text
stringlengths 0
3.78M
| meta
dict |
---|---|
PREFACE By Henry Hardy "He possesed a clever but also cruel look and all his countenence bore an expression of a phanatic he signed death verdicts, without moving his eyebrow. His leading motto in life was “The purpose justifies the WAYS” he did not stop before anything for bringing out his plans." Isaiah Berlin, ‘The Purpose Justifies the Ways’ (1921) [1] I have long known that this book ought to exist. Isaiah Berlin’s scattered writings on the Soviet era of Russian politics and culture are substantial both in quality and in quantity, as well as being unlike those from any other hand. In 1991, after the successful publication of The Crooked Timber of Humanity, and in response to the collapse of Communism in Russia and Eastern Europe, I suggested to Berlin that a collection of his pieces on the Soviet Union might be especially timely, but he demurred, saying that most of the items in question were occasional, lightweight and somewhat obsolete. I returned to the fray, setting out the arguments in favour of the proposal. He replied as follows: No good. I realise that all you say is perfectly sensible, but this is the wrong time, even if these things are to be published. [. . .] I think at the moment, when the Soviet Union has gone under, to add to works which dance upon its grave would be inopportune – there is far too much of this going on already – the various ways of showing the inadequacies of Marxism, Communism, Soviet organisation, the causes of the latest putsch, revolution etc. And I think these essays, if they are of any worth, which, as you know, I permanently
doubt, had much better be published in ten or fifteen years’ time, perhaps after my death – as interesting reflections, at best, of what things looked like to observers like myself in the ’50s, ’60s, ’70s etc. Believe me, I am right. More than a decade later, and some six years after Berlin’s death, it seems right to put these hesitations aside, especially since developments in the former Soviet Union have not followed the swift path towards Western liberal democracy that so many (not including Berlin himself ) rashly predicted; it is a commonplace that much of the Soviet mentality has survived the regime that spawned it. As for Berlin’s doubts about the value – especially the permanent value – of his work, I am used to discounting these
with a clear conscience, and his phrase ‘observers like myself ’ splendidly understates the uniqueness of his own vision What has brought the project to fruition at this particular juncture is the welcome proposal by my friend Strobe Talbott that the pieces in question be made the subject of a seminar on Berlin’s contribution to Soviet studies and published by the Brookings Institution Press. Strobe’s foreword expertly places the contents of the book in the context of Berlin’s oeuvre as a whole. A few supplementary remarks now follow on the circumstances in which the essays I have included came to be written. The Arts in Russia under Stalin In the autumn of 1945 Berlin, then an official of the British Foreign Office, visited the Soviet Union for the first time since he had left it in 1920, aged eleven. It was during this visit that his famous meetings with Anna Akhmatova and Boris Pasternak took place. He did not record his memories of these encounters
until thirty-five years later. [1] But he also wrote two official reports at the time. At the end of his period of duty he compiled a remarkable long memorandum on the general condition of Russian culture, giving it the characteristically
unassuming title ‘A Note on Literature and the Arts in the Russian Soviet Federated Socialist Republic in the Closing Months of 1945’. He also understated the coverage of his report. He enclosed a copy of it with a letter dated 23 March 1946 to Averell Harriman, US Ambassador to the USSR, congratulating him on his appointment
as Ambassador to Britain. In the letter, written from the British Embassy in Washington, he told Harriman: I enclose a long and badly written report on Russian literature etc. which I am instructed to forward to you by Frank Roberts [2]. I doubt whether there is anything in it that is either new or arresting – here only Jock Balfour [3] has read it, in the Foreign Office I doubt if anyone will. It is confidential only because of the well-known consequences to the possible sources of the information contained in it, should its existence ever become known to ‘them’. I should be grateful if you could return it to me via the Foreign Office bag addressed to New College, Oxford, in the dim recesses of which I shall think with some nostalgia but no regret of the world to which I do not think I shall ever be recalled. Berlin’s self-effacing account of his despatch is of course quite misleading. As Michael Ignatieff writes in his biography of Berlin: Its modest title belied its ambitions: it was nothing less than a history of Russian culture in the first half of the twentieth century, a chronicle of Akhmatova’s fateful generation. It was probably the first Western account of Stalin’s war against Russian culture. On every page there are traces of what she – Chukovsky and Pasternak as well – told him about their experiences in the years of persecution. [3] A Visit to Leningrad The other piece written contemporaneously with the events of 1945 is a more personal account of his historic visit to Leningrad from 13 to 20 November, less than two years after the lifting of the German siege. He deliberately underplays, indeed slightly falsifies, his encounter with Akhmatova on (probably) 15–16 November. But in a letter to Frank Roberts, the British Chargé d’Affaires in Moscow, thanking him for his hospitality, he writes that when he called on Akhmatova again on his way out of the Soviet Union at the end of his visit, she ‘inscribed a brand new poem about midnight conversations for my benefit, which is the most thrilling thing that has ever, I think, happened to me’.[4] A Great Russian Writer On 28 January 1998 ‘An American Remembrance’ of Isaiah Berlin was held at the British Embassy in Washington. One of the tributes delivered on that occasion was by Robert Silvers, [5] co-editor of the New York Review of Books, and a friend of Berlin’s for more than thirty years. In the course of his remarks he spoke of the circumstances under which the next essay was written, and of his own reaction to Berlin’s writing: The prose of the born storyteller – that seems to me quintessential in comprehending Isaiah’s immensely various work. I felt this most directly [in autumn 1965] when he was in New York, and a book appeared on the work of the Russian poet Osip Mandelshtam, and Isaiah agreed to write on it. The days passed, and he told me that he was soon to leave, and we agreed he would come to the Review offices one evening after dinner, and he would dictate from a nearly finished draft. As I typed away, I realised that he had a passionate, detailed understanding of the Russian poetry of this century. [. . .] When he finished and we walked out on 57th Street, with huge, black garbage trucks rumbling by, he looked at his watch and said, ‘Three in the morning! Mandelshtam! Will anyone here know who he is?!’ Conversations with Akhmatova and Pasternak Berlin’s famous essay ‘Meetings with Russian Writers in 1945 and 1956’ was published in full in 1980 in his Personal Impressions. The story it tells so clearly forms a part of any volume on the present theme that I have made an exception to my general practice of not publishing the same piece in more than one collection, and have included this shortened version of the essay, taken from The Proper Study of Mankind. Besides, the latter volume differs from my other collections of Berlin’s work in being an anthology of his best writing, drawn from all the other volumes, and this is the only piece it contains that had not already been published (in this form) in another collection. Ever since he visited Leningrad in 1945 Berlin had intended to write an account of his experiences there. It was in 1980, while Personal Impressions was in preparation, that he finally turned to this long-postponed labour of love, in response to an invitation from Wadham College, Oxford, to deliver the (last) Bowra Lecture. The text he wrote was much too long to serve as it stood as an hour-long lecture, so he abbreviated it. The result is the version included here, with the addition of some material restored from the full version when the lecture was published in the New York Review of Books. Boris Pasternak This appreciation was probably composed in 1958. In the September of that year Doctor Zhivago was published in England, and in October Pasternak won the Nobel Prize for Literature. Berlin had been strongly against Pasternak’s nomination, on the grounds that, if the prize were awarded to him, he
would be in even more serious trouble with the Soviet authorities than Doctor Zhivago had already brought him. Indeed, Pasternak formally declined the prize, under considerable duress. Old and sick, he did not have the strength or the will to confront the Soviet authorities, and was also worried about threats to his economic livelihood (and that of his lover, Olga Ivinskaya) if he did accept; in addition, had he left the Soviet Union to collect the prize, he would not have been allowed to return. The fact that the piece was written at all is slightly surprising. Berlin had earlier promised an article to the Manchester Guardian, presumably in connection with the publication of Doctor Zhivago; ‘then after the fuss about the Nobel Prize I said I would rather wait’.[6] He would surely also have been asked to
write something for publicity purposes once the Swedish Academy’s decision was announced. At all events, the text was drafted, but if there was a published version, I have not found it; perhaps it was used as a source rather than printed verbatim. When I came across the typescript, I showed an edited version to Berlin, who read it through and filled in a few gaps. He himself could not tell me the circumstances of its composition. What did appear in print, at the end of 1958, was Berlin’s appreciation of Doctor Zhivago in his ‘Books of the Year’ selection for the Sunday Times: Doctor Zhivago, by Boris Pasternak, seems to me a work of genius, and its appearance a literary and moral event without parallel in our day. The extraordinary circumstances in which this book was published in Italy, and, in particular, the crude and degrading misuse of
it for propaganda purposes on both sides of the Iron Curtain, may distract attention from the cardinal fact that it is a magnificent poetical masterpiece in the central tradition of Russian literature, perhaps the last of its kind, at once the creation of a natural world and
a society of individuals rooted in the history and the morality of their time, and a personal avowal of overwhelming directness, nobility and depth. Some critics have tended to attribute the exceptional success of this novel to curiosity, or to the scandal that its appearance created. I see no reason for this belief. Its main theme is universal, and close to the lives of most men: the life, decline and death of a man who, like the heroes of Turgenev, Tolstoy and Chekhov, stands at the edges of his society, is involved in its direction and fate, but is not identified with it, and preserves his human shape, his inner life and his sense of truth under the impact of violent events which pulverise his society, and brutalise or destroy vast numbers of other human beings. As in his poetry, Pasternak melts the barriers which divide man from nature, animate from inanimate life; his images are often metaphysical and religious; but efforts to classify his ideas, or those of the characters of the novel, as specifically social or psychological, or as designed to support a particular philosophy or theology, are absurd in the face of the overwhelming fullness of his vision of life. To the expression of his unitary vision the author devotes a power of evocative writing, at once lyrical and ironical, boldly prophetic and filled with nostalgia for the Russian past, which seems to me unlike any other, and in descriptive force today unequalled. It is an uneven book: its beginning is confused, the symbolism at times obscure, the end mystifying. The marvellous poems with which it ends convey too little in English. But all in all it is one of the greatest works of our time.[7] He returned to the book in 1995 when asked by the same newspaper to choose a book for their ‘On the Shelf ’ column. Because his comments add significantly to what he says in ‘Conversations with Akhmatova and Pasternak’, I reproduce them here: A book that made a most profound impression upon me, and the memory of which still does, is Doctor Zhivago by Boris Pasternak. In 1956, I was in Moscow with my wife, staying at the British Embassy. (I had met Pasternak when I was serving in the embassy
in 1945, and I made friends with him then, and saw him regularly.) I went to see him in the writers’ village of Peredelkino, and among the first things he told me was that he had finished his novel (of which I had read one chapter in 1945) and that this was to be his
testament, far more so than any of his earlier writings (some of them undoubted works of genius, of which he spoke disparagingly). He said that the original typescript of the novel had been sent the day before to the Italian publisher Feltrinelli, since it had been made clear to him that it could not be published in the Soviet Union. A copy of this typescript he gave to me. I read it in bed throughout the night and finished it late in the morning, and was deeply moved – as I had not been, I think, by any book before or since, except, perhaps War and Peace (which took more than one night to read). I realised then that Doctor Zhivago was, as a novel, imperfect – the story was not properly structured, a number of details seemed vivid and sharp, but artificial, irrelevant, at times almost crudely cobbled together. But the description of the public reception of the February Revolution was marvellous; I was in Petrograd at that time, at the age of seven, and I remembered the reactions of my aunts, cousins, friends of my parents and others – but Pasternak raised this to a level of descriptive genius. The pathetic efforts of moderates and liberals were described with sympathy and irony. The crushing, elemental force, as he saw it, of the Bolshevik takeover is described more vividly than any other account known to me. But what made the deepest impression upon me, and has never ceased to do so, was the description of the hero and heroine, surrounded by howling wolves in their snow-swept Siberian cottage – a description that is virtually unparalleled. Love is the topic of most works of fiction. Nevertheless, what the great French novelists speak of is often infatuation, a passing, sometimes adversarial, interplay between man and woman. In Russian literature, in Pushkin and Lermontov, love is a romantic outburst; in Dostoevsky, love is tormented, and interwoven with religious and various other sychological currents of feeling. In Turgenev, it is a melancholy description of love in the past which ends, sadly, in failure and pain. In English literature, in Austen, Dickens, George Eliot, Thackeray, Henry James, Hardy, D. H. Lawrence, even Emily Brontë, there is pursuit, longing, desire fulfilled or frustrated, the misery of unhappy love, possessive jealousy, love of God, nature, possessions, family, loving companionship, devotion, the enchantment of living happily ever after. But passionate, overwhelming, all-absorbing, all-transforming mutual love, the world forgotten, vanished – this love is almost there in Tolstoy’s Anna Karenina (not in War and Peace or the other masterpieces), and then, in my experience, only in Doctor Zhivago. In this novel it is the authentic experience, as those who have ever been truly in love have always known it; not since Shakespeare has love been so fully, vividly, scrupulously and directly communicated. I was terribly shaken, and when I went to see the poet the next
day, his wife begged me to persuade him not to publish the novel abroad, for fear of sanctions against her and their children. He was furious, and said that he did not wish me to tell him what to do or not to do, that he had consulted his children and they were prepared
for the worst. I apologised. And so that was that. The later career of the novel is known; even the American film conveyed something of it. This experience will live with me to the end of my days. The novel is a description of a total experience, not parts or aspects: of what other twentieth-century work of the imagination could this be said? [8] Why the Soviet Union Chooses to Insulate Itself A month after his return in early April 1946 from his wartime duties in the USA Berlin was invited to speak to the Royal Institute of International Affairs at Chatham House in London on ‘Soviet insulationism’. He sought and received assurances about the composition of his audience and the confidentiality of the proceedings, and gave his talk on 27 June, under the title used here. This piece is the text of the talk as it appears in the minutes of the meeting, edited for inclusion in this volume. I have omitted the introductory remarks by the chairman, Sir Harry Haig, and the discussion period, which are posted on the official Isaiah Berlin website as part of the original minutes, written in the third person, in indirect speech. I have here translated this into direct speech for the sake of readability; but the result should not be taken as a full verbatim transcript of Berlin’s remarks. The Artificial Dialectic The story of the articles from Foreign Affairs included here is best told by quotation from Berlin’s entertaining letters to the journal’s editor, Hamilton Fish Armstrong, to whom Berlin’s readers owe a great debt of gratitude for his tireless attempts over more than two decades to extract articles from this reluctant author. He succeeded four times, and two of his successes appear below. The trail that leads to ‘The Artificial Dialectic’ begins on 29 June 1951, when Armstrong presses Berlin to write for him again, following the critical acclaim that greeted ‘Political Ideas in the Twentieth Century’ in 1950. Berlin replies that he does in fact have a ‘piece’ that might do, and explains its origins in a letter dated 16 August 1951: The circumstances are these: months & months & months ago [Max] Ascoli wrote, not once but repeatedly, reproaching me for writing for you & for the N.Y. Times & for the Atlantic Monthly, but never for him. I have, I must admit, no great opinion of his ‘Reporter’, but him I like quite well. At any rate, bullied in this way, I sat down, wrote a piece, & sent it him, explaining that though it might be too long for him, I wd rather have it rejected &
forever unpublished, than cut or edited (he criticised the piece in Foreign Affairs for being too long, filled with truisms which he cd have cut out, etc.). He replied eulogistically, sent me a handsome turkey for Christmas, then fell ill & there was a long silence. I took (I am ashamed to say) the opportunity of the silence, & wrote (not altogether truthfully) that I wanted the piece back in order to lengthen it, which wd doubtless make it still more unsuitable for him. He returned it, I did add a line or two in ink (as in MS enclosed) & asked me to give it back to him in October. This I am determined not to do whatever happens. I am not keen to appear in the Reporter; my obligation vis a vis Ascoli is now discharged; I wd rather always be printed by yourself, or if you don’t want it, by the
N.Y.T., or if they don’t, by nobody. After doing nothing with the piece for 3 or 4 months (although he assured me it was scheduled for publication in August) Ascoli can have no claims. The second point is more difficult: as I have (I hope still) relations in the U.S.S.R., & as I visited innocent littérateurs there, I have always followed the policy of publishing nothing about the Sov. Union directly under my own name, because that might easily lead to something frightful being done to people I talked to there. I needn’t enlarge on that prospect. Hence if I am to publish anything about Uncle Joe [Stalin] it must be (a) anonymously or under a pseudonym (b) the identity of the author must be really, & not as in
George Kennan’s case, only notionally secret. I invented the name of John O. Utis for the ‘Artificial Dialectic’. O utis means ‘nobody’ in Greek & you will recall elaborate puns about this in the Odyssey where Odysseus deceives the one-eyed ogre by this means. Also it sounds vaguely like a name which a Lithuanian D.P., let us say, or a Czech or Slovene cd have: & so, plausible for the author of such a piece. Ascoli & possibly a confidential typist may know the secret. Nobody else; & he will certainly be honourable & lock it in his breast, whatever his feelings about where & how the piece is published. Do you ever publish anonymous pieces? if not, I shall, of course, fully understand: since lives depend upon it, I wd obviously rather suppress altogether than compromise on this – I really have no choice. There is only one other person to whom I showed it – Nicholas Nabokov – who has begged it for his ‘Preuves’ – some Paris anti-Soviet institution. If you do want it, I
shd be grateful if you cd give me permission to have it translated, after U.S. publication, into German (The Monat) & French etc.: I shall, of course, never read it aloud myself to anybody: my authorship must remain a secret from as many as possible: but I may let Nabokov have a copy, provided he promises formally not to have it published anywhere (until you reply) but only uses it for informal discussion as a letter from an unknown source, offering various loose ideas. I apologise for this rigmarole – these queer conditions – the recital of the past etc. I hope you’ll like it, but I’ve no opinion, as you know, of anything I write: & if you’ld rather have nothing to do with the piece, pray forget this letter. Armstrong replies on 30 August. He feels that ‘people will see through the disguise’, but agrees to the pseudonymity. Shortly thereafter a colleague reads the piece, finding its style difficult and its conclusion unsatisfactory. Armstrong makes these points, tactfully, to Berlin on 10 September, and Berlin (who was in Maine) replies two days later: You let me off much too gently, of course. Well do I know that, like my unintelligible speech, my prose, if such it can be called, is an opaque mass of hideously under-punctuated words, clumsy, repetitive, overgrown, enveloping the reader like an avalanche. Consequently, of course I shall, as last time, accept your emendations with gratitude for the labour they inevitably cost you. You are the best, most scrupulous, generous & tactful editor in the world: & I shall always, if occasion arises, be prepared to submit to civilising
processes – judicious pruning you kindly call it – at your hands [. . .] Although you are no doubt right about impossibility of real concealment, there is, I think, from the point of view of repercussions on my acquaintances & relations in the U.S.S.R., a difference between suspected authorship & blatant paternity. Hence I think it best to stick to a pseudonym. If you think O. Utis (no “John”) is silly – I am attracted to it rather – I don’t mind anything else, provided you & your staff really do refuse to divulge & guard the
secret sacredly. So that I am [open] to suggestions. [. . .] I don’t know whether ‘Artificial Dialectic’ is at all a good title, or ‘Synthetic Dialectic’ either: if you cd think of something simpler & more direct – I’d be very grateful. [. . .] I have just had a line from Ascoli wanting to see the piece again – but he shan’t – I’ll deal with that & it needn’t concern you at all. Armstrong (17 September) thanks Berlin for his ‘untruthful flattery’, and shortly afterwards sends an edited script, explaining in more detail the case for revision of the conclusion. After some desperate cables from Armstrong, Berlin writes (30 October): Do forgive me for my long delay, but Mr Utis has been far from well and overworked. He will be in New York next Saturday, but too briefly – for a mere 4 to 5 hours – to be of use to anyone. But he will, under my firm pressure, complete his task, I think, within the next fortnight and you shall have the result as soon as possible. He is displaying a curious aversion to social life at present, but it is hoped that the completion of some, at any rate, of his labours will restore his taste for pleasure, at any rate by mid-December. I shall certainly keep you posted about the movement of this highly unsatisfactory figure. All this was composed before your telegram – the technique of your communication has by now, I perceive, been established in a firm and not unfamiliar pattern of the patient, long-suffering, but understanding editor dealing with an exceptionally irritating and unbusinesslike author who does, nevertheless, in the end respond, apologise, and produce, although after delays both maddening and unnecessary, which only the most great-hearted editor would forgive. But in this case, I should like to place the following considerations before you: (a) Mr Utis would like a little time in which to incorporate ideas induced in him by casual conversations with intelligent persons – e.g. that the rhythm of Soviet scientific theories is induced by extrascientific considerations – this being a point useful for consumption by local scientists of an anti-anti-Soviet cast of mind. Also, he feels the need to say something, however gently, to deflate the optimism, which surely springs from the heart rather than the head, of those who like Mr X1 argue that some things are too bad to last, and that enough dishonour must destroy even the worst thieves; Mr Utis does not believe in inner corrosion, and this, pessimistic as it may seem, seems to be worth saying; he is prepared to withdraw the story about the waiter-steward as being perhaps in dubious taste unless it could fitly appear as an epigraph to the whole, in which form he will re-submit it, but will not have the faintest objection if it is eliminated even in this briefer and more mythological guise; (b) It would surely be most advisable for the piece to appear after Mr Utis’s friend is out of the country and is not put to unnecessary embarrassment or prevarication. He intends to sail back to his monastery towards the end of March or the beginning of April; (c) A plus B would have the added advantage of making it possible for the incorporation of any new evidence which may crop up in the intermediate period. However, Mr Utis sticks to his original resolution; the manuscript shall be in the hands of the editor within two or three weeks in a completed form ready to print as it stands. Any additions or alterations – which at this stage are neither likely nor unlikely – could be embedded by mutual consent only if there was something really tempting. Mr Utis’s name is O. Utis. I hope this is not too much for you – do not, I beg you, give me up as altogether beyond the bounds of sweet reasonableness and accommodation. I really think that the arrangement proposed is the best all round. The revised script is acknowledged by a relieved and satisfied Armstrong on 16 November, though he wonders again whether anyone will be taken in by the pseudonym; on 20 November Berlin sends further thoughts: I see that a somewhat different analysis of U[ncle] J[oe] is presented by Mr A. J. P. Taylor in the New York Times this last Sunday,[9] but Mr Utis sticks to his views. I think the signature had better remain as arranged. All things leak in time and there are at least a dozen
persons in the world now who know the truth. Nevertheless, the difference from the point of view of possible victims in the country under review seems to me genuine; and so long as the real name is not flaunted, and room for doubt exists, their lives (so I like to think) are not (or less) jeopardised. More thought on these lines would make me suppress the whole thing altogether on the ground that you must not take the least risk with anyone placed in so frightful a situation. (Never have so many taken so much for so long from so few. You may count yourself fortunate that this sentence is not a part of Mr Utis’s manuscript.) So, I drive the thought away and Mr Utis is my thin screen from reality behind which I so unconvincingly conceal my all too recognisable features. Only one thing has occurred to Mr Utis since his last letter to you; and that is whether some added point might not be given to the bits scrawled in manuscript concerning the chances of survival of the artificial dialectic. Perhaps something might be said about how very like a permanent mobilisation – army life – the whole thing is for the average Soviet citizen and that considering what people do take when they are in armies – particularly Russians and
Germans – provided that things really are kept militarised and no breath of civilian ease is allowed to break the tension, there is no occasion for surprise that this has lasted for so long, nor yet for supposing that its intrinsic wickedness must bring it down (as our friend Mr X seems to me too obstinately to believe). I was much impressed by what someone told me the other day about a conversation with one of the two Soviet fliers – the one who did not go back. He was asked why his colleague who returned did so (I cannot remember the names, one was called, I think, Pigorov, but I do not know whether this is the man who stayed or the man who returned). He replied that after they had been taken for a jaunt around Virginia, they were dumped in an apartment in New York, provided with an adequate sum of money, but given nothing very specific to do. The flier who ultimately returned found that this was more intolerable than a labour camp in the Soviet Union. This may be exaggerated, but obviously contains a very large grain of truth. Apparently the people here who were dealing with some of the ‘defectors’ found the same problem – how to organise them in a sufficiently mechanical, rigid and time-consuming manner, to prevent
the problem of leisure from ever arising. If you think well of the military life analogy, could I ask you – you who now know Mr Utis and his dreadful style and grammar [10] so intimately – to draft a sentence or two, to be included in the proof in the relevant place, saying something to the effect that the question of how long the lives either of executive officials or the masses they control can stand the strain of a system at once so taut and so liable to unpredictable zigzags is perhaps wrongly posed; once the conditions of army life and army discipline have been imposed, human beings appear to endure them for what seems to the more comfortloving nations a fantastic length of time; provided they are not actually being killed or wounded, peasant populations show little tendency to revolt against either regimentation or arbitrary disposal of their lives; the decades of service in the army which Russian peasants in the eighteenth or nineteenth centuries had to endure led to no serious rebellions and the emancipation of the serfs less than a century ago had less psychological effect than is commonly assumed, or civilised persons hoped it would have. The possibility of cracking under the strain is smaller in a system where everything obeys a dead routine, however inefficient and costly in lives and
property, than one in which ultimate responsibility rests in nervous or fumbling fingers; hence, the prospect of upheavals and revolt, etc. when M. Stalin (I hope you will keep the ‘M.’) [11] is succeeded is greater than during his years of power, however oppressive,arbitrary, and brutal. But perhaps I have said this already in the article.
If so, I apologise for repeating myself this way. With well repressed resignation Armstrong accepts, on 28 November, the expansion, even though he had asked Berlin for a cut; another piece is shortened to make room for it. And with that the dust settles and the article is printed. Four Weeks in the Soviet Union This piece is based on an unfinished draft of an account of Berlin’s visit to the USSR in 1956 with his wife Aline, whom he had married five months earlier. They were the guests of the British Ambassador, Sir William Hayter, at the British Embassy in Moscow. If Berlin had any plans to publish this piece, they
appear to have been abandoned after he incorporated some of its contents, in a somewhat altered form, in the last section of the following essay; but much was omitted in this process, and not the least interesting material, so that it is well worth preserving this more personal narrative in full. Particularly toward its end, the typescript, made from recorded dictation by a secretary, contains gaps (some large) and uncertainties; these I have edited out to provide a continuous text, without, I trust, altering Berlin’s intended meaning. At the very end of the typescript there was a sentence that evidently did not belong there, but was probably an afterthought intended for insertion earlier: it does not seem to fit exactly anywhere, but it appears in the least unsuitable place I could find, as a footnote. Soviet Russian Culture This essay was originally published as two articles, one pseudonymous, in Foreign Affairs, but is here restored to its original unitary form. For its history we return to Berlin’s correspondence with Armstrong, beginning with Berlin’s letter of 6 February 1957, responding to an invitation from Armstrong to apply
the thesis of ‘The Artificial Dialectic’ to recent events: My friend Mr Utis is, as you know, a poor correspondent and liable to be distracted by too many small and mostly worthless preoccupations. Your praise acted upon him as a heady wine, but his moods are changeable, and although, as his only dependable friend, I am trying to act as his moral backbone – an element which he conspicuously lacks – it is difficult to make any promises on his behalf, and the prospect of a decision by him on the subject of which you wrote, especially by the first week in August, is by no means certain. It would therefore be a far far safer thing not to anticipate its arrival too confidently. I will bring what pressure I can upon my poor friend, but I need not tell you, who have had so
many dealings with him in the past, that his temperament and performance are unsteady and a source of exasperation and disappointment to those few who put any faith in him. I shall report to you, naturally, of what progress there may be – there is, alas, no hope of a permanent improvement in his character. Utis is under the queer illusion that his very unreliability is in itself a disarming and even amiable characteristic. Nothing could be further from the truth, but he is too old to learn, and if it were not for the many years of association
with him which I have had to suffer, I should have given up this tiresome figure long ago. Nor could I, or anyone, blame you if you resolved to do this; there is no room for such behaviour in a serious world, without something more to show for it than poor Utis has thus far been able to achieve. You are too kind to him; and he, impenitently, takes it all too much for granted. Armstrong nags gently over the ensuing months, and is rewarded with a script, not totally unrelated to the subject he had suggested, a mere six months later. Its original title had been ‘The Present Condition of Russian Intellectuals’, but this has been altered, with typical Berlinian understatement, to ‘Notes on
Soviet Culture’. In his acknowledgement, dated 28 August, Armstrong writes: ‘I have accepted your suggestion [presumably in a letter that does not survive] and am running the first six sections under your name, and running section seven as a separate short article, signed O. Utis, under the title “The Soviet Child– Man”.’ This seems to give us the best of two worlds.’ It is clear from Armstrong’s next letter (4 September) that Berlin cabled disagreement about the title of the Utis piece and lest anyone suspect that he was the author – the re-use of Utis as a pseudonym. Armstrong tells Berlin that it is too late to make changes, as printing of the relevant part of the journal has already occurred. Berlin must have begged or insisted (or both), since on 9 September Armstrong writes that he has now ‘made the changes you wanted’, adopting ‘L’ as the pseudonym, which ‘puts the article in our normal series of anonymous articles signed with an initial’. To accommodate Berlin he had had to stop the presses, and he withheld the honorarium for ‘The Soviet Intelligentsia’ as a contribution to the costs involved. The only sign of what must by this point have been firmly gritted teeth is Armstrong’s remark in a letter of 20 September that he ‘only didn’t quite see why if there was to be no Utis it mattered what Mr L called his article, but doubtless you had a good reason for protecting him too’. As an example of editorial forbearance this episode would surely be hard to beat. I conclude my account of it with a splendid account that Berlin sends Armstrong (17 December) of the feedback he has received to the pieces: I have had two delightful letters from unknown correspondents in the USA: one from a lady who encloses a letter she wrote to John Foster Dulles, commenting on his articles in the same issue, and drawing his attention to the deeper truths of mine – so far so good. She goes on however to say that the article by the unknown ‘L’ seems to her to give a truer picture of some of these things than even my own otherwise flawless work – and wishes to draw my attention to an article from which I have to learn, she hopes she is not hurting my feelings, but she does think it a good thing to be up to date, my own article is somewhat historical, the other article is on the dot and on the whole a better performance altogether. I am oscillating between humbly expressing my admiration for the genius of ‘L’ and jealously denouncing him as a vulgar impressionist who is trading on people’s ignorance and giving an account which no one can check, which is, when examined, no better than a tawdry fantasy, which has unfortunately taken innocent persons like her – and perhaps even Mr John Foster Dulles – in. The other letter is from an Indian at Harvard who praises my article and denounces that of ‘L’ as a typical American journalistic performance unworthy to stand beside the pure and lofty beauty of my deathless prose. I thought these reflections might give you pleasure. The Survival of the Russian Intelligentsia This comment on the post-Soviet situation provides an interesting postscript to the previous essay, recording Berlin’s delight and surprise that the intelligentsia had emerged so unscathed from the depredations of the Soviet era, contrary to his rather gloomy expectations. In subsequent years his confidence that the death of that era was truly permanent steadily increased, despite the immense problems of its aftermath, some of them only too reminiscent of those engendered by Communism. *** PREVIOUS PAGE | 2 OF 2 | *** *Reprinted from "The Soviet Mind: Russian Culture under Communism" (Brookings Institution Press, 2011) by Isaiah Berlin. Preface © Henry Hardy 2004. *** Learn More: ISAIAH BERLIN VIRTUAL LIBRARY *** Henry Hardy is a fellow of Wolfson College, Oxford University. He is one of Isaiah Berlin's literary trustees and has edited a number of other collections of Berlin's essays. *** NOTES [1] In his The First and the Last (New York/London, 1999), pp. 9–19, at p. 17. [2] British Minister in Moscow [3] British Minister in Washington [4] Letter of 20 February 1946. The poem is the second in the cycle Cinque. [5] The whole tribute is posted under ‘Writing on Berlin’ in The Isaiah Berlin Virtual Library (hereafter IBVL), the website of The Isaiah Berlin Literary Trust, http://berlin.wolf.ox.ac.uk/. [6] Letter to David Astor, 27 October 1958. [7] Sunday Times, 21 December 1958, p. 6. [8] Sunday Times, 7 November 1995, section 7 (‘Books’), p. 9. Readers may like to have a note of Berlin’s other shorter publications on Pasternak: ‘The Energy of Pasternak’, a review of Pasternak’s Selected Writings, appeared in the Partisan Review 17 (1950), pp. 748–51, and was reprinted in Victor Erlich (ed.), Pasternak: A Collection of Critical Essays (Englewood Cliffs, NJ, 1978); and there is a letter on Pasternak, written in reply to an article by Gabriel Josipovici, in the Times Literary Supplement, 16–22 February 1990, p. 171. [9] A. J. P. Taylor, ‘Stalin as Statesman: A Look at the Record’, New York Times Magazine (New York Times, section 6), pp. 9, 53–60. [10] Berlin annotates: ‘Did you know that “grammar” is the same word as “glamour”? It proceeds via “grimoire”. If further explanation is needed, I shall provide it when I see you.’ [11] He did; I haven’t. So long after Stalin’s death, the appellation (used throughout the piece) loses whatever point it had. Even Armstrong had his doubts (28 November): ‘I didn’t mind the ironical courtesy – indeed, rather liked it – but have a dislike of using a French term in speaking of another nationality. However, to put “Mr” looked ridiculous, so “M.” it is.’ | {
"pile_set_name": "OpenWebText2"
} |
Q:
Best way to get remote data that changes a lot
There are 3+ apps which collect parameters in the form of one string, like "Peter", "Jane", "Mary", etc. At the moment I keep this parameters in String[] array. However, the data needs to be changed a lot so every few days I have to amend strings, recompile APKs and publish it. Just waist of time.
What should be the simplest way to keep this data in a remote file (NOT database), maybe text file, so that the apps can download list of parameters on need? My idea is to change this file just once, upload it to some remote server and then the apps download parameters automatically. This way I would not have to recompile and republish the APKs.
If the text file is the simplest solution, what should be the form of it? For example, should I write parameters like this
Peter, Jane, Mary, ...
Or in some other form?
Is there a need for some layer between this text file and Android app, like when we make layer on the remote server to grab data from database? Or I can simply grab data directly from this remote text file?!
A:
Well the delivery mechanism could be a simple HTTP GET your app performs to a web server you control. It could be as simple as http://myhost/names.txt.
The data format depends on what you want to do. The super simple solution would be a text file with a different name on each line:
Peter
Jane
Mary
Or, you could serve up JSON from the server and parse it on your client.
{ "names": [ "Peter", "Jane", "Mary" ] }
The JSON solution would be more extendable, should you wish to add more values in future, e.g.:
{ "names": [ "Peter", "Jane", "Mary" ],
"lastnames": [ "Smith", "Johnston", "Cumberbatch" ] }
Really depends entirely on what you're comfortable with and what your situation calls for.
| {
"pile_set_name": "StackExchange"
} |
December 14, 2017
Congressman seeks probe of chartered flights by U.S. energy secretary
NEW YORK/WASHINGTON (Reuters) – A Democratic U.S. congressman is asking the Energy Department’s watchdog to investigate Energy Secretary Rick Perry’s travel on chartered aircraft, the congressman said at a hearing on Capitol Hill on Thursday.
U.S. Representative Frank Pallone said Perry’s trips on chartered planes need scrutiny in light of the “extreme” budget cuts the department faces in a 2018 federal budget proposed by Republican President Donald Trump.
In a letter on Thursday to the Energy Department’s inspector general, Pallone cited a $35,000 trip Perry took from Washington to a private airport in Kansas that was within a 45-minute drive of Kansas City International Airport.
“It is unclear why Secretary Perry would require such costly travel in instances where more economical options were readily available,” he wrote.
Perry said in his opening statement in the hearing, being held by the House of Representatives’ Energy and Commerce Subcommittee on Energy, that as a former Texas governor he understood the issue of travel oversight and the need to spend money on travel appropriately and thoughtfully.
“I travel a lot to do my job. I do it in a way that I think is thoughtful,” he said.
Perry’s charter flights have cost taxpayers more than $56,000, according to records the Energy Department released to Reuters on Friday. One of those flights – from a coal mine in Pennsylvania to a nuclear facility in Ohio – occurred just a day before former U.S. Health and Human Services Secretary Tom Price resigned and promised to repay the government for some $52,000 worth of travel including private flights.
Perry said on Thursday it would have been “very difficult” to take a commercial flight from the Pennsylvania site to the Ohio plant.
Pallone’s letter, which Democratic Representatives Diana DeGette and Bobby Rush also signed, asked the inspector general to determine whether there was a “mechanism for Secretary Perry to reimburse taxpayers” for the flights if they failed to meet ethical and procedural criteria for government travel.
Officials in the inspector general’s office did not immediately respond to a request for comment.
Inspectors general for the U.S. Environmental Protection Agency and the U.S. Interior Department have opened similar investigations into charter travel by those agencies’ heads, EPA Administrator Scott Pruitt and Interior Secretary Ryan Zinke.
Reporting By Emily Flitter in New York and Timothy Gardner in Washington; Editing by Jonathan Oatis | {
"pile_set_name": "Pile-CC"
} |
Do yoga and aerobic exercise training have impact on functional capacity, fatigue, peripheral muscle strength, and quality of life in breast cancer survivors?
The aim of the study was to compare the effects of aerobic exercise training and yoga on the functional capacity, peripheral muscle strength, quality of life (QOL), and fatigue in breast cancer survivors. A total of 52 patients with a diagnosis of breast cancer were included in the study. The patients were randomly assigned to 2 groups: aerobic exercise (n = 28) and yoga added to aerobic exercise (n = 24). Both groups participated in submaximal exercise 30 minutes/d, 3 d/wk for 6 weeks. The second group participated in a 1-hour yoga program in addition to aerobic exercise training. Functional capacity was assessed by the 6-Minute Walk Test (6MWT). Peripheral muscle strength was evaluated with a hand-held dynamometer. The fatigue severity level was assessed with the Fatigue Severity Scale (FSS). The QOL was determined by the European Organisation for Research and Treatment of Cancer Quality of Life Questionnaire. There were statistically significant increases in peripheral muscle strength, the 6MWT distance, and the perception of QOL in both groups (P < .05). Additionally, the group with aerobic exercise and yoga showed marked improvement compared with the aerobic exercise group in fatigue perception (P < .05). According to the data from this study, aerobic exercise training and yoga improved the functional capacity and QOL of breast cancer patients. Aerobic exercise programs can be supported by body mind techniques, such as yoga, in the rehabilitation of cancer patients for improving functional recovery and psychosocial wellness. | {
"pile_set_name": "PubMed Abstracts"
} |
We have all been told some story about some clever fellow who was smart enough to invest when the market was low, and then made a fortune when the market was high. Well, now may be an excellent time to consider an investment into your home, because just like the wise investor, you too will … | {
"pile_set_name": "Pile-CC"
} |
<?xml version="1.0" encoding="UTF-8"?>
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
<xs:annotation>
<xs:documentation source="http://www.phpunit.de/manual/3.7/en/appendixes.configuration.html">
This Schema file defines the rules by which the XML configuration file of PHPUnit 3.7 may be structured.
</xs:documentation>
<xs:appinfo source="http://www.phpunit.de/manual/current/en/appendixes.configuration.html"/>
</xs:annotation>
<xs:element name="phpunit" type="phpUnitType">
<xs:annotation>
<xs:documentation>Root Element</xs:documentation>
</xs:annotation>
</xs:element>
<xs:complexType name="filtersType">
<xs:choice>
<xs:sequence>
<xs:element name="blacklist" type="filterType"/>
<xs:element name="whitelist" type="whiteListType" minOccurs="0"/>
</xs:sequence>
<xs:sequence>
<xs:element name="whitelist" type="whiteListType"/>
</xs:sequence>
</xs:choice>
</xs:complexType>
<xs:complexType name="filterType">
<xs:sequence>
<xs:group ref="pathGroup"/>
<xs:element name="exclude" maxOccurs="unbounded" minOccurs="0">
<xs:complexType>
<xs:group ref="pathGroup"/>
</xs:complexType>
</xs:element>
</xs:sequence>
</xs:complexType>
<xs:complexType name="whiteListType">
<xs:complexContent>
<xs:extension base="filterType">
<xs:attribute name="processUncoveredFilesFromWhitelist" default="true" type="xs:boolean"/>
</xs:extension>
</xs:complexContent>
</xs:complexType>
<xs:complexType name="groupsType">
<xs:choice>
<xs:sequence>
<xs:element name="include" type="groupType"/>
<xs:element name="exclude" type="groupType" minOccurs="0"/>
</xs:sequence>
<xs:sequence>
<xs:element name="exclude" type="groupType"/>
</xs:sequence>
</xs:choice>
</xs:complexType>
<xs:complexType name="groupType">
<xs:sequence>
<xs:element name="group" type="xs:string" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="listenersType">
<xs:sequence>
<xs:element name="listener" type="objectType" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="objectType">
<xs:sequence>
<xs:element name="arguments" minOccurs="0">
<xs:complexType>
<xs:group ref="argumentsGroup"/>
</xs:complexType>
</xs:element>
</xs:sequence>
<xs:attribute name="class" type="xs:string" use="required"/>
<xs:attribute name="file" type="xs:anyURI"/>
</xs:complexType>
<xs:complexType name="arrayType">
<xs:sequence>
<xs:element name="element" type="argumentType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="argumentType">
<xs:group ref="argumentChoice"/>
<xs:attribute name="key" use="required"/>
</xs:complexType>
<xs:group name="argumentsGroup">
<xs:sequence>
<xs:element name="array" type="arrayType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="integer" type="xs:integer" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="string" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="double" type="xs:double" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="null" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="object" type="objectType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="file" type="xs:anyURI" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="directory" type="xs:anyURI" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:group>
<xs:group name="argumentChoice">
<xs:choice>
<xs:element name="array" type="arrayType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="integer" type="xs:integer" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="string" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="double" type="xs:double" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="null" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="object" type="objectType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="file" type="xs:anyURI" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="directory" type="xs:anyURI" minOccurs="0" maxOccurs="unbounded"/>
</xs:choice>
</xs:group>
<xs:complexType name="loggersType">
<xs:sequence>
<xs:element name="log" type="loggerType" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="loggerType">
<xs:attribute name="type">
<xs:simpleType>
<xs:restriction base="xs:string">
<xs:enumeration value="coverage-html"/>
<xs:enumeration value="coverage-clover"/>
<xs:enumeration value="json"/>
<xs:enumeration value="plain"/>
<xs:enumeration value="tap"/>
<xs:enumeration value="junit"/>
<xs:enumeration value="testdox-html"/>
<xs:enumeration value="testdox-text"/>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
<xs:attribute name="target" type="xs:anyURI"/>
<xs:attribute name="title" type="xs:string"/>
<xs:attribute name="charset" type="xs:string" default="UTF-8"/>
<xs:attribute name="yui" type="xs:boolean" default="true"/>
<xs:attribute name="highlight" type="xs:boolean" default="false"/>
<xs:attribute name="lowUpperBound" type="xs:nonNegativeInteger" default="35"/>
<xs:attribute name="highLowerBound" type="xs:nonNegativeInteger" default="70"/>
<xs:attribute name="logIncompleteSkipped" type="xs:boolean" default="false"/>
</xs:complexType>
<xs:group name="pathGroup">
<xs:sequence>
<xs:element name="directory" type="directoryFilterType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="file" type="fileFilterType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:group>
<xs:complexType name="directoryFilterType">
<xs:simpleContent>
<xs:extension base="xs:anyURI">
<xs:attribute type="xs:string" name="suffix" default="Test.php"/>
<xs:attributeGroup ref="phpVersionGroup"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="fileFilterType">
<xs:simpleContent>
<xs:extension base="xs:anyURI">
<xs:attributeGroup ref="phpVersionGroup"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:attributeGroup name="phpVersionGroup">
<xs:attribute name="phpVersion" type="xs:string" default="5.3.0"/>
<xs:attribute name="phpVersionOperator" type="xs:string" default=">="/>
</xs:attributeGroup>
<xs:complexType name="phpType">
<xs:sequence>
<xs:element name="includePath" type="xs:anyURI" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="ini" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="const" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="var" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="env" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="post" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="get" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="cookie" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="server" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="files" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="request" type="namedValueType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="namedValueType">
<xs:attribute name="name" use="required" type="xs:string"/>
<xs:attribute name="value" use="required" type="xs:anySimpleType"/>
</xs:complexType>
<xs:complexType name="phpUnitType">
<xs:annotation>
<xs:documentation>The main type specifying the document structure</xs:documentation>
</xs:annotation>
<xs:group ref="configGroup"/>
<xs:attributeGroup ref="configAttributeGroup"/>
</xs:complexType>
<xs:attributeGroup name="configAttributeGroup">
<xs:attribute name="backupGlobals" type="xs:boolean" default="true"/>
<xs:attribute name="backupStaticAttributes" type="xs:boolean" default="false"/>
<xs:attribute name="bootstrap" type="xs:anyURI"/>
<xs:attribute name="cacheTokens" type="xs:boolean"/>
<xs:attribute name="colors" type="xs:boolean" default="false"/>
<xs:attribute name="convertErrorsToExceptions" type="xs:boolean" default="true"/>
<xs:attribute name="convertNoticesToExceptions" type="xs:boolean" default="true"/>
<xs:attribute name="convertWarningsToExceptions" type="xs:boolean" default="true"/>
<xs:attribute name="forceCoversAnnotation" type="xs:boolean" default="false"/>
<xs:attribute name="mapTestClassNameToCoveredClassName" type="xs:boolean" default="false"/>
<xs:attribute name="printerClass" type="xs:string" default="PHPUnit_TextUI_ResultPrinter"/>
<xs:attribute name="printerFile" type="xs:anyURI"/>
<xs:attribute name="processIsolation" type="xs:boolean" default="false"/>
<xs:attribute name="stopOnError" type="xs:boolean" default="false"/>
<xs:attribute name="stopOnFailure" type="xs:boolean" default="false"/>
<xs:attribute name="stopOnIncomplete" type="xs:boolean" default="false"/>
<xs:attribute name="stopOnSkipped" type="xs:boolean" default="false"/>
<xs:attribute name="strict" type="xs:boolean" default="false"/>
<xs:attribute name="testSuiteLoaderClass" type="xs:string" default="PHPUnit_Runner_StandardTestSuiteLoader"/>
<xs:attribute name="testSuiteLoaderFile" type="xs:anyURI"/>
<xs:attribute name="timeoutForSmallTests" type="xs:integer" default="1"/>
<xs:attribute name="timeoutForMediumTests" type="xs:integer" default="10"/>
<xs:attribute name="timeoutForLargeTests" type="xs:integer" default="60"/>
<xs:attribute name="verbose" type="xs:boolean" default="false"/>
</xs:attributeGroup>
<xs:group name="configGroup">
<xs:all>
<xs:element ref="testSuiteFacet" minOccurs="0"/>
<xs:element name="groups" type="groupsType" minOccurs="0"/>
<xs:element name="filter" type="filtersType" minOccurs="0"/>
<xs:element name="logging" type="loggersType" minOccurs="0"/>
<xs:element name="listeners" type="listenersType" minOccurs="0"/>
<xs:element name="php" type="phpType" minOccurs="0"/>
<xs:element name="selenium" type="seleniumType" minOccurs="0"/>
</xs:all>
</xs:group>
<xs:complexType name="seleniumType">
<xs:sequence>
<xs:element name="browser" type="browserType"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="browserType">
<xs:attribute name="name" type="xs:string"/>
<xs:attribute name="browser" type="xs:string"/>
<xs:attribute name="host" type="xs:anyURI"/>
<xs:attribute name="port" type="xs:nonNegativeInteger"/>
<xs:attribute name="timeout" type="xs:nonNegativeInteger"/>
</xs:complexType>
<xs:element name="testSuiteFacet" abstract="true"/>
<xs:element name="testsuite" type="testSuiteType" substitutionGroup="testSuiteFacet"/>
<xs:element name="testsuites" type="testSuitesType" substitutionGroup="testSuiteFacet"/>
<xs:complexType name="testSuitesType">
<xs:sequence>
<xs:element name="testsuite" type="testSuiteType"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="testSuiteType">
<xs:sequence>
<xs:group ref="pathGroup"/>
<xs:element name="exclude" type="xs:anyURI" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="name" type="xs:string" use="required"/>
</xs:complexType>
</xs:schema>
| {
"pile_set_name": "Github"
} |
Q:
node.js server running but not loading
I've just installed node.js on my computer running Win7(64bit).
The problem is that when I run a simple hello-world application it is running (as confirmed by console.log() and me pushing the code to OpenShift where it works just fine) but when I try to load the page in localhost:1337 it just keeps on loading (eventually times out).
I've no idea what to check, since firewall is not blocking node and I'm not running anything that would block the port.
Here's the server code.
#!/bin/env node
// Include http module.
var http = require("http");
//Get the environment variables we need if on OpenShift
var ipaddr = process.env.OPENSHIFT_NODEJS_IP || "127.0.0.1";
var port = process.env.OPENSHIFT_NODEJS_PORT || 1337;
http.createServer(function (request, response) {
request.on("end", function () {
response.writeHead(200, {
'Content-Type': 'text/plain'
});
response.end('Hello HTTP!');
});
}).listen(port, ipaddr);
console.log('It works');
console.log('IP : ' + ipaddr + '\nPort : ' + port);
Any help is appreciated, thank you.
edit
Here's a screenshot of commandline output.
http://i.stack.imgur.com/GGaLD.png
A:
The node server is hanging as you need to always call response.end.
I believe that listening to the end event on the request is causing the timeout. If you remove it will work.
| {
"pile_set_name": "StackExchange"
} |
Denuvo's anti-tamper tech has been successfully tampered with and the company's 5.3 version that was meant to protect Hitman 2 has already been cracked by FCKDRM, the same group that cracked the 5.2 version and Football Manager 2019.
Once , the cracking group that calls itself FCKDRM has no affiliation with CD Projekt Red and GoG's anti-DRM initiative that sports the , even if they do share the disdain for all things DRM. Having cracked the 5.2 version in just five days, the group moved on and did the same to Hitman 2.
IO Interactive's launch of Hitman 2 is scheduled for 13 November 2018, unless you've pre-ordered the game, in which case you've had it since Friday. Unfortunately, it isn't worth much now and it remains to be seen whether the developer removes it.
This means that it took the group even less to break apart Denuvo 5.3 than its predecessor, albeit by a single day or so. Nevertheless, the company is definitely going through a rough patch, with the yet-to-be-cracked 4.9 version seemingly their best option at the moment for at least trying to protect the upcoming games.
Much has been said about the viability of Denuvo's anti-tamper tech lately, especially by the company themselves. They couldn't resist tooting their own horn lately by pointing out how triple-A games lose a bunch of money they'd otherwise make in first two weeks by deciding against Denuvo.
Unfortunately, FCKDRM is almost singlehandedly making the company redundant, because what good is crack protection if it's cracked before the game is out. With Battlefield V one of the prime candidates for Denuvo's future triple-A ambitions, EA and DICE's game may actually prove to be one of the crucial battlefields for the anti-tamper tech maker as well.
Sports Interactive Football Manager 2019
Interestingly enough, the company reacted pretty quickly to the debacle and cracking of Football Manager 2019, rolling out the 5.3 version. Unfortunately, it doesn't seem to be doing the trick and the whole ordeal is quickly turning into an all out war between cracking groups and Denuvo. And so far, the groups seem to be winning.
You can read more . | {
"pile_set_name": "OpenWebText2"
} |
Stable 5,5'-Substituted 2,2'-Bipyrroles: Building Blocks for Macrocyclic and Materials Chemistry.
The preparation and characterization of a family of stable 2,2'-bipyrroles substituted at positions 5 and 5' with thienyl, phenyl, TMS-ethynyl, and vinyl groups is reported herein. The synthesis of these new bipyrroles comprises three steps: formation of the corresponding 5,5'-unsubstituted bipyrrole, bromination, and Stille or Suzuki coupling. The best results in the coupling are obtained using the Stille reaction under microwave irradiation. The new compounds have been fully characterized by UV-vis absorption, fluorescence, and IR spectroscopies and cyclic voltammetry. X-ray single-crystal analysis of four of the synthesized bipyrroles indicates a trans coplanar geometry of the pyrrole rings. Furthermore, the substituents at positions 5,5' remain coplanar to the central rings. This particular geometry extends the π-conjugation of the systems, which is in agreement with a red-shifting observed for the λmax of the substituted molecules compared to the unsubstituted bipyrrole. All of these new compounds display a moderate fluorescence. In contrast with unsubstituted bipyrroles, these bipyrroles are endowed with a high chemical and thermal stability and solubility in organic solvents. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Any way to do true conditional compilation in Swift 3?
There are some related questions but I have insufficient site reputation to comment on the existing threads, forcing me to start a new one. Sorry about that.
It appears Swift doesn't have a true preprocessor. Workarounds are possible using #if / #else / #endif, but the problem here is that it doesn't hide the 'false' portion from the compiler, forcing both the 'true' and 'false' parts to be syntactically valid. This is tough given that Swift 3 is syntactically incompatible with Swift 2 -- has anyone found a workaround that will allow creating code that can be compiled for either environment? (If XCode 8 beta allowed Swift 2.2, or if XCode 7.3.1 allowed Swift 3, that would also give me a workaround here).
What I'm trying to do, to give just one trivial example, is something like
#if SWIFT3
let session = WCSession.default()
#else
let session = WCSession.defaultSession()
#end
I can't find any way to do this, and it seems surprising that there isn't a way to do it given how completely incompatible Swift3 syntax is with Swift2.
A:
I can't find any way to do this
Nevertheless, there is one, and there has been one since Swift 2.2; they planned ahead for exactly this contingency:
https://github.com/apple/swift-evolution/blob/master/proposals/0020-if-swift-version.md
So, like this (I don't know what a WCSession is, so I used a different example):
#if swift(>=3.0)
let screen = UIScreen.main()
#else
let screen = UIScreen.mainScreen()
#endif
EDIT According to Apple, Xcode 8 permits passing of arbitrary conditional compilation flags to Swift:
Active Compilation Conditions is a new build setting for passing conditional compilation flags to the Swift compiler. Each element of the value of this setting passes to swiftc prefixed with -D, in the same way that elements of Preprocessor Macros pass to clang with the same prefix. (22457329)
| {
"pile_set_name": "StackExchange"
} |
Superheroes are caught in hilarious and sometimes compromising positions in these photos by Edy Hardjo.
The Indonesian photographer creates an amusing tableaux using Marvel and DC action figures. In an interview with photography website Shutterbug, he said he was never particularly interested in action figures until the release of new generation of 1/6-scale figures such as Hot Toys and Enterbay.
They "have a very detailed and fine design, and almost look exactly like the real characters from the movies. I fell in love with these amazing figures," he said.
In this gallery, we publish some of his amusing scenes. Follow him on Instagram and Facebook to see more. | {
"pile_set_name": "Pile-CC"
} |
Key Words to Suggest What Operation to Use
Date: 12/08/2005 at 20:36:28
From: Sonya
Subject: How do I explain which math operation to use?
My daughter cannot decipher which operation to use in word problems.
Key words like "in all" and "all together" let her know to use
addition. Are there any key words or phrases that give her a hint
when to use division?
Date: 12/08/2005 at 22:47:27
From: Doctor Peterson
Subject: Re: How do I explain which math operation to use?
Hi, Sonya.
There are lists of key words, but I prefer not to lean too heavily on
them. In your example, there's a good chance that the operation will
be multiplication (for example, if there are 4 girls and they have 3
apples each, how many apples do they have "in all"?) or division
(there are 4 girls and they have 12 apples in all; how many does each
have?). Of course, in these examples, the word "each" suggests that
there is multiplication involved, and the division is just a
multiplication in reverse, so keywords are not useless!
I like to connect math operations to physical or mental ACTIONS,
rather than just to words. Then the words of a problem just describe
the actions, which tell us what operations to do.
In my first example, we can picture the 4 girls each placing her 3
apples in a row; that action is repeated 4 times, and the repetition
suggests multiplication. (The key word "each" suggests the
repetition!)
In my second example, we can picture the same actions, but this time
we don't know how many apples there will be in each row, so the
problem is to undo a multiplication: how many are in each group? And
that question you ask yourself indicates division. Or, alternatively,
we can imagine acting out an investigation to find how many each has:
we take the 12 apples and divide them among the girls, giving each 1,
then 2, then 3 until we've used up the apples. This action of
parceling out is also represented by division.
The key to this is to focus on MEANING: what does each operation mean,
and what situations call for it? Then you can connect those
situations with the appropriate operation. How to do this for a
specific child may depend on her style of thinking. My suggestions
have been partly visual and partly "kinesthetic" (involving motion, if
only imaginary). There may be other ways to "visualize" the actions
of a problem. But one way or another, I think she has to experience
enough mathematical activities (counting things out, moving things
around, and so on) to get a natural sense of what operations mean in
action.
Here is a discussion of some of the same ideas:
Organizing a Word Problem
http://mathforum.org/library/drmath/view/59203.html
If you have any further questions, feel free to write back.
- Doctor Peterson, The Math Forum
http://mathforum.org/dr.math/ | {
"pile_set_name": "Pile-CC"
} |
Increased production of ADAMTS13 in hepatic stellate cells contributes to enhanced plasma ADAMTS13 activity in rat models of cholestasis and steatohepatitis.
Although hepatic stellate cells, endothelial cells, glomerular podocytes and plateles were reported to be a source of ADAMTS13, it is not clarified which source is involved in the regulation of plasma ADAMTS13 activity. It was demonstrated previously that selective hepatic stellate cell damage in rats caused decreased plasma ADAMTS13 activity. To further elucidate the potential contribution of hepatic stellate cells to the regulation of plasma ADAMTS13 activity, this study examined plasma ADAMTS13 activity when hepatic stellate cells proliferate during the process of liver fibrosis by employing rat models of liver fibrosis due to cholestasis, bile duct ligation, and steatohepatitis, a choline-deficient L-amino acid-defined-diet. ADAMTS13 expression was increased with co-localisation with smooth muscle alpha-actin, a marker of hepatic stellate cells, in bile duct-ligated livers up to four weeks, in which a close correlation between ADAMTS13 and smooth muscle alpha-actin mRNA expressions was determined. Plasma ADAMTS13 activity, measured by a sandwich ELISA involving a specific substrate to ADAMTS13, was increased in bile duct-ligated rats with a significant correlation with ADAMTS13 mRNA expression levels in the liver. Furthermore, ADAMTS13 mRNA expression was increased with enhanced mRNA expression in smooth muscle alpha-actin in the livers of rats fed a choline-deficient L-amino acid-defined-diet for 16 weeks, in which increased plasma ADAMTS13 activity was determined. Thus, increased plasma ADAMTS13 activity in cholestasis and steatohepatitis in rats may be due, at least in part, to enhanced ADAMTS13 production in the liver, suggesting a significant role of hepatic stellate cells in the regulation of plasma ADAMTS13 activity. | {
"pile_set_name": "PubMed Abstracts"
} |
Thousands of self-declared anarchists brought chaos to the streets of London last night.
At least 50 people were arrested as thousands of anti-capitalists and anarchists took to the streets to protest and riot in central London. Three officers were injured, a police car was set alight and Buckingham Palace was attacked.
The so-called Million Mask March was organized by the by the hacking group Anonymous. Protesters wore intimidating Guy Fawkes masks inspired by the cult film V for Vendetta.
On man was arrested for threatening police with a wooden batten, whilst others threw rocks and fireworks at the Queen’s residence of Buckingham Palace.
The Daily Mail report that the man pictured smashing up a police car was wearing a designer Colmar ski jacket worth several hundred pounds.
Last year a similar protest on the 5th of November was attended by Russell Brand and Vivienne Westwood, calling for a socialist revolution.
Images credit to Getty Images | {
"pile_set_name": "OpenWebText2"
} |
Rujm ash Shami
Rujm ash Shami is a town in the Amman Governorate of north-western Jordan.
See also
آلجبــور
References
Category:Populated places in Amman Governorate | {
"pile_set_name": "Wikipedia (en)"
} |
1. Field of the Invention
The present invention relates to a biological information detection device that detects a biological signal by installing an electrode on the biological surface of the human body.
2. Background Art
Among these kinds of biological information detection devices, there is, for example, a heartbeat measurement device that detects an electro-cardiac signal generated in association with a heartbeat, and measures a heart rate from the biological surface. As such a heartbeat measurement device, there is, for example, a device which includes a main body portion having a detection circuit board and the like built-in, and a strap for mounting the main body portion to the human body, the strap being provided with a pair of electrodes. The main body portion and the strap are provided with an electrical connection portion for electrically connecting a detection circuit board of the main body portion to an electrode of the strap.
Based on such a configuration, an electro-cardiac signal generated in association with a heartbeat is detected by bringing a pair of electrodes into contact with the chest (biological surface) of the human body, and the main body portion derives a heart rate on the basis of the detected electro-cardiac signal.
Further, among the heartbeat measurement devices, there is, for example, a device in which the main body portion is detachably provided to the strap from the viewpoint of maintenance such as cleaning of the strap. When the main body portion is mounted to the strap, the electrical connection portion provided to the strap and the electrical connection portion provided to the main body portion are mechanically connected to each other, and the detection circuit board and the electrode are electrically connected to each other (see, for example, Specification of U.S. Pat. No. 7,526,840 and U.S. Design Registration No. 603,521). | {
"pile_set_name": "USPTO Backgrounds"
} |
8283.200 Aidia Lour.
Description of the genus
Shrub or small tree (in ours). Leaves opposite, occurring in equal pairs at non-flowering nodes but with one reduced to a scale at flowering nodes. Inflorescences of pedunculate cymes, occurring at every other node. Flowers bisexual, 5-merous. Calyx with reduced lobes. Corolla tube cylindric with hairy throat; lobes overlapping to the left. Stamens exserted. Style exserted with a club-shaped apical stigma. Fruit spherical, with a circular scar left by the deciduous calyx limb.
Worldwide: 13 species occurring in the Old World tropics extending to Australia | {
"pile_set_name": "Pile-CC"
} |
Margaret Fenwick
Margaret Taylor Naysmith Fenwick (19 August 1919 – 8 February 1992), born Margaret Mands, was a Scottish trade unionist, who became the leader of her trade union.
Born in Dundee, Fenwick was educated at Stobswell School, leaving at the age of fourteen to undertake an apprenticeship as a weaver at the Scottish Co-operative Wholesale Society's Taybank Works. She followed in a family tradition of becoming an active trade unionist, joining the Dundee and District Union of Jute and Flax Workers, and within a year achieved success in campaigning for apprentices to be paid at the same rate regardless of age.
In about 1948, Fenwick was elected to the Management Committee of the union, and that year married Andrew Small Fenwick, a co-worker; the couple had four children. She tried to become a shop steward in 1950, but the company management refused to allow this, claiming that because she was married and had young children, she would be unable to fulfil the role to the same standard as a single person.
Fenwick continued her activity in the union, which was renamed as the Union of Jute, Flax and Kindred Textile Operatives. She was elected as Assistant General Secretary in 1960, then as General Secretary in 1971. she served on various government committees relating to the jute industry, and was made a Member of the Order of the British Empire in 1973.
In 1976, Fenwick served as chair of the General Federation of Trade Unions, the first woman to hold the post.
Fenwick announced her retirement in 1978. Her post was not filled, as the union merged into the National Union of Dyers, Bleachers and Textile Workers the following May. In retirement, she focused on her role as a magistrate, and also served on industrial tribunals.
References
Category:1919 births
Category:1992 deaths
Category:General secretaries of British trade unions
Category:Presidents of the General Federation of Trade Unions (UK)
Category:People from Dundee
Category:Scottish trade unionists
Category:Women trade unionists | {
"pile_set_name": "Wikipedia (en)"
} |
Pre-therapeutic evaluation of laryngeal carcinomas using computed tomography and magnetic resonance imaging.
A prospective and comparative computed tomography (CT)/magnetic resonance imaging (MRI) study on 90 patients with endoscopically examined and histologically proven laryngeal malignancy is presented. Post-operative pathological and intra-radiological (CT vs. MRI) correlations are established. We conclude that MRI is the method of choice for staging laryngeal malignancies. | {
"pile_set_name": "PubMed Abstracts"
} |
434 So.2d 1031 (1983)
Rafael Humberto PALACIOS, Appellant,
v.
STATE of Florida, Appellee.
No. AO-373.
District Court of Appeal of Florida, First District.
July 22, 1983.
Rehearing Denied August 4, 1983.
*1032 Michael E. Allen, Public Defender, Glenna Joyce Reeves, Asst. Public Defender, Tallahassee, for appellant.
Jim Smith, Atty. Gen., Andrew Thomas, Asst. Atty. Gen., Tallahassee, for appellee.
ERVIN, Chief Judge.
Appellant, Rafael Humberto Palacios, appeals from a conviction for the offense of trafficking in marijuana, contending, inter alia, that the trial court erred in denying his motion to suppress physical evidence seized subsequent to a non-consensual search not incident to arrest. We agree and reverse.
The record discloses that Palacios was driving a rental truck north on Interstate 75 in Hamilton County at 4:00 a.m. on December 1, 1981, when he failed to stop at an agricultural inspection station. Inspector Davis, a uniformed officer on duty at the time, saw the truck by-pass the station and accordingly pursued it in an official marked car with blue lights flashing. He stopped the truck some 2 1/2 miles north of the station and then informed the driver, Palacios, first that he was required to stop at the station, and second that he needed to inspect the truck's cargo section. Palacios, a recent Cuban immigrant who speaks only Spanish, said, "No English." Davis again attempted to explain that he needed to inspect the rear of the truck and motioned to Palacios to open the rear door. Palacios complied with Davis' gestures by opening the door. At that point, a second man, Ferrer, who had been following the truck in an automobile, told Inspector Davis that he could not open the boxes in the rear of the truck which, he contended, contained ceramic vases. Davis then informed Palacios and Ferrer to return to the station, where Palacios was again directed, by motions, to re-open the cargo section of the truck. By that time Sheriff's Deputy Beck had approached the open door of the truck, smelled marijuana within it, and proceeded to open the boxes inside it, which were found to contain marijuana.
Palacios' motion to suppress alleged that he did not knowingly, freely and voluntarily consent to a search of the truck and that the evidence thus seized was the fruit of an illegal search and seizure. At the hearing on the motion, Palacios testified, through an interpreter, that he believed Inspector Davis had ordered him to open the truck's door; that he did not know he could refuse to obey Davis' order, because in Cuba officers generally have the right to conduct searches without consent, and that, had he known he could lawfully refuse, he would not have opened door to the truck. Ferrer also testified and confirmed the fact that Palacios does not speak or understand English. The trial court denied the motion, finding no coercion because, in its opinion, Inspector Davis was soft spoken, mild mannered and not authoritative. We reverse. Nothing in the record discloses that the state met its burden of proving, by a preponderance of the evidence, that Palacios consented knowingly, freely and voluntarily to the search. See Denehy v. State, 400 So.2d 1216, 1217 (Fla. 1980). In reversing, we adopt the reasoning in our recent decision of Rosell v. State, 433 So.2d 1260, (Fla. 1st DCA 1983), which we find controls the facts in the present case.
In this case, as in Rosell, we do not find that Palacios' action, in opening the rear door of the truck upon request, was anything more than mere submission to the apparent authority of Inspector Davis and, as such, was far short of the knowing, free *1033 and voluntary consent necessary to comply with fourth amendment protections.
REVERSED.
THOMPSON and WIGGINTON, JJ., concur.
| {
"pile_set_name": "FreeLaw"
} |
Norway’s Stoltenberg confirmed for NATO top job
NATO ambassadors chose former Norwegian Prime Minister Jens Stoltenberg as the next leader of the Western military alliance, NATO said today (28 March).
He will take over as secretary-general from 1 October, succeeding Anders Fogh Rasmussen, NATO said in a statement.
Rasmussen said on Twitter that Stoltenberg was "the right man to build on NATO's record of strength and success", and said the Ukraine crisis showed the need for NATO to have continued strong and determined leadership.
Stoltenberg, who served for nearly 10 years in total as Norway's prime minister before losing power in elections last September, was backed by the United States, NATO's dominant power, and Germany. British Prime Minister David Cameron said on Wednesday that he also backed Stoltenberg.
Rasmussen, a former Danish prime minister who took office in 2009, is due to step down at the end of September, after a September 4-5 NATO summit in Wales which will mark almost the end of NATO's combat mission in Afghanistan.
Stoltenberg is the leader of the Norwegian Labour Party, of social-democratic ideology, with observer status to the Socialist International.
The Norwegian politician will take over at a time when NATO, seen by some as a Cold War relic, has gained new relevance because of Russia's occupation and annexation of Ukraine's Crimea region [more].
NATO foreign ministers are expected to discuss at a meeting next week how they can reinforce NATO's military presence in eastern European countries such as the Baltics and Poland which are nervous about heightened tensions with Russia.
Commission President José Manuel Barroso, Belgian defence minister Pieter de Crem, and former Italian foreign minister Franco Frattini, have previously been tipped for the NATO top job. | {
"pile_set_name": "Pile-CC"
} |
A man loses the woman he intends to marry.A woman loses her best friend.
Retired Army Captain Liam Brosnan and US Marshal Chelsea Kilpatrick are forced to question what they know about a murder that forces them together. Uncertain connections from Liam’s military career rope them into a cloak-and-dagger investigation that offers more questions than answers.
Being duty-bound while in the throes of grief is a dangerous mixture. They struggle with unexpected sparks of passion and question their loyalty to a woman they loved while a murderer closes in on his next target.
Will the explosive solace Liam and Chelsea find in one another lead to a love neither expected? Or will it blind them to looming danger and death?
Cristin Harber’s larger-than-life military/terrorism conspiracy plots often skirt closer to the edge of the unbelievable than many of the books I’ve gone through but then again, that’s part of the basis of the romantic suspense genre: the homing in on particular individuals upon whom the fate of the country or the world hangs, no matter how ludicrous the situation might be (even when the connections are far from water-tight).
Yet ‘The Savior’ is an intriguing start to a new series that I’m curious enough to want to continue: the somewhat taboo attraction between a retired army captain and a federal agent, brought together ironically by the death of the death of his girlfriend (who also happened to be latter’s best friend).
Chelsea Kilpatrick and Liam Brosnan do make a good pairing somehow, especially so after Liam learns that the tragedy they’d both lived through was in fact, premeditated…and carefully planned over a few years.
Pile on the guilt, the hesitation, the electric sexual tension and a mite bit of push-pull. The icky dead-partner as the third party vibe isn’t altogether absent, nonetheless. We’re not quite given much of their history together however, only that they knew each other marginally through Julia, yet Liam and Chelsea ‘adulted’ quite well and I liked their inadvertent (and fairly mature) way of dealing with their burgeoning attraction to each other.
What was strangely surprising was the lack of action that brought the steady pace to a sort of lull until the last quarter of the book as things pulled together. (I didn’t get the Vietnamese-sounding terrorist names, by the way.) Harber’s writing style did feel somewhat ‘off’ and uneven at times though: some collocations didn’t quite make sense logically if you actually think carefully about it, or the moments where more was needed but wasn’t given and vice versa. Some were even jarring enough to kick me out of the narrative; well, the whole point being, I did think a finer-toothed comb was necessary in weeding out these errors, developmental or otherwise.
Being cautiously optimistic about this new series is what I’m left with by the end, abrupt as it seemed.
Colin questioned his recruitment to Delta team from day one, but he's made sure to earn his accomplishments twice over. No one could accuse his diplomat father of pulling strings.
Falling for Adelia is everything he never planned and always wanted. No complications. No agenda. Just a sweet girl who made him smile.
But Adelia has spun a network of lies around the world to help save women from human traffickers, and she's stolen from Mayhem motorcycle club, the men who saved her life, to do it. Anonymous friends back her unseen good deeds—until a link snaps. Actions have consequences in the Mayhem MC world. The repercussions are deadly.
Everywhere she turns, the fallout ripples. Friends become enemies. Family walks away. There's no one left to save her except for the man she's fallen in love with, and she'd do anything to keep him from Mayhem's ricochet.
‘Delta: Ricochet’ started out well enough, but this is my dislike for MCs-type stories speaking here, which Cristin Harber has integrated more and more into her Delta series with the longstanding topic of human trafficking taking priority in the last few of these books. I definitely prefer Harber’s Titan storylines that are more in the grain of the type of romantic suspense that I like to read, and clearly this preference is what’s partially accounting for my rating.
Undoubtedly, the setup of Colin’s and Adelia’s story is an intriguing one and it works well enough as a standalone since Harber does drop hints of what happened before. The first quarter brings Colin’s and Adelia’s paths together in way that is easy to follow (and is in my opinion, the best bit about the story which I sailed through), though their slow, slow burn does stretch past this mark. ‘Ricochet’ is however, a way longer read than what Harber typically churns out. Topping at 400+ish pages on my reader, however, my doubts crept in after I hit the 30% mark and my reading process faltered badly.
The funny thing about Harber’s characters is that they don’t necessarily behave the way and say the things you expect them to. ‘Ricochet’ isn’t too different, but the result here is one of meandering dialogues, character responses that don’t address questions head-on and a prolonging of the advancement of plot. The less-than-succinct delivery meant that a fair bit of editing—for structure, for the huge number of writing errors that really, really shouldn’t be there at this stage and for the roundabout dialogue—would have streamlined the ‘Ricochet’ into a read that had less stutters and abrupt lulls as action scenes built and simply dwindled away.
Still, the amount of riddles, courtesy of the work of secondary characters (which happily ran interference both for plot and structure) and Adelia’s deliberate and frustrating-as-hell in-but-not-in stance with Colin tanked the whole story for me. If Adelia started out as a protagonist whom I admired, this soon changed after the extraordinary lengths she went to obfuscate what she’d been doing all along in Mayhem when it became clear at a certain point that full disclosure (to the right parties) was needed.
I’m all for strong and independent heroines, don’t get me wrong. But having said this before, I think this merits it being said again: such a character isn’t afraid to ask for help, is brave enough to know when she is out of her depth and doesn’t play games when time is of the essence—all of which I thought Adelia fell alarmingly short of when the situation called for it. Calling for blind trust from Colin when she wouldn’t give hers stank of hypocrisy, not to mention the mind-boggling idiocy she showed when she stubbornly decided to go at things on her own without asking for the support she knew she so badly needed. Acting the martyr (yes, a goodbye note was included) was not only unnecessary at this point, but the stupidity of it threw me off so much that I stopped reading completely as ‘Ricochet’ neared its climax.
From a fantastic start to a muddling finish that soured quickly, ‘Ricochet’ capped off what has been a disappointing series for me, more so because Harber’s earlier books had made me a stalwart fan of hers. Thus far, the later Titan books and the Delta series haven’t run any bells for me to the point where I’m almost wary to pick up another book of hers…for fear of being disappointed once again.
Seven is an enigma. A motorcycle club princess. The daughter of a notorious gangster. The best friend of the deputy mayor. A coffee shop owner. The single mom of two young, adopted children. She’s colorful, in every way possible—from her attitude to her piercings and bright pink hair—and she’s a woman on a mission with the power to help broker a clean break between a powerful motorcycle club and a South American drug cartel. But not all players are ready for the game to change, including the ones she can’t see like the CIA. Jax Michaelson has a bad attitude and a good shot. The former Navy SEAL has been on Titan’s problem list for running his mouth since the day he showed up for work, but he does a hell of a job, and they’d never let him go. Call him cocky, that’s fine, because then you’d have to admit he’s the best at anything and everything—except diplomacy. When Titan is forced into the seedy drug world filled with cartel glitz and Harley-riding MCs, Seven and her family become an unexpected bargaining chip right after she and Jax find a way to stand each other—in bed. Will friends become lovers? Or are they too far gone to be opposites that attract? Is Jax nothing but a bad boy who leaves her hoping for a military hero when the burden of living as Mayhem royalty backfires and her children disappear.
One consistent thing about Cristin Harber’s characters is that they do tend to behave in ways I’ll never expect. Jax and Seven are no exception to this general rule that I’ve come to learn of the Titan gang; neither is the direction that Harber takes in this book that completely surprised me. Characters whom you thought you can’t warm to can suddenly turn around and show that the notion of ‘heroism’ doesn’t always conform to some pre-determined idea that you have…though as much as I hate to say it, the opposite applies too.
Titan’s ops thus far have been more paramilitary covert ops, so when Jax’s story came wrapped up in a MC’s dealings, I couldn’t say I was entirely enthusiastic about this turn, but it’s clearly my own sub-genre preferences speaking here. Jax, the known arse and the bastard-to-go-to in the past few Titan books, had a story and I was itching to uncover it, and this itch surpassed even my general dislike for MC stories.
The result is an MC-centric book that I couldn’t really get into but for Jax’s and Seven’s dance around each other and the fact that they aren’t quite the stereotypical characters I tend to read in such stories. There is action, of course and Jared Westin’s mobilisation of his Titan troops is always an awesome thing to read about, but that only comes much later…past the talking, posturing and the laborious sifting through truth and lies.
Above all, Jax made the story for me, as self-titled as this books is anyway, I didn’t expect anything different when Harber fleshed him out to be a protagonist who was so much more than his crusty, abrasive surface. I couldn’t quite say the same for the rest of the characters, who were simply varying shades of unlikable. In fact, I cheered Jax for giving it stubbornly to the Titan team who admittedly hadn’t been on his side to begin with and Jared/Sugar—a couple whom I’d adored when their book came out—behaved in fact, like idiots for most of this, tarnishing the sheen of the halo I’d initially put on them. Soon enough, it got just as hard to like Seven, whom I felt simply needed to grow a spine where Jax was concerned because she couldn’t decide where her loyalties were going to lie when it was all said and done.
‘Jax’ is a very different type of Titan book for which I needed a huge effort to suspend disbelief. That Jax’s so-called mortal enemy was dealt with all-too-easily—he was flitted in and out, appearing to play an important role but didn’t, and realising that he was ultimately, another plot device to help alter other characters’ perception of Jax tanked the read for me.
But I’ll reiterate that my own response to the plot and characters is just that—a catalogue of issues that just didn’t work for me, which simply outweighed Jax as the shining star of his own book and explains my half-hearted rating of it.
That was all that the woman would share when Delta team’s expert trigger man, an Australian named Ryder, pulled her from the pits of a human trafficking nightmare and took the gun from her hand.
He didn’t mean to steal her revenge but survival was the priority. Now that Victoria was home? She had a past he was trying to understand while keeping a secret from her that might tear her apart.
But he’s not the only one. When she goes missing, Delta team discovers that Victoria No Name was a one-woman vigilante force, taking on whoever crossed her path, from gun runners to a drug pushing motorcycle club.
She was exactly who Ryder thought she might be, and now he was coming in to help—whether she wanted backup or not.
Cristin Harber’s books used to be like crack for me, though I’ve got to admit that I’ve been disappointed in them as the Titan series grows. Harber does write good suspense; everything that involves Titan is typically drawn out, fairly complex and what they do actually rolls out hypothetical scenarios that aren’t too hard to envision coming true of late. ‘Delta: Redemption’ is Victoria/Ryder’s book, 2 secondary characters that I’d long forgotten about in Harber’s previous book, but it wasn’t hard to get caught up in the hostile Russian conspiracy in middle-America and the shady link to the brutal world of human trafficking.
I liked the start of the story, as Cristin Harber portrayed a victim of circumstances and rape who’d lost her self-confidence and her perceived standing in her small-town community. Both Ryder and Victoria’s connection was…for the want of a better word…a sympathetic one which I thought I could relate to. Both had lost something/someone and Harber certainly writes that soul-deep connection between the both of them especially well as Victoria was recovering from her ordeal.
But it went downhill for me from that point onwards and yes, was Victoria herself who rubbed me the wrong way. Upfront, I felt the problem was her TSTL behaviour that proved to be the costly catalyst that helped account for the action that happened in the rest of the book. Insisting on going at things alone when she knew full well that she needed help on this was stupidity of epic proportions; going ahead full steam while actually condemning herself–which shows some amount of perception that she wasn’t doing it right–for keeping things secret made it worse.
The need for revenge is always explained away as a lone-wolf, bloodthirsty, cannot-be-ignored trait and it’s simply reiterated here with her PTSD seemed swept under the rug with a softly-softly approach that Titan gave her, as did her friend Seven, ironically proving exactly what she never wanted others to think of her from the start: helpless when it came to crunch time yet having no issues eluding and deceiving when it suited her, only to lead Titan/Delta to her rescue a second time.
I’m all for assertion of independence, though all too often it’s done without thought, which then crosses the line straight into idiocy for me. ‘Delta: Redemption’ was to say the least, a read that didn’t go down too well, though clearly, what I ranted above has been one of my personal beefs for a long time. I couldn’t stop my eye-rolling for a long time, but as I’ve always said, just because it didn’t go too well for me, doesn’t mean it wouldn’t for others as well. In fact, I’m quite happy to say the opposite, in fact, happens.
THE STOIC SPECIAL FORCES OPERATOR There’s only one person to blame for darkening the last years of Locke Oliver’s military career: Cassidy Noble. And damn if he doesn’t have to save her from the side of a frozen mountain. Even after the job is done, he can’t shake the woman from his thoughts. He blames her for the deaths in his Army unit so many years ago, and he’s not ready to let that go. It’s driving him to the point of distraction, and now his Titan Group boss says to get his act together or get out.THE FEISTY, FALLEN REPORTER Cassidy is a disgraced journalist, once accused of treason—Or she’s an American hero. It depends on who you ask. She’s on a mission to rebuild her name and started with a simple question but discovered a complex web of spies and possible human trafficking. Titan Group believes in her. Locke does not. Until he can’t deny the truth any longer about the past or what she’s uncovered in her investigation.BECOME AN INSEPARABLE TEAM Cassidy volunteers to go undercover. Locke would do anything to stay by her side as she slips into the network and is sold to the highest bidder. All is going right until everything goes wrong. Nothing is as they expect, including falling in love with the woman he thought he hated.
It took me an extraordinarily long time to go through this book that I’m actually wondering whether it’s sort of the end of the Titan series for me right now.
Having been a fan of Titan in the early days, I wondered how Cristin Harber was going to go on with the series after Jared Westin’s core team had found their respective HEAs. ‘Locke and Key’ is a book past that particular series arc but I’ve been struggling since the chapter closed on the core team.
I’ve admittedly found myself lukewarm and half-hearted about the Titan series after Parker’s book came out as a dud for me but the biggest problem in ‘Locke and Key’ was that I couldn’t find any character likeable, despite them having been fantastic protagonists in their own time in previous books who have since undergone some personality transplants. Here, they came across as volatile idiots lacking compassion or any sense of kinship and that famous ‘brotherhood-in-arms’ spirit which I tend to read about in RS books seemed sorely lacking here. Instead, what I saw was loads of peacock strutting, macho posturing and too many over-the-top type of reactions that felt like petty and unnecessary squabbles.
In essence, the volatility of the characters’ behaviours resulted in my own volatile reactions to difference scenes and dialogues. There were chapters that made me think I could get behind some characters and other chapters that had me rolling my eyes and ready to give up the book. The only things that kept me going were the secondary characters whose fight Titan inevitably became a part of to reunite their family and I read on, cheering for them alone.
Obviously, it’s one of those books that grated on me, but I’m hoping at least, that the overall sense of dissatisfaction with the series might pass. Whether there’ll still be Titan or Delta in my to-be-read list however, well, that’s still something that’s up in the air for me.
From Liliana Hart's New York Times bestselling MacKenzie family comes a new story by New York Times bestselling author Cristin Harber... When Luke Brenner takes an off-the-books job on the MacKenzie-Delta joint task force, he has one goal: shut down sex traffickers on his personal hunt for retribution. This operation brings him closer than he's ever been to avenge his first love, who was taken, sold, and likely dead. Madeleine Mercier is the daughter of an infamous cartel conglomerate. Their family bleeds money, they sell pleasure, they sell people. She knows no other life, sees no escape, except for one. Maddy is the only person who can take down Papa, when every branch of law enforcement in every country, is on her father's payroll. It's evil. To want to ruin, to murder, her family. But that's what she is. Ruined for a life outside of destroying her father. She can't feel arousal. Has never been kissed. Never felt anything other than disgust for the world that she perpetuates. Until she clashes with a possible mercenary who gives her hope. The hunter versus the virgin. The predator and his prey. When forced together, can enemies resist the urge to run away or destroy one another?
In the mad, mad world of Cristin Harber’s Titan and Delta, very few things make sense in the logical realm, or at least that’s the lesson I’ve come to learn the further and deeper I get into the Titan books. A mercenary meets and falls in lust/love with the virgin daughter of a far-reaching human trafficker, and somehow thinks there is a common ground between his very unnatural addiction to pain and her own special brand of fighting back against her father.
I’ve come to associate these peculiar oddities and plot weirdness only with Ms. Harber: there’re always switchbacks, unpredictable moves and odd behaviour patterns of the characters that I can’t ever put my finger on – and perhaps this is a turn-on for some. Yet the brevity of the book sadly, hugely contributes to the unbelievability of the tale; as much as Ms. Harber’s trademark, distinctive writing helps pad the surreal feel of the story, I was left sceptically scratching my head about Luke and Maddy’s tenuous connection and a plot so fantastically crazy it can only belong in a James Bond spoof.
Parker Black wants the one woman he shouldn’t have—his buddy’s girl. She's sweet and smart, but clueless about how deep Parker lives in Titan’s virtual world. Everything is controlled. Chaos is mastered. Black and white data and risk analysis. That is the way he understands his world, how he plays his role to keep Titan teams alive.
But he’s wrong.
About everything.
Lexi Dare lives two lives. She’s an unhappy fiancée stuck in a spiraling relationship, unsure how she ended up with a ring on her finger and an abuser in her bed. But she’s also elusive. Elite. A master hacker playing deadly stakes.
When the lines blur and the truth comes out, Lexi’s only shot at survival is the trust of her rival—her equal—before it’s too late.
Going into Parker Black’s world is like stepping into hacker central and BlackDawn, his virtual codename – unbeknownst to him – has actually been an anchor for another hacker named Silver Chaos for the past decade. But Silver Chaos is in fact, Lexi Dare, a woman who in real life, is a victim of abuse, and in the small world of Titan, Lexi also happens to be the fiancée of Parker’s friend Matt.
Other Titan characters flit in and out of the story, but Black Dawn is really, a step away from an actual Titan op and into the fluid ethical boundaries of hacking and coding, a world that Parker has always believed is black and white. Parker’s professional and personal lives are set on a collision course when Lexi stumbles into his life; discovering her true virtual identity pushes them into unimaginable danger just as his attraction to her spikes along the way.
I thought this latest Titan installment was just entertaining as the previous Titan books have been, even if the action is over-the-top and require way more than a tad bit of suspension of disbelief, even if there’re few principles of hacking and coding that I truly understand. Instead, I’ve always been drawn to Titan’s quirky characters, their funny names and their antics, especially the alpha men who are strangely unafraid to fall into their heroines’ arms and call time on their bachelor status. Parker Black might be the latest, but hopefully not last to do so, if his story truly signals the end of the Titan series. | {
"pile_set_name": "Pile-CC"
} |
In order to grow plants in greenhouses, a proper combination of light and heat is required. At times, the requisite light and heat are provided naturally from the sun. However, in most northern climates, it is often too cold during the winter to grow plants without some source of heat. Typically, heat is provided using forced air heaters. This does not prove to be entirely satisfactory, however, because much of the hot air is lost through the roof and walls of the greenhouse. As a result, during the winter days, the temperature in the greenhouse can be as low as 50.degree. F. even with the hot air heaters at full blast.
One solution to this problem has been to use insulating materials on the roof and walls of the greenhouse. Systems of this type are disclosed in U.S. Pat. Nos. 4,064,648 to Cary, 4,313,650 to Ward et al. and 4,375,232 to Heescher et al.
Cary discloses use of a flexible sheet of insulating material, wound in a roll, that can be installed near the roof of the greenhouse. The material can then be deployed at night to cover the roof and prevent heat loss. During the daytime, the insulation is retracted into the roll so that light may enter the greenhouse.
A similar system is disclosed in the Heescher patent. There, an insulative foil, made of two layers of plastic separated by air pockets, is selectively deployed over the roof and walls of the greenhouse to prevent heat loss. The foil is folded when stored and opens to form an insulative barrier. Both the Heescher and Cary references suggest that the foil might be coated with aluminum to increase the insulation effect.
In Ward et al., reflective and insulative slats are arranged venitian blind style below the greenhouse roof. This construction permits selective capture or reflection of heat or light.
Aluminized insulating materials, such as those disclosed in the Heescher et al. and Cary references, are also useful in summer months to prevent overheating from direct sunlight. By deploying the insulating material over the southern exposure of the greenhouse (in the Northern hemisphere), direct sunlight will be reflected out of the greenhouse. Diffuse light still enters the greenhouse through the northern exposure providing light for the plants.
While hot air systems, used in conjunction with insulating materials, can be effective to promoting plant growth during cold winter months, such systems are still relatively energy inefficient. One primary drawback to the use of forced air is that the hot air naturally rises to the roof. Thus, the plants do not receive the full benefit of the forced air output. Although the insulating layers prevent much of the heat from escaping, the air near the roof will be warmer than the air near the floor, an indication that the system is not energy efficient.
Greenhouses also require large amounts of water. The water is often taken straight from the outside and sprayed on the plants. This water is very cold, especially in winter and, when sprayed on the plants, it cools the plants, soil and surrounding air. Thus, the environment must be reheated to maintain proper growing conditions. In order to maintain a steady temperature in the greenhouse, the water is sometimes heated before spraying. This is typically accomplished using a large capacity water heater. Thus, separate air and water heating systems must be purchased and installed. The water heating systems in the prior art are not able to take advantage of the excess heat produced by the air heating systems and so efficiency is not maximized.
Further problems arise due to the build-up of snow and ice on the roof above the insulating material. The prior art has attempted to solve this problem using additional devices which either scrape off the snow or heat the roof. None of the additional devices make use of the excess heat in the heating system, however, so, again, maximum efficiency is not achieved. | {
"pile_set_name": "USPTO Backgrounds"
} |
Dependence of induced transmembrane potential on cell density, arrangement, and cell position inside a cell system.
A nonuniform transmembrane potential (TMP) is induced on a cell membrane exposed to external electric field. If the induced TMP is above the threshold value, cell membrane becomes permeabilized in a reversible process called electropermeabilization. Studying electric potential distribution on the cell membrane gives us an insight into the effects of the electric field on cells and tissues. Since cells are always surrounded by other cells, we studied how their interactions influence the induced TMP. In the first part of our study, we studied dependence of potential distribution on cell arrangement and density in infinite cell suspensions where cells were organized into simple-cubic, body-centered cubic, and face-centered cubic lattice. In the second part of the study, we examined how induced TMP on a cell membrane is dependent on its position inside a three-dimensional cell cluster. Finally, the results for cells inside the cluster were compared to those in infinite lattice. We used numerical analysis for the study, specifically the finite-element method (FEM). The results for infinite cell suspensions show that the induced TMP depends on both: cell volume fraction and cell arrangement. We established from the results for finite volume cell clusters and layers, that there is no radial dependence of induced TMP for cells inside the cluster. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
"Confused Digger" algorithm running too slow, any way to speed it up?
I have an algorithm that was based on a backtracking maze algorithm with some parts removed, resulting in this wonderful dungeon. Unfortunately, it runs extremely slowly which makes it almost impossible to fill a decently-sized map with. I really don't want to throw it out, but I can't think of any way to speed it up. I'm using Python, so I know that's part of my problem, but I'm not exactly prepared to throw out my roguelike's entire existing codebase, which runs fast enough right now. Here's the code currently:
start = (random.randint(0, self.width), random.randint(0, self.height))
self.dungeon['up_stairs'] = start
visited = [start]
while len(visited) < 300:
current = visited[-1]
apos = random.choice([(1, 0), (0, 1), (0, -1), (-1, 0)])
new = utils.tuple_add(current, apos)
if not new in visited and self.on_map(new):
self.place_cell(new, is_wall=False)
visited.append(new)
else:
visited.pop()
[edit]
To answer some questions in the comments, place_cell either creates a wall or an empty cell at the supplied position-tuple based on the positional argument is_wall. So for instance, in the code above, the self.place_cell(new, is_wall=False) call changes the cell at the position new on the map to an empty cell.
Visited should really be called something else, I'm just... lazy that way. I'll fix it later probably.
The < 300 condition is because 299 cells is the most it can draw in a reasonable time frame. (Beyond 299 cells, it suddenly starts hanging.)
A:
I would suggest following improvements:
Do not pop a visited cell only because you failed on one step. This may lead to starvation: popping and trying again, popping ... etc. You should instead pick another cell you visited in the past, and continue from there. If that fails, pick another one...
Use a set to keep track of the visited cells: this will allow faster lookup
Use another "frontier" set for keeping track of which visited cells still have unvisited neighbours
When a cell is visited, check all neighbours in random order whether they are unvisited. The first one that is will be your next visit. But if all of them were visited (or outside the grid) then choose a random cell from the frontier set.
Here is the suggested code:
start = (random.randint(0, self.width-1), random.randint(0, self.height-1))
self.dungeon['up_stairs'] = start
current = start
frontier = set()
visited = set([start])
while len(visited) < 400:
frontier.add(current)
self.place_cell(current, is_wall=False)
found = False
while not found:
choices = [(1, 0), (0, 1), (0, -1), (-1, 0)]
random.shuffle(choices)
for apos in choices:
new = utils.tuple_add(current, apos)
if not new in visited and self.on_map(new):
found = True
break
if not found:
# we can remove this cell from frontier as it is
# completely surrounded by visited cells
frontier.discard(current)
# pick a random other one to start from
current = random.sample(frontier, 1)[0]
current = new
visited.add(current)
| {
"pile_set_name": "StackExchange"
} |
What strings are taper wound?
I went to the local store and I was going to try some different strings but they didnt have any taper wounds. All my basses are set for tapers so Id like to try out some different tapers before I change the set up. Thanks.
I just got a set of fender taper wounds. UH DUH! on me - I wanted half rounds and didn't even realize i didn't know what taper wounds were. Yes, i thought they were smoother than roundwounds yet not quite flatwounds. Oh well - I put them on my fretless acoustic and they sound great.
What's the advantage to these strings now that I know, after years and years of playing, what they are? | {
"pile_set_name": "Pile-CC"
} |
Q:
How to return an unknown object which contains a specified member variable
There is some code I have seen where the returning object has a Visible member, which can set to be true. I would like to mimic this functionality, but I am getting the error 'object' does not contain a definition for 'Visible' and no extension method 'Visible' accepting a first argument of type 'object' could be found.
Here is the example code that works:
public AP.GlobalClass APObj = new AP.GlobalClass();
APObj.Application().Visible = true;
Here is what I am trying to do that doesn't work:
public APControl.A2APGlobalClass APObj_B = new APControl.A2APGlobalClass();
APObj_B.Application().Visible = true; //Error goes with this line
public class A2APGlobalClass
{
public AP.GlobalClass APObj = new AP.GlobalClass();
public Object Application() //Do I need to change "Object" to something else?
{
return APObj.Application(); //This returned object "Object" type does no longer contain the Visible member.
}
A:
The code may be closed source, but the public members of the types exposed by the assembly must by definition be visible. If you are working in any kind of decent environment, the intellisense will tell you the return type when you hover your mouse over the member. If your editor has no intellisense, there are other ways to extract this information.
With reference to @JeroenVannevel's comment, you might want to read up on static vs dynamic typing. C# is as heart a statically typed language, so you cannot call the Visible property on a reference of type Object, because Object has no Visible property. Instead of Object, you need to return one of the following:
the actual type of the object being returned
the class in which the Visible property is declared
a type that falls between the two previously mentioned types in the inheritance chain (if there are any such types)
an interface type (if any) implemented by the object being returned and that defines the Visible property
For example, with the types defined below, you could return any of the types except for A:
interface I { bool Visible { get; set; } }
class A { }
class B : I { public bool Visible { get; set; } }
class C : B { }
class D : C { }
| {
"pile_set_name": "StackExchange"
} |
TRHS News
Top News
Give to the Tree of Life this holiday season 11/16/2017
A holiday tradition, the annual lighting of the Tree of Life at Tift Regional Medical Center (TRMC) serves as a symbolic tribute to friends, family and lost loved ones while supporting the TRMC Oncology Center and Hospice of Tift Area. Sponsored by the Tifton Junior Woman’s Club, this year’s tree lighting ceremony will be held Thursday, Dec. 7, 2017 at 6 p.m. on the front lawn of TRMC.
Kristy Daniels, Manager of Hospice of Tift Area, said this year’s event will prove to be one of the best yet. “We want everyone in the community to bring their families and friends,” she said. “Together we will enjoy a moving candle-lighting ceremony and wonderful, live holiday music. And, of course, we’ll have a visit from Santa Claus. Afterwards, everyone is invited to a complimentary meal provided by TRMC Food Services."
Daniels said that purchasing a light for the Tree of Life in honor or memory of a person is a tax-deductible gift which will help the patients of Tift Regional’s Anita Stewart Oncology Center and Hospice of Tift Area with special needs. “Various giving levels are available,” she said. “If you are looking for a Christmas gift for family members, friends, co-workers or clients, purchase a light in their honor or in memory of someone close to them. You’ll be benefiting a great cause.”
Daniels said the Tree of Life fund assists the hospital’s cancer or hospice patients who may have difficulty paying utility bills due to financial constraints or need special comforts while undergoing treatment.
“These are just examples of how the Tree of Life helps our patients as they undergo a challenging time,” said Daniels. “It has really touched the lives of many people in our community.”
Various giving levels are available and contributing is easy. Contributions are being accepted until Dec. 31. To contribute, visit www.tiftregional.com/TOL. | {
"pile_set_name": "Pile-CC"
} |
Q:
How to prevent people from dropping in non-droppable elements?
I am implementing drag and drop this way.
<?php echo $this->Html->script('modernizr/2.5.3/modernizr.min.js', array('block' => 'scriptTop')); ?>
$(document).ready(function () {
dropArea = document.getElementById("droparea");
dropArea.addEventListener("dragleave", function (evt) {
var target = evt.target;
if (target && target === dropArea) {
this.className = "";
}
dropArea.className = "";
evt.preventDefault();
evt.stopPropagation();
}, false);
dropArea.addEventListener("dragenter", function (evt) {
this.className = "over";
evt.preventDefault();
evt.stopPropagation();
}, false);
dropArea.addEventListener("dragover", function (evt) {
evt.preventDefault();
evt.stopPropagation();
}, false);
// this is the initial add-drop
dropArea.addEventListener("drop", function (evt) {
doStuff();
this.className = "";
evt.preventDefault();
evt.stopPropagation();
}, false);
}
There are times when my users dropped stuff NOT into #droparea.
I want to prevent them from doing that.
What should I do?
A:
You need to add a noop dragover and drop handler for your document. This will prevent the default browser behavior of replacing current page with dropped file.
See here for a demo
// Handle dropping on non-droparea
document.addEventListener("drop", cancelEvent, false);
document.addEventListener("dragover", cancelEvent, false);
function cancelEvent(evt) {
evt.preventDefault();
evt.stopPropagation();
}
| {
"pile_set_name": "StackExchange"
} |
Giffords staffer remembered
Gabe Zimmerman, the congressional staffer who was killed in the mass shooting in Arizona on Saturday, was known as a friendly and dedicated aide who had been with Rep. Gabrielle Giffords since the earliest point in her congressional career.
His job was director of community outreach — the position which led him to organize the “Congress on your Corner” event that quickly turned from a run of the mill local town hall to a national tragedy in which six people were killed — including Zimmerman — and Giffords was shot in the head.
Story Continued Below
Zimmerman was remembered by friends and colleagues on Saturday night as friendly, dedicated and good humored.
He was engaged to be married, according to media reports, and had served as a major point of contact for the congresswoman since 2007.
Zimmerman, who worked out of the congresswoman’s Tucson office, was known by local interest groups for going above and beyond the call of duty.
Several photographs on the Internet show Zimmerman, who was a former social worker, smiling with his arms around local community leaders.
Among them was Pat Gould, a support group leader in the local chapter of the Scleroderma Foundation. With Zimmerman’s help, the group was able to garner Giffords’ support for legislation recognizing the disease.
Gould broke down crying when POLITICO informed her of Zimmerman’s passing.
“He was such a very nice man,” she said. “Very receptive, very attentive, very concerned. He expressed extra concern about this autoimmune disease because he had a relative who suffered with one too.”
“Gabe was one of those rare people in high school who was nice to everyone. He was a friendly, outgoing, popular guy who was welcome in virtually every social circle. I can’t remember anyone ever having an unkind thing to say about him,” said Sommer Mathis, a high school friend who works at TBD, a local news Web site and sister publication to POLITICO.
Zimmerman played varsity soccer and was known for taking a rigorous set of AP courses. “Have a great day!” signs off the cheerful recording on Zimmerman’s voicemail reached by POLITICO in the Congresswoman’s Tucson office.
“He just had a heart for people,” said Doug Hart, president for the Arizona Alliance for Retired Americans. “Everybody loved the guy, and that’s a hard thing for a young man to pull off with seniors. I remember telling him I’ve been married for 42 years and he said he hoped he could be married that long.”
“We serve who walks into our office and we don’t even ask what party they belong to,” Zimmerman told the Tucson Citizen in 2007.
Zimmerman was among 24 employees currently employed by the congresswoman, according to House salary disclosure information posted on Legistorm.com. The site listed Zimmerman as deputy scheduler as of the end of September.
Gifford’s press secretary, C.J. Karamargin said that the Congresswoman had not received any recent threats and had no reason to fear for her or her staff’s safety.
“She has always been very open and accessible. She’s never shied away from an opportunity to meet with her constituents, even when the topic was hot and heavy,” Karamargin said. | {
"pile_set_name": "Pile-CC"
} |
JERUSALEM -- Hamas and other Gaza militant groups said Tuesday they have accepted an Egyptian-brokered cease-fire after launching hundreds of rockets into Israel over the past 24 hours and weathering a wave of punishing Israeli airstrikes. There was no immediate word from Israel on whether it had accepted a deal to halt the heaviest exchange of fire with Gaza's Hamas rulers since a 2014 war.
The cease-fire was announced by a group of Gaza militant groups, including Hamas, whose leader Ismail Haniyeh earlier signaled a readiness to halt the latest round of fighting. He said the Islamic militant group would stop its rocket fire if Israel halts its airstrikes.
The terms of the deal appeared to be modest. Daoud Shehab, a spokesman for the Islamic Jihad militant group, said each side would promise quiet in exchange for quiet.
Get Breaking News Delivered to Your Inbox
Just an hour before the militants made their declaration, the Israeli Security Cabinet said it had ordered the military to "continue operations as needed," following a six-hour meeting.
How this wave of violence started
The rocket fire was triggered by a botched Israeli military raid in Gaza on Sunday. Undercover troops, apparently on a reconnaissance mission, were discovered inside Gaza, setting off a battle that left seven militants, including a Hamas commander, and a senior Israeli military officer dead. Hamas then fired a guided missile that struck a bus from which soldiers had just disembarked, marking an upgrade over its typical inaccurate projectiles.
The strike set the bus on fire. A 19-year-old soldier was critically wounded and rocket attacks and Israeli retaliation fire quickly ensued.
The Israeli military said some 460 rockets and mortar rounds have been launched from Gaza since Monday afternoon, with more than 100 of them intercepted by Israel's Iron Dome defense system.
Lt. Col. Jonathan Conricus, a military spokesman, said Israeli warplanes, tanks and naval vessels were involved in strikes against military compounds, observation posts and weapons facilities belonging to the two main Gaza militant groups behind the attacks -- Hamas and the Islamic Jihad. He said the Israeli military has enhanced its deployment along the border but had yet to mobilize its reserves. He said Gaza militant groups were believed to have an arsenal in excess of 20,000 rockets and mortars of different caliber and range.
"Southern Israel is under attack," Israeli Foreign Ministry spokesman Emmanuel Nachshon said Tuesday. "In the last 24 hours more than 400 mortars and rockets were shot at Israeli cities and villages with deadly consequences. Hamas is deliberately targeting our civilian population and this is something that we cannot and will not accept. The IDF (Israel Defense Forces) will strike in a strong and deadly manner in order to make sure that the message passes across and that Hamas understands that it must stop immediately with those attacks."
CBS News correspondent Charlie D'Agata said Palestinians in Gaza awoke on Tuesday to widespread destruction from Israeli airstrikes and tank fire. The Israeli forces' targets included a television and radio station run by Hamas, the Islamic militant group that rules the territory, and the group's military intelligence headquarters.
On Tuesday, Gaza's Health Ministry said three Palestinians in their 20s were killed in separate airstrikes, raising the number killed since the Israeli offensive began to seven, including five militants. At least 25 people have been wounded.
Israeli medical officials said a 48-year-old man was found early Tuesday under the rubble of a building hit by a rocket in the southern city of Ashkelon. Relatives in the West Bank town of Halhoul identified the man as Mahmoud Abu Asbeh, a Palestinian laborer who had been working in Israel. He left a wife and six children behind.
"Everyone in town is sad. It's God's will and there's nothing we can do about it," said his cousin, Jihad Abu Asbeh.
Nearly 30 people have been wounded in Israel, three critically, according to medical officials.
An Israeli policeman inspects the damage in a building caused a day earlier by a rocket fired from the Gaza Strip, in the southern Israeli town of Ashkelon, Nov. 13, 2018. Getty
The last Gaza war, and the lingering blockade
Earlier Tuesday, the armed wing of Hamas threatened to step up its attacks and fire rockets further north toward the Israeli cities of Ashdod and Beersheba if Israel continued its airstrikes. Over the past few months, the sides have come close to a major escalation several times, only to step back in favor of giving a chance to a long-term Egyptian mediated truce.
Israel and Hamas have fought three wars since the Islamic militant group seized control of Gaza from the internationally-backed Palestinian Authority in 2007. In the most recent war, over 2,200 Palestinians were killed, more than half of them civilians, and tens of thousands were left homeless. Seventy-three people, most of them soldiers, were killed on the Israeli side.
Israel and Egypt have maintained a blockade on Gaza since the Hamas takeover. The blockade has devastated Gaza's economy.
In recent weeks, Egyptian and U.N. mediators had appeared to make progress in brokering informal understandings aimed at quieting the situation.
Last week, Israel allowed Qatar to deliver $15 million to Gaza to allow cash-strapped Hamas to pay the salaries of thousands of government workers. At the same time, Hamas has lowered the intensity of its border protests in recent weeks.
Netanyahu cut short a visit to Paris because of the flare-up and returned to Israel on Monday for consultations with top security officials. | {
"pile_set_name": "OpenWebText2"
} |
Another fascinating revelation concerned the newspapers in The Grand Budapest Hotel, including The Trans Alpine Yodel, The Daily Fact and The Continental Drift. For each paper, Wes Anderson wrote every single story, whether or not they were directly in shot, or anything at all to do with the film’s overall narrative. But authenticity, Annie insists, is everything: she even studied Hitler’s actual calling card to design a fascist character’s business card in the film.
On a more Art Attack level of advice, Annie advocates ageing paper using Barry’s tea bags: three for each ten years of age. She points out that even if the props in the film are new in the narrative, for a film set in the past the audience expects an “old” aesthetic.
But for all this authenticity, perhaps the most charming part of Annie’s talk came with the reassuring admission that even someone of her calibre can make a huge, embarrassing cock-up. The beautiful Mendl’s cake boxes seen countless times throughout the film – of which about 3000 were made – each bore one glaring error. She’s put two “t”s in patisserie, which were edited out in post-production.
“As graphic designers we have a responsibility to language and words and grammar as we work with it all the time. You have no copywriter or editor; you’re alone in film and no one else is watching out for that stuff for you.
“Everything in the film is there for a reason. Except the two ’t’s in patisserie.” | {
"pile_set_name": "OpenWebText2"
} |
Photographer Anastasia Pottinger has a powerful photo series called Centenarians that reveals what the human body looks like at 100 years old. Pottinger writes: When I later reviewed the images on my computer, I knew I was looking at something very special. It was when I began exhibiting the work that the idea to continue the series was born. The response to the images has been remarkable. Viewers are visibly moved by what they are looking at. Whether it's wondering, "is this what I'm going to look like?" or remembering a loved one – the response seems to be universally emotional on some level.More images after more.
"Since his first awakening, the radioactive, fire-spewing kaiju has grown 200 feet and put on more than 150,000 tons. Godzilla is now 30 stories tall and weighs as much as a cruise ship. No actual animal could take the pressure of being so massive: It would overheat, its organs would implode, and it would need to mainline butter to get enough calories. For fun, we surveyed scientists to help us break down the beast's biology. If Godzilla were real, he would be an incredible specimen. " (Photo by Stephanie Godot/Illustration by Andrew Rae)
George R. R. Martin uses an archaic word processor—WordStar 4.0, running on DOS, no less—to write Game of Thrones. He explained why to Conan last night. First, it means that he has a computer dedicated to writing—obviously he doesn't check his email and browse the web on DOS, that'd be silly—which presumably allows him to concentrate better...
Motorola is updating their popular Moto G with 4G LTE while still maintaing a very reasonable price of $219 unlocked and without contract. Featuring a 4.5″ 720p screen and comes with 8GB of memory – standard, a 5 megapixel camera, water-repellent coating, Android 4.4 KitKat and a 1.2GHz Quad-Core Qualcomm Snapdragon 400 processor.
Ibrahim Hamato from Egypt has no arms, but that hasn't stopped him from becoming a top-notch table tennis player. Hamato lost his arms in an accident at age 10, forcing him to find a new way to compete in his favorite game. He now plays table tennis with a racket in his mouth, swatting at balls with a flick of his head. | {
"pile_set_name": "Pile-CC"
} |
Hodderscape Wants You!
By Anne Perry
You might recall that, not long after we launched Hodderscape.co.uk, we put out a call for contributors. Today we’re delighted to renew that call… but with a twist. From now on, we’ll be paying our contributors for original content.
Whether you’re a writer, a blogger, a reviewer or just a keen reader – WE NEED YOU! We’re open to anything from opinion pieces to reviews of SF/Fantasy-related stuff to general musings. If you’d like to become a contributor, drop us a line at hodderscape@hodder.co.uk or use our Contact Us page. Tell us a little about yourself and what you’re interested in writing about (or even include the full piece), and we’ll take it from there!
GUIDELINES
Who can write for us
Anyone! Whether you’re an author, a reviewer, a blogger or just an avid reader, we’re open to your contributions. Basically, if you have something to share, we want to hear it!
What to write
We’re not setting any strict parameters regarding topics – we’re just looking for content that’s of interest to our community. So, it could be an opinion piece, a review, a general musing of any kind; it could be about SFF/Horror/speculative books (a piece on a specific author or genre, for example); or it could be something on a related topic such as film, TV, games or art. We can’t promise to publish your piece, but we will absolutely consider everything that is submitted.
There’s no word limit, but somewhere between 500 and 750 words is ideal.
Rights
We require first publication rights, non-exclusive into perpetuity. What that means is, we’re looking for articles and essays that have never been published before. If, later on, you’d like to republish what you’ve written for us somewhere else, that’s fine!
If you have any questions about the rights situation, please feel free to drop us a line.
Please do…
Write something that you feel is of interest to the wider SFF community.
Feel free to run the subject of your piece past us if you would like our view on whether or not it’s a suitable topic.
Proof-read! (Seriously, this is really important.)
What you’ll get in return for your contribution
We pay £10 per article and will send a bundle of Hodder books to anyone whose piece we publish.
MORE
Written by Anne Perry
Anne Perry is an editor at Hodder & Stoughton. She spends much of her free time thinking about monster movies. | {
"pile_set_name": "Pile-CC"
} |
22 SHARES Share Tweet
Kansas City Health Department is facing backlash after pouring bleach on meals intended to feed the homeless according to The Kansas City Star.
A local organization Free Hot Soup KC planned to give away free meals that included home-made chili, foil-wrapped sandwiches, and soup at parks across Kansas City on Nov. 5. Health officials took away the meals citing the group didn’t have a permit and was putting the public at risk.
Health Department director Rex Archer said, “E. coli or salmonella or listeria can grow in the food. And then you give that to homeless people who are more vulnerable — they will end up in the ER and even die from that exposure.”
The city dumped the meals in bags and soaked them in bleach ensure no one would go back and eat the food. Kansas City Health officials said they were only trying to protect the public with this decision.
“There is no question that feeding the homeless is critical,” Archer said. “There are 43 organizations (excluding Free Hot Soup KC) that have permits and do it in a safe way.”
Volunteers with the Free Hot Soup KC were highly upset over the incident, however, and said the city’s raid was another measure to disrupt their potluck dinners to feed the homeless.
“It’s about the criminalization of people who are homeless and the people who support them,” Eric Garbison of the Cherith Brook Catholic Worker House told The Kansas City Star.
Tara McGaw, 27, who started the Free Soup gatherings in Belton, Mo., said the recent incident has left people feeling scared.
“We’re not an establishment,” she said. “We’re not a not-for-profit. We’re just friends trying to help people on the side.”
SEE ALSO: Arizona Black Man Beaten Unconscious By Police Files $1.97 Million Lawsuit
SEE ALSO: Black Students at Goucher college held daylong protest
Copyright ©2018 The Black Detour All Rights Reserved. | {
"pile_set_name": "OpenWebText2"
} |
If we assume that the essence of Buddhism is fundamentally based on dependent origination (pratîtyasamutpada) and no-self (J., muga; S., anâtman) as Hakamaya Noriaki and Matsumoto Shiro of Critical Buddhism (hereafter CB) assume, then Zen Buddhism is not Buddhism. And for that matter, Mahayana Buddhism is not Buddhism.
I don’t think there is any doubt that Hakamaya Noriaki and Matsumoto Shiro, in the book, Pruning the Bodhi Tree (http://goo.gl/sSsyyC), defend the thesis that Buddhism is the negation of the transcendent which lies beyond the sphere of temporality. Any idea of liberation by nirvana is not Buddhism because it implicitly accepts a self to be liberated which goes against no-self.
"In the next essay, on "Liberation and Nirvana: Some Non-Buddhist Ideas," Matsumoto carries his critique one step further to argue that there is no greater misunderstanding than to say that the final goal of Buddhism is "liberation" (gedatsu; vimukti). The reason is that the idea of liberation (vimukti) is based on the non-Buddhist idea that there is a self (âtmavâda) to be liberated, which is an anti-Buddhist idea. Not only liberation, but nirvana, a concentrated state of mind (jhâna, samâdhi), and even "mind" (citta), are all based on the non-Buddhist idea of a self” (Pruning the Bodhi Tree, p. 10).
On the other hand, if CB’s assertion cannot be sustained where the discourses of the Buddha do not regard dependent origination and no-self as primary teachings and, instead, regard transcendence of dependent origination and no-self as primary, then Zen is Buddhism along with Mahayana Buddhism.
If we turn our attention to the scholarly world of what dependent origination probably means, including no-self, these terms merely describe the world of conditionality, namely, samsara.
“The ultimate purpose of the teaching of dependent origination is to expose the conditions that sustain the round of rebirths, samsara, so as to show what must be done to gain release from the round. Existence within samsara is suffering and bondage (dukkha), and hence the ending of suffering requires deliverance from the round" (Bhikkhu Bodhi, The Connected Discourses of the Buddha, p. 517).
Dependent origination is usually explained by the twelve nidânas (ni-dâ = to bind down) or links. This linking process helps to explain rebirth beginning with avidya all the way to old age and death. Without the removal of avidya, there is no escape from the wheel of samsara. In contrast to samsara is, naturally, nirvana which is unconditioned; which is not dependently originated. Nirvana is the primary teaching of the Buddha, not samsara.
“Here, secluded from sensual pleasures ... a bhikkhus enters and dwells in the first jhâna ... He considers whatever phenomena exist there pertaining to form, feeling, perception, volitional activities, and consciousness as impermanent, suffering, an illness, a boil, a dart, misery, affliction, alien, disintegrating, empty, and non-self. He turns his mind away from these phenomena and directs it to the deathless element thus: ‘This is peaceful, this is sublime, that is, the stilling of all activities, the relinquishing of all acquisitions, the destruction of craving, dispassion, cessation, nibbana” (A. iv. 422–23).
Turning to no-self which refers to the Five Aggregates (they appear in the above passage) and the senses, including their respective sense fields, they are all conditioned, never unconditioned. The Buddha tells us in so many words to reject no-self (SN 22:68) and never once the self. It is our self that wins nirvana. | {
"pile_set_name": "OpenWebText2"
} |
Q:
Choosing motor and battery for a robot
I have a project which requires a robot to move around a room with a flat surface (concrete floor).
The robot must carry a laptop. I estimated that the total weight would be 6-7kg (including motors, battery, laptop, motor controller board and other mics items). I would like it to move at about the same speed as a Roomba moves. The robot will have two motors and a castor.
I have tried doing the calculation to determine the type of motor to use, but I'm very confused.
Can someone advise me on the type of motor and type of battery (Lipo/SLA) to use?
A:
Roombas move slowly, below a walking pace, right?
If that's so, then you probably want a geared DC motor. I'm guessing that on concrete you can get away with a motor that's 100W or less, particularly if it's geared down a whole bunch. You might want to figure out the highest incline or steepest step that you want to negotiate, figure out what force you need to surmount that obstacle, multiply by two, and go from there.
To figure out the gear ratio (or to buy a gearbox-motor combination), decide on a wheel diameter and a top speed. Then figure out the wheel speed that gets you that top speed. Then go buy a pair of gear motor that are rated for that RPM as a unit, or select a motor with a known RPM and a gearbox with the right ratio to bring the RPM down.
As far as batteries -- SLA will be way cheaper, LiPo will be more expensive for both batteries and support equipment, but will hold more charge for the weight. You makes your choice and you pays your money...
If this is a one-off then just buy a pair of wheel units made for robots. Whatever you get you're just about guaranteed to be wrong somehow, so the most important thing to do is to start making the mistakes that you'll correct in Robot, Mark II.
| {
"pile_set_name": "StackExchange"
} |
A Linux server clustering system (Linux Virtual Server, LVS for short) is a virtual server clustering system, and is a way for achieving load balancing, in the Linux kernel, based on the Internet Protocol (IP for short) layer and the content-based request distribution.
A Tencent Gateway (TGW for short) project is developed from an LVS project. By using an IP tunneling (IP TUN for short) manner, a TGW can access a service on a Linux server efficiently and transparently. However, since a windows system does not support the IP TUN technology, it is hard to make the TGW access a windows service by using the IP TUN manner. | {
"pile_set_name": "USPTO Backgrounds"
} |
Q:
ASPxGridView default unbound column filter from dropdown
So I am using ASPxGridView for displaying data. I have an unbound column with text in there. Normally, you can filter the column:
-by selecting a value from dropdown
-by typing some text in filter input
The behaviour I'm trying to achieve is: When you select a special value from the dropdown, I want to filter the column with BeginsWith filter. I tried using
<Settings AutoFilterCondition="BeginsWith" />
but it only seems to work with input filtering: when I type text into filter input, column is filtered with specified filter, but when I chose value from dropdown, EqualsTo filter is used instead. How can I achieve my goal behaviour?
A:
So thankfully I've found a solution. What I did:
-get the FilterValue of interest
-and then
filtervalue.Query = "StartsWith([Column], 'value')"
| {
"pile_set_name": "StackExchange"
} |
みなさんこんにちは!
『ASTRAL CHAIN(アストラルチェイン)』 リードエンバイロメントアーティストの横山です。
本作ではアクションだけでなく、探索、収集要素など、寄り道を楽しめる要素が盛りだくさん!
そんな中、私イチオシの『カメラ機能』を通して、本作の世界の魅力をご紹介したいと思います。
『ASTRAL CHAIN』のカメラ機能
『ASTRAL CHAIN』には『カメラ』という要素が存在し、ゲーム中カメラを構えることで、いろいろなフィルターをかけたりして、スクリーンショットを撮ることができます。
ただのおまけ機能だと思ったら大間違い!
ズームイン/アウトは勿論、被写界深度(ボケ表現)や色味を変えるフィルター、そしてなんと、自撮りまで出来てしまいます。
※各種機能の紹介やUIのこだわりなどが書かれたUIセクションの記事も、是非ご覧ください!
『ASTRAL CHAIN』のUIについて:前編(UIアーティスト 大西&斉藤)
『ASTRAL CHAIN』のUIについて:後編(UIアーティスト 大倉&小波)
ライティングとカラーグレーディングについて
と、カメラの話に入る前に、まずは本作の絵作りに大きな影響を与えている、ライティングとカラーグレーディングについて、少しだけ触れてみたいと思います。
ライティングが全くされていない状態。光源の影響がないため、奥行き感がなくのっぺりしています。ここに、Maya上で行ったライティングを焼き付けたり、ゲーム上でライトを置いたりしていきます。
ライティングを行い、光や反射が見られるようになった状態。面に光が当たることで、詳細なディテールが確認できるようになり、オブジェクトのシルエットに立体感が出てきました。
カラーグレーディングやフィルター調整が入った最終結果。Photoshopを触ったことがある方は、色調補正やトーンカーブをイメージして頂けたら良いかと。青をベースに赤を差し色としたツートーンにまとめました。色と明るさにコントラストが出て、全体的にメリハリがついたと思います。
このように、エンバイロメントではアセットの制作や配置をするだけでなく、その後の調整が、絵作りにとても重要な要素となっているのです。
さて、何故いきなりこんな説明をしたかというと、本作の『カメラ』撮影モードの機能『カラーフィルター』は、このカラーグレーディングを、まるっと追加してしまう機能だからなのです!
ということは……
ガラッと映像の印象を変えてお好みの絵柄が出せるということ! とてもたのしい!!
※何もかも自由に調整できるわけではないですが、いくつものパターンから選択することができます。
アークの街中
本作の舞台となる人工島アークは、その特徴的な構造から、地区によって全く異なった表情を見ることができます。
今回はその中からいくつかピックアップして、写真好きのアナタも、そうでないアナタも、ステージを歩くのが楽しくなるオススメの撮影ポイントをご紹介します!
※世界観については、須田さんの記事「美術設定から見る、アークの歩き方!(コンセプトアーティスト 須田)」で詳しく書かれていますので、是非そちらもご覧下さい!
以下のスクリーンショットは、全て実際にカメラ機能で撮影した「撮って出し」のものです。
【第33地区】
建物を埋め尽くすように並んだ看板が印象的な、通称ハーモニースクエア。物語中何度も訪れることになるこの街は、訪れるたび、異なった表情を見せてくれます。
個人的なお気に入りは、「ハーモニーメディアセンター」側から横断歩道側の看板をがっつりとらえた構図!情報量の多い看板は、どこから撮っても映えるので楽しいです。
歩道橋の下を撮るのも、なかなかマニアックな香りがします!ここはちょっと見つけ辛いですね。「LARGER BURGER」前から撮影しました。
【第36地区】
東洋風の塔や漢字の看板が特徴の第36地区。雑然と建物が増築されたこの街は、どう写真に切り取るかによって、大きく印象が変わります。
「ユニオンシティ」へと繋がるトンネル前からパシャリ!青と赤のコントラストが印象的な街です。
漢字の看板が印象的。モノトーンが好きなので、3種類もフィルターを用意してしまいましたが、「何が違うの?」とよく突っ込まれました……。
【第09地区】
屋上に増築された街並みと、それを見下ろすような巨大な壁が存在する第9地区。開けた視界と高低差のある建物のシルエットが印象的です。
壁の存在感が凄いです。思わず撮らずにはいられません。こちらは「伍番街新電脳廣場」の入口から、ぐるっと逆を向いたところです。
ジャンク街も第09地区の魅力の一つ。ちょっとレトロなフィルターで仕上げてみました。
最後に……
駆け足となってしまいましたが、いかがでしたでしょうか?少しでも歩いてみたいと思って頂ける場所があれば、とても嬉しいのですが……。
まだまだ、ご紹介できていない魅力的なところはたくさんあるので、物語を追いかける傍ら、是非、カメラを片手にふらっと歩きまわってみて下さい。
そして、今まで気づかなかった側面を楽しんで頂けることができたなら、エンバイロメントアーティストの一人として、とても光栄に思います。
『ASTRAL CHAIN』 を、どうぞよろしくお願いします。
整備中のヘリコプター。いつもお世話になっています。
出動待ちのバイク! ロボットみたいでかっこいいです。
事件現場を巡回する警察官。トランシーバーに手をかけた姿に、緊張感が漂っています。
民間人とネコ。とても仲が良さそうで、ゆったりとした時間の流れを感じます。
高所から街を見下ろす人影。彼はこの街に何を思うのでしょうか。
| {
"pile_set_name": "OpenWebText2"
} |
Cell membrane topology analysis by RICM enables marker-free adhesion strength quantification.
Reflection interference contrast microscopy (RICM) allows the visualization of the cell's adhesion topology on substrates. Here it is applied as a new label-free method to measure adhesion forces between tumor cells and their substrate without any external manipulation, i.e., the application of force or adjustments in the substrate elasticity. Malignant cancer transformation is closely associated with the down-regulation of adhesion proteins and the consequent reduction of adhesion forces. By analyzing the size and distribution of adhesion patches from a benign and a malignant human pancreatic tumor cell line, we established a model for calculating the adhesion strength based on RICM images. Further, we could show that the cell's spread area does not necessarily scale with adhesion strength. Despite the larger projected cell area of the malignant cell line, adhesion strength was clearly reduced. This underscores the importance of adhesion patch analysis. The calculated force values were verified by microfluidic detachment assays. Static and dynamic RICM measurements produce numerous adhesion-related parameters from which characteristic cell signatures can be derived. Such a cellular fingerprint can refine the process of categorizing cell lines according to their grade of differentiation. | {
"pile_set_name": "PubMed Abstracts"
} |
Alpha1-antichymotrypsin/Alzheimer's peptide Abeta(1-42) complex perturbs lipid metabolism and activates transcription factors PPARgamma and NFkappaB in human neuroblastoma (Kelly) cells.
Amyloid-beta peptide (Abeta) and the serpin proteinase inhibitor alpha1-antichymotrypsin (ACT) are components of the amyloid plaques associated with Alzheimer's disease (AD). Abeta exists in soluble monomeric and oligomeric forms and in an insoluble polymerised fibrillar form, but it is not clear which of these plays the most important role in the etiology of AD. In vitro, Abeta(1-42) interacts with ACT, and as a result of this, ACT loses its proteinase inhibitor activity and polymerisation of Abeta(1-42) is promoted. Here we provide evidence that new molecular forms resulting from incubation of ACT with Abeta(1-42) have multiple cellular level effects on neuronal cells. The mixture of soluble Abeta and an ACT/Abeta complex formed by 2 hr incubation at a 10:1 molar ratio of Abeta:ACT strongly induce cellular proliferation and expression of transcription factors peroxisome proliferator-activated receptor-gamma (PPARgamma) and NFkappaB, and also increase uptake and depress degradation of native and oxidised low-density lipoprotein (LDL) by cells. Similar but less pronounced effects are seen when cells are exposed to the Abeta peptide alone preincubated for 2 hr. Abeta(1-42) and to a lesser extent ACT/Abeta(1-42) complex mixture prepared by 2 hr incubation both inhibit association of native LDL with cells. Neither ACT alone nor the Abeta(1-42) and ACT/Abeta(1-42) forms prepared by 24-hr incubation show any significant effects in these assays. We propose that specific molecular forms of Abeta(1-42) and ACT/Abeta(1-42) complex mixture, both dependent on the abundances of Abeta(1-42) and ACT/Abeta(1-42) in vivo and on their time of exposure to each other, have cellular effects which are important for the initiation and progression of the pathologies associated with AD. | {
"pile_set_name": "PubMed Abstracts"
} |
29 Wn. App. 461 (1981)
629 P.2d 912
THE STATE OF WASHINGTON, Respondent,
v.
DONALD R. WEDDEL, Appellant.
No. 4250-II.
The Court of Appeals of Washington, Division Two.
May 29, 1981.
Stephen Whitehouse, for appellant.
Patrick D. Sutherland, Prosecuting Attorney, and Chris Pomeroy, Deputy, for respondent.
REED, C.J.
Defendant Donald R. Weddel appeals his conviction of second degree burglary. We affirm.
On March 18, 1979, Larry and Jacqueline Wassman returned to their home in Lacey and discovered a gray Chevrolet Chevelle in their driveway with a young woman in the front seat. After the Wassmans had a brief conversation with the woman, who indicated that she thought their house was the residence of "the Hansons," a man they later identified as defendant Weddel came out from behind the house. He circled on foot to a vacant lot next to the house and then approached the vehicle, asking if the lot was for sale. After the man and woman left, Mr. Wassman, suspicious because of their inconsistent explanations for being at *463 the house, wrote down the Chevelle's license number, NET 900, and subsequently reported the incident to the police. There was no evidence, however, of any attempted entry to the Wassman residence.
On March 19, Paul and Wendy Johnson, returning from a shopping trip, arrived at their home located approximately seven-tenths of a mile from the Wassman residence. As the Johnsons pulled up to their mailbox across the street from their home, they noticed a gray Chevrolet Chevelle, occupied by two persons, leaving their driveway, some 50 to 75 feet from the mailbox. Dr. Johnson noted the Chevelle's license number, NET 900, and got a brief look at the driver. The Johnsons subsequently discovered that someone had stolen two stereo speakers from their living room after kicking open the front door.
Kelso police arrested defendant on March 20, apparently because he previously had been convicted of burglary and owned a vehicle matching the license number and description the Wassmans and Johnsons furnished. On March 23, while defendant was in custody, Mrs. Wassman positively identified him from a 6-picture photographic array, and on March 26 Mr. Wassman did likewise. Shown the same series of six pictures on March 23, Dr. Johnson tentatively identified defendant's picture as "the only one that looked like the individual I had seen driving the car."
On March 30 the State formally charged defendant with second degree burglary of the Johnson residence. On June 6 an amended information was filed, adding a second count charging attempted second degree burglary of the Wassman residence.[1] Before and during trial, defendant's timely *464 motions pursuant to CrR 4.4 to sever the attempted burglary count were denied.[2] At trial, defendant presented three alibi witnesses who testified they saw him in Longview at approximately the time the Johnson burglary was committed, but he presented no evidence directed to the Wassman attempted burglary count. Defendant did not testify in his own defense. The jury returned a verdict of guilty on the burglary count and not guilty on the attempted burglary count. Defendant appeals from the burglary conviction, assigning error to the trial court's refusal (1) to sever the attempted burglary count; and (2) to suppress Dr. Johnson's photographic identification of defendant conducted while he was in custody.
[1] Addressing first the issue of severance, we are mindful that joinder of counts should never be utilized in such a way as to unduly embarrass or prejudice one charged with a crime, or to deny him a substantial right. State v. Smith, 74 Wn.2d 744, 446 P.2d 571 (1968), vacated on other grounds sub nom. Smith v. Washington, 408 U.S. 934, 33 L.Ed.2d 747, 92 S.Ct. 2852 (1972). The determination of whether prejudice resulting from joinder of counts is sufficient to warrant severance, however, is within the discretion of the trial court. State v. Thompson, 88 Wn.2d 518, 564 P.2d 315 *465 (1977); State v. McDonald, 74 Wn.2d 563, 445 P.2d 635 (1968). The trial court's exercise of this discretion will be overturned on appeal only upon a showing of manifest abuse. State v. Wills, 21 Wn. App. 677, 586 P.2d 543 (1978), review denied, 92 Wn.2d 1006 (1979).
Defendant contends he was prejudiced by joinder of the attempted burglary charge in three ways. First, he argues the jury may have inferred that because he did not deny being at the Wassman residence, he must also have been at the Johnson residence; thus, joinder "confounded and embarrassed" him in his alibi defense to the Johnson burglary charge. Second, he argues the jury may have cumulated evidence of the crimes charged to find him guilty of the Johnson burglary when it might not have so found if the charges had been tried separately. Third, he argues joinder of the charges frustrated his desire to testify concerning the burglary charge but not to testify concerning the attempted burglary charge.
[2, 3] We believe the first two of these arguments clearly are without merit and essentially complain of the same harm that in their deliberations on the burglary count the jurors may have considered evidence introduced to prove the attempted burglary. Where the general requirements for joinder are met and evidence of one crime would be admissible to prove an element of a second crime, joinder of the two crimes usually cannot be prejudicial. State v. Pleasant, 21 Wn. App. 177, 583 P.2d 680 (1978), review denied, 91 Wn.2d 1011, cert. denied, Pleasant v. Washington, 441 U.S. 935, 60 L.Ed.2d 664, 99 S.Ct. 2058 (1979); State v. Kinsey, 7 Wn. App. 773, 502 P.2d 470 (1972), review denied, 82 Wn.2d 1002 (1973); State v. Conley, 3 Wn. App. 579, 476 P.2d 544 (1970). The general requirements for joinder of offenses are satisfied in this case because burglary and attempted burglary obviously are offenses "of the same or similar character." CrR 4.3(a). The remaining question, then, is whether evidence of the attempted burglary would have been admissible in a separate trial of the burglary charge. As a general rule, a *466 defendant must be tried for the offenses charged in the information and evidence of other offenses may not be admitted as proof of guilt of the charged offenses if the evidence is relevant only to prove the defendant's criminal disposition. State v. Goebel, 40 Wn.2d 18, 240 P.2d 251 (1952). The general rule excluding evidence of uncharged offenses is subject to certain exceptions, the most common of which involve "other crimes" evidence offered to show (1) motive, (2) intent, (3) absence of accident or mistake, (4) common scheme or plan, or (5) identity. The foregoing list of exceptions is not exclusive, however, and the true test of admissibility is whether the other crimes evidence is relevant and necessary to prove an essential ingredient of the crime charged. See State v. Lew, 26 Wn.2d 394, 174 P.2d 291 (1946); State v. Kinsey, supra; ER 404(b). We believe that evidence of the attempted burglary was admissible to establish defendant's presence in the near vicinity of the burglary a short time before it occurred. See State v. Cartwright, 76 Wn.2d 259, 456 P.2d 340 (1969); State v. Leroy, 61 Wash. 405, 112 P. 635 (1911); State v. Norris, 27 Wash. 453, 67 P. 983 (1902); State v. Hyde, 22 Wash. 551, 61 P. 719 (1900). Defendant's presence in the Johnson neighborhood 1 day before the burglary clearly was relevant to an important issue in the burglary prosecution because defendant lived in the Longview/Kelso area (more than 70 miles south of Lacey) and relied on alibi witnesses placing him in Longview at the time of the burglary as a defense to that charge. Accordingly, because evidence of the attempted burglary would have been admissible in any event in a separate trial of the burglary count, joinder of the two offenses did not unduly prejudice defendant either by undercutting his alibi defense or by permitting the jury to cumulate evidence of separate crimes.
We also reject defendant's third argument that joinder effectively denied him the right to testify in his own defense by forcing him to choose between testifying about both crimes or not testifying at all. In support of this argument, he relies principally on Cross v. United States, 335 *467 F.2d 987 (D.C. Cir.1964). In Cross, the court vacated convictions of two defendants and remanded for new trials because it concluded that joinder of counts had been prejudicial within the meaning of rule 14 of the Federal Rules of Criminal Procedure, which is substantially similar to CrR 4.4. The court noted that prejudice may develop
when an accused wishes to testify on one but not the other of two joined offenses which are clearly distinct in time, place and evidence.
Cross, 335 F.2d at 989. The defendants in Cross did not specify at trial the counts upon which they wished to remain silent and why, but this apparently was because the trial court insisted that the issue of joinder had been determined finally in its denial of a pretrial motion to sever and refused to hear the defendants' arguments. Id. at 990 & n. 6. Examining the record of the defendants' testimony, the Court of Appeals determined that defendant Cross offered convincing evidence on the count upon which he was acquitted but was plainly evasive and unconvincing in his testimony on the count upon which he was convicted. The court held:
Thus it would appear that Cross had ample reason not to testify on Count I and would not have done so if that count had been tried separately. In a separate trial of that count the jury would not have heard his admissions of prior convictions and unsavory activities; nor would he have been under duress to offer dubious testimony on that count in order to avoid the damaging implication of testifying on only one of the two joined counts. Since the joinder embarrassed and confounded Cross in making his defense, the joinder was prejudicial within the meaning of Rule 14.
(Footnote omitted.) Id. at 990-91.[3]
[4] Federal cases decided after Cross, however, have indicated that a defendant's mere desire to testify only to one count is an insufficient reason to require severance. *468 E.g., Alvarez v. Wainwright, 607 F.2d 683 (5th Cir.1979); United States v. Williamson, 482 F.2d 508 (5th Cir.1973). Severance is required only if the defendant makes a convincing showing to the trial court that he has both important testimony to give concerning one count and a strong need to refrain from testifying about the other. United States v. Jardan, 552 F.2d 216 (8th Cir.), cert. denied, 433 U.S. 912, 53 L.Ed.2d 1097, 97 S.Ct. 2982 (1977); Baker v. United States, 401 F.2d 958 (D.C. Cir.1968), cert. denied, 400 U.S. 965, 27 L.Ed.2d 384, 91 S.Ct. 367 (1970).
In making such a showing, it is essential that the defendant present enough information regarding the nature of the testimony he wishes to give on one count and his reasons for not wishing to testify on the other to satisfy the court that the claim of prejudice is genuine and to enable it intelligently to weigh the considerations of "economy and expedition in judicial administration" against the defendant's interest in having a free choice with respect to testifying.
(Footnote omitted.) Baker, 401 F.2d at 977. Although he had an opportunity to make such a showing, defendant Weddel did so neither before the trial court nor before this court. Furthermore, we doubt that his testimony could have significantly strengthened his alibi defense in the minds of the jurors, particularly since he produced three witnesses to support that defense. In the absence of evidence to the contrary, we conclude that the overriding reason why defendant chose not to testify was not his fear of incriminating himself on the attempted burglary count, but rather his realization that the State would use a prior burglary conviction for impeachment. Therefore, his third and final argument concerning prejudice caused by joinder of counts is without merit. We hold the trial court did not abuse its discretion in refusing to sever the attempted burglary count.
As his second assignment of error, defendant argues that the trial court erred in admitting Dr. Johnson's photographic identification, relying on State v. Thorkelson, 25 Wn. App. 615, 611 P.2d 1278, review denied, 94 Wn.2d *469 1001 (1980). Defendant's statement of the issue is rather vague, and we are unable to determine with assurance whether he objects solely to the fact that a photographic identification was conducted after he was in custody and available for a physical lineup or instead contends that the identification procedure was so impermissibly suggestive as to deny him due process of law. Because he presented both theories to the trial court, however, we will address each in turn.
On a number of occasions Washington appellate courts have criticized the use of a photographic identification procedure when a physical lineup was feasible. For instance, in State v. Nettles, 81 Wn.2d 205, 209-10, 500 P.2d 752 (1972), the Supreme Court said:
We cannot commend the [photographic] identification procedure which was used in this case. Where a defendant is in custody and available for a lineup, a lineup identification procedure would usually be a more effective, less questionable law enforcement technique, and should be used, following the requirements or standards prescribed in United States v. Wade, 388 U.S. 218, 18 L.Ed.2d 1149, 87 S.Ct. 1926 (1967), and Gilbert v. California, 388 U.S. 263, 18 L.Ed.2d 1178, 87 S.Ct. 1951 (1967).
In Nettles, however, the court upheld the photographic identification used in that case. The court held that a photographic identification denies a defendant due process of law only if the procedure was so impermissibly suggestive as to give rise to a very substantial likelihood of irreparable misidentification. Nettles, 81 Wn.2d at 209-10.[4]Accord, Simmons v. United States, 390 U.S. 377, 19 L.Ed.2d 1247, 88 S.Ct. 967 (1968); and see Manson v. Brathwaite, 432 U.S. 98, 53 L.Ed.2d 140, 97 S.Ct. 2243 (1977). Thus, although a physical lineup is preferred over a photographic *470 identification when the suspect is in custody, ideal identification techniques are not constitutionally required. State v. Butts, 16 Wn. App. 828, 560 P.2d 1154 (1977).
Despite its holding in Nettles, the Supreme Court in a more recent case cryptically noted that courts in some other jurisdictions limit the use of photographic identification when the suspect is in custody by requiring the existence of extenuating circumstances before such a procedure may be used. State v. Hilliard, 89 Wn.2d 430, 438, 573 P.2d 22 (1977). The court declined to decide that issue in Hilliard, however, because it found an extenuating circumstance justifying in any event the use of a photographic identification the defendant had attempted to thwart a lineup identification by cutting his hair and shaving his beard.
With these cases as background, Division One of this court recently reversed an armed robbery conviction resulting from a photographic identification, holding that "absent extenuating circumstances, photographic identification procedures of an in-custody defendant should not be used." Thorkelson, 25 Wn. App. at 619. The court noted that the four witnesses in Thorkelson had only a fleeting glimpse of the person they later identified as the defendant. Only two of the three witnesses who later positively identified Thorkelson at a lineup and at trial were able to choose Thorkelson's photograph as being that of the robber, and those identifications were only tentative. Referring to the widespread disregard of the Supreme Court's longstanding disapproval of photographic identifications when suspects are in custody, the Thorkelson court concluded that all identification evidence in connection with the robbery should have been suppressed.[5] We read Thorkelson as adopting a per se rule excluding, absent extenuating circumstances, photographic identifications made while a defendant is in *471 custody, without regard to whether the photographic identification procedure contained elements of suggestiveness.[6] Because defendant Weddel argues that Thorkelson dictates reversal of his conviction and urges us to adopt a similar rule, we believe an analysis of later Division One identification cases is appropriate.
Several months after Thorkelson was decided, another panel of Division One affirmed an armed robbery conviction in State v. Schultz, 27 Wn. App. 722, 627 P.2d 107 (1980), although the defendant had been identified through a photographic montage procedure while he was in custody. The Schultz court, referring to Hilliard, noted that the Supreme Court
has not decided whether the lineup procedure must be used in the absence of extenuating circumstances if the defendant is in custody.
Schultz, 27 Wn. App. at 723. The court distinguished Thorkelson on the basis that it was a "fleeting glimpse" case, whereas Schultz was not. Id. at 725. The court seemed to hold, however, that photographic identification of a suspect in custody does not constitute reversible error unless it is so impermissibly suggestive as to give rise to a very substantial likelihood of irreparable misidentification.
Subsequently, in State v. Burrell, 28 Wn. App. 606, 625 P.2d 726 (1981), a third Division One panel affirmed an assault conviction resting on a photographic identification conducted while the suspect was in custody. In an opinion written by the author of Thorkelson, a majority of the panel reasoned that although the photographs shown to the *472 witnesses were suggestive, there nevertheless were sufficient indications that the identifications were reliable to conclude that the identification procedure did not deny Burrell due process of law. Discussing State v. Thorkelson, 25 Wn. App. 615, 611 P.2d 1278 (1980), upon which defendant Burrell relied, the majority said:
The purpose of placing some restriction upon police identification procedures is to prevent misidentification of suspects by witnesses. The lineup is favored because it is generally considered more reliable and as involving less risk of prejudice and misidentification.... The identifications in Thorkelson were patently unreliable because the witnesses, who had little opportunity to observe the robber, were subjected to a photo identification procedure whose effect was almost certain to leave them with a recollection of the suspect based on Thorkelson's photograph rather than their original impressions. The denial of due process stemmed not merely from use of a photo montage, but from use of an identification procedure almost calculated to create a serious risk of misidentification.
Identification evidence should be suppressed only where consistent with the purpose of such restrictions, namely, preventing misidentification of suspects by witnesses. Thorkelson creates a rule of exclusion somewhat broader in scope than is consistent with this purpose. But the procedure by which identification evidence is obtained is not so determinative of its reliability that a per se rule of exclusion for photographic identifications is appropriate. Insofar as Thorkelson may suggest a per se rule of exclusion, we modify its holding.
(Citations omitted.) Burrell, 28 Wn. App. at 609-10. The majority went on to hold that a photographic procedure violates due process only if, under the totality of circumstances, the procedure is so impermissibly suggestive as to give rise to a very substantial likelihood of irreparable misidentification.
The third member of the Burrell panel concurred only in the result, interpreting the majority opinion to hold that the violation in Burrell of the per se Thorkelson rule was harmless under the circumstances in light of the strong *473 indicia of reliability surrounding the identifications. The concurring judge stated:
The rule in Thorkelson is a salutary one that reduces the risk of misidentification. The majority's purported modification of Thorkelson is dicta unnecessary to the decision. The law in this jurisdiction remains that absent extenuating circumstances, a photographic identification procedure should not be used when the defendant is in custody. A violation of this rule requires balancing the inherently corruptive effect of the photo montage and any other suggestiveness against the countervailing indicia of reliability.
Burrell, 28 Wn. App. at 612.
[5] After reading the Thorkelson/Schultz/Burrell trilogy of cases, we are somewhat uncertain about the current state of the law in Division One regarding photographic identifications conducted while a suspect is in custody. Apparently, in Burrell, Division One abandoned the per se Thorkelson rule, which would exclude photographic identifications, without regard to the suggestiveness of the photographs or the procedure, unless there exist in the particular case countervailing indicia of reliability. Regardless of whether our reading of those cases is correct, however, until and unless the Supreme Court holds to the contrary, the rule in this division remains that a photographic identification conducted while a defendant is in custody, although not favored, will be suppressed only if it is so impermissibly suggestive as to give rise to a very substantial likelihood of irreparable misidentification. State v. Butts, 16 Wn. App. 828, 829, 560 P.2d 1154 (1977); State v. Nettles, 6 Wn. App. 257, 260, 492 P.2d 567 (1971). Accordingly, the mere fact that, at the time the photographic identification was conducted in this case, defendant Weddel was in custody and available for a lineup does not determine whether the trial court erred in admitting the identification at trial.
We must decide, then, whether the photographic identification procedure was so impermissibly suggestive as to deny defendant Weddel due process of law by creating a *474 very substantial likelihood of irreparable misidentification. In Simmons v. United States, 390 U.S. 377, 19 L.Ed.2d 1247, 88 S.Ct. 967 (1968), the court discussed several possible sources of suggestiveness that heighten the danger that witnesses who had only a brief glimpse of a criminal or saw him under poor conditions may err in making an identification from photographs. These include: (1) the police displaying to the witness only the picture of a single individual who generally resembles the person he saw; (2) the police showing the witness the pictures of several persons among which the photograph of a single individual recurs or in some way is emphasized; and (3) the police indicating to the witness that they have other evidence that one of the persons pictured committed the crime. Simmons, 390 U.S. at 383. See P. Wall, Eye-Witness Identifications in Criminal Cases 73-83 (1965).
Defendant here does not contend that police conduct during the identifications was suggestive. Before and while showing the photographs, the officer said nothing to the witnesses except that he had a series of photographs and wanted them to identify, if possible, anyone that they recognized. Each witness viewed the photographs outside the presence of other witnesses. After making their identifications, the witnesses were instructed to say nothing to other witnesses about the photograph they had selected. The officer rearranged the order of the photographs after each viewing.
Defendant does contend, however, that the photographs themselves are suggestive. Of the six photographs shown to the witnesses, all are Polaroid-type color prints and all depict similar-looking men in their twenties or early thirties with dark hair and moustaches. Defendant's photograph, however, is 4 1/4 inches wide compared to 4 inches for the others. Furthermore, the six photographs contain three different backgrounds. Three photographs were taken against a light beige metal door, two against a dark wood door, and only defendant's against an off-white wall with *475 an electrical panel showing. Defendant argued at the suppression hearing that the differences in width and background made his photograph stand out from the others, suggesting to the witnesses which photograph to choose.
[6] Having viewed the photographic array, we conclude that it is not completely free of possible suggestiveness. We believe, however, that the array is not impermissibly suggestive. The difference in width is so slight as to be virtually imperceptible.[7] The difference in background is more troubling, but we are convinced that Dr. Johnson was not influenced in his choice by that feature of the photograph.[8] Any possible suggestiveness was minimized somewhat by the two different backgrounds in the other five photographs.[9] Although the photographic array used in this case was less than ideal, it was not so impermissibly suggestive *476 as to deny defendant due process of law.[10] Defendant having failed to establish a constitutional violation, the validity of the identification procedure and the weight to attach to it were questions for the jury to determine.
*477 Judgment affirmed.
PETRIE and PETRICH, JJ., concur.
Reconsideration denied June 23, 1981.
Review denied by Supreme Court October 16, 1981.
NOTES
[1] CrR 4.3 governs joinder of offenses in a single trial. It provides in pertinent part:
"(a) Joinder of Offenses. Two or more offenses may be joined in one charge, with each offense stated in a separate count, when the offenses, whether felonies or misdemeanors or both:
"(1) are of the same or similar character, even if not part of a single scheme or plan; or
"(2) are based on the same conduct or on a series of acts connected together or constituting parts of a single scheme or plan;
"(3) improper joinder of offenses or defendants shall not preclude subsequent prosecution on the same charge for the charge or defendant improperly joined."
[2] CrR 4.4 provides in pertinent part:
"(a) Timeliness of Motion; Waiver.
"(1) A defendant's motion for severance of offenses or defendants must be made before trial, except that a motion for severance may be made before or at the close of all the evidence if the interests of justice require. Severance is waived if the motion is not made at the appropriate time.
"(2) If a defendant's pretrial motion for severance was overruled he may renew the motion on the same ground before or at the close of all the evidence. Severance is waived by failure to renew the motion.
"(b) Severance of Offenses.
"(1) The court, on application of the prosecuting attorney, or on application of the defendant other than under section (a), shall grant a severance of offenses whenever before trial or during trial with consent of the defendant, the court determines that severance will promote a fair determination of the defendant's guilt or innocence of each offense."
[3] The court also vacated the conviction of Cross' codefendant because it concluded that he, too, was prejudiced by Cross' testimony.
[4] The court also held that the Sixth Amendment right to counsel does not extend to an out-of-court photographic identification, regardless of the fact that the defendant may be in custody at the time. Nettles, 81 Wn.2d at 207-09. Accord, United States v. Ash, 413 U.S. 300, 37 L.Ed.2d 619, 93 S.Ct. 2568 (1973).
[5] The court held that the subsequent lineup and in-court identification also were inadmissible because they had no independent origin, concluding that the witnesses' recollections probably were tainted by being shown the photographic montage. Thorkelson, 25 Wn. App. at 619-20.
[6] The court neglected to indicate what features, if any, of the photographic montage procedure were suggestive. A review of the appellate briefs filed in Thorkelson reveals that the montage consisted of 16 photographs of subjects similar in appearance. The defendant mentioned nothing improper about the photographic identification itself other than that he was in custody at the time. Brief of Appellant, at 16-22, 43-52, State v. Thorkelson, supra. The defendant did argue, however, that the later physical lineup, at which he was positively identified, was suggestive because he was the only person in the lineup who matched the description of the robber given to police and the only one whose picture also appeared in the photographic montage. Brief of Appellant, at 22, 50.
[7] In State v. Smith, 9 Wn. App. 279, 511 P.2d 1032, review denied, 82 Wn.2d 1013 (1973), the police showed an 11-photograph array to witnesses to an armed robbery. Eight of the photographs were 2 1/2 by 3 1/2 inches in size, while the other three were 3 by 5 inches. Two of the larger photographs were of the defendant. The court concluded that the photographs were not impermissibly suggestive.
[8] At trial Dr. Johnson was questioned about his photographic identification of defendant as follows:
Q At the time that you observed the photographs, did you notice the background, or were you looking at the person's face for identification purposes?
A I was looking at the faces.
Q Now, looking at the photographs now, do you notice dissimilarity in the backgrounds of the photographs?
A I do.
Q How many differences are there in the backgrounds of the photographs?
A Well, I think the basic difference that I see is the coloration. The last one, as well as a couple of the others, were taken in different locations, but the photograph that I selected is of a different coloration.
Q Did you notice that at the time you made the identification?
A As I was identifying it, I do not think that entered in on my decision whatsoever.
[9] The officer who conducted the identifications received defendant's photograph in the mail from the Kelso police, who were holding defendant in custody. When the officer realized that he would not be able to duplicate the background of defendant's photograph in the remaining photographs, it would have been better procedure to take those photographs against five different backgrounds.
[10] Courts in other jurisdictions consistently have reached the same conclusion when addressing claims of impermissible suggestiveness in similar factual contexts. See United States v. Merryman, 630 F.2d 780 (10th Cir.1980) (only photograph not bearing numbers, only 1 depicting a Caucasian, and 1 of only 2 in color among those shown); United States v. Lincoln, 494 F.2d 833 (9th Cir.1974) (only color photograph among 9 shown); United States v. Harrison, 460 F.2d 270 (2d Cir.), cert. denied, 409 U.S. 862, 34 L.Ed.2d 110, 93 S.Ct. 152 (1972) (only single front-view photograph and only 1 showing clean-shaven face among 7 shown); United States v. Bell, 457 F.2d 1231 (5th Cir.1972) (only full-length photograph among those shown, where witness had seen criminal standing beside his car); United States v. Magnotti, 454 F.2d 1140 (2d Cir.1972) (only full-view photograph shown along with 7 "mug shots"); United States v. Cunningham, 423 F.2d 1269 (4th Cir.1970) (7 out of 14 photographs shown were of defendants, only color photographs were of defendants); United States ex rel. Johnson v. Hatrak, 417 F. Supp. 316 (D.N.J. 1976), aff'd mem., 564 F.2d 90 (3d Cir.1977), cert. denied, 435 U.S. 906, 55 L.Ed.2d 497, 98 S.Ct. 1454 (1978) (only photograph bearing legend "Rob." among 16 shown, where defendant charged with armed robbery); United States v. Bostic, 360 F. Supp. 1300 (E.D. Pa.), aff'd mem., 491 F.2d 751 (3d Cir.1973) (only photograph depicting person with scar on forehead among 8 shown); State v. Hafner, 168 Conn. 230, 362 A.2d 925, cert. denied, 423 U.S. 851, 46 L.Ed.2d 74, 96 S.Ct. 95 (1975) (defendant's photograph slightly larger than other 6 shown); United States v. Sherry, 318 A.2d 903 (D.C. App. 1974) (only single front-view photograph among 12 shown); People v. Witted, 79 Ill. App.3d 156, 398 N.E.2d 68 (1979) (only single-view photograph and only 1 without writing on it among 25 shown); Gaddis v. State, 267 Ind. 100, 368 N.E.2d 244 (1977) (defendant's photograph smaller than other 6 shown; only 1 with strip of paper pasted over bottom); State v. Robinson, 386 So.2d 1374 (La. 1980) (defendant's photograph more yellowed than other 4 shown); State v. Cass, 356 So.2d 936 (La. 1977) (defendant's photograph 1 of 2 snapshots shown along with 8 "mug shots"); Commonwealth v. Clark, ___ Mass. ___, 393 N.E.2d 296 (1979) (defendant's photograph 1 of 2 snapshots shown along with 11 "mug shots"); State v. Gomillia, 529 S.W.2d 892 (Mo. App. 1975) (defendant's photograph 1 of 2 which were inch longer and wider than other 9 shown); State v. Farrow, 61 N.J. 434, 294 A.2d 873 (1972), cert. denied, 410 U.S. 937, 35 L.Ed.2d 602, 93 S.Ct. 1396 (1973) (defendant's photograph inch longer and wider than other 4 shown); People v. Joyiens, 39 N.Y.2d 197, 347 N.E.2d 621, 383 N.Y.S.2d 259 (1976) (only photograph with blank background among 11 shown); People v. Fox, 65 App. Div.2d 880, 410 N.Y.S.2d 180 (1978) (only non-Polaroid-type photograph among 7 shown; also "several other variations"); State v. Davis, 294 N.C. 397, 241 S.E.2d 656 (1978) (2 photographs of defendant only ones not bearing police department name plate among 14 shown).
| {
"pile_set_name": "FreeLaw"
} |
Sleek Business Card Holder
Your staff will be eager and proud to whip out their business cards with this statement making sleek business card holder you present to each of them. It makes a signature presentation with its stylish polished silver finish in dimensions of 3.875" x 2.5" for storing approximately 12 business cards.
The case cover features an intriguing design that makes a unique border for your personalization. Your individual message will be well remembered by those who receive this savvy business gift. Create your own unique message with our free engraving services.
Comments: This is a really good case and lives up to the name of sleek. I'd recommend it highly.
Rating:
"Great Customer Service"
Rosa Bajwa
Comments: Memorable Gifts offers great customer service and great prices. Will definitely use them again for both professional and personal purchases.
Rating:
"business card case"
Deborah Amos-Onwuegbuna
Comments: The original order had to be changed,because it was out of stock.However they did a beautiful job engraving the second choice.Kudos!
Rating:
"Perfect. Just what I wanted."
Maggie L Eike
Comments: The website is very easy to use. Very quick delivery. The item was exactly what I ordered. Thank you!
Rating:
"Beautiful!"
Holly Wilkison
Comments: I ordered a silver business card holder for my fiance for Christmas. Not only did it arrive earlier than I expected, it was absolutely gorgeous and the engraving was perfect. It looks expensive and I couldn't be happier. I can't wait to give it to him! | {
"pile_set_name": "Pile-CC"
} |
The Scene Aesthetic (album)
The Scene Aesthetic is the second album released by The Scene Aesthetic and is a re-release of their 2006 debut album, Building Homes from What We've Known. The album contains remastered and remixed versions of all of the tracks from their debut album plus three additional tracks.
The Scene Aesthetic was released on July 10, 2007.
Track listing
Personnel
The Scene Aesthetic
Andrew de Torres – guitar, vocals, harmonica, mandolin
Eric Bowley – vocals, tambourine
Additional musicians
Xavier McHugh – drums
Nick Simmons – bass
Robbie Cochrane (of Danger Radio) – guitar
Brandon Metcalf – programming, percussion
Spencer Mertel (of Danger Radio) – programming
Nico Hartikainen (of Danger Radio) – programming
Dan Young (of This Providence) – vocals on "We've Got the Rain on Our Side"
References
Category:2006 albums
Category:The Scene Aesthetic albums | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
Plotting in Python Notebook (Docs)
Attempting to go through the pandas doc at http://pandas.pydata.org/pandas-docs/stable/visualization.html#basic-plotting-plot I get an error :
NameError: name 'Series' is not defined
I can import pandas and supply 'pandas.Series', but I want to know how to set up notebook, as in the docs, so that it's already included.
A:
You can customize Ipython notebook profile file ipython_config.py typically located in ~/.ipython/profile_default/ by adding something like :
c.InteractiveShellApp.exec_lines = [
'import pandas',
]
You can read the documentation for ipython latest version here
| {
"pile_set_name": "StackExchange"
} |
// Copyright (c) Microsoft. All Rights Reserved. Licensed under the Apache License, Version 2.0. See License.txt in the project root for license information.
using System;
using System.Collections.Generic;
using Microsoft.CodeAnalysis.Diagnostics;
using Microsoft.CodeAnalysis.Editor.Shared.Tagging;
using Microsoft.CodeAnalysis.Shared.Collections;
using Microsoft.CodeAnalysis.Shared.TestHooks;
using Microsoft.CodeAnalysis.Text;
using Microsoft.VisualStudio.Text;
using Microsoft.VisualStudio.Text.Tagging;
namespace Microsoft.CodeAnalysis.Editor.Implementation.Diagnostics
{
internal abstract partial class AbstractAggregatedDiagnosticsTagSource<TTag> : TagSource<TTag> where TTag : ITag
{
private readonly DiagnosticService _service;
private readonly Mode _mode;
protected AbstractAggregatedDiagnosticsTagSource(
ITextBuffer subjectBuffer,
IForegroundNotificationService notificationService,
DiagnosticService service,
IAsynchronousOperationListener asyncListener) :
base(subjectBuffer, notificationService, asyncListener)
{
_service = service;
_mode = GetMode(subjectBuffer);
}
private Mode GetMode(ITextBuffer subjectBuffer)
{
Workspace workspace;
if (Workspace.TryGetWorkspace(subjectBuffer.AsTextContainer(), out workspace) && workspace.Kind == WorkspaceKind.Preview)
{
return new ReadOnlyMode(this);
}
return new InteractiveMode(this);
}
protected override void Disconnect()
{
base.Disconnect();
_mode.Disconnect();
}
protected abstract int MinimumLength { get; }
protected abstract bool ShouldInclude(DiagnosticData diagnostic);
protected abstract TagSpan<TTag> CreateTagSpan(SnapshotSpan span, DiagnosticData diagnostic);
public override ITagSpanIntervalTree<TTag> GetTagIntervalTreeForBuffer(ITextBuffer buffer)
{
if (buffer == this.SubjectBuffer)
{
return _mode;
}
return null;
}
private static SnapshotSpan AdjustSnapshotSpan(SnapshotSpan span, int minimumLength)
{
var snapshot = span.Snapshot;
// new length
var length = Math.Max(span.Length, minimumLength);
// make sure start + length is smaller than snapshot.Length and start is >= 0
var start = Math.Max(0, Math.Min(span.Start, snapshot.Length - length));
// make sure length is smaller than snapshot.Length which can happen if start == 0
return new SnapshotSpan(snapshot, start, Math.Min(start + length, snapshot.Length) - start);
}
protected override void RecomputeTagsForeground()
{
// do nothing, we don't use this.
}
private class IntervalIntrospector : IIntervalIntrospector<Data>
{
public readonly ITextSnapshot Snapshot;
public IntervalIntrospector(ITextSnapshot snapshot)
{
this.Snapshot = snapshot;
}
public int GetStart(Data value)
{
return value.TrackingSpan.GetStartPoint(this.Snapshot);
}
public int GetLength(Data value)
{
return value.TrackingSpan.GetSpan(this.Snapshot).Length;
}
}
private struct Data
{
public readonly DiagnosticData Diagnostic;
public readonly ITrackingSpan TrackingSpan;
public Data(DiagnosticData diagnostic, ITrackingSpan trackingSpan)
{
this.Diagnostic = diagnostic;
this.TrackingSpan = trackingSpan;
}
public bool IsDefault
{
get { return this.Diagnostic == null; }
}
public SnapshotSpan GetSnapshotSpan(ITextSnapshot snapshot, int minimumLength)
{
var span = this.TrackingSpan.GetSpan(snapshot);
return AdjustSnapshotSpan(span, minimumLength);
}
}
private abstract class Mode : ITagSpanIntervalTree<TTag>
{
protected readonly AbstractAggregatedDiagnosticsTagSource<TTag> Owner;
public Mode(AbstractAggregatedDiagnosticsTagSource<TTag> owner)
{
this.Owner = owner;
}
public abstract void Disconnect();
public abstract IList<ITagSpan<TTag>> GetIntersectingSpans(SnapshotSpan snapshotSpan);
protected DiagnosticService DiagnosticService
{
get { return this.Owner._service; }
}
protected ITextBuffer SubjectBuffer
{
get { return this.Owner.SubjectBuffer; }
}
protected IAsynchronousOperationListener Listener
{
get { return this.Owner.Listener; }
}
protected void RefreshEntireBuffer()
{
var snapshot = this.SubjectBuffer.CurrentSnapshot;
this.Owner.RaiseTagsChanged(this.SubjectBuffer, new NormalizedSnapshotSpanCollection(snapshot, new Span(0, snapshot.Length)));
}
}
}
}
| {
"pile_set_name": "Github"
} |
With nearly $100 million in TIF funds being spent on the first phase of a massive development on the south lakefront, a community summit on Saturday will discuss strategies to win a community benefits agreement for the project.
The Coalition for a Lakeside CBA meets Saturday, September 7, from 9 a.m. to 2 p.m. at Our Lady of Guadalupe Church, 3200 E. 91st.
Jennifer Epps-Addison of the Partnership for Working Families will discuss how community benefits agreements (CBAs) across the country have won opportunities for local workers and communities, and Tom Tresser of CivicLab will present an analysis of all TIFs in three local wards.
The Coalition will also release results of a new survey of Southeast Side residents.
Site developer McCaffrey Interests has been granted $96 million in TIF support from the city for the first phase of a vast new redevelopment of the former site of US Steel’s South Works (USX) plant, dubbed Chicago Lakeside. Ultimately McCaffrey plans over 13,000 units of housing, 17.5 million square feet of retail, 125 acres of parks and a 1,500-slip marina.
The TIF subsidy will cover one-fourth of development costs for the first phase of the project, which will include 1 million square feet of retail and restaurants and 848 units of housing. The first phase is planned for the northwest corner of the 530-acre site, which runs south from 79th Street along the lakefront to the Calumet River.
Concerns about displacement
A major concern is that development could cause displacement in the adjoining area, as it has in other communities, with property tax increases as home values rise forcing longtime residents to leave, said Amelia NietoGomez of the Alliance of the South East, an organizer of the coalition.
Categories
By Stephen Franklin Community Media Workshop A 3-year-old child died on a plane from Chicago to Poland. This, Magdalena Pantelis instantly knew, was a story her readers would care about. But she needed more detail to write about it for the Polish Daily News, the nation’s oldest daily newspaper in Polish, founded Jan. […]
Email Address:*
First Name:*
Last Name:*
Organization
Zip Code:*
Country:
CAN TV is a network that belongs to the people of Chicago. For updates on local programs, and live, timely coverage of community events, sign up at http://www.cantv.org | {
"pile_set_name": "Pile-CC"
} |
Directions
For relish, in a small bowl, combine the first five ingredients; set aside. Combine salt and pepper; sprinkle over fillets. Place on a broiler pan coated with cooking spray. Broil 3-4 in. from the heat for 9-12 minutes or until fish flakes easily with a fork. Use a slotted spoon to serve relish with the fish.Yield: 4 servings.
Originally published as Fish with Cucumber-Orange Relish in Light & Tasty
August/September 2005, p58 | {
"pile_set_name": "Pile-CC"
} |
International speed dating nyc Dating grannies sex
A 2006 study in Edinburgh, Scotland showed that 45% of the women participants in a speed-dating event and 22% of the men had come to a decision within the first 30 seconds.
It also found that dialogue concerning travel resulted in more matches than dialogue about films.
Unlike many bars, a speed dating event will, by necessity, be quiet enough for people to talk comfortably. Participants can come alone without feeling out of place; alternatively it is something that women who like to go out in groups can do together.
Because the matching itself happens after the event, people do not feel pressured to select or reject each other in person.
Speed dating is a formalized matchmaking process of dating system whose purpose is to encourage people to meet a large number of new people.
Its origins are credited to Rabbi Yaacov Deyo of Aish Ha Torah, originally as a way to help Jewish singles meet and marry.
Speed dating, as two separate words, is often used as a generic term for similar events.Contact information cannot be traded during the initial meeting, in order to reduce pressure to accept or reject a suitor to his or her face.There are many speed dating events now in the United Kingdom, Canada, and the United States.There have been several studies of the round-robin dating systems themselves, as well as studies of interpersonal attraction that are relevant to these events.Other studies found speed-dating data useful as a way to observe individual choices among random participants.
One of Good Luck Chuck While playing seven minutes in heaven at a party in 1985, 10-year-old Charles "Chuck" Logan (Connor Price) refuses to kiss a goth girl named Anisha (Sasha Pieterse) who attempts to have sex with him.
If you could see anyone perform live who would it be? For us people who got dealt a shit card in dating, most of these articles are really about being accepting single status forever, without the bitterness and resentment that goes with it. | {
"pile_set_name": "Pile-CC"
} |
/* @flow */
/**
* context
*/
context('desc', () => {});
// $FlowExpectedError number. This type is incompatible with function type.
context('desc', 12);
// $FlowExpectedError number. This type is incompatible with undefined.
context('desc', () => 1);
// $FlowExpectedError number. This type is incompatible with string.
context(12, () => {});
/**
* context.skip
*/
context.skip('desc', () => {});
// $FlowExpectedError number. This type is incompatible with function type.
context.skip('desc', 12);
// $FlowExpectedError number. This type is incompatible with undefined.
context.skip('desc', () => 1);
// $FlowExpectedError number. This type is incompatible with string.
context.skip(12, () => {});
/**
* context.only
*/
context.only('desc', () => {});
// $FlowExpectedError number. This type is incompatible with function type.
context.only('desc', 12);
// $FlowExpectedError number. This type is incompatible with undefined.
context.only('desc', () => 1);
// $FlowExpectedError number. This type is incompatible with string.
context.only(12, () => {});
/**
* context.timeout
*/
context.timeout(1000);
// $FlowExpectedError string. This type is incompatible with number.
context.timeout('1000');
| {
"pile_set_name": "Github"
} |
The precision agriculture sector is expected to grow at a high rate over the coming years. This new way of farming is already a reality in northwest Italy, where technologies are being used to keep plants in a good state of health but also to avert the loss of quality yield.
Sensors and drones can be among the farmers' best friends, helping them to use less fertilizers and water, and to control the general condition of their crops.
Nowadays Piedmont, in northwestern Italy, is an open-air laboratory where companies and research centres are testing these tools to improve the health and productivity of different cultivations. The research centre CSP and four wine cooperatives are testing a decision support system (DSS) based on wireless sensor networks, which helps agronomists to verify in real time if plants are enjoying good health.
"We started about one and a half years ago," explains Andrea Molino, in charge of the DSS research at CSP, "installing in the vineyard five sensors that control the temperature and the humidity of air and soil, to understand the state of health of the grapevines." Agronomists need to verify if a poor state of health is caused by disease or a lack of water anyway, but now they have an app for tablets to collect data directly from the field. "In this way, previous data and the data gathered through apps and sensors are channelled into the same database," says Molino, "and it allows facts about different years to be compared."
This research has also involved a company based in Ivrea, and specialized in the use of drones for agriculture: "They contribute to the early detection of diseases that affect grapevines, such as flavescence dorée and black wood," declares Stefano Sgrelli, Ceo of Salt&Lemon.
Infrared imagine of an experimental field of wheat in Cigliano, near Vercelli. Credit: University of Turin, Faculty of Agriculture
This is made possible by drones which carry small cameras able to take near infra-red images of crops. Healthy plants are rich in chlorophyll, a pigment that reflects infrared quite well: therefore, this technology, which is already used for scanning by plane, satellite or tractor, has become a precise, non-invasive and more affordable tool to check how crops are doing. Moreover, it improves sustainability because it detects whether a plant needs more or less watering, pesticides or plant foods.
"These sensors give us several indexes", explains Sgrelli, "such as the normalized difference vegetation index, also known as NDVI, which shows the health state of a plant: "the nearer it is to 1, the better the health of the plant".
The camera shoots every two or three seconds: then it needs to "adjust" the images, because drones normally swing while flying. A software program builds a "mosaic" made up of hundreds of images, which shows in a single 3D picture the field flown over. Connecting these results with those gathered by agronomists and sensors on the ground, the farmer can have a complete overview of what is going on.
Even the Piattella bean, cultivated in Cortereggio, a small town in the Canavese area, has benefited from this technology. The legume is a presidium of Slow Food, the global organisation that supports the principles of organic agriculture, reducing pesticides, using traditional techniques and sustaining endangered quality production.
The bean was almost a "lost" crop. About 25 years ago a farmer, named Mario Boggio, gave some kilos of Piattella to the University of Turin's germplasm bank, to preserve the seed. Twenty years later the cultivation restarted, but the soil was changed.
CSP, together with the Association "Piattella Canavesana di Cortereggio" and the municipality of San Giorgio Canavese, started monitoring via sensors that control temperature and humidity at 10 and 40 centimetres underground, and also via near infrared camera. All the data are was sent by digital mobile radio, allowing agronomists and farmers to check the results in real time.
Despite the strict parameters that define a Slow Food presidium, precision agriculture is a welcome tool: "We stand for sustainable agriculture, so we try to make the most of technology in each case, while of course ensuring that it doesn't infringe human rights or have long-term environmental effects like GMOs," affirms Ursula Hudson, member of the Executive Committee of Slow Food International.
According to the report "Precision farming market by technology," published by the world consultancy firm MarketsandMarkets, from now until 2020 the size of the precision farming market should grow at an annual rate of 12.2%, reaching a total of $4.55 billion. Looking at these facts, the friendship between farmers and these technologies seems to be like a treasure.
Explore further Farmers of the future will utilize drones, robots and GPS | {
"pile_set_name": "OpenWebText2"
} |
from __future__ import division, absolute_import, print_function
import os
from numpy.distutils.fcompiler import FCompiler
compilers = ['LaheyFCompiler']
class LaheyFCompiler(FCompiler):
compiler_type = 'lahey'
description = 'Lahey/Fujitsu Fortran 95 Compiler'
version_pattern = r'Lahey/Fujitsu Fortran 95 Compiler Release (?P<version>[^\s*]*)'
executables = {
'version_cmd' : ["<F90>", "--version"],
'compiler_f77' : ["lf95", "--fix"],
'compiler_fix' : ["lf95", "--fix"],
'compiler_f90' : ["lf95"],
'linker_so' : ["lf95", "-shared"],
'archiver' : ["ar", "-cr"],
'ranlib' : ["ranlib"]
}
module_dir_switch = None #XXX Fix me
module_include_switch = None #XXX Fix me
def get_flags_opt(self):
return ['-O']
def get_flags_debug(self):
return ['-g', '--chk', '--chkglobal']
def get_library_dirs(self):
opt = []
d = os.environ.get('LAHEY')
if d:
opt.append(os.path.join(d, 'lib'))
return opt
def get_libraries(self):
opt = []
opt.extend(['fj9f6', 'fj9i6', 'fj9ipp', 'fj9e6'])
return opt
if __name__ == '__main__':
from distutils import log
log.set_verbosity(2)
from numpy.distutils import customized_fcompiler
print(customized_fcompiler(compiler='lahey').get_version())
| {
"pile_set_name": "Github"
} |
tag:blogger.com,1999:blog-7416437757130505918.post2174112961949063228..comments2011-11-23T21:03:15.244-06:00Comments on A Mom Having Fun!!: More On Straight Talk!Jodihttp://www.blogger.com/profile/02163686976555158735noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-7416437757130505918.post-6414733520185091752011-09-29T10:19:42.681-05:002011-09-29T10:19:42.681-05:00I love Straight Talk! Hi! New follower from the Th...I love Straight Talk! Hi! New follower from the Thirsty Thursday Blog Hop! I hope you follow back! Thanks! :) <a href="http://tigereyes2001reviews.blogspot.com/" rel="nofollow">Through the Eyes of a Tiger</a>TigerEyes2001https://www.blogger.com/profile/03388466147277826883noreply@blogger.comtag:blogger.com,1999:blog-7416437757130505918.post-29492209037589239672011-09-27T19:07:17.975-05:002011-09-27T19:07:17.975-05:00TAG! You’re it!! Hi, I’m a new follower from Follo...TAG! You’re it!! Hi, I’m a new follower from Follow Me Back Blog Hop. It would be great if you stopped by for a visit and followed me back. Have a great week. http://mavesfaves.blogspot.com/Maves Faveshttps://www.blogger.com/profile/07375539568492392801noreply@blogger.comtag:blogger.com,1999:blog-7416437757130505918.post-58635611413505525092011-09-27T12:14:50.832-05:002011-09-27T12:14:50.832-05:00LOVE your site! I'm your newest follower from ...LOVE your site! I'm your newest follower from the blog hop. Please stop by and follow me back at http://psbeautyblog.blogspot.com. <br /><br />I look forward to reading more of your posts :)Tiffany Boothhttps://www.blogger.com/profile/16133401648748463786noreply@blogger.comtag:blogger.com,1999:blog-7416437757130505918.post-79984778103499572762011-09-27T10:18:59.235-05:002011-09-27T10:18:59.235-05:00Im your newest follower. I hope you get a chance t...Im your newest follower. I hope you get a chance to stop by at: <br />http://pacifierspumpstheworld.com/2011/09/27/move-it/Reluctant Writerhttps://www.blogger.com/profile/11384358399256704715noreply@blogger.comtag:blogger.com,1999:blog-7416437757130505918.post-58225736251941404552011-09-27T08:45:03.853-05:002011-09-27T08:45:03.853-05:00New follower here from the Tuesday Hop, http://bab...New follower here from the Tuesday Hop, http://babyfeetandpuppybreath.blogspot.com/ Hope you will stop by and follow me back, Thanks.Kellyhttps://www.blogger.com/profile/15746416721851397031noreply@blogger.comtag:blogger.com,1999:blog-7416437757130505918.post-78143990470038121612011-09-26T23:43:11.087-05:002011-09-26T23:43:11.087-05:00Should let my husband know about this.
I am now fo...Should let my husband know about this.<br />I am now following your blog from the Follow Me Back Tuesday hop. Congrats on being a guest hostkewkewhttps://www.blogger.com/profile/12668211363344117034noreply@blogger.com | {
"pile_set_name": "Pile-CC"
} |
~ Preserving & Promoting our area history since 1975
Museum 2012 Exhibit
Each room features a topic: natural history, forming of the village, home life and earning a living.
Natural history focuses on the famous ledges with photos and paintings and a large display of fossils from the clay pits and ledges.
Native Americans still visited “Big Rocks” into the 1840s to hunt and fish, make maple syrup, clay pots and form baskets from the reeds found along the creek in Oneida Woods. They had three temporary wigwam villages along the river. You will see a picture of Chief Okemos and a display of arrowheads.
Edmund Lamson arrived in 1848. He was the first permanent resident and first village president. Big Rocks became Grand Ledge. in 1850. Meet Miss Sanders, the first teacher and see some of the early schools. The first churches were the Congregational, Baptist, Methodist and Lutheran. Circuit pastors performed baptisms in homes. View photos of the downtown area with the 1870 iron bridge and before the 1885 Opera House and Fire Station (now Ledge Craft Lane).
Sign in at Mr. Rueban Wood’s desk. He built the first general store. See a recently donated and signed 1860 L. Harrington jug from his very early pottery. Enjoy the working replica of the Russell Coal Mine, one of at least 20 coal mines along the river west of the islands. Fancy yourself paddling Mr. Mudges 1880s canoe from the Seven Islands Resort. View early farm equipment, such as a grain cradle, hand corn and potato planters and a setting hen house.
The home life area includes a rope bed with early quilts, a recenty donated Grand Ledge Chair Company rocking chair, early Betty lights, a spinning wheel and a table set with Rueban Wood dishes. See the equipment used to boil the sap into maple syrup, churn butter, make apple butter and saurkraut.
The exhibit is open on Sundays between 2 and 4 p.m., and on festival days from 12 noon to 4 p.m. The museum is also open by appointment for tours for school groups and bus tours can be arranged by calling (517) 627-5170. | {
"pile_set_name": "Pile-CC"
} |
function! asyncomplete#sources#ale#get_source_options(...) abort
let l:default = extend({
\ 'name': 'ale',
\ 'completor': function('asyncomplete#sources#ale#completor'),
\ 'whitelist': ['*'],
\ 'triggers': asyncomplete#sources#ale#get_triggers(),
\ }, a:0 >= 1 ? a:1 : {})
return extend(l:default, {'refresh_pattern': '\k\+$'})
endfunction
function! asyncomplete#sources#ale#get_triggers() abort
let l:triggers = ale#completion#GetAllTriggers()
let l:triggers['*'] = l:triggers['<default>']
return l:triggers
endfunction
function! asyncomplete#sources#ale#completor(options, context) abort
let l:keyword = matchstr(a:context.typed, '\w\+$')
let l:startcol = a:context.col - len(l:keyword)
call ale#completion#GetCompletions('ale-callback', { 'callback': {completions ->
\ asyncomplete#complete(a:options.name, a:context, l:startcol, completions)
\ }})
endfunction
| {
"pile_set_name": "Github"
} |
DETROIT—Government budget cuts have reached the potter's field.
Communities have long provided simple burials for the indigent or unidentified, but cash-strapped jurisdictions from North Dakota to Arizona are trimming subsidies, raising fees or switching to cremation. The deliberations over such changes underscore that in an era of austerity, governments have to face issues that touch on both the economic and the moral.
"Do we continue this benefit for those who are deceased, or do we divert [resources] to those who are living?" said Robert Lamkey, director of public safety for Sedgwick County, Kan., which is paying for such burials out of its general fund after the state ended its support.
Toledo, Ohio, is running out of burial funds and space in city-owned Forest Cemetery, Parks Commissioner Dennis Garvin told the City Council this month. So city leaders have proposed adopting cremation as the default option for indigent people, unless their religion bars it. The remains would then be commingled and poured into a double-deep vault. City Councilman Steve Steele asked Mr. Garvin whether the vault was like a "mass grave."
The change would save Toledo $600 per body and tens of thousands of dollars a year, according to the Parks and Forestry Division. The city buried 38 people last year. | {
"pile_set_name": "OpenWebText2"
} |
/* eslint-env jest */
import filterReduce from './filter-reduce'
const add = (a, b) => a + b
const data = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9]
const isEven = x => !(x & 1)
it('filterReduce', () => {
// Returns all elements not matching the predicate and the result of
// a reduction over those who do.
expect(filterReduce(data, isEven, add)).toEqual([1, 3, 5, 7, 9, 20])
// The default reducer is the identity.
expect(filterReduce(data, isEven)).toEqual([1, 3, 5, 7, 9, 0])
// If an initial value is passed it is used.
expect(filterReduce(data, isEven, add, 22)).toEqual([1, 3, 5, 7, 9, 42])
})
| {
"pile_set_name": "Github"
} |
Arlington, VA 22203
703-524-2741
HEALTH CARE JOBS VA - Page 1
1Licensed / Registered Nurse - LPN / RNSuffolk, VA, USA Consulate HealthCare of Windsor is a 114-bed skilled nursing center and a proud member of the Consulate HealthCare family. We are one of the nation's leading providers of senior healthcare services ...... Apply Now>>
5Operating Room Registered NurseCharlottesville, United States Centra Healthcare Solutions is seeking an experienced Registered Nurse that is licensed or in the immediate process, and qualifies, of obtaining RN licensure in VA to work in Hospital in the ...... Apply Now>>
8LICENSED PRACTICAL NURSE SOM SURG NEUROSouth Boston, United States Participates in the development of an individualized care and assists exams. This position requires strong customer services and multi-tasking skills needed to succeed in this fast paced environment... Apply Now>>
10Travel RN Seasonal Jobs - HealthCare TravelersCharlottesville, United States The Travel Nurse Season is here and it shows For the past 5 years, thousands of Nurses just like you have utilized the sites of HealthCare Employment Network to explore a career as a Traveling ...... Apply Now>>
11Registered Nurse - Utilization ReviewRoanoke, VA, USA SAT Healthcare has some of the highest pay in the industry as we prioritize our nurses over profits. Apply today and find out what you can expect with SAT Healthcare! What's great about SAT ...... Apply Now>>
13Travel RN-PCU/Stepdown job in VirginiaRichmond, VA, USAPCU RN's will have the proven ability to provide effective communication to patient/family, team members, and other healthcare professionals for all PCU patients. Don't hesitate to call us today... Apply Now>>
14Catheterization Laboratory Registered NurseCharlottesville, United States Centra Healthcare Solutions is seeking an experienced Registered Nurse that is licensed or in the immediate process, and qualifies, of obtaining RN licensure in VA to work in Hospital in the ...... Apply Now>>
16Healthcare Call Center / Consult CoordinatorReston, United States Sparks Group has partnered with one of the nation's leading providers of physician's consultations and urgent care via telemedicine and is seeking 4 experienced Healthcare Call Center Reps/Consult ...... Apply Now>>
17Rehab Registered NurseFalls Church, VA, USA Company Description Specialized Healthcare Staffing is a provider-centric staffing model. I do what is best for the provider and my clients to find a good fit and to build professional relationships ...... Apply Now>>
19Registered Nurse - Home Health - Full TimeWarrenton, United States Overview The Registered Nurse RN in Home Health provides and directs provisions of nursing care to patients in their homes as prescribed by the physician and in compliance with applicable laws ...... Apply Now>>
25Customer Care AssociateGlen Allen, VA, USA Are you an experienced Customer Care Associate looking for a new opportunity with a prestigious healthcare company? Do you want the chance to advance your career by joining a rapidly growing company... Apply Now>>
28Healthcare Customer Service RepresentativeVirginia Beach, VA, USA We are currently seeking a Healthcare Customer Service Representative to join our team within the Medical Insurance field in Virginia Beach, VA. This is an exceptional opportunity to do innovative ...... Apply Now>>
30Customer Care AnalystRichmond, United States S. healthcare industry. We are the customer interface for large segments of the technology industry and the operational and processing partner of choice for public transportation systems around the ...... Apply Now>>
33Physical Therapist PT JobsPortsmouth, United States Of all the Healthcare Professional specialties we offer, Physical Therapist are one of the specialties that have the most difference between staffing agencies in job / travel assignment locations and ...... Apply Now>>
37Registered NurseReston, VA, USA At least one year experience in healthcare marketing/sales, preferably in home care operations. Consideration given to candidates with one year experience in sales environment. 3. Ability to market ...... Apply Now>>
38RN Case ManagerRoanoke, United States Heartland Homecare of Roanoke is hiring excellent Full Time RN Case Manager's Heartland Home HealthCare and Hospice is part of the HCR ManorCare family, a leading provider of home healthcare ...... Apply Now>>
39HEDIS NurseWinchester, VA, USA Are you an experienced HEDIS Nurse looking for a new opportunity with a prestigious healthcare company? Do you want the chance to advance your career by joining a rapidly growing company? Can you ...... Apply Now>>
40Registered Nurse - PRN HospiceGoodview, United States Heartland Home HealthCare and Hospice is part of the HCR ManorCare family, a leading provider of home healthcare, hospice care, skilled nursing, memory care and post-acute care. Responsible for the ...... Apply Now>> | {
"pile_set_name": "Pile-CC"
} |
/*
* Copyright 2011 The LibYuv Project Authors. All rights reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#ifndef INCLUDE_LIBYUV_SCALE_H_ // NOLINT
#define INCLUDE_LIBYUV_SCALE_H_
#include "basic_types.h"
#ifdef __cplusplus
namespace libyuv {
extern "C" {
#endif
// Supported filtering.
typedef enum FilterMode {
kFilterNone = 0, // Point sample; Fastest.
kFilterLinear = 1, // Filter horizontally only.
kFilterBilinear = 2, // Faster than box, but lower quality scaling down.
kFilterBox = 3 // Highest quality.
} FilterModeEnum;
// Scale a YUV plane.
LIBYUV_API
void ScalePlane(const uint8* src, int src_stride,
int src_width, int src_height,
uint8* dst, int dst_stride,
int dst_width, int dst_height,
enum FilterMode filtering);
LIBYUV_API
void ScalePlane_16(const uint16* src, int src_stride,
int src_width, int src_height,
uint16* dst, int dst_stride,
int dst_width, int dst_height,
enum FilterMode filtering);
// Scales a YUV 4:2:0 image from the src width and height to the
// dst width and height.
// If filtering is kFilterNone, a simple nearest-neighbor algorithm is
// used. This produces basic (blocky) quality at the fastest speed.
// If filtering is kFilterBilinear, interpolation is used to produce a better
// quality image, at the expense of speed.
// If filtering is kFilterBox, averaging is used to produce ever better
// quality image, at further expense of speed.
// Returns 0 if successful.
LIBYUV_API
int I420Scale(const uint8* src_y, int src_stride_y,
const uint8* src_u, int src_stride_u,
const uint8* src_v, int src_stride_v,
int src_width, int src_height,
uint8* dst_y, int dst_stride_y,
uint8* dst_u, int dst_stride_u,
uint8* dst_v, int dst_stride_v,
int dst_width, int dst_height,
enum FilterMode filtering);
LIBYUV_API
int I420Scale_16(const uint16* src_y, int src_stride_y,
const uint16* src_u, int src_stride_u,
const uint16* src_v, int src_stride_v,
int src_width, int src_height,
uint16* dst_y, int dst_stride_y,
uint16* dst_u, int dst_stride_u,
uint16* dst_v, int dst_stride_v,
int dst_width, int dst_height,
enum FilterMode filtering);
#ifdef __cplusplus
// Legacy API. Deprecated.
LIBYUV_API
int Scale(const uint8* src_y, const uint8* src_u, const uint8* src_v,
int src_stride_y, int src_stride_u, int src_stride_v,
int src_width, int src_height,
uint8* dst_y, uint8* dst_u, uint8* dst_v,
int dst_stride_y, int dst_stride_u, int dst_stride_v,
int dst_width, int dst_height,
LIBYUV_BOOL interpolate);
// Legacy API. Deprecated.
LIBYUV_API
int ScaleOffset(const uint8* src_i420, int src_width, int src_height,
uint8* dst_i420, int dst_width, int dst_height, int dst_yoffset,
LIBYUV_BOOL interpolate);
// For testing, allow disabling of specialized scalers.
LIBYUV_API
void SetUseReferenceImpl(LIBYUV_BOOL use);
#endif // __cplusplus
#ifdef __cplusplus
} // extern "C"
} // namespace libyuv
#endif
#endif // INCLUDE_LIBYUV_SCALE_H_ NOLINT
| {
"pile_set_name": "Github"
} |
//
// DetectedIssueTests.swift
// SwiftFHIR
//
// Generated from FHIR 4.0.0-a53ec6ee1b on 2019-05-21.
// 2019, SMART Health IT.
//
import XCTest
#if !NO_MODEL_IMPORT
import Models
typealias SwiftFHIRDetectedIssue = Models.DetectedIssue
#else
import SwiftFHIR
typealias SwiftFHIRDetectedIssue = SwiftFHIR.DetectedIssue
#endif
class DetectedIssueTests: XCTestCase {
func instantiateFrom(filename: String) throws -> SwiftFHIRDetectedIssue {
return try instantiateFrom(json: try readJSONFile(filename))
}
func instantiateFrom(json: FHIRJSON) throws -> SwiftFHIRDetectedIssue {
return try SwiftFHIRDetectedIssue(json: json)
}
func testDetectedIssue1() {
do {
let instance = try runDetectedIssue1()
try runDetectedIssue1(instance.asJSON())
}
catch let error {
XCTAssertTrue(false, "Must instantiate and test DetectedIssue successfully, but threw:\n---\n\(error)\n---")
}
}
@discardableResult
func runDetectedIssue1(_ json: FHIRJSON? = nil) throws -> SwiftFHIRDetectedIssue {
let inst = (nil != json) ? try instantiateFrom(json: json!) : try instantiateFrom(filename: "detectedissue-example-allergy.json")
XCTAssertEqual(inst.id, "allergy")
XCTAssertEqual(inst.meta?.tag?[0].code, "HTEST")
XCTAssertEqual(inst.meta?.tag?[0].display, "test health data")
XCTAssertEqual(inst.meta?.tag?[0].system?.absoluteString, "http://terminology.hl7.org/CodeSystem/v3-ActReason")
XCTAssertEqual(inst.status, ObservationStatus(rawValue: "final")!)
XCTAssertEqual(inst.text?.div, "<div xmlns=\"http://www.w3.org/1999/xhtml\">[Put rendering here]</div>")
XCTAssertEqual(inst.text?.status, NarrativeStatus(rawValue: "generated")!)
return inst
}
func testDetectedIssue2() {
do {
let instance = try runDetectedIssue2()
try runDetectedIssue2(instance.asJSON())
}
catch let error {
XCTAssertTrue(false, "Must instantiate and test DetectedIssue successfully, but threw:\n---\n\(error)\n---")
}
}
@discardableResult
func runDetectedIssue2(_ json: FHIRJSON? = nil) throws -> SwiftFHIRDetectedIssue {
let inst = (nil != json) ? try instantiateFrom(json: json!) : try instantiateFrom(filename: "detectedissue-example-dup.json")
XCTAssertEqual(inst.author?.reference, "Device/software")
XCTAssertEqual(inst.code?.coding?[0].code, "DUPTHPY")
XCTAssertEqual(inst.code?.coding?[0].display, "Duplicate Therapy Alert")
XCTAssertEqual(inst.code?.coding?[0].system?.absoluteString, "http://terminology.hl7.org/CodeSystem/v3-ActCode")
XCTAssertEqual(inst.detail, "Similar test was performed within the past 14 days")
XCTAssertEqual(inst.id, "duplicate")
XCTAssertEqual(inst.identifiedDateTime?.description, "2013-05-08")
XCTAssertEqual(inst.identifier?[0].system?.absoluteString, "http://example.org")
XCTAssertEqual(inst.identifier?[0].use, IdentifierUse(rawValue: "official")!)
XCTAssertEqual(inst.identifier?[0].value, "12345")
XCTAssertEqual(inst.implicated?[0].display, "Chest CT - ordered May 8, 2013 by Dr. Adam Careful")
XCTAssertEqual(inst.implicated?[0].reference, "ServiceRequest/di")
XCTAssertEqual(inst.implicated?[1].display, "Image 1 from Series 3: CT Images on Patient MINT (MINT1234) taken at 1-Jan 2011 01:20 AM")
XCTAssertEqual(inst.implicated?[1].reference, "ImagingStudy/example")
XCTAssertEqual(inst.meta?.tag?[0].code, "HTEST")
XCTAssertEqual(inst.meta?.tag?[0].display, "test health data")
XCTAssertEqual(inst.meta?.tag?[0].system?.absoluteString, "http://terminology.hl7.org/CodeSystem/v3-ActReason")
XCTAssertEqual(inst.patient?.reference, "Patient/dicom")
XCTAssertEqual(inst.reference?.absoluteString, "http://www.tmhp.com/RadiologyClinicalDecisionSupport/2011/CHEST%20IMAGING%20GUIDELINES%202011.pdf")
XCTAssertEqual(inst.status, ObservationStatus(rawValue: "final")!)
XCTAssertEqual(inst.text?.status, NarrativeStatus(rawValue: "generated")!)
return inst
}
func testDetectedIssue3() {
do {
let instance = try runDetectedIssue3()
try runDetectedIssue3(instance.asJSON())
}
catch let error {
XCTAssertTrue(false, "Must instantiate and test DetectedIssue successfully, but threw:\n---\n\(error)\n---")
}
}
@discardableResult
func runDetectedIssue3(_ json: FHIRJSON? = nil) throws -> SwiftFHIRDetectedIssue {
let inst = (nil != json) ? try instantiateFrom(json: json!) : try instantiateFrom(filename: "detectedissue-example.json")
XCTAssertEqual(inst.author?.reference, "Device/software")
XCTAssertEqual(inst.code?.coding?[0].code, "DRG")
XCTAssertEqual(inst.code?.coding?[0].display, "Drug Interaction Alert")
XCTAssertEqual(inst.code?.coding?[0].system?.absoluteString, "http://terminology.hl7.org/CodeSystem/v3-ActCode")
XCTAssertEqual(inst.id, "ddi")
XCTAssertEqual(inst.identifiedDateTime?.description, "2014-01-05")
XCTAssertEqual(inst.implicated?[0].display, "500 mg Acetaminophen tablet 1/day, PRN since 2010")
XCTAssertEqual(inst.implicated?[0].reference, "MedicationStatement/example001")
XCTAssertEqual(inst.implicated?[1].display, "Warfarin 1 MG TAB prescribed Jan. 15, 2015")
XCTAssertEqual(inst.implicated?[1].reference, "MedicationRequest/medrx0331")
XCTAssertEqual(inst.meta?.tag?[0].code, "HTEST")
XCTAssertEqual(inst.meta?.tag?[0].display, "test health data")
XCTAssertEqual(inst.meta?.tag?[0].system?.absoluteString, "http://terminology.hl7.org/CodeSystem/v3-ActReason")
XCTAssertEqual(inst.mitigation?[0].action?.coding?[0].code, "13")
XCTAssertEqual(inst.mitigation?[0].action?.coding?[0].display, "Stopped Concurrent Therapy")
XCTAssertEqual(inst.mitigation?[0].action?.coding?[0].system?.absoluteString, "http://terminology.hl7.org/CodeSystem/v3-ActCode")
XCTAssertEqual(inst.mitigation?[0].action?.text, "Asked patient to discontinue regular use of Tylenol and to consult with clinician if they need to resume to allow appropriate INR monitoring")
XCTAssertEqual(inst.mitigation?[0].author?.display, "Dr. Adam Careful")
XCTAssertEqual(inst.mitigation?[0].author?.reference, "Practitioner/example")
XCTAssertEqual(inst.mitigation?[0].date?.description, "2014-01-05")
XCTAssertEqual(inst.severity, DetectedIssueSeverity(rawValue: "high")!)
XCTAssertEqual(inst.status, ObservationStatus(rawValue: "final")!)
XCTAssertEqual(inst.text?.status, NarrativeStatus(rawValue: "generated")!)
return inst
}
func testDetectedIssue4() {
do {
let instance = try runDetectedIssue4()
try runDetectedIssue4(instance.asJSON())
}
catch let error {
XCTAssertTrue(false, "Must instantiate and test DetectedIssue successfully, but threw:\n---\n\(error)\n---")
}
}
@discardableResult
func runDetectedIssue4(_ json: FHIRJSON? = nil) throws -> SwiftFHIRDetectedIssue {
let inst = (nil != json) ? try instantiateFrom(json: json!) : try instantiateFrom(filename: "detectedissue-example-lab.json")
XCTAssertEqual(inst.id, "lab")
XCTAssertEqual(inst.meta?.tag?[0].code, "HTEST")
XCTAssertEqual(inst.meta?.tag?[0].display, "test health data")
XCTAssertEqual(inst.meta?.tag?[0].system?.absoluteString, "http://terminology.hl7.org/CodeSystem/v3-ActReason")
XCTAssertEqual(inst.status, ObservationStatus(rawValue: "final")!)
XCTAssertEqual(inst.text?.div, "<div xmlns=\"http://www.w3.org/1999/xhtml\">[Put rendering here]</div>")
XCTAssertEqual(inst.text?.status, NarrativeStatus(rawValue: "generated")!)
return inst
}
}
| {
"pile_set_name": "Github"
} |
Your on-site stock
››
{{supplyCenter.scName}}({{scProduct.stockOnHand}} In stock)
››
{{supplyCenter.scName}}(Out of stock)
››
{{supplyCenter.scName}}
This item is not currently available on-site. Depending on your Supply Center settings you may be able to add the item to cart above else use the Order Non-Stocked Items' tab on the Supply Center home page.
Description
Fc gamma receptor II-a (FCGR2A/CD32a), recombinant human protein is supplied as a lyophilized powder. In general, recombinant proteins can be used as protein standard and in cell biology research applications.
This recombinant protein was expressed from a DNA sequence encoding the extracellular domain (Met 1-Ile 218) of human FCGR2A (AAA35827.1) fused to the Fc region of human IgG1 at the C-terminus.
Reconstitution: Dissolve the protein in sterile double distilled water to a concentration of 0.2 mg/ml or lower. It is recommended that the protein be aliquoted and be used as soon as possible. Store aliquots under sterile conditions at -20°C. Avoid repeated freeze-thaw cycles.
Expiration Date: Expires one year from date of receipt when stored as instructed. | {
"pile_set_name": "Pile-CC"
} |
#!/bin/sh
br_load_config()
{
local arg1 arg2 line
while read line
do
arg1=`echo $line | cut -d " " -f 1`
arg2=`echo $line | cut -d " " -f 2`
case $arg1 in
"HIDE_PORT")
br_hide_port=$arg2;;
"HIDE_FILE")
br_hide_file=$arg2;;
"HIDE_PROC")
br_hide_proc=$arg2;;
"REMOTE_HOST")
br_remote_host=$arg2;;
"REMOTE_PORT")
br_remote_port=$arg2;;
"SLEEP_TIME")
br_sleep_time=$arg2;;
esac
done < $1
}
br_display_config()
{
echo -e "HIDE_PORT:"
echo $br_hide_port
echo -e "HIDE_FILE:"
echo $br_hide_file
echo -e "HIDE_PROC:"
echo $br_hide_proc
echo -e "REMOTE_HOST:"
echo $br_remote_host
echo -e "REMOTE_PORT:"
echo $br_remote_port
echo -e "SLEEP_TIME:"
echo $br_sleep_time
}
br_load_config "/home/$USER/.../brsh.conf"
#br_display_config
| {
"pile_set_name": "Github"
} |
On March 31, the USDA will release the quarterly Grain Stocks report containing an estimate of the stocks of corn that were in storage as of March 1. The information in that report may be over shadowed by the estimate of producer planting intentions released in the Prospective Plantings report on the same day. Still, the corn stocks estimate will be important as it allows a calculation of the magnitude of feed and residual use of corn during the second quarter of the marketing year. In turn, that calculation will provide the basis for evaluating likely feed and residual use for the entire year and the likely magnitude of year-ending stocks.
Anticipating the magnitude of the March 1 stocks estimate begins with an estimate of the supply of corn available during the December 2015-February 2016 quarter. Stocks at the beginning of the quarter were estimated at 11.212 billion bushels in the December Grain Stocks report. Census Bureau estimates show imports during December 2015 and January 2016 totaling 14 million bushels. Imports for the quarter, then, may have been near 20 million bushels, resulting in a total available supply of 11.232 billion bushels.
Next, an estimate of exports and domestic processing uses of corn during the quarter can be made based on weekly and monthly data available to date. An estimate of exports is based on cumulative weekly export inspection estimates available for the entire quarter and Census Bureau estimates for the first two months of the quarter. Cumulative marketing year export inspections through the first half of the marketing year totaled about 603 million bushels. Through the first five months of the year, cumulative Census export estimates exceeded cumulative export inspections by 34 million bushels. If that margin persisted through February, exports in the first half of the year totaled 637 million bushels. Exports in the first quarter were reported at 303 million bushels, leaving 334 million bushels as an estimate of second quarter exports.
Domestically, the USDA's Grain Crushings and Co-Products Production report estimated that a total of 893 million bushels of corn were used for ethanol and co-product production in December 2015 and January 2016. Based on weekly estimates from the U.S. Energy Information Administration (EIA), ethanol production during February 2016 was 3.3 percent larger than during February 2105. The increase was aided by an additional day in 2016. If corn used for ethanol-and co-product production in February 2016 also increased by 3.3 percent, use for the month totaled about 407 million bushels. Use for the quarter, then, is estimated at 1.3 billion bushels.
The USDA projects that 1.37 billion bushels of corn will be used to produce other food and industrial products during the 2015-16 marketing year. Typically, about 49 percent of that use occurs in the first half of the marketing year. If that pattern is followed this year, and the USDA projection is correct, use during the first half of the year likely totaled 671 million bushels. Use during the first quarter was reported at 331 million bushels, leaving the second quarter consumption estimate at 340 million bushels.
For feed and residual use, the question is how large should use have been during the second quarter of the marketing year if use is on track to reach the USDA's projection of 5.3 billion bushels for the entire year? The historical seasonal pattern of feed and residual use should be helpful in answering that question, but that pattern has fluctuated over time. For example, during the 15 years ending with the 2009-10 marketing year, use during the first half of the year ranged from 61.6 percent to 70.3 percent of the marketing year total, with an average of 65 percent. For the four years ending with the 2013-14 marketing year, use during the first half of the year ranged from 72.9 percent to 75.6 percent of the marketing year total, with an average of 74 percent. Based on recent USDA revisions in the estimated amount of corn used for ethanol and co-product production during the 2014-15 marketing year, feed and residual use during the first half of that year accounted for about 69 percent of the marketing year total. What pattern is being followed this year?
If last year's pattern is being repeated this year, and the USDA projection for the year is correct, feed and residual use during the first half of the year should have totaled about 3.657 billion bushels. Based on revised estimates of corn used for ethanol and co-product production during the first quarter of the 2015-16 marketing year, feed and residual use totaled 2.199 billion bushels during that quarter. Second quarter use, then would be projected at 1.458 billion bushels. Adding that use to the estimates of exports and domestic processing uses, results in a projection of total quarterly use of 3.432 billion bushels. That total would leave March 1 stocks at 7.8 billion bushels, 50 million bushels larger than stocks of a year earlier.
The dilemma in interpreting the March 1 corn stocks estimate to be released on March 31 is that the seasonal pattern of feed and residual use for the current year will not be known until the year is over. Based on the historical fluctuation in that pattern, a stocks estimate within 150 million bushels of 7.8 billion bushels probably should not change expectations that feed and residual use is on track to reach 5.3 billion bushels for the year. Nevertheless, the corn market will likely react to a stocks estimate that reveals a pace of feed and residual consumption that is much different than that of last year.
We request all readers, electronic media and others follow our citation
guidelines when re-posting articles from farmdoc daily. Guidelines are
available here.
The farmdoc daily website falls under University
of Illinois copyright and intellectual property rights. For
a detailed statement, please see the University of Illinois
Copyright Information and Policies here. | {
"pile_set_name": "Pile-CC"
} |
Bikini Kill — Yes, That Bikini Kill — Launches Record Label
By Judy Berman
July 18, 2012
Share:
Children of the ’90s, get ready to feel old once again: Bikini Kill is almost 25 years old. We’re not saying that just to bum you out, though — we’re saying it because the Kathleen Hanna-fronted riot grrrl band is celebrating its upcoming anniversary by founding a record label. While physical releases aren’t quite ready yet (Bikini Kill’s self-titled Kill Rock Stars debut EP will be reissued in the fall), all of the band’s back catalog — as well as albums by The Frumpies and Casual Dots — is available for download via Bandcamp, iTunes, and eMusic. There’s also a fresh batch of Bikini Kill T-shirts for purchase.
But perhaps the most exciting news is this last bit from the band: “We also plan to re-release our original demo tape, which contains songs that were previously unavailable and/or hard to find on vinyl & CD. We are currently going through our archive, which include photographs, practice tapes, live recordings, unreleased songs, films, video, writing, interviews, zines and flyers that we intend to feature on future releases and document on our website.” If you’re interested in getting updates on Bikini Kill Records, you can subscribe to their email list here. | {
"pile_set_name": "Pile-CC"
} |
As well-known, along with the trend toward the increase in the number and the size of a data center including a plurality of devices such as servers, storages and the like, a power consumed by the data center increases abruptly. In order to solve the problem of large power consumption, technical approach has made such as development of a server having high power conversion efficiency and low power consumption For example, servers in an idle state consume about 60% of the electricity energy. In a data center, servers run at efficiency of about 5% to 20% to cut server response time. To do so, about 10% of the servers in average place in a standby mode.
A method for managing loads such as servers in a cluster system evenly allocates the loads to the servers considering performance. Although this leads to improve the performance, the power consumption increases. Thus, the load allocation method is not suitable for reducing power consumption.
There is a technique to switch on/off a server on a single threshold basis by the amount of a load. However, this technique is disadvantageous in that a long period of switching on time of the server deteriorates performance of the cluster system and in that frequent on/off operations of the server results in large power consumption. Hence, such conventional technique cannot be used as a desirable load allocation method in view of performance and power consumption. | {
"pile_set_name": "USPTO Backgrounds"
} |
Q:
Data Management Gateway in Azure ML Studio
I built an experiment in Azure ML Studio and want to get the input to the model through On-Premise SQL-Server Database. Does Data Management Gateway help in connecting to the Database, if so can you please mention the steps to be followed.
A:
Yes you need to use Data Management Gateway.
Refer link below
Connect to DB from ML Studio
| {
"pile_set_name": "StackExchange"
} |
Rescue crews prepare to go in the river after a man, seen in background, stuck on a rock in the middle of the river in Springfield.
SPRINGFIELD - Rescue crews from Springfield and Hartford's swiftwater rescue team Tuesday morning saved a young man from the middle of the Black River, after he apparently jumped off the Fellows footbridge into the river and got stuck on a rock in the middle. Springfield's fire department does not have a swiftwater rescue team and thus called in Hartford. At one point a man who said he was the young man's father arrived at the scene and he was quickly interviewed by police. Firefighters were stationed on different islands nearby but this stretch of the river is treacherous ; rescuers were afraid the man may have hypothermia. The rescue was quick; the man was placed on a stretcher and taken away in an ambulance. We will update this as soon as we have more information. | {
"pile_set_name": "Pile-CC"
} |
/*
* Copyright 2016 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.gradle.plugins.ide.tooling.r214
import org.gradle.integtests.tooling.fixture.TargetGradleVersion
import org.gradle.integtests.tooling.fixture.ToolingApiSpecification
import org.gradle.test.fixtures.maven.MavenFileModule
import org.gradle.test.fixtures.maven.MavenFileRepository
import org.gradle.tooling.model.eclipse.EclipseExternalDependency
import org.gradle.tooling.model.eclipse.EclipseProject
import org.gradle.tooling.model.eclipse.EclipseProjectDependency
@TargetGradleVersion('>=2.14')
class ToolingApiEclipseModelWtpClasspathAttributesCrossVersionSpec extends ToolingApiSpecification {
String localMaven
def setup() {
MavenFileRepository mavenRepo = new MavenFileRepository(file("maven-repo"))
MavenFileModule exampleApi = mavenRepo.module("org.example", "example-api", "1.0")
MavenFileModule exampleLib = mavenRepo.module("org.example", "example-lib", "1.0")
exampleLib.dependsOn(exampleApi)
exampleApi.publish()
exampleLib.publish()
localMaven = "maven { url '${mavenRepo.uri}' }"
}
def "Dependencies of a non-wtp project have no wtp deployment attributes"() {
given:
settingsFile << "include 'sub'"
buildFile <<
"""apply plugin: 'java'
repositories { $localMaven }
dependencies {
compile 'org.example:example-api:1.0'
compile project(':sub')
}
project(':sub') { apply plugin : 'java' }
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> externalDependencies = eclipseProject.getClasspath()
Collection<EclipseProjectDependency> projectDependencies = eclipseProject.getProjectDependencies()
then:
externalDependencies.size() == 1
entryHasNoDeploymentInfo(externalDependencies[0])
projectDependencies.size() == 1
entryHasNoDeploymentInfo(projectDependencies[0])
}
def "Web project dependencies have wtp deployment attributes"() {
given:
String pluginDeclaration = appliedPlugins.collect { "apply plugin: '$it'" }.join('\n')
buildFile <<
"""apply plugin: 'java'
$pluginDeclaration
repositories { $localMaven }
dependencies { compile 'org.example:example-api:1.0' }
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> classpath = eclipseProject.getClasspath()
then:
classpath.size() == 1
entryHasDeploymentInfo(classpath[0])
where:
appliedPlugins | _
['war'] | _
['war', 'eclipse-wtp'] | _
['ear'] | _
['ear', 'eclipse-wtp'] | _
}
def "Wtp utility projects do not deploy any dependencies"() {
given:
buildFile <<
"""apply plugin: 'java'
apply plugin: 'eclipse-wtp'
repositories { $localMaven }
dependencies { compile 'org.example:example-lib:1.0' }
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> classpath = eclipseProject.getClasspath()
then:
classpath.size() == 2
entryNotDeployed(classpath[0])
entryNotDeployed(classpath[1])
}
def "Root wtp dependencies and their transitives are deployed to '/'"() {
given:
buildFile <<
"""apply plugin: 'java'
apply plugin: 'war'
apply plugin: 'eclipse-wtp'
repositories { $localMaven }
dependencies { compile 'org.example:example-lib:1.0' }
eclipse.wtp.component.rootConfigurations += [ configurations.compile ]
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> classpath = eclipseProject.getClasspath()
then:
classpath.size() == 2
entryIsDeployed(classpath[0], '/')
entryIsDeployed(classpath[1], '/')
}
def "Root wtp dependencies present in minusConfigurations are excluded from deployment"() {
given:
buildFile <<
"""apply plugin: 'java'
apply plugin: 'war'
apply plugin: 'eclipse-wtp'
repositories { $localMaven }
dependencies {
providedRuntime 'org.example:example-api:1.0'
compile 'org.example:example-lib:1.0'
}
eclipse.wtp.component.rootConfigurations += [ configurations.compile ]
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> classpath = eclipseProject.getClasspath()
then:
entryNotDeployed(classpath.find { it.file.absolutePath.contains 'example-api' })
entryIsDeployed(classpath.find { it.file.absolutePath.contains 'example-lib' }, '/')
}
def "Library wtp dependencies and their transitives are deployed to '/WEB-INF/lib'"() {
buildFile <<
"""apply plugin: 'java'
apply plugin: 'war'
repositories { $localMaven }
dependencies { compile 'org.example:example-lib:1.0' }
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> classpath = eclipseProject.getClasspath()
then:
classpath.size() == 2
entryIsDeployed(classpath[0], '/WEB-INF/lib')
entryIsDeployed(classpath[1], '/WEB-INF/lib')
}
def "Lib wtp dependencies present in minusConfigurations are excluded from deployment"() {
given:
buildFile <<
"""apply plugin: 'java'
apply plugin: 'war'
apply plugin: 'eclipse-wtp'
repositories { $localMaven }
dependencies {
providedRuntime 'org.example:example-api:1.0'
compile 'org.example:example-lib:1.0'
}
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> classpath = eclipseProject.getClasspath()
then:
entryNotDeployed(classpath.find { it.file.absolutePath.contains 'example-api' })
entryIsDeployed(classpath.find { it.file.absolutePath.contains 'example-lib' }, '/WEB-INF/lib')
}
def "Deployment folder follows ear app dir name configuration"() {
buildFile <<
"""apply plugin: 'ear'
apply plugin: 'java'
apply plugin: 'eclipse'
repositories { $localMaven }
dependencies { earlib 'org.example:example-api:1.0' }
eclipse.classpath.plusConfigurations << configurations.earlib
ear { libDirName = '/custom/lib/dir' }
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> classpath = eclipseProject.getClasspath()
then:
classpath.size() == 1
entryIsDeployed(classpath[0], '/custom/lib/dir')
}
def "All non-wtp dependencies are marked as not deployed"() {
given:
buildFile <<
"""apply plugin: 'java'
apply plugin: 'war'
repositories { $localMaven }
dependencies { compileOnly 'org.example:example-lib:1.0' }
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
Collection<EclipseExternalDependency> classpath = eclipseProject.getClasspath()
then:
classpath.size() == 2
entryNotDeployed(classpath[0])
entryNotDeployed(classpath[1])
}
def "Project dependencies are marked as not deployed"() {
given:
settingsFile << 'include "sub"'
buildFile <<
"""apply plugin: 'java'
apply plugin: 'war'
repositories { $localMaven }
dependencies {
compile 'org.example:example-api:1.0'
compile project(':sub')
}
project(':sub') { apply plugin : 'java' }
"""
when:
EclipseProject eclipseProject = loadToolingModel(EclipseProject)
def projectDependencies = eclipseProject.getProjectDependencies()
then:
projectDependencies.size() == 1
entryNotDeployed(projectDependencies[0])
}
private def entryHasDeploymentInfo(entry) {
return entry.classpathAttributes.find { it.name == 'org.eclipse.jst.component.nondependency' } ||
entry.classpathAttributes.find { it.name == 'org.eclipse.jst.component.dependency' }
}
private def entryHasNoDeploymentInfo(entry) {
return !entry.classpathAttributes.find { it.name == 'org.eclipse.jst.component.nondependency' } &&
!entry.classpathAttributes.find { it.name == 'org.eclipse.jst.component.dependency' }
}
private def entryNotDeployed(entry) {
return entry.classpathAttributes.find { it.name == 'org.eclipse.jst.component.nondependency' && it.value == '' } &&
!entry.classpathAttributes.find { it.name == 'org.eclipse.jst.component.dependency' }
}
private def entryIsDeployed(entry, path) {
return !entry.classpathAttributes.find { it.name == 'org.eclipse.jst.component.nondependency' } &&
entry.classpathAttributes.find { it.name == 'org.eclipse.jst.component.dependency' && it.value == path }
}
}
| {
"pile_set_name": "Github"
} |
The commands executed by Putty are same as that of the destination OS and so if you are trying to connect to Windows OS it would execute all the commands on the Windows Command prompt and same for Linux.
ls - to list files in a directory:
cd - change directory (navigate to some directory):
cp - copy a file:
mv - move a file (also used to rename files):
rm - remove a file:
mkdir - make directory:
pwd - show your current location:
whoami - find out which user you are:
wget - to download some url content to the current directory
yum - To install any packages from the urls
For most purposes, PuTTY can be considered to be an xterm terminal. PuTTY also supports some terminal control sequences not supported by the real xterm: notably the Linux console sequences that reconfigure the colour palette, and the title bar control sequences used by DECterm (which are different from the xterm ones; PuTTY supports both).
By default, PuTTY announces its terminal type to the server as xterm. If you have a problem with this, you can reconfigure it to say something else; vt220 might help if you have trouble.
Depending on the protocol used for the current session, there may be a submenu of ‘special commands’. These are protocol-specific tokens, such as a ‘break’ signal, that can be sent down a connection in addition to normal data. Their precise effect is usually up to the server. Currently only Telnet and SSH have special commands.
The following special commands are available in Telnet:
* Are You There
* Break
* Synch
* Erase Character
PuTTY can also be configured to send this when the Backspace key is pressed; see section 4.16.3.
* Erase Line
* Go Ahead
* No Operation | {
"pile_set_name": "Pile-CC"
} |
// +build !windows,!plan9
// Copyright 2015 go-termios Author. All Rights Reserved.
// https://github.com/go-termios/termios
// Author: John Lenton <chipaca@github.com>
package sys
import (
"unsafe"
"golang.org/x/sys/unix"
)
// Termios represents terminal attributes.
type Termios unix.Termios
// NewTermiosFromFd extracts the terminal attribute of the given file
// descriptor.
func NewTermiosFromFd(fd int) (*Termios, error) {
var term Termios
if err := Ioctl(fd, getAttrIOCTL, uintptr(unsafe.Pointer(&term))); err != nil {
return nil, err
}
return &term, nil
}
// ApplyToFd applies term to the given file descriptor.
func (term *Termios) ApplyToFd(fd int) error {
return Ioctl(fd, setAttrNowIOCTL, uintptr(unsafe.Pointer(term)))
}
// Copy returns a copy of term.
func (term *Termios) Copy() *Termios {
v := *term
return &v
}
// SetVTime sets the timeout in deciseconds for noncanonical read.
func (term *Termios) SetVTime(v uint8) {
term.Cc[unix.VTIME] = v
}
// SetVMin sets the minimal number of characters for noncanonical read.
func (term *Termios) SetVMin(v uint8) {
term.Cc[unix.VMIN] = v
}
// SetICanon sets the canonical flag.
func (term *Termios) SetICanon(v bool) {
setFlag(&term.Lflag, unix.ICANON, v)
}
// SetEcho sets the echo flag.
func (term *Termios) SetEcho(v bool) {
setFlag(&term.Lflag, unix.ECHO, v)
}
// SetICRNL sets the CRNL iflag bit
func (term *Termios) SetICRNL(v bool) {
setFlag(&term.Iflag, unix.ICRNL, v)
}
// FlushInput discards data written to a file descriptor but not read.
func FlushInput(fd int) error {
return Ioctl(fd, flushIOCTL, uintptr(unix.TCIFLUSH))
}
| {
"pile_set_name": "Github"
} |
Anterior vaginal wall prolapse and voiding dysfunction in urogynecology patients.
We investigated whether women with and without anterior vaginal wall prolapse have voiding differences. Women (n=109) who presented to a urogynecology practice were categorized into two groups based on anterior vaginal wall prolapse: stages 0 and 1 and stages 2, 3, and 4. Women with prolapse were older than the women without prolapse but the groups were otherwise similar demographically. There was a higher rate of activity-related urine loss and use of wetness protection amongst women without prolapse. There was no significant difference for urgency symptoms or urge incontinence. Urodynamic testing found no significant differences for maximal flow rate or maximal urethral closing pressures. Postvoid residual volume and detrusor overactivity were not different but approached significance. Anterior vaginal wall prolapse of stage 2 or greater was not associated with urge incontinence or voiding function in this population. Women without prolapse were more likely to report stress incontinence. | {
"pile_set_name": "PubMed Abstracts"
} |
~ Wallace's Attempt at Humanities
Category Archives: EDUCATION MATTERS
“No border, no wall, no USA at all”….Colleges and Universities are adjusting their academic campuses to seemingly hate machines.
Many think our American community is now separated beyond repair. The political party’s hold disdain and malice for each other. Additionally, television journalism, printed media journalist, who used to fight fake or miss-guided news, now simply pretends it doesn’t exist.
Graduating from college in 1960, national politics was deeply divided, yet there was the nonideological party system used as the route to a peculiarly American kind of consensus politics. It seemed to work.
Clinton Rossiter, then a Cornell historian, referenced this in his Parties and Politicsin America: “the parties have been the peacemakers of the American community…the unwitting but forceful suppressors of the ‘civil-war potential’ we carry always in the bowels of our diverse nation. Blessed are the peace makers, I am tempted to conclude.”
Television was certainly around, without color, but we did not suffer an electronic media bent on celebrating daily false news, creating crisis hourly.
Recently, FNC (Fox News Channel) had a median viewer age of 68, compared to MSNBC’s of 63, and CNN’s 59. Changing demographics always rule – demanding obvious shifts. Joe Concha, The Hill’s trustworthy journalist, writes on media, consistently expressing disenchantment on how the cable propaganda seems never-ending. Their professional obligations to the American public for fact based reporting borders on empty. For me, it border on repulsive.
“Catch me on #Kimmel TONIGHT @JimmyKimmelLive@JimmyKimmel#ABC”, Bret Baier excitedly tweets. How absolutely sad! If one network attempts a balanced, yet controversial news report, their competitors morph into Chesapeake crabs. You know: the crab who manages to climb out of the basket causes other crabs to pull him back down. That’s what crabs do. It is also what cable news networks do. To the sophisticated news view, it becomes a repulsive dynamic.
All three networks had their strategies: Fox came available in the late 1990’s as a needed conservative antidote – simply offering a choice, and keeping the others honest. CNN came to Richmond in 1980 symbolizing balanced coverage. MSNBC appeared in an almost schizophrenic state where there was little consistency – just flopping around from ideology to ideology.
Today’s treacherous business is simply blocking reports that are unsuitable for the ideology of said cable channel: the Rep. Keith Ellison (house member and vice chairman of the Democratic National Committee) alleged relationship abuse charges; Antifa’ s physical attack on a NBC reporter, and camera man – then unreported by NBC News; the heart-breaking return of human remains from North Korea as a result of the Trump – North Korea agreement –totally unreported except for FNC; non coverage of FISA court applications; even Trump’s positive economic accomplishments. Conclusion the news seems “fixed’.
FNC (Fox News) finds its brand unsettling. Dropping talents like fly’s for the last several years – some no doubt for behavior transgressions – does not denote stability. Others suspect the network’s repositioning to an ideological center-left, which will join the others. FoxNews Sunday has been particularly provoking. Once commandeered by the wonderful Tony Snow – then Brit Hume, FNC finds itself in the lap of snarly, interruptive, Chris Wallace – the balance disappears.
Yes, Fox & Friends IS averaging 1/5 million against the unwatchable Joe Scarborough. Unbelievably, Juan Williams shows up a half dozen times daily – one would think his jaded history at the Washington Post would have kept him off the set entirely. Google it if you must.
CNN’s current status is hard, sad, bewildering to its veteran viewers. The once-crown jewel of Cable News Network does not even get the ratings of HGTV. CNN reporter, Jim Acosta, with his recent melt downs at both the Trump rally in Florida, and his remarkable bad behavior at the White House brings disgust. This network is saturated Hate Trump 24 hours daily.
This was the network of the wonderful Kathleen Sullivan; John Holliman, Bernard Shaw, and Peter Arnett, who transmitted for CNN from a Baghdad hotel as the first bombs dropped in Operation Desert Storm, Jan. 20, 1991. Alas, the network of Robert Novak, Nick Charles, Stuart Varney, Sharyl Attkisson, Mona Charen…..what happened?
MSNBC has long been the problem child and dumping ground for NBC News demotions. For example, once near- greats like Willie Geist, Chris Jansing, Chris Matthews (can one believe Matthews use to sub for Rush Limbaugh?); Brian Williams, Joe Scarborough, and Mika; Joy Ann Reid, who seems apologetic on a monthly basis for some earlier writings…..and a seemingly successful Rachael Maddow.
Saturday, August 12, 2017, delivers deep sadness. Once one experiences life in Charlottesville, the place takes up a special place in one’s education and life. I find her recent defilement unacceptable. Professor Larry Sabato has tweeted the University of Virginia is closed.
Attending the Graduate School of Arts and Sciences there – living on the corner of Madison and University Ave, diagonally across from the majestic Rotunda – was truly idyllic. Sitting in a classroom under Dr. Merrill D. Peterson (The Jeffersonian Image in the American Mind) was no minor academic challenge. Still, The anger on last weekend’s tragedy remains inconsolable.
This charming university town is where young people come to learn, develop, grow-up, and become whole. Now, its tradition and purpose has been violated – thanks to ignorant “racist goons” on both sides (wacko alt-rightist and Black Lives Matter). These unhinged, ugly outsiders purposefully traveled there to bring civil unrest.
With all due respect to the easy surface issues, honest diligence requires deeper consideration. Some leadership there perpetuated growing conflict by giving way to the obscenity of political correctness over the R.E. Lee statue, easily ignoring solid civil rights history.
It was their Democratic party, who, by and large, maintained white supremacy, severe segregation in the first half of Virginia’s 20th century – not the Republicans. Virginians, under Republican Ted Dalton, Radford, Va. made certain it was unacceptable back in 1953. We should never forget that Republicans in Congress salvaged the Civil Rights legislation for the then Democratic president, Lyndon B. Johnson. Where have the editorialists been on that subject?
Maybe it is time for Charlottesville’s leadership and others go back and crack a few solid history books. There is a lot more to all this.
Then there is the local political leadership. With apparent University support – taking over Charlottesville’s political structure, with a group of self-assured, self-centered politicians bringing mockery and depriving Mr. Jefferson’s village of balanced government. By advocating a poisonous political correctness; they engineered a new definition of simple subversion. Realizing or not, this leadership dismissed the traditional culture of community.
Mayor Michael Signer, oozing with condescension and total self-righteousness, exhibited himself for our entire nation to view, evaluate. Signer came to Charlottesville political service from the UVA classroom. Appearing first with Governor McAuliffe in a press conference, then on the ever-inviting CNN, Signer displayed an insufferable moral preening – playing a totally adopted heroic role vs. the irredeemable, with whom he is surrounded. One’s reaction: nothing more than UGH – stick-finger-down-the-throat time.
Additionally, the mayor went so far as to blame the president after Trump’s very clear, solid statement about “all sides responsible”. It wasn’t good enough for him, nor the mainstream media. Surprise! No question we can count on Signer to be one of the Republican/Trump-hating extremist. Irony upon all ironies – David Duke stands with Michael Signer in their criticism of President Trump. These two stoke the “outrage machine” hand-in-hand.
The deaths of Charlottesville native, Heather Heyer, a young paralegal from Greene County, and the Virginia State Policemen: Trooper-Pilot Berke M.M. Bates, Quinton, Va.; Lt. H. Jay Cullen, Midlothian, Va., was nothing short of obscene, and one must ask – for what?
Now, Emancipation Park will carry its own history as a place where terrorism prevailed despite all the lofty intentions. The Richmond Times Dispatch clearly reported that both sides were militarized in some fashion. They both arrived to war –alt. rights vs. counter protesters.
I cannot help but envision Robert E. Lee saddled up , looking down at the mob below….quietly saying: hey, I’ll leave quietlyso you can pursue your lives. He would be heartbroken – simply riding away to separate himself from the academic riff raff.
As a Richmonder, it is required to end with a cautionary note: our Mayor Levar Stoney had better look out for his “fire bell in the night.” It is headed in his direction…the recent meeting at the Virginia Historical Society was ever so propitious.
Charlottesville, mon amour – you deserved so much better from all sides – from all of us.
Dr. Lewis H. Drew, retired Dean of Students – Hampden-Sydney College (H-SC), wrote a little book in 2016: Thoughts on the Inherent Connection among Education, Character Development, Leadership and the Formation of Good People.
Earlier, German philosopher, George Wilhelm Hegel, wrote: Education is “the art of making man ethical.” If he was correct in the 19th century, would he be correct today? For me the above citations act as simple grace – in other words….don’t allow the culture rob you of your soul – with hand-picked moral equivalencies. To be any kind of educator, one must stand one’s ground.
Yale professor allows student to skip exams due to shock over presidential-election results, November 9, 2016.
Here in Richmond, VA, we see Virginia Commonwealth University students abandoning their studies…to protest the 2016 Presidential election results – dismissing their academic, learning responsibilities – and attempting to massively block I–95….a nearby interstate through the city.
A testimony: “When I moved into my office at Darden a woman came around and asked me if I would place a ‘Safe Place’ hanging sign on the door-handle outside my office. ‘Why?’ I inquired. It tells students that if they’re feeling threatened they can find safety in your office, was the reply. ‘I don’t think I’m in a position to offer blanket sanctuary for everyone on campus,’ I replied. Especially, people I don’t know, or have never met. The woman walked away in a huff. I never saw her again”.
And this…they KANT be serious! PC students demand white philosophers including Plato and Descartes be dropped from the University of London syllabus. Such seminal figures including Bertrand Russell should be largely dropped from the curriculum simply because they are white. The School of Oriental and African Studies (SOAS)…demanded that examples should be from Africa and Asia.
Other headlines: Wayne State University cuts Math – wants “Diversity” Requirements for General Education Curriculum…..The University of Wisconsin-Madison is now requiring all men to take gender identity class to “make sure” they are really men……George Washington University, a 25,000-student private university, located in Foggy Bottom neighborhood of Washington, D.C. – eliminated its American-history requirement for undergraduate history majors – making it theoretically possible to graduate from GW with a history degree without ever having had to take a college-level course in U.S. history….
Often an ill-defined integrity means staying with the ship, no matter what, even if it was veering in unscheduled directions that bring disaster of all its loyal passengers. Loyalty to a cause can be impressively touching – like deep friendship – but oh, so perverse – as the above items illuminate.
So what about the enshrined status of Hampden-Sydney College (“Sydney”) after her recent years of reported clumsy leadership struggle? Alumni keep up – occasionally bombarded by the college’s despair with the Longwood University squabble; the apparent old nemesis – drugs and Honor Code violations (joining many Universities and Colleges) among some of her students. In years past, aberrant behaviors are addressed with strong Honor Code discipline, ridding the campus of those who attempted reward by dishonest means; we’ve learned to eschew such academic miseries.
H-SC, nationally ranked, is lead by energetic John Lawrence Stimpert, her 25th president; and M. Peebles Harrison, new Board chairman. Working together, they have geared up for a professional examination, focusing on both Board governance, and Admissions…with a deep degree of seriousness.
Remembering a challenging memorandum written by former H-SC board member, Bill Crutchfield, a good start is to address the decision to remain with single gender education. If the college is to remain single gender, it should aggressively leverage that unique differentiator. First steps need to be clear articulation of how a single-gender education truly benefits a specific sub-set of young men.
Developing a very powerful case for all-male education easily communicated to laypersons, such as potential students and their parents, is paramount. As Crutchfield explained in 2013, On the other hand, if the college cannot develop a strong case for single-gender education that can be communicated to lay persons, we should seriously consider becoming coeducational.
Dean Drew’s little book inspires. He quotes H-SC’s Walter Blair Professor of Latin, the late Dr. Graves H. Thompson: the four years a man spends at college should be like a hill in a plain. As he ascends the hill, he is able more and more to see back over the road that humanity has trod – the great things that have been thought, and said, and done, and believed, and created.
Woody Allen said that 80% of celebrity is showing up; Saying and doing the courageous thing makes it 100%. Both Stimpert and Harrison seem to get that.
While the plural form of “medium” is “media”, the term has regrettably become more than a regular noun. Instead, it has morphed into a dreaded anathema for serious news consumers, academicians; they’re use to absorbing information in earnest – both right and left.
Ostensibly, “media” stood for the main means of accurate mass communication (especially television, radio, newspapers, and the Internet); collectively, it was regarded as positive. Historically, readers anticipated reliability, truth, and its fundamental role as the Fourth Estate. Now, many see it as vastly untrustworthy, agenda oriented, deceiving – finally, a sad hoot.
Growing up in the 1940’s, radio became a trustworthy source for media news. It was clearly reported in the TheMurrow Boys, a group of CBS broadcast journalists, writers….closely associated with Edward R. Murrow, during and after World War II – into the fifties.
Highly respected were William L. Shirer (The Rise & Fall of the Third Reich); Charles (Bonnie Prince) Collingwood; the beautiful laconic- like voice of Winston Burdett, in Rome; and the challenging Howard K. Smith. State-side if you wanted a leftist broadcaster: Elmer Davis, Edward P. Morgan, Robert Trout, and Eric Sevareid were reliable. For the conservatives: Fulton Lewis, Jr.; Morgan Beatty, Westbrook Pegler, George Sokolsky, and Gabriel Heater. Lewis’ influence was huge – right into the sixties. WLEE’s Harvey Hudson brought Fulton Lewis, Jr. to the Westwood Club on numerous occasions. Finally, for news amusement: Drew Pearson and Walter Winchell.
Now “media” thrives with writers, columnists, recovering lawyers, political specialists…. those degreed from left wing journalism schools – immersing themselves as singularly redemptive for a troubled America. Their reporting reflects what images they determine should be promoted – nailing the imperfect, broken America they view – naturally inherited from racists, less talented generations.
Oh, did I mention, they write from a perspective that carries condescension, well-put contempt, directed to those who view issues differently – always uniformly dismissed. For those who live in Realville, this contemporary journalistic group can be unrelenting in their elitism – reveling disdainfully our current political system. My reaction: it reminds one of trying to teach fishes of the sea….about fire.
Do media reflect a high support for current leftist causes: big government; abortion on demand; politically correct victimology; massive debt; a foreign policy (leading from behind); reverse racism; energized sympathy for the Democrat over Republican? As Sen. Marco Rubio said, “The Democrats have the ultimate super PAC – it’s called mainstream media.”
Further inquiry escalates: are these ideological views promoted by a designed media conspiracy – planned by a diabolic group of extreme leftist? I’m taking a “hall pass” on that one – here’s why.
Peeved, as this writer remains, we are provided with a latch key into some reasons provided in Left Turn: How Liberal Media Bias Distorts the American Mind, by Tim Groseclose…which does entice.
Kelly Riddell of the Washington Times cited this a half year ago. “There’s something in the DNA of liberals that makes them want to go into jobs like the arts, journalism, and academia more so than conservatives.” Groseclose concludes: “Even if you’re just trying to maximize profits by offering an alternative point of view, it’s hard to find conservative reporters”, particularly those debuting from journalism schools.
So it’s natural the media is more liberal. For profits sake, Dr. David D’Alessio, communications science professor at the University of Connecticut at Stamford, admits to press bias. He goes on to explain it is best for business to even it out – to the middle – because that’s where the greatest market is for making money.
D’Alessio continues: …their job is about making money. “If you look at where people’s opinions are, they are in the middle, so that’s where reporting should go because that’s where the eyeballs go.” The cultural choice of presentation is another subject entirely. Front pages which use to aspire to Herald Tribune quality…now seem to choose the allure of Police Gazette –purposefully.
Sadly, trust in the news media is being eroded by perceptions of bias. Just 6 percent of people say they have a lot of confidence in the media – putting the news industry about equal to Congress – and well below the public’s view of other institutions. The American public wants news that is up to date, accurate, concise, and clearly honest. They know that they are not getting it.
HOFFMAN…Dropping in again on William Hoffman, author, is an inspirational struggle, probably soulful in nature. Men in Trees and Men on the Water, wrote Maria Spalding Hadlow in her master’s thesis at James Madison University.
The lure of Trees (mountains) – the Water (rivers and bay) became the invitation for Hoffman’s’ carefully constructed literature. It is striking how Hadlow’s scholarship harks back to friend, Don Gehring’s observation: “There’s a whole bunch of us ….in us.”
Henry William Hoffman, born in Charleston, West Virginia, went to Charleston public schools. Serving in World War II (both Normandy and the Battle of the Bulge), he returned home on a hospital ship. Enrolling at Hampden-Sydney College, he received his degree in 1949; Hoffman would spend a post-graduate year at Washington & Lee University with Tom Wolf. His honorary doctorate there followed later.
Hoffman’s character-development included deprivation of place – grasping justifications – unexpected virtues of simple resilience – desperately searching for an elusive integrity.
As a 1950’s Hampden-Sydney College student, I witnessed the “early Hoffman” in that special place – cool, understated, wise-for-his-time, war-scarred young novelist, journeying to where his creativity would beach. We shared our membership installation to O D K Honorary Fraternity.
In our retirement move to Westham Green condos, I carefully examined our new book shelves; the novels were lined up chronologically – 13 novels, four books of short stories. Recalling his awards: 1992 John Dos Passos Prize For Literature; O. Henry Prize, 1996; the Dashiell Hammett Award for his Tidewater Blood (1998), brought rekindled admiration.
Students affectionately called him “shaky” with his occasional World War II shell- shock spasms. All took deep pride in having a novelist-in-residence. His stories reminded us that there’s a little bit of ostrich in all of us – never to abate.
Daniel M. Hawks, Assistant Curator for Jamestown-Yorktown Foundation, recalled his Hoffman Creative Writing Class: one morning each student in the class was required to read the opening paragraph of the “piece” he had been assigned to write. One of the men near the front of the class (whose name I cannot remember) began by saying, “The air was filled with excitement”. Hoffman immediately jumped out of his chair pointed his arms into the air as if he had a hunting rifle and yelled “Bang, bang, bang! I just killed excitement!”
Much later a wonderful reunion of two old friends, Tom Wolf and William Hoffman, at Washington & Lee University, was recorded. They discussed a year in Virginia letters – their year – in Lexington, now six decades ago.
Taking creative writing classes, Hoffman and Wolf helped launch W & L’s prestigious literary magazine: Shenandoah. Fascinating exchanges between these old friends brought published intricate insights. Each of them remembered the title, plot, even character names of the first story the other published.
Tom Wolf observed that fictional characters had their ways. “I think clothes often are a give-away of who a person thinks they are…a kind of a little window that opens.” Hoffman laughingly agreed.
Richmonder, Elizabeth Seydel Morgan, publisher of poetry, directed this awareness to Hoffman readers. “There they were, two Virginia gentlemen talking about the writing life, double-breasted suits, and their halcyon days at Washington & Lee.”
Maria Hadlow’s concluding interview brought Hoffman’s assorted thoughts together: “I was brought up as sort of privileged character. My mother and father were poor, so we moved in with my grandmother….We went to Florida in the winter. I was sent to private schools and summer camps…my father lost his house and business – everything and his marriage broke up. So I’ve got these two things. I’ve got the side that had the money and the privileges; I’ve got the side that didn’t have anything….so I see it from both sides….”
He wrote from multiple hearts – multiple places – innumerable spiritual susceptibilities, with deep agonies of an eternal soul. Robert Merritt once described him as a writer with eye for detail, simplicity of dialogue, allowing us in on not only a South as it was, but also a South as it is. This was evident in my Hoffman favorite: A Place For My Head (1960).
Dr. John L. Brinkley, H-SC historian and classics professor, reminded us: Professor Hoffman could be blunt with his students, but the intent was always pure.
Months ago, at Wesleyan University, “the student government voted to CUT funding for the 150-year-old campus newspaper after it (courageously) published a conservative op/ed.” This latest campus cultural affliction was reported by Washington Post’s columnist, Catherine Rampell.
So, let me get this straight, this Wesleyan defunding followed Williams College’s earlier stunning scheme: addressing their atmosphere of free-speech intolerance – by extracting some concession – creating an “Uncomfortable Learning Speaker Series.” Three cheers…bring out the Tote Bags and stale nabs!
Williams’ new policy was responding with an antidote to their super-intolerant, fantasizing left-leaning student body. Williams College – a $63,290.00 tuition annual bargain – wistfully, but briskly caved by disinviting one of their earliest speaker choices, Suzanne Venker, conservative writer, thinker.
Seemingly, this falls in the vein of Groucho Marx’s Horse Feathers (1932) – his role as president of brainless Huxley College – (whatever it is, I’m against it). For me, this prompts back to Tonight’s Jack Paar, and his – I kid you not.
All this ideological idiocy brings us to The New Criterion, November issue. Subject: Unfree Speech at university campuses across America. It should frighten all reasonably serious Americans – left or right – who’d deem these policies both dangerous and disastrous.
Arthur C. Brooks (NYT), in a recent piece, cites a published paper in the Behavioral and Brain Sciences journal, detailing a shocking level of political (left) groupthink in academia. One of its authors, Philip E. Tetlock (University of Pennsylvania), summed it up: in researching “political charged topics form an ideologically incestuous community is downright delusional”. Yeats’ fire remains unlit.
What now exists on college and university campuses is a slew of carefully directed grievance cultures, mixed with insistency on acute victimology. One can easily inquire of former Secretary of State Condi Rice; Ayaan Hirsi; Charles Murray; Christine Lagarde, first woman to head the IMF; columnist George Will on what they cumulatively experienced after receiving commencement-speaking invitations – a disinvite. This perfectly reflects an ingrained hostility to free speech and thought.
Then there is the Michelle Obama example: At five Topeka, Kansas high schools, students learned they could invite six people to the commencement for students from five high schools, which was meant to honor the seniors and the 60th anniversary of Brown v. Board of Education. Students petitioned….asking the school board to change the event. Getting their demands met, the graduations were broken up; Ms. Obama’s speech was moved to an additional venue – something called “Senior Recognition Day.”
Criterion further reports results from the William F. Buckley Program at Yale. The survey (McLaughlin & Associates) covers 800 students of various colleges.
Alarming is the word: *Students favor their schools having speech codes to regulate both students and faculty…51% to 31%; *Require professors to employ “trigger warnings” for students who may be sensitive to material that might be discomforting; *One third of the students polled could not identify the First Amendment as part of the United States Constitution dealing with free speech; *35% said the First Amendment does not protect “hate speech”; *30% of self-identified Liberal Students say the First Amendment is outdated, needing revision or elimination.
Unfortunately, at all cost, solid dissension (opposition) must be devalued – even eliminated. Current issues such as climate change; abortion; race relations (Black Live Matter); feminism; even sex, are not open for debate.
Cheerlessly, campus intellect-pursuit has fallen from a rich experience of dining….to simply eating. Meanwhile, it will lead to leftist ideology ruling over serious critical thought – without anyone realizing the difference. Proper scholarship is based on tolerance, openness and modesty.
“Education is not the filling of a pail, but the lighting of fire.” Soon, there will be days where such snark and contempt will drench campuses – where process and machinery will rule, smothering critical thought – without interruption.
On a positive note, I met Hampden-Sydney College in the 13th grade, totally by blind dumb luck, immediately encountering serious liberal arts challenges.
John McCandell, Vice Chancellor of Sewanee, the University of the South, was recently quoted: “The sense that there is a crisis among small liberal arts colleges for financial reasons doesn’t seem borne out by the evidence.” Continuing: “All of us are going to have to continue to take a good close look at how we allocate precious financial aid dollars, lest we see serious socio-economic effects.” It’s a good beginning.
As a red-white-blue-garnet-gray Hampden-Sydney product, I deeply feel – for the health of our culture, and nation – smaller liberal arts colleges must not only thrive, but discover ways to accommodate academically deserving students (note the word, deserving), who need financial assistance.
While the small liberal arts model seems “the most expensive model there is,” it can and does function as the jewel of higher education. It simply preserves/protects a solid, refined learning experience.
For me, “Sydney” has been analogous to experiencing a life-long best friend. That’s special…but having this best friend almost your entire life is a rare blessing – something deeply held. And if that friend’s industry or business model begins to get wobbly, attention must be paid. Internal examination, if required, needs to begin yesterday.
Thankfully, it’s unnecessary for me to remind the quintessential professional Anita H. Garland, Dean of Admissions at Hampden-Sydney College that many applicants, who are attracted to the small, nurturing, residential liberal arts environment, are now showing up from different socio-economic backgrounds. Following defining demographic changes in student populations, it’s neither surprising, nor shocking, this day has arrived. The student world is a changin.
Choosing anonymity, a talented H-SC alumnus (in the higher education field), spoke about the “H-SC man” – as a liberally educated gentleman, well grounded, with his almost spiritual description: “one of servant leadership.”
As lines between gender-roles thin further, with educated gentlemanliness swamped into perceived anachronism, are those brands proceeding to the cultural dumpster? Answer: no – despite the crushing heavy-handedness of a growing coarseness in American culture. We simply owe it to western traditions.
Should veteran alumni be part of redefining the enticement of the school? Should the college create a renewed bent on Christian faith – particularly in the current climate? Promoting the campus location as a safety alternative to urban campus up evil would appeal. Sure, it’s possible an H-SC curriculum could benefit from tweaking. Many even consider including a newly cultivated “Hampden-Sydney man”….and ‘woman’.
Small college creativity abounds: Wilson College – slowly went co-ed, and cut the tuition 17%, launching the nation’s first debt buy-back program; Sewanee adopted a tuition cut of 10%, locking the price in for the entire 4 years; Mary Baldwin College (soon to be University) buffets the core residential liberal arts program by launching health science programs as a separate college, and creating a graduate education program of its own. Baldwin has been creative for years; Hampden-Sydney could consider a non-residential, but authentic off-campus College location on the outskirts of Roanoke, or Richmond – building a first two year program – feeding into a completed campus experience…possibly creating classes in cyber security, health management, even political communication.
Finally, for me, it looks like recruiting more and more students who need heavy financial aid is not a good idea. Realizing our current administration desires this, we’d better be “damn sure”, as Dr. Ned Crawley often roared. Betting most institutions have a clear “tipping point” for its discount rate, one wonders what it is for Hampden-Sydney.
The economy and culture of America are testing all small private colleges, small universities. Future environments require heavily engaged, talented administrators, in this exacting academic age. Their success, survival, or demise, will result with the pathologies created inside them.
Book it, Danno.
Raymond B. Wallace, Jr. acknowledges UNIVERSITY BUSINESS for some of the material contained herein. Wallace’s new book ESSEX MEMORIES & BEYOND was recently nominated in the non-fiction category for the 18th annual Library of Virginia Literary Award, 2015.
The much ballyhooed film, SELMA, is taking a hit which could and should have been avoided. The experience of my Advance Placement teaching days make this conclusion easy – sadly reluctant.
Utilizing an important instrument, in my case teaching A.P. United States History, and accurately assessing the role of a white, politically Democratic president in the 1964 Civil Rights movement, is essential – particularly for young minorities. These students must have some solid foundation to comprehend this troubled racial world of today.
The film missed the mark. It strayed and betrayed itself into a reverse racism platform, complying with current minority cultural demands. What a lost opportunity! Only in America: Glen Beck, national radio-talk conservative, and Michael Paul Williams, Richmond Times Dispatch’s predictable leftist columnist, stood hand-in-hand on the matter of SELMA. Both saw it as richly inspiring and a critical must-see – accompanied by others who believe it a personal spiritual requirement – to be in love, with loving this film.
For those of us who were clearly around – remembering well the black and white TV coverage of Montgomery fire hoses – a couple years prior to the disaster on the Edmund Pettus Bridge in Selma, AL, I am absolutely baffled by the propensity to present spurious history regarding President Lyndon Banes Johnson’s role. Johnson’s pivotal and a supportive action for the protestors was very clear – backed up by released tapes of these discussions. Sadly, the film’s director chose to bring her audience a depiction both warped, and inaccurate – in an overtly dishonest presentation.
Joylessly, I find myself in agreement with New York Times columnist, Maureen Dowd’s description of the SELMA’s message as: “artful falsehood.”
Making it worse, Richmond VA’s leadership sponsored 10,000 Richmond high school students to see Selma, without any apparent teaching-moment follow up; they bought into a blemished version. One would think corporate leadership would know better!
For both Glen Beck and, Michael Paul Williams, it makes little difference if the film presents bogus history regarding LBJ’s role in the event. Artistic license often purposefully distorts the truth; it clearly does in Selma’s case. The natural and protracted excuse enveloping those of us appalled and saddened with this production, is….that it’s simply a movie – and, hey, that’s really OK after all.
If the presentation was contrived through ignorance (it wasn’t), or distorted with an “emotional history”, triumphanting over truth, the disgrace expands. Sadly this show borders on unforgivable because it was directed to vulnerable minds – totally bereft of a frame of reference or any comparative background. Because a white President Johnson was portrayed in a version the current minority culture demands, the consideration of truth seems non-existent.
The heart breaking question rings loudly: what are we doing to ourselves? Americans: African-American and whites, must do better.
I really speculate those 10,000 Richmond middle and high school students, under the local RVA’s sponsorship to free-see the film; will not be taught accurate history about their President – in 1960’s American history. Their impression will slowly morph into “knowledge”; it will be serving a dreaded and pleasing, growing ignorance and separatism further along racial lines.
Histories tease; the discipline shakes, shifts, taking new forms – almost as predictably as the Earth’s crust – with nagging regularity. Embossed announcements, they are not. Deciphering, what should be learned, and in my case, what should’ve been taught in Henrico’s Mills Godwin U.S. History class rooms, becomes a paramount objective. Obduracy has no place.
While the RTD editorial analyzed a recently published history – Edward E. Baptist’s The Half Has Never Been Told – other books, unabashedly scream for classroom usage: Ross Douthat’s Bad Religion; and James E. Ryan’s Five Miles Away, A World Apart (a Richmond analysis between two high schools – Douglas Freeman and an urbanized Thomas Jefferson).
Adding to personal challenge is my celebrated membership in that first 1956 graduating class at Douglas Freeman H.S. – inducing an unwarranted, but inexact discomfort. Now, what to teach.
*Douthat’s Bad Religion measured significant chronology of cultural changes from the Eisenhower years to George W. Bush’s election. It offended almost everyone who is bone-deep with religion. The text criticized an amazing variety of American religious pathologies – fair, but blunt in analysis. Douthat’s work brings light to the A.P. block: Religion In America. It was a time when Americans began believing in anything by labeling it spiritual. And yes, such spiritual gymnastics affected history.
*Ryan’s Five Miles Away sparked local, social analysis. Using two local high schools as archetypes, examining the cultures of student bodies ( TJ – 82% minority; DSF – 73% white ), the text has a clear theme: central city vs. the suburbs. Ryan labels “Nixon compromise” as a new separateness – the issue of desegregating students was transformed into one of “desegregating dollars.” The new maxim: “urban schools should be helped in ways that do not threaten the physical, financial, or political independence of suburban schools.” Student discourse would jump for the “teaching moment” with that thesis? You bet.
*The Half Has Never Been Told finds the application of Nixonian terminology, “the big enchilada”, spot on. Its conclusion requires rethinking, reteaching on how wretched Americanized slavery emerged into nationalized status – with energized complicity of American business.
For instance: As early as the 1820’s, slave owners commanded the biggest pool of collateral in the United States – two million slaves worth more than $1 billion. It’s 20% of all the wealth owned by all U.S. citizens – irrespective of sectional background and culture. From 1824 to 1832, the Philadelphia-based Bank of the United States, the banker of the Federal Government, multiplied the amount of its loans to Mississippi Valley slave owners 16 times over – a massive investment.
Baptist assures by 1832, at least one-third of the entire bank’s capital had been allocated to planters, slave traders, merchants, and local banks in the “slave frontier” of southwestern states. The depth of the bank’s commitment, in turn, gave EUROPEAN INVESTORS confidence to lavishly inject their own currency in American slaves. Slavery in the American South emerged into a worldwide investment.
During the ante-bellum period, lists of participating American corporations intrigued: Lehman Brothers; Aetna, Inc.; JPMorgan Chase; New York Life; Wachovia Corporation (now owned by Wells Fargo); N M Rothschild & Sons Bank in London; Norfolk Southern; USA Today even found that their own parent company, E.W. Scripps and Gannett, has had links to the slave trade.
History instructs The Civil War cost America about 640,000 lives; it would finally bring an end to the lucrative partnerships between the cruel machine of Southern slavery and the Northern roaring engines of slave capitalism.
In the movie, Wall Street (1987), Gordon Gekko fabricated that greed is good…greed is right…greed works…and greed clarifies. It conveyed a contemptuous conclusion, wrecking American humanity for over two centuries, in unfathomable ways. Mr. Might-Have-Been ponders.
Raymond B. Wallace, Jr. recently published his book, ESSEX MEMORIES& BEYOND. He can be contacted: rbwallace01@verizon.net.
Normally, when Henrico teachers, mostly retired by now, consider Dr. William C. Bosher, they simply understand he lacked the bureaucratic odor. He simply avoided the malady…he did not speak nor share inanities of bureaucratic vocabulary. No fabrications in his leadership.
William (Bill) Cleveland Bosher, Jr. was in recent years Distinguished Professor Public Policy and Education at Virginia Commonwealth University. He came through the ranks, starting in Henrico County, VA where he taught and later became superintendent. Making my career change to the classroom in 1984, I was simply fortunate to work under him….he would later become dean of the VCU School of Education.
Most importantly, he headed off silly far-fetched nationally educational trends, one after another, keeping the system straight and narrow. He would use imagery of English literature, mesmerizing both student and teacher. He could be forcefully blunt: “OBE (Outcome Based Education) in Virginia is dead.” We were so grateful.
As a middle aged new-comer from the real corporate world, I early understood Dr. Bosher valued and understood his richest asset: the teacher – how fortunate for us. | {
"pile_set_name": "Pile-CC"
} |
PurpleSkyz
terbo56
Posts : 3380Join date : 2012-02-10Age : 61Location : Florida
There are STILL great and caring people in the world, and this little movie just solidified that- How great is it to have a child smile, be happy to see good things comfort them in the time of need- More people need to wake up and see what can be done for others that are caught up in a bad circumstance, and not to just think about themselves all the time-Everyone NEEDS to come together in good times, AND bad- :tree2: | {
"pile_set_name": "Pile-CC"
} |
Sarah Darkish is a hotty! This pallid lil’ Austrian factor is a insatiable lil’ tramp and urchin simply enjoys to have fun all through herself. Whilst having the sheer pleasure of a ciggie this hotty embarks to have fun along with her lil’ cootchie and lets out her fave fake penis to make herself jizm noisy! | {
"pile_set_name": "OpenWebText2"
} |
Heretofore, a linear actuator, for example, which is made up of a fluid pressure cylinder or the like, has been used as a means for transporting workpieces under the supply of a pressure fluid. As disclosed in Japanese Patent No. 3795968, the present applicants have proposed a linear actuator, which is capable of transporting a workpiece that is mounted on a slide table by causing the slide table to move reciprocally in a straight line along a cylinder main body. However, with the aforementioned linear actuator, in recent years, there has been a demand to reduce manufacturing costs and to enhance ease of assembly by simplifying the structure of the linear actuator. | {
"pile_set_name": "USPTO Backgrounds"
} |
<?php
/**
* @file
* Lagoon Drupal 8 development environment configuration file.
*
* This file will only be included on development environments.
*
* It contains some defaults that the Lagoon team suggests, please edit them as required.
*/
// Show all error messages on the site.
$config['system.logging']['error_level'] = 'all';
// Disable Google Analytics from sending dev GA data.
$config['google_analytics.settings']['account'] = 'UA-XXXXXXXX-YY';
// Expiration of cached pages to 0.
$config['system.performance']['cache']['page']['max_age'] = 0;
// Aggregate CSS files off.
$config['system.performance']['css']['preprocess'] = 0;
// Aggregate JavaScript files off.
$config['system.performance']['js']['preprocess'] = 0;
// Stage file proxy URL from production URL.
if (getenv('LAGOON_PRODUCTION_URL')) {
$config['stage_file_proxy.settings']['origin'] = getenv('LAGOON_PRODUCTION_URL');
}
| {
"pile_set_name": "Github"
} |
a) Field of the Invention
The present invention relates to a thin film transistor, a liquid crystal display substrate, a MIS type field effect transistor (MISFET), and their manufacture methods, and more particularly to a transistor having a lightly doped drain structure, a liquid display substrate having such transistors, and their manufacture methods.
b) Description of the Related Art
Thin film transistors (TFT) are used as switching elements of pixels of an active matrix type liquid crystal display device. A small off-current of TFT is necessary for holding electric charges accumulated by a pixel electrode. The off-current can be reduced by adopting a lightly doped drain (LDD) structure.
If both the source and drain regions of TFT have the LDD structure, an on-current reduces. In order to reduce the off-current and retain a sufficient on-current, it can be considered preferable if the LDD structure is formed only on the drain side.
For example, in order to form the LDD structure in only the drain region, first impurity ions are implanted into the drain and source regions at a low concentration. Thereafter, the area in the drain region at the low concentration is covered with a resist mask and impurity ions are implanted at a relatively high concentration. The source region is not covered with the resist mask. If the gate length is short, a high precision of position alignment is required when a resist mask is formed to cover the low concentration region on the drain side and expose the source region.
A TFT using a polysilicon thin film has a carrier mobility higher than a TFT using amorphous silicon. Therefore, by using polysilicon TFT, an image display area and its driver circuit can be formed on the same substrate. A larger on-current is required for TFT in the peripheral circuit than a switching TFT of each pixel. In this context, it may occur that the LDD structure is adopted for TFT in the pixel area and not for TFT in the peripheral circuit.
If the LDD structure is adopted for the source and drain regions of TFT in the pixel area and not adopted for TFT in the peripheral circuit, the number of photolithography processes increases more than if the LDD structure is adopted for all TFTs. An increase in the number of photography processes results in a higher manufacture cost and a lower manufacture yield. | {
"pile_set_name": "USPTO Backgrounds"
} |
module mod11 {
prefix abc;
namespace "urn:cesnet:mod11";
typedef my_type {
type uint8;
}
leaf l1 {
type "my_type" {
range "5 .. max | 10 .. 20";
}
}
}
| {
"pile_set_name": "Github"
} |
Gustavo Latronico
Gustavo Latronico (born June 24, 1984) is a Uruguayan born football player who currently plays with Huracán Buceo in the Segunda División Uruguay. He previously played for C.A Peñarol in the Uruguayan First Division. He is a midfielder and is currently trialling with Australian A-League club Sydney FC. Despite scoring for Sydney on a pre-season friendly against Penrith Nepean United, Latronico failed to sign with the Harbourside club.
Gustavo has also played 5 games for the Uruguay U17 .
References
Category:1984 births
Category:Living people
Category:Sportspeople from Montevideo
Category:Uruguayan footballers
Category:Association football midfielders | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
Как в PyQt5 к кнопке привязать другое окно и преобразовать всё в .exe файл?
Имеются 2 программы: бинарный калькулятор и прогноз погоды в отдельных окнах.
Надо сделать так, чтобы при нажатии на соответствующие кнопки в меню отображались соответствующие окна программ.
К главному меню относятся файлы mintro.py и mintro1.py:
mintro.py:
from PySide2 import QtCore, QtGui, QtWidgets
class Ui_Dialog(object):
def setupUi(self, Dialog):
Dialog.setObjectName("Dialog")
Dialog.resize(371, 300)
Dialog.setStyleSheet("background-color:#8430b8;")
self.pushButton = QtWidgets.QPushButton(Dialog)
self.pushButton.setGeometry(QtCore.QRect(30, 160, 311, 51))
self.pushButton.setStyleSheet("color:#d7e535;\n"
"font: 14pt \"Onyx\";\n"
"background-color:#494f8a;")
self.pushButton.setObjectName("pushButton")
self.pushButton_2 = QtWidgets.QPushButton(Dialog)
self.pushButton_2.setGeometry(QtCore.QRect(30, 220, 311, 51))
self.pushButton_2.setStyleSheet("color:#e01414;\n"
"font: 14pt \"Onyx\";\n"
"background-color:#dff022;")
self.pushButton_2.setObjectName("pushButton_2")
self.label = QtWidgets.QLabel(Dialog)
self.label.setGeometry(QtCore.QRect(0, 30, 371, 51))
self.label.setStyleSheet("color:#22f70f;\n"
"font: 8pt \"Playbill\";\n"
"border:none;\n"
"")
self.label.setObjectName("label")
self.label_2 = QtWidgets.QLabel(Dialog)
self.label_2.setGeometry(QtCore.QRect(30, 70, 321, 81))
self.label_2.setStyleSheet("font: 11pt \"MV Boli\";\n"
"")
self.label_2.setObjectName("label_2")
self.retranslateUi(Dialog)
QtCore.QMetaObject.connectSlotsByName(Dialog)
def retranslateUi(self, Dialog):
Dialog.setWindowTitle(QtWidgets.QApplication.translate("Dialog", "Dialog", None, -1))
self.pushButton.setText(QtWidgets.QApplication.translate("Dialog", "Бинарный калькулятор", None, -1))
self.pushButton_2.setText(QtWidgets.QApplication.translate("Dialog", "Узнать погоду в городе", None, -1))
self.label.setText(QtWidgets.QApplication.translate("Dialog", "<html><head/><body><p align=\"center\"><span style=\" font-size:36pt; color:#ff0000;\">SWISS </span><span style=\" font-size:36pt; color:#ffffff;\">KNIFE </span><span style=\" font-size:12pt;\">v 1.0</span></p><p><span style=\" font-size:36pt;\"><br/></span></p><p align=\"center\"><span style=\" font-size:36pt;\"><br/></span></p></body></html>", None, -1))
self.label_2.setText(QtWidgets.QApplication.translate("Dialog", "Выберите одну из предложенных функций:", None, -1))
if __name__ == "__main__":
import sys
app = QtWidgets.QApplication(sys.argv)
Dialog = QtWidgets.QDialog()
ui = Ui_Dialog()
ui.setupUi(Dialog)
Dialog.show()
sys.exit(app.exec_())
mintro1.py:
import sys
from PySide2 import QtCore, QtGui, QtWidgets
from mintro import Ui_Dialog
app = QtWidgets.QApplication(sys.argv)
Dialog = QtWidgets.QDialog()
ui = Ui_Dialog()
ui.setupUi(Dialog)
Dialog.show()
# Здесь предполагаю возможные функции соединения c кнопками
def bincalc():
ui.pushButton.clicked.connect(bincalc)
def weathshow():
ui.pushButton_2.clicked.connect(weathshow)
sys.exit(app.exec_())
weath1.py
import sys, pyowm
from PySide2 import QtCore, QtGui, QtWidgets
from weath import Ui_Dialog
app = QtWidgets.QApplication(sys.argv)
Dialog = QtWidgets.QDialog()
ui = Ui_Dialog()
ui.setupUi(Dialog)
Dialog.show()
class Weathshow(QtWidgets.QDialog, Ui_Dialog):
def __init__(self, parent=None):
super(Weathshow, self).__init__(parent)
self.setupUi(self)
def get_weather_city():
owm = pyowm.OWM('API key', language = "ru")
place = ui.lineEdit.text()
observation = owm.weather_at_place(place)
w = observation.get_weather()
temper = w.get_temperature('celsius')['temp']
ui.label_2.setText(f"Температура сейчас {temper} по Цельсию.")
ui.label_3.setText( f"В городе {place} сейчаc {w.get_detailed_status()}.")
if temper < 10:
ui.label_4.setText( f"На улице довольно холодно: одевайтесь тепло." )
elif temper < 20:
ui.label_4.setText( f"На улице холодно: одевайтесь потеплее." )
else:
ui.label_4.setText( f"На улице тепло: одевайтесь свободно." )
ui.pushButton.clicked.connect( get_weather_city )
sys.exit(app.exec_())
my_weath.py
from PyQt5 import QtCore, QtGui, QtWidgets
class Ui_Dialog(object):
def setupUi(self, Dialog):
Dialog.setObjectName("Dialog")
Dialog.resize(451, 363)
Dialog.setStyleSheet("background-color:#90d5fc;")
self.label = QtWidgets.QLabel(Dialog)
self.label.setGeometry(QtCore.QRect(90, 10, 251, 51))
self.label.setStyleSheet("font: 9pt \"MV Boli\";")
self.label.setObjectName("label")
self.pushButton = QtWidgets.QPushButton(Dialog)
self.pushButton.setGeometry(QtCore.QRect(260, 130, 141, 51))
self.pushButton.setStyleSheet("QPushButton {\n"
"color:#2e0ff7;\n"
"background-color:#83f70f;\n"
"border:none;\n"
"font: 12pt \"Niagara Engraved\";\n"
"}\n"
"\n"
"QPushButton:hover {\n"
" background-color:silver;\n"
"}\n"
"\n"
"QPushButton:pressed {\n"
" background-color:red;\n"
"}\n"
"")
self.pushButton.setObjectName("pushButton")
self.lineEdit = QtWidgets.QLineEdit(Dialog)
self.lineEdit.setGeometry(QtCore.QRect(22, 70, 381, 41))
self.lineEdit.setStyleSheet("color:#404dc2;\n"
"border:none;\n"
"background:#77a17b;\n"
"font: 15pt \"Nirmala UI\";")
self.lineEdit.setObjectName("lineEdit")
self.label_2 = QtWidgets.QLabel(Dialog)
self.label_2.setGeometry(QtCore.QRect(10, 190, 431, 51))
self.label_2.setStyleSheet("color:#db145d;\n"
"font: 75 italic 12pt \"MS Sans Serif\";")
self.label_2.setText("")
self.label_2.setTextFormat(QtCore.Qt.PlainText)
self.label_2.setObjectName("label_2")
self.label_3 = QtWidgets.QLabel(Dialog)
self.label_3.setGeometry(QtCore.QRect(6, 240, 441, 51))
self.label_3.setStyleSheet("color:#db145d;\n"
"font: 75 italic 12pt \"MS Sans Serif\";")
self.label_3.setText("")
self.label_3.setObjectName("label_3")
self.label_4 = QtWidgets.QLabel(Dialog)
self.label_4.setGeometry(QtCore.QRect(6, 292, 441, 51))
self.label_4.setStyleSheet("color:#db145d;\n"
"font: 75 italic 12pt \"MS Sans Serif\";")
self.label_4.setText("")
self.label_4.setObjectName("label_4")
self.retranslateUi(Dialog)
QtCore.QMetaObject.connectSlotsByName(Dialog)
def retranslateUi(self, Dialog):
Dialog.setWindowTitle(QtWidgets.QApplication.translate("Dialog", "Dialog", None, -1))
self.label.setText(QtWidgets.QApplication.translate("Dialog", "Введите город, чтобы узнать погоду:", None, -1))
self.pushButton.setText(QtWidgets.QApplication.translate("Dialog", "Узнать погоду", None, -1))
if __name__ == "__main__":
import sys
app = QtWidgets.QApplication(sys.argv)
Dialog = QtWidgets.QDialog()
ui = Ui_Dialog()
ui.setupUi(Dialog)
Dialog.show()
sys.exit(app.exec_())
После того, как программы объединены нужно преобразовать все
это в .exe файл. Знаю, что с помощью pyinstaller делаются .exe файлы, но что именно из этих трёх преобразовывать в данное расширение?
A:
Ваше основное окно приложения выглядит так:
mintro.py
#from PySide2 import QtCore, QtGui, QtWidgets
from PyQt5 import QtCore, QtGui, QtWidgets
from my_bincalc import Bincalc # из my_bincalc.py
#from my_weathshow import Weathshow # из my_weathshow.py
class Ui_Dialog(object):
def setupUi(self, Dialog):
Dialog.setObjectName("Dialog")
Dialog.resize(371, 300)
Dialog.setStyleSheet("background-color:#8430b8;")
self.pushButton = QtWidgets.QPushButton(Dialog)
self.pushButton.setGeometry(QtCore.QRect(30, 160, 311, 51))
self.pushButton.setStyleSheet("color:#d7e535;\n"
"font: 14pt \"Onyx\";\n"
"background-color:#494f8a;")
self.pushButton.setObjectName("pushButton")
self.pushButton_2 = QtWidgets.QPushButton(Dialog)
self.pushButton_2.setGeometry(QtCore.QRect(30, 220, 311, 51))
self.pushButton_2.setStyleSheet("color:#e01414;\n"
"font: 14pt \"Onyx\";\n"
"background-color:#dff022;")
self.pushButton_2.setObjectName("pushButton_2")
self.label = QtWidgets.QLabel(Dialog)
self.label.setGeometry(QtCore.QRect(0, 30, 371, 51))
self.label.setStyleSheet("color:#22f70f;\n"
"font: 8pt \"Playbill\";\n"
"border:none;\n"
"")
self.label.setObjectName("label")
self.label_2 = QtWidgets.QLabel(Dialog)
self.label_2.setGeometry(QtCore.QRect(30, 70, 321, 81))
self.label_2.setStyleSheet("font: 11pt \"MV Boli\";\n"
"")
self.label_2.setObjectName("label_2")
self.retranslateUi(Dialog)
QtCore.QMetaObject.connectSlotsByName(Dialog)
def retranslateUi(self, Dialog):
Dialog.setWindowTitle(QtWidgets.QApplication.translate("Dialog", "Dialog", None, -1))
self.pushButton.setText(QtWidgets.QApplication.translate("Dialog", "Бинарный калькулятор", None, -1))
self.pushButton_2.setText(QtWidgets.QApplication.translate("Dialog", "Узнать погоду в городе", None, -1))
self.label.setText(QtWidgets.QApplication.translate("Dialog", "<html><head/><body><p align=\"center\"><span style=\" font-size:36pt; color:#ff0000;\">SWISS </span><span style=\" font-size:36pt; color:#ffffff;\">KNIFE </span><span style=\" font-size:12pt;\">v 1.0</span></p><p><span style=\" font-size:36pt;\"><br/></span></p><p align=\"center\"><span style=\" font-size:36pt;\"><br/></span></p></body></html>", None, -1))
self.label_2.setText(QtWidgets.QApplication.translate("Dialog", "Выберите одну из предложенных функций:", None, -1))
class Dialog(QtWidgets.QDialog, Ui_Dialog):
def __init__(self, parent=None):
super(Dialog, self).__init__(parent)
self.setupUi(self)
self.pushButton.clicked.connect(self.bincalc)
self.pushButton_2.clicked.connect(self.weathshow)
def bincalc(self): # бинарный калькулятоp
print('bincalc')
self.bincalc = Bincalc() # бинарный калькулятоp
self.bincalc.show()
def weathshow(self): # прогноз погоды
print('weathshow')
#self.weathshow = Weathshow()
#self.weathshow.show()
if __name__ == "__main__":
import sys
app = QtWidgets.QApplication(sys.argv)
# Dialog = QtWidgets.QDialog()
# ui = Ui_Dialog()
# ui.setupUi(Dialog)
# Dialog.show()
w = Dialog()
w.show()
sys.exit(app.exec_())
ваш модуль, который содержит бинарный калькулятор выглядит так:
my_bincalc.py
#from PySide2 import QtCore, QtGui, QtWidgets
from PyQt5 import QtCore, QtGui, QtWidgets
#from binar import Ui_Dialog
class Ui_Dialog(object):
def setupUi(self, Dialog):
Dialog.setObjectName("Dialog")
Dialog.resize(452, 360)
Dialog.setStyleSheet("background-color:#e6fad2;\n"
"")
self.lineEdit = QtWidgets.QLineEdit(Dialog)
self.lineEdit.setGeometry(QtCore.QRect(10, 70, 381, 31))
self.lineEdit.setStyleSheet("color:#1db823;\n"
"font: 10pt \"Tw Cen MT Condensed Extra Bold\";\n"
"background-color:#0a2c40;\n"
"border:none;")
self.lineEdit.setObjectName("lineEdit")
self.pushButton = QtWidgets.QPushButton(Dialog)
self.pushButton.setGeometry(QtCore.QRect(10, 130, 111, 31))
self.pushButton.setStyleSheet("\n"
"QPushButton {\n"
"\n"
" color:#f1f52a;\n"
" font: 8pt \"MS Serif\";\n"
" font: 11pt \"MS Shell Dlg 2\";\n"
" background-color:#822af5;\n"
" border:none;\n"
"}\n"
"\n"
"QPushButton:hover {\n"
" background-color:silver;\n"
"}\n"
"\n"
"QPushButton:pressed {\n"
" background-color:red;\n"
"}\n"
"\n"
"\n"
"")
self.pushButton.setObjectName("pushButton")
self.lineEdit_2 = QtWidgets.QLineEdit(Dialog)
self.lineEdit_2.setGeometry(QtCore.QRect(10, 240, 381, 31))
self.lineEdit_2.setStyleSheet("color:#1db823;\n"
"font: 10pt \"Tw Cen MT Condensed Extra Bold\";\n"
"background-color:#0a2c40;\n"
"border:none;")
self.lineEdit_2.setObjectName("lineEdit_2")
self.pushButton_2 = QtWidgets.QPushButton(Dialog)
self.pushButton_2.setGeometry(QtCore.QRect(10, 300, 111, 31))
self.pushButton_2.setStyleSheet("\n"
"QPushButton {\n"
"\n"
" color:#f1f52a;\n"
" font: 8pt \"MS Serif\";\n"
" font: 11pt \"MS Shell Dlg 2\";\n"
" background-color:#822af5;\n"
" border:none;\n"
"}\n"
"\n"
"QPushButton:hover {\n"
" background-color:silver;\n"
"}\n"
"\n"
"QPushButton:pressed {\n"
" background-color:red;\n"
"}\n"
"\n"
"")
self.pushButton_2.setObjectName("pushButton_2")
self.label = QtWidgets.QLabel(Dialog)
self.label.setGeometry(QtCore.QRect(20, 20, 401, 31))
self.label.setStyleSheet("font: 9pt \"MV Boli\";")
self.label.setObjectName("label")
self.label_2 = QtWidgets.QLabel(Dialog)
self.label_2.setGeometry(QtCore.QRect(20, 190, 411, 31))
self.label_2.setStyleSheet("font: 9pt \"MV Boli\";")
self.label_2.setObjectName("label_2")
self.label_3 = QtWidgets.QLabel(Dialog)
self.label_3.setGeometry(QtCore.QRect(156, 282, 291, 61))
self.label_3.setText("")
self.label_3.setObjectName("label_3")
self.label_4 = QtWidgets.QLabel(Dialog)
self.label_4.setGeometry(QtCore.QRect(156, 112, 291, 61))
self.label_4.setText("")
self.label_4.setObjectName("label_4")
self.retranslateUi(Dialog)
QtCore.QMetaObject.connectSlotsByName(Dialog)
def retranslateUi(self, Dialog):
Dialog.setWindowTitle(QtWidgets.QApplication.translate("Dialog", "Dialog", None, -1))
self.pushButton.setText(QtWidgets.QApplication.translate("Dialog", "Преобразовать", None, -1))
self.pushButton_2.setText(QtWidgets.QApplication.translate("Dialog", "Преобразовать2", None, -1))
self.label.setText(QtWidgets.QApplication.translate("Dialog", " Перевести из десятичной системы исчисления в двоичную:", None, -1))
self.label_2.setText(QtWidgets.QApplication.translate("Dialog", " Перевести из двоичной системы исчисления в десятичную:", None, -1))
class Bincalc(QtWidgets.QDialog, Ui_Dialog):
def __init__(self, parent=None):
super(Bincalc, self).__init__(parent)
self.setupUi(self)
self.pushButton.clicked.connect(self.binarik)
self.pushButton_2.clicked.connect(self.binarik_2)
def binarik(self):
num = int(self.lineEdit.text())
newNum = ''
while num > 0:
newNum = str(num % 2) + newNum
num //= 2
self.label_4.setText(newNum)
def binarik_2(self):
a = self.lineEdit_2.text()
def underdef(digit):
length = len(digit)
helpdig = 0
for i in range(0, int(length)):
helpdig = helpdig + int(digit[i]) * (2**(int(length) - i - 1))
return helpdig
self.label_3.setText(str(underdef(a)))
if __name__ == "__main__":
import sys
app = QtWidgets.QApplication(sys.argv)
w = Bincalc()
w.show()
sys.exit(app.exec_())
Чтобы собрать .exe файл выполните:
pyinstaller -F -w mintro.py
Все запускайте mintro.exe
| {
"pile_set_name": "StackExchange"
} |
As is known in the art, medical image analysis plays an increasingly prominent role in Computer Aided Diagnosis (CAD) and therapy planning. As a preliminary stage of the analysis, segmentation of structures from medical images and reconstruction of these structures are difficult due to the large volume of the data involved and the complexity of the anatomic shapes of interest.
Three-dimensional (3D) visualization and labeling of rib structures, for example, in a CAD system provide important information for radiologists since they need to report any pathology pertaining to bones in a chest CT scan. The ribs have valuable properties common to bone tissues, i.e., they are rigid and stable in shape, and map to prominent intensities in CT data. Further, rib structures are highly ordered and symmetrical. Because of these features, rib feature group can be used for reliable registration and reference. To make full use of the structural advantages of the ribs, they should be extracted and labeled individually. There are 12 pairs of rib structures in a human body with 8-11 pairs visible in a chest CT volume dataset. They are connected at one end with the spine, and the upper pairs are also connected to the sternum.
Since 1970s, there have been many methods to detect and label ribs automatically in 2D chest radiographs, see an article by M. Park, J. S. Jin, and L. S. Wilson, entitled “Detection and Labeling ribs on expiration chest radiographs”, Proceedings of SPIE Vol. 5030 (2003), pp. 1021-1031; an article by F. Vogelsang, F. Weiler, J. Dahmen, M. Kilbinger, B. Wein and R. Gunther, entitled “Detection and compensation of rib structures in chest radiographs for diagnose assistance”, Proceedings of SPIE, vol. 3338, p. 774-785, 1998; and an article by De. Souza P, entitled “Automatic rib detection in chest radiographs”, Computer Vision Graphics and Image Processing. Vol. 23, no. 2, pp. 129-61, August 1983.
D. Kim, H. Kim and H. S. Kang, in a paper entitled “An object-tracking segmentation method: Vertebra and Rib segmentation in CT images”, Proceedings of SPIE Vol. 4684 (2002), pp. 1662-1671 proposed an object-tracking segmentation method to segment vertebra and ribs from 3D, CT images. But their goal was to remove vertebra and ribs for better visualization of some interested organs. Therefore, the focus of their method is to detect and prevent a leakage from propagation. The vertebra and ribs are removed as a whole.
M. Park, J. S. Jin, and L. S. Wilson, in a paper entitled “Detection and Labeling ribs on expiration chest radiographs”, Proceedings of SPIE Vol. 5030 (2003), pp. 1021-1031. The paper describes an attempt to make rib edges clear by producing an expiration lung field using a hemi-elliptical cavity. Based on the expiration lung field, the paper describes extracting the rib edges using canny edge detector and a connectivity method, referred to as “4 way with 10-neighbors connectivity”, to detect clavicle and rib edge candidates. Once the edge candidates are formed, the process selects the “best candidates” using knowledge-based constraints such as a gradient, length and location. The edges are paired and labeled as superior rib edge and inferior rib edge. Then the system uses the clavicle, which is obtained in a same method for the rib edge detection, as a landmark to label all detected ribs. This method is, however, for a two-dimensional (2D) chest x-ray system as distinguished from a 3D CT scanning system.
Efforts have also been spent on eliminating the ribs and other connected bone structures from the data by region-based approaches, see for example, a paper by G. Bohm, C. J. Knoll, M. L. Alcaniz-Raya, and S. E. Albalat, entitled “Three-dimensional segmentation of bone structures in CT images”, Proceedings of Medical Imaging on Image Processing, pp 277-286, 1999. Although the intensity of rib bone is much higher than the surrounding tissues, the region growing method discussed therein may not provide satisfying results in many cases because: 1) It is very difficult to determine the intensity threshold for the region growing method due to the fact that rib bones in different CT data have different intensity ranges and an adaptive threshold method does not work because of the complexity of the local surrounding structures. 2) The lowest bone intensity and the highest tissue intensity levels are quite close. With noise and partial volume effect, there is no clear-cut intensity threshold between bone and other tissues. 3) The region growing method cannot control its growing path and therefore results in leakage. 4) The intensity range of trabecular bones (interior layer of a rib) is much lower than that of cortical bones (exterior layer) which results in hollowness inside each rib. Also, the intensity of this dark region is non-uniform. Aside from the fact that all ribs and vertebras are connected as one piece, the bones are over-segmented, with many holes in each rib. The surfaces are also far from smooth. These are due to the non-uniform internal intensities of the bone. In short, the above work is only remotely associated with this application. The goal of this application is to individually and precisely segment the rib structures, not roughly removing all the bones as one piece. | {
"pile_set_name": "USPTO Backgrounds"
} |
Self-generated identification codes in longitudinal prevention research with adolescents: a pilot study of matched and unmatched subjects.
Self-generated identification codes (SGICs) are an increasingly utilized methodological feature of longitudinal prevention research among adolescents. This study sought to test the differences between the matched and unmatched groups at baseline on a number of background, health, and well-being and risk behavior measures in a prevention study among 13- to 16-year-old Icelandic adolescents where a SGIC was constructed and used to link individual-level respondent data over two data collection points one year apart. We use pilot data from two Reykjavik city secondary schools collected as part of the population study Youth in Iceland in February 2010 and 2011 (N = 366, SGIC matching rate 61%). Baseline results for the matched and unmatched participants are compared. Findings indicate that the unmatched subjects are both more likely to be substance users than their matched counterparts as well as being more likely to be boys and/or from disrupted families. Five out of the seven scaled measures for risk and protective factors and personality indicators reveal no difference between the matched and unmatched subjects and the significantly different measures reveal small effect sizes between the two groups. However, the effect sizes for substance use are significantly different between the matched and unmatched groups for all seven substance use measures with effect sizes from 0.52 to 1.32. These findings therefore indicate that the measurement validity of adolescent risk behaviors such as substance use may be put in jeopardy when using SGIC and that unmatched subjects may be more likely to distrust the SGIC process. | {
"pile_set_name": "PubMed Abstracts"
} |
[unreadable] The specific aim of this application is to help the UPR for repair, renovation, and modernization of its unique animal research resource (ARC) at the CS facility of the CPRC. The CPRC is an unrivaled national and international research resource for comparative studies in the biomedical and behavioral sciences that has received NCRR funding through a P40 award or the equivalent for the past three decades. The proposed renovations will improve the care of research animals and will provide much needed infrastructure support for the ongoing and planned biomedical and behavioral research program at CS. The free-ranging population of rhesus monkeys (Macaca mulatta) on the island of CS provides scientists with an unparalleled opportunity for performing biomedical and behavioral research projects utilizing primates residing in a semi-natural habitat. This population has the most extensive computerized demographic and genetics database available to researchers anywhere in the world. The population management program for CS has been designed to optimize the health and well-being of the monkeys, to enhance the value of the colony for research. In addition, the goal is to provide healthy animals to the scientific community for biomedical research, including AIDS and SlV pathogenesis and vaccine development as well as the support of National defense programs. Many of the existing structures on CS island were constructed in the 1930s and 1940s and are in dire need of renovation. This application seeks funds to renovate the dock to the island and funds to repair the roads, drinking water purification system and the three feeding and trapping corrals on CS. Renovations and modernization of these facilities are essential in order to prevent the continued deterioration of the infrastructure on CS, to maintain and enhance animal health and well being, to retain AAALAC accreditation, to comply with federal regulations and guidelines, and to continue to promote the research program and resources of the UPR. [unreadable] [unreadable] | {
"pile_set_name": "NIH ExPorter"
} |
Welcome to Talent Magnet
Thank you for listing yourself on our system. We have a strategy to build a select group of freelancers who we place with specific agencies as the opportunity arises. we are different in that we negotiate with specific agencies, offering them your skill set and engage them to use your services. We believe that when you succeed we also do. Every creative agency you work at will have an opportunity to rate you as you will have to rate them. This rating will ensure that you get properly recognized for the great quality of work you present.
We believe a CV and Portfolio’s are important, but we place a great deal of value on the trust and recommendation of people you have previously worked with. This may mean that one great recommendation by an Agency could go a lot further than an applicant with a sterling CV. This means that once you in our system and work for one of our partners, chances are that you become a more hire able individual. | {
"pile_set_name": "Pile-CC"
} |
Grand Tetons National Park
Just south of Yellowstone is Grand Teton National Park, where the spectacular Teton Mountains jut abruptly from the valley floor with no gentle foothills. The Tetons are geologically young nine-million-year-old mountain range. Seven of the peaks exceed 3,600 metres, the highest Grand Teton is the state’s second highest peak at 4,197 metres.
These classic triangular peaks which stretch for fifty miles between Yellowstone and Jackson as every bit as dramatic as those of Yellowstone. A string of lakes are set at the foot of the mountains; beyond them lies the broad, sage bush covered Jackson Hole, broken by the winding Snake River. No road crosses the Tetons but routes that run along the eastern flanks offer stunning views at every turn.
Call Bon Voyage to discuss your holiday plans around Yellowstone National Park and the Grand Tetons. There is so much incredible scenery here, we’d hate you to miss out! | {
"pile_set_name": "Pile-CC"
} |
Hundreds of cars towed overnight
December 1, 2009 3:18:49 PM PST
December 1, 2009 (CHICAGO) --
It happens every year- but still many Chicago motorists are caught off guard when winter parking restrictions go in effect.Snow or no snow, overnight parking is banned on certain city streets after December 1so it was a busy morning for tow trucks around the city. More than 200 cars were ticketed and taken to city lots Tuesday morning.
Between 3 a.m. and 7 a.m. from December 1 to April 1, the city enforces parking restrictions on several main streets, regardless of snow. Ignoring the signs, which are posted year-round, can add up:
$50 parking ticket
$150 for towing
and a $10 daily storage fee
"Help us. We need somebody to help us against bullies like this right here," said Lora Roberson, car owner.
"It was either stolen or towed. Called 311 and got it taken care of," said Christian Walker, car owner.
According to a release from Department of Streets and Sanitation, 234 cars were towed.
"We saw a lot more vehicles that we could have towed but we ran out at 7a.m. of time because we don't tow past 7 and we have to come back the next day at 3 a.m. And the irony is a lot of signs for violations of the overnight parking and a lot of the cars were right under the signs," said Matt Smith, streets & sanitation spokesman.
The restriction is meant to speed the plowing of the streets in the event of an overnight storm. Enforcement of the routes will continue until April 1, 2010.
"People should know this is the one ban we're very serious about enforcing, more than any others because it protects 107 miles of the most critical, arterial streets of the city and without those, the city could shut down," said Smith.
One man, who asked not to be indentified, ran outside half-dressed to plead with the tow truck driver early Tuesday morning.
"They're heartless," said the man, "They're paid from the city, and I even told him, I'm like, 'Listen, I'm not doing very good in this economy, please have the decency, you know, as a citizen.' "
Car owners should also get ready to observe parking restrictions when there is more than 2 inches of snow.
"Last winter when the streets were icy and snowy, they couldn't clean the streets but yet the first chance they get, they'll tow our cars at $160 a pop," said Rob Stein, car owner.
"Makes you want to move out of the city. It doesn't make it easier for us to live in Chicago at all," said Melissa Alvarez, car owner.
Tow trucks will be out again Wednesday morning.
"You might see the overnight parking ban and a 2-inch ban sign in the same general area. The best thing to do is observe both of them because we'll be enforcing both of them," said Smith.
"I just spent $1,100 to get my car fixed and it wasn't like that last night. Look at that big dent they put on my car," said Michael Chapman, car owner.
If a car is damaged during the towing process, Smith said the owner should put in a claim immediately with the towing company. Last year the city had more than 140,000 cars towed and 1,100 claims were filed. | {
"pile_set_name": "Pile-CC"
} |
Field of the Invention
The invention relates to a magneto-resistive random access memory (MRAM) configuration containing at least two memory cell arrays. In each of the memory cell arrays, memory cells are provided at the crossovers between word lines and bit lines, at least one line type containing the word lines and bit lines is provided with line driver circuits.
As is known, the memory effect of MRAMs is based on a variable resistance of the individual memory cells of the memory. A MRAM memory cell is situated at the crossover point of two lines, namely in particular between a word line and a bit line. The memory cell itself contains two magnetic layers isolated from one another by a thin dielectric layer.
The value of the electrical resistance of such an MRAM memory cell depends, then, on the polarization of the magnetic layers. If both layers are polarized in the same direction, a low value resistance is present in the memory cell, whereas a high value resistance of the electrical resistance is obtained in the event of mutually opposite polarization of the two magnetic layers. In other words, depending on the polarization of the magnetic layers, a high (↑) or low (↓) resistance results for the memory cell containing the two magnetic layers and the intervening dielectric layer.
Of the magnetic layers, one layer is composed of a soft-magnetic material, whereas the other layer is produced from a hard-magnetic material. The soft-magnetic material is chosen such that its polarization can be reversed by a writing current on the word line and the bit line while such polarization reversal by the writing currents is not intended to be possible in the case of the hard-magnetic material.
In order, then, that the magnetic layer made of soft-magnetic material can be polarized in two opposite directions, it is necessary that at least one of two programming currents through the bit line or through the word line can flow in both directions through the respective line. For only then can it be ensured at the crossover point between the word line and the bit line that, given correspondingly directed programming currents at the crossover point, the magnetic field for polarization reversal in the magnetic layer made of the soft-magnetic material is strong enough for the polarization reversal.
The currents which flow through the memory cell are tunneling currents through the thin dielectric layer, so that a xe2x80x9cmagnetic tunnel junctionxe2x80x9d or xe2x80x9ctunnel junctionxe2x80x9d is present, which is why the MRAM memory cell is also referred to as a magnetic tunnel junction (MTJ) memory cell.
In the MRAM configuration, high parasitic currents occur on a selected word line or bit line, the currents ultimately being brought about by the numerous crossover points between a selected word line, for example, and the bit lines that cross it. On account of these high parasitic currents, therefore, a large MRAM configuration can only be constructed from a plurality of smaller memory cell arrays. Therefore, however, that, for each memory cell array containing, for example, m word lines and n bit lines, a total of 2m+n or 2n+m line driver circuits are required. For the MPAM configuration in its entirety, containing 1 memory cell arrays for example, 1(2m+n) or 1(2n+m) line driver circuits are then required. For the line driver circuits, however, a large area is required on a chip containing the MRAM configuration, which is extremely undesirable.
It is accordingly an object of the invention to provide a MRAM configuration which overcomes the above-mentioned disadvantages of the prior art devices of this general type, in which the area requirement for the line driver circuits is reduced by effective assignment of the latter, thereby obtaining a space-saving architecture.
With the foregoing and other objects in view there is provided, in accordance with the invention, a magneto-resistive random access memory (MRAM) configuration. The MRAM configuration contains at least two memory cell arrays. Each of the memory cell arrays has word lines, bit lines crossing the word lines, and memory cells disposed at crossover points between the word lines and the bit lines. Connecting nodes are provided, and one of the connecting nodes is disposed between and connecting each of the memory cell arrays to each other. Line driver circuits are connected to at least one of the word lines and the bit lines. The line driver circuits are respectively connected to the connecting nodes between the memory cell arrays. Switching transistors are provided. One of the switching transistors is disposed between one of the memory cell arrays and one of the connecting nodes so that the line driver circuits are respectively assigned to different ones of the memory cell arrays.
In the case of the MRAM configuration of the type mentioned in the introduction, the object is achieved according to the invention by virtue of the fact that the line driver circuits are respectively connected to connecting nodes between two memory cell arrays and a respective switching transistor is present between the connecting node and the two memory cell arrays.
In principle, the configuration of the MRAM configuration effects a departure from an obvious solution to the above problems which is based on respectively placing a current source or current sink at each end of a memory cell array. Rather, in the MRAM configuration according to the invention, the line driver circuits are disposed in such a way that they can be assigned to different memory cell arrays, which results in that the line driver circuits required in total are approximately halved compared with the prior art. Equally, it is possible to reduce the outlay for the current sources in the line driver circuits since a current source is allocated to two memory cell arrays in the present invention.
A development of the invention provides for the connecting node between two memory cell arrays to be connected to ground potential via an element having an adjustable voltage drop. As a result, a writing current, having traversed a memory cell array, readily passes to the ground potential via the output side connecting node of the memory cell array and the element having an adjustable voltage drop. By way of example, the adjustable voltage drop can be produced by a variable resistor, a variable transistor diode or an adjustable voltage source. The resulting adjustable voltage ensures that parasitic currents through the memory cells connected to the selective word or bit line can be minimized.
A respective series circuit containing a current source and a writing driver transistor is advantageously used for the line driver circuits. In this manner, the current source is assigned to two of the memory arrays. By way of example, an n-channel MOS field-effect transistor may be chosen for the writing driver transistor, and, moreover, this also applies to the switching transistor and the transistor diode.
Other features which are considered as characteristic for the invention are set forth in the appended claims.
Although the invention is illustrated and described herein as embodied in a MRAM configuration, it is nevertheless not intended to be limited to the details shown, since various modifications and structural changes may be made therein without departing from the spirit of the invention and within the scope and range of equivalents of the claims.
The construction and method of operation of the invention, however, together with additional objects and advantages thereof will be best understood from the following description of specific embodiments when read in connection with the accompanying drawings. | {
"pile_set_name": "USPTO Backgrounds"
} |
Police ID man killed during Beaumont store robbery
Duayne Deandre-Devon Smith, 25, of Port Arthur. Photo: BPD Duayne Deandre-Devon Smith, 25, of Port Arthur. Photo: BPD Image 1 of / 1 Caption Close Police ID man killed during Beaumont store robbery 1 / 1 Back to Gallery
Beaumont police have identified the suspected robber killed in a Tuesday night shooting.
Duayne Deandre-Devon Smith, 25, of Port Arthur, was killed when a business owner opened fire on three people accused of trying to rob a game room in the 3600 block of East Lucas Drive. around 9 p.m. Tuesday.
The store owner had a firearm inside the business and was able to grab it during the robbery, according to Beaumont police.
The store owner wasn't hurt in the exchange of gun fire.
Two other suspects fled the scene, and Beaumont Police Sgt. Rob Flores said authorities are reviewing surveillance footage that might have captured the incident.
The two other suspects were last seen running east from the business towards the 5800 block of Helbig, according to police.
Anyone with information about this crime is asked to call Crime Stoppers anonymously at (409) 833-TIPS. | {
"pile_set_name": "OpenWebText2"
} |
INTRODUCTION {#SEC1}
============
Next-generation sequencing (NGS) and microarray technologies uncovered thousands of long non-coding RNAs (lncRNAs) encoded in the human genome ([@B1],[@B2]). The majority of those lncRNAs are transcribed and processed in a similar manner to mRNAs, however, lack protein-coding potential ([@B3],[@B4]). Although it is still unclear how many of those lncRNAs have a significant biological function, some of them have been found to be crucial players in the regulation of cellular processes such as proliferation, differentiation or development, as well as in a progression of a variety of human diseases including cancer ([@B5]). It has been shown that lncRNAs are key determinants of epigenetic regulation, modulation of chromatin structure, scaffolding or decoy function of mRNAs and post-transcriptional mRNA regulation ([@B11]).Gene regulation by lncRNAs can be a result of cis-action on nearby genes, or in trans by modulating mRNA stability, mRNA translation, or microRNA and RNA-binding-protein function ([@B16]).
Cellular senescence was initially defined by Hayflick in 1965 as the limited lifespan of primary human fibroblasts in culture ([@B24]). It is a state of irreversible growth arrest which can be induced by different stimuli such as telomere shortening, DNA damage, oxidative stress or oncogene activation ([@B25]). Serrano *et al.*, were the first to observe that primary human and mouse fibroblasts enter senescence following the induction of oncogenic RAS, a process termed oncogene-induced senescence (OIS) ([@B26]). Cellular senescence has been studied most extensively as a strong tumor-suppressive mechanism against the emergence of oncogenes ([@B27]). Moreover, there is evidence indicating for a role of senescence in age-related conditions and diseases, including cancer, cardiovascular diseases, neurodegeneration, diabetes, sarcopenia and declining immune function in the elderly ([@B28]). In contrast, senescent cells can also contribute to tumorigenesis by secreting interleukins (e.g. IL-6, IL-8 and IL-1a), metalloproteases (e.g. MMP-1 and MMP-3) and other cytokines (e.g. granulocyte-macrophage colony-stimulating factor (GM-CSF)), as part of the senescence-associated secretory phenotype ([@B25],[@B30],[@B33]). Therefore, senescence may either suppress or promote tumor progression depending on the context where it occurs ([@B38],[@B39]). Given the impact of senescence on human physiology and pathology, it is of interest to understand the molecular mechanisms underlying senescence in order to utilize it for diagnosis and therapy.
A number of factors have been implicated in regulating senescence, including transcription factors, RNA binding proteins and microRNAs, such as p53, Ets ([@B40]), HuR ([@B41]), AUF1 ([@B42]) and TTP ([@B43]), and miR-377 ([@B44]), miR-22 ([@B45]). In contrast, despite increasing interest in the expression and function of lncRNAs, their possible implication in senescence remains largely unexplored. Recent works indicated a role of MIR31HG and SALNR in senescence ([@B46],[@B47]), but a focused functional genetic screen was not described before. We therefore sought to identify senescence-associated lncRNAs using our established cellular system that induces senescence in primary human BJ fibroblasts ([@B48]). Using transcriptomic profiling we identified a number of differentially expressed lncRNAs following oncogene induction. Next, using functional screen, we discovered that one of the lncRNAs whose expression was induced upon oncogenic stress---lncRNA-OIS1---is required for OIS. We demonstrate that lncRNA-OIS1 is required for senescence by controlling a nearby DPP4 gene with a tumor suppressive activity. Collectively, our results provide a new lncRNA-mediated regulatory pathway for controlling DPP4 during OIS. Our findings support the role of lncRNAs as transcriptional regulators in critical processes such as cellular senescence and a potential role in cancer.
MATERIALS AND METHODS {#SEC2}
=====================
Cell culture, transfection, retroviral and lentiviral transduction {#SEC2-1}
------------------------------------------------------------------
BJ/ET/Ras^V12^, TIG3/ET/RAS^V12^, Ecopack 2 and HEK293-T cells were cultured in Dulbecco's modified Eagle's medium (Gibco), supplemented with 10% fetal calf serum (FCS) (Hyclone) and 1% penicillin/streptomycin (Gibco). Senescence was induced by treatment with 100 nM 4-OHT (Sigma) for 14 days. Retroviruses were made by calcium phosphate transfection of Ecopack 2 cells and harvest at 40 and 64 h later. Lentiviruses were made by polyethylenimine (PEI) transfection of HEK293T. Medium was refreshed after 16 h and collect the lentivirus by filtering through a 0.45 μm membrane (Milipore Steriflip HV/PVDF) 40 h post-transfection and stored at −80°C. Cells were selected with the proper selection medium 48 h after transduction for at least 4 days until no surviving cells remained in the no-transduction control plate.
RNA-seq and analysis {#SEC2-2}
--------------------
RNA-seq samples were processed with TruSeq RNA library prep kit v2 (Illumina) and sequenced in a HiSeq 2500 (Illumina). Sequenced reads were aligned to the human genome (hg19) using TopHat2 ([@B49]) and gene expression levels were counted using HTseq ([@B50]) and normalized using quantile normalization. To avoid inflation of lowly expressed genes among the genes called as differentially expressed, we applied a dynamic cut-off which takes into account that technical variation varies with expression level. Specifically, in the comparison between two conditions, we divided the genes into 20 bins according to their average expression level, and calculated the standard deviation (SD) of fold-change within each bin. Genes whose expression was changed by at least 1.75-fold and this fold-change was above the bin's 1.75 SD (dashed curve in Figures [1B](#F1){ref-type="fig"} and [3B](#F3){ref-type="fig"}) were called as differentially expressed. To further avoid false positive calls among lowly expressed genes we set a floor level of five counts (i.e. any level below five was set to five). Functional enrichment analysis was done using DAVID ([@B51]). Global characterization of pathways that were deregulated upon knockdown of lncRNA-OIS1 was done using gene set enrichment analysis (GSEA) ([@B52]).
![shRNAs screen identifies a lncRNA required for OIS. (**A**) A screening strategy of detecting functional lncRNAs. (**B**) RNA-seq comprehensively identified differentially expressed transcripts (mRNAs and lncRNAs) in senescent cells (treated with 4-OHT for 14 days) compared to untreated cells. (**C**) Ribosome profiling confirmed that the identified OIS lncRNAs have no protein coding capacity. Shown are selected examples and GAPDH as control. (**D**) The functional genetic screen procedure. NGS, next-generation sequencing. (**E**) Enrichment score calculated for each shRNA vector based on its prevalence in the pool, harvested after 4 weeks of tamoxifen (4-OHT) treatment (RAS^v12^ induction), relative to its prevalence in the T0 pool. The plot shows the distribution of standardized enrichment scores (*Z*-scores) for the entire shRNA library.](gky087fig1){#F1}
*In situ* hybridization {#SEC2-3}
-----------------------
*In situ* hybridization (ISH) was performed using double-FAM labeled locked nucleic acid (LNA) probes (Exiqon) as described previously ([@B53]). Briefly, cells were fixed, permeabilized and pre-hybridized in hybridization buffer and then hybridized at 55°C for 1 h with LNA probes for lncRNA-OIS1: 5-TTGAAAACCCATCACTCCT-3, or with a scramble probe 5-TGTAACACGTCTATACGCCCA-3 as negative control, all at 25 nM. Cells were subsequently incubated with 3% hydrogen peroxide to block potential endogenous peroxidase, and then probes were detected with peroxidase-conjugated anti-fluorescein-Ab (Roche applied Sciences) diluted 1:400 followed by addition of Cy3-labeled TSA substrate for 10 min (Perkin Elmer). All cells were mounted with ProLong^®^GoldAntifade Mountant containing DAPI nuclear stain (ThermoFisher Scientific). Images were acquired using a Zeiss Axio Imager Z1 epi-fluorescence microscope equipped with an AxioCamMRm CCD camera and a Plan-APOCHROMAT 63×/1.4 objective (Zeiss). Within the same experiment, images were acquired at the same exposure conditions.
BrdU proliferation assay {#SEC2-4}
------------------------
BJ and TIG3 Cells were pulsed for 3 h with 30 μM bromodeoxyuridine (BrdU, Sigma), washed two times with phosphate-buffered saline (PBS) and then fixed with 4% formaldehyde, wash two times with PBS and treated with 5M HCl/0.5% Triton to denature DNA and neutralized with 0.1M Na~2~B~4~O~7~, incubated with anti-BrdU (Dako) for 2 h in RT after 30 min blocking with 3% bovine serum albumin (BSA) in 0.5% Tween PBS, washed in blocking buffer (PBS, Tween 0.5%, 3% BSA) three times, and finally incubated with FITC-conjugated anti-mouse Alexa FLOUR 488 secondary antibody (Dako) for 1 h, washed three times, stained with propidium iodide for 30 min. BrdU incorporation was measured by immunofluorescence (at least 300 cells were scored for each condition).
Senescence-associated β-galactosidase (SA-β-Gal) assay {#SEC2-5}
------------------------------------------------------
BJ and TIG3 cells were transduced with different shRNAs constructs, plated in triplicate and treated with 100 nM 4-OHT for 14 days. β-galactosidase activity was determined by using the kit (Cell Signaling), and at least 300 cells were analyzed for each condition.
Ribosome profiling (Ribo-seq) {#SEC2-6}
-----------------------------
BJ Cells were treated with cycloheximide (100 μg/ml) for 5 min, and lysed 20 mM Tris--HCl, pH 7.8, 100 mM KCl, 10 mM MgCl~2~, 1% Triton X-100, 2 mM dithiothreitol (DTT), 100 μg/ml cycloheximide, 1× complete protease inhibitor. Lysates were centrifuged at 1300 *g* and the supernatant was treated with 2 U/μl of RNase I (Invitrogen) for 45 min at room temperature. Lysates were fractionated on a linear sucrose gradient (7--47%) using the SW-41Ti rotor at 36 000 rpm for 2 h. Fractions enriched in monosomes were pooled and treated with proteinase K (Roche, Mannheim, Germany) in a 1% sodium dodecyl sulphate (SDS) solution. Released RNA fragments were purified using Trizol reagent and precipitated in the presence of glycogen. For libraries preparation, RNA was gel-purified on a denaturing 10% polyacrylamide urea (7 M) gel. A section corresponding to 30--33 nt, the region where most of the ribosome-protected fragments are comprised, was excised, eluted and ethanol precipitated. The resulting fragments were 3′-dephosphorylated using T4 polynucleotide kinase (New England Biolabs Inc. Beverly, MA, USA) for 6 h at 37°C in 2-(N-morpholino) ethanesulfonic acid (MES) buffer (100 mM MES-NaOH, pH 5.5, 10 mM MgCl~2~, 10 mM β-mercaptoethanol, 300 mM NaCl). 3′ adaptor was added with T4 RNA ligase 1 (New England Biolabs Inc. Beverly, MA, USA) for 2.5 h at 37°C. Ligation products were 5′-phosphorylated with T4 polynucleotide kinase for 30 min at 37°C. 5′ adaptor was added with T4 RNA ligase 1 for 18 h at 22°C. The library was sequenced in illumina HiSeq2000 machine. The data were analyzed as described ([@B54]).
GRO-seq {#SEC2-7}
-------
Briefly, 5 × 10^6^ nuclei were isolated and incubated 5 min at 30°C with equal volume of reaction buffer (10 mM Tris--Cl pH 8.0, 5 mM MgCl~2~, 1 mM DTT, 300 mM KCL, 20 units of SUPERase In, 1% sarkosyl, 500 μM adenosine triphosphate (ATP), Guanosine triphosphate (GTP) and Br-Uridine triphosphate (UTP), 0.2 μM CTP+32P Cytidine triphosphate (CTP)) for the nuclear run-on. The reaction was stopped and total RNA was extracted with Trizol LS (Invitrogen) according to the manufacturer's instructions. RNA was fragmented using fragmentation reagents (Ambion) and the reaction was purified through p-30 RNase free spin column (BioRad). BrU-labeled RNA was immunoprecipitated with anti-BrdU agarose beads (Santa Cruz), washed one time in binding buffer, one time in low salt buffer (0.2 × SSPE, 1 mM ethylenediaminetetraacetic acid (EDTA), 0.05% Tween-20), one time high-salt buffer (0.25 × SSPE, 1 mM EDTA, 0.05% Tween-20, 137.5 mM NaCl) and two times in TET buffer (TE with 0.05% Tween-20). RNA was eluted with elution buffer (20 mM DTT, 300 mM NaCl, 5 mM Tris--Cl pH 7.5, 1 mM EDTA and 0.1% SDS) and isolated with Trizol LS. After the binding step, BrU-labeled RNA was treated with tobacco acid pyrophosphatase (Epicenter) to remove 5′-methyl guanosine cap, followed by T4 polynucleotide kinase (PNK; NEB) to remove 3′-phosphate group. BrU-containing RNA was treated with T4 PNK again at high pH in the presence of ATP to add 5′-phosphate group. The reaction was stopped and RNA was extracted with Trizol LS. Sequencing libraries were prepared using TruSeq Small RNA kit (Illumina) following manufacturer's instructions. Briefly, end-repaired RNA was ligated to RNA 3′ and 5′ adapters, followed by RT-PCR amplification. cDNA was purified using Agencourt AMPure XP (Beckman Coulter) and amplified by polymerase chain reaction (PCR) for 12 cycles. Finally, amplicons were cleaned and size-selected using Agencourt AMPure XP (Beckman Coulter), quantified in a Bioanalyzer 2100 (Agilent), and sequenced in a HiSeq 2500 (Illumina). Sequenced reads were aligned to the human genome (hg19) using bowtie2 ([@B55]).
RNA isolation, reverse-transcription and quantitative real-time PCR (qPCR) {#SEC2-8}
--------------------------------------------------------------------------
Total RNA was extracted by using TRIsure (Bioline) reagent and following the manufacturer's protocol. cDNA was produced with SuperScript III (Invitrogen) using 4 μg of total RNA per reaction. qPCR reaction was performed with SYBR green I Master mix in a LightCycler 480 (Roche). Primers used in qPCR are listed in [Supplementary Table S5](#sup1){ref-type="supplementary-material"}.
Western blot analysis {#SEC2-9}
---------------------
Whole-cell lysates were prepared as previously described ([@B56]). Membranes were immunoblotted with the following antibodies: CDKN1A (Sc-397, Santa Cruz; 1: 1000), HRAS (C-20, Santa Cruz; 1: 1000), DPP4 (ab28340, abcam; 1: 2000), GAPDH (Sc-47724, Santa Cruz; 1: 5000). Protein bands were visualized using corresponding secondary antibodies (Dako) and ECL reagent (GE Healthcare).
Chromosome conformation capture combined with sequencing (4C-seq) {#SEC2-10}
-----------------------------------------------------------------
Briefly, BJ cells were treated with or without 4-OHT for 14 days and 10^7^ of cells for each condition were harvested and we performed 4C as previously described ([@B57]). An adapted two-step 4C-PCR was performed as previously described ([@B58]) to introduce template specific indexes. We had two viewpoints and used the following primers in the first PCR:
vp1_forward
AATGATACGGCGACCACCGAGATCTACACTCTTTCCCTACACGACGCTCTTCCGATCTCTTTGCTACTCTGTGAGATC
vp1_reverse
ACTGGAGTTCAGACGTGTGCTCTTCCGATCTATAGGGCTCTGGAGTCAG
vp2_forward
AATGATACGGCGACCACCGAGATCTACACTCTTTCCCTACACGACGCTCTTCCGATCTGTATTTCTCTAGCTGGGATC
vp2_reverse
ACTGGAGTTCAGACGTGTGCTCTTCCGATCAACCGTAAAGTCTTCGCTC
We used the forward primers from the first PCR and combined the following reverse primers for the second PCR:
BJ -- 4-OHT rep1
CAAGCAGAAGACGGCATACGAGAT CGTGAT GTGACTGGAGTTCAGACGTGTGCT
BJ-- 4-OHT rep2
CAAGCAGAAGACGGCATACGAGAT GCCTAA GTGACTGGAGTTCAGACGTGTGCT
BJ + 4-OHT rep1
CAAGCAGAAGACGGCATACGAGAT GGAACT GTGACTGGAGTTCAGACGTGTGCT
BJ + 4-OHT rep2
CAAGCAGAAGACGGCATACGAGAT GCGGAC GTGACTGGAGTTCAGACGTGTGCT
LncRNA-OIS1 expression analysis in tumors {#SEC2-11}
-----------------------------------------
Gene expression data was obtained from the TCGA Data Portal (<https://tcga-data.nci.nih.gov>). We selected those cancer types with transcriptome data available for at least five normal and five tumor samples, belonging to phenotypes 'solid tissue normal' and 'primary solid tumor', respectively. Lowly expressed genes (genes with raw read counts in less than half the normal samples and half the tumor samples) were removed within each cancer type data. Differential expression analysis was carried out with R/Bioconductor package limma ([@B59]) using voom normalization ([@B60]). Pearson correlation calculation was carried out using normalized gene expression values, also in R/Bioconductor.
RESULTS {#SEC3}
=======
Genome-wide identification of lncRNAs responsive to OIS {#SEC3-1}
-------------------------------------------------------
To identify lncRNAs with a role in OIS, we used the model of primary human BJ fibroblasts expressing hTERT and 4-OH-tamoxifen (4-OHT)-inducible oncogenic H-Ras^V12^ (BJ/ET/Ras^V12^ER cells) ([@B48]). RNA sequencing (RNA-seq) in senescent cells and non-senescent control cells revealed senescence-associated differentially expressed transcripts (Figure [1B](#F1){ref-type="fig"}). Of those transcripts, we found 34 and 6 lncRNAs upregulated and downregulated respectively during OIS ([Supplementary Table S1](#sup1){ref-type="supplementary-material"}). Ribosome profiling confirmed the non-coding nature of these RNAs (Figure [1C](#F1){ref-type="fig"}). We also confirmed by qRT-PCR the induction of some lncRNAs following H-Ras^V12^ induction ([Supplementary Figure S1A](#sup1){ref-type="supplementary-material"}).
A focused loss-of-function screen for lncRNAs required for OIS identifies lncRNA-OIS1. {#SEC3-2}
--------------------------------------------------------------------------------------
To examine possible causal roles for lncRNAs in OIS, we developed RNAi tools to target the 40 lncRNAs that were differentially expressed in OIS. We generated a pooled library consisting of five different shRNAs against each lncRNA, and included four non-targeting shRNAs as negative controls, as well as two positive control shRNAs targeting BRD7---a gene identified as a tumor suppressor in OIS ([@B48]) ([Supplementary Table S2](#sup1){ref-type="supplementary-material"}). We transduced cells with three independent retroviral pools of the shRNAs library, and following puro selection harvested half of each cell population as control (T0, Time 0). We cultured the rest of the cells with 4--OHT treatment for 4 weeks, then harvested the cells (T4, Time 4 weeks) and performed NGS to identify shRNAs enriched in the final populations (T4) compared to the initial (T0) pool (Figure [1D](#F1){ref-type="fig"}).
Our screen detected the positive control shRNAs against BRD7, as well as few shRNAs targeting different lncRNAs enriched in the RAS-induced cell populations, suggesting that the knockdown of these lncRNAs conferred a growth advantage in BJ/ ET cells expressing Ras^V12^ (Figure [1E](#F1){ref-type="fig"}). For further validation, we selected two hits: lncRNA\#32, which has one shRNA (shRNA3) at the top of the enrichment list in all three replicates, and another shRNA (shRNA2) giving minor enrichment; and lncRNA\#30 with two shRNAs (shRNA5 and shRNA3) showing consistent enrichment in all three replicates (Figure [1E](#F1){ref-type="fig"} and [Supplementary Table S3](#sup1){ref-type="supplementary-material"}). We validated the hits by repeating the OIS experiment using individual shRNAs. We used an shRNA targeting BRD7 (BRD7_shRNA4) as a positive control, and two non-targeting shRNA as negative controls. A proliferation assay (using BrdU labeling) indicated bypass of oncogene-induced cellular arrest by one shRNA (\#30--5) targeting lncRNA\#30 and two shRNAs (\#32--2 and \#32--3) targeting lncRNA\#32 (Figure [2A](#F2){ref-type="fig"} and [Supplementary Figure S2A](#sup1){ref-type="supplementary-material"}). To further examine the effect of loss-of lncRNA\#30 and \#32 in OIS, we measured the induction of senescence-associated β-galactosidase (SA-β-Gal). In comparison with negative control cells, a marked decrease in SA-β-Gal was observed in Ras^V12^-expressing BRD7-knockdown (BRD7 kd), lncRNA\#30--5 and lncRNA\#32--2 and \#32--3 cells (Figure [2B](#F2){ref-type="fig"} and [Supplementary Figure S2B](#sup1){ref-type="supplementary-material"}). In contrast, shRNA (\#30--3) was not validated as expected from the screen outcome. Interestingly, RNA expression analysis indicated that only shRNAs \#30--5, \#32--2 and \#32--3 were effective toward their lncRNA targets, suggesting on-target activity (Figure [2C](#F2){ref-type="fig"} and [D](#F2){ref-type="fig"}). To exclude off-target effects of the shRNAs, we designed additional vectors targeting lncRNA\#30 and \#32 ([Supplementary Table S6](#sup1){ref-type="supplementary-material"}), and repeated the proliferation and SA-β-Gal assays. This experiment identified more functional shRNAs (\#32--8, \#32--9) targeting lncRNA\#32, but no additional shRNAs targeting lncRNA\#30 (Figure [2E](#F2){ref-type="fig"} and [F](#F2){ref-type="fig"}; [Supplementary Figure S3A](#sup1){ref-type="supplementary-material"} and B). qRT-PCR confirmed loss-of expression of lncRNA\#32 by all four active shRNA vectors (\#32--2, 3, 8 and 9) (Figure [2H](#F2){ref-type="fig"}). In contrast, two new shRNAs (\#30--8, \#30--9) showed efficient loss-of lncRNA\#30 (Figure [2G](#F2){ref-type="fig"}) but did not induce bypass of OIS (Figure [2E](#F2){ref-type="fig"} and [F](#F2){ref-type="fig"}; [Supplementary Figure S3A and B](#sup1){ref-type="supplementary-material"}), indicating that the bypass of OIS by shRNA\#30--5 was not mediated by its targeted lncRNA. Altogether, these results demonstrate that lncRNA\#32 is both induced by oncogenic RAS and is required for the establishment of the OIS phenotype.
![Functional validation of selected lncRNAs. (**A**) The proliferation of the various shRNA-transduced BJ-RAS^v12^ cells was quantified using BrdU assay, \*\**P* \< 0.0005, two-tailed Student's *t*-test. For every condition, the percentage of BrdU-positive cells was normalized to negative control cells. (**B**) Senescent cells were quantified using SA-β-Gal assay, \*\**P* \< 0.0005, two-tailed Student's *t*-test. For every condition, the percentage of β-gal-positive cells was normalized to negative control cells. (**C** and **D**) qRT-PCR analysis of lncRNA\#30 and \#32 in the various shRNA-transduced cells treated with 4-OHT relative to untreated cells. Data were normalized to a housekeeping gene and the levels in untreated cells was set to 1, \*\**P* \< 0.0005, two-tailed Student's *t*-test. (**E** and **F**) Validation of additional shRNA-transduced BJ-RAS^v12^ cells was performed as in panel A and B. BrdU (\*\**P* \< 0.001) and SA-β-Gal assays (\*\**P* \< 0.0005) were quantified by two-tailed Student\'s *t*-test. (**G** and **H**) qRT-PCR analysis of lncRNA \#30 and \#32 in the shRNA-transduced cells presented in E and F. Data were normalized to a housekeeping gene and the levels in untreated cells was set to 1, \*\**P* \< 0.0005, two-tailed Student's *t*-test.](gky087fig2){#F2}
To further solidify the role of lncRNA\#32 in OIS we made use of a dual CRISPR-Cas9 system ([@B61]), and induced deletions of the lncRNA\#32 locus. As BJ cells do not form single clones, generation of monoclonal population of deleted cells was not possible. Instead, we performed a functional genetic experiment to test whether the cells containing the lncRNA\#32 deletion are enriched in cells undergoing OIS. Notably, [Supplementary Figure S4A](#sup1){ref-type="supplementary-material"} shows that control-transduced BJ cells completely senesced, p53 knockout BJ cells strongly bypassed OIS, and targeting lncRNA\#32 attenuated senescence, albeit to a lesser extent than p53KO. To confirm that the dual CRISPR-Cas9 system triggered deletion of lncRNA\#32, we isolated genomic DNA and performed semi-quantitative PCR to detect lncRNA\#32 with oligos (FW: TGGAGGGCTGAATCATCAAGTT, REV: ACTTCAAAGGGCAATTGCTGAAC) surrounding the CRISPR-target region. While wild-type and control-transduced cells produced only one band of about 1.8 Kb, cells transduced with the lncRNA\#32-targeting vector showed lncRNA\#32 deleted bands (∼350 bp), indicating the functionality of the CRISPR vector ([Supplementary Figure S4B](#sup1){ref-type="supplementary-material"}). Intriguingly, the PCR signal of the deletion band increased after 2 and 3 weeks following OIS induction, in line with a bypass of the OIS phenotype. In comparison, no enrichment of the deleted allele was noted following 3 weeks of culturing without induction of OIS ([Supplementary Figure S4B](#sup1){ref-type="supplementary-material"}). This indicates that lncRNA\#32 deletion gives growth advantage only under OIS conditions. As expected, we found by qRT-PCR that cells expressing sgRNAs targeting lncRNA\#32 have reduced level of lncRNA\#32 ([Supplementary Figure S4C](#sup1){ref-type="supplementary-material"}). Sanger sequencing confirmed the correct deletion of lncRNA\#32 ([Supplementary Figure S4D](#sup1){ref-type="supplementary-material"}). For simplicity and in conjunction with its function, we hereafter refer to lncRNA\#32 as lncRNA-OIS1.
To extend our finding on the role of lncRNA-OIS1 in OIS we employed a different cell system. We transduced all four functional shRNAs targeting lncRNA-OIS1 (\#32--2, 3, 8 and 9, which we renamed KD1, 2, 3 and 4, respectively) into TIG3 cells expressing hTERT and 4-OH-tamoxifen (4-OHT)-inducible oncogenic H-Ras^V12^, and repeated the BrdU labeling and SA-β-Gal experiments. First, q-RT-PCR and GRO-seq analysis indicated upregulation of lncRNA-OIS1 following oncogenic RAS induction ([Supplementary Figures S5E and S9A](#sup1){ref-type="supplementary-material"}). Second, as expected, the introduction of all four lncRNA-OIS1 shRNAs reduced lncRNA-OIS1 expression ([Supplementary Figure S5E](#sup1){ref-type="supplementary-material"}). Last, and most profoundly, all four lncRNA-OIS1 shRNAs very effectively bypassed OIS as measured by the proliferation and senescent assays BrdU and SA-β-Gal, respectively ([Supplementary Figure S5A--D](#sup1){ref-type="supplementary-material"}). Altogether, our results demonstrate that intact lncRNA-OIS1 is required for senescence induction following RAS^V12^ activation in primary human cells.
Knockdown of lncRNA-OIS1 abolishes OIS gene expression signature {#SEC3-3}
----------------------------------------------------------------
Next, we sought to explore the mode of action of lncRNA-OIS1 in senescence. To this goal, we first performed RNA-seq of cells transduced with shRNAs against lncRNA-OIS1, the positive controls p53 and BRD7, and negative controls (Figure [3A](#F3){ref-type="fig"}). Comparison of gene expression profiles in negative controls and p53kd cells upon activation of oncogenic RAS (the former enters senescence while the latter bypasses it) identified 885 differentially expressed genes (386 up- and 499 downregulated in senescent cells) (Figure [3B](#F3){ref-type="fig"}). Functional enrichment analysis showed that the set of genes whose expression was significantly repressed in senescent cells (compared to the p53kd cells) was markedly enriched for cell-cycle-related genes (Figure [3C](#F3){ref-type="fig"}), reflecting the strong proliferation arrest that is imposed in negative control cells upon oncogenic stress. This sharp downregulation of cell-cycle genes defines a molecular signature that characterizes the induction of the senescent physiological state. Remarkably, knocking--down lncRNA-OIS1 significantly abolished the repression of these genes (Figure [3D](#F3){ref-type="fig"}). The effect observed for lncRNA-OIS1-kd was comparable to the effect obtained by BRD7-kd but weaker than the effect elicited by p53-kd (Figure [3D](#F3){ref-type="fig"}). In accordance with the phenotypic effect of OIS-bypass, we observed that lncRNA-OIS1-kd resulted in attenuation of the induction of CDKN1A (p21), a prime target of p53 that is required for OIS in BJ cells ([Supplementary Figure S6A](#sup1){ref-type="supplementary-material"}). We confirmed this result at the protein level using western blot analysis (Figure [3E](#F3){ref-type="fig"} and [Supplementary Figure S6B](#sup1){ref-type="supplementary-material"}). We included one shRNA (\#32--6) which did not give knockdown of lncRNA-OIS1 and showed no bypass of the senescence phenotype (Figure [3E](#F3){ref-type="fig"} and [Supplementary Figure S6B](#sup1){ref-type="supplementary-material"}) to demonstrate specificity of the decreased expression of CDKN1A due to lncRNA-OIS1-kd.
![LncRNA-OIS1 knockdown shows a gene expression signature characteristic of senescence bypass. (**A**) A scheme of the RNA-seq experiment. RNA was collected from positive and negative control cells, and the various lncRNA-OIS1kd cells treated with 4-OHT for 14 days. Cells knocked-down for p53 and BRD7 served as positive controls. (**B**) The comparison of gene expression profiles between p53kd and negative control cells, both treated with 4-OHT to induce oncogenic RAS, identified 885 differentially expressed genes. A total of 386 and 499 genes were up- and downregulated, respectively. (**C**) Enriched functional categories in the set of genes that were downregulated in the senescent cells. As expected, the enriched categories are related to cell proliferation and cell division. (**D**) For each of the conditions that we examined, we calculated the distribution of fold-change of expression for the set of 135 cell-cycle genes whose expression is downregulated in senescence, relative to their expression in control untreated cells. In control cells, 4-OHT treatment resulted in strong suppression of this set of genes (Ctr1, Ctr2 samples). In contrast, in lncRNA-OIS1-kd cells, the expression of these cell-cycle genes was elevated compared to control cells. Notably, the effect observed in lncRNA-OIS1kds was similar to the effect of BRD7, but, as expected, weaker than that of the p53kd. (**E**) CDKN1A protein levels examined by western blotting.](gky087fig3){#F3}
To further characterize the effect of knocking-down lncRNA-OIS1 on the cellular transcriptome, we systematically compared, using GSEA analysis ([@B52]), gene expression profiles in cells induced for oncogenic RAS and transduced either with shRNAs against lncRNA-OIS1 or with non-targeting shRNAs. As expected from the phenotypic effect and inline with the above analysis, the strongest gene sets that were upregulated upon knocking-down lncRNA-OIS1 were related to proliferation and cell-cycle ([Supplementary Figure S6C](#sup1){ref-type="supplementary-material"}). A set of genes that are induced in response to ionizing irradiation was the most significantly downregulated gene set in the lncRNA-OIS1 kd cells. This set contains numerous p53 direct target genes, indicating that attenuated expression of lncRNA-OIS1 compromises the activation of the p53 network ([Supplementary Figure S6C](#sup1){ref-type="supplementary-material"}). In addition, genes of the oxidative phosphorylation pathway are downregulated too in the lncRNA-OIS1 kd cells. Notably, all these gene sets show the opposite response in cells that enter senescence in response to oncogenic stress ([Supplementary Figure S6C](#sup1){ref-type="supplementary-material"}), demonstrating that loss of lncRNA-OIS1 abolishes OIS gene expression signature.
Loss-of lncRNA-OIS1 compromises the induction of DPP4 by OIS {#SEC3-4}
------------------------------------------------------------
To investigate the mechanism(s) by which lncRNA-OIS1 affects OIS induction, we first examined its subcellular localization. In control BJ/ET/Ras^V12^ER cells, lncRNA-OIS1 was located both in the nucleus and the cytosol. Following RAS^V12^ activation, lncRNA-OIS1 maintained a similar pattern in these two compartments (Figure [4A](#F4){ref-type="fig"}). ISH analysis confirmed lncRNA-OIS1 increased expression following RAS^V12^ induction, and its localization in the nucleus and cytosol. Loss-of lncRNA-OIS1 confirmed the specificity of the signal to lncRNA-OIS1 (Figure [4B](#F4){ref-type="fig"}).
![LncRNA-OIS1 expression is required for the activation of DPP4 in response to oncogenic stress. (**A**) Subcellular localization of lncRNA-OIS1 in BJ cells treated with or without 4-OHT. U2 and S14 RNAs were used as controls for nucleus and cytosol fractions, respectively. (**B**) ISH of lncRNA-OIS1 in BJ cells treated with or without 4-OHT. (**C**) Screenshots of GRO-seq data of the lncRNA-OIS1 and DPP4 genomic locus. R1 and R2 are two biological replicates. (**D**) qRT-PCR analysis of DPP4 expression upon lncRNA-OIS1kd treated with or without 4-OHT, \*\**P* \< 0.002, two-tailed Student's *t*-test. (**E**) DPP4 protein levels examined by western blotting.](gky087fig4){#F4}
LncRNAs can impact the expression of nearby genes on the chromatin (*cis* function), or affect gene expression in trans (for example by controlling mRNA transcription, splicing and translation). We therefore first interrogated whether lncRNA-OIS1 functions *in trans*, and whether ectopic expression of lncRNA-OIS1 can drive cells into senescence without RAS induction. We over-expressed lncRNA-OIS1 in primary BJ cells (full length or exons; [Supplementary Figure S7A](#sup1){ref-type="supplementary-material"}), but observed no induction of senescence as measured by BrdU labeling and SA-β-Gal assays ([Supplementary Figure S7B--D](#sup1){ref-type="supplementary-material"}). Second, we overexpressed lncRNA-OIS1 (both full length and exons) in lncRNA-OIS1-kd cells to test whether ectopic expression of lncRNA-OIS1 can restore the senescence phenotype. However, despite the high expression of lncRNA-OIS1 ([Supplementary Figure S8A](#sup1){ref-type="supplementary-material"}), OIS-bypass by lncRNA-OIS1-kd was maintained ([Supplementary Figure S8B--D](#sup1){ref-type="supplementary-material"}). These data indicated that lncRNA-OIS1 does not function in trans, rather, a localized expression and effect on neighboring genes is required (*cis* effect).
In general, lncRNAs can be physically linked to the locus from which they are encoded, and exert its function during transcription without the need for processing or shuttling. Well-studied examples of *cis*-acting lncRNAs are those that cause X-inactivation ([@B62],[@B63]). Examples of other *cis*-regulatory lncRNAs include ncRNA-a1--7, Hottip and Mistral, the perturbation of which lead to decreased expression of nearby genes ([@B64]), suggesting that gene regulation in *cis* is a very important mode of lncRNA action. To investigate whether lncRNA-OIS1 expression influences nearby genes, we analyzed Global Run-On Sequencing data (GRO-Seq) of senescent and proliferation BJ cells ([@B55]). We observed that both lncRNA-OIS1 and its nearby gene DPP4 were increased in the BJ cells upon RAS induction (Figure [4C](#F4){ref-type="fig"}). We also observed the same effect in TIG3 cells ([Supplementary Figure S9A](#sup1){ref-type="supplementary-material"}). Additionally, loss-of lncRNA-OIS1 abolished the activation of DPP4 following oncogene induction based on BJ cells RNA-seq data ([Supplementary Figure S9B](#sup1){ref-type="supplementary-material"}). We solidified these results by qRT-PCR (Figure [4D](#F4){ref-type="fig"} and [Supplementary Figure S9C](#sup1){ref-type="supplementary-material"}) and chose the best two lncRNA-OIS1 knockdowns (KD2 and 4) for western blot analyses of DPP4 expression four days following RAS^V12^ induction, before the cell-cycle is arrested and senescence is established (Figure [4D](#F4){ref-type="fig"} and [E](#F4){ref-type="fig"}). Indeed, attenuated activation of DPP4 protein expression was obtained in cells with lncRNA-OIS knockdown. A similar effect was also observed in TIG3 lncRNA-OIS1-kd cells 4 days following RAS^V12^ induction ([Supplementary Figure S9D](#sup1){ref-type="supplementary-material"}). Altogether, these data link lncRNA-OIS1 to regulation of DPP4 expression and to the senescent phenotype induced by oncogenic RAS.
Loss-of DPP4 bypasses OIS {#SEC3-5}
-------------------------
Interestingly, it has been reported that DPP4 is a tumor suppressor in melanoma ([@B68],[@B69]), non-small cell lung cancer ([@B70]), ovarian cancer ([@B71]), endometrial carcinoma ([@B74]), prostate cancer ([@B75]), neuroblastoma ([@B76]) and glioma ([@B77]). We therefore hypothesized that the tumor suppressive role of DPP4 is linked to OIS. To examine this issue, we generated shRNAs ([Supplementary Table S7](#sup1){ref-type="supplementary-material"}) transduced DPP4 knockdown BJ cells. qRT-PCR and western blot analyses confirmed significant reduction of DPP4 mRNA and protein levels upon knockdown (Figure [5A](#F5){ref-type="fig"} and [B](#F5){ref-type="fig"}). As predicted, loss-of DPP4 bypassed OIS, as determined by proliferation and SA-β-Gal assays (Figure [5C](#F5){ref-type="fig"} and [D](#F5){ref-type="fig"}; [Supplementary Figure S9E](#sup1){ref-type="supplementary-material"}). Next, we examined whether lncRNA-OIS1 regulates senescence through DPP4. We cloned DPP4 in a lentiviral vector, ectopically expressed it in lncRNA-OIS1-kd cells and induced OIS. Intriguingly, proliferation (BrdU labeling) and SA-β-Gal assays demonstrated that ectopic expression of DPP4 abolished the senescence bypass phenotype of lncRNA-OIS1-kd cells, while a control vector did not (Figure [6A](#F6){ref-type="fig"} and [B](#F6){ref-type="fig"}; [Supplementary Figure S10A and B](#sup1){ref-type="supplementary-material"}). We confirmed the overexpression of DPP4 by western blot (Figure [6C](#F6){ref-type="fig"} and [Supplementary Figure S10C](#sup1){ref-type="supplementary-material"}). These experiments indicate that DPP4 is the relevant target gene of lncRNA-OIS1 during OIS, and that lncRNA-OIS1 is a major determinant of DPP4 function in OIS.
![Induction of DPP4 is required for OIS. (**A**) qRT-PCR analysis of DPP4 expression upon DPP4kd (two different shRNAs) treated with or without 4-OHT, \*\**P* \< 0.005, two-tailed Student's *t*-test. (**B**) Western blot analysis of DPP4 protein. (**C**) BrdU proliferation analysis of DPP4kd BJ-RAS^v12^ cells, \*\**P* \< 0.0005, two-tailed Student's *t*-test. The percentage of BrdU-positive cells was normalized to negative control cells. (**D**) Senescence SA-β-Gal assay. \*\**P* \< 0.0005, two-tailed Student's *t*-test. The percentage of β-gal-positive cells was normalized to negative control cells.](gky087fig5){#F5}
![Ectopic expression of DPP4 induces senescence in lncRNA-OIS1kd cells. (**A**) BrdU proliferation assay of DPP4 or vector-transduced BJ-RAS^v12^-lncRNA-OIS1kd cells. \*\**P* \< 0.001, two-tailed Student's *t*-test. The percentage of BrdU-positive cells was normalized to negative control cells. (**B**) SA-β-Gal assay. \*\**P* \< 0.001, two-tailed Student's *t*-test. The percentage of β-gal-positive cells was normalized to negative control cells. (**C**) Western blot analysis of DPP4 protein. (**D**) TCGA data analysis of lncRNA-OIS1 and DPP4 expression in PRAD samples (*r* = 0.469, *P*-value = 2.5e^−31^).](gky087fig6){#F6}
Association of LncRNA-OIS1and DPP4 in the tumors {#SEC3-6}
------------------------------------------------
Last, we interrogated lncRNA-OIS1 expression in tumors and its correlation with that of DPP4 by analyzing TCGA data. LncRNA-OIS1 is very lowly expressed in most tumor types ([Supplementary Figure S11A](#sup1){ref-type="supplementary-material"}). We plotted the read counts of the lncRNA-OIS1 among normal and tumor samples, indicating in each type the number of samples with at least one read count for lncRNA-OIS1. Interestingly, prostate adenocarcinoma (PRAD) samples showed clear lncRNA-OIS1 expression. Using this dataset for differential expression analysis, we observed no change between tumor and normal samples (empirical Bayes test, B = −5.79, *P*-value = 0.28) ([Supplementary Table S4](#sup1){ref-type="supplementary-material"}), but a significant positive correlation between lncRNA-OIS1 and DPP4 expression in the tumor samples (*r* = 0.469, *P*-value = 2.5e^−31^) (Figure [6D](#F6){ref-type="fig"}), suggesting that at least in PRAD DPP4 expression is controlled by lncRNA-OIS1.
DISCUSSION {#SEC4}
==========
Over the past few years, numerous lncRNAs have been discovered and characterized as critical factors in physiological and pathological processes. However, the role of lncRNAs in OIS remained unexplored. Here, we contribute to the understanding of the function of lncRNAs by describing a role of lncRNA-OIS1 in cellular senescence provoked by the expression of oncogenic RAS (OIS). Upregulation of lncRNA-OIS1 following OIS was required for the induction of DPP4, a well-described gene with tumor suppressive activity. Differential gene expression analyses of lncRNA-OIS1 knockdown cells indicated attenuated activation of CDKN1A following OIS induction, and confirmed changes in cell-cycle regulatory genes favoring cellular proliferation. Gene complementation experiments indicated that DPP4, a lncRNA-OIS1 neighboring gene, is the downstream target of lncRNA-OIS1 in senescence. Exactly how DPP4 affects CDKN1A and cell-cycle genes, and how lncRNA-OIS1 controls DPP4 expression, remains to be uncovered. Nevertheless, we describe here an important function of lncRNAs with potentially influential implications in cancer biology.
OIS is a major senescence type and it poses a critical barrier to cancer. A recent study has shown that the lncRNA-MIR31HG was a senescence modulator during BRAF-V600 induced senescence in TIG3 cells ([@B46]). It has also been shown that loss-of MIR31HG reduces cell growth and promotes a strong senescence phenotype through the regulation of the tumor suppressor P16^INK4A^. Here, we add to this knowledge by identifying and characterizing the role of lncRNA-OIS1 in regulating senescence through the control of a nearby gene DPP4.
Interestingly, we also overexpressed lncRNA-OIS1 in BJ cells to examine whether high levels of the lncRNA-OIS1 can drive cells into senescence. However, we neither observed senescence induction nor DPP4 was activated ([Supplementary Figure S7](#sup1){ref-type="supplementary-material"}). Additionally, also the ectopic expression of lncRNA-OIS1 was not able to revert the bypass of senescence and the reduced DPP4 activation induced by lncRNA-OIS1 knockdown under OIS ([Supplementary Figure S8](#sup1){ref-type="supplementary-material"}). This is indicative of a cis function of lncRNA-OIS1. Indeed, we identified DPP4, a nearby gene to lncRNA-OIS1, as a key component of OIS. First, loss-of DPP4, similar to lncRNA-OIS1 loss, resulted in bypass of senescence (Figure [5](#F5){ref-type="fig"}). Second, ectopic expression of DPP4 reverted the bypass of senescence induced by the loss-of lncRNA-OIS1 (Figure [6A](#F6){ref-type="fig"}--[C](#F6){ref-type="fig"} and [Supplementary Figure S10](#sup1){ref-type="supplementary-material"}). Additionally, a recent research found that DPP4 can regulate senescence in WI-38 cells, strongly supporting our observations ([@B78]). However, although both lncRNA-OIS1 and DPP4 genes reside in the same topologically associating chromatin domain through a CCCTC-binding factor (CTCF) loop ([Supplementary Figure S12A](#sup1){ref-type="supplementary-material"}), and chromatin loops can be identified in various ChIA-PET and Hi-C chromatin conformation capture datasets ([Supplementary Figure S12B](#sup1){ref-type="supplementary-material"}), we did not observe a clear direct interaction of lncRNA-OIS1 locus with the promoter of DPP4 using 4C, a chromatin capture analysis technique, through two distinct view point sites ([Supplementary Figure S13A](#sup1){ref-type="supplementary-material"}). Thus, how exactly the expression of DPP4 depends on lncRNA-OIS1 remains unclear. We speculate that lncRNA-OIS1 expression may be required to allow high chromatin accessibility to senescence-associated DPP4-activating transcription factors by directly recruiting essential transcription factors, or alternatively by counteracting chromatin-repressive components of the chromatin (Figure [7](#F7){ref-type="fig"}). Nevertheless, our findings here elucidate the importance of lncRNA-OIS1 for eliciting a proper cellular response to the emergence of oncogenic stress.
![Schematic representation of lncRNA-OIS1 function in normal and senescence conditions.](gky087fig7){#F7}
DATA AVAILABILITY {#SEC5}
=================
RNA-seq, Ribosome profiling (Ribo-seq), GRO-seq data are deposited in GEO DB (accession number GSE42509, GSE106414, GSE109290).
Supplementary Material
======================
######
Click here for additional data file.
We thank the China Scholarship Council for support. RNA Train supports our research and provides a great platform for training, learning, calibration. We thank all the members of the Agami group for helpful discussions. We thank Andrea Ventura for kindly providing the plasmid PX333 and all the reagents for lncRNA-OIS1 deletion. We also want to thank Jing Li (Cnkingbio Company) for helpful suggestions.
SUPPLEMENTARY DATA {#SEC6}
==================
[Supplementary Data](https://academic.oup.com/nar/article-lookup/doi/10.1093/nar/gky087#supplementary-data) are available at NAR Online.
FUNDING {#SEC7}
=======
This work was supported by the China Scholarship Council (CSC) (to L.L.); ERC-AdG enhReg \[322493 to R.A.\]; ERC-ITN RNA TRAIN \[607720 to R.A.\]; Edmond J. Safra Center for Bioinformatics Fellowship (to R.E.). The Human Frontier Science Program \[LT000640/2013 to Alejandro Pineiro Ugalde\]. Funding for open access charge: CSC; ERC-AdG enhReg \[322493\]; RNATrain \[607720\].
*Conflict of interest statement*. None declared.
| {
"pile_set_name": "PubMed Central"
} |
E2A
E2A may refer to:
E2A peptide, a 2A self-cleaving peptides.
E2A immunoglobulin enhancer-binding factors E12/E47.
Chūgoku Expressway and Kanmon Bridge, route E2A in Japan. | {
"pile_set_name": "Wikipedia (en)"
} |
To link to the entire object, paste this link in email, IM or documentTo embed the entire object, paste this HTML in websiteTo link to this page, paste this link in email, IM or documentTo embed this page, paste this HTML in website
·,;':?~
-:;}:;~
""~
<;'j
C \ .. ,
(
c
f c·.,.: c ... . - .!- \.: _.
.. . ...
DR AFT
MINUTES· OF THE 31ST MEETING
RED RIVER.COMPACT COMMISSION
KINGSTON. OKLAHOMA - 9-10 SEP 611
The 31st· meeting of the Red River Compact Commission was held
at Texoma Lodge, (Kingston·, Oklahoma) .on9-10 September 19611. Attached
is a list of those present. (Incl 1).
Minutes.ofthe 30th meeting were approved subject to the following
changes:
a. 12th line. chll;Ilge "II states" to "states affected".
b. lilth line. after the word "involved". insert a new
sentence: "The other states of the· Compact .took the proposals under
advisement" •
During the meeting. each of the 9 reaches was discussed. The
proposed Central Oklahoma Project was also discussed to determine the
views of the Commissioners .relative to diversion of waters from the Red
River basin to Oklahoma City. The pertinent points of the discussions
and ~;:~clusicns .~c~~::'~d Z!!"!;; giY:l!l ':n t:hg .::'!:7.zched "General Sta~n~":=-:~t It
(Incl 2). A tabular summary of reaches and the action required is
attached. (Incl 3).
The 32nd meeting of the Commission will be held at the Southland
Hotel in Dallas, Texas beginning 9:00 a.m., II November 19611.
3 Incl
1. Attendance List
2. General Statement
3. Tabulation | {
"pile_set_name": "Pile-CC"
} |
Keyend-e Bastak
Keyend-e Bastak (, also Romanized as Keyand; also known as Kayand) is a village in Godeh Rural District, in the Central District of Bastak County, Hormozgan Province, Iran.
References
3. الكوخردى ، محمد ، بن يوسف، (كُوخِرد حَاضِرَة اِسلامِيةَ عَلي ضِفافِ نَهر مِهران) الطبعة الثالثة ،دبى: سنة 199۷ للميلاد Mohammed Kookherdi (1997) Kookherd, an Islamic civil at Mehran river, third edition: Dubai
4. محمدیان، کوخری، محمد ، “ (به یاد کوخرد) “، ج1. ج2. چاپ اول، دبی: سال انتشار 2003 میلادی Mohammed Kookherdi Mohammadyan (2003), Beyade Kookherd, third edition : Dubai.
5.محمدیان، کوخردی ، محمد ، «شهرستان بستک و بخش کوخرد» ، ج۱. چاپ اول، دبی: سال انتشار ۲۰۰۵ میلادی Mohammed Kookherdi Mohammadyan (2005), Shahrestan Bastak & Bakhshe Kookherd, First edition : Dubai.
6.عباسی ، قلی، مصطفی، «بستک وجهانگیریه»، چاپ اول، تهران : ناشر: شرکت انتشارات جهان
7. سلامى، بستكى، احمد. (بستک در گذرگاه تاریخ) ج2 چاپ اول، 1372 خورشيدى
8. اطلس گیتاشناسی استانهای ایران [Atlas Gitashenasi Ostanhai Iran] (Gitashenasi Province Atlas of Iran)
Category:Populated places in Bastak County | {
"pile_set_name": "Wikipedia (en)"
} |
Six monoclonal antibodies to the CD59 antigen.
CD59 defines an N-glycosylated glycoprotein expressed on various hemopoietic cells. It is anchored to the cell membrane by a glycosylpbospbatidylinositol linkage and restricts the action of homologous complement. Monoclonal antibodies 2/24, 182, Fib75.1, BRIC 229, MEM-43, and YTH 53.1 were compared by immunoblotting against normal erythrocyte ghosts. All six stained a diffuse band of 17-25 kDa, but BRIC 229 also detected bands at 35 and 80 kDa. 2/24 reacts with all red blood cells (RBCs) tested, including Rhnull; Ob; ii; Ko; FY:-1,-2,-3; JK:-1,-2,-3; S-s-U-; p; CO:-1,-2; Yt(a-); Jr(a-); Vel-; At(a-); Cr(a-); GE:-2,-3; Wr(a+b+ MkMk; Jo(a-); and Lan-. 2-aminoethylisotbiouronium bromide treatment of erythrocytes destroyed blotting and serologic reactivity of all six antibodies. Pronase treatment reduced serologic reactivity and blotting ability of all antibodies except BRlC 229. Reactivity of all six antibodies was reduced with RBCs from paroxysmal nocturnal hemoglobinuria patients. Flow cytometric analysis was used to demonstrate that 182, Fib75.1, BRIC 229, YTH 53.1, and MEM-43 competitively inhibited the binding of 2/24 to RBCs, thus demonstrating that all six antibodies detect epitopes on the same molecule. | {
"pile_set_name": "PubMed Abstracts"
} |
The unique Labor of Love Rolling Yarn Store will carry our bags from October 12th to 26th. Their shop is located at 246 N. Main, Romeo, MI 48065 and is open from Tuesday through Saturday. www.laborofloveyarn.com/location.html
We will finish out the month of October with our new friends at The Wool & The Floss. They will be carrying our bags from Octover 19th to November 2nd. Their shop is located at 397 Fisher Rd., Grosse Pointe, Michigan. | {
"pile_set_name": "Pile-CC"
} |
Princess Luna, Perhaps you want to hear the story of how I came here, and became known as a serious writer, and then met Lunatic Hell. Well, your majesty, I can't tell you how I got here, without first telling you the story about how I met my partner, and editor, Lunatic Hell. He introduced me to my fiancee, Grave Mind, who on the Equestria Daily IRC, goes by Night Wisp,or something like that, and we are both happy, because we are both Autistic, and we haven't figured out what Lunatic Hell's problem is yet, maybe he is just crazy. But, I am just so that I found Lunatic Hell, and I him so much, because he is so talented. It was just fate that we found each other on the EQD IRC, and that he is such a good editor, and friend, I think that I will keep him, for as long as I am on Fimfiction. | {
"pile_set_name": "Pile-CC"
} |
Q:
App: use address book to find friends::: How to deal with country codes
I am working on a social network. I need to add a "find-friends" feature based on users' phone number and their address book (like whatsapp and others).
The app I am developing will be available globally and I was wondering how others deal with the problem of predials and country codes. Of course I could find a way around but I am sure this is a relatively common challenge associated with that feature. The problem is, some people save numbers with a country code and some people don't. Do i need two versions of a phone number in my database?
What I think about doing:
1) user registers with the number and types in the country code and the rest of the number separately (two text fields). Then there are two separate columns in the database. One with the whole number including the country code and another with the number excluding the country code.
2) Then another user looks for friends via its address book. In the PHP, each number is checked and the ones that start with "00" are compared against the numbers in the column of the international numbers. Vice versa, the ones that don't start with "00" are compared against the number without the country code. This way users can find their friends irrespective of how they saved their number.
I would appreciate any help, links, advice or direction. I am looking for best practice approaches.
Thanks!
A:
You can format local country phone number to international phone number using this library
libPhoneNumber. It use big data of phones format and country codes.
And then search friends by international phone number.
Example of usage:
NSError* error = nil;
//Parse local phone number using country code from CTCarrier
NBPhoneNumber * phoneNumberObject = [[NBPhoneNumberUtil sharedInstance] parseWithPhoneCarrierRegion: phoneNumber
error: &error];
if(error)
{
//This will get if no CTCarrier info. Maybe iPod, iPhone or iPad without sim
error = nil;
//You may put there another way to get user country code, or use default(Russia in example)
phoneNumberObject = [[NBPhoneNumberUtil sharedInstance] parse: phoneNumber
defaultRegion: @"RU"
error: &error];
}
NSString* formattedInternationalPhoneNumber;
if(!error)
{
formattedInternationalPhoneNumber = [[NBPhoneNumberUtil sharedInstance] format: phoneNumberObject
numberFormat: NBEPhoneNumberFormatE164
error: &error];
}
| {
"pile_set_name": "StackExchange"
} |
Q:
ActionScript Preloader More Detailed Percentages
I am building a preloader for a flash application I am building. I am looking for a way to gain more detailed percentages from the ProgressEvent.PROGRESS that all preloaders use to track downloading progress. When I run a trace() statement on the loader percentages for a small file, my output window displays something like this:
4
8
13
17
23 etc...
I am looking for a way to be able to monitor this progress more closely, so I get 1, 2, 3, etc.... If numbers are repeated, that is okay. Parts of my preloader rely on these values, and thus, it would be great to be able to get them from 1 - 100 with no skipped whole numbers.
Thank you for your time.
A:
This doesn't make sense - unless your internet connection loaded exactly 1% of the file at a time.
What's happening is that after each new packet is received, it could be any size based on your download speed (let's say between 200 and 230kb). ProgressEvent.PROGRESS is dispatched each time one of these is received, adding to the total percentage loaded as you would expect.
So basically, let's say we're loading a 1000kb file, and your download speed is 100-150kbps.
Each trace() in your function called on each dispatch of ProgressEvent.PROGRESS will be run when a new packet has been received, so:
100kb loaded - 100 total - traces
10 120kb loaded - 220 total -
traces 22 150kb loaded - 370
total - traces 37
Etc.
| {
"pile_set_name": "StackExchange"
} |
Q:
Check if ConfigurationProperty value is not set
Let's say I have a ConfigurationProperty defined this way:
[ConfigurationProperty("TheProp")]
public double TheProp
{
get{//some code}
set{//some code}
}
How do I check if this ConfigurationProperty has a value or not? DefaultValue will not work in this case, because any double value is a valid value for the configuration property.
A:
You could try making the type of the property 'Nullable':
[ConfigurationProperty("TheProp")]
public double? TheProp
{
get{//some code}
set{//some code}
}
This will allow you to test for if(TheProp.HasValue).
| {
"pile_set_name": "StackExchange"
} |
Q:
Move to a Div/ID from Navbar Link
Ok, So I have a navbar that, when a link is clicked, I want it to move to a specific div (i.e. when clicking the "About" link, the page moves to the About section of the page).
A JSFiddle of the Code in question:
HTML in question:
<nav class="navbar navbar-toggleable-lg sticky-top navbar-inverse bg-inverse">
<button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarSupportedContent" aria-controls="navbarSupportedContent" aria-expanded="false" aria-label="Toggle navigation">
<span class="navbar-toggler-icon"></span>
</button>
<a class="navbar-brand" href="#">David Madrigal's Portfolio</a>
<div class="collapse navbar-collapse" id="navbarSupportedContent">
<ul class="navbar-nav mr-auto">
<li class="nav-item active">
<a class="nav-link" href="#">Home <span class="sr-only">(current)</span></a>
</li>
<li class="nav-item">
<a class="nav-link" href="#About">About</a>
</li>
<li class="nav-item">
<a href="#" class="nav-link projects">Projects</a>
</li>
<li class="nav-item">
<a class="nav-link" href="#">Contact</a>
</li>
</ul>
</div>
</nav>
The plan is to add classes that would match the id names of the parts of the page I want to go to.
Here is the JS I have so far:
function main() {
$
$('.nav-item').on('click', function() {
$(this).toggleClass('active');
});
}
$(document).ready(main);
Note, I am using Bootstrap 4.0. Any help is much appreciated.Thanks in advance!
A:
Here is a solution with smooth scrolling (the jquery slim libs does not support the animate property)
Snippet below
$('a[href^="#"]').on('click', function(event) {
var target = $(this.getAttribute('href'));
if (target.length) {
event.preventDefault();
$('html, body').animate({
scrollTop: target.offset().top
}, 1000);
}
});
body {
background: #f5f5dc;
}
.jumbotron {
text-align: center;
background: url(imgs/los-angeles-skyline.jpg);
background-size: cover;
background-repeat: no-repeat;
color: white;
border-radius: 0;
}
#bootstrap-link {
text-decoration: none;
color: white;
}
#bootstrap-link:hover {
text-decoration: underline;
color: #014c8c;
}
#info-cards {
margin-bottom: 20px;
padding-bottom: 5px;
}
#card-blocks {
padding-bottom: 20px;
margin-bottom: 20px;
}
.card-button {
margin-left: 5px;
margin-right: 5px;
}
#form-container {
border: 5px solid rgba(220, 220, 220, 0.4);
margin-top: 10px;
padding: 30px;
padding-bottom: 25px;
background: #ffffff;
}
.form-button {
margin-top: 20px;
}
.footer {
text-align: center;
background-color: #292b2c !important;
padding-bottom: 5px;
padding-top: 20px;
margin-top: 5px;
margin-bottom: 0;
}
<script src="https://cdnjs.cloudflare.com/ajax/libs/tether/1.4.0/js/tether.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script>
<link href="https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/css/bootstrap.min.css" rel="stylesheet" />
<script src="https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/js/bootstrap.min.js"></script>
<nav class="navbar navbar-toggleable-lg sticky-top navbar-inverse bg-inverse">
<button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarSupportedContent" aria-controls="navbarSupportedContent" aria-expanded="false" aria-label="Toggle navigation">
<span class="navbar-toggler-icon"></span>
</button>
<a class="navbar-brand" href="#">David Madrigal's Portfolio</a>
<div class="collapse navbar-collapse" id="navbarSupportedContent">
<ul class="navbar-nav mr-auto">
<li class="nav-item active">
<a class="nav-link" href="#">Home <span class="sr-only">(current)</span></a>
</li>
<li class="nav-item">
<a class="nav-link" href="#About">About</a>
</li>
<li class="nav-item">
<a href="#projects" class="nav-link">Projects</a>
</li>
<li class="nav-item">
<a class="nav-link" href="#contact">Contact</a>
</li>
</ul>
</div>
</nav>
<div class="jumbotron">
<h1 class="display-3">Welcome!</h1>
<p class="lead">This is a site to which I will be adding all of my website works.</p>
<hr class="my-4">
<p>This site uses <a href="https://v4-alpha.getbootstrap.com/" id="bootstrap-link">Bootstrap 4</a> to make the site visually pleasing.</p>
<p class="lead">
<a class="btn btn-primary btn-lg" href="#" role="button">Learn more</a>
</p>
</div>
<div class="container-fluid" id="About">
<div class="row">
<div class="col-sm-12 div.md-12" id="info-cards About">
<div class="card">
<h3 class="card-header">About the <strong>Developer</strong></h3>
<div class="card-block">
<div class="media">
<img class="d-flex mr-3" src="https://avatars1.githubusercontent.com/u/17634751?v=3&u=764e15995bb82b2f37a3bdb15ba59e11f038a2f1&s=400" alt="githubProfilePic">
<div class="media-body">
<h5 class="mt-0">Welcome to My Portfolio!</h5>
Hello there! This is a personal portfolio of all of my works will be open source and can be changed however you please. Just make sure to provide links to the frameworks used so others can create projects with them!
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="container-fluid" id="card-blocks projects projects">
<div class="row">
<div class="col-sm-4 col-md-4">
<div class="card">
<div class="card-header">
Block #1
</div>
<div class="card-block">
<h4 class="card-title">Special title treatment</h4>
<p class="card-text">With supporting text below as a natural lead-in to additional content.</p>
<a href="#" class="btn btn-primary">Go somewhere</a>
</div>
</div>
</div>
<div class="col-sm-4 col-md-4">
<div class="card">
<div class="card-header">
Featured: "Just Random Musing..."
</div>
<div class="card-block">
<h4 class="card-title">My First Site W/ Bootstrap!</h4>
<p class="card-text">With supporting text below as a natural lead-in to additional content.</p>
<a href="https://mexdave1997.github.io/Just-Random-Musings/" class="btn btn-outline-primary card-button">View the Site!</a>
<a href=https://github.com/MEXdave1997/Just-Random-Musings "" class="btn btn-outline-info card-button">View Source!</a>
</div>
</div>
</div>
<div class="col-sm-4 col-md-4">
<div class="card">
<div class="card-header">
Block #2
</div>
<div class="card-block">
<h4 class="card-title">Special title treatment</h4>
<p class="card-text">With supporting text below as a natural lead-in to additional content.</p>
<a href="#" class="btn btn-primary">Go somewhere</a>
</div>
</div>
</div>
</div>
</div>
<div class="container-fluid" id="skillbars">
<div class="card">
<h3 class="card-header">Featured Skills</h3>
<div class="card-block">
<p class="card-text">HTML</p>
<div class="progress">
<div class="progress-bar bg-success" role="progressbar" style="width: 95%" aria-valuenow="95" aria-valuemin="0" aria-valuemax="100">95%</div>
</div>
<br>
<p class="card-text">CSS</p>
<div class="progress">
<div class="progress-bar bg-success" role="progressbar" style="width: 85%" aria-valuenow="85" aria-valuemin="0" aria-valuemax="100">85%</div>
</div>
<br>
<p class="card-text">JavaScript</p>
<div class="progress">
<div class="progress-bar bg-warning" role="progressbar" style="width: 65%" aria-valuenow="65" aria-valuemin="0" aria-valuemax="100">65%</div>
</div>
</div>
</div>
</div>
<form class="container-fluid" id="contact">
<div id="form-container">
<div class="form-group row">
<label for="InputName" class="col-4 col-form-label">Full Name</label>
<div class="col-8">
<input type="name" class="form-control" id="InputName" aria-described-by="nameHelp" placeholder="Enter Name" />
<small id="nameHelp" class="form-text text-muted">Please enter your Full Name (First and Last)</small>
</div>
</div>
<div class="form-group row">
<label for="InputEmail" class="col-4 col-form-label">Email Address</label>
<div class="col-8">
<input type="email" class="form-control" id="InputEmail" aria-described-by="emailHelp" placeholder="Enter Email" />
<small id="emailHelp" class="form-text text-muted">We will never share your email with anyone else.</small>
</div>
</div>
<div class="form-group row">
<label for="exampleInputPassword1" class="col-4 col-form-label">Password</label>
<div class="col-8">
<input type="password" class="form-control" id="exampleInputPassword1" placeholder="Password">
</div>
</div>
<button type="button" class="btn btn-primary form-button">Submit</button>
</div>
</form>
<footer class="footer text-muted">
<p>© 2017. David Madrigal-Hernandez.</p>
</footer>
| {
"pile_set_name": "StackExchange"
} |