; ramuli chorii, between the rami chorii and the basal plate \[[@R1], [@R25]\]. The diameter gradually becomes smaller from the chorionic plate to the basal plate, and branches are found in all the groups except the truncus chorii. The branching pattern of the ramuli chorii is not equally dichotomous. The generations of branches in the rami chorii and ramuli chorii are up to 4, and from 1 to 30, respectively. Table **[1](#T1){ref-type="table"}** shows the size and branching pattern in the stem villi model. In this model, the chorionic and basal plates, and the boundaries between the categories (truncus chorii, rami chorii and ramuli chorii) were parallel to each other. Firstly, how to use the centripetal and centrifugal orders at the branch to describe the branching pattern in Table **[1](#T1){ref-type="table"}** is explained. Figs. (**[1a](#F1){ref-type="fig"}** and **[1b](#F1){ref-type="fig"}**) show a simple branching pattern designated by the centripetal order and centrifugal order: the tip and trunk are designated as 1 and maximum, respectively, at the centripetal order, and vice versa at the centrifugal order. The centripetal order is used to evaluate dichotomy \[[@R26], [@R27]\]. The bifurcation ratio, *R~b~*, is defined as the following equation:
R
b
=
N
u
N
u
\+
1
where *N~u~* is the number of branches at the centripetal order *u*. If *R~b~* is 2, the branching is equally dichotomous. Assuming that *R~b~* is constant, *N~u~* is a geometrical series given as:
N
u
=
R
b
(
u
max
−
u
)
where *u~max~* is the maximum centripetal order. Hence,
ln
N
u
=
(
u
max
−
u
)
ln
R
b
*R~b~* of the branches was calculated by the method of least squares. Table **[1](#T1){ref-type="table"}** shows that *R~b~* in the rami chorii was 2, but that in the ramuli chorii was not equal to 2. These values indicate that the branching patterns in the rami chorii and ramuli chorii are equally and unequally dichotomous, respectively. The centrifugal order at the tip, *C~f~*, in Table (**[1](#T1){ref-type="table"}**), corresponds to the generation of the branches. While *C~f~* in the rami chorii was constant, that in the ramuli chorii was varied. That is because the branches in the ramuli chorii were not symmetric.
The diameter range in each category was as follows: truncus chorii, 900 -- 3000 μm; rami chorii, 300 -- 1000 μm; ramuli chorii, 50 -- 500 μm \[[@R25]\]. Table **[1](#T1){ref-type="table"}** shows that the diameter ranges agree with the aforementioned one. The change of the diameter at the truncus chorii was much larger than those at the rami chorii and ramuli chorii. For the smooth connection between the truncus chorii and rami chorii, the derivative of the radius with respect to the *z* coordinate should be zero at the boundary. Hence, the following equation was used to determine the radius of the branch at the truncus chorii:
r
=
r
max
−
(
r
max
−
r
min
)
z
tr
{
z
tr
2
−
(
z
−
z
tr
)
2
}
where *r~max~* and *r~min~* are the maximum and minimum radii in the truncus chorii, and *z~tr~* is the boundary between the truncus chorii and rami chorii (*z~tr~* = 2.9 mm). In the rami chorii, the radius was decreased as the distance along the axis was longer. The radius of the branch in the ramuli chorii became larger as the centripetal order increased. The radii of the branches at the connecting point were modulated as all the branches showed the same radius.
The branches in the rami chorii were equally dichotomous as well as symmetric, and 16 branches were connected to those in the ramuli chorii at the boundary. The branches in the ramuli chorii should be unequally dichotomous. For making unequally dichotomous branches, the 2D diffusion-limited aggregation (DLA) models \[[@R28]\] were made by the free-software, dla-nd, which was developed by the Dr. Mark J. Stock (<http://markjstock.org/dla-nd/>). Because the path between the branching points was not smooth in this model, the line between the branching points was set as an axis of a branch.
As Table (**[1](#T1){ref-type="table"}**) shows, the longest distance from the chorionic plate in the model was 24.5 mm. According to the previous reports, the thickness of the human placenta and chorioamniotic membrane, the surface of the placenta, were 25 mm \[[@R1]\] and 243 μm \[[@R29]\] on average, respectively. It is calculated that the distance between the chorionic and basal plates is 24.8 mm. The longest distance from the chorionic plate in the model was close to the calculated distance between the chorionic and basal plates, based on the previous reports \[[@R1], [@R29]\]. In the meantime, the cross section of the model, parallel to the chorionic plate, had the bounding rectangle, whose size was 23.8 mm × 22.6 mm (width × height). The previous report \[[@R1]\] indicated that the placenta at term, whose diameter was 220 mm, had 60 -- 70 villous stems. The area based on this diameter is 3.80 × 10^4^ mm^2^ so that the average cross section of the villous trees is 5.42 × 10^2^ - 6.33 × 10^2^ mm^2^, whose corresponding diameter is 26 -- 28 mm. The size of the cross section in the model was close to that based on the previous report \[[@R1]\]. Figs. (**[1c](#F1){ref-type="fig"}**-**[1e](#F1){ref-type="fig"}**) show the villous tree model developed in this research. The size was 34.8 × 34.8 × 24.5 \[mm\] (1200 × 1200 × 847 \[pixels\], 29 μm/pixel).The Cartesian coordinate system, whose *z* axis was perpendicular to the chorionic plate, was used to describe the position in the model. Its origin was also on the chorionic plate.
Contraction Direction
---------------------
The contractile cells run along the longitudinal axis of the branch \[[@R4]-[@R11]\]. Each point at the boundary surface between the stem villi and the surroundings has two tangential directions as Fig. (**[2](#F2){ref-type="fig"}**) shows. The tangential direction, closer to the axis of the branch than the other, was decided as the contraction direction.
At the truncus chorii, the axis of the branch was parallel to the *z* axis and its radius was largely changed as Equation (4) shows. The angle between the *z* axis and tangential direction (*φ~o~*) and the differentiation of Equation (4) by *z* are as follows:
φ
o
=
atan
(
dr
dz
)
dr
dz
=
r
max
−
r
min
z
tr
z
−
z
tr
z
tr
2
−
(
z
−
z
tr
)
2
Considering that the direction of the contraction at the axis of the branch was (0, 0, -1),
φ
o
=
π
\+
atan
(
dr
dz
)
When the angle between the point at the surface and the *x* axis in the *xy* plane is *θ~o~*, the tangential direction is (*sinφ~o~cosθ~o~*, *sinφ~o~sinθ~o~*, *cosφ~o~*). Comparing the rami chorii with the truncus chorii at Table (**[1](#T1){ref-type="table"}**), the diameter change at the rami chorii was 25% of that at the truncus chorii. In addition, the rami chorii showed the range of the *z* coordinate, which was about 3.7 times larger than that at the truncus chorii. The change of the diameter at the rami chorii was much smaller than that at the truncus chorii. Hence, the tangential direction at the surface was parallel to the axis of the branch at the rami chorii. Because the change of the diameter was also small at the ramuli chorii, the tangential direction was determined in the same way.
Displacement
------------
As Figs. (**[1c](#F1){ref-type="fig"}**-**[1e](#F1){ref-type="fig"}**) show, assuming that the surroundings of the stem villi were one continuum in this model, the propagation of the displacement in the placenta was evaluated by the model. A wave equation is generally described as below:
ρ
∂
2
u
∂
t
2
=
μ
∇
2
u
\+
(
λ
l
\+
μ
)
∇
(
∇
⋅
u
)
where ***u*** is displacement vector, *ρ* is density, *λ~l~* and *μ* are Lamé's constant. *μ* also shows a shear elastic modulus. Generally, biological tissue is incompressible, so that the second term in Equation (8) is zero. Hence,
ρ
∂
2
u
∂
t
2
=
μ
∇
2
u
Hence, the shear wave (transverse wave), whose propagation is normal to the vibration and carried out in solid, was evaluated in this computation. The displacement caused by the shear wave is described as follows \[[@R31]\]:
u
=
ξ
o
cos
(
kr
−
𝜛t
)
where *ξ~o~* is the amplitude, *k* is the wave number (*k* = 2π/*λ*, *λ* is wave length), *r* is the distance from the surface of the stem villi, *t* is time, and *ω* is angular frequency. *ξ~o~* was 0.1 μm in all the computational conditions. The shear elastic modulus, *μ*, is described as follows \[[@R32]\]:
μ
=
𝜛
2
k
2
ρ
Considering that *k* = 2π/*λ* and *ω*=2π*ν* (*ν*, frequency),
μ
=
ρ
λ
2
v
2
*ρ* was 1.0 × 10^3^ kg/m^3^ because of biological tissues \[[@R32]\]. ν was 1.0 Hz, and *λ* was 0.29, 0.58 or 1.45 mm (10, 20 or 50 pixels) in the computation so that the shear moduli were 8.41 × 10^-5^, 3.36 × 10^-4^ and 2.10 × 10^-3^ Pa. The displacement is attenuated by viscoelastic properties so that the maximum distance for the propagation was 1.45, 2.9 and 4.35 mm (50, 100 and 150 pixels). In order to simplify the problem, *t* was set for zero. That is, the computation did not consider the time effect on the displacement. The maximum distance for the propagation was not dependent on the position. *λ* was kept constant in the surroundings, or became longer as the distance from the surface of the stem villi was longer. In the latter case, *λ* was increased from 0.29 mm to 1.45 mm every one-third of the maximum distance from the surface. Hence, there were 12 conditions in this computation.
RESULTS
=======
Characteristic Positions and Visualization
------------------------------------------
The displacement of the surroundings of the stem villi is described by the polar coordinate system (magnitude, *φ* (0° ≤ φ ≤ 180°) and *θ* (-180° ≤ θ \< 180°)) because the coordinate system was useful to separate the displacement into its magnitude and direction. Fig. (**[3](#F3){ref-type="fig"}**) shows the results when *λ* and the maximum distance for the propagation were 1.45 mm and 4.35 mm, respectively. Fig. (**[3a](#F3){ref-type="fig"}**) shows that the displaced area was gradually increased as the *z* coordinate became larger. The long and steep slope was observed from the truncus chorii to the rami chorii. The same features were observed in all the computational conditions. Figs. (**[3b](#F3){ref-type="fig"}**, **[3c](#F3){ref-type="fig"}** and **[3d](#F3){ref-type="fig"}**) show the mean and standard deviation (SD) of each parameter: magnitude, *φ* and *θ*. The mean and SD were calculated for all the points in the displaced area, whose magnitude was more than zero. When the displacement is perpendicular to the chorionic plate, the value of *θ* cannot be determined. Hence, such a critical point was not included for the calculation of the mean and SD in *θ*. Fig. (**[3b](#F3){ref-type="fig"}**) shows that the SD normalized by the mean was calculated in order to evaluate the magnitude range of the displacement in each *z* coordinate. The peak of the normalized SD was observed around the boundary between the truncus chorii and rami chorii, which is named as *z~d~*. The mean and SD about the direction of the displacement in each *z* coordinate are shown in Figs. (**[4c](#F4){ref-type="fig"}** and **[4d](#F4){ref-type="fig"}**). As Fig. (**[4c](#F4){ref-type="fig"}**) shows, the mean of *φ* was kept around 90 degrees, but the SD of *φ* indicated two peaks, whose positions are named as *z~φ1~* and *z~φ2~*, respectively. Fig. (**[3d](#F3){ref-type="fig"}**) shows that the mean of *θ* slightly decreased around the boundary between the rami chorii and ramuli chorii, which is named as *z~θ~*, while the SD of *θ* was kept around 90°. These characteristic *z* coordinates, *z~d~*, *z~φ1~*, *z~φ2~*, and *z~θ~*, were observed at all the computations. Fig. (**[4](#F4){ref-type="fig"}**) shows the images which visualizes the magnitude, *φ*, and *θ* in each characteristic *z* coordinate and the middle *z* coordinates of the truncus chorii (*z~t~*), rami chorii (*z~r~*), and ramuli chorii (*z~rl~*) under the same computational condition as Fig. (**[3](#F3){ref-type="fig"}**) shows. The displaced area became larger as the *z* coordinate was increased. The magnitude of the displacement was almost kept constant at every *z* coordinate although the magnitude in the limited area at *z~d~* was high. The distributions of *φ* and *θ* were largely changed along the *z* coordinate as shown in Figs. (**[3c](#F3){ref-type="fig"}** and **[3d](#F3){ref-type="fig"}**) The visualization of the displacement and direction like Fig. (**[4](#F4){ref-type="fig"}**) is useful to find out critical points and important points for analysis.
Magnitude of the Displacement
-----------------------------
As Fig. (**[4](#F4){ref-type="fig"}**) shows, the magnitude of the displacement was kept almost constant except the magnitude was high near the stem villi at *z~d~*. 90% of the displaced area showed that the magnitude relative to the maximum one was less than 0.17 for the maximum distance for the propagation = 1.45 mm and λ increasing as the distance from the surface of the stem villi, and 0.06 for other results. The SD normalized by the mean was large at *z~d~*, but the high magnitude was in the limited area. Hence, the maternal and fetal blood circulations in the villous tree and intervillous space would be influenced by the constant distribution of the displacement in the placenta. Because the shape of the stem villi directly influences the displacement pattern, the model whose shape near the high magnitude is changed will be developed and used for the computation to examine whether or not such a high magnitude is inevitable.
Direction of the Displacement (*φ* and *θ*)
-------------------------------------------
Figs. (**[5a](#F5){ref-type="fig"}**-**[5e](#F5){ref-type="fig"}**) show the distribution of *φ* at the characteristic *z* coordinates (*z~φ1~*, *z~φ2~*) and the middle *z* coordinate in each category (*z~t~*, *z~r~*, *z~rl~*) for the same condition as shown in Fig. (**[3](#F3){ref-type="fig"}**). The area fraction, which is the area for each *φ* normalized by all the displaced area, was used to evaluate the distribution of *φ*. The area fraction around *φ* = 90° (*φ* = 45° - 135°) was largest at *z~φ1~* (Fig. **[5b](#F5){ref-type="fig"}**) and smallest at *z~φ2~* (Fig. **[5d](#F5){ref-type="fig"}**). The same characteristics were observed in all the computations. For all the computational conditions, the mean and SD of the area fraction at *φ* = 45° - 135° were calculated at each *z* coordinate. As the average values in Fig. (**[5f](#F5){ref-type="fig"}**) show, more than 90% of the displaced area showed *φ* from 45° to 135° at *z~φ1~*. The area with the same range of *φ* was around 10% at *z~φ2~*. Considering that the *φ* = 90° means the direction parallel to the *xy* plane, most of the displacement was parallel to the *xy* plane at *z~φ1~*, and parallel to the *z* axis at *z~φ2~*. Fig. (**[5f](#F5){ref-type="fig"}**) shows that the mean of the area fraction at the other positions was around 0.3. Hence, *φ* did not have a preferred direction there. The displacement could help the maternal blood to go to the chorionic plate at *z~φ2~*, spread parallel to the chorionic plate and the basal plate at *z~φ1~*, and go toward the basal plate at *z~φ2~*. In the meantime, the branches in the stem villi around *z~φ1~* and *z~φ2~* had the axes largely different from the directions of the displacement there: the axis of the branch in the truncus chorii is perpendicular to the chorionic plate, and that in the rami chorii was largely changed because of its curvature. The displacements at *z~φ1~* and *z~φ2~* could assist the fetal blood to pass through the vessels in the stem villi. Moreover, the maternal and fetal bloods could be homogenized by the displacement at *z~t~*, *z~r~* and *z~rl~*. The SD was largest at *z~t~*, and smallest at *z~φ1~*. The SD at *z~rl~* was larger than that at *z~φ1~*, but much smaller than those at the other characteristic positions. Considering that *λ* and the maximum distance for the propagation are corresponding to the mechanical properties of the surroundings of the stem villi, *φ* at *z~φ1~* and *z~rl~* would be hardly influenced by the mechanical property of the surroundings, but *φ* at the truncus chorii would be vulnerable to it.
Figs. (**[6a](#F6){ref-type="fig"}**-**[6d](#F6){ref-type="fig"}**) show the distribution of *θ* at the characteristic *z* coordinates (*z~θ~*) and the middle *z* coordinate in each category (*z~t~*, *z~r~*, *z~rl~*) for the same condition as Fig. (**[3](#F3){ref-type="fig"}**) shows. The area fraction, the area for each *θ* normalized by all the displaced area, was used for describing the distribution. Figs. (**[6a](#F6){ref-type="fig"}** and **[6b](#F6){ref-type="fig"}**) show that the similar distribution pattern was observed every 90° at *z~t~* and *z~r~*. The result agreed with the mean of *θ* at *z~t~* and *z~r~*, around zero. Fig. (**[6c](#F6){ref-type="fig"}**) shows the distribution of *θ* at *z~θ~*, where the area fraction at *θ* = -180° - 90° (the third quadrant) and *θ* = 0° - 90° (the first quadrant) was larger than that at *θ* = -90° - 0° (the fourth quadrant) and *θ* = 90° - 180° (the second quadrant). This result agreed with the decrease of the mean at *z~θ~* in Fig. (**[3d](#F3){ref-type="fig"}**). As Table (**[1](#T1){ref-type="table"}**) shows, the branches in the ramuli chorii were unequally dichotomous as well as asymmetric while those in the rami chorii were equally dichotomous as well as symmetric. Because the rami chorii had 16 branches connecting to those in the ramuli chorii, 16 types of the branching pattern were used in the ramuli chorii. *z~θ~* was located around the boundary between the rami chorii and ramuli chorii. The branches of the ramuli chorii at *z~θ~* were almost parallel to the *z* axis in the second and fourth quadrant, but those in the first and third quadrants were not. The angle of the branch at *z~θ~* would cause the characteristic distribution of *θ* at *z~θ~*. The similar distribution pattern was observed at *z~rl~*, but each peak was much smaller than that at *z~θ~* as Fig. (**[6d](#F6){ref-type="fig"}**) shows. Because *z~rl~* was placed on the middle of the ramuli chorii, the feature caused at *z~θ~* would be weakened by the branches which showed various angles. All the computational results showed the same characteristics as Figs. (**[6a](#F6){ref-type="fig"}**-**[6d](#F6){ref-type="fig"}**) show. The SD of the area fraction in each interval (each value of *θ*) (*SD~in~*) was calculated in order to evaluate the uniformity of the distribution in *θ* for all the computations. Fig. (**[6e](#F6){ref-type="fig"}**) shows that the average value of *SD~in~* at *z~θ~* was largest and that at *z~rl~* was smallest, among all the positions. The distribution of *θ* was most uniform at *z~rl~*, and most fluctuated at *z~θ~* in all the positions. The distribution of *θ* at *z~θ~* would be influenced by the angle of the branches in the ramuli chorii. Because *θ* at *z~rl~* did not have a preferred value, the maternal and fetal bloods could be homogenized. The SD values of *SD~in~* at *z~t~* and *z~θ~* was much larger than those of other two positions, and that at *z~rl~* was smallest in all the positions. The results show that the mechanical properties of the villus tree would strongly influence *θ* at *z~t~* and *z~θ~*, but hardly influence that at *z~rl~*. Even if the mechanical properties of the villous tree are changed, the homogenization of the bloods around the ramuli chorii would be kept.
DISCUSSION
==========
In this study, the computational villous tree model was developed, and used to evaluate the displacement in the human placenta caused by the contraction of the stem villi. The magnitude of the displacement was almost homogeneous, and the direction was useful for the fetal and maternal blood circulations. This tendency was maintained even if the mechanical properties of the placenta were changed. The experimental results such as MRI and 3D power Doppler angiography are described by scalar values so that the magnitude of the displacement could be directly compared with them. The resolution in the computation of this model was much higher than that in MRI or 3D power Doppler. Hence, representative values such as mean and SD will be necessary if the comparison between the experimental data and the computational result is carried out.
In the computation, every point in the stem villi contracted at the same time. Hence, the result in this study indicated that the displacement caused by the contraction would be helpful for the blood circulations when each contractile cell in the stem villi contracts at the same time. How to control the timing of the contraction for the effective blood circulation in the placenta can be investigated by this villous tree model. This investigation will be carried out in the future. The effect of the displacement on the maternal and fetal blood flows would be influenced by the directions of these blood flows. A computational model and method are necessary to investigate this effect. Developing them, with considering the usage of FWVs, will be the important topic to evaluate the blood circulation in the placenta.
CONCLUSION
==========
In this study, the computational model of the villous tree with active contractions was developed. The results based on this model show that the contraction could assist the maternal and fetal blood circulations in the placenta, and its effect would maintain even if the mechanical circumstances are changed. The combination between this computational model and non-invasive measurements will be useful to evaluate the condition of the placenta.
Declared none.
CONFLICT OF INTEREST
====================
The author confirms that this article content has no conflict of interest.
![Villous tree model developed in this study. The branching pattern in the stem villi of the model was indicated by the centripetal and centrifugal orders at the branches, whose example is indicated by **(a)** and **(b)**, respectively. **(c-e)** show the side views of the model: the stem villi, white; the villi except the stem villi, blue; the intervillous space, which the maternal blood passes through, blue. As **(d)** and **(e)** show, this model is between the chorionic and basal plates. The *z* axis of the Cartesian coordinate system is perpendicular to the chorionic plate. The size of this model is 34.8 × 34.8 × 24.5 \[mm\] (1200 × 1200 × 847 \[pixels\], 29 μm/pixel).](TOBEJ-11-36_F1){#F1}
![Contraction directions at the branches of the rami chorii. Arrows show the directions of the contractions. Each branch in the stem villi contracts along its axis and toward the junction.](TOBEJ-11-36_F2){#F2}
![Displacement caused by the contraction of the stem villi. *λ* = 1.45 mm, and the maximum distance for the propagation = 4.35 mm. All the parameters at each *z* coordinate are shown. While **(a)** shows the displaced area, the magnitude **(b)** and direction (*φ*, *θ*) **(c, d)** of the displacement were described by the representative values, the mean and standard deviation (SD) for the displaced area. The solid and dotted lines in **(c)** and **(d)** are the mean and SD, respectively. The triangles show the characteristic positions, which were observed at all the computations. *z~d~*, *z~φ1~*, *z~φ2~*, and *z~θ~* are the *z* coordinates for these characteristic positions.](TOBEJ-11-36_F3){#F3}
![Displacement patterns in the characteristic positions. *λ* = 1.45 mm, and the maximum distance for the propagation = 4.35 mm. In addition to the characteristic positions in each parameter, *z~d~*, *z~φ~*~1~, *z~φ2~*, and *z~θ~,* the representative positions of the truncus chorii, rami chorii and ramuli chorii appear: *z~t~*, *z~r~* and *z~rl~*, which are the middle *z* coordinates of the truncus chorii, rami chorii, and ramuli chorii, respectively.](TOBEJ-11-36_F4){#F4}
![Distribution of *φ* in the characteristic positions for the displacement at *λ* = 1.45 mm and the maximum distance for the propagation = 4.35 mm. **(a-e)** show the distributions of *φ* at the following characteristic positions, *z~t~*, *z~φ1~*, *z~r~*, *z~φ2~* and *z~rl~*. The area fraction of *φ*, from 45° to 90°, for all the computation results is indicated in **(f)**.](TOBEJ-11-36_F5){#F5}
![Distribution of *θ* for the displacement at *λ* = 1.45 mm and the maximum distance for the propagation = 4.35 mm. **(a-d)** show the distribution of *θ* in the characteristic positions, *z~t~*, *z~r~*, *z~θ~* and *z~rl~*. The SD of the area fraction in each class interval for all the computations (*SD~in~*) is indicated in **(e)**.](TOBEJ-11-36_F6){#F6}
######
Size and branching pattern in the stem villi model.
Parameter Truncus chorii Rami chorii Ramuli chorii
-------------------- ---------------- ---------------------- ------------------- -----------
**Branch** *d* \[mm\] 1 - 3 0.5 - 1 0.3 - 0.5
*z* \[mm\] 0 - 2.9 2.9 - 13.5 13.5 - 24.5
**Axis** *L~c~* \[mm\] 0 (*z* = 2.9) 8.99 (*z* = 13.5) \-
*L~b~*\[mm\] \- 0 (*z* =2.9) \*
0.29 (*z* = 3.9)
1.74 (*z* = 4.7)
4.64 (*z* = 5.8)
*r* \[mm\] \- (*L~b~*\< 1.74) 1.74 \-
(*L~b~*≥1.74) 8.99
*R~b~* \- 2 2.22 - 6.02
*C~f~* \- 4 4 - 20
The stem villi model was set in the space, whose size was 34.8 × 34.8 × 24.5 \[mm\] (*x* × *y* × *z*): the *z* coordinate shows the distance from the chorionic plate; *d*, the diameter of the branch; *L~c~*, the distance from the center of the space in each *z* coordinate (17.4 mm, 17.4 mm, *z*) to the axis of the branch at the boundary between the categories; *L~b~*, the distance from the center of the space in each *z* coordinate to the bifurcation; \*, each branch bifurcated differently; *r*, the radius of curvature *R~b~*, bifurcation ratio; *C~f~*, the centrifugal order at the tip. | {
"perplexity_score": 687.7,
"pile_set_name": "PubMed Central"
} |
Pages
Monday, December 2, 2013
Christmas Cards!
I absolutely adore this time of the year! Choosing just the right Christmas card, stamps and return address labels are something I start thinking about in oh...October...and this year was no exception.
Since I feel as big as a house, I knew I wasn't going to do a picture that focused around the belly. {No offense to those of you who have done that, are doing that or plan to do that, it's totally just my personal preference because I feel giant!}
We took our pictures in August {when we took our pregnancy announcement photos} and they went out in the mail Saturday to ensure people would start receiving them today.
So without any further aideu, here's our 2013 Christmas card. Simple, just the way I like it. From our family to yours, Merry Christmas. | {
"perplexity_score": 643.8,
"pile_set_name": "Pile-CC"
} |
Home Basics Steel Hairdryer Holder Hook
Subscriptions
Store and organize your bathroom essentials in this over the door organizer. Made from powder coated steel. Rust resistant. Hangs easily on most standard sized cabinet doors. 1 spring to hold a brush or a hairdryer. | {
"perplexity_score": 1496.8,
"pile_set_name": "Pile-CC"
} |
GETTY French Prime Minister Manuel Valls is to clamp down on radical islam calling it 'poison'
FREE now and never miss the top politics stories again. SUBSCRIBE Invalid email Sign up fornow and never miss the top politics stories again. We will use your email address only for sending you newsletters. Please see our Privacy Notice for details of your data protection rights.
The comments come following the murder of 86-year-old French Catholic priest Father Jacques Hamel who was killed on the altar during morning mass last Tuesday and three separate massacres in the country in just over a year. In a newspaper interview Prime Minister Valls says the Republic has been forced to intervene to drive out the "poison" of radical Islamism. And he has announced plans to shut down mosques supporting Salafism, an ultra-orthodox religious-political ideology based on a belief in "physical" jihadism practised by some followers of the Sunni faith.
GETTY Muslims pay tribute to Father Hamel who was killed in Normandy
ISIS fighters Fri, March 25, 2016 Iraq and Syrian jihadists, including the Paris and Brussels attacks suspects. Play slideshow PH 1 of 47 Belgian national Salah Abdeslam who masterminded the Paris attacks
He said: "All Salafists are not jihadists ... but almost all are jihadist Salafists... "A terrible poison has spread. "Slowly, insidiously, on a background of influences from abroad and rising communalism, developed against a model of society, a model against the Republic and its values. "Many Muslims in France are taken hostage by the fundamentalist Salafism, who worship a weapon against others. "The places of worship that house preachers will be closed systematically.
"It is necessary to rethink the training of imams and chaplains completely. "France must become a European centre of excellence in the teaching of Islamic theology." The people of Saint-Etienne-du-Rouvray have united in their revulsion at the murder of Father Jacques who served on the town's interfaith committee. He will be buried this morning following a public funeral in the 12th Century Rouen cathedral, in Normandy.
GETTY Leaders from the Mosque in Saint-Etienne-du-Rouvray will not bury attackers
It is necessary to rethink the training of imams and chaplains completely Prime Minister Manuel Valls
And the town's Muslim community have refused to bury the 19-year-old men responsible for the heinous crime. Mohammed Karabila, imam of one of the town's mosques, told Le Parisien: "We're not going to taint Islam with this person. "We won't participate in preparing the body or the burial." The French public took to the streets of Paris following the murder of Father Jacques in Normandy last week. Many were openly furious when Mr Valls visited a memorial service to remember the victims of the Nice terror attack. He was booed as he signed the book of condolence on the Promenade des Anglais where 84 people died and scores more were injured during the Bastille Day massacre.
GETTY Former President Nicolas Sarkozy wants terror suspects placed under house arrest | {
"perplexity_score": 278.7,
"pile_set_name": "OpenWebText2"
} |
John Erardi
[email protected]
Billy Hamilton ran a long way for that bases-loaded "dying quail" (might as well use the old-school term, considering what's to come) on Wednesday in San Diego.
It was difficult to tell on TV how far "in" he had been playing at the time, but it looked like he ran a lot farther to his left than he did "in" to try to get to that ball in shallow right-center.
Before the Reds departed for the long road trip to the West Coast by way of Chicago, Hamilton told me that the Reds pitchers, particularly the starters, like him playing shallow.
Mike Leake reiterated that after his gutty performance over Toronto two Saturdays ago .
"If there's a ball hit over his head (especially at Great American Ball Park), it's either off the wall or over the fence," Leake said. "When you have that speed, you can cheat a little bit. He's good at going back on balls."
Over the years, the same has been true with all the great center fielders, from Willie Mays to Jim Edmonds and Andruw Jones and the Reds' Eric Davis.
But it goes back even farther than that.
I related an anecdote to Hamilton that dates back to 1937.
New York Yankees pitching great Lefty Gomez was talking to rookie center fielder Joe DiMaggio one day after a game the Yankees had lost on a deep drive that one-hopped the center field wall at Yankee Stadium.
Gomez: "How come you were playing so shallow on that one, Joe?"
DiMaggio: "I'm gonna make 'em forget Tris Speaker."
Gomez: "You keep playing there, you're gonna make 'em forget Lefty Gomez."
News flash to Lefty: They've already forgotten you -- or at least Hamilton has; he didn't seem to recognize the name, and I'm not sure he even recognized the name of DiMaggio, either -- but he laughed at the story, because he got the point.
Almost four score years later, the Gomez-DiMaggio story still resonates.
Hamilton has gone to most of the Reds pitchers and told them that he'd like to play shallow.
"They've all said, 'Do it,'" recalled Hamilton. "Cueto and Homer (Bailey) have told me point blank, 'If they hit it over your head, it's my fault.' That gives me the confidence to play shallow. The pitchers hate the cheapies. They'd rather give up something hit hard than a broken-bat blooper."
If the Major League Baseball All-Star Game really was -- at its heart -- a battleground to determine which league will get home-field advantage in the World Series, Hamilton would be on the National League team, because he's a potential difference-maker late the game coming off the bench to run the bases or play center field.
Of course, home-field in the World Series really isn't what the All-Star Game is all about. That it partly sells itself as such is going to go down in history as one of the goofier things Commissioner Bud Selig has done on a long list of mostly good things.
But for all of the misplaced emphasis, baseball still has the best All-Star Game of all the major sports. And, as good a year as Todd Frazier and Hamilton are having (I believe Hamilton will end up National League Rookie of the Year, especially if he has as good a second half as he did first half), I'd rather see them make the All-Star Game next year, because next year the All-Star Game is in Cincinnati.
Still, Frazier deserves it this year, and it will be shame if the fallacy of the fan voting winds up keeping him out.
Meanwhile, the Mississippi Kid reminds me of DiMaggio in another way besides playing shallow.
Hamilton so rarely has to dive for a ball, that when he does, you know he's run a country mile to get there. He has his pitchers thinking ''can of corn'' even when the batters hit a bolt into the gap. Anything less than a laser, Hamilton is going to get there.
Another true story…
This from a longtime visitor to Yankee Stadium, circa 1950: ''DiMaggio isn't that great of a center fielder. I been coming here for 14 years and he ain't had a tough chance yet.''
So it is with Hamilton. He makes the difficult look easy, and the next-to-impossible look expected.
But as we were reminded Wednesday, even Hamilton with his speed and instincts can't always get to everything. He has the occasional tough chance.
By his incredibly high standards, he should have had that dying quail last Wednesday -- and he knows it. The ground didn't dislodge that ball from his glove; the ball hit the heel of his glove and was gone before his arm ever hit the ground.
The most interesting thing about that play is that we all thought he could and should have had it – even though for the past 12-14 years, various Reds pedestrian center fielders would have gathered that ball up on the second hop and nobody would have thought twice about it.
"I don't take my at-bats out to the outfield," Hamilton explained. "That's why I'm so aggressive out there. I know the other team is trying to keep me off the bases -- trying to keep me from getting my hits -- so why shouldn't do everything I can to keep their guys off the bases? You get me out, I'm going to do everything I can to get you out."
Hamilton said that being able to contribute so much defensively has calmed him down at the plate a little bit, because he's able to help the pitchers even on days when might not get a hit.
"Me and Hatch (outfield coach Billy Hatcher) talk about it all the time," Hamilton said. "A good defensive center field can play the game a long time. I figure if I can keep improving my defense, good things are going to happen."
Besides, trying to pin the blame for Wednesday's loss in San Diego on Hamilton would be wrongheaded, anyway. The Reds offense was held scoreless for the second time in three days. It wouldn't have mattered who had been pitching for the Reds -- Koufax, Johnson (either of them) or Mathewson. They'd have gone 0-3 with that lack of run support.
OK, I told Hamilton, how about we bring the historical comparisons a little more up-to-date? I told him the Reds center fielder he reminds me of most is Eric Davis.
Hamilton's eyes lit up.
Now there was a "comp" to which he could relate. Davis has been one of Hamilton's mentors. Davis was signed as a shortstop also, but the Reds quickly moved him to center field because of his speed.
And, yet, Davis – just like Hamilton does today -- played center field like a shortstop. Why? Because of his arm and instinct.
I mentioned to Hamilton the play Davis made in Pittsburgh in the 1990 National League Championship Series, when he came out of nowhere (he was playing left field that day), and backed up center fielder Billy Hatcher on a blast to center, taking the carom off the wall like a shortstop and gunning out the runner at third.
"Eric is one of the main guys who has helped me," said Hamilton, smiling. "Soon as they told me they wanted to switch me to center field, I went straight to E.D. He's made it a lot easier for me than I thought it was going to be."
Hamilton admits he didn't like at first being told he was being switched to center.
"I'd been playing shortstop my whole life," he said. "But when they said, 'It will help you get to the big leagues quicker,' I thought, 'OK, that's what I'm here for.' And now I like it.
"It feels good out there. Got a lot of space. But I'll admit it: I miss shortstop every now and then. Who knows, I might get a shot at shortstop in the late innings someday."
If it happens, just hope the hitter doesn't hit a dying quail to right-center. Only one Red has a chance to make the play, and his name is Billy Hamilton. | {
"perplexity_score": 332.4,
"pile_set_name": "OpenWebText2"
} |
Q:
What is meant by an HTML5 application?
Since HTML5 is still only a markup language, what is meant when people say "HTML5 application"? Please explain.
A:
An HTML5 application is an application that uses HTML5/Javascript/CSS3 as its primary means of achieving a User Interface.
The term is significant, largely because this is considered a platform-independent way to get an application onto as many different mobile devices as possible. Android and iOS are pretty much completely different, but both platforms will work with applications written in HTML5/Javascript/CSS3. All you need is an HTML5 compliant browser. | {
"perplexity_score": 464.3,
"pile_set_name": "StackExchange"
} |
35-year-old Greg Horn (pictured) whipped his two teen daughters with the cable so hard they had welts on their legs with open wounds. Detectives noted that Horn struck his children while they were visiting him at his house in Fotip Lane. Their mother notified police after seeing the injuries.
The 30-second video of Horn beating his daughters has sparked strong outcry. “No matter what those kids did, no one deserves to be beaten to that extent. How can you keep going when your child is screaming like that?,” one commenter on the video asked.
Watch Horn hitting his girls here:
Another viewer blamed the girls’ behavior on their father. “If he treated them better to begin with maybe they wouldn’t have stepped so far out of line. I’m glad my kids will never see me lose control like this.”
According to Children’s Services, abuse cases are up by over 4,702 cases since last year, almost 100 more cases than in 2011.
Kevin Lavoie of the Montgomery County Children’s Services says they hope to reduce that number. “We don’t want people to have any reservations about calling 224- KIDS and letting us know about a circumstance or a concern,” Lavoie said.
As for Horn, his court date is scheduled for April 16th. Co-incidentally, his indictment comes during the first week of Child Abuse Awareness Month. | {
"perplexity_score": 382.6,
"pile_set_name": "Pile-CC"
} |
Loccitane almond delicious hand cream 30ml
£6.00
Enriched with Almond milk and Almond oil, the silkysmooth cream Almond Delicious Hand helps to nourish and soften the hands while enveloping them with the subtle and mouthwatering scent of fresh Almonds. Our nongreasy formula has a creamy texture, perfect for hydrating hands throughout the day.The almond nut, which grows protected in a beautifully soft and green velvet shell, is renowned for its ability to soften and smooth the skin. LamprsquoOCCITANE is committed to purchasing almonds from producers in the South of France so that the almond tree, which had long been forgotten in the region, once again becomes a familiar element in the Provenampccedilal landscape.
Most popular LOccitane
Loccitane almond delicious hand cream 30ml on other UK sites
Enriched with Almond milk and Almond oil, the silkysmooth cream Almond Delicious Hand helps to nourish and soften the hands while enveloping them with the subtle and mouthwatering scent of fresh Almonds. Our nongreasy formula has a creamy texture, perfect for hydrating hands throughout the day.The almond nut, which grows protected in a beautifully soft and green velvet shell, is renowned for its
Enriched with almond milk and almond oil, the silky-smooth cream Almond Delicious Hand helps to nourish and soften the hands while enveloping them with the subtle and mouth-watering scent of fresh Almonds. Our non-greasy formula has a creamy texture, perfect for hydrating hands throughout the day.
L’Occitane’s best selling Shea Butter Hand Cream is a super smoothing synergy of 20% shea butter honey and sweet almond extract that’s been blended with the light and alluring aromas of jasmine and ylang-ylang essences. Inviting even the most hard working hands to a fresh beginning L’Occitane Shea Butter Hand Cream smells delicious as the silky treatment
Designed to keep your hands looking and feeling young and soft, this Hand Cream Trio Collection by LOccitane boasts three varied hand creams. Perfect as a gift, this set it a must have. K.D. This set contains the following products: LOccitane Cherry Blossom Hand Cream 30mlEnriched with shea butter and vitamin E, LOccitane Cherry Blossom Hand Cream nourishes and protects hands from daily
With an efficient 180 W motor and simple to use design, the cream KitchenAid 5KHB2571BA Hand Blender delivers excellent performance when you need to chop and blend ingredients in your kitchen. Hand held blending Boasting a stainless steel S-blade, the KitchenAid Hand Blender is small, yet robust and can power through most ingredients with ease. With five speed settings available, this hand blender
Light hydrating moisturiser to balance and protect sensitive skin.; A mild unperfumed hydrating day and night cream made from a base of the finest Almond and Plum oils. The light, quickly absorbed cream leaves the skin feeling fresh, supple and smooth.
This mild formula calms irritation-prone skin and deliver lasting moisture to sensitive hands. The protective shell of the organic almond enfolds a precious oil-rich kernel. In just the same way Almond Sensitive Skin Hand Cream protects the sensitive skin of your hands. The mild formula, with organic almond oil, reinforces the skin’s own protective function and therefore defends
Masculine to the core. DKNY Be Delicious men brings together the raw lushness of nature with the powerful sophistication of the big city with crisp, wet greens, modern woods, green apples and intoxicating coffee.
Loccitane almond delicious hand cream 30ml on other UK sites
Loccitane almond delicious hand cream 30ml on USA sites
Enriched with Almond milk and Almond oil, this silky-smooth cream helps to nourish and soften the hands while enveloping them with the subtle and mouthwatering scent of fresh Almonds. Size: 1 ounce Quantity: One (1) Targeted area: hand Skin/hair type: all skin types Active ingredients: N/A We cannot accept returns on this product. Due to manufacturer packaging changes,
Almond and plum kernel oils are a match made in organic heaven and have been beautifully brought together in Weleda’s Almond Soothing Facial Cream to replenish dry or sensitive skin to leave your skin feeling soft supple and protected. This creamy moisturiser soothes your skin and protects it from the effects of the environment supporting natural regeneration. Weleda Almond Soothing
Are you tired of giving multi-dose treatments and cleaning up diarrhea for 3-5 days? See results within 24 hours with just 1 syringe of DiaGel for Dogs 5 mL (61-120 lbs) . Common uses include but are not limited to garbage gut, changes in diet and/or water, stress and environment changes like boarding, breeding, traveling and showing. DiaGel is palatable, easy to give and approved by the NASC.
Were rather pleased with this reversible boxy sweatshirt shaped sweater because with a button through back you can switch it round to wear as a clever cardigan. Knitted from lightweight cotton it’s the perfect summer weight knit. | {
"perplexity_score": 964.1,
"pile_set_name": "Pile-CC"
} |
20 Kan. App. 2d 361 (1995)
ERROL JOE KAMPSCHROEDER, Appellee,
v.
NORMA W. KAMPSCHROEDER and SHERRYL HOLMES, Appellants.
No. 71,720
Court of Appeals of Kansas.
Opinion filed January 6, 1995.
Gerald L. Cooley, John M. Cooley, and Randall F. Larkin, of Allen, Cooley & Allen, of Lawrence, for appellant Norma W. Kampschroeder.
Stephen M. Fletcher, of Overland Park, for appellant Sherryl Holmes.
Byron E. Springer, of Barber, Emerson, Springer, Zinn & Murray, L.C., of Lawrence, for appellee.
Before GERNON, P.J., ELLIOTT and LEWIS, JJ.
LEWIS, J.:
Errol Joe Kampschroeder was born to the marriage of Robert and Waneta Kampschroeder. Waneta died in April *362 1980, and Robert married Norma in October 1980. The marriage was not accepted well by Errol Joe and appears to have affected the relationship between the parties from that point on.
Robert and Norma remained married until Robert's death in 1990. Upon Robert's death, most of his and Norma's assets were held in joint tenancy with the right of survivorship. Norma placed these assets in her own name and the name of Sherryl Holmes, her daughter. Errol Joe commenced the present action to impose a constructive trust on the jointly held assets. The trial court held in favor of Errol Joe, and Norma and Sherryl appeal.
We affirm the decision of the trial court.
Litigation of this nature is particularly fact driven. The facts in this case are not, unfortunately, unusual. This lawsuit is between a stepson and his stepmother over property owned by the son's father and stepmother's husband at the time of his death. There was an extensive trial, and the trial court made 32 detailed findings of fact. We have reviewed the record and conclude that all of the trial court's findings of fact are supported by substantial competent evidence.
After hearing all the evidence, the trial court held that Norma and Robert agreed, for the convenience of the parties, to hold most of their assets in joint tenancy. This was to allow the properties accumulated by both parties or brought into the marriage by both parties to become the property of their heirs after their death. They intended that "the properties of Robert go to Errol and the properties of Norma go to Sherryl." Although we concede that a different spin might have been put on the evidence, the analysis adopted by the trial court is substantially supported by the record.
The trial court found five significant factors in reaching its conclusions:
"a. The Antenuptial Agreement showed their original intentions to keep their property separate.
"b. Robert's attitude toward Sherryl's son was emphatic that he not receive any of Robert's property and was certainly corroborative of their intent that the properties of Robert go to Errol, and the properties of Norma go to Sherryl.
"c. Clearly, the taped conversation of Norma and Nancy corroborates the testimony and position of the Plaintiff. Norma's testimony that she wanted to *363 be fair did not refer to her deciding whether commingled property should be separated because that had already been decided by the parties. That was clear by their intent as indicated on the taped conversation. When Norma indicated she wanted to be fair it is clear from the testimony she was overwhelmed by the process of having to separate the property out, of deciding just what was hers and what was Robert's, and thus would be Errol's.
"d. Robert's comment: `Make certain that Norma will be cared for' is not the language or the statement of a man who was leaving his entire estate of some worth to his wife. The fact that he wanted to make certain Norma was cared for indicated to me on his part a confusion as to what the wills would be.
"e. Norma's comment: `This will is no good,' certainly again corroborates the testimony or the position that this was indeed, the intentions of the parties was to make certain that what was Robert's went to Errol, and what was Norma's went to Sherryl."
Once again, the analysis of the trial court is well within the evidence shown. The five factors cited by the trial court are clearly supported by substantial competent evidence. In the final analysis, the trial court concluded that the parties had entered into an understanding where each was to have the use of the income from the property of the other until their death, at which time the property would go to their respective children. This understanding formed the basis for the consideration of the agreement.
The trial court went on to conclude:
"Plaintiff has by clear and convincing standards shown that there was an agreement entered into, and, in fact, always understood by Norma and Robert, that upon the death of the first to die, the income from the property brought into the marriage by that person would be enjoyed by the surviving spouse, and then pass on to the children of Norma or Robert, depending upon the situation."
This conclusion is consistent with the trial court's findings of fact. Norma had breached this understanding, which gave rise to the constructive trust imposed.
The trial court went on to determine which assets were subjected to the constructive trust. The total value of those assets is $323,233.11. The constructive trust is such that Norma is to receive the income from these assets until her death, at which time they are to be paid to Errol Joe.
In appellants' brief is the following statement: "While defendants admit that the trial court's findings of fact are supported by substantial competent evidence in the record, defendants deny *364 that those findings of fact support the trial court's conclusions of law or its judgment." During oral argument before this court, counsel for Norma conceded that the trial court's findings of fact were supported by substantial competent evidence. On the other hand, counsel for Sherryl was unwilling to make such a concession. The problem with Sherryl's position is that her attorney did not file a separate brief. He joined in a single brief filed by the attorney for Norma. Sherryl is not in a position to contradict admissions made in the brief filed.
However, we have examined the record, and we conclude that the findings of fact are supported by substantial competent evidence.
An oral trust must be proved by clear and convincing evidence. Wehking v. Wehking, 213 Kan. 551, 554, 516 P.2d 1018 (1973). Upon review, we operate under the assumption that the trial court applied the correct standard of proof and was satisfied with the quantum of evidence introduced.
A constructive trust arises "`wherever the circumstances under which the property was acquired make it inequitable that it should be retained by the person who holds the legal title.'" Hile v. DeVries, 17 Kan. App.2d 373, 374, 836 P.2d 1219 (1992) (quoting Clester v. Clester, 90 Kan. 638, 642, 135 Pac. 996 [1914]).
An essential element of proving a constructive trust is a showing of fraud. However, there are two types of fraud, actual and constructive.
"Actual fraud is an intentional fraud, and the intent to deceive is an essential element of the action. Constructive fraud, however, is a breach of a legal or equitable duty which, irrespective of moral guilt, the law declares fraudulent because of its tendency to deceive others or violate a confidence, and neither actual dishonesty of purpose or intent to deceive is necessary. [Citation omitted.]" Moore v. State Bank of Burden, 240 Kan. 382, 389, 729 P.2d 1205 (1986), cert. denied 482 U.S. 906 (1987).
In the context in which this issue is presented, we are not dealing with actual dishonesty of purpose or intent to deceive. The evidence indicates Norma was guilty of a breach of duty amounting to constructive fraud.
Absent actual fraud, there are two additional elements which are required to be proven. First, there must be a confidential *365 relationship. Secondly, the confidence reposed must be betrayed, or a duty imposed by the relationship must be breached. See Winsor v. Powell, 209 Kan. 292, 302-03, 497 P.2d 292 (1972).
A confidential relationship is not presumed, and the burden of proving such a relationship existed rests upon the party asserting its existence. Paul v. Smith, 191 Kan. 163, Syl. ¶ 4, 380 P.2d 421 (1963). The mere fact that a transfer of property occurs between a husband and wife and no valuable consideration passes is not sufficient to raise a trust by implication. Clester v. Clester, 90 Kan. 638, 641, 135 Pac. 996 (1914).
Under the facts shown, Errol Joe seeks to impress a trust on property which Norma owns by virtue of a joint tenancy contract with Robert. There is no question but that the property held in joint tenancy may be the subject of a trust. Wehking v. Wehking, 213 Kan. 551, Syl. ¶ 2; Winsor v. Powell, 209 Kan. at 300.
The facts of this case are strikingly similar to those in Winsor v. Powell. In that action, the decedent, when discussing his affairs, spoke of his daughter, Sarah, and said, "`She'll do the right thing.'" 209 Kan. at 301. In this action, Robert told Errol Joe that he had $350,000, that Norma would be fair, and that Errol Joe could trust her. Robert told Errol Joe that Norma was to get the interest and, upon her death, Errol Joe was to get the principal. In addition, Norma acknowledged to Errol Joe's wife the necessity of her separating Robert's assets from her own. These facts in Winsor v. Powell were held sufficient to raise a constructive trust, and they are equally sufficient in this action.
Norma and Sherryl argue that the agreement found by the court was not proven by clear and convincing evidence.
"To be clear and satisfactory, evidence should be `clear' in the sense that it is certain, plain to the understanding, and unambiguous, and `satisfactory' in the sense that it is so believable that persons of ordinary intelligence, discretion, and caution may have confidence in it. Clear and satisfactory evidence is not a quantum of proof, but a quality of proof." Barbara Oil Co. v. Kansas Gas Supply Corp., 250 Kan. 438, Syl. ¶ 7, 827 P.2d 24 (1992).
Norma and Sherryl suggest that there was no direct evidence of an agreement between Robert and Norma. However, we note that in the recorded conversation between Norma and Errol Joe's *366 wife, Norma acknowledges the existence of some understanding between her and Robert and indicates that in order to carry out that understanding, she must separate Robert's assets from her own. We consider this to be direct evidence of the existence of an agreement. Indeed, circumstantial evidence may be used to prove the existence of an agreement. Staab v. Staab, 160 Kan. 417, 419, 163 P.2d 418 (1945).
Earlier in this opinion, we enumerated the five significant factors relied on by the court in reaching its conclusion. Norma and Sherryl argue that these factors do not show by clear and convincing standards that an agreement existed.
We do not review for the quantum of evidence, but rather the quality. "On review, this court considers only the evidence of the successful party to determine whether it is substantial and whether it is of a clear and convincing quality. See Newell v. Krause, 239 Kan. 550, 557, 722 P.2d 530 (1986)." Barbara Oil Co. v. Kansas Gas Supply Corp., 250 Kan. at 448.
As we review the evidence in light of our standard of review, we conclude that each of the five factors relied upon by the trial court is supported by evidence of a clear and convincing quality. In the final analysis, this was a factual situation. The facts were resolved in favor of Errol Joe, and we will not engage in factfinding or substitute our judgment on that issue.
The element of a confidential relationship is shown by the evidence. Under the trial court's construction of the facts, Robert and Norma entered into an agreement in which each relied on the survivor to see that the assets were properly distributed. Robert placed trust and confidence in Norma to see that Errol Joe received the proper distribution of assets, and it would be inequitable to permit her to disregard the terms of that agreement.
Finally, it is suggested that even if there was an agreement and a confidential relationship, Norma did not breach either. The argument is that under the terms of the agreement, Norma was to enjoy the income for her lifetime, and only upon her death was the principal to pass to Errol Joe. It then follows that there cannot be a breach of fiduciary duty or a betrayal of confidence unless and until Norma dies without the necessary provisions in her will.
*367 While this argument may have some logical basis, it ignores the realities of the situation. After Robert's death, some of the assets were placed in joint tenancy with Norma's daughter, Sherryl. This was obviously done with the intent that upon Norma's death, these assets would pass to Sherryl. In addition, Norma now denies that any agreement existed and testified, "I never made any commitment to Bob." These facts point to a breach of the agreement by Norma.
In summary, the findings of the trial court were supported by substantial competent evidence and the conclusions of law are consistent with and supported by the findings of fact.
EXHIBITS 6 AND 14 THROUGH 20
Norma and Sherryl next argue that the trial court erred in admitting into evidence plaintiff's exhibit 6 and plaintiff's exhibits 14 through 20. This argument is principally based upon the premise that an inadequate foundation was shown.
The trial court is possessed of discretion when ruling on admissibility of evidence. An attack on an evidentiary ruling requires that the party attacking that ruling show that the trial court abused its discretion. An abuse of discretion exists only when no reasonable person would take the view adopted by the trial court. St. Francis Regional Med. Center, Inc. v. Weiss, 254 Kan. 728, 748, 869 P.2d 606 (1994).
K.S.A. 60-407(f) provides that all relevant evidence is admissible unless otherwise provided by statute. Relevant evidence is evidence having "any tendency in reason to prove any material fact." K.S.A. 60-401(b). "It is axiomatic that a foundation must be laid establishing the competency, materiality and relevancy of all evidence prior to admission." Cansler v. Harrington, 231 Kan. 66, 69, 643 P.2d 110 (1982).
We conclude that the trial court did not err in admitting the exhibits in question. Exhibit 6 was a photocopy of the schedule "E" of Robert's estate tax return. This exhibit listed all of Robert's jointly held property. In addition to schedule "E," the exhibit contains a listing of separate assets held by Norma at Robert's death. The separate property was identified by Norma on direct *368 examination. We conclude this exhibit was clearly relevant and material and that a proper foundation was laid.
Exhibits 14 through 20 consisted of financial records which traced the assets from the time Robert and Norma were married until Robert's death. These exhibits were clearly relevant. One of the principal issues in this action was to identify which assets originated as Robert's separate property and which assets were accumulated during the marriage. Exhibits 14 through 20 were relevant on that issue.
Norma and Sherryl also argue about the authenticity of the records. They suggest that these exhibits were admitted without proper foundation, identification, or indicia of trustworthiness. The principal problem with this particular argument is that the parties stipulated as to the authenticity of the records prior to trial.
We see no need to describe with particularity the evidence purported to be shown by each exhibit. It seems to us that one of the principal issues in the admission of evidence of this sort is its authenticity. The parties stipulated as to the authenticity of those records, and we find no error on the part of the trial court in admitting exhibits 6 and 14 through 20.
JUDGMENT AGAINST SHERRYL HOLMES
Sherryl takes issue with the trial court's finding of fact No. 32. This finding identifies assets which were brought into the marriage by Robert and later transferred by Norma into joint tenancy between herself and Sherryl. Sherryl argues that this finding of fact is not supported by substantial competent evidence. We disagree and have previously indicated our decision that all of the trial court's findings of fact were supported by substantial competent evidence. Our earlier comments are also relevant concerning the position of Sherryl in arguing that the findings of fact were not supported by substantial competent evidence.
Sherryl also argues that no findings of fact remain which would support the judgment entered against her.
The trial court does not suggest that Sherryl was culpable in procuring the transfers to her mother and herself as joint tenants. *369 Culpability is not the issue. The stark fact is that Sherryl is a joint tenant on a substantial amount of assets on which the trial court has imposed a constructive trust. "If the trustee in breach of trust transfers trust property and no value is given for the transfer, the transferee does not hold the property free of the trust, although he had no notice of the trust." Kline v. Orebaugh, 214 Kan. 207, Syl. ¶ 6, 519 P.2d 691 (1974).
The fact that Sherryl did not procure the transfer of the property does not entitle her to hold it free of trust nor warrant a conclusion that the judgment against her is invalid. Norma testified that she wanted Sherryl to have access to the joint tenancy accounts in case they were needed to take care of Norma. In addition, Norma testified that she intended Sherryl to get the accounts upon her death.
We hold that the trial court did not err in entering judgment against Sherryl. The findings of fact made by the trial court support that judgment.
Affirmed. | {
"perplexity_score": 324.1,
"pile_set_name": "FreeLaw"
} |
Operations
Local Press Highlights Limo Vehicles At LCT-NLA Show East
First Class Customs owner and CEO Jay Glick and his wife, Denise, were photographed inside on of their vehicles on the show floor to LCT-NLA Show East at Harrah's Atlantic City, Monday, Nov. 9, 2015. (Press of Atlantic City)
ATLANTIC CITY, N.J. — The new Waterfront Converence Center at Harrah’s Resort was a makeshift showroom Monday for dozens of tricked-up, super-sized and even understated variations on the limousine, because Harrah’s is hosting an annual industry trade show that runs through Tuesday. | {
"perplexity_score": 472.1,
"pile_set_name": "Pile-CC"
} |
Facebook n’a trouvé aucune trace d’ingérence étrangère dans le mouvement des « gilets jaunes », qui est né et s’est organisé en grande partie sur le réseau social.
Les autorités françaises s’inquiétaient du rôle éventuel d’une puissance étrangère qui aurait pu, en sous-main, instrumentaliser la contestation. Trois mois plus tard, l’enquête interne au réseau social n’a rien découvert de suspect, a expliqué Nathaniel Gleicher, directeur de la cybersécurité de Facebook, dans un entretien accordé au Monde jeudi 4 avril.
Lire l’entretien : le plan de Facebook pour protéger les élections européennes
Des habituels « discours clivants »
Ce cadre de l’entreprise californienne – qui dirige les équipes chargées de contrer les opérations de propagande – a cependant reconnu, sans les nommer, que certains acteurs avaient profité de la contestation pour diffuser leurs habituels « discours clivants » comme « à chaque fois qu’il y a un mouvement politique majeur ». « Mais savoir si nous avons détecté quelque chose d’inauthentique dans le mouvement en lui-même, c’est une question différente et nous n’avons rien repéré sur ce point. Nous n’avons rien vu d’inauthentique dans le mouvement. Nous continuons à surveiller la situation, puisque notre travail consiste justement à repérer ce genre d’activité », a encore expliqué M. Gleicher.
Depuis 2016, le réseau social fait la chasse aux comportements « inauthentiques », c’est-à-dire à des comptes ou des pages Facebook qui ne sont pas ce qu’ils prétendent être et tentent de diffuser des messages pour influencer le débat politique.
Le secrétariat général à la défense nationale français avait, au début de décembre, diligenté des vérifications sur les réseaux sociaux après avoir repéré l’apparition de nombreux comptes suspects et très actifs sur le sujet des « gilets jaunes », notamment sur Twitter.
La question de l’ingérence politique de puissances étrangères par le biais des réseaux sociaux est un risque pris très au sérieux par les autorités françaises depuis quelques années. En particulier depuis que la Russie a mené une opération d’envergure contre l’élection présidentielle américaine, en 2016. La Russie a d’ailleurs été critiquée par certains experts dans le cadre du mouvement des « gilets jaunes ».
Article réservé à nos abonnés Lire aussi « Gilets jaunes » : soupçons de manipulation sur les réseaux sociaux | {
"perplexity_score": 868.2,
"pile_set_name": "OpenWebText2"
} |
Q:
Resizeing a crystal report
I have one crystal report. In this report I have 10 sections in report footer.
report footer1 .... report footer10;
Every section contains data. I have suppress formula at each section base on data. Ex. this formula is for one of my section " {#RTotal8} = 0 "
So until here every thing is ok. If I don't have data in each section, that section does not appear it hides.
But if every 10 sections hide or most of them, I have white space.
I want for each section that hide, my report resize.
(I want default size with consider of all section, and if all section appear so we have no white space, but if each section hide i want my report resize too)
A:
You can suppress the blank section
In section expert there is option to suppress blank section of the report | {
"perplexity_score": 1668.6,
"pile_set_name": "StackExchange"
} |
Q:
What exactly is a "Console"?
I am trying to writing a console application. It has its original console, let's name it console A. And I want this application to do the following things via C#:
Open another console B in another thread, then get input from A and output it to B;
type a command in A, such as dir, and show the output in B;
while doing the above things (still not done yet. X_X ), I find myself lack a through understanding of what a console window is, and how it is assigned to a console application, especially the very first console when my console application starts to run. Could some one shed some light on me?
Is console window physically a memory area in the video memory? Or something else?
Could different threads within the same process have different console of its own for its own I/O?
Many thanks...
Hi, guys, now I am using one console application to start another console application in a new process. Thus I can have 2 consoles output at the same time.
My understanding now is that, for Windows OS, a console is a special window, and it's a system resource that OS assigned to the application without-a-UI as a necessary user interface. Windows OS handles the wiring between the system-prepared console window with our UI-less application.
A:
In Windows terms, a Console is a textual GUI window that you see when you run "cmd.exe". It allows you to write text to, and read text from, a window without the window having any other UI chrome such as toolbars, menus, tabs, etc,..
To get started you'll want to load Visual Studio, create a new project and choose "Console Application". Change the boilerplate code that Visual Studio produces to:
using System;
using System.Text;
namespace MyConsoleApp
{
class Program
{
static void Main(string[] args)
{
Console.Write("Hello, world!");
Console.ReadKey();
}
}
}
When you run your application, a console window will open with the text "Hello, world!" and it'll stay open until you press a key. That is a console application.
Is console window physically a memory area in the video memory? Or something else?
It's not physically a memory area in video memory, it's "something else". The Wikipedia Win32 console page gives a fairly robust descrption of the ins and outs. | {
"perplexity_score": 745.4,
"pile_set_name": "StackExchange"
} |
The present invention relates to (1) a process for the production of a low-molecular-weight allylamine polymer or an addition salt thereof, (2) a low-molecular-weight allylamine polymer or an addition salt thereof, (3) a water-resistance-imparting agent for use in an ink, which contains the same, and (4) an ink composition containing the above water-resistance-imparting agent. More specifically, it relates to (1) a process for efficiently and industrially advantageously producing a low-molecular-weight allylamine polymer or an addition salt thereof, which is improved in coloring, has little ignition residue content and is useful for use in various fields, (2) a low-molecular-weight allylamine polymer or an addition salt thereof, of which the ignition residue content, the unreacted monoallylamine content and the coloring are small or low and which is useful for various uses in the field of fine chemicals, (3) a water-resistance-imparting agent for use in an ink, which contains a low-molecular-weight allylamine polymer or its addition salt having the above properties and which is suitable for use in an inkjet recording ink, and (4) an ink composition, particularly an inkjet recording ink composition, which contains the above water-resistance-imparting agent and is excellent in water resistance and shelf life.
It is hitherto known that allylamine does not easily undergo polymerization due to degradative chain transfer, and there is not much that is known concerning any effective method for producing an allylamine polymer. As a general method of producing an allylamine polymer or an addition salt thereof, there is known a method in which a monoallylamine addition salt is polymerized in water or a polar solvent in the presence of a radical polymerization initiator having a molecule containing an azo group and a cationic-nitrogen-possessing group at a temperature in the range of from 40 to 70xc2x0 C., to obtain an addition salt of an allylamine polymer, and optionally, the so-obtained addition salt of an allylamine polymer is neutralized with an alkali (e.g., JP-A-58-201811). An allylamine polymer or an addition salt thereof obtained by the above method is relatively free from being colored, and is used in the fields of dye fixing agents, binders for paper making and additives to various chemicals.
On the other hand, in recent years, a low-molecular-weight allylamine polymer or an addition salt thereof is demanded in a variety of fields. When the radical polymerization initiator having a molecule containing an azo group and a cationic-nitrogen-possessing group is used as a radical polymerization initiator, however, it is required to use a large excess of an inorganic acid such as hydrochloric acid for producing a low-molecular-weight allylamine polymer or an addition salt thereof, as is described in JP-B-6-2780, so that there are involved problems that the removing of an excess of the inorganic acid is complicated and that a polymer solution obtained is liable to be colored.
Further, as another method of producing a low-molecular-weight allylamine polymer or an addition salt thereof, JP-A-5-195450 discloses a method in which an aqueous solution of an addition salt of a monoallylamine is provided and allowed to react in the presence of a large amount of a peroxide-based radical polymerization initiator at a high temperature.
In the above method, however, the radical polymerization initiator is used in a large amount and the polymerization is carried out under severe temperature conditions. There are therefore caused problems that an aqueous solution of an obtained low-molecular-weight allylamine polymer or addition salt thereof is inevitably colored in brown or the like, and that the coloring is liable to proceed with the passage of time.
Further, when a solution prepared by polymerization according to the above method is treated with activated carbon for overcoming the above coloring, procedures of removing the activated carbon by filtration are required. Moreover, a fine powder of the activated carbon is liable to be contained in the end polymer during the filtration, and it sometimes causes a problem in some use.
As a printer, a dot impact printer, a laser printer, a thermal printer, an inkjet printer, etc., are known. Of these, an inkjet printer is widely used in recent years due to characteristic features such as fast printing with a low noise, a low printing cost, downsizing and weight-decreasing feasibility based on a simple mechanism, an easiness in multi-color printing and image size increasing, non-necessity of development and fixing and adaptability of a record pattern.
In the above inkjet printer, conventionally, recording is carried out by an inkjet recording method in which an ink blob is generated and ejected by an electrostatic suction method, an air compression method, a method using electric deformation of a piezoelectric element or a method using a pressure caused by heat-blowing, and further, the ink blob is allowed to adhere to a recording paper. As an ink for use with the above recording method, generally, there is used a water-based ink prepared by dissolving or dispersing a colorant such as a dye or a pigment in water, a water-soluble organic solvent or a mixture of these.
In recent years, inkjet recording is required to satisfy water resistance on an ordinary paper, and as a water-based ink composition for attaining the above requirement, combinations of polyethyleneimine and polyamlines mainly including modified products thereof with dyes have been studied in various ways.
For example, there have been proposed (1) a water-fast inkjet composition comprising a hydroxyethylated polyethyleneimine and a dye component (JP-A-62-119280), (2) a water-resistant water-based ink composition comprising a polyamine having a molecular weight of at least 300 and having primary amino groups, an anionic dye, a stabilizer and a wetting agent (JP-A-2-255876 and JP-A-3-188174) and (3) a water-based ink comprising a specific anionic dye and amino acid type polyamine or polyethyleneimine (JP-A-8-113743).
However, the inkjet composition in the above (1) has a problem that since polyethyleneimine contains hydroxyethyl groups and hydrophilic nature increases depending upon the degree of a content thereof, so that water resistance decreases. The water-based ink composition in the above (2) involves a problem that a shelf life is poor since polyethyleneimine specifically described in Example highly possibly attacks an anionic dye. Further, the water-based ink in the above (3) has a problem that it is required to select a dye suitable for imparting water resistance from an anionic metal-containing dye, a metal-free dye having an anionic group and an azo group in specific positions or a metal-free azo dye having an aromatic ring, which limits dye selection to a narrow range, so that it is difficult to prepare an ink having a desired hue and a desired color density.
On the other hand, attempts have been made to use an allylamine polymer as a water-resistance-imparting agent in an ink composition. In this case, however, there are required complicated procedures of reacting an allylamine hydrochloride polymer with a dye (dye containing acid salt such as sulfonic acid salt, etc.) to prepare a dye containing an allylamine polymer as a counter cation and removing an inorganic salt, etc., by isolating it as a solid before use, as is described in JP-A-63-33484. Further, for avoiding the above complicated procedures, an allylamine polymer is converted to a free polymer in advance, and further, an inorganic salt, etc., are removed. Even in this case, when the allylamine polymer is used in an ink, the ink is liable to cause aggregation, which causes a problem in use.
Under the circumstances, a first object of the present invention is to provide a process for efficiently and industrially advantageously producing a low-molecular-weight allylamine polymer or its addition salt, which is improved in coloring, has little ignition residue content and is useful for various fields.
A second object of the present invention is to provide a low-molecular-weight allylamine polymer or its addition salt, which has a high quality and is useful for various uses in the field of fine chemicals.
Further, a third object of the present invention is to provide a novel water-resistance-imparting agent for use in an ink, which is suitable for use in an inkjet recording ink, and a fourth object of the present invention is to provide an ink composition, particularly an inkjet recording ink composition, which contains the above water-resistance-imparting agent and is excellent in water resistance and shelf life.
For achieving the above objects, the present inventors have made diligent studies and as a result, have found that the first object can be accomplished by distilling a low-molecular-weight allylamine polymer solution containing an unreacted monoallylamine and salt to distill off the unreacted monoallylamine, then subjecting the residue to electrodialysis, and optionally, further carrying out acid treatment.
Further, it has been found that a low-molecular-weight allylamine polymer having an ignition residue content equivalent to, or lower than, a specific value, having a weight average molecular weight in a specific range and preferably having an unreacted monoallylamine content and an absorbance, measured by a certain method, which are equivalent to, or smaller than, specific values, or an addition salt of a low-molecular-weight allylamine polymer having the above properties can meet the second object, that a water-resistance-imparting agent containing a low-molecular-weight allylamine polymer having the above properties or an addition salt thereof can meet the third object, and further that an ink composition comprising a low-molecular-weight allylamine polymer having the above properties or an addition salt thereof can meet the fourth in object.
The present invention has been made on the basis of the above findings.
That is, the first object of the present invention is achieved by a process for the production of a low-molecular-weight allylamine polymer having a weight average molecular weight of 250 to 4,000 or an addition salt thereof, which comprises distilling a low-molecular-weight allylamine polymer solution containing an unreacted monoallylamine and a salt, thereby distilling off the unreacted monoallylamine, then, subjecting a residue to electrodialysis, and optionally carrying out acid treatment.
Further, the second object of the present invention is achieved by a low-molecular-weight allylamine polymer having an ignition residue content of 5% by weight or less and a weight average molecular weight of 250 to 4,000, or an addition salt of a low-molecular-weight allylamine polymer having the above properties.
Furthermore, the third object of the present invention is achieved by a water-resistance-imparting agent for an ink, comprising a low-molecular-weight allylamine polymer having an ignition residue content of 5% by weight or less and a weight average molecular weight of 250 to 4,000, or an addition salt of a low-molecular-weight allylamine polymer having the above properties.
Moreover, the fourth object of the present invention is achieved by an ink composition comprising (A) a colorant and (B) a water-resistance-imparting agent containing a low-molecular-weight allylamine polymer having an ignition residue content of 5% by weight or less and a weight average molecular weight of 250 to 4,000, or an addition salt of a low-molecular-weight allylamine polymer having the above properties. | {
"perplexity_score": 280.9,
"pile_set_name": "USPTO Backgrounds"
} |
Case Study
Literature
Products
We are one of the UK's leading manufacturers of plaster, plasterboard and drywall systems.
Knauf products and systems continue to be specified on some of the UK's largest and most prestigious projects. We offer a complete range for any drylining project - no matter what the size - and a complete service to back them up.
Our range of quality plasterboards includes standard wallboard for general use and a comprehensive range of high performance boards with specific characteristics to enhance performance in the areas of:
Moisture resistance
Sound reduction and reverberation
Impact resistance
Fire protection
Control of water vapour
Thermal insulation
Each of our boards is colour-coded to the industry standard to ease recognition. They are available with tapered or square edge profiles and in a wide range of sizes suitable for all applications.
Knauf AQUAPANEL® cement board is an extremely durable tile backer providing a solid substrate for wet indoor areas such as bathrooms, shower rooms and wet rooms. Resistant to mould and mildew, AQUAPANEL® will not deteriorate in water. It retains its strength even if fully immersed. | {
"perplexity_score": 472.2,
"pile_set_name": "Pile-CC"
} |
Q:
what is the mel scale?
I am not sure I understand what the Mel Scale is.
Googling doesn't give me various answers. I seem to be getting the same response again and again.
Which would be something like:
"The mel scale reflects how people hear musical tone"
First of all, does the concert pitch has a specific frequency? So why do we even have a scale stating how do people hear it?
I am currently trying to understand how MFCC uses them, and it seems like it maps the frequency to the Mel scale, or there are some filter banks which are applied on the given frames
A:
To stand on @hotpaw2's answers, think of Mel as one kind of pyscho-acoustic scale, derived from a set of experiments on human subjects, others are Bark & ERB
Why have such a scale?
Imagine a 100 Hz sine wave playing in your head, .... wait for it to stick ...okay... Good.
Imagine now, a 200 Hz sine wave playing ... marinate in it. Good work.
Now compare the two, they have some "perceptual distance". Perceptual only because we're using your soft-grey matter as a measuring instrument.
Finally, if you were you repeat this experiment with 1100 Hz & 1200 Hz, and again with 10,100Hz and 10,200Hz, your opinion of this percpetual distance might diminish, i.e. 100 & 200 Hz can sound "farther apart" than do 10,100 & 10,200Hz, even though in all cases the differences are equivalent to 100Hz.
These pyschoacoustic scales try to capture these distances from low (20Hz) to high frequency (20kHz). | {
"perplexity_score": 636.6,
"pile_set_name": "StackExchange"
} |
INRIA Sophia-Antipolis (France) | {
"perplexity_score": 118.6,
"pile_set_name": "Github"
} |
sha256:61a90f96abbafffce04b1224c4e45898d61e5eda81c8898aa3fa78ef998978c8 | {
"perplexity_score": 12405.9,
"pile_set_name": "Github"
} |
Q:
Why are there so many files in the Silverlight Bin when I build my project?
There's just so many files. The XAP file, DLL file, HTML file, PDB File, and then I have all these folders with 2 letter words where inside each folders are 2 dll files.
What do these files (in general) represent?
Thanks
A:
The XAP file represents the Silverlight application (Silverlight Application Package, the X likely refers to the XAML base of Silverlight).
DLL files are your application's dependencies, some of which are created to facilitate serialization and localization.
Because Silverlight is browser-hosted, it requires an HTML page to host the control when you debug it.
The PDB file contains the "program database" which includes all the metadata Visual Studio uses to provide those nice descriptive tooltips when you mouse over a variable in the IDE.
Folders with two letters represent country codes and are used for localization. | {
"perplexity_score": 863.6,
"pile_set_name": "StackExchange"
} |
The induction of a specific pigment cell type by total genomic DNA injected into the neural crest region of fish embryos of the genus Xiphophorus.
We report genetic transformation in an intact higher organism, i.e., in xiphophorine fish. The gene to be transferred (Tu) is responsible for the formation of T-melanophores in the platyfish and is involved in the formation of melanomas in platyfish-swordtail hybrids. After injection of Tu-donor DNA into the neural crest region of embryos from Tu-free fish, some of the recipients developed T-melanophores. In a few cases, one or two single T-melanophores were formed during late embryo-genesis. In most cases, many T-melanophores developed in young fish and were arranged in several colonies or in a pattern. DNase-degraded Tu-donor DNA, Tu-free fish DNA, as well as DNA from E. coli and adenovirus-2, did not induce T-melanophores. When using DNA from different strains of Tu-donor fish which differed in a regulating gene linked to Tu, the percentages of fish showing T-melanophores paralleled the degree of phenotypic expression of the Tu gene in the DNA donor. The results suggest that the Tu gene has been successfully transferred together with the linked regulating gene. | {
"perplexity_score": 424.3,
"pile_set_name": "PubMed Abstracts"
} |
1. Technical Field
The present invention relates to an electronic apparatus, a method, and a computer-readable medium for receiving and reproducing broadcast programs and contents on networks.
2. Related Art
In the past, electronic apparatuses such as a television apparatus receive broadcast signals of terrestrial broadcasting, cable television broadcasting, and satellite broadcasting, and allow users to view broadcast programs. The broadcast programs are previously scheduled to be broadcasted in predetermined time slots. So when users want to view broadcast programs, they must view the programs in broadcast time slots of the broadcast programs or set recording reservation of the broadcast programs.
Meanwhile, as a broadcast environment has developed recently, services that allow users to view contents corresponding to program contents of broadcast programs through a network such as the Internet have come into use. Most of the services employ a so-called video on demand (VOD) system. Users can view contents anytime they want without being bound by broadcast time slots.
However, there are various ways of obtaining contents that can be viewed with the VOD, so users must search the plurality of ways of obtaining desired contents. Furthermore, users can refer to electronic program guides (EPGs) obtained by electronic apparatuses through broadcast waves or through a network, select desired broadcast programs, and confirm their schedules. However, the users cannot obtain from the EPGs whether they can view contents corresponding to the program contents of the broadcast programs through the Internet with VOD. So, the users are forced to execute troublesome, additional search for contents of VOD by using, for example, search engines on the Internet.
Japanese Patent Application JP 2003-125305 describes a television receiver capable of obtaining a program title and uniform resource locator (URL) referring to program information in an electronic program guide to a hard disk recorder connected to the television apparatus while viewing a broadcast program, searching the Internet using a personal computer for program auxiliary information on the broadcast program based on the program title and the URL, and displaying the program auxiliary information.
However, in the television receiver described in JP 2003-125305, the information retrieved from the Internet and displayed on the personal computer is merely auxiliary information regarding the broadcast program such as, for example, comments on the broadcast program and information on a cast, but information regarding a content on the Internet corresponding to the program content of the broadcast program is never displayed. Thus, users are still bound by broadcast schedules to view broadcast programs, and are forced to execute troublesome search operations to confirm whether a content corresponding to the program content of the broadcast program exists on the Internet. | {
"perplexity_score": 357,
"pile_set_name": "USPTO Backgrounds"
} |
'Self-Obsessed' Natural Leaders may Not be Good Bosses; Here's Why
Share
A new study has revealed that people who are naturally dominant often succeed in reaching to the top of the corporate ladder but their self-obsession and boastful arrogance makes them worst bosses.
'Self-Obsessed' Natural Leaders may Not be Good Bosses; Here's Why
Advertisement
University of Amsterdam researchers divided 150 participants into groups of three. One in each was made leader and the other two were told they could advise, but that the leader would make the decision, the Daily Mail reported.
Advertisement
The groups were then supposed to select the best candidate for a job.
Some of the 45 items of information about the candidates were provided to all three in the group, and some to only one. They would not pick the best candidate until they used all the information - a test of communication.
The narcissism of the leaders was then gauged and their effectiveness was rated.
Group members rated the most narcissistic leaders as most effective, but actually the groups led by the biggest egotists never chose the best candidate.
"There's no doubt narcissism can sometimes be useful in a leader," Psychologist Barbora Nevicka, who led the study, said.
Your comments are automatically posted once they are submitted. All comments are however constantly reviewed for spam and irrelevant material (such as product or personal advertisements, email addresses, telephone numbers and website address). Such insertions do not conform to our policy and 'Terms of Use' and are either deleted or edited and republished.Please keep your comments brief and relevant.This section may also have questions seeking help. If you have the information you are welcome to respond, but please ensure that the information so provided is genuine and not misleading.
Disclaimer - All information and content on this site are for information and educational purposes only. The information should not be used for either diagnosis or treatment or both for any health related problem or disease. Always seek the advice of a qualified physician for medical diagnosis and treatment.Full Disclaimer | {
"perplexity_score": 450.6,
"pile_set_name": "Pile-CC"
} |
San Catervo, Tolentino
The Cathedral of San Catervo is a Roman Catholic church located in Tolentino, Province of Macerata, Region of Marche. The 13th-century Gothic style church is now generally contained by a newer Neoclassical facade.
History
A church or chapel dedicated to Saint Catervus existed at the site and was rebuilt in a by Benedictine monks, starting in 1256. The presbytery of the prior gothic-style church stood at the site of the modern facade. At the time, the Chapel of San Catervo, now called the Chapel of the Santissimi Trinità was erected. In 1820, a reconstruction began, initially guided by the painter Giuseppe Lucatelli and followed by an architect from Macerata, Conte Spada. The portal on the left side of the church belongs to the original church.
The Chapel of San Catervo contains a delicately carved 4th-century marble Ancient Roman sarcophagus, which retains its original dedicatory inscription to Flavius Julius Catervus, a noble of senatorial rank, who had been prefect and died at the age of 56 yrs. Tradition holds that he brought Christianity to Tolentino. The 15th century frescoes in the chapel are attributed to Francesco da Tolentino; the depict the Evangelists and Sibyls, a Madonna and Child with Saints Catervus and Sebastian, an Adoration of the Magi, and a Crucifixion.
References
Catervo
Tolentino
Tolentino
Category:Ancient Roman sarcophagi | {
"perplexity_score": 136.9,
"pile_set_name": "Wikipedia (en)"
} |
Official press releases and photographs from Disney and Florida attractions.
Disneyland Resort's Downtown Disney District welcomed three food trucks earlier this week that will be making regular appearances while the area awaits the construction of a new hotel. Several restaurants in the area, including Rainforest Cafe, ESPN Zone and Earl... | {
"perplexity_score": 426,
"pile_set_name": "Pile-CC"
} |
What do we really know about dark energy?
In this paper, we discuss what we truly know about dark energy. I shall argue that, to date, our single indication for the existence of dark energy comes from distance measurements and their relation to redshift. Supernovae, cosmic microwave background anisotropies and observations of baryon acoustic oscillations simply tell us that the observed distance to a given redshift z is larger than the one expected from a Friedmann-Lemaître universe with matter only and the locally measured Hubble parameter. | {
"perplexity_score": 402.4,
"pile_set_name": "PubMed Abstracts"
} |
Q:
Oracle identity column and insert into select
Oracle 12 introduced nice feature (which should have been there long ago btw!) - identity columns. So here's a script:
CREATE TABLE test (
a INTEGER GENERATED ALWAYS AS IDENTITY PRIMARY KEY,
b VARCHAR2(10)
);
-- Ok
INSERT INTO test (b) VALUES ('x');
-- Ok
INSERT INTO test (b)
SELECT 'y' FROM dual;
-- Fails
INSERT INTO test (b)
SELECT 'z' FROM dual UNION ALL SELECT 'zz' FROM DUAL;
First two inserts run without issues providing values for 'a' of 1 and 2. But the third one fails with ORA-01400: cannot insert NULL into ("DEV"."TEST"."A"). Why did this happen? A bug? Nothing like this is mentioned in the documentation part about identity column restrictions. Or am I just doing something wrong?
A:
I believe the below query works, i havent tested!
INSERT INTO Test (b)
SELECT * FROM
(
SELECT 'z' FROM dual
UNION ALL
SELECT 'zz' FROM dual
);
Not sure, if it helps you any way.
For, GENERATED ALWAYS AS IDENTITY Oracle internally uses a Sequence only. And the options on general Sequence applies on this as well.
NEXTVAL is used to fetch the next available sequence, and obviously it is a pseudocolumn.
The below is from Oracle
You cannot use CURRVAL and NEXTVAL in the following constructs:
A subquery in a DELETE, SELECT, or UPDATE statement
A query of a view or of a materialized view
A SELECT statement with the DISTINCT operator
A SELECT statement with a GROUP BY clause or ORDER BY clause
A SELECT statement that is combined with another SELECT statement with the UNION, INTERSECT, or MINUS set operator
The WHERE clause of a SELECT statement
DEFAULT value of a column in a CREATE TABLE or ALTER TABLE statement
The condition of a CHECK constraint
The subquery and SET operations rule above should answer your Question.
And for the reason for NULL, when pseudocolumn(eg. NEXTVAL) is used with a SET operation or any other rules mentioned above, the output is NULL, as Oracle couldnt extract them in effect with combining multiple selects.
Let us see the below query,
select rownum from dual
union all
select rownum from dual
the result is
ROWNUM
1
1 | {
"perplexity_score": 969.9,
"pile_set_name": "StackExchange"
} |
[Clinical evaluation of CEA in colorectal carcinoma].
Carcinoembryonic antigen (CEA) titer (Dinabot-Kit) were determined in proven 177 patients with colorectal carcinoma preoperatively, and at routine intervals following operation. The assay was positive in 39.1% with stage I, II, 65.9% with III, 65.9% with IV and 85.7% with V. Elevated CEA levels were noted in those who had infiltration of cancer cells extending through the proper muscle layer. In 79.2% of curative resections CEA levels returned to normal within one month, but the titers remained elevated in 73.3% of palliative resections. Among 26 patients with recurrent disease, 16 had a hepatic metastasis showing a previous or simultaneous CEA rise, whereas 10 had a local recurrence with a slow rise or normal. In addition, a quantitative study of CEA in extracts of 87 tumors was made in order to examine the factors affecting the level of circulating CEA. There was no significant difference between the CEA contents of the tumor and its level of circulating CEA. The level of circulating CEA might be influenced by the spread cancer cells, rather than the tumor contained CEA. | {
"perplexity_score": 405.5,
"pile_set_name": "PubMed Abstracts"
} |
Development of a Meteorological Particle Sensor for the Observation of Drizzle
Richard Lewis, NOAA/NWS, Sterling, VA; and S. G. White
The National Weather Service (NWS), Federal Aviation Administration (FAA), and Department of Defense (DOD) began installing the Automated Surface Observing Systems (ASOS) in the mid 1990s. At the completion of the ASOS program more than 900 sites, mostly at large and medium size airports, were installed nationwide. It was recognized that ASOS, due to limitations in sensor technology, was limited in its capability to report some of the so-called subjective elements, so provisions were made to permit augmentation of the ASOS observation by human observers. However, while ASOS has manual augmentation at most large airports, these account for only about 15% of the total. Thus an ongoing program in the NWS, called Product Improvement, has been tasked with investigating ways to improve ASOS in many areas, including its capability to observe subjective weather elements. This paper addresses the NWS efforts to solve a specific ASOS limitation, for which manual augmentation is required, the inability to identify drizzle. In 2000 the NWS procured a sensor that was to be tested for its capability to measure particle size with sufficient accuracy to distinguish drizzle from rain. The ability to quantitatively distinguish drizzle from rain was considered a necessary first step in understanding the nature of drizzle and developing a strategy for objectively identifying the occurrence of drizzle. The specific sensor procured for this test was not considered a candidate for use on ASOS due to its high cost. However, it was hoped that it would provide an objective technique for identifying drizzle and thus could be used as a reference sensor against which candidate replacement precipitation identification sensors could be tested. The result of this procurement was the purchase of what was designated the Meteorological Particle Sensor (MPS) from Droplet Measurement Technologies Inc. The results of three years of testing the MPS in the field at the NWS Sterling Test Facility are described in this paper. | {
"perplexity_score": 233.1,
"pile_set_name": "Pile-CC"
} |
While the updated ribbon will eventually roll out to all Office apps, Microsoft knows the sudden change can impact your work. That's why it's taking things slow: the redesigned version is making its way to Word on Office.com today, and then to Outlook for select Insiders in July. It doesn't have a schedule for the rest of the Office apps just yet.
Since people tend to rely on muscle memory for Excel and Powerpoint, those two aren't getting the redesign anytime soon. Word on Windows will also have to wait as Microsoft collects feedback from a broader set of users. The tech giant assures, however, that you can still go back to the old ribbon after the new one arrives on those applications.
In addition, Microsoft has also redesigned its icons for the sake of those with low visibility. It cranked up their contrast and made them crisper and sharper in order to prevent them from blending into the background. Like the new ribbon, these more visible icons will also make their debut in the web version of Word at Office.com. They'll then make make their way to Word, Excel and PowerPoint for Windows later this month, to Outlook for Windows in July and then to Outlook for Mac in August.
Finally, Microsoft is turning Search into a more powerful tool. It can now bring up recommendations powered as soon as you place the cursor in the box, based on what its AI and the Microsoft Graph knows about your habits. That may sound like old news for some commercial users who can already see the behavior, but it's still bound to surprise some people when it rolls out to all commercial users of Outlook on the web in August. | {
"perplexity_score": 420.9,
"pile_set_name": "OpenWebText2"
} |
Pacific Island LGBTIQ Elders Pen Powerful Response To Israel Folau
A group of Pacific Island LGBTIQ elders have penned a powerful open letter calling for rugby star Israel Folau to be more respectful amid the furore over his anti-gay social media comment.
Folau came under intense criticism for writing a now-deleted comment on Instagram that “God’s plan” for gay people was “hell” unless they “repented for their sins”.
Rugby Australia chief executive Raelene Castle said on Tuesday after a meeting that Folau acknowledged the offence his comments had caused and would “go away and think about” his social media conduct.
“For him he is proud of what he is and what he stands for, so he wants to make sure that we are not asking him to compromise those beliefs,” Castle said.
“But at the same time very much we explained to him that this is challenging for us and… how can he find a way that makes sure that he is not disrespectful, but it doesn’t compromise his own personal beliefs.”
Meanwhile, a group of LGBTIQ elders from Tonga and Samoa have written a powerful response to Folau amid the furore over the comment.
Tongan elder Joleen Mataele Brown, who is a transgender ‘leiti’, and Samoans Fiaailetoa Kenneth Moala and Ymania Brown from transgender advocacy group Samoa Fa’afafine Association penned the open letter encouraging Folau to be respectful and follow the principles of his Christian faith.
“We believe that God has no other plan for gay people other than to celebrate their humanity and the deeds they perform in loving unconditionally their fellow human beings,” they wrote.
“You profess to be a Christian and a follower of Jesus Christ yet where is that Christ-like love for your fellow Australian and Pasefika LGBTI family?
“If you opened your heart, and see Jesus for what he really is, full of light and love and grace and humility and non-judgment and peace and acceptance, you too can be a part of Jesus’s team even if you sin differently to [us].
“A lot of people look up to you, Israel. You and your words have power, privilege and meaning. Young kids look up to you as an award-winning sportsman. What you say stays in the hearts and minds of young Australians and Pasefika children.
“And that hatred, that vilification, that condemnation you have for LGBTIQ Australians and Pasefika is planted as seeds in their young, impressionable minds.
“One day, when an Australian or Psefika LGBTIQ person is walking home at night, one of those young minds, now grown up, may decide to turn that seed into action and end up hurting, injuring, maiming and possibly ending the life of that Australian and Pasefika LGBTIQ individual.
“We have been in hospital ICU units in Samoa, New Zealand, and Australia when our faces and bodies have been beaten beyond recognition, we have held lifeless bodies who have succumbed to suicide, we have comforted parents of Australian and Pasefika LGBTI children who have died because of this mindless bullying.
“And you may deny that, as ‘I am only saying what I feel, and I will not be held responsible for the actions of another human being,’ but we know better because for over 40 years we have been at the receiving end of that condemnation, hatred, and vilification.”
They called on Folau to make a donation to a crowdfunding campaign raising money to repair the Tonga Leitis Association’s drop-in centre, which is as a local shelter for LGBTIQ youth rejected by their families and communities.
The building was badly damaged in Tropical Cyclone Gita in February, and the group has so far raised more than $7500 through the campaign.
If you need someone to talk to, help is available from QLife on 1800 184 527 or online at QLife.org.au, Kids Helpline on 1800 55 1800, Lifeline on 13 11 14, or beyondblue on 1300 22 4636. | {
"perplexity_score": 423,
"pile_set_name": "Pile-CC"
} |
"Admit it." "We're lost." "No,we're not." "The Naveer Pass is just beyond that ridge." "Hey,Wizard,you know what power I wish you had?" "The power to admit when you're wrong." "Right now I'd settle for a silencing spell." "At the next tavern, we're asking for directions." " Kahlan." " Wait." "Kahlan Amnell?" "*******" "My dear Kahlan,I knew Mira would lead us to you." "Serena?" "Zeddicus Zu'l Zorander." "My old friend." "Mother Confessor?" "This is Richard Cypher." "The Seeker of Truth." "This is truly an honor." "Erin." "Tara." "Alana." "I thought you were all in hiding." "We were." "But Darken Rahl's spies were more insidious than we thought." "They uncovered our houses of refu." "There's no safety for Confessors in the Midlands anymore." "That's why we've been searching for you." "We must leave until the time of Rahl's defeat." "We have no choice but to seek sanctuary in Valeria." "Valeria?" "It's an island,hidden by magic." "Far off the coast." "So you're fleeing?" "Only temporarily." "When Rahl is vanquished we will return." "But Mother Confessor, we're the source of justice in the Midlands." "The people need us now more than ever." "Rahl wants a world without justice." "And by killing us, he'll get it." "We wanted to give you the opportunity to join us." "You know I can't abandon my mission." "I expected so." "But the decision need to be yours." "Mother Confessor, we need to keep moving." "Rahl's quads are tracking us." "We've managed to stay ahead of them, but we can't let our guard down." "We'll escort you to the coast." "Will the other Confessors meet us there?" "There are no other Confessors,Kahlan." "We are all that's left." "=YTET-ÒÁµéÔ°×ÖÄ"×é=- ʱ¼äÖá: ßÇÈâÈâ "ð¼ý¼ý ·Òë: º£ÙÅ®Óù ´ó·ð´º´º ²"²" СÖísisi ±¾³ÇÁ" У¶Ô:" "Aiiiii" "̽Ë÷Õß´"˵ µÚÒ"¼¾ µÚ10¼¯" "Are you sure leaving the Midlands is right thing to do?" "Isn't it time for Confessors to stand and fight?" "We did." "We made our stand at the Temple of Rondaxe." "The quads blocked all the doors." "There was no way out." "We fought well, but there were too many." "Demmin Nass has begun taking trophies." "I'm so sorry." "I farebetter than most." "Before they could take my other hand,or worse," "Mother Confessor saved me." "What is it?" "Someone's coming." "I guess those quads weren't as far away as we'd hoped." "Stay where you are!" "Wait." "Please,I'm not here to harm you." "Who are you?" "My name is Finn." "I'm looking for Dennee." "My sister?" "What do you want with her?" "I've been searching for months." "A few weeks ago I heard Confessors were nearby." "Please,I have to find her." "She's dead." "My mistress is dead." "Your mistress?" "If she's dead, how will I know what to do?" "Kahlan,this man is still under coession." "How is that possible?" "I thought the only way the spell is broken is" "Is when a Confessor dies." "That means Dennee is still alive." "But when I left her..." "Dennee." "Take it." "Take the Book." "Find him." "I'm not leaving you." "This is more important than me." "You know that." "Please,Kahlan." "May the Spirits protect you, little s" "Go." "She" " She must have survived somehow." "Rahl must have her." "We know what he does to Confessors." "Which is why we can't risk going after her." "What?" "Mother Confessor is right." "Kahlan,I loved your sister as if she were my own, but it could be a trap." "Why would Rahl keep her alive when he's killed so many others?" "I've already left her behind once." "I won't do it again." "I know it's hard, but my duty is to ensure the survival of the remaining Confessors." "Just as your duty is to protect the Seeker on his mission." "Right now... my mission Kahlan's sister." "But Dennee could be anywhere." "Mira could find her." "Dennee was willing to sacrifice her life for me." "No doubt she'd do the same for any of you." "How can we not even try to save her?" "We should make camp here." "Kahlan tells me you fought bravely at the battle of Rondaxe." "Perhaps I can give you back a little of what you've lost." "I..." "I don't believe it." "Thank you." "Still as powerful as I rember." "I'm just sorry I wasn't powerful enough to stop Darken Rahl before he decimated your order." "When I was just an acolyte, and you took me under your wing..." "Do you rember what you told me?" "You said that real power was not just in the magic that we wield." "It was in our ability to make difficult choices." "And leaving behind everything and everyone couldn't have been easy for you,Zeddicus." "But if you hadn't, the Seeker would not have bee and there would be no hope for the Midlands." "I don't understand why Dennee never told me about you." "How did you come to know my sister?" "I tried to kill her." "I was an assassin from the Order of Blood, and sent by Darken Rahl to murder her." "During the battle, I was confessed by her." "I haven't seen her in months." "Dennee told me she had to undertake a delicate mission." "She promised she'd return to me when it was done." "She would've kept that promise if I hadn't left her for dead." "Kahlan!" "Kah" " Hey,hey." "We're going to find her." "Okay?" " What's she saying?" " It's Dennee." "She's close." "A fortress." "It's not a fortress." "It's a prison." " And Dennee's inside." " Dennee!" "We can't just charge into a D'Haran prison." "But a Mord-Sith could." "Zedd, Can you do a little magic tailoring?" "Sir." "A Mord-Sith approaches." "Tell your warden I have a very special prisoner for him." "The Seeker?" "You captured him single-handed?" "You dare question a Mord-Sith?" "Take me to the warden." "I have urgent intelligence from Lord Rahl." "Intelligence that must be discussed in private." "Leave us." "So what is this intelligence?" "Command me,Confessor." "You have a prisoner I want to see." "Dennee." "Kahlan." "Yes,it's me little sister." "You came for me." "I should have never left you." "This is the Seeker." "Yes." "Then you completed the mission." "I feared you were dead." "Thank the Spirits you're not." "Are you all right?" "Did they hurt you?" "No." "But they're going to take my baby." "You're with child." "They mean to take my sister's child." "What do you know about this?" "Darken Rahl wants to raise a Confessor as his own." "To twist the child into a monster that would do his bidding." "Can you walk?" "I think so." "You should hurry." "General Nass rides for the prison as we speak." "What's going on?" "Prisoner transfer." "But my orders are to hold the Confessor here until General Nass arrives." "Your orders have changed." "Our Dennee is safe." "Dennee!" "By the Spirits,you're with child." "Is our baby all right?" "Finn is the father?" "Mother Confessor,our numbers were dwindling." "And Finn was already confessed." "So I took him as a mate." "Finn is strong." "And with Rahl hunting Confessors,I could think of no one better to protect the child." "Joyous news." "Another Confessor will be born just when we needed her most." "Dennee." "You must've known you were carrying the baby when we set off for the Boundary." "Why didn't you tell me?" "If you knew would you have let me jn you on such a perilous journey?" "No,I wouldn't." "And I couldn't let you go alone." "We need to get moving." "The D'Harans will be coming after us." "General Nass,we received orders not to expect you." "What orders?" "General." "I have the orders right here." "Where is the prisoner?" "B-Being delivered to Rahl." "By whom?" "By the Mord-Sith." "She had also captured the Seeker." "That was no Mord-Sith." "It was a Confessor." "Ready your men." "If you can deliver the Confessor-child and the Seeker to Lord Rahl,he may forgive your failure." "Isn't there a shorter route to the west?" "You smell that?" "These are Thelusian pines." "They'll cover any scent from us the D'Harans might pick up." "We'll be harder to track that way." "Good." "Because we may need to sto" "You're doing great!" "I just need you to try again." "Come on." "Yes." "Keep breathing." "Dennee,the baby's in the wrong position." "What?" "We need to turn the baby around." "I don't wanna lose my baby." "Your baby's going to be fine." "Let me try." "Have you done this before?" "I grew up on a farm,rember?" "Okay." "I don't" " I don't wanna lose her." "Okay,Dennee,try now,push." "It's a boy." "What's wrong?" "The child must die." "It's not your fault,Dennee." "It's no one's fault." "There's nothing you could've done to prevent this." "Kahlan,what's going on?" "We're going to need Kreeg root for the ritual." "Will someone tell me what's happening here?" "Male Confessors can't be allowed to live." "Their souls must be purified by the Ritual of the Waters before they pass to the underworld." "Ritual?" "What are you talking about?" "We have to drown the child." "That's insane." "A Confessor giving birth to a male child is extraordinarily rare." "But if one is born,he cannot be allowed to grow into adulthood." "Male Confessors are unable to control their power." "Once they reach manhood they can't resist using it for wicked ends." "So they are killed at birth." "Your numbers are dwindling and now you want to kill one of your own just because you think it might be evil?" "Mothers of male Confessors have often thought as you do." "One foolish young Confessor couldn't bear to have her son killed, so she raised him in secrecy." "She thought that the love in her heart would be powerful enough to prevent him from turning to the dark ways." "But when the boy came of age,his bloodlust was insatiable." "My child was only 11 years old when I had to kill him." "Well,just because it happened with your son doesn't mean it's going to happen with Dennee's." "He's just a baby." "There's still time to watch him grow." "To know if he's gonna be evil or not." "Kahlan." "You can't go along with this." "You think this is easy for me?" "This is my nephew." "Richar I know that's it's hard for you to understand,but ancient ways must be honored, and the longer we allow this child to live, the harder it's going to be to do what must be done." "Doing it now is a less cruel fate for both the family and the child." "Finn will take the child and perform the Ritual of the Waters." "Is there no other way?" "You know there is not." "Get away from him." "You cannot wish evil away." "You cannot love evil away." "You can only destroy it." "You're not going to hurt this baby." "D'Harans." "Th" "We need to move now." "I can get the D'Harans off our trail." "But you have to promise me nobody will harm this baby while I'm gone." "Dala oil and Kreeg root." "The Ritual of the Waters." "The Confessor gave birth to a boy." "A female Confessor-child was quite a prize,but what Lord Rahl wouldn't give for a male Confessor." "And if they are running from us,they haven't had time yet to perform the ritual." "Sir." "Their tracks lead this way." "Follow them." "We must save that child." "Did you lose them?" "They found the tracks I left." "They're heading in the wrong direction." "Good." "But they're not gonna give up so easily." "They know it's a boy." "And it seems Rahl really wants to get his hands on a male Confessor." "It's the darkness reaching for the darkness." "But he will not have it." "Where's the baby?" "Finn's taken him." "You were supposed to keep him safe." "I'm sorry,Richard." "You're right.I don't.You promised me." "Because I knew you'd do anything to protect the child." "And so should you." "Richard,letting him live would be a violation of everything we're taught." "You can't ask me to go against my beliefs." "And you can't ask me to go against mine." "Finn,don't." "I can't disobey my mistress." "You ha to do what your mistress wants,right?" "Yes." "She wants me to drown our son." "Are you sure that's what Dennee wants?" "The Mother Confessor ordered her to do it." "Doesn't your mistress also command you with her heart?" "You heard her when she gave birth." "She didn't want her baby to die." "You know her heart better than anyone,Finn." "You know what she wants." "She wants her baby... to live." "I will proct him with my life." "You gave the child to the Seeker?" "I thought that's what you'd want." "No,the child is evil and must die." "Then I have failed you." "Which way did the Seeker go?" "To the north." "I can get him back." "No." "You' go with Alana." "Take Dennee and the others to the shore." "The Wizard,Kahlan and I will continue after the child." "Take Mira as your guide." "We will rejoin you at the shore once we have the child." "Then we can complete the ritual and sail to the island." "Mother Confessor,let me go on to track Richard." "I'll move faster on my own." "Sir,we've lost their trail." "They can't have gotten far." "And for your sake,that child had better be alive when we find them." "Okay." "It's okay." "We're safe now." "Everything's gonna be all right." "Stay away,Kahlan." "Richard,wait." "What are you planning on doing?" "Just keep running with the child?" "What your people want to do is barbaric." "I know it must seem that way, but you have to understand that boy is a threat to everything that we're fighting for." "How do you know that if none of them have been allowed to live?" "It's too dangerous to rely on hope." "Hope?" "Isn't that what we're fighting for?" "Kahlan." "I was a child that was hunted." "Darken Rahl tried to kill me because of his blind faith in prophecy." "Are you asking me not to believe in prophecy?" "No,I'm asking you to believe in me." "He's hungry." "We need to find some food." "My father used to give this to me when I was a baby." "There you go." "I thought you might like that." "Richard,what are we gonna do with him?" "Well,I was thinking." "Maybe we can take him to the Valley of Thandor." "The duty of the Sisters of the Light is to protect the children at Thandor." "They'd never take in a male Confessor." "No one will." "We're on our own,Richard." "You're never on your own." "Richard,wait." "We don't need to fight amongst ourselves." "We have enough enemies already." "This baby isn't one of them." "But he could be." "Darken Rahl was once a child." "Think of all the death and suffering he's caused." "If you had a chance to prevent that,wouldn't you?" "Inevitably,evil is in its nature." "Well,it's not in mine." "No one is going to hurt this baby." "Enough debate,Zeddicus." "If you can't control the Seeker,I will." "Is your devotion so great that you'd threaten to confess the Seeker?" "Oh,I have no intention of confessing him." "Command me,Mother Confessor." "Zedd?" "What have you done?" "You have betrayed your order,Kahlan." "Who are you to question my judgment, when yours is so obviously impaired by your feelings for the Seeker?" "You would forsake everything you believe." "Everything you've lived for,for a man who can never love you." "Zeddicus,get the boy." "Zedd,you can't do this!" "You don't want to hurt us." "It's no use,Richard." "He's been confessed." "He's not Zedd anymore." "I don't wanna fight you,Zedd." "And he doesn't want to fight you,Seeker." "Give me the child and you can continue with your mission." "The mission?" "You jeopardized that when you confessed a Wizard of the First Order." "As soon as I have the child I will to continue on as the Seeker's Wizard." "All will be as it was." "No." "Very well." "Make him leave." "Richard!" "Mother Confessor,you're going to kill him!" "Kahlan,this has gone on long enough." "Your mission is to protect the Seeker." "You know as well as I his life is more important than the child's." "So give him to me." "It shouldn't be a difficult decision,Kahlan." "Saving the man you love." "Don't do it,Kahlan." "Kahlan,no." "It's okay,little one." "It'll all be over soon." "I'm sorry I went against your will by trying to save our child." "I failed you." "No,you didn't fail me." "You were doing my will." "Dennee,you can't put such ideas in his head." "Why not?" "Mother Confessor knows what must be done." "We cannot defy her." "Would you feel the sam if it were your child?" "It has been done this way for thousands of yea." "There are only six of us left." "Do the ancient ways still make sense?" "I'm so sorry,chard." "But I couldn't let them hurt you." "It's not your fault." "With Zedd confessed and the Sword of Truth gone..." "It's hopeless." "There's always hope." "We're too late,aren't we?" "Mother Confessor has taken the child to the shore to drown him." "Can we catch her in time?" "She's confessed Zedd." "And taken the Sword of Truth." "What are we gonna do?" "We're going to get some help." "The tracks end here." "Where did he go?" "I'm right here." "I'm unarmed." "Then you are a fool." "Kahlan,now!" "Command me,Confessor." "What is it,Mother Confessor?" "The others." "They should already be here." "Someone's coming." "Stop them." "You'll never know how greatly you've disappointed me,Kahlan." "I always thought that one day you would be Mother Confessor." "How wrong I was." "You were taught all your life to know the difference between right and wrong." "This child... could destroy everything we've been fighting for." "No,we're fighting for a world with less brutality." "Would killing that child give us that?" "Yes." "No!" "Zedd?" "Zedd." "Zedd!" "Richard." "I'm just glad I didn't hurt you." "KA She dedicated her life to keeping the Midlands free from the tyranny of Darken Rahl." "For that she will be rembered." "Spirits,watch over her as she has watched over so many." "We need to choose a Mother Confessor." "We already have." "It's you,Kahlan." "I'm" " I'm honored but..." "I must continue to protect the Seeker." "Just as we must stay in the Midlands torotect the people from Rahl's injustice." "Take Mira." "She will keep you safe." "Thank you for coming back for me." "I asked the Spirits to protect you,and they did." "They'll be fine." "You said it yourself." "Dennee and Finn can't be confessed,so their son's touch will have no effect." "He can't be seduced by his own power if he's unable to use it." "Once they reach Valeria,there won't be anyone to corrupt." "With no one to corrupt him,they can raise him to be a force for good." "But what if we're wrong?" "What if we've unleashed a horrible evil into the world?" "What then?" "=YTET-ÒÁµéÔ°×ÖÄ"×é=- ʱ¼äÖá: ßÇÈâÈâ "ð¼ý¼ý ·Òë: º£ÙÅ®Óù ´ó·ð´º´º ²"²" СÖísisi ±¾³ÇÁ" У¶Ô:" "Aiiiii/font" | {
"perplexity_score": 404.7,
"pile_set_name": "OpenSubtitles"
} |
The invention relates generally to wireless communication systems and more particularly to a communication method that uses time division duplexing.
In addition to traditional voice services, next generation wireless communication systems have to support various different types of multimedia services, including broadcasts, video conferencing, and interactive applications, for example. Many of these multimedia services may require flexibility in their use of spectrum capacity to operate effectively. The typical spectrum management approach is to assign frequencies to a particular use. This approach, however, has become somewhat limited in view of the complexity and overlap between the operations of next generation services and applications. One regulatory solution has been the introduction of flexible-use spectrum in which users of assigned portions of spectrum have more freedom to decide which technologies and services to deploy. In this regard, flexible-use spectrum can allow spectrum users to make timely commercial choices and can let market forces determine which competing technologies and services will be offered in a particular frequency band. Such approach can result in a more effective use of spectrum than that which occurs by imposing a technology or a service by regulation. As a result of these efforts to open up the spectrum, new user-based communication techniques are being considered that address aspects that are particular to next generation services and applications. For example, communication methods that include duplexing techniques or schemes that incorporate the inherent asymmetry in data flow that is characteristic of many multimedia services are being considered for next generation wireless communication systems.
Duplexing techniques include time division duplexing (TDD), frequency division duplexing (FDD), and/or hybrid duplexing, the latter of which includes aspects of both TDD and FDD schemes. In TDD, bidirectional communication or data flow is implemented through a communication link by separating the communication time within a given frequency band associated with the communication link into alternating transmission time slots and reception time slots. A time guard is used between time slots to reduce or minimize the likelihood of interference. In this scheme, a satellite or a base station, for example, can allocate a number of transmission time slots different from a number of reception time slots to a mobile device within a given time interval to produce asymmetric data communication. As the area of coverage provided by the satellite or the base station increases significantly, the guard time between time slots may be increased to compensate for delays that result from a longer signal round-trip between the satellite or base station and the mobile device. The increased delay can reduce the communication efficiency of the TDD scheme. In many instances, however, the time guard is sufficiently small even when large areas of coverage are concerned such that the TDD scheme efficiency remains adequate for many services or applications.
In FDD, bidirectional communication or data flow is implemented through a communication link by partitioning a given frequency band associated with the communication link into separate transmission and reception frequency bands that operate concurrently. Because the transmission and reception bands are separate from each other to reduce the likelihood of interference, no time delays occur associated with the transmission or reception of signals (i.e., no round-trip delays). Although the FDD scheme may be suitable for large areas of coverage because time delays do not play a significant role, the fixed and balanced nature of the transmission and reception frequency bands limit the flexibility that is necessary for asymmetric data communication in next generation wireless communication services. Some FDD schemes achieve asymmetry by using an auxiliary frequency band separate from the paired transmission and reception frequency bands to provide additional capacity in one direction of the data flow. This approach, however, requires the communication system to include additional hardware and/or software to handle the separate frequency band through which asymmetry is achieved.
Thus, a need exists for new methods for asymmetric communication in wireless communication systems. | {
"perplexity_score": 291.4,
"pile_set_name": "USPTO Backgrounds"
} |
1. Field of Invention
The present invention relates to a pyrometallurgical smelting method of copper, and more particularly to an improvement of a method for charging the carbonaceous material into a flash smelting furnace which is utilized for the pyrometallurgical smelting of copper.
In the smelting operation of copper, a portion of Fe in the charged materials undergoes over-oxidation to form magnetite (Fe.sub.3 O.sub.4) in the slag. This Fe.sub.3 O.sub.4 deposits on the bottom or sidewall of the flash smelting furnace and acts as the protecting layer on the refractories of the furnace but, on the other hand, decreases the furnace's inner capacity. When the amount of Fe.sub.3 O.sub.4 so formed becomes such that excessive growth of the coating is incurred, the coating may finally clog a tap hole for the slag and matte, so that the tapping operation is made difficult. In addition, a semi-molten solid layer, i.e., the so-called intermediate layer, is formed between the slag and matte layers in the furnace, thereby impeding separation of the slag and matte layers from one another. Furthermore, since the viscosity of the slag is increased by Fe.sub.3 O.sub.4, the amount of copper suspended in the slag, and hence the waste amount of copper, increases. Various troubles as described above are incurred when magnetite is formed in a large amount. It is therefore important in the light of achieving effective and stable smelting operation of copper to suppress the amount of Fe.sub.3 O.sub.4 to a very low level.
2. Description of Related Arts
It is a known process in the flash smelting of copper to blow powder coke with or without finely particulated coal together with copper concentrate and heavy oil into a flash smelting furnace so as to decrease the copper loss in the tapped slag and also to minimize fuel consumption (Japanese Unexamined Patent Publication No. 58-221,241). According to descriptions of this publication, since the metallurgical reactions suddenly occur in the oxidizing atmosphere of the flash-smelting furnace, a large amount of Fe.sub.3 O.sub.4, which is a peroxide of iron, is formed and contained in the slag. The unburnt powder coke, which covers the slag, is therefore, caused to react with the magnetite and reduces it. The copper loss in the slag is decreased along with reduction of magnetite.
In addition, according to Japanese Unexamined Patent Publication No. 58-221,241 mentioned above, there are descriptions about the following preferred methods: the powder coke is added in the reaction shaft of a flash smelting furnace in such a manner that the entire surface of melt in the settler is uniformly covered with the unburnt powder coke; regarding the grain size of coke, since the degree of reduction of magnetite decreases when the grain size is ultra-fine, grain size is preferably from 16 mesh (1 mm) to 325 mesh (44 .mu.m); and the carbonaceous material should have a high content of volatile matters.
Saganoseki Smelter, which belongs to the present Assignee, used, in a flash-smelting furnace, powder coke having the following distribution of grain sizes and attained from 2 to 4% of magnetite level in the slag. Also, consideration was given to the fact that the unburnt coke, which floats on the slag surface, reduces a portion of the magnetite ("Non-ferrous Smelting and Energy Saving" (1985) edited by Research Committee Concerning Non-ferrous Smelting Techniques and Energy. This Committee is organized under Japan Society for Mining and carried out research into the use of powder coke in a flash smelting furnace.
TABLE 1 ______________________________________ Kind of powder coke A B C ______________________________________ Distribu- over 10 mm 0 0 0 tion of 5-10 mm 6 6 5 grains 3-5 mm 4 5 9 1-3 mm 16 25 21 0.15-1 mm 42 50 55 under 0.15 mm 32 14 10 total 100 100 100 Components Free carbon 85 85 85 (%) Volatile 1 1 2 matters Ash and 14 14 13 others Heat value 6,800 6,800 7,000 (kcal/kg) ______________________________________
As described hereinabove, the process that is widely used at present in the copper smelting operation with the use of a flash-smelting furnace is to charge powder coke, finely particulated coal, finely particulated coke and the like into a reaction shaft for the purpose of reducing Fe.sub.3 O.sub.4 and preventing troubles arising from the excessive formation of Fe.sub.3 O.sub.4 described above. More specifically, although heavy oil, powder coke, finely particulated coal and the like have heretofore been charged into the reaction shaft of a flash-smelting furnace and burnt as a measure for heat compensation, a portion of the powder coke and finely particulated powder is not burnt in a reaction shaft and enters the melt formed at the bottom of the reaction shaft. Fe.sub.3 O.sub.4 in the slag is then reduced by the unburnt coke. In other words, the powder coke and the like are added in the reaction shaft as a measure for heat compensation and also as an effective measure for reducing Fe.sub.3 O.sub.4.
In a pyrometallurgical smelting method of copper with the addition of carbonaceous material, when the carbonaceous material is inadequately charged so as to result in the excessive reduction of magnetite, the coating on the furnace is diminished and the refractories are subjected to strong erosion. This causes such various drawbacks as: leak of melt from the furnace, formation of a metallic layer in the furnace, intrusion of metal into the masonry joints between bricks in the furnace bottom and hence causing upheaving of the bricks; partition of impurities into the metallic layer thereby lowering their distribution into the slag layer; and, transportation of the unburnt carbonaceous material upward to the waste-heat boiler where it is burnt, which seriously impedes the boiler operation.
As is explained in Japanese Unexamined Patent Publication No. 58-221,241 and the technical report by the smelter of the assignee, when the surface of the slag bath is covered by the unburnt powder coke, the amount of which is excessive from the view point of the intended purpose, it stagnates on the slag bath and drastically lowers the equilibrium partial pressure of oxygen. The thus formed highly reducing atmosphere in the furnace incurs in most cases such troubles as: disappearance of the coating on the furnace refractories and hence causing their erosion; upheaving of bricks due to intrusion of metal into bottom bricks; and decrease in the degree of impurity removal into the slag phase. The unburnt carbonaceous material generated in a large amount is transported together with gas into the waste-gas boiler and is later burnt there. | {
"perplexity_score": 273.1,
"pile_set_name": "USPTO Backgrounds"
} |
“I almost didn’t come,” she said, stepping into my mother’s apartment. “I was too ashamed.”
She didn’t say why. She didn’t have to. The face of this woman, who was maybe in her mid-70s, was entirely purple and yellow. The “whites” of her eyes were blood red. Above her left eyebrow, she had a knot the size and color of a small eggplant. Only the tip of her nose and the point of her chin were flesh-colored.
I did my best not to stare. It wasn’t working.
I couldn’t tell if her face was covered in tribal tattoos, if she was one of those blue people from the Kentucky backwoods you hear about, or if someone had kicked the shit out of this old lady.
Cynthia was here because my mother, Carol Guber, had died two weeks before. An appraiser, she came to put a value to Mom’s things—part of the slow-grinding bureaucracy of death that follows the passing of a loved one. A friend of the family’s had recommended her.
She had tried to cancel, Cynthia swore as she took off a worn trenchcoat and stepped into the foyer, but my number had been disconnected. Cynthia (I’m withholding her last name, for reasons that will become obvious later) showed me where she had written down my number in pencil on a pad of schoolroom paper, browned with age. The number was off by a digit.
She groaned a bit as she pushed herself up the stairs of the apartment, a duplex in a converted hospital not far from Gramercy Park in Manhattan. Cynthia explained that she had been walking her dog late on the Upper East Side and tripped on a stairway, the fool that she was. Then she began to putter around the apartment.
On Feb. 18, I took my mother into the hospital for what the doctors had promised us was a routine procedure—home in three to five days. It took nine to get her back to the apartment. And she was not well. I woke her up on Feb. 28. There was an open bottle of Oxycontin next to her bed. She kept asking for her mother, Edna, who was also her best friend. Edna had died in December of 2013.
On March 1, Mom and I went back to the hospital. On March 4, she had a catastrophic series of strokes, choking off the blood to half her brain.
Three brothers, two of her sisters-in-law, two rabbis, a Buddhist guru, two personal shoppers, several life-long friends, and one ex-husband all made pilgrimages to her room at the intensive care unit. Seven nieces and nephews came. Some friend of my uncle Zev’s showed up and played guitar.
We urged her to let go. We prayed for her easy passage and read aloud passages from Thich Nhat Hanh, a Vietnamese monk she had become a kind of devotee of:
These eyes are not me. I am not caught in these eyes. These ears are not me. I am not caught in these ears.This body is not me. I am not caught in this body.This mind is not me. I am not caught in this mind.
We told each other stories about her time running a restaurant, a high-end caviar store, the local branch of a cult, a therapy practice, and a downtown shop called “The Pink Pussycat.”
And then, around 4 p.m. on March 9, the stories stopped. Mom took a last gasp.
They picked up her body five hours later.
I avoided Mom’s place for weeks afterward. I had already spent a month by her bed, by her grave, lost in a fog of grief. I had no interest in returning to the mist.
But the State requires an accounting of the deceased. And an accounting requires an appraisal of the items therein.
My aunt and cousin came in a few minutes after Cynthia. They had arrived from New Mexico to help me empty out Mom’s apartment.
“Heidi, this is, um, uh….” I stammered.
Cynthia introduced herself. She took out a palm-sized digital camera, I’m guessing a decade old.
“We’ve already taken pictures of all the art,” my aunt said. “We can [shoot photos of] the rest.”
“Oh, you don’t have to bother,” Cynthia said. “I have to use my own pictures. It’s part of the process.”
She took some notes on that browning pad of hers as she sat in the living room. Meantime, my aunt, cousin and I caught up as we walked through the apartment. Mostly, we talked about Mom. The shock we still felt from her passing. The embarrassment Mom would feel if she knew we were going through all her stuff.
At one point, I noticed Cynthia, still taking notes, staring at an amphora my mom had collected in Israel. After a half-hour or so, she headed upstairs to my mother’s bedroom. That’s where she kept the jewelry.
Mom liked her chunky necklaces, beaded ropes, Bakelite cuffs, and heavy clip-ons. And she threw it in cartons and stuffed it in drawers and draped it around clothing pins. Cynthia called down to the living to say how much she enjoyed it—especially the vintage costume jewelry. Mom had stopped collecting the stuff years ago but kept wearing all these art deco frog pins and faux-gold bee brooches and necklaces with faces of the sun.
Tucked in a few thin boxes were fancier pieces, mostly from her mother. Like my mom, Edna was a woman of style. But my grandmother’s tastes were decidedly uptown: Cartier watches in silver and gold, a Rolex, a silver ring with emerald and lapis, a diamond engagement ring or two. I had only noticed Mom wearing one or two of these things. For her, I’m guessing, they were more valuable as lifelines to Edna than as adornments for her wrist.
Cynthia spent an hour and a half going through it all, while my family and I kibitzed. I kept asking Cynthia how much longer she’d be. Finally, she came down, a little exasperated.
Cynthia explained that she had “separated out the good stuff” as best she could. She said I’d have her full report in 10 days. Then she put on her hat and trenchcoat and left.
The next day was a Thursday. My cousin Liz and I spent the day cleaning out the place, while my aunt tried to figure out where all this stuff would go. I found the pictures of my grandfather with Sammy Davis Jr. I opened my mom’s diaries—the one in which 15-year-old Carol wrote about being “felt up”—and shut it as soon as I could. There were yearbooks. Report cards. Presents never delivered. Dresses two sizes too small. Twelve cookbooks on how to make the perfect stew.
We hauled out a dozen contractor bags filled with junk. We filled 25 boxes with stew books and self-help pamphlets. And just as I was about to pass out on the couch, my cousin Liz said, “Guys… I think there are some things missing.”
Edna’s watches were gone, she said. Some of the rings, too.
Honestly, I didn’t believe her. Liz, a sweet-tempered design school grad, didn’t exactly fit the stereotype of a private investigator.
Besides, who would’ve taken the jewelry? The purple-faced lady? As my aunt said, Cynthia was so worn and frail, it seemed kind of pathetic that she was working at all—let alone operating as some cunning thief, tiptoeing in the haze of family grief.
If they’re still missing tomorrow, I said, we’ll do something about it. Then I passed out.
What I didn’t know at the time was that Liz had solid evidence that the jewelry was gone. After my mother died, Liz and her sister had stowed away the “good stuff” in a couple of very particular boxes. She knew what spot each ring and each watch were supposed to occupy. Several of those slots were now empty. On Friday, my mother’s oldest friend came over to her apartment while I went to work. Liz and Heidi told Margo about the missing jewelry. Unlike me, she wasn’t skeptical in the slightest.
“Happens all the time,” said Margo. An art dealer, she had experience distributing the possessions of the dead. Margo was sure she knew who took Edna’s good stuff. “You can’t turn your back on an appraiser for a second.”
There was only one thing to do, Margo said.
---------- Forwarded message ---------- From: Noah Shachtman <[email protected]> Date: Fri, Apr 8, 2016 at 2:53 PM Subject: Missing jewelry -- need response ASAP To: [email protected] Cynthia: As we discussed over the phone, a number of pieces of jewelry have gone missing from my mother's collection. You are the only person outside of my family to have spent any time with that collection in recent days. If you inadvertently took any of these items, which are listed below, I need you to return them immediately—within the next few hours. Otherwise, I'll be forced to file a police report, and let the authorities know that you were the only stranger with access to my mother's now-missing jewelry. I'll also have to let your colleague XXXXXX know about this unfortunate situation. Hopefully, it won't come to that. Hopefully, this can be resolved quickly. Please contact me as soon as you have reviewed this list and your belongings. I expect an answer no later than 6pm. Sincerely,nms
Cynthia called five minutes later. “Oh, I’m sorry,” Cynthia said. “I must’ve accidentally put it in the wrong pile.”
“But I can only find three watches,” she added.
“Keep looking,” I replied.
Cynthia said she had a doctor’s appointment, but could drop the jewelry off with my mother’s doorman. “No,” I answered, “We’ll come to you.”
She gave me her address on the Upper East Side and hung up. I called my cousin Liz, who was already on the east side, and asked her to head uptown.
A few minutes later, Liz’s father Zev—Mom’s older brother—called from New Mexico rather alarmed at the arrangement. You can’t send my girl up to a robber’s house alone, he said. What if Cynthia has a gun? What if this is a set-up? What if the jewels are just bait?
It seemed unlikely to me. But no more unlikely than a purple-faced lady stealing from my mother. I told him I’d meet Liz up there. We’d do this together.
I let my somewhat-startled boss know I was heading out to catch a jewel thief, and race-walked over to the L train.
Meanwhile, Heidi and Liz had become just as unnerved as Zev. As they hustled out of Mom’s apartment, they left Post-It notes inside the place and with the doorman: If we’re not back in 90 minutes, call for help.
They jumped in a cab without bringing their wallets. Too easy to take if this was all a set-up, they figured.
I walked out of the 68th Street subway stop around 4:45, and started heading uptown. My mind was filled with conflicting, and equally crazy, thoughts. One minute, I’m convincing myself that poor Cynthia was just confused when she robbed my mother. The next, I’m psyching myself up to whoop an old lady.
Did I need some kind of weapon? Where would I get it? The Upper East Side of my youth, circa 1989, had a couple of “candy shops” that I seem to remember selling brass knuckles and throwing stars along with dime bags. But that was three mayors ago. And how much help would I really need to fight an AARP member with a broken face?
I got to Cynthia’s apartment building early, and paced around for a couple of minutes. By the time the doorman showed up I had calmed down. I told him I was looking for Cynthia. “Did you ring her?” he asked, pointing to the intercom. “She doesn’t always hear the buzzer.” And that was before the accident.
Liz and Heidi texted to say they were stuck in rush-hour traffic in the mid-50s. Cynthia walked into the lobby.
If she said anything to me at first, I can’t remember what it was. She appeared to be anything but agitated, though. She went over to her mailbox, pulled out a few envelopes, and then invited me into the elevator like I was a distant relative come to visit his aunt in the city.
“You’re not going to call the cops, are you?” she asked, as she pressed the button to close the elevator doors.
I said it depended on what happened next. Then she asked if I was a lawyer. No, I replied, a reporter. For The Daily Beast. “Oh, I read the Post,” she said, as she opened the door to her place.
There was no gun. No goon squad there to jump me. But the apartment was almost comically crowded. Gee-gaws and curios covered every flat surface. The walls were covered with a dizzying green brocade.
A beagle with a plastic cone on its head yipped. “That’s the one who got me into trouble,” Cynthia said, as she hung up her coat. Then she sat down on her rather elaborate couch—I think it was Victorian—reached into her purse, and handed me a small, white envelope. Inside were four watches and three rings—all of my mother’s missing jewelry.
I shoved the envelope into the chest pocket of my jacket. Cynthia asked again if I was planning to call the police. I said no, which was true. (To settle Mom’s estate, I needed Cynthia’s appraisal report—something I was unlikely to get if I sent the cops after her.) She apologized for the “confusion.” Then I walked out. The whole encounter in her apartment was over in a minute-and-a-half, tops.
In the lobby, I zipped up my jacket and tabbed the military-style collar. I walked down Lexington Avenue with my hands in the jacket pockets and my arms pressed close to my chest. It felt surreal, having $20,000 or more worth of jewelry on me; I hadn’t carried that much in liquid assets since I handed out cash to Brooklyn preachers and activists during the Dinkins-for-Mayor campaign in 1993.
I met Heidi and Liz on 59th Street, and paid for their cab. “Just another day,” I said to them, as we went down the steps. “Nothing exciting to discuss besides the weather. Just keep walking.”
We got on the 6 train and managed to keep our mouths shut for a few stops. But by the time we transferred for the express at Grand Central, we couldn’t keep from giggling.
Did that just happen? Did we just catch a real-life jewel thief? And how loud would Mom be laughing right now?
The headline writer in me—the frustrated pulp-fiction detective, too—couldn’t help myself.
“The Case of the Purple-Faced Lady,” I said, as the train sped downtown.
Cynthia still had one last trick to play, however. Or should I say, I had one final con to run on myself. As we got off the subway at Union Square and walked to Mom’s apartment, I found myself defending the lady who had taken my mother’s jewels.
“She might be telling the truth,” I said. “The doorman told me she really was confused.” And that was probably before whatever head trauma that came with her purple face. “If she was lying, why would she have let me into her apartment? Why would she have even given me the right address? Why hadn’t she pawned the stuff off?”
And if appraisers really do make a habit of pick-pocketing grieving families, mentions of such crimes don’t seem to show up in a search of police blotters and news reports. Nor have there been any lawsuits or criminal complaints against Cynthia in the past.
Maybe I’m in no mood for ugly truths, like a lady pocketing valuables from families half-blind with grief. Or a funeral home that takes you for even more money, just to put your mom in the ground. Or a gray bureaucrat who demands you prove she’s really dead for the 17th time before he’ll agree to stop a stupid newspaper delivery.
It’s easy to understand why I’d want The Case of the Purple-Faced Lady to have something of a happy—or at least a less-awful—twist. Why I’d have a little too much empathy for an older woman in obvious distress. After all, I just buried someone resembling that description.
So in the interest of giving Cynthia a fair shake in this story, I asked her last week if she wanted to provide some kind of plausible explanation for the missing jewelry. She called me back at 3 p.m. on the afternoon before Mother’s Day.
“What happened?” I asked her, expecting a sorry story about how mixed-up she was that day at my mother’s place.
“I didn’t think anybody wanted [the jewels] or cared about them. I saw them. I thought they were nice. I thought they were being tossed out. So I took a couple. Several,” she told me, matter-of-factly.
I’ve been a journalist covering crime and war for most of the 21st century. I’ve never heard someone confess to a felony so casually.
I asked her if she had looted from other families. “No, never,” she answered. “Listen, I’m so upset about it. I haven’t been able to sleep since it happened… But I really didn’t mean to. I thought it was just unwanted stuff.”
She asked me: “Please don’t use my name. Would you please spare me that. I didn’t mean to. It was nothing premeditated. I promise you that on my kids’ heads,” she added. “I’ve been in the business for 27 years. You can’t ruin my livelihood.”
I suggested that she should’ve thought about that before stealing from my Mom.
“It was an accident. It was an accident. I didn’t do this on purpose… I thought, I thought maybe—I was going to polish it or something,” Cynthia said.
She claimed I had promised not to tell anyone, which wasn’t true. (I had promised not to go to the cops.) She asked when my paper was being printed. I told her this would be on the Internet, on Mother’s Day. | {
"perplexity_score": 353.5,
"pile_set_name": "OpenWebText2"
} |
[Plantar-palmar erythrodysesthesia. A new and relatively frequent side effect in antineoplastic treatment].
Palmar-plantar erythrodysesthesia (PPE, hand-foot syndrome) is a relatively frequent cutaneous toxicity related to antineoplastic treatment with e.g. fluorouracil, capecitabine, and liposomal doxorubicin. It usually presents as paresthesia and painful erythema of the palms and soles and may lead to ulceration of the skin. The symptoms are dose-dependent, and the condition may be dose-limiting. Two cases of chemotherapy-associated PPE are presented. | {
"perplexity_score": 259.5,
"pile_set_name": "PubMed Abstracts"
} |
HomeUncategorizedObserve your dog obey all orders by using a good dog training collar
Observe your dog obey all orders by using a good dog training collar
While your family dog might have turned into the apple of your eyes, he or she also needs appropriate training and you can easily observe your dog abide by all of the commands by using a good dog training collar Http://dogbadge.com. There are several kinds of training collars available for dogs of all age groups, shapes, as well as sizes and you ought to choose one that suits your beloved pet and also fits within your budget.
Dogs have been domesticated over centuries by man and also numerous training methods have been refined over the years to exercise better control over all of them. A training collar can help train your dog very quickly and also hold her or him in hand too. There are several types of collars to pick from including choke training collars which are also known as chain collars, martingale collars, prong collars, as well as remote training collars or even electronic training collars, which feature that latest within electronic technology. Traditional training collars that involve choke collar training probably won’t appeal to you given that this involves tightening of the chain around your dogs neck in case he or she becomes overactive as well as tries to tug hard on the leash.
A copyrighted variant that is similar to the principle of the choke training collar is definitely the good dog training collar. This inventive collar features ridges situated on the inside of the dog collar that are connected together through tiny links that can be added or even taken out depending on the dimensions of the dogs neck. This particular training collar has two loops at each end that are attached to a free-sliding leash. This kind of design ensures that the dog collar tightens across the neck of your dog in a very accurate and delicate manner if she or he tries to distance themself from you as well as relaxes the moment she or he comes back towards you. This specific training collar is an inexpensive way of coaching your pet dog quickly and your pet dog will definitely stop pulling at the leash within a very short period of time.
On the other hand, if you wish to control your dog remotely or perhaps wish to coach your own hunting dog from afar then you can certainly opt for another form of good dog training collar that is available in the form of remote training collars or even electronic training collars. You should use the corresponding e-collar as a hunting dog training collar or simply to coach your own domesticated pet, based on your particular requirements. These collars include a remote transmitter that will remain in your hand along with a receiver fitted on the collar of the dog. You’ll be able to send electrical stimulation as well as beeps or even use vibrations through varying strengths to manage your dog. These collars usually have a range between about half and one mile although higher end versions even feature GPS tracking of your dog. You can browse between numerous models of dogtra training collars as well as sportdog training collars that are made by dogtra and sportdog, two of the very best respected manufacturers of remote control training collars.
If you’d like your pet dog to consistently act just like a good dog as well as stay in your control at all times then you definitely have to start using the best possible training collar to coach her or him with ease. You can undoubtedly watch your dog obey all of the commands by using a good dog training collar that enables you to coach your beloved family dog in a very gentle way.
Related Articles
Embroidery badges can be made at home. You simply need some imagination and creativity and you can make customized badges yourself that won’t only be prominent but will also enable you to get a large […]
When you’d like to spice up a piece of clothing, accessory, luggage piece or even hats you can sew on badges to have the fresh look easily. Badges or patches when placed strategically can immediately […] | {
"perplexity_score": 628.4,
"pile_set_name": "Pile-CC"
} |
The emergence of cloud-computing resource providers and management tools for private virtualization clusters has allowed virtualized applications to be deployed on resources that may be changed or re-provisioned on an as-needed basis. For example, a developer who knows that his or her deployed application will receive only modest workloads may choose to run the application on an instance having allocated only a modest amount of resources. As time goes on, however, the developer may discover that the application is now receiving larger workloads and may consequently decide to upgrade larger instance and/or create a cluster of a plurality of small instances behind a load balancer. Should demand fall in the future, the developer may downgrade back to the single, small instance. The ability to provision and re-provision compute resources is thus a fundamental benefit of cloud computing and of virtualization in general; it allows one to ‘right-scale’ an application so that the resources upon which it is deployed match the computational demands it experiences and thus avoid paying for un-needed resources.
The task of right-scaling a virtualized application is, however, difficult in practice. For example, scaling an application based on instantaneous demand (sometimes called autoscaling) is often an inappropriate resource-allocation scheme; amongst other things, such scaling does not allow the advance provision of resources, and it is necessarily blind to long-term usage patterns. Consequently, it is desirable to have a resource-provisioning plan having a longer horizon. The task of forecasting an application's usage patterns, however, even when restricted to simply extending performance-metric time series (e.g., percent CPU utilization over time, disk IO over time, etc.), may be a labor-intensive process. Furthermore, even if performance metrics could be predicted in advance, one still faces the problem of translating this knowledge into intelligent decisions to upgrade or downgrade a deployment. For example, suppose someone has an application running on three small instances, and that he or she knows with certainty that over the next month, these instances will respectively run constantly at 20%, 60%, and 80% CPU utilization. If, say, the application is instead deployed on two medium instances, these CPU utilization numbers would change unpredictably. In other words, it may be difficult to determine how performance metrics on one deployment will translate into performance metrics on another deployment of the same application on a different resource set.
This problem may be exacerbated by the fact that performance patterns are often application-specific. For example, suppose there are two applications, A and B, and two resource deployment patterns (e.g. three small instances or two medium instances), X and Y. Suppose that on the resource pattern X, application A's memory utilization fluctuates between 70% and 80% and that on resource pattern Y, it fluctuates between 40% and 50%. Suppose further that application B's memory utilization on resource pattern X also fluctuates between 70% and 80%. Given this information, it cannot be determined with certainty that application B's utilization on Y will also be between 40% and 50%, even though application A behaved that way, because of potential differences between the needs of applications A and B. The way that an application performs on a resource is often very specific to that application, making it extremely difficult to predict how other applications will perform when deployed on different resource types. A need therefore exists for a more efficient way to scale resource allocations for applications. | {
"perplexity_score": 295.8,
"pile_set_name": "USPTO Backgrounds"
} |
Field Notes - The Waverley Mill
27 March 2018
Since 1874 The Waverley Mill in Tasmania has been producing high-quality woollen products for over 140 years. So we thought it was about bloody time we got our butts down there to show you guys how we are working together to create our new winter season 100% Merino Wool products.
The Waverley Mill is the last remaining 100% Australian wool factory in the country. The men and women that work there are truly spectacular at their craft. They were all a bunch of absolute characters, as we filmed and photographed them, some were shy but others couldn't get enough. We were touched that they were so warm and welcoming, sharing their techniques and quirky anecdotes into life in the Mill. Each story was different but the same passion streamed through, a desire for creating quality products people will love and treasure for years to come.
Supporting the little guy has always been a focus for us. Not only are we able to create relationships with beautiful Australian brands and craftsmen, but we can also ensure that the gear you guys are buying from Pony Rider, is of the highest quality.
The Mill's focus on ethical manufacturing aligns with our philosophy. They only use natural fibres which are biodegradable, recyclable and a natural resource. They also use local wool, sourced from farms in Tasmania, supporting the local economy and community.
Our Director, CEO and Head Designer Kelly Searl was the lucky one who travelled down to Tassie to shoot. She shares a few thoughts on this blanket and what it means to her...
"Wool as a material is 100% biodegradable so much so that when you bury it in the soil it starts decomposing almost immediately. We only make a limited amount of these blankets each year. They are a bit of a collector's item. I love them, so I hope you enjoy sleeping under these." | {
"perplexity_score": 326.7,
"pile_set_name": "Pile-CC"
} |
It has been proposed to change the numbers, here and in Ch2 13:17, into 40,000, 80,000, and 50,000 respectively - partly because these smaller numbers are found in many early editions of the Vulgate, but mainly because the larger ones are thought to be incredible. The numbers accord well, however, with the census of the people taken in the reign of David Ch1 21:5, joined to the fact which the writer has related Ch2 11:13-17, of a considerable subsequent emigration from the northern kingdom into the southern one. The total adult male population at the time of the census was 1,570, 000. The total of the fighting men now is 1,200, 000. This would allow for the aged and infirm 370, 000, or nearly a fourth of the whole. And in Ch2 13:17, our author may be understood to mean that this was the entire Israelite loss in the course of the war, which probably continued through the whole reign of Abijah.
Seven rams - "A bullock and two rams" was the offering which God had required at the original consecration of the sons of Aaron Exo 29:1; Lev 8:2. Jeroboam, for reasons of his own, enlarged the sacrifice, and required it at the consecration of every priest.
Jeroboam's death was a judgment upon him for his sins. Chronologically speaking, his death is here out of place, for he outlived Abijah at least two years (compare the marginal reference and Kg1 15:9); but the writer, not intending to recur to his history, is naturally led to carry it on to its termination. | {
"perplexity_score": 291.7,
"pile_set_name": "Pile-CC"
} |
The born-again entrepreneur - jacquesm
http://swombat.com/2011/6/6/born-again-entrepreneur
======
edanm
Absolutely agree with the conclusion.
I would take it a step further, though. For us geeks/entrepreneurs, oftentimes
the non-conformist thing to do, but which ultimately make us happiest, is to
run our own business. Not everyone, as the article points out, but sometimes.
When talking to other people, especially non-geeks, I don't try and convince
them that they should run their own company. I try and find out what _they_
would most like to do, but haven't seriously considered, because they're
looking for a "regular" job. Almost everyone has _some_ hobby/talent/ambition
that they never seriously consider pursuing, because it doesn't occur to them
that they might be able to pull it off.
------
alabut
Jessica Livingston:
_"I spent 13 years in corporate America, mostly because I didn't understand
what my other options were. I was hypnotized by the security of an
established, respected company."_
[http://www.foundersatwork.com/1/post/2008/07/why-i-do-
yc.htm...](http://www.foundersatwork.com/1/post/2008/07/why-i-do-yc.html)
I'm glad to see that I'm not the only one that got bit by the founder bug
while working for others. Some people are born entrepreneurial and others
realize it later.
------
Eyalush
I love the airplane analogy (especially as a pilot license holder) I'll be
using that one myself if you don't mind! | {
"perplexity_score": 373.6,
"pile_set_name": "HackerNews"
} |
Q:
What does a HTML filter need to do, to protect against SVG attacks?
I recently learned that SVG (Scalable Vector Graphics) images introduce a number of opportunities for subtle attacks on the web. (See paper below.) While SVG images may look like an image, the file format can actually contain Javascript, and it can trigger loading or execution of HTML, Flash, or other content. Therefore, the SVG format introduces new potential ways to try to sneak malicious content onto a web page, or to bypass HTML filters.
I'm writing a HTML filter to sanitize user-provided HTML. What do I need to do in my HTML filter to make sure that SVG images cannot be used to bypass my filter? What HTML tags and attributes do I need to block? Do I need to do anything when filtering CSS? If I want to simply block all SVG images, what are all the ways that SVG can be embedded into a HTML document?
References:
Crouching Tiger – Hidden Payload: Security Risks of Scalable Vectors Graphics, Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz. ACM CCS 2011.
See also Exploits or other security risks with SVG upload? (a different, but related, question) and Mike Samuel's answer elsewhere.
A:
Good day!
Edit: Sorry for the unlinked links - given that I just created my account to reply to this I have not enough "cred" to post more that 2 links per post...
This post is not the freshest I reckon - but I am going to reply nevertheless. I am one of the authors of this paper you linked. And I noticed, that some of the advice given in this thread is well meant and well thought but not 100% correct.
For example, Opera is not providing reliable safety when dealing with SVGs embedded via <img> or CSS backgrounds. Here's an example for that, just for the funzies we created a SVG embedded via <img> that would contain a PDF that would open a skype: URL that would then call you:
http://heideri.ch/opera/
http://www.slideshare.net/x00mario/the-image-that-called-me
We created the SVGPurifier - a set of rules that extend the HTMLPurifier to be able to deal with cleaning SVG. Back when we wrote those rules (you can have them if you want - let me know and I'll put 'em on Github), every browser we tested treated SVG differently. Also strongly dependent on the way it was embedded: inline, with <embed>/<object>, <applet>, <img>, SVG in SVG, CSS background, list-style and content...
It turned out that it was possible, to find a harmless subset in SVG if you threat model mainly involved XSS and beyond. If your threat model nevertheless also includes for instance mitigation of UI overlaps, side-channels, history stealing attacks and what not it gets a bit harder. Here's for example a funny snippet showing, how we can cause XSS with very much obfuscated JavaScript URI handlers: http://jsbin.com/uxadon
Then we have inline SVG. In my personal opinion, this was one of the worst ideas W3C/WHATWG ever had. Allowing XML documents inside HTML5 documents, forcing them to comply with HTML5 parsing rules and what not... security nightmare. Here's one gripping example of inline SVG and contained JavaScript that shows, what you'd be dealing with: http://pastebin.com/rmbiqZgd
To not have this whole thing end up in a long lament on how terrible SVG might be in a security/XSS context, here's some advice. If you really and still want to / are working on this HTML filter, consider doing the following:
Give us a public some-test where we can hammer that thing.
Be flexible with your rule-set, expect new bypasses every day.
Make sure to know what the implications of filtering inline SVG are.
Try to see if the HTMLPurifier approach might be the best.
White-list, don't black-list.
Avoid reg-ex at all costs. This is not a place for regular expressions
to be used.
Make sure that your subset only allows those elements, that have been
tested for security problems in all relevant browsers. Remember the
SVG key-logger? http://html5sec.org/#132
Study the SVG-based attacks that were already published and be prepared to find more on a regular basis: http://html5sec.org/?svg
I like the idea of someone attempting to build a properly maintained and maybe even working HTML+SVG filter and I'd be more than happy to test it - as many others as well I assume ;) But be aware: HTML filtering is damn hard already - and SVG just adds a whole new layer of difficulty to it.
A:
As far as I know the following ways can be used to refer to an svg.
<img src="http://example.com/some-svg.svg">
Any tag with css styles. e.g. style="background-image:url(http://example.com/some-svg.svg)
Filtering on extensions is not enough. HTTP headers determine the content type, not the extension. A .jpg file may be read as an SVG. Therefore, any remote image is dangerous.
You can inline any XML format, including SVG, in a web page.
Even if you check for all the items above, you cannot be sure that there is no SVG injection possible. You may want to go for white-listing instead of blacklisting. | {
"perplexity_score": 662.6,
"pile_set_name": "StackExchange"
} |
Architectural Detail Manuals
Choose Wisely
When shopping for windows, it’s important to focus on the four main categories: materials, efficiency, design, and value. For additional help, watch our video series Decide with the Diamond, hosted by Lou Manfredini. | {
"perplexity_score": 423.3,
"pile_set_name": "Pile-CC"
} |
1. Field of the Invention
The present invention relates to an electrical contact, and more particularly to an electrical contact for electrically connecting a package and a circuit substrate, and having two separated part assembled together which can provide two contacting points for the package.
2. Description of the Prior Art
Electrical connectors for removably mounting an LGA package on a PCB are known as LGA sockets. An LGA socket typically comprises a substantially flat dielectric housing which is positioned between the LGA package and the PCB. The housing defines an array of passageways with electrical contacts received therein in correspondence with the array of pads of the LGA package. Each contact has a pair of oppositely extending free ends spaced apart with a predetermined distance in an original position. The two free ends extend beyond the housing for respectively engaging with corresponding contacting pads on a bottom surface of the LGA package and on a top surface of the PCB thereby establishing an electrical connection between the LGA package and the PCB.
Various electrical contacts for LGA sockets are disclosed in the prior art, such as U.S. Pat. Nos. 5,653,598 issued to Dimitry on Aug. 5, 1997 and 6,905,377 issued to Keith on Jun. 14, 2005. Typically, a contact for an LGA socket comprises a single contacting portion at an upper end thereof and a single soldering portion at a bottom end thereof. The single contacting portion extends upwardly beyond an upper face of the socket to contact with a corresponding contacting pad of an LGA package. The single soldering portion extends downwardly beyond a lower face of the socket to contact with a corresponding solder pad of a PCB. Therefore, an electrical connection is established between the single contacting portion of the LGA package and a corresponding soldering pad of the PCB via a single contacting portion.
However, as the pads of the LGA package are increasing and the socket is reduced in size because of quick development of science, there is limited space for arranging the array of increasing contacts. Contacts for an LGA socket are usually designed in a trend of miniaturization; such will increase impedance of transmitting signal. Furthermore, the pads of the PCB must also be increased as the increasing pads of the LGA package and such increases the cost of the PCB manufacture. Thus, an improved contact for an LGA socket is required to overcome the disadvantages of the conventional contact.
In view of the above, a new electrical contact that overcomes the above-mentioned disadvantages is desired. | {
"perplexity_score": 434.2,
"pile_set_name": "USPTO Backgrounds"
} |
Event-related potentials associated with sound discrimination versus novelty detection in children.
In children, deviant sounds in an oddball paradigm elicit a mismatch negativity (MMN) indexing discrimination of sound change and late difference negativity (LDN) with unknown functional significance. Salient sounds elicit an ERP index if orienting, P3a, and a late negative component, Nc. We compared children's responses elicited by moderate sound changes and novel sounds to examine the relationships between MMN and LDN, and LDN and Nc. Two components of the Nc, the Nc1 and Nc2, were identified. The scalp topography of LDN differed from those of the MMN and Nc1. Children's early P3a appeared mature but late P3a lacked frontal predominance. The findings suggested that LDN is not linked with either the sensory or attentional processing. It might reflect cognitive, albeit preattentive, processing of sound change. The Nc1 appears to reflect cognitive attentive processing of salient stimuli and the Nc2 might reflect reorienting after distraction. | {
"perplexity_score": 475.3,
"pile_set_name": "PubMed Abstracts"
} |
Media playback is unsupported on your device Media caption The BBC's Robert Hall takes a look back at Claude Choules' life
Claude Choules was the last known surviving combat veteran of the Great War, and served in both the world wars of the 20th Century.
Born in Pershore, Worcestershire in 1901, he tried to sign up for the army at the beginning of World War I but he was too young.
Two years later, at the age of 15, he joined the Royal Navy serving on board the training ship HMS Impregnable based at Devonport.
His earliest memories in the service were of seeing the convoys of ships, returning to Britain, carrying the wounded from the Battle of the Somme.
In 1917 he transferred to the battleship HMS Revenge, one of the newest and most powerful ships in the British fleet and the flagship of the First Battle Squadron.
German surrender
His main task on the Revenge was to help lower the seaplanes into the water which were used to fight the threat of German Zeppelins.
It was while on board the Revenge that Choules witnessed the surrender of the German High Seas Fleet in November 1918 in the Firth of Forth.
He remained with the Revenge as part of the escort which accompanied the German fleet to Scapa Flow in the Orkney Islands and, six months later, watched as the interned German crews scuttled their ships.
Choules was posted to the Mediterranean in 1920 where he spent nearly three years on the battleship HMS Valiant before joining HMS Eagle, the Royal Navy's first purpose built aircraft carrier.
Image caption Seaplanes were used to counter threats from German Zeppelins
In 1926, along with a number of senior sailors he was sent to Australia to work as an instructor at the Flinders Naval Depot near Adelaide.
He was so taken by the Australian way of life that he applied for a transfer to the Royal Australian Navy where he became a specialist torpedo and explosives expert.
He was part of the crew that travelled to Scotland to commission the newly built warship HMAS Canberra and he served in her until 1931 when he transferred to the navy reserve.
In 1932 he rejoined the regular Australian navy as a Chief Petty Officer Torpedo and Anti Submarine Instructor.
Explosives in Australia
At the outbreak of war in 1939 Choules was the Acting Torpedo Officer, Fremantle and also the Chief Demolition Officer on the western side of the Australian continent.
He was tasked with destroying vital military installations should the threatened Japanese invasion of Australia come to pass.
Early in the war he was flown to Esperance, on the south coast of Western Australia, to identify and destroy the first mine to wash up on Australian soil during World War II.
As a demolition and explosives expert he took charge of the operation to clear the wreckage of 15 flying boats from the port of Broome on the northern coast of Western Australia.
The aircraft had been destroyed in an earlier Japanese attack and the remains were blocking a vital navigation.
Choules and his team of divers arrived in December 1942 and spent three months using explosives to blow the wrecks into manageable pieces and transport them into deeper water away from the harbour.
Image caption Taking to the skies on his 103rd birthday
He had the task of destroying Fremantle harbour and oil storage tanks rendering them useless as facilities in the event of a Japanese invasion.
Choules placed explosives around the harbour facilities and on board those ships that could not be moved to a safer harbour.
He remained in the Australian Navy until he transferred to the Naval Dockyard police, finally retiring in 1956 after 40 years in uniform.
For the next 10 years he operated a boat catching crayfish off the coast of Western Australia.
As, one by one, his fellow veterans passed away he must have felt history was closing in on him. But, although his body was failing, his mind remained alert until the end.
"I'm lucky aren't I, to be surviving all that time," he once told the BBC. "If I had my time over again I wouldn't change a bit of it"
Claude Choules was the last link with a war that wiped out a generation. Now, like the conflict in which he fought, he has passed into history. | {
"perplexity_score": 192,
"pile_set_name": "OpenWebText2"
} |
163 F.3d 466
160 L.R.R.M. (BNA) 2133, 137 Lab.Cas. P 10,331
David M. LYONS and United Transportation Union, Plaintiffs-Appellants,v.NORFOLK & WESTERN RAILWAY COMPANY, Defendant-Appellee.
No. 98-2347.
United States Court of Appeals,Seventh Circuit.
Argued Dec. 9, 1998.Decided Jan. 4, 1999.
Kevin C. Brodar (argued), Cleveland, OH, for Plaintiffs-Appellants.
James S. Whitehead (argued), Sidley & Austin, Chicago, IL, for Defendant-Appellee.
Before FLAUM, EASTERBROOK and DIANE P. WOOD, Circuit Judges.
FLAUM, Circuit Judge.
1
This case presents us with David M. Lyons's ("Lyons") and United Transportation Union's ("UTU") appeal of the district court's grant of summary judgment to defendant Norfolk & Western Railway Company ("NW") (erroneously referred to as Norfolk Southern Railway in the complaint). Lyons and UTU sought to overturn an arbitration panel's decision upholding NW's decision to fire Lyons for allegedly failing to comply with a drug test administered by the company. Noting the extremely high level of deference federal courts pay to railroad arbitration boards, the district court found no basis to overturn the panel's decision, and granted NW's motion for summary judgment. For the reasons set out below, we affirm the district court's decision.
FACTS
2
Lyons was hired by NW as a locomotive engineer trainee in April of 1993. He was a member of the UTU, which was his duly authorized labor representative in all matters with NW. On November 4, 1995, Lyons reported for work as part of a crew operating between Peru, Indiana and Decatur, Illinois. Upon reporting, he and the other members of the train crew were informed that they had been selected for random drug and alcohol testing under NW's drug testing program. NW implemented its program in accordance with regulations promulgated by the United States Department of Transportation and the Federal Railroad Administration (FRA). 49 C.F.R. § 219.1 et seq.
3
At 9:30 a.m., Lyons and the other two crew members informed the test technician that they were unable to provide a urine sample. Although the exact time is disputed by the parties, later in the morning Lyons and the other crew members were given a second opportunity to provide a sample. UTU contends that this opportunity came at 11:40 a.m.; NW claims the test was administered at 10:40 a.m. At this point, Lyons was able to urinate, but submitted a sample of insufficient volume, which was discarded by the technician.
4
According to then-existing FRA regulations (which have subsequently been modified), because Lyons's sample was insufficient, he was to be afforded two hours to produce an adequate sample. Failure to produce at that point would result in his dismissal unless the failure was found to be medically excusable. 49 C.F.R. § 40.25(f) (10)(iv) (1995). Again, the parties dispute what happened next. UTU argues that after Lyons provided the insufficient sample at 11:40 a.m., he was removed from service at 12:15 p.m. NW argues, and the arbitrator agreed, that Lyons was sent home at 1:30 p.m.1 Two days later, Lyons was examined by a doctor, who informed NW that he knew of no medical explanation why Lyons could not provide a urine sample.
5
On November 17, 1995, an Assistant Superintendent at NW informed Lyons that he was dismissed from service with NW because he "failed to follow instructions in that [he] refused to cooperate with FRA Subpart G testing." UTU, acting on behalf of Lyons, exhausted its internal appeals under the collective bargaining agreement to no avail.
6
At this point, UTU pressed its case through two channels: it sent a letter asking the FRA to investigate whether the test had been properly administered and it appealed the Lyons firing to a Public Law Board ("PLB" or "Board") (the railroad industry equivalent of an arbitration panel) pursuant to its collective bargaining agreement ("CBA") with NW. Under the CBA's terms, the PLB could reverse the dismissal if it was found to be "unjust." The FRA and PLB proceeded on completely separate tracks.
7
The PLB was made up of a NW representative, a UTU representative and a mutually agreed-upon neutral chairman, Robert Richter. Both sides filed written briefs with the PLB. UTU sought to reinstate Lyons, and to clear from his record the alleged failure to follow the drug testing instructions. The PLB's task was to determine whether the dismissal was "unjust"; if so, Lyons was entitled to reinstatement.
8
After reviewing the parties' submissions, the PLB ruled in favor of NW on December 30, 1996 by a two to one vote; UTU's representative dissented. The PLB found that it was not required to determine whether NW had complied with the FRA regulations. Instead, it upheld the dismissal because "after 4 hours [Lyons] was unable to provide a sufficient urine sample for testing," and thus NW's actions were not unjust.
9
On March 7, 1997, the FRA completed its informal investigation of the Lyons drug test and concluded that NW had failed to provide him with the requisite two hours. It noted, however, that because of the "nature and complexity of the times, events, and sequences in this matter, FRA will not assess a civil penalty against the railroad." It bears noting that such a penalty was the only action the FRA could take against NW--it could not order NW to reinstate Lyons.
10
Subsequent to the PLB ruling, Lyons and UTU filed a Petition for Review in the District Court asking that it set aside the PLB award. The parties submitted cross-motions for summary judgment. Judge Miller granted NW's motion and denied that of Lyons and UTU on April 27, 1998. This appeal followed.
ANALYSIS
11
We review the district court's grant of summary judgment to NW de novo. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986); Independent Construction Equipment Builders Union v. Hyster Yale Materials Handling, Inc., 83 F.3d 930, 932 (7th Cir.1996). However, we, like the district court, are obliged to give the findings of the PLB an extraordinary amount of deference. The scope of judicial review of a PLB decision is "among the narrowest known to the law." Kulavic v. Chicago & Illinois Midland Ry. Co., 1 F.3d 507, 513 (7th Cir.1993) quoting Union Pacific R.R. v. Sheehan, 439 U.S. 89, 94, 99 S.Ct. 399, 58 L.Ed.2d 354 (1978).
12
Although, as UTU points out, "narrow review is not the equivalent of no review at all," Miller v. Chicago & North Western Transp. Co., 647 F.Supp. 1432, 1438 (N.D.Ill.1986), it is well established that "judicial review of Board orders is limited to three specific grounds: (1) failure of the Board to comply with the requirements of the Railway Labor Act; (2) failure of the Board to confine itself to matters within the scope of its jurisdiction; and (3) fraud or corruption." Kulavic, 1 F.3d at 513; 45 U.S.C. § 153 First (q).
13
UTU does not allege either failure of the Board to comply with the RLA's requirements or fraud or corruption. It argues that the PLB exceeded its jurisdiction because its decision did not draw its essence from the CBA and lacked a rational foundation. To remain within the scope of its jurisdiction, the essence of the PLB's decision must be contained in the terms of the agreement between the union and the employer. UTU v. Soo Line R.R., 457 F.2d 285, 288 (7th Cir.1972). In other words, the PLB's decision must be based on the provisions of the CBA. Id. We have held that "a party can complain if the arbitrators don't interpret the contract ... [or] if they disregard the contract." Hill v. Norfolk & Western Ry. Co., 814 F.2d 1192, 1195 (7th Cir.1987).
14
Appellant argues that the FRA regulations were implicitly part of the CBA and the PLB simply could not ignore them. UTU's contention is that by failing to base its re-instatement decision on FRA standards, the PLB exceeded its jurisdiction. UTU analogizes this case to Wilson v. Chicago & North Western Transp. Co., 728 F.2d 963 (7th Cir.1984), contending that in Wilson, the court set aside a PLB decision because it was at odds with the Railway Labor Act.
15
Far from strengthening UTU's argument, close inspection of Wilson points out the major defect in UTU's case. The Wilson court set aside the PLB's ruling because it had unambiguously ignored the written terms of the contract between the union and the railroad. 728 F.2d at 966. Under the express terms of that contract, the railroad was specifically obligated to hold hearings and investigations before it dismissed an employee. Id. There, the railroad admittedly failed to meet those obligations, but the PLB ignored the deficiencies in arriving at a "novel and innovative" award to the railroad. Id. The court ruled that the PLB had wrongly "depart[ed] from the agreement's clear and unambiguous provisions ... [and] alter[ed] the existing agreement by ignoring the [relevant] provisions," thus unlawfully exceeding the boundaries of its authority. Id. at 967.
16
What Wilson makes clear is that the focus for a reviewing court is not whether a PLB's decision varied with federal standards, see also Dingwall v. Metro-North Commuter R.R., 1990 WL 129189 at * 3 (S.D.N.Y.1990), but rather whether it ignored "clear and unambiguous" contract provisions. UTU points to nothing in its contract with NW that the PLB failed to interpret. UTU cannot argue that the contract clearly incorporates the express terms of the FRA or requires the PLB to interpret it because nothing in the contract even suggests this.2 Similarly, it cannot argue that the contract required the PLB to wait for, and defer to, the outcome of the FRA's informal investigation. The PLB's sole contractual responsibility was to determine whether Lyons' termination was "unjust" in light of the facts of November 4, 1995.
17
The PLB found that Lyons was dismissed for failing to follow instructions by not providing a urine sample when ordered to do so, and that it was not unjust for NW to fire him for this offense. It is not for us to decide if this conclusion was correct; it is sufficient for us to say that in arriving at this conclusion, the PLB was interpreting the contractual term "unjust." Once we reach this point, our analysis is at an end, because:
18
[a]s we have said too many times to want to repeat again, the question for a federal court asked to set aside an arbitration award ... is not whether the arbitrator erred in interpreting the contract; it is not whether they clearly erred in interpreting the contract; it is not whether they grossly erred in interpreting the contract; it is whether they interpreted the contract. If they did, their interpretation is conclusive.
19
Hill v. Norfolk & Western Ry., 814 F.2d 1192, 1196 (7th Cir.1987).
20
Because we find that the PLB interpreted the contract, its interpretation is conclusive. Accordingly, the judgment of the district court in favor of NW is
21
AFFIRMED.
1
We recite these facts solely for informational purposes. We have no authority to review the PLB's findings of fact. Jasper Cabinet Co. v. United Steelworkers of America, 77 F.3d 1025, 1028 (7th Cir.1996); Bates v. Baltimore & Ohio R.R., 9 F.3d 29, 32 (7th Cir.1993)
2
UTU does not argue that the FRA regulations were intended by the Agency or Congress to have preemptive effect and supplant any other standard of review--such as whether the termination was "unjust"--agreed to in a CBA | {
"perplexity_score": 300.5,
"pile_set_name": "FreeLaw"
} |
Google authorship set up | Elance Job
A client needs Google Authorship correctly setting up on a Joomla CMS website linked to their Google+ account. They have already attempted but no rich snippets are showing in Google searches - for someone with experience this is hopefully a very... | {
"perplexity_score": 1126.8,
"pile_set_name": "Pile-CC"
} |
Charlie Hurst
Charlie Hurst (25 January 1919 – 23 January 1999) was an English footballer who played as a centre half for various clubs including Bristol Rovers, Oldham Athletic and Rochdale.
Playing career
Hurst was born in Denton, Lancashire and started his football career with Hyde United in the 1930s before playing for Bristol Rovers, Oldham Athletic and Rochdale. The Second World War, which took the best years of his footballing career, saw him serve in the British Army and he was one of the many soldiers rescued during the Dunkirk Evacuation in 1940. After the war had finished he returned to play for Oldham and then Rochdale before moving south, ending his footballing career playing non-league football for Chelmsford City and Sudbury Town.
He played in one match for Mossley, scoring a goal in the 1947–48 season.
Hurst became player-manager of Sudbury in the 1950–51 season. He took the team to the final of the Suffolk Senior Cup and third place in the Essex & Suffolk Border League.
Personal life
Hurst was the father of England player and World Cup winner, Geoff Hurst.
After finishing playing football he worked as a toolmaker in Essex. He died two days before his 80th birthday in 1999.
References
Category:1919 births
Category:1999 deaths
Category:People from Denton, Greater Manchester
Category:English footballers
Category:English Football League players
Category:Hyde United F.C. players
Category:Rochdale A.F.C. players
Category:Oldham Athletic A.F.C. players
Category:Bristol Rovers F.C. players
Category:Chelmsford City F.C. players
Category:Sudbury Town F.C. players
Category:Halstead Town F.C. managers
Category:Association football central defenders
Category:English football managers
Category:Mossley A.F.C. players | {
"perplexity_score": 122.7,
"pile_set_name": "Wikipedia (en)"
} |
Going Green in 2017
January 8, 2017
Story By: Ali Resich | Photos by: LAWRENCE TABUDLO
The editor faces the stunning view of the pier at Harbor Restaurant, with a healthy salad in hand.
With the new year already off to a great start, many of us are on a mission to make healthy dining choices in 2017. Whatever your motivation for this may be — whether it’s shedding some excess holiday weight or simply leading a healthy lifestyle overall — there’s no harm in filling your opu with nutritious, revitalizing fare.
I’m here to remind you that, contrary to popular belief, eating well can, in fact, be a delicious endeavor. One of the easiest ways to do so is to incorporate more fresh heaps of salad into your dining routine — and trust me, this doesn’t have to be a chore.
ADVERTISEMENT
The meals that I’ve scoped out for you and me both will not only give our taste buds something unique to try, but also will leave us feeling full and satisfied. And let’s not forget that there’s still room for a little indulging along the way.
IN AN OCTOPUS’ GARDEN
Harbor Restaurant at Pier 38 brings something new to the seafood-dominated port located off Nimitz Highway, accenting its popular neighbors (Nico’s and Uncle’s Fish Market) with a well-rounded menu of great-quality food.
Spanish Grilled Octopus with Fennel Salad ($17 lunch, $21 dinner)
While you can still enjoy delectable seafood at Harbor — hence, our star salad — you also can bite into sizzling steaks, juicy burgers and more, all given a Spanish touch from the charcoal-fired Brasa grill-ovens that make the eatery’s cuisine so distinct.
Head chef Rob McDaniel is dedicated to offering fresh, high-quality ingredients — thanks, in part, to his lengthy background in fine dining — so there are many dishes for health-conscious diners to order. The robust list of salads on the menu includes Spanish Grilled Octopus with Fennel Salad ($17 lunch, $21 dinner), a must when dining at Harbor.
Great for sharing with the whole table or as a personal meal, the entree features octopus that’s flown in from Spain twice a week. Because it’s a different type of tako than the local variety we usually enjoy, it has a slightly higher fat content — relatively speaking, as octopus remains a naturally low-fat seafood option — making it wonderfully tender.
Healthy Green Salad Set ($23)
The clean flavor of the proteinand vitamin-rich octopus is counterbalanced by peppery arugula and licorice-toned fennel, not to mention sweet cherry tomatoes. And with a calamansi dressing, which can be accented with a juicy drizzle of lemon on top, this dish quickly becomes the definition of refreshment.
“We use a lot of fresh-squeezed citrus and olive oil here — like for our salads, they aren’t made with ranch or heavy mayonnaise-style dressings,” explains McDaniel. “And the darker and more bitter the greens are, the better they are for you, so we use a lot of arugula and spring mixes.”
Stop by Harbor Restaurant during happy hour from 3 to 6 p.m. daily. You’ll also love the expansive copper-top bar that serves as the centerpiece of the spacious eatery. And McDaniel notes that Harbor no longer has a corkage fee for wine, in case there’s a special bottle you’d like to bring along.
Harbor Restaurant at Pier 38
1129 N. Nimitz Hwy., Honolulu
550-3740
Center map
Traffic
Bicycling
Transit
SALAD, AND THEN SOME
Eating right does not only translate to having a salad as your whole lunch or dinner. For many diners, a better approach is getting in their greens alongside the meal of their choice. And if that meal is something more indulgent such as pizza or pasta — and let’s face it, cravings for those comforts aren’t going anywhere — you can still enjoy them in moderation without going overboard.
Café Lani Hawaii at Ala Moana Center has a fantastic menu item for striking the perfect balance between eating well and satisfying cravings. It comes in the form of Healthy Green Salad Set ($23), which offers the right portions of some soul-soothing creations with a big bowl of vivacious salad on the side.
More specifically, the set gives a sampling of your choice of soup (French onion or clam chowder), a mini pizza Margherita and a mini shrimp gratin, all to supplement the colorful mix of greens, tomatoes, mushrooms and asparagus. As an added plus, the salad portion of the set meal is topped with a nice crunch from lotus root slices, which are a great source of fiber.
Chef Masayuki Ohara explains that customers love the Healthy Green Salad Set because it “has a little bit of everything.” And if your culinary habits include carbs, you’re in luck because “you also can enjoy all-youcan-eat bread. We bake over 20 varieties,” adds the chef.
Café Lani has been met with rave reviews since opening about a year ago in Ala Moana’s revamped Ewa Wing. The Italian-inspired restaurant, whose menu showcases Japanese and American touches, is ready to release its seasonal winter menu tomorrow, which will be available through February.
Some of the seasonal bites to look forward to are Octopus and Mountain Vegetables Pasta Set and Mentaiko Cream Pasta with Crab Meat Set, both of which are priced at $22.50. The sets come with salad, soup, mini pizza and all-you-can-eat bread. As a special treat, Ginger & Walnut and Azuki Bean & Sesame breads also will be freshly baked as all-you-can-eat options for the duration of the winter menu. | {
"perplexity_score": 497.1,
"pile_set_name": "Pile-CC"
} |
SELLER FINANCING AVAILABLE! 3040 sq ft commercial building sits directly on the highway for easy access and high visibility! Building is a blank slate with two separate entrances and several rooms that could be opened up to make one cohesive space. An over-sized septic tank was installed to accommodate a laundry mat that was never opened. Located behind the building is a 2005 manufactured home and improvements, which could be used as an office, residence, or rental property. This 3 bedroom 2 bath offers 1920 sq ft with RV hookups, a new metal roof, fresh paint/flooring, indoor and outdoor fireplaces, master suite with garden tub and over sized walk-in closet, covered back patio with surround sound and cable hook-ups, 3-car garage with epoxy floors and 220 amp service, and a 1-car covered carport. **Personal property in the garage, carport and sheds does not convey**
Notice & Disclaimer: All listing information is provided exclusively for consumers' personal, non-commercial use and may not be used for any purpose other than to identify prospective properties consumers may be interested in purchasing. Information is not guaranteed to be accurate. All measurements (including square footage and acreage) should be independently verified by the buyer. | {
"perplexity_score": 331.3,
"pile_set_name": "Pile-CC"
} |
-- EMACS settings: -*- tab-width: 2; indent-tabs-mode: t -*-
-- vim: tabstop=2:shiftwidth=2:noexpandtab
-- kate: tab-width 2; replace-tabs off; indent-width 2;
-- =============================================================================
-- Authors: Patrick Lehmann
--
-- Entity: A generic buffer module for the PoC.Stream protocol.
--
-- Description:
-- -------------------------------------
-- .. TODO:: No documentation available.
--
-- License:
-- =============================================================================
-- Copyright 2007-2015 Technische Universitaet Dresden - Germany
-- Chair of VLSI-Design, Diagnostics and Architecture
--
-- Licensed under the Apache License, Version 2.0 (the "License");
-- you may not use this file except in compliance with the License.
-- You may obtain a copy of the License at
--
-- http://www.apache.org/licenses/LICENSE-2.0
--
-- Unless required by applicable law or agreed to in writing, software
-- distributed under the License is distributed on an "AS IS" BASIS,
-- WITHOUT WARRANTIES OR CONDITIONS of ANY KIND, either express or implied.
-- See the License for the specific language governing permissions and
-- limitations under the License.
-- =============================================================================
library IEEE;
use IEEE.STD_LOGIC_1164.all;
use IEEE.NUMERIC_STD.all;
library PoC;
use PoC.config.all;
use PoC.utils.all;
use PoC.vectors.all;
entity stream_DeMux is
generic (
PORTS : positive := 2;
DATA_BITS : positive := 8;
META_BITS : natural := 8;
META_REV_BITS : natural := 2
);
port (
Clock : in std_logic;
Reset : in std_logic;
-- Control interface
DeMuxControl : in std_logic_vector(PORTS - 1 downto 0);
-- IN Port
In_Valid : in std_logic;
In_Data : in std_logic_vector(DATA_BITS - 1 downto 0);
In_Meta : in std_logic_vector(META_BITS - 1 downto 0);
In_Meta_rev : out std_logic_vector(META_REV_BITS - 1 downto 0);
In_SOF : in std_logic;
In_EOF : in std_logic;
In_Ack : out std_logic;
-- OUT Ports
Out_Valid : out std_logic_vector(PORTS - 1 downto 0);
Out_Data : out T_SLM(PORTS - 1 downto 0, DATA_BITS - 1 downto 0);
Out_Meta : out T_SLM(PORTS - 1 downto 0, META_BITS - 1 downto 0);
Out_Meta_rev : in T_SLM(PORTS - 1 downto 0, META_REV_BITS - 1 downto 0);
Out_SOF : out std_logic_vector(PORTS - 1 downto 0);
Out_EOF : out std_logic_vector(PORTS - 1 downto 0);
Out_Ack : in std_logic_vector(PORTS - 1 downto 0)
);
end entity;
architecture rtl of stream_DeMux is
attribute KEEP : boolean;
attribute FSM_ENCODING : string;
subtype T_CHANNEL_INDEX is natural range 0 to PORTS - 1;
type T_STATE is (ST_IDLE, ST_DATAFLOW, ST_DISCARD_FRAME);
signal State : T_STATE := ST_IDLE;
signal NextState : T_STATE;
signal Is_SOF : std_logic;
signal Is_EOF : std_logic;
signal In_Ack_i : std_logic;
signal Out_Valid_i : std_logic;
signal DiscardFrame : std_logic;
signal ChannelPointer_rst : std_logic;
signal ChannelPointer_en : std_logic;
signal ChannelPointer : std_logic_vector(PORTS - 1 downto 0);
signal ChannelPointer_d : std_logic_vector(PORTS - 1 downto 0) := (others => '0');
signal ChannelPointer_bin : unsigned(log2ceilnz(PORTS) - 1 downto 0);
signal idx : T_CHANNEL_INDEX;
signal Out_Data_i : T_SLM(PORTS - 1 downto 0, DATA_BITS - 1 downto 0) := (others => (others => 'Z')); -- necessary default assignment 'Z' to get correct simulation results (iSIM, vSIM, ghdl/gtkwave)
signal Out_Meta_i : T_SLM(PORTS - 1 downto 0, META_BITS - 1 downto 0) := (others => (others => 'Z')); -- necessary default assignment 'Z' to get correct simulation results (iSIM, vSIM, ghdl/gtkwave)
begin
In_Ack_i <= slv_or(Out_Ack and ChannelPointer);
DiscardFrame <= slv_nor(DeMuxControl);
Is_SOF <= In_Valid and In_SOF;
Is_EOF <= In_Valid and In_EOF;
process(Clock)
begin
if rising_edge(Clock) then
if (Reset = '1') then
State <= ST_IDLE;
else
State <= NextState;
end if;
end if;
end process;
process(State, In_Ack_i, In_Valid, Is_SOF, Is_EOF, DiscardFrame, DeMuxControl, ChannelPointer_d)
begin
NextState <= State;
ChannelPointer_rst <= Is_EOF;
ChannelPointer_en <= '0';
ChannelPointer <= ChannelPointer_d;
In_Ack <= '0';
Out_Valid_i <= '0';
case State is
when ST_IDLE =>
ChannelPointer <= DeMuxControl;
if (Is_SOF = '1') then
if (DiscardFrame = '0') then
ChannelPointer_en <= '1';
In_Ack <= In_Ack_i;
Out_Valid_i <= '1';
NextState <= ST_DATAFLOW;
else
In_Ack <= '1';
NextState <= ST_DISCARD_FRAME;
end if;
end if;
when ST_DATAFLOW =>
In_Ack <= In_Ack_i;
Out_Valid_i <= In_Valid;
ChannelPointer <= ChannelPointer_d;
if (Is_EOF = '1') then
NextState <= ST_IDLE;
end if;
when ST_DISCARD_FRAME =>
In_Ack <= '1';
if (Is_EOF = '1') then
NextState <= ST_IDLE;
end if;
end case;
end process;
process(Clock)
begin
if rising_edge(Clock) then
if ((Reset or ChannelPointer_rst) = '1') then
ChannelPointer_d <= (others => '0');
elsif (ChannelPointer_en = '1') then
ChannelPointer_d <= DeMuxControl;
end if;
end if;
end process;
ChannelPointer_bin <= onehot2bin(ChannelPointer_d);
idx <= to_integer(ChannelPointer_bin);
In_Meta_rev <= get_row(Out_Meta_rev, idx);
genOutput : for i in 0 to PORTS - 1 generate
Out_Valid(i) <= Out_Valid_i and ChannelPointer(i);
assign_row(Out_Data_i, In_Data, i);
assign_row(Out_Meta_i, In_Meta, i);
Out_SOF(i) <= In_SOF;
Out_EOF(i) <= In_EOF;
end generate;
Out_Data <= Out_Data_i;
Out_Meta <= Out_Meta_i;
end architecture; | {
"perplexity_score": 1114.2,
"pile_set_name": "Github"
} |
There’s an attraction I have to skulls... So much so that I have a skull on my kitchen counter all year long and amongst the stack of Marinella jewelry ‘Protection Bracelets’ I wear one most always has a skull charm dangling.
I enjoy how the skulls large eye sockets gaze at me from its bony structure, how the bracelets feel and the sound the skull charm makes as it jangles against my other bracelets. There is something cool and composed or should I say ‘decompose’ about a skull that fascinates me.
Some may say this is morbid but I am not the only one who identifies with the possible power in the skull symbol. Throughout history the skull has embodied both sides of the spectrum and has held various meaning to different people.
Society largely associates skulls with death, evil, symbols for poison or a flag on a pirate’s ship. However, to some ancient societies it’s believed to have had the opposite association, where objects like crystal skulls represent "life"; much like the present-day Mexican celebration ‘Dia de los Muertos’ ~ ‘Day of the Dead’ ~ used to honor the lives of those who have gone before us.
There is a mindfulness of our own mortality and wasted wistfulness of immortality which highlights for me the importance of living in the moment… | {
"perplexity_score": 478.6,
"pile_set_name": "Pile-CC"
} |
Sonia Azhar Design Concepts showcased her bridal week collection for L'Oreal Paris Bridal Week 2012 Day 1 titled ‘Dark Romance’. Taking inspiration from the allure and mystery of romance and working on that primitive feeling of love inherent in all human beings, Sonia Design Concepts’ Dark Romance collection delved into lighter and darker colour palettes to invoke a deep sense of glamor.
Sonia Azhar of Sonia Design Concepts is an Architecture graduate from the prestigious National College of Arts in Lahore. With fashion design experience spanning over 15 years, Sonia Design Concepts specializes in couture. Under her supervision and guidance, craftsmen work to create timeless pieces.
With emphasis on colors and blending these with different embroidery techniques, embellishments and cuts, Sonia Azhar amalgamates Eastern craftsmanship and Western cuts in her bridal wear. The stylist for Sonia Azhar Bridal Collection at L'Oreal Paris Bridal Week 2012 Day 1 was Nabila and her creative team at N-Pro.
Using hand embroidery and Swarovski crystals along with the kora, beads, sequins work, her collections have been well received nationally and abroad and to this end, she has showcased her work in Abu Dhabi, Dubai, London and Glasgow to name a few. This October, Sonia Azhar presented her collection at the PFDC L’Oréal Paris Bridal Week 2012 | {
"perplexity_score": 458.8,
"pile_set_name": "Pile-CC"
} |
Original ThronesDB and NetrunnerDB code designed and built by Alsciende. Adapted to The Lord of the Rings: The Card Game by Sydtrack. Contact:
RingsDB card images and data kindly supplied by Hall of Beorn.
Please post bug reports and feature requests on GitHub.
You may contribute by donating on PayPal .
The information presented on this site about The Lord of the Rings: The Card Game, both literal and graphical, is copyrighted by Fantasy Flight Games. This website is not produced, endorsed, supported, or affiliated with Fantasy Flight Games. | {
"perplexity_score": 365.8,
"pile_set_name": "OpenWebText2"
} |
People gather at a park in Isla Vista for a candlelight vigil to honour the victims of the mass shooting. Photo: AP
Over the weekend, six people were killed in a Californian neighbourhood near UC Santa Barbara. Their murderer was a man whose name I’ll elect not to use, because it doesn’t deserve to be remembered. But he was a young man who hated women and resented them for withholding their affections from him. To punish them for these transgressions, he determined to target the ‘hottest sorority house’ at UCSB and ‘slaughter’ every ‘spoiled, stuck-up, blonde slut [he sees] inside there.’
In a video posted to YouTube, the shooter (who began his killing spree by stabbing his three roommates to death) lamented that, “For the last eight years of my life, since I hit puberty, I’ve been forced to endure an existence of loneliness, rejection and unfulfilled desires, all because girls have never been attracted to me. Girls gave their affection and sex and love to other men, never to me.”
There are few things uglier and more threatening to women than misogynist male entitlement. It reminds us that our right to exist with some semblance of freedom is viewed as a contractual arrangement; as long as we behave ourselves, we won’t be punished too severely for the simple crime of being a woman.
Under the hashtag #yesallwomen, a litany of complaints and outrages have swept across the Twittersphere. Within hours, the hashtag was trending internationally. Women raged against the violence that was to threaten them and keep them in line; men (for the most part) offered their solidarity and support, while urging others to read the rolling timeline of tweets regardless of how challenging and uncomfortable they might prove to be.
One of the most retweeted pictures under the #yesallwomen tag was a meme that’s been floating around for some time now. It perfectly illustrates the troubling cognitive dissonance that comes with according value to a woman based on her male connections.
In addition to furious objections over subjugations of living in a culture which normalises violence towards women and charges them with being responsible for avoiding it came anger over the lack of respect shown for women’s autonomy. Women argued accurately and with fierce eloquence against the idea that a woman is ‘off limits’ if she ‘belongs’ to another man; that street harassment isn’t a ‘compliment’ but another manifestation of entitlement, one which seeks to remind women that their bodies and dignity belong to someone else; and that even their outrage and anger is stolen from them and portrayed as the misandric criminalisation of male sexuality and/or identity.
#YesAllWomen because when a girl is harassed or even groped by a stranger in public, we're told to "take it as a compliment" — AB (@bottrill) May 25, 2014
#YesAllWomen because when women stand up for their right to feel safe & not get killed or raped, men turn it around & make it anti-male. — ♕☮ Genny Λstartiel ❤ (@Astartiel) May 25, 2014
Because "the friendzone" is not just an annoying meme; it is an expression of entitlement and threat of violence against women. #YesAllWomen — Charles Clymer (@cmclymer) May 24, 2014
#Yesallwomen are taught that it’s their responsibility to modify and shrink their behaviour to protect themselves from sexual violence. — Clementine Ford (@clementine_ford) May 25, 2014
The outpouring of female anger was not, as some have called it, ‘armchair activism’ but a meaningful and spontaneous public response to the dreadful hate crime that happened in Santa Barbara. Despite the support offered by many men to #yesallwomen, it’s frustrating to see so many others insist that these senseless deaths had nothing to do with the perceived emasculation of being denied the alpha identity that the gunman felt women owed to him.
At its most benign, those hesitant to identify the misogyny present are focusing instead on the gunman’s fragile mental health - as if misogyny (particularly the homicidal kind) isn’t a clear and indisputable expression of acute mental illness exacerbated by the frequenting of MRA websites and pick up artist communities.
Because the friendzone is the fictional exile of the entitled. “Sexual partner” is not a woman’s default mode. #yesallwomen — Harrison Mooney (@HarrisonMooney) May 25, 2014
Because when a guy kills six people because he's a virgin and women reject him, he's met with sympathy. #YesAllWomen pic.twitter.com/elZfnRTi5T — Bekah (@RebekahBolser) May 25, 2014
But frighteningly, there are others who appear to empathise with the fact that loneliness and female rejection ‘caused’ this young man to exact his cruel form of revenge. That if it weren’t for the ‘agony’ of female rejection and the refusal to ‘give’ sex to him, he might be a well-adjusted person.
This is what misogyny and male entitlement writ large looks like. The denial of its existence is what allows ongoing violence against women to flourish. Women experience a broad range of gender related violence every day, from incessant street harassment to sexual assaults to murder. It is the shadow we live under and the threat we live in fear of, and we endure it solely because we are women. It’s what leads to a young girl being stabbed to death by a schoolmate because she won’t go to prom with him. And it’s what allows a young man to believe so fervently that he is ‘owed’ female attention and adoration that when he is repeatedly denied it, he decides someone must be punished in order to reinstate his power as a dominant male.
If this isn’t a result of structural misogyny and male entitlement, what is it? A coincidence? Why is it that one woman murdered every week in Australia by her partner or ex-partner is not considered a manifestation of the ongoing, ritualised hate crime that specifically targets women? Why must we be further insulted by having our anger explained away as irrational and misplaced? We know what pure, unadulterated misogyny is because we have felt its wrath; yet we’re once again being told our instincts are wrong by people for whom such hatred can never be anything more than theoretical.
Margaret Atwood famously said that men’s greatest fear is that women will laugh at them, while women’s greatest fear is that men will kill them. Misogyny and male entitlement are sustained acts of aggression against women that everyone should be invested in opposing.
No, not all men kill or harm women.
But yes - all women have a right to be angry and afraid when they do. | {
"perplexity_score": 392.3,
"pile_set_name": "OpenWebText2"
} |
Thirteen years ago today I purchased this domain. According to Wayback Machine I referred to March 15th as my official “Hello World.”
Which was about a week and a half after WordPress 1.5 was officially released. It wasn’t a coincidence. I’d been toying with starting a blog for a couple of months, looking at all of the “free” options and being unsatisfied. Digging deeper, I found WordPress. This was still 1.2 with no real theme or plugin system – my-hacks.php y’all. Anyway, I started playing with the beta and figuring out how to get it installed on a shared server with “pretty permalinks”. Soon after the stable release I settled on a url and jumped in.
About the name—I get this question often. Back in the days of arcade and console games when you got a high score or save position, often the user name was 3 characters. My initials never clicked for me so I used MIK. In high school, I was Michael B. Somewhere between the 2 I came up with the user name miklb and it was a short domain and truthfully, I didn’t know what I was doing. Also, all variations of Michael & Bishop were taken, dominated by a star college quarterback in Kansas.
Armed with Smultron, Cyberduck and a desire to make my own website and blog, here I am, writing this post in Atom Editor(very much the Smultron of today), which will make it’s way to a blog post on a site running a very much different version of WordPress than where it started.
Thank you to every single one of you who’ve provided help, insight and friendship along this journey. | {
"perplexity_score": 297,
"pile_set_name": "Pile-CC"
} |
Fifty years ago this month, evolutionary biologist William Donald Hamilton published a solution to one of biology’s most enduring mysteries: why does altruism exist?
Altruistic behaviours are those where an individual helps others at a personal cost. Altruism is all around us, yet biologists since Charles Darwin had stewed over how such behaviours could ever evolve in the dog-eat-dog world of natural selection.
Hamilton came up with an answer to this quandary, elegantly summarised in the mathematical formula now known as Hamilton’s rule.
So now seems a good time to ask: what did we actually learn from Hamilton, and are his ideas on altruism still relevant half a century on?
The trouble with social insects
The most extreme examples of altruism in nature come from social insects such as bees and ants, in which workers toil endlessly for their colony but don’t reproduce themselves.
Their existence had long puzzled biologists. Darwin considered social insects a potentially “insuperable difficulty” for his theory of natural selection. After all, how can selection work in individuals that are sterile?
Until Hamilton, explanations for the evolution of altruism and cooperation reverted to arguments that it benefited the species. It’s a line still used in third-rate nature documentaries today, and it makes evolutionary biologists cringe. Every single time.
Cooperation may well benefit the species, or even a group, but English biologist Ronald Fisher showed in the 1930s that natural selection doesn’t work like that. When what’s good for the group contradicts what’s best for the individual, the interests of the individual almost always win out.
Nevertheless in the 1960s ideas about group selection were again surfacing, retreading all the old mistakes.
Then in July 1964 Hamilton lopped the wind from their sails with two groundbreaking Journal of Theoretical Biology articles. He described how genes imposing a fitness cost on some individuals (for example sterility in the workers of social insects) can spread, provided they enhance the fitness of relatives that share the same gene.
Hamilton coined the term “inclusive fitness”, which he defined in his own notoriously opaque way:
The social behaviour of a species evolves in such a way that in each distinct behaviour-evoking situation the individual will seem to value his neighbour’s fitness against his own according to the coefficients of relationship appropriate to that situation.
In other words, a worker ant may not have any sons or daughters, but can still produce thousands of brothers and sisters. And in Darwinian terms, that’s just as good as – or even better than – personal reproduction.
Kin selection
Hamilton’s ideas and their subsequent embellishments are now often referred to as “kin selection”, a term coined not by Hamilton but by British evolutionary biologist John Maynard Smith in 1964.
Maynard Smith credited British biologist JBS Haldane as the first to have come up with the notion of kin selection. According to rumour, Haldane declared, in a pub, “I would lay down my life for two brothers or eight cousins”, referring to the fact that our siblings on average share 50% of our genes and cousins 12.5%.
Hamilton contested the Haldane quip. In fact, one of the motivations for Hamilton’s work on inclusive fitness was that Haldane’s work had failed to derive altruism from group selection.
The relationship between Hamilton and Maynard Smith – two of the most influential evolutionary biologists of the 20th century – sadly remained strained until Hamilton’s untimely death in March 2000.
So what exactly is Hamilton’s rule?
Hamilton’s rule specifies the conditions under which a gene causing altruism might enjoy an inclusive fitness advantage. This occurs when the benefits, b, to a related individual exceed the costs, c, to the altruist, discounted by the relatedness, r, between the two:
b > c/r
Evolutionary biologists consider this equation every bit as important as Einstein’s mass-energy equivalence equation (E=mc2).
Hamilton used the evolution of alarm calls in birds as an example. A bird that calls in response to danger risks attracting attention and thus losing its life, as opposed to a bird that remains quiet.
But, according to Hamilton’s rule, such self-sacrificing behaviour can evolve if the benefits to relatives who hear the squawk and gain advance warning (summed by the number of relatives and how closely related they are to the squawker) outweigh the risks to the squawker.
In the past 50 years Hamilton’s rule has been used to explain a plethora of otherwise strange animal and human behaviours:
why do we care for our children?
why do lions form coalitions with their brothers?
why do young birds hang around the nest rearing brothers and sisters rather than breeding themselves?
But does kin selection still hold up?
In 2010, a Nature paper by Martin Nowak, Corina Tarnita and Edward O. Wilson – the latter a once-staunch supporter of kin selection and a mentor to Hamilton – rejected kin selection outright.
Nowak and his co-authors claimed kin selection was simply an unnecessary reformulation of natural selection. They argued that altruistic genes can increase in frequency even when givers and receivers of altruism are unrelated, simply because individuals carrying altruism genes preferentially interact with each other.
They failed to note, however, that their “alternative” mechanism for the evolution of altruism had already been identified by Hamilton and immortalised by Richard Dawkins as the “greenbeard effect”.
Imagine a gene that causes its carrier to grow a green beard. Such a gene will spread if those that carry it preferentially show altruism to other individuals with a green beard.
Nowak, Tarnita and Wilson’s attack on Hamilton has been almost universally dismissed by evolutionary biologists. In 2011 more than 100 eminent scientists signed a letter pointing out the conceptual errors in the paper and documenting the extraordinary predictive power of the kin selection paradigm.
A nicer world
Kin selection provides one of the two strong forces that bind all cooperative enterprise. The other is reciprocity. Think of the first as “blood is thicker than water” and the second as “you scratch my back and I’ll scratch yours”.
We rely so much on reciprocity in contemporary society, with reciprocation made liquid by money and other currencies. But kin selection still gives social life much of its shape.
Genetic relatedness infiltrates human affairs to their very root. From childcare to nepotistic corruption, when all else is equal we favour our relatives over those more distantly related.
It also explains food-sharing practices in traditional societies, the way inheritances are passed down in wills and which grandparent children feel closest to.
The most compelling illustration of kin selection in humans is the work of Canadian evolutionary psychologists Martin Daly and Margo Wilson, summarised in their book The Truth About Cinderella: A Darwinian View of Parental Love.
Just as fairytales warned children about the dangers of the stepmother, so modern data on childhood neglect and violence suggest that a parent’s new partner presents a high risk to the child. These are difficult facts to acknowledge because the vast majority of stepparents provide wonderfully supportive homes to children.
But the key here is what relatedness does to parents. Genetic relatedness more often persuades parents to persist with the hard work of child-rearing, prevents them from abandoning their kids and stays their hand from violent overreactions.
The roots for all these ideas were pioneered 50 years ago by Hamilton, whose work continues to illuminate the origins of our own behaviours. | {
"perplexity_score": 339.6,
"pile_set_name": "OpenWebText2"
} |
A few questions about startups. - foof
======
foof
Its often said that the startups are successful, especially by the venture
capitalist firms who fund these startups. It is hard to say, what is intention
behind the claim of saying most of the startups as successful, because as far
as we could find on the internet there is not a single place which contains
the facts and the figures about the success and the failure of the new
ventures.
And if so that the people were successful, who were they from were did they
start, were their background as modest, or where they some geeks like Einstein
or from the Wharton business school?
Is there is a place where we can find who these people where and what was
special in idea which made them successful? All that are stated at time are
bug names like Sabeer Bhatia, and Steve Jobs. But definitely all cant be them,
and that's for sure.
In short is there any study available which can confirm or prove that taking a
risk is not foolishness, but its a calculated path that could take you to
success.
~~~
nostrademons
_Founders at Work_. <http://www.amazon.com/gp/product/1590597141>
------
gigamon
I have never seen such a book but then I have never looked for such a book. I
was convinced that when I started my first startup, I had a disease. Now that
I have started my second, I know it is terminal.
If you have read a book to convince yourself that you need to start, then
chances are you have no need to. And that's not necessarily a bad thing.
\--Denny--
Denny K Miu "Startup for less - Survival Guide for Bootstrapping
Entrepreneurs" <http://www.lovemytool.com/blog/startup-for-less.html>
~~~
foof
Denny, its not about reading a book o convince oneself, rather it is about
taking a calculated risk. I want to convince myself about starting a startup
based on rational thought and facts and figures, and not based on emotions.
Everyone wants to start something new and make innovations, but I do not want
to screw up my life chasing a though that has a very marginal success rate.
It is not about convincing, it is about facts, and they can speak for
themselves. | {
"perplexity_score": 543.5,
"pile_set_name": "HackerNews"
} |
Studies of the plasma kinin-forming system in cirrhosis of the liver.
Kininogen level, that of active kinins and kininase activity in the plasma of patients suffering from cirrhosis of the liver and of healthy people were studied. The kininogen content was determined by different available methods i.e. the trypsin and acetone techniques and by means of the plasma and glandular kallikrein preparation. An increase in kininase activity and a lowered kininogen level as determined by all the methods were found in the sick persons. The maximal decrease in the kininogen level determined by means of the plasma kallikreins is substantiated in connection with the increased fibrinolytic activity of the plasma of the patients with hepatic cirrhosis. | {
"perplexity_score": 140.2,
"pile_set_name": "PubMed Abstracts"
} |
/* Copyright (c) 2010, 2012, Oracle and/or its affiliates. All rights reserved.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; version 2 of the License.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA */
// First include (the generated) my_config.h, to get correct platform defines.
#include "my_config.h"
#include <gtest/gtest.h>
#include <algorithm>
#include <stddef.h>
#include "bounded_queue.h"
#include "filesort_utils.h"
#include "my_sys.h"
namespace bounded_queue_unittest {
const int num_elements= 14;
// A simple helper function to determine array size.
template <class T, int size>
int array_size(const T (&)[size])
{
return size;
}
/*
Elements to be sorted by tests below.
We put some data in front of 'val' to verify (when debugging)
that all the reinterpret_casts involved when using QUEUE are correct.
*/
struct Test_element
{
Test_element() { *this= -1; }
Test_element(int i) { *this= i; }
Test_element &operator=(int i)
{
val= i;
snprintf(text, array_size(text), "%4d", i);
return *this;
}
char text[8]; // Some data.
int val; // The value we use for generating the key.
};
/*
The key, which is actually sorted by queue_xxx() functions.
We sort on the key only.
*/
struct Test_key
{
Test_key() : element(NULL), key(-1) {}
Test_element *element; // The actual data element.
int key; // The generated key for the data element.
};
/*
Comparison function for Test_key objects.
*/
int test_key_compare(size_t *cmp_arg, Test_key **a, Test_key **b)
{
EXPECT_EQ(*cmp_arg, sizeof(int));
int a_num= (*a)->key;
int b_num= (*b)->key;
if (a_num > b_num)
return +1;
if (a_num < b_num)
return -1;
return 0;
}
/*
Generates a Test_key for a given Test_element.
*/
void test_keymaker(Sort_param *sp, Test_key *key, Test_element *element)
{
key->element= element;
key->key= element->val;
}
/*
A struct to wrap the actual keys, and an array of pointers to the keys.
*/
template<int sz, typename Key_type>
struct Key_container
{
Key_container()
{
for (int ix= 0; ix <= sz; ++ix)
key_ptrs[ix]= &key_data[ix];
}
Key_type *key_ptrs[sz+1];
Key_type key_data[sz+1];
};
class BoundedQueueTest : public ::testing::Test
{
protected:
BoundedQueueTest() : m_key_size(sizeof(int))
{
}
virtual void SetUp()
{
int ix;
for (ix=0; ix < array_size(m_test_data); ++ix)
m_test_data[ix]= ix;
std::random_shuffle(&m_test_data[0], &m_test_data[array_size(m_test_data)]);
}
void insert_test_data()
{
for (int ix= 0; ix < array_size(m_test_data); ++ix)
m_queue.push(&m_test_data[ix]);
}
// Key pointers and data, used by the queue_xxx() functions.
Key_container<num_elements / 2, Test_key> m_keys;
// Some random intput data, to be sorted.
Test_element m_test_data[num_elements];
size_t m_key_size;
Bounded_queue<Test_element, Test_key> m_queue;
private:
GTEST_DISALLOW_COPY_AND_ASSIGN_(BoundedQueueTest);
};
// Google Test recommends DeathTest suffix for classes used in death tests.
typedef BoundedQueueTest BoundedQueueDeathTest;
#if !defined(DBUG_OFF)
/*
Verifies that we DBUG_ASSERT if trying to push to an un-initialized queue.
*/
TEST_F(BoundedQueueDeathTest, DieIfNotInitialized)
{
::testing::FLAGS_gtest_death_test_style = "threadsafe";
Test_element foo= 1;
EXPECT_DEATH_IF_SUPPORTED(m_queue.push(&foo),
".*Assertion .*is_initialized.*");
}
/*
Verifies that popping an empty queue hits a DBUG_ASSERT.
*/
TEST_F(BoundedQueueDeathTest, DieIfPoppingEmptyQueue)
{
EXPECT_EQ(0, m_queue.init(0, true, test_key_compare,
m_key_size,
&test_keymaker, NULL, m_keys.key_ptrs));
::testing::FLAGS_gtest_death_test_style = "threadsafe";
EXPECT_DEATH_IF_SUPPORTED(m_queue.pop(),
".*Assertion .*elements > 0.*");
}
#endif // !defined(DBUG_OFF)
/*
Verifies that construct, initialize, destroy works.
*/
TEST_F(BoundedQueueTest, ConstructAndDestruct)
{
EXPECT_EQ(0, m_queue.init(num_elements/2, true,
test_key_compare,
m_key_size,
&test_keymaker, NULL, m_keys.key_ptrs));
}
/*
Verifies that we reject too large queues.
*/
TEST_F(BoundedQueueTest, TooManyElements)
{
EXPECT_EQ(1, m_queue.init(UINT_MAX, true,
test_key_compare,
m_key_size,
&test_keymaker, NULL, m_keys.key_ptrs));
EXPECT_EQ(1, m_queue.init(UINT_MAX - 1, true,
test_key_compare,
m_key_size,
&test_keymaker, NULL, m_keys.key_ptrs));
}
/*
Verifies that zero-size queue works.
*/
TEST_F(BoundedQueueTest, ZeroSizeQueue)
{
EXPECT_EQ(0, m_queue.init(0, true, test_key_compare,
m_key_size,
&test_keymaker, NULL, m_keys.key_ptrs));
insert_test_data();
EXPECT_EQ(1U, m_queue.num_elements());
}
/*
Verifies that push and bounded size works, and that pop() gives sorted order.
*/
TEST_F(BoundedQueueTest, PushAndPopKeepLargest)
{
EXPECT_EQ(0, m_queue.init(num_elements/2, false, test_key_compare,
m_key_size,
&test_keymaker, NULL, m_keys.key_ptrs));
insert_test_data();
// We expect the queue to contain [7 .. 13]
const int max_key_val= array_size(m_test_data) - 1;
while (m_queue.num_elements() > 0)
{
Test_key **top= m_queue.pop();
int expected_key_val= max_key_val - m_queue.num_elements();
int key_val= (*top)->key;
EXPECT_EQ(expected_key_val, key_val);
Test_element *element= (*top)->element;
EXPECT_EQ(expected_key_val, element->val);
}
}
/*
Verifies that push and bounded size works, and that pop() gives sorted order.
Note that with max_at_top == true, we will pop() in reverse order.
*/
TEST_F(BoundedQueueTest, PushAndPopKeepSmallest)
{
EXPECT_EQ(0, m_queue.init(num_elements/2, true, test_key_compare,
m_key_size,
&test_keymaker, NULL, m_keys.key_ptrs));
insert_test_data();
// We expect the queue to contain [6 .. 0]
while (m_queue.num_elements() > 0)
{
Test_key **top= m_queue.pop();
int expected_key_val= m_queue.num_elements();
int key_val= (*top)->key;
EXPECT_EQ(expected_key_val, key_val);
Test_element *element= (*top)->element;
EXPECT_EQ(expected_key_val, element->val);
}
}
/*
Verifies that push, with bounded size, followed by sort() works.
*/
TEST_F(BoundedQueueTest, InsertAndSort)
{
EXPECT_EQ(0, m_queue.init(num_elements/2, true, test_key_compare,
m_key_size,
&test_keymaker, NULL, m_keys.key_ptrs));
insert_test_data();
uchar *base= (uchar*) &m_keys.key_ptrs[0];
size_t size= sizeof(Test_key);
// We sort our keys as strings, so erase all the element pointers first.
for (int ii= 0; ii < array_size(m_keys.key_data); ++ii)
m_keys.key_data[ii].element= NULL;
my_string_ptr_sort(base, array_size(m_keys.key_ptrs), size);
for (int ii= 0; ii < num_elements/2; ++ii)
{
Test_key *sorted_key= m_keys.key_ptrs[ii];
EXPECT_EQ(ii, sorted_key->key);
}
}
/*
A test of the function get_merge_many_buffs_cost_fast()
*/
TEST(CostEstimationTest, MergeManyBuff)
{
ha_rows num_rows= 512;
ulong num_keys= 100;
ulong row_lenght= 100;
double prev_cost= 0.0;
while (num_rows <= MAX_FILE_SIZE/4)
{
double merge_cost=
get_merge_many_buffs_cost_fast(num_rows, num_keys, row_lenght);
EXPECT_LT(0.0, merge_cost);
EXPECT_LT(prev_cost, merge_cost);
num_rows*= 2;
prev_cost= merge_cost;
}
}
/*
Comparison function for integers.
*/
int int_ptr_compare(size_t *cmp_arg, int **a, int **b)
{
EXPECT_EQ(*cmp_arg, sizeof(int));
int a_num= **a;
int b_num= **b;
if (a_num > b_num)
return +1;
if (a_num < b_num)
return -1;
return 0;
}
/*
Generates an integer key for a given integer element.
*/
void int_keymaker(Sort_param *sp, int *to, int *from)
{
memcpy(to, from, sizeof(int));
}
/*
Some basic performance testing, to compute the overhead of Bounded_queue.
Run the with 'bounded_queue-t --disable-tap-output' to see the
millisecond output from Google Test.
*/
const int num_rows= 10000;
const int row_limit= 100;
const int num_iterations= 10;
class PerfTestSmall : public ::testing::Test
{
public:
/*
The extra overhead of malloc/free should be part of the measurement,
so we do not define the key container as a member here.
*/
typedef Key_container<row_limit, int> Container;
enum { limit= row_limit };
};
class PerfTestLarge : public ::testing::Test
{
public:
/*
The extra overhead of malloc/free should be part of the measurement,
so we do not define the key container as a member here.
*/
typedef Key_container<num_rows, int> Container;
enum { limit= num_rows };
};
template <int limit>
void insert_and_sort()
{
typedef Key_container<limit, int> Container;
for (int it= 0; it < num_iterations; ++it)
{
Container *keys= new Container;
srand(0);
Bounded_queue<int, int> queue;
EXPECT_EQ(0, queue.init(limit, true, int_ptr_compare,
sizeof(int), &int_keymaker, NULL, keys->key_ptrs));
for (int ix= 0; ix < num_rows; ++ix)
{
int data= rand();
queue.push(&data);
}
my_string_ptr_sort((uchar*) &keys->key_ptrs[0],
queue.num_elements(), sizeof(int));
delete keys;
}
}
/*
Test with Bounded_queue size == <limit>.
*/
TEST_F(PerfTestSmall, InsertAndSort)
{
insert_and_sort<limit>();
}
/*
Test with Bounded_queue size == <number of rows>
*/
TEST_F(PerfTestLarge, InsertAndSort)
{
insert_and_sort<limit>();
}
/*
Test without bounded queue, i.e. insert keys into array, and sort it.
*/
TEST_F(PerfTestLarge, WithoutQueue)
{
for (int it= 0; it < num_iterations; ++it)
{
Container *keys= new Container;
srand(0);
for (int ix= 0; ix < limit; ++ix)
{
int data= rand();
keys->key_data[ix]= data;
}
my_string_ptr_sort((uchar*) &keys->key_ptrs[0], limit, sizeof(int));
delete keys;
}
}
/*
Computes the overhead of setting up sort arrays, and rand() calls.
*/
TEST_F(PerfTestLarge, NoSorting)
{
for (int it= 0; it < num_iterations; ++it)
{
Container *keys= new Container;
srand(0);
for (int ix= 0; ix < limit; ++ix)
{
int data= rand();
keys->key_data[ix]= data;
}
delete keys;
}
}
} // namespace | {
"perplexity_score": 3458.8,
"pile_set_name": "Github"
} |
Like many stereotypical tech reporters, I exercise after a sedentary day by giving my fingers a good console controller work out and don’t pay much attention to sports. But after several people insisted this video is a must-watch, I must confess that I’ve changed my tune and am happy to support my country’s track and field athletes.
Here is Australian hurdler Michelle Jenneke and her unique — and suddenly viral — warm-up process. I’ll let the video do the rest of the talking.
Michelle Jenneke from Losse Veter on Vimeo.
Via Cosby Sweaters.
Read next: World's first Android Jelly Bean carrier rollout halted due to emergency call problem | {
"perplexity_score": 718.2,
"pile_set_name": "OpenWebText2"
} |
A private plane caught fire when it made an emergency landing at Istanbul’s Ataturk International Airport Thursday. Four people were injured.
Three crew members, two pilots and a flight attendant, and one passenger were injured Dogan news agency reports.
Atatürk havaalaninda uçak kazası uçak ikiye ayrıldı alev alev yanıyordu. pic.twitter.com/PdJMHnb7qU — 🕋 (@mstfyildirim1) September 21, 2017
The Cyprus-bound private jet crashed soon after taking off, Milliyet reports. All air traffic to and from Ataturk was halted but has since been resumed, AP reports.
Extensive delays at Istanbul-IST following the crash of a private jet on landing. https://t.co/fP90CKhojJpic.twitter.com/mzNhggnyLd — Flightradar24 (@flightradar24) September 21, 2017
Airlive reports the plane tried to return to the airport when a failure alarm was triggered. The tire exploded during the landing.
Firefighters were waiting on the runway once the pilots raised the alarm. They fought to extinguish the fire, which has since been brought under control.
Flight Radar reports the aircraft was a Cessna 650 Citation 7, with the registration TC-KON. The plane was operated by Koçoğlu Aviation belonging to EuroAir, Dogan reports.
At this stage it isn’t clear what caused the plane’s alarm to be triggered. | {
"perplexity_score": 736.7,
"pile_set_name": "OpenWebText2"
} |
The basis of “American Dream” macroeconomics theory is this: when workers are scarce, wages rise, and the supply of workers increase. This is the way it should work and most of us have been told it does.
But that’s the lie.
In reality, what happens is that workplaces set their payroll budgets months ahead of time, get anchored to a price, and incentivize mid-level managers to find workers at those wages, no matter what. Those mid-level managers exert more and more effort to find worse and worse employees until some other problem reduces demand or increases the supply of workers. Then, next year, because it worked last year, mid-level managers are incentivized to keep payroll level. If it’s a good year and there’s revenue to spend, it gets spent on more staff, not better pay for the same staff.
To understand why this is a problem, you need to understand “Elasticity”-the amount of change a party will endure before changing behavior. You know it best in regards to price: how much can gas go up before you drive less? That decision reflects your price elasticity in regards to gas. If you’re going to buy, in the same amount, no matter the price, you are very elastic. If you start cutting back as soon as gas rises a few cents, you are very inelastic.
I can feel your eyes glazing over as my 4th graders do in group dynamics when I start talking about effective communication, but let me explain how this applies to camp counselors and male staff specifically: There is also wage elasticity, and men are (in general) far less elastic about the jobs they’ll take.
(I’d like to leave the subject of the wage gap to longer and better articles, as much as I can. It is a thing and it is a problem, and this is one of the effects, but I don’t want to get away from my point. Men have more and better choices in the American economy, and that’s wrong. )
Men between 18 and 22 have a lot of options for summer jobs that are less open to women- basically any outdoor labor job, among others. Women are also more likely to take a job despite low pay. Women are also directed towards jobs in childcare, so it’s natural that they are more motivated to find a job in camping.
That motivation makes women more elastic than men- willing to accept more problems, lower pay, harder work, etc, and still take the job. I’m certainly not advocating that men should be paid differently than women in camping. I’m pointing to your struggles to find male counselors as a symptom, a tell-tale about the problem.
Why is it hard to find male counselors?
Because your camp doesn’t pay counselors enough.
You just don’t.
The time has come, with low unemployment and years of no wage growth in camping, that elasticity has stretched to its breaking point. It’s no longer worth it. | {
"perplexity_score": 363.3,
"pile_set_name": "OpenWebText2"
} |
Haemanthus albiflos
Haemanthus albiflos is a particularly desirable and easy to grow garden subject equally at home in deep shade on forest floors, on rocky sea shores exposed to salt spray, in coastal dune forest, on cliff faces in hot river valleys where it clings in large clumps to crevasses in full sun, and in shady places on high altitude inland mountain ranges. It is evergreen and multiplies vegetatively, as well as from seed. The attractive white flowers appear in May in its native habitat and the ripe seeds are carried in equally attractive clusters of scarlet fruit. Most people grow this species in part sun. If the plants get too much sun, they will look chlorotic, although still bloom very nicely (see the photos from the UC Botanical Garden below). This species doesn't appear to require a dry winter rest to bloom.
Photo 1 from Cameron McMaster shows plants growing on the Kat River in the Eastern Cape. Photo 2 from Andrew Harvie shows this species growing on the coastal sand dunes at the mouth of the Kei River in the Eastern Cape.
The photos below show plants in cultivation. Photos 1-3 were taken by Cameron McMaster and photos 4-5 were taken by Byron Amerson showing a 4-week-old seedling sown in early 2009 from seed supplied by Silverhill.
Photos 1-3 from Mary Sue Ittner shows plants grown from seed blooming in three different years in late fall-early winter in Northern California. Photos 4-5 were taken by Nhu Nguyen at the UC Botanical Garden where this plant grows in a very sunny spot. The leaves tend to burn out a bit because of the full sun, but the plants take refuge from the rocks although the leaves don't look beautiful, they bloom marvelously. | {
"perplexity_score": 391.6,
"pile_set_name": "Pile-CC"
} |
Introduction {#Sec1}
============
Tropical cyclones (TCs) are one of the most costly natural hazards impacting on coastal regions across the world^[@CR1]--[@CR3]^ and there is an increasing trend of TC related billion-dollar disasters in the US^[@CR4]^. Over 70% of total tropical cyclone damage in the North Atlantic is caused by major TCs, category 3, 4 or 5 on the Saffir--Simpson scale, which make landfall^[@CR5]^.
In 2017, the North Atlantic hurricane season involved 6 landfalls and is the most costly season to date, with estimates of damage at over \$360bn^[@CR6],[@CR7]^. The season has broken several records. September had the largest Atlantic Accumulated Cyclone Energy (ACE) on record at 175, whilst the season ACE of 226 is the 7th highest. ACE (units, 10^4 ^Kn^2^) is defined as the sum of the maximum sustained surface wind speed squared at six‐hourly intervals for all periods when the TC is at least of tropical storm strength (\>=34 knots)^[@CR8]^. The duration of hurricanes in 2017 was also record-breaking, setting a new September record of 41 hurricane days, principally due to Irma, Jose and Maria, each of which lasted for over 9 days.
The active season which unfolded was not, however, well predicted in the early season forecasts^[@CR9]^. This suggests factors developed later in the season, leading to a higher level of activity than initially predicted. Here we compare the 2017 Atlantic hurricane season to the active seasons of 2005 and 2010 (as indicated in Fig. [1a](#Fig1){ref-type="fig"}). We explore the similarities and differences in the precursors to those seasons, predominantly from an ocean perspective, using a range of observational datasets. The seasons of 2005 and 2010 were chosen for their similarity in activity and intensity to 2017. The 2005 season has the 2nd highest Atlantic ACE on record at 250 with 15 hurricanes (\>=64 knots) and 7 major hurricanes (\>=96 knots). The 2010 season had an ACE of 165, 12 hurricanes (H) and 5 major hurricanes (MH) and was characterised by hurricanes with a significant duration, similar to 2017 (10 H, 6 MH), which formed further east. In addition, these seasons had the highest SSTAs in the MDR, between July and September for the period 1980--2017 (Fig. [1b](#Fig1){ref-type="fig"}).Fig. 1Atlantic tropical cyclone analysis. **a** Observed Atlantic tropical cyclone activity and ACE index from 1980--2017. **b** SSTA and vertical wind shear anomalies in the MDR between July and September for the period 1980--2017 and associated ACE Index (point size and colourbar). **c** Six hourly data from August to September Atlantic tropical cyclone tracks for the years 2005, 2010 and 2017, detailing the SSTA (°C), vertical shear anomaly, and associated wind speed (point size and colourbar)
As hurricanes intensify by extracting energy from the warm ocean surface, the underlying SSTs and ocean thermal structure are critical for their development^[@CR10]^ with local SSTs greater than 26.5 °C usually considered to be a necessary condition for tropical cyclone development, although it can vary slightly by ocean basin. Over 95% of TC in the Atlantic form in waters warmer than 25.7 °C^[@CR11]--[@CR13]^. Favourable (warm) ocean thermal structure in the MDR, together with a low vertical wind shear, and atmospheric low-pressure disturbances such as African Easterly Waves (AEW), are together conducive to intense and sustained hurricane development^[@CR5],[@CR9],[@CR11],[@CR14],[@CR15]^. The size of the Atlantic Warm Pool (AWP), where water is warmer than 28.5 °C, has also been shown to influence the TC track, with more TC genesis further east for a large AWP. Its size also affects the position and strength of the Azores high^[@CR16]^. When a large AWP is present, the Azores high weakens and shifts north eastwards, enabling TCs to track poleward and recurve towards the east.
Observed Atlantic hurricane frequency has been found to correlate with long-term variability of sea surface temperatures particularly as measured by the Atlantic Multi-decadal Variability (AMV) index^[@CR17]--[@CR23]^, which is the North Atlantic area-averaged (0--60°N, 0--80°W) Sea Surface Temperature Anomaly (SSTA). In addition, positive Ocean Heat Content Anomalies (OHCA) have been found to increase the hurricane intensity and track length^[@CR24]--[@CR26]^. Variations in SST are influenced by the heat balance in the mixed layer of the ocean which is governed by air-sea fluxes, together with horizontal advection and vertical advection/mixing processes, and may be written as^[@CR13],[@CR27]^:$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$\frac{{\partial T}}{{\partial t}} = \frac{{Q_{{\mathrm{net}}}}}{{(\rho C_{\mathrm{p}}H)}} + \left( {{\mathbf{U}}_{\mathrm{g}} + {\mathbf{U}}_{{\mathrm{ek}}}} \right) \cdot \nabla {\mathbf{T}} + \frac{{(w_{\mathrm{e}} + w_{{\mathrm{ek}}})(T - T_{\mathrm{b}})}}{H}$$\end{document}$$where *T* is the mixed layer temperature (equivalent to the SST), *Q*~net~ is the net surface heat flux i.e., the sum of the turbulent (sensible and latent) and radiative (solar and longwave) heat fluxes, *ρ* is the density of seawater, *C*~p~ is the specific heat of seawater, *H* is the mixed layer depth, **U**~g~ is the geostrophic current velocity, **U**~ek~ is the Ekman current velocity, *w*~e~ is the vertical entrainment rate, *w*~ek~ is the Ekman pumping velocity and *T*~b~ is the temperature of the water just below the mixed layer. The first term on the right hand side is determined by net surface heat flux, the second by horizontal advection and the third relates to vertical heat exchanges. Our analysis focuses on the respective contributions of surface heat fluxes and ocean circulation to the SST anomalies that can develop prior to hurricane seasons.
As an index of ocean heat transport, and convergence thereof, the observed Atlantic meridional overturning circulation (AMOC) strength at 26°N is used, as measured by the RAPID Array^[@CR28],[@CR29]^. Previous studies^[@CR30]--[@CR33]^ have identified links between ocean advection/AMOC strength and hurricane frequency, and also that the AMOC leads a SSTA dipole in the North Atlantic (with poles at 10--15°N and 45--60°N) that has maximum correlation strength at a 5-month lag^[@CR34]^. Anomalies of the surface net heat flux (SFX) and wind stress curl (WSC) have also been analysed for their impact on SST although they have not previously been identified as precursors to hurricane season strength. A reduction in the WSC in the tropical Atlantic can lead to maximum positive SSTAs around 2 months later^[@CR35]^, while SFX anomalies directly warm or cool the surface layer^[@CR34],[@CR36]--[@CR38]^.
Here we analyse SSTA alongside OHCA (using GODAS ocean re-analysis data^[@CR39]^), and compare these to related indices and data. Our results reveal that the positive SSTAs prior to the 2017 active hurricane season were generated by processes not previously recognised to be important indicators of hurricane season strength. Furthermore, in contrast to other recent strong seasons, in which the SSTAs were evident in March, the anomalously warm ocean surface in 2017 developed later between April and July, making prediction of the Atlantic hurricane season severity even more difficult.
Results {#Sec2}
=======
Atlantic hurricane season activity {#Sec3}
----------------------------------
The time series of Atlantic tropical cyclones from 1980 shows an increase in activity over the period (Fig. [1a](#Fig1){ref-type="fig"}). The number of landfalls has fluctuated with 6 or more recorded in 1985, 1996, 2005, 2008, 2010 and 2017. To better understand hurricane season activity, Fig. [1b](#Fig1){ref-type="fig"} highlights the ACE index for the years 1980--2017 and the associated SSTA and vertical wind shear anomaly in the MDR. Active seasons occur when there is a positive SSTA and a negative shear anomaly (i.e., weaker than average vertical wind shear) in the MDR (40% of years considered). Less active seasons occur when there is a negative SSTA and positive shear anomaly (43%) and when there is a positive SSTA and positive shear anomaly (14%). The seasonally averaged negative shear anomaly is greater in 2005 and 2010 compared to 2017. In both 2005 and 2010, negative anomalies persisted throughout the season, whereas in 2017 negative shear anomalies developed later in August and September. Previous work has linked ENSO variability / La Niña conditions with negative shear anomalies^[@CR40]--[@CR43]^, SSTA^[@CR44]--[@CR46]^ and a potential relationship between shear and SSTA^[@CR47]^. We note that in 2005, 2010 and 2017 La Niña persisted during August and September. There is also a significant correlation between SSTA and shear anomaly of --0.58 (*p* \< 0.01) indicating that positive (negative) SSTA are often associated with negative (positive) shear anomalies.
To composite the disparate influences on individual TC tracks (as opposed to season activity), Fig. [1c](#Fig1){ref-type="fig"} highlights conditions at 6 hourly intervals along the TC tracks for August and September of 2005, 2010 and 2017, incorporating SSTA, vertical shear anomaly and wind speed along the track. Again, the most favourable conditions for TCs are positive SSTAs and a negative vertical shear anomaly as the majority of the 6 hourly values fall within the corresponding quadrant of Fig. [1c](#Fig1){ref-type="fig"}. A substantial number of values coincide with positive SSTAs and low positive vertical shear anomalies. Far less favourable for TC tracks are negative SSTAs and even when the wind shear anomalies are clearly negative we only find few hurricane track points in the corresponding quadrant. The relationships between SSTA and vertical shear, and number of tropical cyclones are significant, with correlations of 0.75 (*p* \< 0.01) with SSTA and −0.67 (*p* \< 0.01) with vertical shear between July and September, for the period 1980--2017. Figure [1c](#Fig1){ref-type="fig"} also highlights that wind speeds over 100 knots are only observed when there are positive SSTAs present and usually a negative vertical shear anomaly, indicating that both positive SSTA and weak vertical shear are critical to the full intensification of hurricanes. Previous studies have shown that 70% of major storms in the North Atlantic undergo rapid intensification^[@CR48]^ and the interplay between SSTA and vertical shear in such intensification remains a matter for further research.
Of interest is the comparison between Fig. [1b and c](#Fig1){ref-type="fig"}, where the latter indicates TC tracks can exist where there are low positive values of vertical wind shear anomaly. The average vertical shear in the MDR in August and September is 6.14 ms^−1^ (for the period 1948--2017). Wind shear magnitudes of less than 10 ms^−1^ are generally considered favourable for TC genesis^[@CR9],[@CR14],[@CR49]^; accordingly, positive shear anomaly values up to 4 ms^−1^ are still likely to be conducive to TC development, consistent with a significant number of tracks observed in the top right quadrant (Fig. [1c](#Fig1){ref-type="fig"}).
Figure [2](#Fig2){ref-type="fig"} shows SSTA overlaid with sea level pressure (SLP) and tropical cyclone tracks for 2005, 2010 and 2017. Positive SSTA in the MDR is evident in each year, although strongest in 2010. The 2005 season featured hurricane activity in all months, whereas in 2010 and 2017, September was the most active month. The 2010 and 2017 seasons were characterized by large SST anomalies, persisting across the MDR from 10--20°N and 15--90°W, from July to September. Accordingly, some tropical cyclone (TC) genesis was located further east than is usual in both years, and as far east as 20°W, in contrast to 2005. In 2005, the largest SSTAs were further west at 40°W. In 2005 and 2010, positive temperature anomalies persisted to a depth of over 250 m during the season, whereas in 2017 the anomalies were generally only to a depth of 100 m between 10 and 60°W, although a positive anomaly to a depth of 250 m did exist during September 2017 between 60 and 80°W (Supplementary Fig. [1](#MOESM1){ref-type="media"}).Fig. 2Atlantic tropical cyclone tracks during July, August, September and October for 2005, 2010 and 2017. Tropical cyclone tracks (black) and observed SSTA (colour, °C) overlaid with SLP (contours, mb)
TC tracks are influenced by both SLP and SSTA. The positive SSTA across the MDR enabled an eastward shift in the genesis location in 2010 and 2017. In 2010, the Azores high was weaker and located further northeast in the Atlantic (especially in August), related to the large AWP^[@CR16]^, resulting in a lower pressure anomaly off the east coast of America (Supplementary Fig. [2](#MOESM1){ref-type="media"}) and enabling TC tracks to curve northwards. Accordingly, there were no US landfalls despite a very active season, and the 6 tracks which did make landfall in central America predominantly originated in the Gulf of Mexico or Caribbean Sea. In 2005 and September 2017, the lower pressure anomaly off the east coast of America during July to September also existed, but not to the same extent as 2010. TC tracks did curve northwards but there were 9 and 6 landfalls in the respective years.
Ocean and heat flux time series {#Sec4}
-------------------------------
Turning to the ocean variables and to highlight the connection between SSTAs, air-sea fluxes and the ocean circulation we focus on the period from 2000 to 2017 (Fig. [3b--d](#Fig3){ref-type="fig"}). Ocean temperature variability is characterised by SSTAs and OHCA105 (temperature anomalies averaged over the top 105 m). The impact of air-sea fluxes on SSTA and OHCA105 is dominated by latent heat fluxes (LHFX). To understand the timing of the development of SSTAs in different parts of the MDR, LHFX anomalies (LHFXA) are either averaged over the entire MDR (Fig. [3b](#Fig3){ref-type="fig"}), the southern part of the MDR (10--15°N, 40--60°W) or the north-eastern (NE) MDR (15--21°N, 24--36°W) (Fig. [3c](#Fig3){ref-type="fig"}). The location of each region is shown in Fig. [3a](#Fig3){ref-type="fig"}. The north-eastern and southern regions of the MDR were chosen because the air-sea fluxes reached a maximum in these areas in 2017 during April and May--August, respectively. The Meridional Overturning Circulation (MOC) is the main contributor to ocean heat transport in the North Atlantic and here we use observations of the MOC and of its Ekman component at 26°N for the period from 2004 to 2017 (Fig. [3d](#Fig3){ref-type="fig"}).Fig. 3Atlantic time series and map outlining the study region. **a** SST September 2017: green box: MDR region 10--20°N and 20--80°W, black box: southern MDR region 10--15°N and 40--60°W, blue box: north-eastern (NE) MDR 15--21°N, 24--36°W. **b**--**d** Observed Atlantic time series: **b** monthly SSTA, OHCA105m and LHFXA in the MDR; **c** monthly latent heat flux anomalies (LHFXA) in the southern MDR and NE MDR smoothed over 3 months; and **d** MOC and Ekman Transports 12-hourly data smoothed over 61 days by applying a low pass filter
SSTA and OHCA105m are closely aligned (Fig. [3b](#Fig3){ref-type="fig"}), although the strength of the anomaly is greater at the surface. Clear peaks in SSTA and OHCA105m are seen in 2005 and 2010, and also positive anomalies have been seen since 2015. LHFXA in the MDR (green line) is significantly correlated with SSTA and OHCA105m; correlation coefficients are respectively 0.52 and 0.38, both significant at the 0.01 level (*p* \< 0.01). The LHFXA variability is analysed further in Fig. [3c](#Fig3){ref-type="fig"} for the two areas (southern MDR and NE MDR) that experienced the strongest anomalies in 2017. The most extreme latent heat flux anomaly values occurred in 2017, with latent heat loss weaker by 33 Wm^--2^ sustained from May to August in the southern MDR region and weakening of over 60 Wm^−2^ in the NE MDR during April (unsmoothed data). In 2005 and 2010, the LHFXA values in the southern MDR region were noticeably smaller in magnitude (May--Aug mean: 7 Wm^−2^ in 2005; 13 Wm^−2^ in 2010).
A more detailed analysis of the April and May--Aug net surface heat flux anomalies (SFXA) for the MDRs from 1980 to 2017 is shown in Supplementary Fig. [3](#MOESM1){ref-type="media"}. In the NE MDR, the 2017 April SFXA of 93 Wm^−2^ was 3.4 standard deviations (SD) from the mean. In, the southern MDR, the 2017 May--August SFXA was 45 Wm^−2^, 2.5 SD from the mean. For each MDR, the 2017 SFXA was the most extreme in the period considered. Furthermore, for the NE MDR the April 2017 SFXA was nearly twice that for the next largest anomaly (55 Wm^−2^ in 2014) further emphasising the particularly unusual conditions prior to the 2017 season.
MOC values (Fig. [3d](#Fig3){ref-type="fig"}) are significantly below the seasonal mean values in February/March 2005 and 2010 at 11/13 Sv (1 Sv = 10^6 ^m^3^s^--1^) and 9/10 Sv, respectively. Average values for February and March are 15 Sv. Above average values are observed in February 2017 at 17 Sv (the latest available MOC data). Ekman transports are also below average in Feb/Mar 2005 and 2010 but are close to average in Feb/March 2017 and for the remainder of 2017. The February/ March values are important as Fig. [3b, d](#Fig3){ref-type="fig"} indicate that the observed MOC transport co-varies with the observed SSTA and OHCA105m in the MDR over the period from 2004 to 2017. The correlation between them is −0.35 for MOC-SSTA and −0.27 for MOC-OHCA105, when the MOC leads by 5 months, which is statistically significant at the 0.01 level (*p* \< 0.01). This is in line with the results of Duchez et al.^[@CR34]^ who found the strongest correlation between the SSTA and MOC occurred when the MOC leads by 5 months. In addition, Supplementary Fig. [4](#MOESM1){ref-type="media"} shows how the MOC transport anomaly in February and March co-varies statistically with SSTA and OHCA105m in July, August and September. Correlations over 0.5 are statistically significant at the 0.05 level (*p* \< 0.05). Anti-correlations over 0.6 are seen over large areas of the MDR between 10--20°N and 30--70°W during July--September. Importantly, the correlations are higher for OHCA105m than SSTA, highlighting that the variability of the MOC transport at 26°N influences the upper ocean layer in the MDR, which is of consequence for hurricane intensification as it potentially provides a significant heat source extending over the top 100 m of the ocean to power hurricane development.
Hurricane season precursors in 2005, 2010 and 2017 {#Sec5}
--------------------------------------------------
Figure [4a](#Fig4){ref-type="fig"} shows the 2017 March--August monthly surface heat flux anomalies (SFXA) overlaid with the surface wind anomaly. In April, a strong positive SFXA of 100--150 Wm^−2^ developed (i.e., 300--350 Wm^−2^ heat gain compared to the climatological mean of typically about 200 Wm^−2^) with a maximum at over 150 Wm^−2^ between 24--36°W and 16--18°N. This is associated with a reduction in the strength of the north easterly (NE) trade winds (30°W, 18--27°N) revealed by the wind vector anomalies. The weaker NE winds meant there was less cold, dry air over the region. As a consequence, the humidity gradient (between the sea surface and the overlying air) was lower than normal, and so the associated latent heat loss was reduced. In addition, the more humid air over the region enabled an increase in the downwards LongWave Radiative (LWR) flux. Anomalies in these two flux components largely account for the positive SFXA seen. Additionally, April 2017 is also characterised by a negative wind stress curl anomaly (WSCA) in the region associated with the anomalous winds (Fig. [4b](#Fig4){ref-type="fig"}). This results in a downward anomaly in Ekman pumping effectively reducing the upwelling of cold water at the eastern boundary and further assisting development of the positive SSTAs. Similarly, weaker than average NE/E winds persisted in June, July and August between 40--60°W, 9--15°N, along the southern boundary of the MDR. Again, the latent heat loss was lower and the LWR flux into the ocean was higher, largely explaining the positive SFXA and associated positive SSTA and OHCA in the southern MDR at this time.Fig. 4Atlantic Surface Heat Flux Anomalies (the sum of the net shortwave, net longwave, latent and sensible heat fluxes) during the build-up and early stages of the 2017 hurricane season. **a** Observed monthly surface heat flux anomaly from March to August 2017 (Wm^−2^) overlaid with the 1000 mb wind anomaly, red colours indicate stronger heat gain than normal. Blue box indicates the eastern Atlantic region. Black box indicates the southern MDR region. **b** Observed Atlantic surface heat flux anomaly in April 2017 (Wm^--2^) overlaid with the wind stress curl anomaly (WSCA). White contours indicate a negative WSCA (anomalous downwelling), grey contours indicate a positive or zero WSCA (anomalous upwelling). Contour units are 10^−8^ Nm^−3^
The extent to which the 2017 SFXA generated the observed SSTA, and how this compares to 2005 and 2010, is also explored (Fig. [5](#Fig5){ref-type="fig"}). In 2005 and 2010, positive SSTAs already existed in the MDR in March (Fig. [5a, b](#Fig5){ref-type="fig"}). The patterns of these SSTAs are consistent with those related to the below-average MOC and Ekman transport in February and March generating the dipole SSTA pattern observed, with negative anomalies in the northern part of the Atlantic and positive anomalies in the south^[@CR32],[@CR34],[@CR50]^. In 2017, in contrast, the MOC and Ekman transport was close to the 2004--16 mean, and SSTs were close to average (Fig. [5c](#Fig5){ref-type="fig"}). The SFXA forcing over April--July generates the SSTAs shown in Fig. [5d--f](#Fig5){ref-type="fig"}. In the MDR vicinity, SFXA-generated SSTAs are most substantial in 2017 (Fig. [5f](#Fig5){ref-type="fig"}), concentrated in the southern area of the MDR between 9--15°N and 30--60°W with a maximum around 1.4 °C.Fig. 5Surface Flux generated Temperature Anomaly April--July for 2005, 2010 and 2017. Initial condition---SSTA March (**a**--**c**). Estimated temperature anomaly April--July based on anomalous surface fluxes (**d**--**f**). Estimated SSTA in August formed by summing the initial condition and April--July surface flux generated temperature anomaly (**g**--**i**). Observed SSTA in August (**j**--**l**). Estimated minus observed August SSTA (**m**--**o**). Black box indicates MDR region. Colourbar units °C
Adding SFXA-generated temperature anomalies to the initial March SSTA patterns, we obtain estimates of the August SSTAs (Fig. [5g--i](#Fig5){ref-type="fig"}). When comparing the estimated to the observed SSTAs in August (Fig. [5j--l](#Fig5){ref-type="fig"}), the spatial SSTA patterns and sign in the MDR look similar, however the amplitude in 2005 and 2010 is higher than observed. Discrepancies (Fig. [5m−o](#Fig5){ref-type="fig"}) between surface flux based estimates and observations, can be attributed to the ocean circulation (advection) and mixing. The MOC recovered from its below-average strength in February and March during both 2005 and 2010 (Fig. [3d](#Fig3){ref-type="fig"}). This stronger MOC means that in spring and early summer more heat was transported northwards by the ocean, partly compensating for the MDR temperature changes linked to SFXA and assisting the development of average SST conditions in the north, whilst reducing the amplitude of the positive SSTAs in the south, seen during August in these years. Hence, the observed August SSTA in 2005 and 2010 are weaker than those estimated from surface heat flux alone. In 2017, the weaker NE/E trade winds observed from June to August in the MDR will have reduced the northward Ekman transport into the region. As less heat was transported north during those months it is likely to have led to the lower observed SSTA in August than predicted from surface fluxes alone. Additionally, along the eastern boundary between 9--18°N the weaker trade winds will have led to a reduced upwelling and the warmer observed SSTA in the area. From these results, we conclude that in 2005 and 2010, the initial ocean condition in March (MOC-related) was the main influence on SSTAs in August (Fig. [5j--l](#Fig5){ref-type="fig"}), whereas in 2017, the SFXAs that developed from April to July were the dominant factor. These results are not specific to the GODAS ocean temperature reanalysis dataset used here and we found similar results with NCEP SST data (Supplementary Fig. 5).
Our analysis of a range of observations reveals the important role that surface heat fluxes played in positive SSTA development in the MDR in 2017, which was critical for subsequent hurricane activity in September. Figure [6](#Fig6){ref-type="fig"} summarizes the mechanisms which were important during the season.Fig. 6Schematic of the mechanisms which contributed to the positive SSTA in the MDR, and an active hurricane season, in 2017. Orange arrows are the heat exchange anomalies. White arrows show the wind driven anomalies forcing the ocean. The green arrows show the wind driven Ekman transport anomaly response. The blue line indicates the notional surface temperature with suppressed upwelling (solid line) and without suppressed upwelling (dashed line)
The reduction in the NE trade winds between April and July enabled positive latent heat flux and LWR anomalies to develop. The negative wind stress curl generated downward Ekman pumping anomalies, suppressing the upwelling at the eastern boundary. These factors generated positive SSTAs. The reduction in the NE trade winds also reduced the Ekman transport of warm water into the MDR region, explaining why SFXA-predicted temperature anomalies are higher than observed, by August. Reduced vertical wind shear was also evident in late August and September, which together with the positive SSTAs, played a key role in the active hurricane season of 2017. In contrast, in 2005 and 2010, it was the reduced AMOC in February-March of those years which was the predominant cause of the positive SSTA in the MDR, which again combined with a weak vertical shear to favour very active hurricane seasons. These findings reveal for the first time that different precursors can generate positive SSTA in the MDR region, conducive to an active hurricane season. In 2017, surface fluxes were the dominant factor, whereas in 2005 and 2010 the AMOC played a key role.
In terms of hurricane prediction, the 2017 season was more difficult to forecast, as the surface flux anomalies developed between April and July shortly before the main season (August--September). For the other strong hurricane years considered, the reduction in the MOC / Ekman transport occurred earlier in February--March potentially enabling a longer lead time forecast given a sufficient observing system in place and noting also the importance of atmospheric conditions (vertical wind shear). In conclusion, our results have revealed that drivers of recent active hurricane seasons involving the ocean can take two forms: late winter changes in the ocean circulation and late spring/early summer changes in the air-sea heat flux. Developing forecast systems that adequately represent these processes will potentially aid preparedness and mitigation for the financial and societal consequences of hurricanes.
Methods {#Sec6}
=======
Hurricanes and ocean properties {#Sec7}
-------------------------------
The observed Atlantic tropical cyclone and hurricane track data for the years 1980--2016 were obtained from HURDAT2, the revised Atlantic hurricane database^[@CR51]^. Hurricane track data for 2017 was obtained from Unisys Weather (<http://weather.unisys.com/hurricanes/>). The NCEP Global Ocean Data Assimilation System^[@CR39]^ (GODAS) was used for the ocean temperatures at the surface and depth. All anomalies were based on the reference period 1980 to 2017 unless stated otherwise. The ocean heat content anomalies are based on the average temperature anomaly over the depth indicated. The observed AMOC strength and Ekman transport at 26°N, for the period 2004--2017, were obtained from the RAPID MOC monitoring project^[@CR52],[@CR53]^.
Surface meteorology and air-sea exchanges {#Sec8}
-----------------------------------------
The NCEP/NCAR reanalysis^[@CR54]^ was employed for sea level pressure (SLP), wind speeds and the air-sea heat flux. Wind speeds and associated anomalies were determined from the 1000 mb zonal and meridional components. The absolute vertical wind shear was calculated as the absolute difference between the 250-mb and 850-mb zonal wind using the reference period 1948 to 2017. The net surface heat flux (SFX) was determined as the sum of the net shortwave (*Q*~sw~), net longwave (*Q*~lw~), latent (*Q*~lat~) and sensible (*Q*~sen~) heat fluxes.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$${\mathrm{SFX}} = Q_{{\mathrm{sw}}} + Q_{{\mathrm{lw}}} + Q_{{\mathrm{lat}}} + Q_{{\mathrm{sen}}}$$\end{document}$$The estimated ocean temperature anomalies (Δ*T*) used in Fig. [5b](#Fig5){ref-type="fig"} and c are based on the surface flux anomalies (SFXA) and calculated as follows:$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$\Delta T\left( {x,y,t} \right) = \Delta T\left( {x,y,t_0} \right) + \frac{1}{{\rho DC_{\mathrm{p}}}}\mathop {\int }\nolimits_{\hskip -5pt t_0}^t {\mathrm{SFXA}}\left( {x,y,t} \right){\mathrm{d}}t$$\end{document}$$where *D* = mixed layer depth (100 m), *ρ* = density (1025 kg m^−3^), *C*~p~ = specific heat capacity 4182 JK^−1^ kg^−1^, *t*~0~: April, *t*: July. A mixed layer depth of 100 m was chosen for consistency with the findings of Cayan^[@CR38]^, who showed the MLD in the North Atlantic to be between 150 m and 75 m between April and July. The spatial temperature pattern does not vary with depth chosen. A more detailed calculation would require a spatially and temporally varying MLD but the aim here is to show the magnitude of the heat flux related signal in line with the approach adopted by Duchez et al.^[@CR55]^ The wind stress curl was calculated from NCEP/NCAR reanalysis^[@CR54]^ monthly surface wind stress.
Supplementary information
=========================
{#Sec9}
Supplementary Information Peer Review File
**Journal peer review information:** *Nature Communications* thanks the anonymous reviewers for their contribution to the peer review of this work. Peer reviewer reports are available.
**Publisher's note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Electronic supplementary material
=================================
**Supplementary Information** accompanies this paper at 10.1038/s41467-019-08496-4.
This work was supported by the Natural Environmental Research Council (NERC) \[grant number NE/L002531/1\], NERC projects DYNAMOC \[NE/M005097/1\] and ODYSEA (NE/M006107/1) and by the NERC programmes North Atlantic Climate System: Integrated Study (ACSIS) \[NE/N018044/1\], the RAPID-AMOC Climate Change (RAPID) programme, the European Union Horizon 2020 research and innovation programme BLUE-ACTION (Grant No. 727852). P.H. was supported by the Joint UK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101).
S.H. led the development of the study, carried out the analysis and was lead writer of the paper. All authors contributed to the evolution of the analysis and to the writing of the paper.
Hurdat2: <https://www.nhc.noaa.gov/data/hurdat/>; Hurricane track data 2017: <http://weather.unisys.com/hurricanes/>; GODAS: <http://www.cpc.ncep.noaa.gov/products/GODAS/>; AMOC and Ekman Transport data: <http://www.rapid.ac.uk/rapidmoc>; Sea Level Pressure and wind component data: <https://www.esrl.noaa.gov/psd/data/gridded/data.ncep.reanalysis.html>; Surface Flux data: <https://www.esrl.noaa.gov/psd/data/gridded/data.ncep.reanalysis.surfaceflux.html>.
Competing interests {#FPar1}
===================
The authors declare no competing interests. | {
"perplexity_score": 650.6,
"pile_set_name": "PubMed Central"
} |
Video-assisted thoracoscopic surgery.
Video-assisted thoracoscopic surgery is finding an ever-increasing role in the diagnosis and treatment of a wide range of thoracic disorders that previously required sternotomy or open thoracotomy. The potential advantages of video-assisted thoracoscopic surgery include less postoperative pain, fewer operative complications, shortened hospital stay and reduced costs. The following review examines the surgical and anesthetic considerations of video-assisted thoracoscopic surgery, with an emphasis on recently published articles. | {
"perplexity_score": 108.2,
"pile_set_name": "PubMed Abstracts"
} |
Frames of reference for self-evaluation of ability in mathematics.
Measures of eight frame-specific self-evaluations of ability in mathematics were used to predict general mathematics self-concept and self-efficacy. Participants were 900 Norwegian students in Grade 6 (n = 277), Grade 9 (n = 236), Grade 11 (n = 263), and adult students attending senior high school (n = 124). Four items measured frame-specific self-evaluation of achievement based on external frames of reference whereas four items measured frame-specific self-evaluation based on internal frames of reference. Regression analyses were used to test relations between the frame-specific self-evaluations and general mathematics self-concept and self-efficacy. The analyses indicated that self-evaluation based on comparison with other students in class (an external frame of reference) and on comparison of mathematics achievement with achievement in other school subjects (an internal frame of reference) were robust predictors of both mathematics self-concept and self-efficacy. The analyses also indicated that students are using multiple frames of reference when evaluating their mathematics ability. Implications of the result for the internal-external frame of reference model are discussed. | {
"perplexity_score": 257.8,
"pile_set_name": "PubMed Abstracts"
} |
The present invention relates to an improved method for cutting, and more particularly to the production of structures by laser cutting layers, or members of film or thin film structures.
Many different structures often require the use of a laser to cut through a membrane, layer, or film, to form a desired formation. One example field that requires the precision and other features of a laser for cutting and forming these formations is the field of microelectromechanical or microelectronic devices. Such devices often require cutting and transporting a delicate thin film structure from a source substrate to a new position on a target substrate. As such, a number of different procedures have been developed for cutting and transporting the thin film formations. For example, low tack adhesives or methods utilizing electrostatic forces have been developed to enable the formation and transportation of the thin film formations.
One known method for machining and attaching a thin film formation is taught in U.S. Pat. No. 6,210,514 to Cheung et al., which is incorporated herein by reference. The process of separating a thin film formation from the layer from which it has been cut, or from an adhesive transportation layer, can often deform, alter, stress, or destroy the thin film structure undesirably. Defects ranging from slight deformation or improper positioning, to major tears or structural deficiencies, can ultimately lead to the failure of the microelectromechanical device into which the thin film formations are placed.
The method of machining an attachment as described in the ""514 patent can be summarized as follows. A thin film is affixed to a low tack polymeric membrane. While positioned on the polymeric membrane, the thin film is machined to define a thin film structure. This thin film structure (or array of thin film structures) is then separated from the polymeric membrane in a mostly deformation-free state. In this manner, various target substrates, including glass, silicon, or printed circuit boards, can be equipped with mostly stress-free thin film structures suitable for use in a wide variety of microelectromechanical or microelectronic devices.
However, structures that are cut through the low tack polymeric membrane still have significant stresses induced by edge contamination resulting from the molten polymeric material, as well as from plastic deformations that arise during delamination of the low tack polymeric membrane from the thin film structure. In addition, a collection of dust results when the laser cuts through the low tack polymeric membrane. This laser cutting dust is a source of additional contamination for the thin film and the microelectromechanical device into which the thin film ultimately mounts. The collection of dust on the thin film can have adverse affects on the functionality of the microelectromechanical or microelectronic devices. Further, once the laser cuts the low tack polymeric membrane during the manufacture of the thin film formation, it is not possible to reuse the low tack polymeric membrane to cut additional thin film structures to form like formations. Reusability would promote reduced costs and improved efficiency.
There is a need in the art for an improved laser cutting method and corresponding apparatus, for manufacturing structures such as thin formations that require laser cutting precision. The present invention is directed toward further solutions to address this need.
In accordance with one example embodiment of the present invention, a method of cutting a member with a laser begins with the step of providing the member. A template is then provided, and adhered to the member. The laser then projects through the template, without intersecting with the template, to cut the member and manufacture the desired formation. The laser does not intersect with, and therefore does not cut, the template structure and cause excess laser cutting dust.
A member, according to one aspect of the present invention, can be in the form of a film having multiple layers. One layer can be a metal layer and another layer can be a polymer layer. For example, the metal layer can be formed of aluminum and the polymer layer can be formed of polyester.
According to another aspect of the present invention, the step of adhering the member to the template can include removably attaching the template having low tack properties to a surface of the member through compression.
According to still another aspect of the present invention, the step of projecting the laser through the template includes directing the laser to pass through the template, without cutting the template, to cut through the member in a pattern corresponding to the template.
In accordance with one embodiment of the present invention, the method further includes the step of transferring the member formations to a removed location. The invention can further include the step of removing the template from the member in a manner such that the template is reusable.
In accordance with still another embodiment of the present invention, a method of cutting a member with a laser is provided. The method includes providing the member, a template, and a base. The member is sandwiched between the base and the template. A laser then projects through the template, without intersecting the template, to cut the member and form one or more member formations.
In accordance with still another embodiment of the present invention, an assemblage includes a member and a template removably adhering to the member. The template is suitable for accommodating a laser in cutting the member.
According to one aspect of the present invention, the member is a film. The film can be formed of multiple layers, such as a metal layer and a polymer layer. The metal layer can be aluminum and the polymer layer can be polyester.
According to another aspect of the present invention, the template can include a layer having a predefined cut out section suitable for accommodating the cutting of the member by the laser.
According to still another aspect of the present invention, the template can have low tack properties and be removably attached to a surface of the member through compression. The template can further be reusable after being removed from the member. | {
"perplexity_score": 309,
"pile_set_name": "USPTO Backgrounds"
} |
Eleven dedicated educators who have been quietly changing the lives of city school kids for the better took center stage on Wednesday at the Daily News Hometown Heroes in Education awards.
Mayor de Blasio joined local luminaries and top education leaders for an emotional ceremony at the Edison Ballroom in Times Square and presented a special posthumous award to the daughter of Kevin O’Connor, the beloved 61-year-old Queens social studies teacher and dean who passed away in April.
“This kind of gathering puts things in a proper perspective and help us focus on what really matters,” de Blasio said. “We're going to take every opportunity to celebrate our educators and I'm so happy we're doing that today.”
The winners of the fourth annual awards included a big-hearted Brooklyn principal who makes sure homeless students and their families have everything they need to succeed in school, a Bronx teacher dedicated to improving communication between parents and teachers and a Queens school nurse who also teaches kids about good nutrition.
Stars from the world of music and television journalism shared the winners' inspirational stories and presented the awards, including hip-hop pioneer DMC and DJ Funkmaster Flex, and local news heavyweights Mary Calvi, David Ushery and Brenda Blackmon.
The educators were presented with Hometown Heroes in Education awards on Wednesday.
“To think about the tens of thousands of lives being shaped, guided and inspired every day in our city's schools is amazing,” said Daily News Editor-in-Chief Jim Rich. “Our educators are the most unsung heroes we have. Today's event is a well-deserved way of honoring them.”
The city’s public school system is the largest in the nation with 1.1 million students, over 76,000 teachers and 1,800 schools.
The News received more than 200 nominations from colleagues, students and others who wanted to recognize the hard work of teachers, principals and other school staffers.
A panel of judges comprised of education experts and parent advocates selected the winners in August.
Kevin O'Connor
Schools Chancellor Carmen Fariña, CUNY Chancellor James Milliken and United Federation of Teachers President Michael Mulgrew served as judges and presenters at the ceremony, emphasizing the importance of recognizing top-notch educators.
“What binds us together as educators is that we know we make a difference,” said Fariña, a 50-year veteran of city schools.
“The difference you make, you will sometimes never know,” she added. “It's not the award you get today— it's the fact that because of you, someone's life is transformed.”
Delfina Cheung and DMC.
“How do they show up every September with the enthusiasm they had their first September on the job? That to me is remarkable,” Kiernan said. “They're thinking, 'I've got another fresh class in here and this is a class that once again I'm going to make a difference in their world.' And they're special people because of that.”
The winners of the fourth annual awards included Tammy Katan-Brown, a big-hearted Brooklyn principal who makes sure homeless students and their families have everything they need to succeed in school; Adrian Brooks, a Bronx teacher dedicated to improving communication between parents and teachers; and Sherry Branch, a Queens school nurse who also teaches kids about good nutrition.
O’Connor, a veteran educator, worked at Francis Lewis High School in Fresh Meadows and Campus Magnet High School in Cambria Heights. He was popular for his ability to connect with his students.
His daughter, Kristen Rajak, travelled from Florida for the awards ceremony.
She said she plans to follow in her father’s footsteps and pursue a career in education.
“I can’t even really describe how proud I am of him,” Rajak said after accepting the honor for her father. “I knew that he was special. But this really solidified it that people recognize that and made note of it.” | {
"perplexity_score": 302.5,
"pile_set_name": "Pile-CC"
} |
NFL mock drafts generally stay away from mocking in trades. People will try and mix them in, but it is usually not a regular thing. We don't know exactly who is willing to move where, so it ends up being guess-work, at best. That being said, it still provides some interesting discussion fodder.
Recently, @TrentaSaru on Twitter passed along this 2014 NFL mock draft from NFL Draft Insiders. It's a lesser known site, but as we've seen with the major sites, the more renowned you are, the crazier the mock can sometimes seem. Our NN Mock Draft Database features some lesser known sites, but is mostly more well known folks. I figured for today, I'd take a look at this under the radar site.
They decided to mock in some trades, including one involving the 49ers. Trent has the 49ers trading up with the New York Jets at No. 18. If that sounds familiar, it's because the 49ers also moved up to No. 18 last year, packaging in their third round pick to climb from No. 30 and draft Eric Reid. Trent has them moving up to No. 18 this year to boost the secondary again, drafting cornerback Justin Gilbert:
The 49ers lost Tarell Brown to the team across the bay and released Carlos Rogers to save money. Needless to say they are lacking at CB. And Gilbert has the size, speed and covering ability to be a staple in their secondary for years to come.
The 49ers are in a unique situation with their roster. One could argue they could go into the 2014 season with the roster as is, and potentially compete for a championship. That's not to say the roster is perfect, but they have enough talent to do some big things. That means they can use the draft to add depth, and find guys who can be long-term contributors.
If they drafted Gilbert, he would move right into a position of competition. The 49ers starting cornerbacks right now are Tramaine Brock and Chris Culliver. Eric Wright, Chris Cook, Perrish Cox, Darryl Morris and Dax Swanson are all competing behind them. Wright and Cox would seemingly lead in the battle for the nickel slot, but that's merely because they have the experience with the team. Morris and Cook will compete as well, but the addition of a guy like Gilbert, or any of the other top corners in this draft, opens the door for extensive third DB competition.
As for the trade itself, we can't really assess it without knowing what other picks were given up, but we know the 49ers have the ammunition to move almost anywhere they want in the first round. I don't expect a climb to the top few picks, but whether it be the Jets, or another team, I would not be at all surprised to see the 49ers climb into the middle of the first round. And it doesn't necessarily have to be with a team currently in the middle of the first. A team like the Raiders, in need of lots of talent, might trade down once into the teens, and then potentially be open to another trade down with the 49ers. | {
"perplexity_score": 300.4,
"pile_set_name": "OpenWebText2"
} |
Romania Libera Article in English
The following is my translation into English of my Romania Libera article which you can find here. Any mistakes or errors are mine and mine alone. Links inside the article go to older articles of mine explaining various terms and concepts.
He was born in America, the land of possibilities, but for the last 5 years he’s been living in Romania and wants to spend the rest of his life here. Sam R. is so in love with our country that he wrote a guide book for tourists visiting Romania. He learned Romanian by reading newspapers and listening to manele music. Not only that, he considers himself, “More Romanian than Romanians” and declared himself “The King of Romania”.
The first time he and his family moved to another country, he was only 3 days old. He left his birth town of Orlando and lived in Italy, Spain and English. Sam is 37 years old and 11 years ago he knew nothing about Romania besides Nadia Comaneci. In 1999 he met a Romanian (woman), learned a lot about Romania and saw some photographs (of Romania).
A year later he was planning on going on vacation in Spain. At the last moment something happened and he had to switch his plans, spending a week in Bucharest and Cluj.
He recalls his first impressions of Romania, which weren’t that good. “I was very frightened. I landed in Otopeni airport and 50 meters away was an old rusty plane. I didn’t understand why they’d leave such a plane on the tarmac of the country’s biggest airport. Near me was an American who told me, “Watch out, buddy!” When I exited the airport, I was quite nervous. There were lots of dogs, it was dirty, chaotic and very different than how it is today,” says Sam.
That year he learned his first word in Romanian – opt (the number 8). “I didn’t know the language at all. I was on the train to Cluj and someone came by with a tray of coffees. They told me the price but it might as well have been in Chinese. I just opened my wallet and they took out the right money. In fact, I think 8 (lei) might’ve been the price of the coffee,” remembers the American.
How vacations/holidays in Romania make you want to move here
Despite the first negative impressions, the time spent on vacation in Romania was the “vacation of his life” according to him. He liked it so much, he kept coming back here year after year for vacation.
“In 2004, I realized that if I keep coming here so often, I should just go ahead and move here. It was then I decided to move here,” says Sam. “I had no job, I had nothing planned out, I didn’t speak Romanian at all but I felt great. Honestly, I don’t know what I was thinking,” he admits.
He first lived in Timisoara but he didn’t like it too much. Then for three months he lived in a village near Cluj where he has many happy memories. “It was there that I learned Romanian because nobody there spoke English. I was staying at a friend’s house and had nothing to do. Sometimes I’d drink with the two local police officers, who got rip-roaringly drunk to the point where they could barely drive their brand-new ATV,” says the American.
Then he moved to Cluj, where he lives today. He remembers how different the city was in the past than how it is today. “Back then there were just three ATMs (Cash Points) in the entire city and almost nobody used them,” says Sam.
After living for a few months off of his savings, he decided to find a job so he could remain here in Romania. Because he’s not a Romanian citizen and because Romanian salaries are quite low, he decided to work online for the legal system in America.
“I could work at any time I liked, from home, wearing my pajamas. On the other hand it was a job where I felt quite lonely because I had no work colleagues. But I wanted to spend some time in Romania to decide if I truly wanted to live here. That meant learning to speak the language, interacting with people, being able to talk with them and making friends and going out on dates,” relates Sam.
Guide Book for Foreigners in Romania
His entire life changed earlier this year. He was waiting in line at the American Embassy in Bucharest and a (Romanian) employee mistook him for a (real) Romanian. “I was shocked but afterward it made me realize I do know a lot of things about Romania and that I’m one of the few foreigners who has assimilated into the Romanian culture,” said Sam with pride.
“A large number of foreigners come to Romania. Some move here, some are here for work or for travel while some come for a vacation. The moment they arrive here they are quite confused. All of these people keep asking me questions and it always seems like I have the answers. I am the person who knows everything because I’ve gone through it myself and learned through my experiences here,” explains Sam.
In April he decided to make a website to give advice for foreigners and to write a guide book about Romania. Three months later he quit his online job and dedicated himself full-time to writing, both on the website and for the book.
His website is named “King of Romania” (in English) as Sam describes with pleasure. “Everybody is waiting for Vlad “The Impaler” Dracula to come back and he isn’t coming back. Plus the old king isn’t doing anything. Therefore I thought hey somebody needs to step up to the plate,” he says.
“The Complete Insider’s Guide to Romania” is written in English. It has vocabulary, pronunciation and practical advice: how to ask for directions, how to order a glass of water, how to buy a bus ticket and how to order a shawarma sandwich. “This book was also written for Romanians because I realized just how much they enjoy reading about their country from a different perspective,” says Sam.
The book will be for sale in Romania by Christmas and then later in England and Australia. In America it was published on December 1, Romania’s national holiday, which Sam celebrates.
Sam the (Most) Romanian
“I celebrate Romanian holidays. I’m more Romanian than Romanians. Even on Easter although I’m not Romanian Orthodox I went to the church services. Some Romanians stay at home watching Seinfeld re-runs on TV but I respect the traditions,” says Sam. He even has (Romanian) Orthodox icons displayed at home, inherited from when he rented the apartment.
The American does a lot of things in the Romanian style. “I speak Romanian. I wrap sandwiches in a pink napkin and do lots of things you (Romanians) do. People think I’m a Romanian who has learned English.” For example, he doesn’t buy American [food] products. “I eat raw natural honey, I like (bee) pollen, I drink homemade wine and I get pears from the countryside,” explains Sam.
He also likes traditional Romanian foods. The first time he tried salata de vinete he liked it a lot. Now he’s crazy about mamaliga, vegan sarmale and roasted red peppers.
Not only that but he loves going to the piata. “This is the most wonderful thing I’ve ever seen in my life. You go there, you meet the people who actually grew the food, you bargain with them and you get it at an incredible price. One kilogram (2.2 lbs) of apples costs 2 lei (70 cents US) and they’re delicious. Meanwhile in America each apple costs 3 lei (1 US dollar) apiece and tastes horrible and is full of chemicals.”
How Sam learned Romanian
Sam speaks Romanian quite well. Even though we were speaking in English, every two or three sentences he’ll use a Romanian expression. He said it was quite helpful that he spoke Italian and two other similar languages.
“I learned Romanian from friends and neighbors, on the street and on television. I used to watch really crappy Romanian shows but they were quite useful. I bought a dictionary and every day I’d translate an article from the newspaper, writing down the words I didn’t know. Meanwhile I had a big problem. My dictionary was written in the old style and it took me a year and a half to understand the difference between the letter “î” and “â” because nobody ever explained it to me. Not to mention that declinations in Romania were extremely difficult to learn,” relates the American.
Sam also learned Romanian from listening to manele songs. “A lot of Romanian words aren’t in the dictionary, such as naspa and paispe even though everybody uses them. I also learned a few more colorful phrases. I think it’s important to be able to understand everyone: gypsies, manele people, old people with no teeth in their mouth, people speaking different dialects,” he says.
He doesn’t like manele above all else but he thinks that Nicolae Guta has a wonderful voice and, in a sense, he (Guta) is preserving Romanian traditions with his versions of folk songs. “Gypsies have been making money by singing and playing music for hundreds of years because they’re talented,” explains the American.
Sam’s opinion on gypsies is one of a great deal of tolerance and quite different than the view usually held by foreigners. “Gypsies do things in their own way and they’re not going to ever be like other people. I don’t think they need to be formally educated because they don’t want it and they don’t need it. Gypsies are survivors and they’re never going to change even if you try to force them to. They never tell Romanians what to do so why do Romanians try to tell them how to be?”
For and against Romania
“When I think about home, I think about Romania. I don’t live in a fantasy land with my head in the clouds. I don’t say we’re all going to be friends and live happily together forever and ever. What I am saying is that this country is wonderful, which is exactly why I decided to live here,” says Sam.
He likes people in Romania because they’re so friendly and will help you out when you need it. “A few years ago I was in Bucharest for a blind date with a woman I met online and I got turned around and lost. I stopped a group of young people and asked them to help me. They didn’t just tell me where to go and how to get there but actually came along with me to show me the way. We ended up talking and laughing and ended up hanging out all night together at a local bar,” remembers Sam.
Personal relationships are another reason why Sam likes Romanians. “If I go to the corner store that’s 3 minutes away by foot from my house, for sure I’m going to be there 20 minutes just gossiping with the neighbors. One day I went to the store and accidentally left my money at home. The store clerk knew me and told me not to worry about it and just bring the money the next day. That never happens in America,” he says.
What kind of tourism Romanians should practice
Sam believes Romanians need a new image. “When Romania is brought up, people only know about gymnastics, vampires and gypsies. Official tourist campaigns are launched year after year yet tourists still have no idea why they should come and visit Romania. They should abandon futuristic ambitious projects like Dracula Park and focus more on what can be done right now,” argues the American.
A few Romanian suggestions from Sam: “Foreigners can dance in the club until 3 am because Romania has some of the best clubs in Europe. They’ll discover very beautiful people, natural food that’s extremely delicious as well as artisan handicrafts and traditional products. Tourists would be extremely interested in learning how to sew, to carve wood, to drink tuica made at home and to ride in a wooden horse-drawn cart. Rich people would pay a fortune to get a taste of the the old traditional world that you can find here in Romania.”
Great article. I’m honestly happy you found happiness in Romania, and wish we could too.
The reason (most) Romanians don’t see things the same way you do is mostly that we’ve become so jaded by all the bullshit (like an article I saw on TV yesterday – elderly people hoping they’ll be one of the “lucky” 1000 who’ll get a 50 lei/$16 “holiday bonus” from the government, because there are only enough bonuses to give out to 1000 old people in the whole country)
That stuff makes it hard for us to find joy in the little things that make Romania truly special.
But every now and then I’ll be driving through the countryside right after the harvest, pristine golden fields on my left and right and I’ll see a merchant selling home-made honey (with the honeycomb in the jar – dear God it makes it SO much better) and some of the most delicious hand-picked fruits you’ve ever eaten – all for under $5.
Those are the times I remember that Romania is beautiful, and the beauty is just hidden under all the grime, decay and corruption.
Also, we’re led by idiots. 200 million Euros (up to a BILLION, according to some estimates) for a building (Catedrala Mantuirii Neamului), when we could use that money to build one modernly equipped hospital in each County Seat and there are children dying daily in Hospitals because of a lack of medication/test equipment? I’d like to see the combined prayers of the 10,000 pilgrims that can fit in the new church save those children’s lives :( | {
"perplexity_score": 302.8,
"pile_set_name": "Pile-CC"
} |
Pakistan Raids Lashkar e Toiba Camp
Just breaking, Pakistan has raided a Lashkar e Toiba camp, who are believed by most world intelligence agencies to be responsible for the Mumbai terror attacks. This comes just in the wake of Secretary of State Rice stating unequivocably on Wolf Blitzer’s program that there was “No doubt that the attacks were planned in Pakistan.”
ISLAMABAD (Reuters) – Pakistani security forces on Sunday raided a camp used by Lashkar-e-Taiba (LeT), two sources said, in a strike against the militant group blamed by India for last month’s deadly attacks on Mumbai.
Local man Nisar Ali told Reuters the operation began in the afternoon in Shawai on the outskirts of Muzaffarabad, the capital of the Pakistani side of disputed Kashmir region.
“I don’t know details as the entire area was sealed off, but I heard two loud blasts in the evening after a military helicopter landed there,” Ali said.
An official with the Jamaat-ud-Dawa charity, which is linked to LeT, said security forces had taken over the camp.
India has demanded Pakistan take swift action over what it says is the latest anti-India militant attack emanating from Pakistani soil. No comment on the raid was immediately available from Indian officials
Update: According to Syed at Asia Times other Let and JuD offices have been raided. A word of warn about Syed: he will put AQ / Taliban spin and agitprop out, so some of this is factual, some not. [e.g. when he implies that we might drive LeT into AQ arms, we know they are already there and have been allied since at least Sept. 2007.] | {
"perplexity_score": 473.4,
"pile_set_name": "Pile-CC"
} |
Here I Raise My Ebenezer
Here I raise my Ebenezer;Here by Thy great help I’ve come;And I hope, by Thy good pleasure,Safely to arrive at home.
“Come Thou Fount of Every Blessing” by Robert Robinson
Broken people think broken thoughts
Not long ago, I asked if we should stop calling ourselves “broken” and embrace our identity in Christ as “whole” instead. I’ve been mulling over this, as I tend to do. The thing is that I can’t seem to stop feeling broken, but I think I should. I don’t think that Jesus’ sacrifice is most honored when I see my identity as broken, defeated, or lost.
Some days, I wake up with a cloud over my head—and there’s no reason for it. I often meditate on what I should have done differently yesterday, or last week, or ten years ago. Lately, I struggle to stay sweet with my hubby when he’s asking me about my day, but he’s focused on his phone and computer while watching TV…the man’s a multi-tasker.
And I’m anxious. We joke about it here, but it’s for real. Like when my daughter went to a swim party for youth group, the last thing she heard me say as she got out of the car was, “I love you! No running by the pool!!”
Restored people choose good thoughts
I want to stop calling myself broken because I don’t want any permission to keep thinking such broken thoughts. Broken people think broken thoughts and do broken things. Restored people choose good thoughts in order to walk in newness of life. If we don’t allow God to change our thinking, how can we expect to live the abundant life that Jesus offers us (John 10:9-10)?
Don’t copy the behavior and customs of this world, but let God transform you into a new person by changing the way you think. Then you will learn to know God’s will for you, which is good and pleasing and perfect (Romans 12:2, NLT).
I was praying about this recently, and the Lord showed me that I have a great memory with bad habits. I can recall with exceptional detail the ways that people have hurt me—when I’ve been verbally attacked, when I’ve been abandoned, when I’ve been overlooked, and when I’ve been ridiculed. I’ve also got an excellent memory for all the mistakes I’ve made as a mom, the sins I can’t seem to shake, and the conversations that I’ve mismanaged/botched/bungled.
Whenever I have a free minute, I can simply pull up a mental movie montage of all my lowlights. But Scripture teaches:
Finally, brothers and sisters, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable—if anything is excellent or praiseworthy—think about such things. (Phil 4:8, NIV).
I was thinking about what I choose to remember, and it’s clear that this isn’t a biblical practice. I mean, I’ve known for a long time that the meditations of my heart should be acceptable to the Lord (Psalm 19:14)…and that I should think lovely and good thoughts (Philippians 4:8). Yet, I saw something new recently.
Our hearts build altars
and I am building the wrong kind of altar.
In the Old Testament, we see Israel building altars often. Sometimes they built altars to Baal and other idols, but a quick search on Biblegateway, revealed over 30 instances where altars were built to the Lord. People built altars to show thanks, to ask for help, and to commemorate what God had done for them. Sometimes these altars were built with stones of remembrance;
“Go into the middle of the Jordan, in front of the Ark of the Lord your God. Each of you must pick up one stone and carry it out on your shoulder—twelve stones in all, one for each of the twelve tribes of Israel.We will use these stones to build a memorial.
In the future your children will ask you, ‘What do these stones mean?’
Then you can tell them, ‘They remind us that the Jordan River stopped flowing when the Ark of the Lord’s Covenant went across.’ These stones will stand as a memorial among the people of Israel forever.” (Joshua 4:5-7, ESV).
Stones of remembrance collect in my mind. They accumulate and they build something. I believe that God expects us to stockpile the stones of remembrance that build an altar to his goodness. We are to remember the goodness of the Lord—his faithful kindness, his saving power, his extravagant grace. Like Samuel did after victory over the Philistines—he saw this as more of God’s mercy.
Then Samuel took a stone and set it between Mizpah and Shen, and named it Ebenezer, saying, “Thus far the Lord has helped us.” 1 Samuel 7:12, NASB
When we read in Scripture about “remembering,” we see that God remembers, too. He remembers his covenant, his people, and his great love and mercy. Remembering is tied to his faithfulness. He always remembers us because he is faithful.
The Lord wants us to be faithful to him, too, for us to always remember him. Remember how faithfulness is tied to faith? When we remember God’s faithfulness, we are filled with faith and love. When we remember hurts, offenses, discouragement, shortcomings, mistakes, and defeat, we are filled with pain.
Today, be like Samuel. Take a stone and set it up in your heart. Call it Ebenezer for all the ways the Lord has helped you. Remember. Remember God’s goodness. And if you can, share your Ebenezer in the comments.
Comments
Hi! I’m Britta
I'm a work in progress. Lately, I'm trying to learn how to plant deep roots after a lifetime of military moves. Planting seems to be slow work for me!
Life on the move. Chronic and serious illnesses. Marriage struggles. At times, it has been hard to see God's goodness. But I’ve learned that CURATING the GOOD (collecting evidence of God's goodness and putting it on display)—this is a life-giving practice. Won't you join me? Read More… | {
"perplexity_score": 336.7,
"pile_set_name": "Pile-CC"
} |
{
"_args": [
[
{
"raw": "compressible@~2.0.5",
"scope": null,
"escapedName": "compressible",
"name": "compressible",
"rawSpec": "~2.0.5",
"spec": ">=2.0.5 <2.1.0",
"type": "range"
},
"/Users/liyuechun/Desktop/demo/ComicBook/node_modules/compression"
]
],
"_from": "compressible@>=2.0.5 <2.1.0",
"_id": "[email protected]",
"_inCache": true,
"_location": "/compressible",
"_nodeVersion": "4.7.3",
"_npmOperationalInternal": {
"host": "packages-12-west.internal.npmjs.com",
"tmp": "tmp/compressible-2.0.10.tgz_1490330888540_0.3248714415822178"
},
"_npmUser": {
"name": "dougwilson",
"email": "[email protected]"
},
"_npmVersion": "2.15.11",
"_phantomChildren": {},
"_requested": {
"raw": "compressible@~2.0.5",
"scope": null,
"escapedName": "compressible",
"name": "compressible",
"rawSpec": "~2.0.5",
"spec": ">=2.0.5 <2.1.0",
"type": "range"
},
"_requiredBy": [
"/compression"
],
"_resolved": "https://registry.npmjs.org/compressible/-/compressible-2.0.10.tgz",
"_shasum": "feda1c7f7617912732b29bf8cf26252a20b9eecd",
"_shrinkwrap": null,
"_spec": "compressible@~2.0.5",
"_where": "/Users/liyuechun/Desktop/demo/ComicBook/node_modules/compression",
"bugs": {
"url": "https://github.com/jshttp/compressible/issues"
},
"contributors": [
{
"name": "Douglas Christopher Wilson",
"email": "[email protected]"
},
{
"name": "Jonathan Ong",
"email": "[email protected]",
"url": "http://jongleberry.com"
},
{
"name": "Jeremiah Senkpiel",
"email": "[email protected]",
"url": "https://searchbeam.jit.su"
}
],
"dependencies": {
"mime-db": ">= 1.27.0 < 2"
},
"description": "Compressible Content-Type / mime checking",
"devDependencies": {
"eslint": "3.18.0",
"eslint-config-standard": "7.1.0",
"eslint-plugin-markdown": "1.0.0-beta.4",
"eslint-plugin-promise": "3.5.0",
"eslint-plugin-standard": "2.1.1",
"istanbul": "0.4.5",
"mocha": "~1.21.5"
},
"directories": {},
"dist": {
"shasum": "feda1c7f7617912732b29bf8cf26252a20b9eecd",
"tarball": "https://registry.npmjs.org/compressible/-/compressible-2.0.10.tgz"
},
"engines": {
"node": ">= 0.6"
},
"files": [
"HISTORY.md",
"LICENSE",
"README.md",
"index.js"
],
"gitHead": "235bc74b36aa7fe854df88ce2c68242c0a4ca938",
"homepage": "https://github.com/jshttp/compressible#readme",
"keywords": [
"compress",
"gzip",
"mime",
"content-type"
],
"license": "MIT",
"maintainers": [
{
"name": "defunctzombie",
"email": "[email protected]"
},
{
"name": "dougwilson",
"email": "[email protected]"
},
{
"name": "federomero",
"email": "[email protected]"
},
{
"name": "fishrock123",
"email": "[email protected]"
},
{
"name": "jongleberry",
"email": "[email protected]"
},
{
"name": "mscdex",
"email": "[email protected]"
},
{
"name": "tjholowaychuk",
"email": "[email protected]"
}
],
"name": "compressible",
"optionalDependencies": {},
"readme": "ERROR: No README data found!",
"repository": {
"type": "git",
"url": "git+https://github.com/jshttp/compressible.git"
},
"scripts": {
"lint": "eslint --plugin markdown --ext js,md .",
"test": "mocha --reporter spec --bail --check-leaks test/",
"test-cov": "istanbul cover node_modules/mocha/bin/_mocha -- --reporter dot --check-leaks",
"test-travis": "istanbul cover node_modules/mocha/bin/_mocha --report lcovonly -- --reporter dot --check-leaks"
},
"version": "2.0.10"
} | {
"perplexity_score": 1062.8,
"pile_set_name": "Github"
} |
Tumour-simulating squamous cell metaplasia (SCM) in necrotic areas of salivary gland tumours.
Squamous cell metaplasia (SCM) adjacent to necrotic areas of salivary gland tumours must be distinguished from other types of SCM (focal SCM in the excretory ducts of salivary glands; necrotizing sialometaplasia; focal SCM within salivary gland tumours) in respect to the tissue structure. Based on the high cellular proliferation, arcade- or cord-like pseudoneoplastic SCM develops with stellate extension in the surrounding tissue and focal inclusion of goblet cell metaplasia. This proliferative SCM resembles the cellular demarcation of radicular dental cysts. In the Salivary Gland Register 8 cases of tumor-simulating SCM could be analysed which clinically and morphologically were suspect of squamous cell or mucoepidermoid carcinoma. Five cases were localized in the parotid gland, 2 cases in the submandibular gland and 1 case in the palatinal glands. Tumour-simulating SCM was developed in pleomorphic adenomas (5 cases) and in multifocal adenomatous oncocytic hyperplasia (3 cases). | {
"perplexity_score": 279.4,
"pile_set_name": "PubMed Abstracts"
} |
Last updated on .From the section Football
Shrewsbury Town's Ashley Vincent (right) and Blackpool's Joan Oriol (left) battle for possession.
Blackpool's early-season troubles continued as they suffered a shock Capital One Cup first-round exit at the hands of League Two Shrewsbury.
The Seasiders could only name six substitutes - once again failing to fill their full allocation as they did in Saturday's Championship opener.
Striker Scott Vernon's 34th-minute strike settled matters when he netted after good work from Ashley Vincent.
Tomasz Cywka came closest for Blackpool when he hit the post after 43 minutes.
Ishmael Miller made his Seasiders debut as a second-half substitute, while new arrivals Joel Dielna and Jeffrey Rentmeister both featured as manager Jose Riga continues to make up for lost time and mould his squad for the new campaign.
Blackpool had just eight players registered with less than two weeks to go before the start of the season and just four on the bench for their opening league game at Nottingham Forest on Saturday, which they lost 2-0. external-link
Shrewsbury manager Micky Mellon told BBC Radio Shropshire:
"From minute one, we were so composed. We passed the ball well, and we had a lot of real scoring opportunities.
"The goal itself was a terrific goal, and we could've had a few more. Two, three or four wouldn't have flattered us.
"We're obviously very pleased to beat a Championship side, but what I'm more pleased about is the performance.
"This club's fighting back now, and this result will go some way towards its recovery."
Blackpool manager Jose Riga told BBC Radio Lancashire:
"First of all, the best team won. I knew already that this game, three days after the other one, would be difficult for us and it was difficult, not only the contents of the game but also the physical side.
"We had many problems in this game. If the pre-season preparation was not necessary, why do all the teams do that preparation?
"It's difficult, but I knew it would be difficult. We have to find a solution for the next step, and that is about the squad, the team and even the staff - to be able to bring in a fitness coach or some other help that a normal team has already for many weeks." | {
"perplexity_score": 365.4,
"pile_set_name": "OpenWebText2"
} |
There Was No French Toast
“Tell me what we were doing the morning we were leaving Cancun,” my husband asks, a week after we returned from a vacation.
“We were waiting in the hotel bar for the van to take us to the airport,” I reply.
“Did we order French toast?”
“What? — There was no French toast.”
“So I didn’t have an argument with the waiter about the French toast?” he persists.
“Nope. That didn’t happen. We had breakfast in our room earlier,” I remind him.
“I thought we were in the bar and we ordered French toast,” Tom mused, “but the waiter didn’t bring it. Then he came and gave us a bill. He said we had to pay because we had already checked out. I started arguing with him. ‘You didn’t even bring us the French toast, and we are going to miss our van.’” Tom’s imagined frustration with the waiter made me smile.
“Nothing like that happened,” I said calmly. You must have dreamed it. Sounds like you were anxious about the van, about getting to the airport on time.”
“I was. But then three orders of French toast appeared,” Tom continued, crossing that line between reality and dream without a pause.
“Did we have time to eat it?” I asked, smiling.
“Of course not,” Tom huffed.
“Were you very hungry?” I teased.
“You know I’m always hungry,” he replied.
Then he smiled, knowing my occasional frustration with his digressive journeys, and said, “It’s not that I don’t remember what happened. It’s just that I need to add footnotes.”
***
Tom and I are in our Manhattan apartment, and he is asking the kinds of questions that makes me pause and pay attention, so I can figure out just how his mind is working. Twenty-two years of Parkinson’s disease is starting to take its toll. A few days before the French toast incident, we had been swimming in the Gulf of Mexico’s coral reefs. Swimming is something Tom can still do, even though he can’t walk steadily. Before the excursion, we were given a lecture on how fragile the reefs were, how susceptible to chemicals such as sunscreen and all the other pollutants we are producing.
I watched the guides plop Tom’s thin frame into an inner tube and ease him off the boat into the water. I thought about my husband’s fragility, wondering what pollutants were responsible for his condition, but of course I know the causes are more complex. His mind sometimes appears to be eroding the way the coral reefs are quietly losing their substance. Small amounts of data seemed to be shifting location and drifting into the larger aquatic flow inside Tom’s head where they take on new shapes, offering creative, if dislocated, readings of events.
The inevitable course of the disease notwithstanding, I find myself curious, but also anxious, about how best to find a bridge between his world and mine. I imagine that the changes in Tom’s brain are perhaps shifting geological plates, something not as final as what is happening to the coral reefs, suggesting the hope of a new formation, overlapping connections, not just irretrievable loss.
Weeks can go by with barely noticeable differences in the way we are living our lives; then, suddenly, Tom says something that reveals an abyss between us. It’s disconcerting to be confronted with a partner who suddenly seems to be standing on a different land mass, or not on land at all, but in a fast-moving stream or turbulent ocean, leaving me behind. I’ve learned, though, that it’s best not to tell Tom he is imagining things, because, for him, in that moment, they are real. When he tells me, for example, that there are people in our room, I go along with the story, asking him to describe them, then noting when he tells me they have disappeared. I remind myself that the doctor says it’s not dementia but medication related confusion, usually only temporary. So far that has been true, but the looming fear of changes, in the secret places of Tom’s brain that I cannot see, remains.
Although my husband is a relatively quiet person when awake, when he is asleep, he is loquacious. Sometimes he gives a lecture to a class. And in the best dreams, he is laughing and smiling, even opening his eyes as if he is trying to invite participants in the dream to come to share a glass of wine on our balcony. Recently, however, he described a frightening dream. He was being transported by strangers to a place where he would not be able to navigate, as the destination required climbing up a rocky mountain. He flailed in his sleep, shouting at his captors to stop. Of course, Tom immediately understood why he had a dream that demanded an impossible physical feat. The disease haunts him, even when he is asleep.
What interests to me, as his partner, in addition to the actual terrain of his excursions, both sleeping and waking, is my job: how I can successfully bring him back to common ground. Chatting about daughters, grandchildren, or pointing to something silly our miniature schnauzer is doing, does not always work. But if I ask him an intellectual question, another part of his mind immediately goes into gear, and the professor husband with whom I have shared ideas for twenty-five years emerges intact.
Recently, I asked him to explain Michel Foucault’s “repressive hypothesis” to me. After a moment’s careful thought, he said, “What Foucault means is that the things that we dare not do control us.”Marveling at the succinct clarity of his answer, and the sly way Tom always inserts his interest in what is culturally forbidden into conversation, I also think, sadly, about all the things my husband dare not, cannot, do anymore.
It remains immensely comforting, though, that Tom’s deep intelligence is intact. He pursues my question about Foucault, launching into a more elaborate explanation:
“In The History of Sexuality, Foucault describes a French boy’s dalliance with a local dairy maid and his consequent interrogation by the police, a typical teenage event becomes a ‘perversion’ in the eyes of the French government so they arrest the boy. The French philosopher uses the story to show how our desires are pathologized.” “Feminists,” Tom adds, in one of his “footnotes,” “critique Foucault’s position, arguing that what the boy did was nothing short of rape.”
Suddenly, once again in the “classroom,” my professor husband gives an explanation of a theory and then a memorable bit about recent scholarship. His response to my question is not exactly a return to common ground, at least not for most people, but for me it is a sign that cognition is working.
Tom is retired but still teaches one class a semester at the college where he has spent the last thirty-eight years. Students haven’t complained, so the momentary shifts to an alternate reality, the “footnotes” he adds to some of our excursions, do not seem to occur during class. If he can still talk to students about Don Quixote and Hamlet and ask them to write about the difference between these two heroes’ understanding of madness and reality, surely his “coral reefs” still have plenty of dendrites. Recently, however, even though his students wrote him a warm letter of praise at the end of the semester, his college decided it was time for him to stop teaching. Tom was annoyed at the bureaucracy, and personally hurt, but I was relieved for his physical safety — traveling back and forth six blocks alone on his scooter had caused me much anxiety. But now a new set of concerns arose about the need for stimulation — how would he remain intellectually active?
These events lead me to ponder the terrain of our future. On a day Tom has been teaching or working on a half-finished manuscripts on self-portraiture in the Renaissance, I feel that we are on terra firma. Other times, when Tom asks me a question that make me feel more like I am standing on a diminishing piece of ice in the arctic. I have never stood in the arctic, but I imagine it to be firm yet somehow porous. It is unclear just when a large piece of ice might sheer off into the ocean. As I wrestle with these images, I realize that while Tom is crossing into realms whose foundations are uncertain, I remain on dry land, relatively speaking anyway. And yet, we are together, perhaps closer than we have ever been, trying to navigate this stage of our lives together.
Most of the time, Tom’s excursions only last a morning, or, at most, a day, and then they vanish, a brief snow shower, and we begin again, exchanging ideas about Obama’s decision to cut Medicare or whether Hillary will run for president in 2016, and I am lulled into complacency — until the next question. Like the one about the French toast we didn’t have in Cancun.
Phyllis van Slyck teaches English at LaGuardia Community College, City University of New York. She has published essays on Henry James and on pedagogy in a variety of academic journals including American Imago, Change Magazine, Criticism: A Quarterly for Literature and the Arts, The Henry James Review and Profession. She is currently writing memoir pieces on family matters, in particular, a series on living with a partner with Parkinson’s Disease. Email: [email protected]
Phyllis van Slyck teaches English at LaGuardia Community College, City University of New York. She has published essays on Henry James and on pedagogy in a variety of academic journals including American Imago, Change Magazine, Criticism: A Quarterly for Literature and the Arts, The Henry James Review and Profession. She is currently writing memoir pieces on family matters, in particular, a series on living with a partner with Parkinson’s Disease. | {
"perplexity_score": 308.6,
"pile_set_name": "Pile-CC"
} |
The Highlanders established a distinctive tactical identity under former head coach Jamie Joseph: they ensured that games were played at pace, backed their defence to withstand a high volume of opposition possessions, and looked to strike quickly with efficient and inventive attacking play. Under Joseph’s former assistant Tony Brown during the 2017 season, the team did not alter this approach – Round 1 against the Chiefs aside. They averaged only 45.7% of the total carries made in their fixtures – 4% lower than any other New Zealand franchise – but generated cleak breaks with the second-highest frequency (11.2%) of all teams in the competition; on the other side of the ball, they allowed opponents to make clean breaks with the third-lowest frequency (7.3%) teams.
After a win over the Blues last weekend, it appears that – despite a third head coach in three seasons – the team’s tactical approach will not be significantly different in 2018. They made 44.9% of the game’s total carries in Aaron Mauger’s first game in charge, and scored points with quick, efficient attacking strikes.
The short kicking game of halfbacks Aaron Smith and Lima Sopoaga has historically been a fundamental feature of the Highlanders’ set-piece attack. The accuracy of the two All Blacks in this area allows the team to manipulate the four defenders whose positioning dictates where the attacking team can find space: the full-back, two wingers and scrum-half.
In the first example below – from Round 2 of 2017 against the Crusaders – Seta Tamanivalu begins flat on the left wing to cover the running threat of Waisake Naholo, and full-back David Havili is in a shallow position directly behind the scrum. Smith’s dart from the base to escape the back row also has the effect of holding Tamanivalu and Havili in the front line, and the scrum-half threads a grubber kick perfectly into the open space beyond the two defenders:
In the second example from this fixture, Sopoaga drops a short chip perfectly into space behind the Crusaders’ midfield, an area which scrum-half Bryn Hall is unable to cover as sweeper:
Crucially, Hall begins the sequence in the 5m channel – with hooker Codie Taylor at the tail of the lineout – and this defensive set-up likely costs the scrum-half the extra few metres necessary to get between the ball and Naholo, who is making an excellent tracking run on the inside from the blindside wing and collects Fekitoa’s offload after he is tackled by the full-back.
The franchise’s historic win over the British & Irish Lions showcased another aspect of their attacking kicking game, with centre Teihorangi Walden’s accurate short grubbers turning the opposition’s aggressive press on a number of occasions. In last Friday’s game, it was outside centre Rob Thompson – effectively the fourth kicking option in a backline featuring Smith, Sopoaga and Walden inside him – whose right foot was used to great effect for the Highlanders’ fifth and final try:
Despite Thompson’s sub-optimal execution – the chip is slightly too long, and allows scrum-half Augustine Pulu the chance to cover – the Highlanders’ attacking alignment and awareness of the Blues’ defensive structure creates a situation where they are able to exploit a somewhat fortuitous bounce of the ball.
The Blues – short a number 8 at this scrum due to Antonio Kiri Kiri’s yellow card – set up with Rieko Ioane on the end of a flat front-line of four defenders. Full-back Michael Collins must therefore begin in a wider position than usual – in the image below, he is almost directly behind his team-mate on the left wing – while right wing Matt Duffie is held in the right 15m channel by the presence of Tevita Li:
The open space behind the Blues’ midfield three is clear; Pulu retreats to cover it from the scrum-half position, but is unable to collect the bouncing ball on the run. The other defender who feasibly begins in a position to cover is Collins, but the movement of Sopoaga and Ben Smith in a second wave holds Ioane in position, brings the threat of Naholo (out of shot) into play on the right wing and stops the full-back from moving back towards the centre of the field:
In addition, the fact that it is Thompson at first receiver rather than one of the team’s more prominent kicking options likely lowers the probability of a chip in the eyes of the defence. All of these factors come together and mean that when Walden and Thompson flood through the midfield in pursuit of the ball – with Walden picking an excellent line outside the Blues’ 13 channel in order to avoid traffic – they outnumber the covering defence and are able to capitalise on Pulu’s misread of the bounce.
Use of short kicking as an effective attacking strategy is not about creating clean scoring chances on every play. It is an inherently higher-variance strategy, but – as Scotland have shown on numerous occasions, including Huw Jones’ opening try against England on Saturday – if it used in combination with an awareness of the opponent’s defensive structure and active support play, the balance of risk and reward can be tipped in the attacking team’s favour. The Highlanders have been one of its foremost exponents in world rugby over the last few years, and this trend looks set to continue under Aaron Mauger. | {
"perplexity_score": 382.7,
"pile_set_name": "OpenWebText2"
} |
Yuriy Bazhal
Bazhal, Yuriy (Yuri, Iurii) (born November 26, 1950) is a Ukrainian scientist in a field of economic theory, innovations, and technological development; Doctor of Economic Sciences, Professor, Academic (ANVSU) from 2010.
Biography
Yuriy Bazhal was born in Odessa in 1950. In 1971 he finished plan-economic faculty of Odessa State Economics University. Worked at the Economics Institute of Ukrainian Soviet Socialist Republic Academy of Sciences since 1988, and at the Institute of Economic Forecasting of National Academy of Science of Ukraine during 1997-1999. He has taught at National University of Kyiv-Mohyla Academy since 1994, from 2000 he was the head of Economic Theory Department, and in 2000-2006 he was the Dean of Faculty of Economic Sciences (Faculty of Economics).
1977 - Candidate of Economic Sciences;
1992 - Doctor of Economic Sciences;
2000 - Professor;
2010 - Academic.
He has contributed to the theory and practice of the innovations management and to the development of the state innovation policy conception.
Scientific achievements
Yuriy Bazhal has over 160 publications, including 14 individually and collectively written monographes and 5 studying books, and also scientific articles in Ukrainian and foreign scientific journals.
He was awarded a medal for young scientists from the Academy of Sciences of Ukraine (1984), diploma of the Ministry of Finance of Ukraine (2004). Thrice he was awarded with Vadym Hetman professorial fellowship from Raiffeisen Bank Aval (2006–2009).
References
Академія наук вищої школи України. 1992-2010. Довідник
Category:1950 births
Category:Living people
Category:People from Odessa
Category:Odessa National Economics University alumni
Category:Ukrainian economists | {
"perplexity_score": 173.9,
"pile_set_name": "Wikipedia (en)"
} |
<?php
class SQL
{
/**
* 解析一个SQL语句
*
* @param $sql
* @return array|bool
*/
public static function parseSql($sql)
{
# 单表join SELECT * FROM t1 LEFT JOIN t2 ON t2.a=t1.a
# 多表join SELECT * FROM t1 LEFT JOIN (t2, t3, t4) ON (t2.a=t1.a AND t3.b=t1.b AND t4.c=t1.c)
$tpl = "[a-z0-9_'`\"]+";
$preg = "#^select[ ]+(?<select>.+)[ ]+";
$preg .= "from (?:(?<app>$tpl)\.)?(?<table>$tpl)(?:[ ]+as[ ]+(?<tableAs>$tpl))?";
$preg .= "(?:[ ]+for[ ]+(?<for>[a-z0-9_,`'\"]+))?";
$preg .= "(?:[ ]+";
$preg .= "(?<leftJoin>left[ ]+)?join[ ]+(?<join>[a-z0-9,_` \)\(]+)";
$preg .= "[ ]+on (?<on>(?:(?! where | group[ ]+time | group[ ]+by | save[ ]+as ).)+)";
$preg .= ")?";
$preg .= "(?:[ ]+where (?<where>(?:(?! group[ ]+time | group[ ]+by | save[ ]+as ).)+))?";
$preg .= "(?:[ ]+group[ ]+by[ ]+(?<groupBy>[a-z0-9_\.,`]+))?";
$preg .= "(?:[ ]+group[ ]+time[ ]+(?<groupTime>(?:(?! save[ ]+as).)+))?";
$preg .= "(?:[ ]+save[ ]+as (?<saveAs>[a-z0-9_%,\.`]+))?$#i";
if (preg_match($preg, preg_replace('#[ ]*,[ ]+#', ',', str_replace(["\r\n", "\r", "\n"], ' ', $sql)), $m))
{
if (IS_DEBUG)
{
echo "Match: ";
print_r($m);
}
if (isset($m['join']) && $m['join'])
{
# join 模式
$joinOption = self::parseJoin($m);
if (false === $joinOption)
{
warn("sql join option error: join = {$m['join']}, on = {$m['join']}");
return false;
}
}
else
{
$joinOption = null;
}
$app = self::deQuoteValue($m['app']);
$table = self::deQuoteValue($m['table']);
$tableAs = self::deQuoteValue($m['tableAs']) ?: $table;
$select = trim($m['select']);
$for = trim($m['for']);
$where = trim($m['where']);
$groupBy = trim($m['groupBy']);
$groupTime = trim($m['groupTime']);
$saveAs = self::deQuoteValue(str_replace('`', '', $m['saveAs'])) ?: $table;
$option = [
'key' => substr(md5($sql .'_'. microtime(1)), 8, 16), //任务的key
'name' => "from {$table} to {$saveAs}",
'use' => true, //是否开启
'createTime' => time(),
'editTime' => 0,
'deleteTime' => 0,
'seriesKey' => null, //序列的key, 生成好完整的option后再赋值
'sql' => '', //SQL语句
'table' => $table,
'tableAs' => $tableAs,
'for' => [],
'saveAs' => [], //保存的设置
'start' => 0, //开启时间
'end' => 0, //结束时间
'allField' => false,
'fields' => [], //导出的字段设置
'where' => $where ? self::parseWhere($where, $joinOption) : [], //where条件
'groupTime' => [], //时间分组设置
'groupBy' => [], //字段分组设置
'function' => [], //所有使用到的方法列表
];
if ($joinOption)
{
$option['join'] =& $joinOption;
}
# 解析SELECT部分
if (!self::parseSelect($select, $option))
{
return false;
}
if ($app)
{
$option['for'][$app] = $app;
}
if ($for)
{
foreach (explode(',', $for) as $item)
{
$item = self::deQuoteValue($item);
$option['for'][$item] = $item;
}
ksort($option['for']);
}
if ($groupBy)
{
foreach(explode(',', $groupBy) as $item)
{
if (strpos($item, '.'))
{
list($space, $tmpItem) = explode('.', $item, 2);
$space = self::deQuoteValue($space);
$item = self::deQuoteValue($tmpItem);
if (isset($joinOption['join'][$space]))
{
$joinOption['fields'][$joinOption['join'][$space]][] = $item;
$item = $joinOption['join'][$space] . '.' . $item;
}
}
else
{
$item = self::deQuoteValue($item);
}
if ($item)
{
$option['groupBy'][] = $item;
}
}
if ($option['groupBy'])
{
# 重新排序
sort($option['groupBy']);
}
}
if ($joinOption)
{
# 对join中用到的字段去重并重新排序
foreach ($joinOption['fields'] as $k => &$v)
{
$v = array_unique($v);
sort($v);
}
unset($v);
}
$groupTimeSet = [];
if ($groupTime)
{
foreach (explode(',', trim($groupTime)) as $item)
{
$item = self::deQuoteValue($item);
if ($item === 'none')
{
$groupTimeSet['-'] = [0, '-'];
}
elseif (preg_match('#^(\d+)([a-z]+)$#i', $item, $m))
{
if ($m[2] !== 'M')$m[2] = strtolower($m[2]);
switch ($m[2])
{
case 'year':
case 'y':
$m[2] = 'y';
break;
case 'month':
case 'm':
$m[2] = 'm';
break;
case 'week':
case 'w':
$m[2] = 'w';
break;
case 'day':
case 'd':
$m[2] = 'd';
break;
case 'hour':
case 'h':
$m[2] = 'h';
break;
case 'minutes':
case 'M':
case 'i':
$m[2] = 'i';
break;
case 'seconds':
case 's':
$m[2] = 's';
break;
default:
debug("error group time: $item, exp: 3M, 1d, 1h, 30s");
continue 2;
}
$set = [
$m[1] >= 1 ? (int)$m[1] : ($m[2] == 's' ? 30 : 1),
$m[2],
];
$groupTimeSet[$set[0].$set[1]] = $set;
}
else
{
debug("error group time: $groupTime, exp: 3M, 1d, 1h, 30s");
}
}
}
# 设定时间分组
$option['groupTime'] = $groupTimeSet ?: ['1i' => [1, 'i', 60]];
# 根据时间分组设置输出表设置
$saveAsArr = explode(',', str_replace(' ', '', $saveAs));
$current = $saveAsArr[0];
$i = 0;
foreach ($option['groupTime'] as $k => $v)
{
if (isset($saveAsArr[$i]) && $saveAsArr[$i])
{
$current = $saveAsArr[$i];
if (strpos($current, '%') !== false && preg_match_all('#%([a-z])#i', $current, $m))
{
# 得到所有 % 开头的变量
$current = [
$current, // 当前设置
'date', // 处理类型, 方便以后扩展功能
array_values(array_unique($m[0])), // 所有需要替换的字符串
implode(',', array_unique($m[1])), // 对应的要替换的时间字符串
];
}
}
$option['saveAs'][$k] = $current;
$i++;
}
$option['sql'] = self::getSqlByOption($option);
$option['seriesKey'] = self::getSeriesKeyByOption($option);
return $option;
}
else
{
warn("error sql: $sql");
return false;
}
}
/**
* 根据配置序列的key
*
* @param $option
* @return string
*/
public static function getSeriesKeyByOption($option)
{
$key = "table:{$option['table']}";
if (isset($option['where']) && $option['where'])
{
$key .= '|where:' . $option['where']['$sql'];
}
if (isset($option['groupBy']) && $option['groupBy'])
{
$key .= '|group:' . implode(',', $option['groupBy']);
}
$key = substr(md5($key), 8, 16);
return $key;
}
/**
* 根据配置生成格式化后的SQL语句
*
* @param $option
* @param null $table
* @return bool|string
*/
public static function getSqlByOption($option)
{
$select = [];
if ($option['allField'])
{
$select[] = '*';
}
if (isset($option['join']) && $option['join'])
{
$joinMap = array_flip($option['join']['join']);
}
else
{
$joinMap = [];
}
$saveOption = $option['fields'];
foreach ($saveOption as $as => $opt)
{
$field = $opt['field'];
if ($opt['type'] === 'dist' && strpos($field, ','))
{
# 多字段
$tmp2 = explode(',', $field);
foreach ($tmp2 as & $tt)
{
if (strpos($tt, '.'))
{
$tmp = explode('.', $tt, 2);
if (isset($joinMap[$tmp[0]]))
{
$tt = "`{$joinMap[$tmp[0]]}`.`{$tmp[1]}`";
}
else
{
$tt = "`{$tmp[1]}`";
}
}
else
{
$tt = "`$tt`";
}
}
unset($tt);
$field = implode(', ', $tmp2);
}
elseif (strpos($field, '.'))
{
$tmp = explode('.', $field, 2);
if (isset($joinMap[$tmp[0]]))
{
$field = "`{$joinMap[$tmp[0]]}`.`{$tmp[1]}`";
}
else
{
$field = "`{$tmp[1]}`";
}
}
elseif ($field !== '*')
{
$field = "`$field`";
}
if ($opt['type'] === 'value')
{
$tmp = $field;
}
else
{
$tmp = strtoupper($opt['type']) . "({$field})";
}
if ($opt['field'] !== $as)
{
$tmp .= " AS `{$as}`";
}
$select[] = $tmp;
}
$sql = 'SELECT '. implode(', ', $select) . " FROM `{$option['table']}`";
if ($option['tableAs'] != $option['table'])
{
$sql .= " AS `{$option['tableAs']}`";
}
if (isset($option['for']) && $option['for'])
{
$sql .= " FOR ". implode(',', array_map(function($v){return "`$v`";}, $option['for']));
}
if (isset($option['join']) && $option['join'])
{
$sql .= ' ' . $option['join']['$sql'];
}
if (isset($option['where']) && $option['where'])
{
$sql .= " WHERE {$option['where']['$sql']}";
}
if (isset($option['groupBy']) && $option['groupBy'])
{
$groupBy = $option['groupBy'];
foreach ($groupBy as & $item)
{
if (strpos($item, '.'))
{
$tmp = explode('.', $item, 2);
if ($joinMap && isset($joinMap[$tmp[0]]))
{
$item = "`{$joinMap[$tmp[0]]}`.`{$tmp[1]}`";
}
else
{
$item = "`{$tmp[1]}`";
}
}
else
{
$item = "`{$item}`";
}
}
$sql .= " GROUP BY ". implode(', ', $groupBy);
}
$sql .= " GROUP TIME '". implode("', '", array_keys($option['groupTime'])) ."'";
if ($option['save'][0] !== $option['table'] || count($option['save']) > 1)
{
$saveAs = $option['saveAs'];
foreach ($saveAs as $k => &$v)
{
if (is_array($v))
{
$v = $v[0];
}
$v = "`$v`";
}
$sql .= " SAVE AS ". implode(', ', $saveAs);
}
return $sql;
}
public static function mergeOption($opt1, $opt2)
{
foreach ($opt2 as $key => $item)
{
if (is_array($item))
{
$opt1[$key] = self::mergeOption($opt1[$key], $item);
}
else
{
$opt1[$key] = $item;
}
}
return $opt1;
}
protected static function parseSelect($select, & $option)
{
if ($select === '*')
{
$option['allField'] = true;
}
else
{
$tpl = "[a-z0-9_'`\"]+";
$nextStep = '';
$joinOption =& $option['join'] ?: [];
foreach (explode(',', $select) as $s)
{
if ($nextStep)
{
if (preg_match('#[a-z0-9\._\'`"]+\)(?:[ ]+as[ ]+'. $tpl .')?#i', trim($s)))
{
$s = $nextStep .','. $s;
$nextStep = '';
}
else
{
$nextStep .= ','. $s;
continue;
}
}
elseif (preg_match('#^[a-z0-9\._\'"` ]+\([^\)]+$#i', $s, $m))
{
# 如果没有遇到封闭函数, 则可能是 select dist(a,b),c 这样被, 分开了
$nextStep = $s;
continue;
}
$s = trim($s);
if ($s === '*')
{
$option['allField'] = true;
}
elseif (preg_match("#^(?:(?<space>$tpl)\\.)?(?<field>$tpl)(?:[ ]+as[ ]+(?<as>$tpl))?(?:[ ]+)?$#i", $s, $mSelect))
{
# 匹配 select abc, abc as def
$field = self::deQuoteValue($mSelect['field']);
$as = self::deQuoteValue($mSelect['as'] ?: $field);
# 处理 select a.abc 的情形
if (isset($mSelect['space']))
{
$space = self::deQuoteValue($mSelect['space']);
if ($space)
{
if (isset($joinOption['join'][$space]))
{
$joinOption['fields'][$joinOption['join'][$space]][] = $field;
$field = "{$joinOption['join'][$space]}.$field";
}
elseif ($space !== $option['tableAs'])
{
warn("select error #1: $s, can not found table space $space");
return false;
}
}
}
else
{
$space = false;
}
$option['fields'][$as] = [
'type' => 'value',
'field' => $field,
];
if ($space)
{
$option['fields'][$as]['space'] = 'join';
}
$option['function']['value'][$field] = true;
}
elseif (preg_match("#^(?<type>[a-z0-9_]+)[ ]*\\((?<field>[a-z0-9_\\., \\*\"'`]+)\\)(?:[ ]+as[ ]+(?<as>$tpl))?$#i", $s, $mSelect))
{
# count|sum|max|min|avg|first|last|dist|exclude|listcount|list|value
# 匹配 select sum(abc), sum(abc) as def
$field = trim($mSelect['field'], " ,");
$type = strtolower(trim($mSelect['type']));
$as = str_replace(',', '_', self::deQuoteValue($mSelect['as'] ?: ($field === '*' ? $type : "`{$type}_{$field}`")));
if ($field === '*' && $type !== 'count')
{
# 只支持 count(*)
continue;
}
if ($type === 'dist' && false !== strpos($field, ','))
{
# Dist支持多字段模式
$fields = explode(',', $field);
foreach ($fields as & $item)
{
if (strpos($item, '.'))
{
list($space, $item) = explode('.', $item);
$space = self::deQuoteValue($space);
$item = self::deQuoteValue($item);
if (isset($joinOption['join'][$space]))
{
$joinOption['fields'][$joinOption['join'][$space]][] = $item;
$item = "{$joinOption['join'][$space]}.$item";
}
elseif ($space !== $option['tableAs'])
{
warn("select error #2: $field, can not found table space $space");
return false;
}
}
else
{
$item = self::deQuoteValue($item);
}
}
unset($item);
sort($fields);
$field = implode(',', $fields);
}
else
{
$fields = true;
if (preg_match("#^($tpl)\\.($tpl)$#i", $field, $m2))
{
$space = self::deQuoteValue($m2[1]);
$field = self::deQuoteValue($m2[2]);
if (isset($joinOption['join'][$space]))
{
$joinOption['fields'][$joinOption['join'][$space]][] = $field;
$field = $joinOption['join'][$space] . '.' . $field;
}
elseif ($space !== $option['tableAs'])
{
warn("select error #3: $field, can not found table space $m2[1]");
return false;
}
}
else
{
$field = self::deQuoteValue($field);
}
}
$option['fields'][$as] = [
'type' => $type,
'field' => $field,
];
switch ($type)
{
case 'avg':
$option['function']['sum'][$field] = true;
$option['function']['count']['*'] = true;
break;
case 'dist':
$option['function']['dist'][$field] = $fields;
break;
case 'list':
case 'listcount':
$option['function']['dist'][$field] = true;
break;
case 'count':
$option['fields'][$as] = [
'type' => $type,
'field' => strpos($field, '.') ? $field : '*',
];
$option['function']['count']['*'] = true;
break;
default:
$option['function'][$type][$field] = true;
break;
}
}
else
{
warn("select error #4, unknown select: $s");
return false;
}
}
}
return true;
}
/**
* 解析 JOIN ON 语句
*
* @param $m
* @return array|bool
*/
protected static function parseJoin($m)
{
if (!isset($m['on']))return false;
$join = trim($m['join'], ' )(');
$on = trim($m['on'], ' )(');
if (!$on)return false;
$tmpJoin = [];
foreach (explode(',', $join) as $item)
{
if (preg_match('#^([a-z0-9_`]+)[ ]+as[ ]+([a-z0-9_`]+)$#i', trim($item), $m1))
{
$f1 = self::deQuoteValue($m1[1]);
$f2 = self::deQuoteValue($m1[2]);
}
else
{
$f1 = self::deQuoteValue($item);
$f2 = $f1;
}
$tmpJoin[$f2] = $f1;
}
$join = $tmpJoin;
unset($tmpJoin);
$table = self::deQuoteValue($m['table']);
$tableAs = null;
if (isset($m['tableAs']))
{
$tableAs = self::deQuoteValue($m['tableAs']);
}
if (!$tableAs)
{
$tableAs = $table;
}
$joinOption = [
'table' => $table,
'tableAs' => $tableAs,
'leftJoin' => isset($m['leftJoin']) && $m['leftJoin'] ? true : false,
'join' => $join,
'on' => [],
'fields' => [],
'$sql' => '',
];
$onWhere = self::parseWhere($on, $joinOption, true);
# 拼接出SQL语句
$sql = ($joinOption['leftJoin'] ? 'LEFT ' : '') . 'JOIN ';
if (count($joinOption['join']) > 1)
{
$sql .= '(';
foreach ($joinOption['join'] as $k => $v)
{
$sql .= "`$v`" . ($k === $v ? '' : " AS `$k`") .", ";
}
$sql = substr($sql, 0, -2) . ")";
}
else
{
$k = key($joinOption['join']);
$v = current($joinOption['join']);
$sql .= "`$v`" . ($k === $v ? '' : " AS `$k`");
}
foreach ($onWhere['$item'] as $item)
{
$k = [$item['field'], $item['value']];
sort($k);
$joinOption['on'][] = $k;
}
if (count($onWhere['$item']) > 1)
{
$sql .= " ON ({$onWhere['$sql']})";
}
else
{
$sql .= " ON {$onWhere['$sql']}";
}
$joinOption['$sql'] = $sql;
return $joinOption;
}
/**
* 解析一个where字符串为一个多维结构数组
*
* 例如:
*
* ((a < 1 and b % 3 = 2 and (aa=1 or bb=2 or (cc=3 and dd=4))) or ccc = 3) and (aaaa=1 or bbbb=2)
*
* @param $where
* @param $joinOption
* @return array
*/
protected static function parseWhere($where, & $joinOption, $joinWhere = false)
{
$funHash = [];
$parseWhere = function($where) use (& $funHash, & $joinOption, $joinWhere)
{
if (preg_match('#^(?:(?<space>[a-z0-9_`]+)\.)?(?<field>[a-z0-9_`]+)(?:(?:[ ]+)?(?<typeM>%|>>|<<|mod|in|\-|\+|x|\*|/)(?:[ ]+)?(?<mValue>[0-9\.]+))?(?:[ ]+)?(?<type>=|\!=|\<\>|\>|\<)(?:[ ]+)?(?<value>.*)$#i', $where, $mWhere))
{
$space = self::deQuoteValue($mWhere['space']);
$field = self::deQuoteValue($mWhere['field']);
$type = $mWhere['type'] === '<>' ? '!=' : $mWhere['type'];
$typeM = $mWhere['typeM'];
$mValue = $mWhere['mValue'];
$valueString = trim($mWhere['value']);
if ($joinWhere || preg_match('#^`(.*)`$#', $mWhere['value']))
{
# 字段 = 字段模式
# where `field1` = `field2`
$value = $mWhere['value'];
$fMode = true;
if (strpos($value, '.'))
{
$tmp = array_map('self::deQuoteValue', explode('.', $value, 2));
$valueString = "`{$tmp[0]}`.`{$tmp[1]}`";
if ($tmp[0] === $joinOption['tableAs'])
{
$value = "{$joinOption['table']}.{$tmp[1]}";
}
elseif (isset($joinOption['join'][$tmp[0]]))
{
$tmpTable = $joinOption['join'][$tmp[0]];
$value = "$tmpTable.{$tmp[1]}";
$joinOption['fields'][$tmpTable][] = $tmp[1];
}
else
{
$value = implode('.', $tmp);
}
}
else
{
$value = self::deQuoteValue($value);
$valueString = "`{$value}`";
}
}
else
{
$value = self::deQuoteValue($mWhere['value']);
$fMode = false;
}
if ($space === '__fun__')
{
# time_format(a, '%Y%m') = 201601
if (isset($funHash[$field]))
{
$opt = $funHash[$field];
$field = $opt['field'];
$space = $opt['space'];
}
else
{
return false;
}
$typeM = 'func';
}
elseif ($typeM === 'in')
{
if (isset($funHash[$field]))
{
$opt = $funHash[$field];
$field = $opt['field'];
$space = $opt['space'];
}
else
{
return false;
}
$typeM = 'func';
}
if ($space)
{
$fieldString = "`$space`.`$field`";
if ($space === $joinOption['tableAs'])
{
$field = "{$joinOption['table']}.{$field}";
}
elseif (isset($joinOption['join'][$space]))
{
$joinOption['fields'][$joinOption['join'][$space]][] = $field;
$field = "{$joinOption['join'][$space]}.{$field}";
}
}
else
{
$fieldString = "`$field`";
}
$option = [
'$sql' => $fieldString .($typeM ? " $typeM ". $mValue:'') . " $type " . $valueString,
'field' => $field,
'fMode' => $fMode,
'type' => $type,
'value' => $value,
'typeM' => $typeM,
'mValue'=> $mValue,
];
if ($typeM === 'func' && isset($opt))
{
$option['arg'] = $opt['arg'];
$option['fun'] = $opt['fun'];
$arg = $opt['argString'];
if ($opt['fieldArg'])
{
$option['field'] = $opt['fieldArg'];
}
if ($opt['fun'] === 'in')
{
$option['$sql'] = "$fieldString IN($arg)";
}
elseif ($opt['fun'] === 'not_in')
{
$option['$sql'] = "$fieldString NOT IN($arg)";
}
else
{
$option['$sql'] = "{$opt['fun']}({$arg}) {$type} {$valueString}";
}
}
return $option;
}
return false;
};
$parseFun = function($space, $field, $arg, $fun) use (& $joinOption)
{
$space = self::deQuoteValue($space);
$field = self::deQuoteValue($field);
$fieldArg = [];
$argString = [];
if ($space && $field && isset($joinOption['join'][$space]))
{
# 这个是被join的表的字段
$joinOption['fields'][$joinOption['join'][$space]][] = $field;
}
foreach ($arg as $i => & $tmp)
{
if (preg_match('#^`(.*)`$#', $tmp))
{
# 字段模式
if (strpos($tmp, '.'))
{
list($space2, $field2) = explode('.', $tmp, 2);
$space2 = self::deQuoteValue($space2);
$field2 = self::deQuoteValue($field2);
$argString[] = "`$space2`.`$field2`";
if (isset($joinOption['join'][$space2]))
{
$joinOption['fields'][$joinOption['join'][$space2]][] = $field2;
$space2 = $joinOption['join'][$space2];
}
$tmp = "$space2.$field2";
}
else
{
$tmp = self::deQuoteValue($tmp);
$argString[] = "`$tmp`";
}
$fieldArg[$i] = $tmp;
}
else
{
$tmp = self::deQuoteValue($tmp);
if (!is_numeric($tmp))
{
$argString[] = "'$tmp'";
}
else
{
$argString[] = $tmp;
}
}
}
unset($tmp);
$argString = implode(', ', $argString);
return [
'fun' => $fun,
'space' => $space,
'field' => $field,
'arg' => $arg,
'argString' => $argString,
'fieldArg' => $fieldArg,
];
};
$where = preg_replace('# and #i', ' && ', preg_replace('# or #i', ' || ', $where));
# 解析in, not in
if (preg_match_all('#(?:(?<space>[a-z0-9_`]+)\.)?(?<field>[a-z0-9`]+)[ ]+(?<notIn>not[ ]+)?in[ ]*\((?<arg>.+)\)#Ui', $where, $m))
{
foreach ($m[0] as $k => $v)
{
$hash = md5($v);
$arg = array_map('self::deQuoteValue', explode(',', $m['arg'][$k]));
$arg = array_unique($arg);
sort($arg);
$funHash[$hash] = $parseFun($m['space'][$k], $m['field'][$k], $arg, $m['notIn'][$k] ? 'not_in' : 'in');
$where = str_replace($v, "{$hash} in 0 = 0", $where);
}
}
# 预处理函数
# Exp: from_unixtime(time, "%H") = 2016
$match = '#(?<fun>[a-z_0-9]+)\((?<arg>[^\)]+)\)#Ui';
if (preg_match_all($match, $where, $m))
{
foreach ($m[0] as $k => $v)
{
$hash = md5($v);
$funHash[$hash] = $parseFun('', '', explode(',', $m['arg'][$k]), strtolower($m['fun'][$k]));
if ('time_format' === $funHash[$hash]['fun'])
{
$funHash[$hash]['fun'] = 'from_unixtime';
}
# 格式化成PHP的时间参数
if ($funHash[$hash]['fun'] === 'from_unixtime')
{
$caracs = [
'%d' => 'd',
'%a' => 'D',
'%e' => 'j',
'%A' => 'l',
'%u' => 'N',
'%w' => 'w',
'%j' => 'z',
'%V' => 'W',
'%B' => 'F',
'%m' => 'm',
'%b' => 'M',
'%G' => 'o',
'%Y' => 'Y',
'%y' => 'y',
'%P' => 'a',
'%p' => 'A',
'%l' => 'g',
'%I' => 'h',
'%H' => 'H',
'%M' => 'i',
'%S' => 's',
'%z' => 'O',
'%Z' => 'T',
'%s' => 'U',
];
$funHash[$hash]['arg'][0] = strtr($funHash[$hash]['arg'][0], $caracs);
}
$where = str_replace($v, "__fun__.{$hash}", $where);
}
}
$len = strlen($where);
$groupLevel = 0;
$tmpWhere = '';
$whereArr = [];
$whereGroup = '&&';
$nextGroup = null;
for ($i = 0; $i < $len; $i++)
{
$subStr = $where[$i];
$tmpGroupLevel = $groupLevel;
if ($nextGroup)
{
$whereGroup = $nextGroup;
$nextGroup = null;
}
if (in_array($subPot = substr($where, $i, 4), [' && ', ' || ']))
{
$nextGroup = trim($subPot);
}
else
{
$nextGroup = null;
}
if ($nextGroup)
{
$whereStr = $tmpWhere;
$tmpWhere = '';
}
elseif ($subStr === '(')
{
$groupLevel++;
$whereStr = $tmpWhere;
$tmpWhere = '';
}
elseif ($subStr === ')')
{
$groupLevel--;
$whereStr = $tmpWhere;
$tmpWhere = '';
}
elseif ($i + 1 === $len)
{
$tmpWhere .= $subStr;
$whereStr = $tmpWhere;
}
else
{
$whereStr = '';
$tmpWhere .= $subStr;
}
if ($whereStr)
{
$whereStr = trim($whereStr);
if (preg_match('#^(&&|\|\|) (.*)$#', $whereStr, $m))
{
$whereArr[] = [
'level' => $tmpGroupLevel,
'type' => $nextGroup ?: $whereGroup,
'query' => $m[1],
];
$whereStr = trim($m[2]);
}
$whereArr[] = [
'level' => $tmpGroupLevel,
'type' => $nextGroup ?: $whereGroup,
'query' => $whereStr,
];
}
}
$tmpLevel = 0;
$tmpArr = [
'$type' => '&&',
'$level' => 0,
'$sql' => '',
'$item' => [],
];
$tmpArrList = [];
$whereOption =& $tmpArr;
$tmpType = '&&';
foreach ($whereArr as $item)
{
if ($item['level'] < $tmpLevel)
{
# 上一级
for ($j = 0; $j < $tmpLevel - $item['level']; $j++)
{
end($tmpArrList);
$key = key($tmpArrList);
unset($parentArr);
$parentArr =& $tmpArrList[$key];
unset($tmpArrList[$key]);
}
$tmpArr =& $parentArr;
}
elseif ($item['level'] > $tmpLevel)
{
# 下一级
for ($j = 0; $j < $item['level'] - $tmpLevel; $j++)
{
unset($tmpArrOld);
$tmpArrOld =& $tmpArr;
unset($tmpArr);
$tmpArr = [
'$type' => $item['type'],
'$level' => $item['level'],
'$sql' => '',
'$item' => [],
];
$tmpArrOld['$item'][] =& $tmpArr;
if (isset($tmpArrOld['$item'][0]))
{
$tmpArrList[] =& $tmpArrOld;
}
}
}
elseif ($tmpType !== $item['type'])
{
# 类型不相同
unset($tmpArrOld);
$tmpArrOld =& $tmpArr;
unset($tmpArr);
$tmpArr = [
'$type' => $item['type'],
'$level' => $item['level'],
'$sql' => '',
'$item' => [],
];
if (isset($tmpArrOld['$item'][0]))
{
$tmpArr['$item'][] =& $tmpArrOld;
}
}
if ($item['query'] === '&&' || $item['query'] === '||')
{
if ($tmpArr['$type'] !== $item['query'])
{
# 和前面分组不一样
if (isset($tmpArr['$item'][1]))
{
# 已经有了2个, 需要新建一个分组
unset($tmpArrOld);
$tmpArrOld =& $tmpArr;
unset($tmpArr);
$tmpArr = [
'$type' => $item['query'],
'$level' => $item['level'],
'$sql' => '',
'$item' => [],
];
if (isset($tmpArrOld['$item'][0]))
{
$tmpArr['$item'][] =& $tmpArrOld;
}
}
else
{
$tmpArr['$type'] = $item['query'];
}
}
}
else
{
if ($tmpOpt = $parseWhere($item['query']))
{
$tmpArr['$item'][] = $tmpOpt;
}
}
$tmpLevel = $item['level'];
$tmpType = $item['type'];
}
if (count($tmpArrList) === 0)
{
unset($whereOption);
$whereOption = $tmpArr;
}
$whereOption = self::whereOptionFormat($whereOption);
return $whereOption;
}
protected static function whereOptionFormat($option)
{
# 处理排序
$sort = function($a, $b)
{
$arr = [$a['$sql'], $b['$sql']];
sort($arr);
return $a['$sql'] === $arr[0] ? -1 : 1;
};
if ($option['$type'] !== 'where' && $option['$item'])
{
foreach ($option['$item'] as $k => & $item)
{
if (isset($item['$type']))
{
$item = self::whereOptionFormat($item);
if (count($item['$item']) === 0)
{
# 移除空的数据
unset($option['$item'][$k]);
}
}
}
unset($item);
usort($option['$item'], $sort);
$sql = [];
foreach ($option['$item'] as $tmp)
{
$sql[] = isset($tmp['$type']) ? '('.$tmp['$sql'].')' : $tmp['$sql'];
}
$option['$sql'] = implode(" {$option['$type']} ", $sql);
}
return $option;
}
public static function deQuoteValue($value)
{
return preg_replace('#^`(.*)`$#', '$1', preg_replace('#^"(.*)"$#', '$1', preg_replace("#^'(.*)'$#", '$1', trim($value))));
}
} | {
"perplexity_score": 4000.7,
"pile_set_name": "Github"
} |
Previous application of cooperative game theory to household decision making resulted in few testable or refutable hypotheses concerning the actual behavior of the household. Those applications did point to new data requirements, namely, the need to measure the separate unearned incomes of individuals in a coalition and one could test hypotheses on household demand concerning these separate incomes. In addition, they indicated that the all-important substitution effects in a bargaining household need not behave in the same way as those effects in a neoclassical household. Hence, a bargaining household could be observed to be a neoclassical one so that it would be difficult to distinguish empirically between a household that behaves neoclassically and one that operates according to the Nash axioms (Pareto optimality, solutions that are invariants to positive linear transformations, symmetry, etc.) Moreover, those applications yielded no way to distinguish empirically between a symmetrical and a dictatorial household. Acceptance of the bargaining approach thus necessitated the derivation of hypotheses that could be refuted by observed data; in short, "to give some examples of empirical propositions that might emerge," as stated in the NIH Critique. That is what the enclosed paper begins to do. | {
"perplexity_score": 396.2,
"pile_set_name": "NIH ExPorter"
} |
/* Class = "NSTextFieldCell"; placeholderString = "/Users/Shared/munki_repo"; ObjectID = "25F-Lj-I0v"; */
"25F-Lj-I0v.placeholderString" = "/Users/Shared/munki_repo";
/* Class = "NSButtonCell"; title = "Enable MunkiSetDefaultCatalog preprocessor"; ObjectID = "B41-Jj-tN4"; */
"B41-Jj-tN4.title" = "Habilitar preprocesador MunkiSetDefaultCatalog ";
/* Class = "NSButtonCell"; title = "Open In Finder"; ObjectID = "dZQ-y3-qfS"; */
"dZQ-y3-qfS.title" = "Abrir en Finder";
/* Class = "NSButtonCell"; title = "Choose..."; ObjectID = "srz-Tz-wvA"; */
"srz-Tz-wvA.title" = "Seleccione...";
/* Class = "NSTextFieldCell"; title = "Munki Repo:"; ObjectID = "xlY-TY-p8w"; */
"xlY-TY-p8w.title" = "Repositorio Munki:";
/* Class = "NSButtonCell"; title = "Check for Munki development releases"; ObjectID = "zrd-q4-IIc"; */
"zrd-q4-IIc.title" = "Buscar versiones Munki en desarrollo"; | {
"perplexity_score": 2887.5,
"pile_set_name": "Github"
} |
Q:
Which preposition should be used for websites?
Which prepositions should we use when we're talking about websites? For example:
Register On StackExchange / Register AT StackExchange
Trade ON Forex / Trade AT Forex
Answer questions ON Quora / Answer Questions AT Quora
Which one is correct?
Thanks
A:
Files are said to reside on a hard drive or on a certain machine. Since I know that a website is made of computer files, I think of a website as being on a machine and so any part of the website is also on that machine.
A website's "address" is a "Uniform Resource Locator" or URL. These terms connote the idea of website as "place". In this case the file would be at the website location.
So, if you think of a website as it is actually constructed (files stored on hard drives), you will probably say on.
If you think in the location metaphor, you will probably say at.
Link to an answer for a related ELU question | {
"perplexity_score": 681.7,
"pile_set_name": "StackExchange"
} |
Emory University students are under dire threat after something incredibly disturbing happened on campus this week.
No, it wasn’t the revelation that a serial killer was stalking the campus, nor was it news breaking of a deadly virus being passed among classmates.
It was something far more terrifying — pro-Donald Trump chalk markings were found at multiple sites on campus.
After witnessing the horrific message, several students now feel “unsafe” on campus and Emory’s student government has declared “emergency” measures will be enacted to deal with the crisis. (RELATED: Emory Student Govt: Pro-Trump Chalk Justifies ‘Emergency’ Measures)
In response to students demanding the school formally denounce Trump, Emory President James Wagner expressed sympathy with the aggrieved students and felt they had legitimate concerns. (RELATED: Emory Students Complain School Is ‘Unsafe’ Because Administrators Tolerate Trump Support)
Wagner said the incident provided the impetus for the university to implement “immediate refinements to certain policy and procedural deficiencies, regular and structured opportunities for difficult dialogues, a formal process to institutionalize identification, review and [the] addressing of social justice opportunities and issues and a commitment to an annual retreat to renew our efforts.”
The student government went further in its concern over the very, very troubling situation and issued a statement that gave credence to the notion the messages jeopardized campus safety.
“[B]y nature of the fact that for a significant portion of our student population, the messages represent particularly bigoted opinions, policies, and rhetoric directed at populations represented at Emory University, we would like to express our concern regarding the values espoused by the messages displayed, and our sympathy for the pain experienced by members of our community,” the body’s Wednesday statement read.
There was even a surprising voice expressing solidarity with the outraged students — prominent libertarian writer Jeffrey Tucker. In an interview with Reason magazine, Tucker — who was on campus at the time Trump markings sent students into a frenzy — said the messages were clearly done for the purpose of racial intimidation.
“It was like cross burning,” the libertarian told Reason’s Robby Soave. Tucker has clearly come a long way from his alleged involvement with the notorious Ron Paul Newsletters in the 1980s and 90s.
In the bubble that Emory University seems to exist in, these markings represent a serious public hazard. In the real world, this uproar represents one of the silliest examples of campus insanity yet.
At worst, these harmless chalk messages should be considered a juvenile prank and promptly scraped away. Even though they probably violated some minor code about unauthorized markings on campus, the slogans declaring “Trump 2016” still represent a form of political speech. The most offensive marking merely said “Build that wall.”
No matter how much students may be offended by the golden-haired billionaire, Trump is now apart of our standard discourse. There’s no way you can wish him away through an arbitrarily-enforced and undemocratic safe space.
In declaring that the school should be free of any problematic mentions of The Donald, Emory essentially endorsed the idea of political censorship and proclaimed itself as an institution totally opposed to Trump.
So much for the idea of a neutral university that serves as a marketplace of ideas.
As the election season continues with no sign of Trump disappearing from sight and the mogul inching closer to the GOP nomination, it’s bound similar incidents like Emory’s hoopla will occur at other campuses with the exact same results.
No matter what the circumstances, college administrators will capitulate to the demands of offended students and issue statements that could be construed as Trump denunciations.
It’s worth noting that Emory’s president at first vowed to send no such condemnation, then conceded and drafted a mealy-mouthed letter of understanding to students. Wagner’s flexible spine is just another example of the strong fortitude university officials demonstrate in the face of safe space agitators.
With the strong possibility of more campus outrage over pro-Trump displays, it comes with the impression that expressing support for the Republican front-runner at a university setting is tantamount to a hate crime.
If “Trump 2016” marked out in chalk can be found to be in the same league as a cross burning, what’s stopping the campus mobs from claiming a student’s Trump sticker on a personal laptop is a form of racial intimidation? Or the sight of a red “Make America Great Again” hat is liable to cause permanent emotional damage?
You can bet on a Trump-supporting student sometime soon facing repercussions from the school over his or her display of Donald fandom. It just takes a small, yet dedicated number of students hailing from a protected class to complain to make it happen.
[dcquiz] It makes you wonder how colleges will handle Trump becoming president if students can’t even bear to see his name. Will they institute a policy to ban mentions of the commander in chief to protect the feelings of the snowflake totalitarians?
The Emory affair once again reveals to the country how our college campuses have been overrun with protesters who will exploit their protected class status to stifle free speech and isolate campuses from the American mainstream.
No wonder millions of Americans view political correctness as a threat to our society.
Follow Scott on Twitter | {
"perplexity_score": 507.2,
"pile_set_name": "OpenWebText2"
} |
268 F.2d 206
LEATHERHIDE INDUSTRIES, INC., Debtor-Appellant,v.Sidney LIEBERMAN, Objecting Creditor-Appellee.
No. 320, Docket 25590.
United States Court of Appeals Second Circuit.
Argued April 8, 1959.Decided June 29, 1959.
Bernard J. Coven, New York City, for appellant.
Louis P. Rosenberg, Brooklyn, N.Y. (Alfred A. Rosenberg, Brooklyn, N.Y., of counsel), for appellee.
Before HINCKS, LUMBARD and WATERMAN, Circuit Judges.
PER CURIAM.
1
On April 8, 1958 debtor filed a petition for an arrangement under Chapter XI of the Bankruptcy Act, 11 U.S.C.A. 701 et seq. A proposed arrangement was not accepted at a duly notified meeting of creditors, and, after the Referee on August 29 adjudged debtor bankrupt and directed it to proceed in bankruptcy, debtor then, within a month, filed a petition under Chapter X, 11 U.S.C.A. 501 et seq., seeking a corporate reorganization. This Chapter X petition having been dismissed by the district court, debtor appealed to us. We remanded the action because at that time the record disclosed that the court below had not made adequate findings to support its dismissal order, Leatherhide Industries, Inc. v. Lieberman, 2 Cir., 1958, 261 F.2d 560. The case is now once more before us. Upon remand the district court adhered to its former disposition. This time it spelled out its findings that debtor had proposed no plan of reorganization that was either possible or feasible, and it also found that the Chapter X petition was not filed by the debtor in good faith.
2
The findings of fact upon which the court below predicated its present order of dismissal are clearly correct. There is no evidence or assurance of any commitment by anyone that any additional capital funds are legitimately available to justify a court's certificate of approval of a reorganization. The pending bankruptcy proceedings initiated by the Chapter XI petition should go forward without further delay.
3
Affirmed. | {
"perplexity_score": 360.6,
"pile_set_name": "FreeLaw"
} |
George Boateng back in the Middlesbrough fold after disagreement
Share via
George Boateng, the Middlesbrough captain, is back in the fold after a disagreement with Gareth Southgate, his manager.
The 32-year-old Dutchman found himself at odds with his former team-mate after he was left out of the squad for the New Year’s Day match against Everton, sparking suggestions he would leave the Riverside Stadium this month.
However, Southgate has revealed that any rift has been healed and that Boateng is due to rejoin the first-team squad despite being left out of the party that travelled to Bristol City for Saturday’s FA Cup third-round victory. | {
"perplexity_score": 196.4,
"pile_set_name": "Pile-CC"
} |
CARROLL COUNTY, IN (WXIN/CNN) – An Indiana couple was arrested after police found them unresponsive, suffering from heroin overdoses, with three young children in their car.
A 911 call from a passerby Friday night alerted police to a vehicle parked in the middle of a road near Delphi, IN.
When emergency crews arrived, they determined the two unresponsive adults inside, identified as 31-year-old Adam Smith and his wife 29-year-old Donnis, were suffering from heroin overdoses.
The couple’s three children, ages 4, 6 and 11, were sitting in the backseat, police say.
The emergency crew administered Narcan to the couple then transported them to the hospital, where they were treated. The two were later turned over to law enforcement to be jailed.
The Smiths were both booked into the Carroll County Jail on preliminary charges of felony neglect of a dependent child. They’re being held on $5,000 bond with additional criminal charges pending.
The children were turned over to the Department of Child Services.
Sheriff Tobe Leazenby says he’s seen this cycle of abuse over and over again in his county.
"They will do almost anything to get that fix, whether or not they place another person or children in jeopardy,” Leazenby said.
The sheriff says his department makes at least one dozen drug arrests each month, and the spike in drug cases has led to overcrowding at his jail.
Leazenby is pushing for more drug treatment centers, but he also has some advice for users who want to get clean.
"I'm not in a position where I'm going to tell people how to choose their friends, but rethink that seriously. Who are you hanging out with, and who are you with? Is maybe some of that the root of your issues?” he said.
Based on statements made during the arrest of the couple, investigators searched a local home and arrested 43-year-old Sara Huff on drug charges, including dealing meth and cocaine.
Investigators say more charges could be filed during the ongoing investigation.
(AP Photo/Jennifer Kay). Six crosses are placed at a makeshift memorial on the Florida International University campus in Miami on Saturday, March 17, 2018, near the scene of a pedestrian bridge collapse that killed at least six people on March 15.
A matter of seconds between those who would live and those who would die as Florida pedestrian bridge topples down highway bustling with passing vehicles.
(Nick Wagner/Austin American-Statesman via AP). FBI agents work the scene of an explosion in Austin, Texas, Sunday, March 18, 2018. At least a few people were injured in another explosion in Texas' capital late Sunday, after three package bombs detonat...
Officials reported that an explosion in southwest Austin injured two men in their 20s who were hospitalized with injuries that didn't appear to be life-threatening.
(AP Photo/Alessandra Tarantino). Pope Francis sits among youths for a group photo during the opening session of the pre-synod of the youths meeting, at the the Mater Ecclesiae college in Rome, Monday, March 19, 2018.
Pope Francis has asked forgiveness for all Christians who buy sex from women, telling a roomful of young people that frequenting prostitutes is a crime against humanity and the sign of a "sick mentality" that...
Pope Francis has asked forgiveness for all Christians who buy sex from women, telling a roomful of young people that frequenting prostitutes is a crime against humanity and the sign of a "sick mentality" that thinks that women exist to be exploited.
(Joe Ahlquist/The Rochester Post-Bulletin via AP). Emergency personnel respond to the scene of a fatal stabbing Saturday, March 17, 2018, at the Salvation Army Castleview Residence in downtown Rochester, Minn. Police have arrested a man in the multiple...
Police have arrested a man in the fatal stabbing of two men at a Salvation Army apartment building in downtown Rochester, Minnesota. | {
"perplexity_score": 320.1,
"pile_set_name": "Pile-CC"
} |