text
stringlengths
0
6.48M
meta
dict
Q: Qt - connect menuBar and QWidget So I have menu bar like this: this->layout = new QGridLayout; QMenuBar* menuBar = new QMenuBar(); QMenu *fileMenu = new QMenu("File"); menuBar->addMenu(fileMenu); fileMenu->addAction("Exit"); this->layout->setMenuBar(menuBar); And I am wonderig how to connect thie action "Exit" with some slot my QWidget, I tryed something like this: connect(menuBar,SIGNAL(menuBar->actions),this,SLOT(exitGame())); But it is not working, can you tell me what I am doing wrong? And yes I have read manual about QMenuBar bud there are no examples of connecting. I have read about some connecting in Qt Designer but I am not using it. A: You need to connect the QAction pointer returned from QMenuBar::addAction to the slot... auto *exit_action = fileMenu->addAction("Exit"); connect(exit_action, &QAction::triggered, [this](bool checked) { exitGame(); });
{ "pile_set_name": "StackExchange" }
Charice’s success is also our success… Chasters, now is the time to proactively promote Charice’s latest single “Note To God.” Alone we can do so little; together we can do so much! Send your request to Ryan Seacrest’s popular radio station At 40, NOW! About the show The American Top 40 with Ryan Seacrest Join Ryan Seacrest as he counts down the 40 biggest hits from across North America every Sunday morning from 9a – 1p. Ryan Seacrest is not only the host of the American Top 40 Countdown, he is also the host of American Idol. Ryan also recently became the anchor for E! Entertainment News and the succesor for Dick Clark’s rocking New Years eve! Ryan Seacrest…The biggest hits…celebrity interviews…and more every weekend on Today’s Hottest Music, VIbe 98-5. Andre/GM: Thanks for the links to Songs Requests, I just did them, It took me about 10 minutes. I hope all chasters will do the same, or at least some of the links if not all. We can do this for Charice and besides people will have a great time listening to it anyway, great song and super singer. I would appreciate it very much if you can post as a separate topic in charicemania my recent comment on this page regarding the links to sites (so that this will be easily seen by charice’s fans) where they can visit to be able to request Charice’s song online. I just want to extend some help. I have requested a friend to summarize for me some links where one can request songs to be played on the radio (US, other parts of Europe, etc.). Hope you find the song request links useful as this is for charice. Go Go go all Chasters….We can’t do much here in ASIA so.. keep it up send to all the radio station in the US….hurrray!!! Lets rock the whole universe and spread her inspirational song of N. T. G. and by the power of God may He continue to inspire, and pierce the heart of every hardened heart and may be touch by this song & give them peace…Coz I beliv He uses Charice as an instrument to send this wonderful message to all human beings..Hurry hurry… Trackbacks/Pingbacks Leave a Reply Currently you have JavaScript disabled. In order to post comments, please make sure JavaScript and Cookies are enabled, and reload the page.Click here for instructions on how to enable JavaScript in your browser. Charicemania is considered to be a PG-13 and “family friendly.” When you click on the "Submit Comment" button above, you are indicating your acceptance of and are agreeing to our Comments Policy.
{ "pile_set_name": "Pile-CC" }
03 August 2006 What's the Frequency, Kofi? Rarely do we see a paragraph so mistaken as this gem from Mark Malloch Brown, the #2 man at the United Nations. And by gem, I mean piece of poo. Mark Malloch Brown, currently Deputy Secretary-General of the United Nations, started his career, or at least the high-profile segment, as a journalist. He wrote for The Economist from 1977-1979, and so his investigative skill should be particularly sharp, as The Economist is often liberal but rarely shoddy. So we expect Mr. Brown to tell us something substantial. Something helpful. At least something true. Let's listen. It’s not helpful to couch this war [between Israel and international terrorist organization Hez'b'Allah] in the language of international terrorism. Hizbollah employs terrorist tactics, it is an organisation however whose roots historically are completely separate and different from Al Qaeda. This Orwellian inversion of "helpful" to "not helpful", and of "identical to" to "separate and different from", can only hold true within a tightly-defined context. First off, it's certainly not helpful from the point of view of international terrorists, that's for sure. International terrorists probably don't like many things about the Global War Against Terror, such as the American PATRIOT Act endorsed, strengthened and supported by all three branches of the U.S. government, the International Terrorist Telecommunications Surveillance Program run by the NSA, or the International Terrorist Finance Monitoring Program with access to the SWIFT database of worldwide monetary transfers. And so far, we haven't even mentioned bombs or bullets--all things which the international terrorists do not find helpful, but which those countries fighting against international terrorism do find immensely helpful. So I guess we can see where the UN feels its interests lie, and that provides us with the necessary context for Mr. Brown's remarks. Moving on to the second sentence, Mr. Brown courageously knocks out his own shadow while the international terrorists of the U.N. march down the hall, unimpeded, past the office of Mark Malloch Brown. Nobody said that Hez'b'Allah was al-Qaeda, except perhaps Mr. Brown. But it takes a big man to reverse himself when spouting silliness and immediately begin spouting the opposite silliness. You see, he has traded up from Dan Rather's "fake but true" to "real but false". So with his journalistic integrity intact, he bravely and accurately destroys the truly unspoken argument that Hez'b'Allah is al-Qaeda by citing facts which are not true--that the Hezbos' and the Alkies' "roots historically are completely separate and different". This might hold water if one organization were derived from a radical arm of bloodthirsty sect of a dark ages religion bent on world domination, and the other were, say, Shinto. It might make sense, if the goals of the two organizations were, on the one hand, genocide against the surviving members of the world's oldest mainstream religion, huddled on a tiny strip of land where they watch the graves of their ancestors pillaged to make urinals under the watchful eyes of the United Nations, and on the other hand, a goal of freeing the oppressed peoples of the Arabian Peninsula, Northern Africa, Southern Asia--and everywhere else the world's 1.3 billion Muslims live--from the hateful and repressive regimes they currently suffer under. Of course, if you limit the context of Mr. Brown's comments to matters of nationality, and a certain time-frame, and if you quibble over differences caused largely by geography (and certainly not ideology), you could indeed say that these two organizations are separate and different. But no, the origins of Hez'b'Allah and al-Qaeda are the exact same; hatred and repression under Islamic dictatorships which manufacture handy bogeymen to blame for all of the privations caused by first, Islam, and second, dictatorship. So America and Israel are the Emmanuel Goldstein of Islam's permanent 1984, a society Hell-bent on sending us all back to the year Nine-Eighty-Four. Not only their origins then, but their goals too, are identical, and at any rate not hard to discover. It doesn't take an investigative reporter of any particularly great skill to ferret out the true goals of both al-Qaeda and Hez'b'Allah--Death to America, Death to Israel. You may even have heard these phrases yourself. And so I am reminded of Winston Smith in the Orwell novel 1984, and I will remember the last four words of that book until my dying day, so complete was my horror at the masterful conclusion of the novel. Unfortunately, only the bad parts are familiar in reference to Mr. Brown, and the good parts are not present. There is no conclusion, and if Deputy Secretary-General of the international terrorist organizations the United Nations Mark Malloch Brown has his way, there also will never be a conclusion. Not one that you can read in a language other than Arabic, anyway. Also, the lack of conclusion is not masterful, it is pathetic, or it would be, if that didn't also require pathos. Only the horror remains, but it is ours, not Mr. Brown's, as we realize the bone-chilling truth behind this journalist-cum-diplomat and his views on truth, proof, context, and goals: No comments: Free Kareem I Also Recommend The RevWatch... ...is from 0200 to 0700. This is the most dangerous time of day. Only a handful of people are working in darkness to bring the ship safely through the night. On the RevWatch, you keep each other sharp. Or you die. In the Global War, this time is the RevWatch.
{ "pile_set_name": "Pile-CC" }
<?php /* * Copyright 2016 Google Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); you may not * use this file except in compliance with the License. You may obtain a copy of * the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * License for the specific language governing permissions and limitations under * the License. */ class Google_Service_Tasks_Tasks extends Google_Collection { protected $collection_key = 'items'; public $etag; protected $itemsType = 'Google_Service_Tasks_Task'; protected $itemsDataType = 'array'; public $kind; public $nextPageToken; public function setEtag($etag) { $this->etag = $etag; } public function getEtag() { return $this->etag; } public function setItems($items) { $this->items = $items; } public function getItems() { return $this->items; } public function setKind($kind) { $this->kind = $kind; } public function getKind() { return $this->kind; } public function setNextPageToken($nextPageToken) { $this->nextPageToken = $nextPageToken; } public function getNextPageToken() { return $this->nextPageToken; } }
{ "pile_set_name": "Github" }
[Cite as In re M.F., 2019-Ohio-709.] Court of Appeals of Ohio EIGHTH APPELLATE DISTRICT COUNTY OF CUYAHOGA JOURNAL ENTRY AND OPINION Nos. 107452 and 107455 IN RE: M.F. Minor Child JUDGMENT: REVERSED AND REMANDED Civil Appeal from the Cuyahoga County Court of Common Pleas Juvenile Division Case Nos. DL 16109093 and DL 17114502 BEFORE: Keough, J., S. Gallagher, P.J., and Jones, J. RELEASED AND JOURNALIZED: February 28, 2019 ATTORNEY FOR APPELLANT  Tim Young Ohio Public Defender By: Lauren Hammersmith Assistant State Public Defender 250 East Broad Street, Suite 1400 Columbus, Ohio 43215 ATTORNEYS FOR APPELLEES Michael C. O’Malley Cuyahoga County Prosecutor By: Michael A. Short Assistant County Prosecutor 1200 Ontario Street, 9th Floor Cleveland, Ohio 44113 Also Listed For T.S. (Mother) T.S. 5069 Stanley Avenue Maple Hts., Ohio 44137 For J.F. (Father) J.F. 719 Cedar Avenue Ravenna, Ohio 44137 KATHLEEN ANN KEOUGH, J.: {¶1} M.F. appeals the juvenile court’s judgment denying her motion for recalculation of confinement credit. She contends that she was “confined” at the Carrington Youth Academy (“CYA”) for 126 days, and the juvenile court erred by failing to credit her with the days she spent  there. We reverse and remand with instructions for the trial court to hold a hearing to determine whether M.F. was “confined” at CYA for purposes of R.C. 2152.18(B) so as to be entitled to credit for the time she spent there. I. Background {¶2} In July 2016, M.F. was charged by complaint in Cuyahoga Juvenile Court No. DL 16109093 with offenses which, if committed by an adult, would constitute tampering with evidence, with a firearm specification; conveying a deadly weapon or dangerous ordnance in a school safety zone, with a firearm specification; carrying a concealed weapon; and falsification. In August 2016, M.F. admitted to and was adjudicated delinquent on all counts, and the firearm specifications were dismissed. At disposition, the court committed M.F. to the Ohio Department of Youth Services (“ODYS”) for a minimum period of 6 months, maximum to her 21st birthday, and suspended the commitment on the condition that she comply with the terms of probation. {¶3} In September 2017, M.F. was charged in Cuyahoga Juvenile Court No. DL 17114502 for an offense which, if committed by an adult, would constitute domestic violence. Following trial, the juvenile court found M.F. delinquent and committed her to ODYS for a minimum period of six months, maximum to age 21. The court invoked the suspended six-month sentence in No. DL 16109093 and ordered that the sentence be served consecutive to the sentence in No. DL 17114502. The juvenile court granted M.F. 13 days credit for time served.  {¶4} M.F. subsequently filed motions in both cases for recalculation of confinement credit. She asserted that she was confined for a total of 168 days relating to the two cases, including 126 days at the CYA. Without holding a hearing on the motions, the trial court granted M.F.’s motions in part and denied them in part. It granted M.F. 42 days credit for time served at the Cuyahoga County Juvenile Detention Center but denied credit for time served at the CYA. This appeal followed. II. Law and Analysis {¶5} In her single assignment of error, M.F. contends that the juvenile court erred by not granting her credit for the 126 days she was at the CYA. {¶6} R.C. 2152.18(B) provides that when a juvenile court commits a delinquent child to ODYS custody, “the court shall state in the order of commitment the total number of days that the child has been confined in connection with the delinquent child complaint upon which the order of commitment is based.” ODYS must then “reduce the minimum period of institutionalization that was ordered * * * by the total number of days that the child has been so confined as stated by the court in the order of commitment.” Id. {¶7} The term “confined” is not defined in R.C. Chapter 2152. Nevertheless, this court and others have recognized that the term is to be defined broadly. In re J.K.S., 8th Dist. Cuyahoga Nos. 101967 and 101968, 2015-Ohio-1312, ¶ 10, citing In re D.P., 1st Dist. Hamilton No. C-140158, 2014-Ohio-5414, ¶ 18; In re K.A., 6th Dist. Lucas No. L-12-1334, 2013-Ohio-3847, ¶ 23. In considering whether a juvenile is “confined” in a facility for purposes of R.C. 2152.18(B),  juvenile courts must review the nature of the facility, to see if it is a secure facility with measures sufficient to ensure the safety of the surrounding community. They must also review the nature of the restrictions on the juvenile at the facility to determine if the juvenile was “free to come and go as he wished” or if he was “subject to the control of the staff regarding personal liberties. In re J.K.S. at ¶ 10, quoting In re D.P. at ¶ 18. {¶8} In this case, there is nothing in the record from which we can ascertain whether M.F.’s time at CYA constitutes “confinement” for purposes of R.C. 2152.18(B). The parties cite to no evidence in the record regarding the nature of the CYA or the conditions affecting M.F.’s personal liberties during her time there. {¶9} Likewise, the juvenile court did not take any evidence or make any findings relative to the nature of the CYA or M.F.’s time there before denying M.F. credit for the time she served there. The court’s journal entry states: This court, aware that Carrington Youth Academy is a similar facility to Cleveland Christian Home and that youth in shelter care are monitored and supervised on a lower level than those who are in residential treatment, finds that Carrington Youth Academy, in its shelter care status, does not meet the definition of secured facility. {¶10} But the court’s alleged personal knowledge cannot substitute for evidence regarding the qualities of the CYA and the specific nature of M.F.’s experience there in order to determine whether she was sufficiently restricted so as to constitute “confinement” for purposes of R.C. 2152.18(B). Without such evidence, the trial court could not adequately determine whether M.F. was entitled to credit for the time she spent at the CYA. {¶11} Furthermore, without any evidence in the record regarding the qualities of the CYA and M.F.’s experience there, we cannot conduct a meaningful review of whether M.F. was  “confined” at the CYA so as to be entitled to credit for the time she spent there. Accordingly, we reverse the trial court’s judgments denying her motions for recalculation of confinement credit, and remand with instructions for the court to hold a hearing at which it considers evidence relating to the nature of the CYA to determine if it is a secure facility, and to the nature of the restrictions on M.F. while she was at the CYA to determine if she was free to come and go as she wished, or if she was subject to the control of the staff regarding her personal liberties. We note that the state concedes that the trial court erred in not holding a hearing on M.F.’s motion. {¶12} Judgment reversed and remanded. It is ordered that appellant recover from appellee costs herein taxed. The court finds there were reasonable grounds for this appeal. It is ordered that a special mandate be sent to said court to carry this judgment into execution. A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of the Rules of Appellate Procedure. KATHLEEN ANN KEOUGH, JUDGE SEAN C. GALLAGHER, P.J., and LARRY A. JONES, SR., J., CONCUR
{ "pile_set_name": "FreeLaw" }
CD9 is critical for cutaneous wound healing through JNK signaling. Cutaneous injury triggers a cascade of signaling events essential for wound re-epithelialization. CD9, a cell-surface protein, has been implicated in a number of cellular processes by coupling to intracellular signaling; however, its exact role in wound healing remains unidentified. We reported that CD9 was downregulated in migrating epidermis, and reelevated to basal level when re-epithelialization was completed. Although low level of CD9 appears to be required for normal wound healing, a significant healing delay was found in CD9-null mice, with wounds gaping wider on day 5 and day 7 post wounding. Further analysis showed that re-epithelialization was adversely affected in CD9-null mice, due to impaired migration of epidermis. Notably, CD9 deficiency caused a persistent enhancement of C-JUN NH2 terminal kinase (JNK) signaling primarily in migrating epidermis with abnormal elevation of matrix metalloproteinase (MMP)-9 detected in CD9-null wounds, leading to excessive degradation of type IV collagen, and thus a defective basement membrane at the wound site. JNK suppression reduced MMP-9 production and therefore ameliorated the healing delay with the appearance of significantly elongated migrating epidermis in CD9-null mice. Our study demonstrated the importance of CD9 in wound re-epithelialization, linking this molecule directly to basement membrane formation and epidermal migration through participating in the regulation of the JNK/MMP-9 pathway.
{ "pile_set_name": "PubMed Abstracts" }
IN THE COURT OF APPEALS, THIRD DISTRICT OF TEXAS, AT AUSTIN NO. 3-93-486-CV STATE OF TEXAS, APPELLANT vs. BETTY JEAN McHUGH, APPELLEE FROM THE DISTRICT COURT OF BLANCO COUNTY, 33RD JUDICIAL DISTRICT NO. 4276, HONORABLE D. V. HAMMOND, JUDGE PRESIDING PER CURIAM Appellant State of Texas seeks to appeal from an order of the district court of Blanco County rendered in a forfeiture proceeding. See Tex. Code Crim. Proc. Ann. art 59.02 (West Supp. 1994). On June 16, 1993, the district court rendered an order for release of the vehicle for which the State sought forfeiture to appellee Betty Jean McHugh. Because the order is not a final order, we will dismiss the appeal for want of jurisdiction. In response to the State's petition for forfeiture, McHugh and Wayne Wade Wagner requested a judgment for attorney's fees. The order of June 16th does not expressly or implicitly dispose of the claim or include a "Mother Hubbard" clause. See New York Underwriters Ins. Co. v. Sanchez, 799 S.W.2d 677, 678-79 (Tex. 1990); North E. Indep. Sch. Dist. v. Aldridge, 400 S.W.2d 893, 898 (Tex. 1966). The order, therefore, is not a final and appealable judgment. Tex. Civ. Prac. & Rem. Code Ann. § 51.012 (West 1986); Sanchez, 799 S.W.2d at 678. On receipt of the transcript, the Clerk of this Court advised the State, by letter, that the June 16th order did not appear to be final and appealable. By letter dated October 1, 1993, the State concurred that the order was not final and appealable. The Clerk of this Court inquired, by letter dated October 20, 1993, whether the defect was curable. See Tex. R. App. P. 58(b). The State answered that a hearing was necessary to resolve the issue of attorney's fees. This Court then abated the appeal and directed the State to obtain a final judgment in the underlying cause and to request the district clerk of Blanco County to forward the judgment to this Court in a supplemental transcript. See Tex. R. App. P. 58(b); State v. McHugh, No. 3-93-486-CV (Tex. App.--Austin Nov. 24, 1993, no writ h.) (not designated for publication). To date, we have not received a supplemental transcript that shows that the district court has rendered a final judgment in the underlying cause. Accordingly, we dismiss the appeal for want of jurisdiction. Before Justices Powers, Aboussie and Jones Appeal Dismissed for Want of Jurisdiction Filed: February 9, 1994 Do Not Publish
{ "pile_set_name": "FreeLaw" }
<?xml version="1.0" encoding="utf-8"?> <menu xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto"> <item android:id="@+id/action_settings" android:orderInCategory="100" android:icon="@mipmap/icon_menu_search" android:title="" app:showAsAction="always" /> </menu>
{ "pile_set_name": "Github" }
version: 1 n_points: 4 { 93.866 136.090 93.866 294.431 299.709 294.431 299.709 136.090 }
{ "pile_set_name": "Github" }
Q: How to prove $\frac{\partial}{\partial x^r} (x^r) = 1$ where $(U, (x^1, ..., x^n))$ is a local chart of a smooth manifold. Let $M$ be a smooth manifold. I am getting lost in the notations. Could someone please explain me how to prove $\frac{\partial}{\partial x^r} (x^r) = 1$ where $(U, \phi = (x^1, ..., x^n))$ is a local chart of $M$? Also I would appreciate if someone one can tell me what I should think of $\frac{\partial}{\partial x^r}$ as intuitively? A: Good question, these basic details are really important and worth thinking about once in a while, in my opinion. I guess the answer really depends on how you define the tangent space to begin with, though, so I'll give you my version. In the introductory course to Riemannian Geometry that I took, given $p\in M$, we defined $T_pM$ as follows: Let $c:(-\varepsilon,\varepsilon)\to M$ be a smooth curve on M such that $c(0)=p$. Consider the set $C^\infty(p)$ of all functions $f: M\to\mathbb{R}$ that are differentiable at $p$. The $\textbf{tangent vector to the curve}$ $c$ at $p$ is then the operator $\dot{c}(0): C^\infty(p)\to\mathbb{R}$ given by $$\dot{c}(0)(f)=\frac{d(f\circ c)}{dt}(0)$$ And then given a neighborhood $U\subset M$ of $p$ and a local chart $\varphi=(x^1,\ldots,x^n): U\to\mathbb{R}^n$, we define $\left(\frac{\partial}{\partial x_i}\right)_p$ as just notation for the vector tangent to the curve $c:(-\varepsilon,\varepsilon)\to M$ given in coordinates by: $$\left(\varphi\circ c\right)(t)=(x^1_p,\ldots,x^i_p+t,\ldots,x^n_p)$$ where $(x^1_p,\ldots,x^n_p)=\varphi(p)$. So, having defined everything, we can compute what you asked for: $$\left(\frac{\partial}{\partial x_i}\right)_p(x^i)=\frac{d(x^i\circ c)}{dt}(0)=\frac{d(x^i_p+t)}{dt}(0)=1$$. You can then prove that $T_pM$ is indeed a vector space, for which the $\left(\frac{\partial}{\partial x_i}\right)_p$'s defined in this way form a basis. Thank you for the question. I hope this helps.
{ "pile_set_name": "StackExchange" }
An anaerobic spirochete, Treponema hyodysenteriae, has been characterized as the primary etiological agent in swine dysentery. Harris, D. L.; Glock, R. D.; Christensen, C. R.; and Kinyon, J. M.: Vet. Med./Small Animal Clin. 67:61 (1972); Taylor, D. J.; and Alexander T. J. L.: Brit. Vet. J. 127:108 (1971). The pathogenesis of the disease has not been completely defined but there is evidence that T. hyodysenteriae proliferates in the large intestine of pigs in the presence of other secondary organisms and produces a mucohemorrhagic to necrotic enteritis. Meyer, R. C.; Simon, J.; and Byerly, C. S.: Vet. Pathol. 12:46 (1975). Local invasion of the epithelium and lamina propria has been observed but there is no apparent systemic invasion of the causative organism. Glock, R. D.; and Harris, D. L.: Vet. Med./Small Animal Clin. 67:65 (1972); Harris, D. L.; Glock R. D., Kinyon, J. M.: Intestinal Treponematoses. First Symposium on the Biology of Parasitic Spirochetes (1975). Little is known about the immunology of swine dysentery although resistance to reinfection can be demonstrated in convalescent pigs. Because of the enteric nature of swine dysentery, it has been believed that effective immunization would involve localized immunity in the large intestine. Oral inoculation of attenuated or non-pathogenic isolates of T. hyodysenteriae have therefore been tested. However, results of such tests have been negative; no significant increase in the resistance of the swine to dysentery infection having been obtained. Hudson, M. J., Alexander, T. J. L., Lysons, R. J. and Wellstead, P. D.: Brit. Vet. J. (1974) 139:37.
{ "pile_set_name": "USPTO Backgrounds" }
Saturday, February 28, 2015 Thursday I went to the Salon de l'Agriculture and bought too much food (see my post of yesterday). Last night I got to use some of it and enjoyed an evening at home and a simple meal that I cooked for myself. I started with an enormous French artichoke, so big that it took 35 minutes in a pressure cooker before it was ready. Half of that, with some great olive oil, made a fine appetizer. Next, smoked morteau sausage from Alsace, boiled for 45 minutes, with choucroute from the same stand at the Salon d'Ag, and some flageolets (lima beans) that I had left over from a prior meal. For dessert, a slice of pain d'épices that I had also bought at the Salon d'Ag. A rather nice meal. Saucisse morteau, choucroute, flageolets With so many great pre- or partially cooked items available at Paris' markets, cooking for one can be quick, interesting and delicious. I am a bit of a skeptic when it comes to Paris bistros. I have been disappointed too many times by the "in" places "discovered" by The New York Times or Bon Appetit to trust them, and even some of my trusted French bloggers have from time to time let me down. However . . . I recently went with a former colleague to new but and well-publicized Le Servan, a totally simple but attractive, and now very chic, bistro in the 11éme arrondissement and had a really delightful meal, exactly what you want in this type of place. A small but well-conceived menu and a wine list to match. And reasonable prices, too. The place is run by two young sisters, one of whom is the companion of the chef of Septime, one of the really great bistros in Paris. While this probably helped to jump start the restaurant, it has its own identity and flair. We shared an order of cockles in a light spicy bouillon that was a perfect pre-starter. Then I had a hot foie gras lacqué and my friend had perfectly cooked baby artichokes with lemon sauce. I continued with a marvelous duck breast, while A had a perfectly roasted chicken with cabbage. Our desserts, a blood orange tart and a Paris-Brest, were both excellent. The food is not gorgeous and not presented in an exciting way, so no photos. But so what? This is good food, at a reasonable price, and you should go. Just call in advance because it's usually full. Friday, February 27, 2015 One of the highlights of my year is a visit to the Salon de l'Agriculture, held in Paris at this time each year. A spectacular array of animals that are brought by proud breeders and traditional foods from all over France and its foreign territories and colonies, which may be eaten at the fair or taken home. (There are foods from other countries, but I generally pass on them in favor of France; after all . . .) This year I went with two Japanese artist friends who have lived in France for many years, speak the language and appreciate the culinary tradition. One had never been to the Salon d'Ag and she could not get enough of it. When two of us left after 5 1/2 hours, she stayed on to see some of the things we had passed up. We ate fairly little under the circumstances, starting with a fantastic sausage, potato and cheese from Picardy, Crispy sausage, potatoes and cheese and continuing with a hot foie gras sandwich, cooked before our eyes. Waiting while our foie gras is sauteed. We also partook of the many samples of sausage, cheese and sweets (nougat, cakes, sheep milk ice cream) on offer, and the best freshly pressed apple juice I have ever had. Then off to see the animals. First, horses, with splendid samples of dozens of breeds. Horses doing what they do best - eating - and in competition Next, the food animals: sheep, pigs and cows. Award-winning cul noir pig Happy sheep 1,650 kilo Charolais steer. HUGE! The fair was packed, the most crowded I have ever seen it. This is great, because it enables the urban population (especially children) to connect with the agriculture from which their food comes, an especially worthy practice in an era where the shrink-wrapped products that are available in supermarkets bear no relationship to the actual animals from whence they come. I can't prove it but I believe that this connection helps the French to maintain respect for the farms, farmers and animals that nourish them so well. I reported a year ago (to this day) on Beurre Bordier, an artisan butter that has taken France by storm, and it really is great stuff. But recently I heard from Dorie Greenspan, the wonderful cookbook author, that she has been favoring Beurre Beillevaire, made in the Loire Atlantique in wooden barattes. Interestingly, neither Bordier nor Beillevaire is made in Normandy, the traditional home of French butter and other milk products (think Camembert, Pont l'Eveque, etc.); perhaps that gives them more freedom to innovate which, in this context, means going back to old methods with wooden barrels and paddles. Coincidentally, there is a Bielleville store on rue Saint Antoine, a few minutes from our apartment, where their products are available. I decided to try the demi-sel croquant (crunchy). Beillevaire store in Paris Rushing home, I slathered some of it on a toasted slice of Pain Poilâne, probably France's most famous bread: heaven. I wished I could give a taste to the many people who ask me why I love Paris so much! Even cold, the butter is spreadable and the salt, which is not very crunchy in the end, is a great counterpoint for the sweetness of the butter. Not only is the butter wonderful to eat, it is even pretty to look at. A cute cow is embossed on the butter, which quickly disappears as the butter is consumed. Monday, February 9, 2015 J gave me a set of great leaf plates by the Japanese ceramic artist Tsujimura Yui as an early Valentine's Day gift. I was inspired to use them at a small dinner party to present an earthy salad of arugula, pumpkin seeds, sliced radishes, sprouts and parmesan shavings with pumpkin seed oil and sherry vinegar dressing. I learned this salad at Grüner in Portland, Oregon, where shaved mushrooms are also added to great effect (I was already using a lot of mushrooms in the meal so went without). About This Blog This blog records my thoughts and experiences relating to cooking, eating, restaurants, food products and ingredients, kitchen equipment and other matters relating to cuisine. I do not offer reviews of New York restaurants; there are already enough reviewers and points of view. I will, however, discuss things that I discover at restaurants that may be of interest to others. I will offer brief reviews of selected Paris restaurants, as I am often asked for suggestions by people planning trips to that marvelous and beautiful city. In particular, I report from time to time on my ongoing quest for excellent, reasonably-priced restaurants in Paris; fortunately, there are many.
{ "pile_set_name": "Pile-CC" }
980 So.2d 1233 (2008) Stefanie BRADLEY, wife, Appellant, v. Alton BRADLEY, husband, Appellee. No. 1D07-2214. District Court of Appeal of Florida, First District. May 5, 2008. Kathryn S. Robbie, Jacksonville, for Appellant. Jarahn M. Newman, Jacksonville, for Appellee. PER CURIAM. Stefanie F. Bradley, the former wife, appeals the Amended Final Judgment of Dissolution of Marriage dissolving her marriage to Alton Bradley, the former husband. The former wife contends that the trial court abused its discretion in ¶ 6 of the amended final judgment by awarding the former husband permanent periodic alimony in the amount of $1,500.00 monthly, and in ¶ 8 by ordering the former wife to obtain, maintain, and pay for medical insurance covering the former husband. We AFFIRM the final judgment of dissolution in all respects. See Simmons v. Simmons, 979 So.2d 1063 (Fla. 1st DCA 2008). BROWNING, C.J., VAN NORTWICK and ROBERTS, JJ., Concur.
{ "pile_set_name": "FreeLaw" }
One of our ongoing projects is photographing our design decor pieces and collections to help the planning process with Cedarwood brides. We have a TON of stuff :: vintage collections like antique silver, milk glass, vintage crystal, cake stands, rustic crates, crocks, birdcages, chandeliers, lanterns, linens, quilts, furniture, and the list goes on and on! We also have modern chic items!! The best part is that YOU can use Cedarwood’s decor pieces for your wedding as part of our Perfect Wedding Package design services at no extra charge (a few exceptions apply.) Cedarwood brides don’t have to scour the marketplace to find unique pieces to use in their wedding or invest in expensive items to be used just once. Very ECO-GREEN wedding design :: reuse, re-purpose, and save resources! As inspiration for your personal planning process, here’s a sneak peek of a few of the ever-expanding collections in our design storehouse! Umm, can I just say this, “BEST POST EVARRR!” Serioulsy, this is soooo extremely helpful! Especially for all of us far away Cedarwood brides who are trying to do things out of state! I think you should definitely make this a new thing. Photographs of everything! This is going to help me so much when I’m out scouring the Flea Markets, antique stores, etc. for wedding day items. Knowing that you guys have a large portion of what I’m envisioning is AWESOME. I swear I love you guys more with every day ;). EEK! Positively cannot WAIT for Open House. Yaah! So very beautiful!!! I love all the vintage items! I’ve had the pleasure of shooting several events at Cedarwood and I can’t say enough good things! If there are any brides on the fence (no pun intended) about Cedarwood, don’t hesitate! They won’t disappoint!!! Miss you guys! Annie
{ "pile_set_name": "Pile-CC" }
Artist: Mechanical Bride Mechanical Bride is Lauren Doss, a Brighton, United Kingdom based singer-songwriter. Her label Transgressive Records had this to say of her in their ‘Tips For 2007’ list: “We've never heard distant and lonely folk music quite this forceful and bracing... ambient, hypnotic, and sumptuous singing to boot - downbeat, occasionally hopeful, always beautiful... and she's only 20.” She has also been compared to Björk.
{ "pile_set_name": "Pile-CC" }
3 Wise Goblins 3 Wise Goblins Goblins £19.99 Quantity: at £19.99 each 2 in stock. 3 Wise Goblins Perfect for any mischievous soul. Cast in the finest resin. Painstakingly hand-painted. Size 12cm Liven up any shelf with these 3 wise Goblins. Sitting on the edge of any shelf that they’re placed on, these 3 goblins sit staring. They embody the ancient Confucian wisdom of “See no evil, hear no evil, speak no evil” with one covering their eyes, one covering their ear holes, and one covering their fanged mouth. Cast in the finest resin before being painstakingly hand-painted, this mischievous trio is perfect for those who get into too much trouble.
{ "pile_set_name": "Pile-CC" }
Rune Factory: Frontier is a Wii iteration of the Harvest Moon spin-off series Rune Factory, the first two entries having been released on the Nintendo DS. Rune Factory takes many of its gameplay elements from Harvest Moon, but adds dungeon crawling. If you've ever wanted to grow legions of crops, but also wanted to kill some monsters on the side, Rune Factory: Frontier is the game for you. Rune Factory: Frontier has many conventions of the typical MMORPG, making the game feel like a single player version of one. Monsters respawn in the dungeons each day, allowing players to farm as much loot as they please. There is also a robust crafting system, the ingredients for which are found mostly in dungeons, giving players the power to cook varying types of food, craft weaponry, create accessories, and make potions. There are many different kinds of weapons to use in combat, each with its own range, power, and special ability Heading through Frontier's dungeons for the first time, it feels strange to stop to plant a crop of radishes after fighting goblins and mining for ore. Planting crops in dungeons actually has a use, sometimes giving a valuable replenishment of health, or offering the chance to grow crops that are out of season on your farm back home. The dungeon crawling portion can be challenging unless the proper amount of health replenishing items and weapons is crafted. There is enough content in Frontier to play a single dungeon endlessly just to farm ingredients to make new items, while doing actual farming on the fields back home to earn money. Look at all those annoying Runeys. One of the best parts of Rune Factory: Frontier is the amount of freedom it allows. Outside of the restrictions of crop planting, which only let players plant summer crops in summer, spring crops in spring, etc, players are free to do as they please. There is no linear storyline that forces the player to do anything, though to advance through the game certain tasks must be completed. These tasks can be taken on at leisure, though as a downside this can also make it hard to figure out exactly what to do or where to go to keep moving through the game. Frontier is truly all about the management of a single resource: time. The game is divided into seasons, with each season subdivided into days, with each day composed of twenty-four hours. An hour of gametime is about one minute in real time. Staying out too late at night can make the main character sick, which will make him wake up late the next day or have very low stamina. The character's stamina must also be managed, as each action will use up a little bit of it, whether it be clearing rocks from your fields, engaging in combat, or crafting an object. If stamina runs out, the day automatically ends and the player could be sick again the next day. For this reason, actions must be planned carefully to maximize effective time usage each day. Animals can be tamed and put to work on the farm to help out, but days will likely have to be set aside for farming, crafting, dungeon crawling, or one of the game's more annoying aspects: balancing Runeys. Farm your life away. Runeys can generally be ignored, but must be managed at one point or another. Rune Factory: Frontier's town is divided into areas, with four types of Runeys populating each region: grass, air, water, and rock. Certain Runeys eat each other; some multiply faster than others. Runey population, when balanced, can make crops grow faster. When unbalanced, crops will grow slower. Balancing Runeys requires them to be sucked into an object called the Harvester — which is slow and tedious — and then they can be released in other areas. The problem is that the Runey balance can only be checked in a specific location and not during the act of transference, mandating the annoyance of keeping good notes handy. In certain cases Runeys seem to multiply or die out for an unknown reason, which might be explained by a piece of information somewhere in the game that wasn't obvious. Other than the Runey system, Frontier is a pretty fun game. It is a very deep experience that includes farming, dungeon crawling, fishing, crafting, chopping wood, weeding, special events such as canoe races, forging relationships with the townsfolk, upgrading weaponry, the Runey system, taming monsters, and more. For Harvest Moon players interested in something a bit different, it's a strong bet. For RPG fans in general, it could be a fun divergence from the norm. Rune Factory: Frontier can be somewhat tedious at times, but at the least it always gives players something to do.
{ "pile_set_name": "Pile-CC" }
--- base/process/memory_unittest.cc.orig 2019-03-15 06:25:27 UTC +++ base/process/memory_unittest.cc @@ -104,7 +104,7 @@ TEST(MemoryTest, AllocatorShimWorking) { // OpenBSD does not support these tests. Don't test these on ASan/TSan/MSan // configurations: only test the real allocator. // Windows only supports these tests with the allocator shim in place. -#if !defined(OS_OPENBSD) && BUILDFLAG(USE_ALLOCATOR_SHIM) && \ +#if !defined(OS_BSD) && BUILDFLAG(USE_ALLOCATOR_SHIM) && \ !defined(MEMORY_TOOL_REPLACES_ALLOCATOR) namespace { @@ -529,5 +529,5 @@ TEST_F(OutOfMemoryHandledTest, UncheckedCalloc) { EXPECT_FALSE(base::UncheckedCalloc(1, test_size_, &value_)); EXPECT_TRUE(value_ == nullptr); } -#endif // !defined(OS_OPENBSD) && BUILDFLAG(ENABLE_WIN_ALLOCATOR_SHIM_TESTS) && +#endif // !defined(OS_BSD) && BUILDFLAG(ENABLE_WIN_ALLOCATOR_SHIM_TESTS) && // !defined(MEMORY_TOOL_REPLACES_ALLOCATOR)
{ "pile_set_name": "Github" }
Cleistanthus Cleistanthus is a plant genus of the family Phyllanthaceae, tribe Bridelieae, first described as a genus in 1848. It is widespread in much of the Old World Tropics in Asia, Africa, Australia, and various oceanic islands. Cleistanthus collinus is known for being toxic and may be the agent of homicides or suicides. Species References Category:Phyllanthaceae genera
{ "pile_set_name": "Wikipedia (en)" }
Vashnam-e Dari Vashnam-e Dari (, also Romanized as Vashnām-e Darī; also known as Vashnām) is a village in Kambel-e Soleyman Rural District, in the Central District of Chabahar County, Sistan and Baluchestan Province, Iran. At the 2006 census, its population was 399 in 85 families. References Category:Populated places in Chabahar County
{ "pile_set_name": "Wikipedia (en)" }
Q: How to test whether my factories are properly bound? Using Ninject, I have the following and wish to test using FluentAssertions: [Test] public void InterfacesEndingWithFactoryShouldBeBoundAsFactories() { // Given IKernel kernel = new StandardKernel(); kernel.Bind(services => services .From(AppDomain.CurrentDomain .GetAssemblies() .Where(a => !a.FullName.Contains("Tests"))) .SelectAllInterfaces() .EndingWith("Factory") .BindToFactory() ); // When var factory = kernel.Get<ICustomerManagementPresenterFactory>(); // Then factory.Should().NotBeNull(); } Is there any good ways to test whether the factories are actually bound properly? A: I wrote an extension package for Fluent Assertions to test my Ninject bindings. Using it your test could be rewritten like this: [Test] public void InterfacesEndingWithFactoryShouldBeBoundAsFactories() { // Given IKernel kernel = new StandardKernel(); kernel.Bind(services => services .From(AppDomain.CurrentDomain .GetAssemblies() .Where(a => !a.FullName.Contains("Tests"))) .SelectAllInterfaces() .EndingWith("Factory") .BindToFactory() ); // When // Then kernel.Should().Resolve<ICustomerManagementPresenterFactory>().WithSingleInstance() } As suggested by @Will Marcouiller, I would also extract the code to bootstrap the kernel into it's own class so it can be invoked in your app's composition root and in your unit tests.
{ "pile_set_name": "StackExchange" }
Q: Why can't I use UIProgressViewStyle.bar in tvOS? I'm writing a tvOS app using Xcode 9.2, targeting tvOS 11. I have a UIProgressView and I'm trying to set it's style to .bar but Xcode says ".bar is not available". How can I use the .bar style for the UIProgressView on my tvOS app? A: The style bar of UIProgressView is only defined in the iOS SDK. It is defined as __TVOS_PROHIBITED in UIKit: typedef NS_ENUM(NSInteger, UIProgressViewStyle) { UIProgressViewStyleDefault, // normal progress bar UIProgressViewStyleBar __TVOS_PROHIBITED, // for use in a toolbar }; Also described like that in the documentation: https://developer.apple.com/documentation/uikit/uiprogressviewstyle/1619835-bar
{ "pile_set_name": "StackExchange" }
HDAC inhibitors in HIV. Combination antiretroviral therapy (cART) has led to a very substantial reduction in morbidity and mortality in HIV-infected patients; however, cART alone is unable to cure HIV and therapy is lifelong. Therefore, a new strategy to cure HIV is urgently needed. There is now a concerted effort from scientists, clinicians and funding agencies to identify ways to achieve either a functional cure (long-term control of HIV in the absence of cART) or a sterilizing cure (elimination of all HIV-infected cells). Multiple strategies aiming at achieving a cure for HIV are currently being investigated, including both pharmacotherapy and gene therapy. In this review, we will review the rationale as well as in vitro and clinical trial data that support the role of histone deacetylase inhibitors as one approach to cure HIV.
{ "pile_set_name": "PubMed Abstracts" }
Tesla Loses Spot As Most Valuable American Carmaker, For Now July 6, 2017 3:47 PM (Justin Sullivan/Getty Images) After three months as the nation’s most valuable automaker, a bad week in an otherwise stellar year has knocked Tesla from the top perch. Over the first six months of the year, Tesla shares gained more than 50 percent and the electric car company passed General Motors and Ford in market cap. But shares have plunged almost 15 percent this week, translating to lost market value of $8.7 billion. GM has regained the top spot with a value of $52.67 billion compared with $50.74 billion for Tesla. Tesla has been hit by a trifecta of bad news, starting with a tweet from Tesla CEO Elon Musk. Shares are on track for their worst weekly percentage decline since early 2016 – they fell nearly 6 percent Thursday alone. On Monday, Musk sent out tweet saying that the Palo Alto, California, company anticipates production of 20,000 Model 3 cars per month in December, which was below previous estimates. Tesla also said Monday that first-half deliveries of the Model S sedan and Model X SUV totaled about 47,100, at the low end of the company’s projections. Then on Wednesday, the dynamics of the electric car market shifted a bit when Volvo announced that by 2019, it would be producing only electric and hybrid vehicles, the first traditional automaker to make that leap. Volvo, owned by Chinese firm Geely, will launch five fully electric cars between 2019 and 2021. Three of them will be Volvo models and two will be electrified cars from Polestar, Volvo Cars’ performance car arm. General Motors is already selling the Chevrolet Bolt, and Audi plans to introduce an electric SUV next year. On Thursday, the Insurance Institute for Highway Safety said that while Tesla’s Model S received an acceptable rating in its small overlap front test, it did not get the Top Safety Pick+ rating that the Lincoln Continental, Mercedes-Benz E-Class and Toyota Avalon received. Overlap front tests gauge the safety of those inside the car when the front driver-side corner of a vehicle hits a tree or utility pole, or collides with another vehicle. The IIHS said that the main issue with the Model S performance was that the safety belt allowed the torso of crash dummies to move too far forward, allowing the head to strike the steering wheel hard through the air bag. IIHS said Tesla modified the vehicle and they retested it, but the same thing happened again. Tesla said Thursday that the carmaker’s rating for the small overlap front crash test was the second-highest rating available and that the company received the highest rating in the rest of IIHS’s crash testing categories. A Tesla spokesperson maintained that “the most objective and accurate independent testing of vehicle safety is currently done by the U.S. government, which found Model S and Model X to be the two cars with the lowest probability of injury of any cars that it has ever tested.” Tesla’s gains this year are still noteworthy. The shares are still up more than 40 percent. GM shares gained about 2 percent in the same period, while Ford’s have declined.
{ "pile_set_name": "Pile-CC" }
Type I lissencephaly is a severe brain developmental disease which involves defects in neural progenitor cell migration during the formation of the cerebral cortex. It is caused by LIS1 haploinsufficiency, resulting from sporadic mutations in the LIS1 gene. LIS1 has been implicated in the platelet activating factor and cytoplasmic dynein pathways, but current evidence suggests that defects in the latter are responsible for the brain developmental disease. Work from this lab has indicated that LIS1 functions together with cytoplasmic dynein at kinetochores and the cortex of dividing cells, at the leading edge of migrating fibroblasts, and during growth cone remodeling. Recent results from this lab have identified severe effects of LIS1 RNAi on the behavior of neural progenitor cells from neurogenesis through the entire course of radial migration by live imaging of brain slices. Aim I of this project will be to characterize further functional interactions between LIS1 and cytoplasmic dynein and their mutual binding partners NudE, and NudEL. The role of protein phosphorylation in regulating these interactions, and the effects of LIS1, NudE, and NudEL on dynein mechanochemical activity will be'determined. Aim II will be to define the role of LIS1, NudE and NudEL in the morphogenesis and locomotion of bipolar neural progenitors. Aim III will be to define the role of LIS1, NudE and NudEL in the interkinetic nuclear oscillations and cell division cycle of neural progenitor cells at the radial glial stage. Live imaging of embryonic rodent brain slices and isolated neural progenitors will be performed on control, mutant, or RNAi-treated animals to evaluate effects on nucleokinesis, cell division, control of division by nuclear position, glial guided migration, and process dynamics. The behavior of the microtubule cytoskeleton, centrosomes, nuclei, LIS1, NudE, and NudEL will be monitored to understand the underlying cellular causes for observed brain phenotypic effects. These studies are of considerable relevance to understanding normal and abnormal brain development, cell migration, cell division, the causes of mental retardation, and stem cell behavior.
{ "pile_set_name": "NIH ExPorter" }
Allentown Man Charged With Assault On Police November 24, 1990|by KAREN YURCONIC, The Morning Call A 28-year-old man was charged with two counts of aggravated assault Thursday night, after he punched a police officer and bit another in the finger, when Allentown officers were trying to arrest him, police said. Officers Ronnie Spruill and Marcia Wister went to 109 N. 2nd St. just before 6:30 p.m. on a call of a man with a knife, Lt. Francis Peters said. When police arrived they found Angel Luis Ramos standing on the porch. Ramos, who lives at 521 E. Cumberland St., Allentown, did not have a knife but was drunk, Peters said. Ramos was "doing a lot of yelling and screaming," and cursing at people inside the house, where his mother, Maria Vasquez, lives, "trying to get somebody to come out to fight with him," Peters said. When Spruill and Wister told him to stop, Ramos challenged the officers and he was put under arrest. Ramos punched Spruill in the head and bit him in the finger and punched Wister in the mouth as they tried to put handcuffs on him, Peters said. During the scuffle other officers responded because Spruill pulled his emergency pin to indicate he was in trouble; however, within a minute or two the situation was under control, police said. Peters said that other family members were yelling at police not to arrest Ramos. Police were unable to determine why Ramos wanted to fight with people in the house, Peters said. On Tuesday, Ramos got into an argument with police at Sacred Heart Hospital, where he works, because he complained no one was helping his 12-year-old son. He claims his son was injured when he was pushed out the rear door of a LANTA bus by other youths. Police still are investigating what actually happened. In addition to the aggravated assault charges, District Justice Anthony Rapp arraigned Ramos early yesterday on charges of disorderly conduct, , recklessly endangering and resisting arrest and issued citations for disorderly conduct and public drunkenness. Rapp committed Ramos to Lehigh County Prison on $25,000 bail, allowing for 10 percent of that to be posted with Lehigh Valley Pre-Trial Services' approval.
{ "pile_set_name": "Pile-CC" }
Designed in Los Angeles since 2010, Bella Dahl creates ultra-soft women’s essentials that pull influences from the laid-back, Southern California lifestyle. Bella Dahl takes pride in the quality of their product, with each and every item being hand-dyed, treated, and quality controlled in Los Angeles. Bella Dahl has evolved into a global brand known for its luxuriously soft pieces that dress your favorite influencers, trending celebrities, and most importantly, you. Soca Clothing and Bella Dahl collaborated in Fall 2018 to open a unique shopping experience in the Soca Clothing Birmingham location: the Shop in Shop experience. Soca Clothing is proud to be one of three locations in the U.S. to hold the permanent display and exclusive selection of Bella Dahl new arrivals and essentials. More than just a “shop,” the concept is designed to provide the customer with an experience that blends elements of Bella Dahl’s “California casual cool aesthetic with the authenticity of each city.” Read more about the Bella Dahl Shop in Shop experience on Soca’s blog! Exclusive Bella Dahl items are now available to shop on Soca Clothing’s online women’s boutique. Whether you decide to shop local and pop into our Shop in Shop at our Birmingham, AL location, or prefer the online shopping experience, you can always find an exclusive selection of Bella Dahl products at Soca Clothing.
{ "pile_set_name": "Pile-CC" }
​Square Net Exposure is now also available for CFDs that are traded on live (green) prices in addition to Forex, allowing you to square net positions containing multiple trades in one quick and efficient operation. When no related stop or limit orders are present on positions, the Close button on the Net position opens the Square net position dialog to initiate squaring the net p​osition. Cancel related orders on Net Positions Cancel Related Orders in the Open Positions list in SaxoTrader complements Square Net Position, allowing you to cancel any related orders under a Net Position in one simple operation before closing the net position. If related orders are present under a Net Position, Cancel buttons in the Stop and Limit columns open the Cancel Orders dialog.
{ "pile_set_name": "Pile-CC" }
How many pet cats can I import into Canada? I'm moving from Australia to Canada soon & I have alot of cats. I've been rescuing them from my street, and don't want to have to wait in Oz til I rehome them all, but also don't want to run into problems trying to bring them to Canada. I know all about the import requirements & will have a pet transport company handle the paperwork etc, but they can't be sure how many customs will allow me to bring in. At the moment it looks like I'll want to bring at least 12! I've got a website up trying to find many of them homes, its at http://www.kittiesinthehood.com but I've only found homes for 2 of the 11+ cats so far & I'm getting worried & would rather take them with me (if I can) than postpone the trip. Does anyone know the answer to this or done something similar? Thanks For those of you suggesting euthanasia over flying them to Canada, you are ill informed and should do some research re pets travelling! And I'd never have a kitten born on the street euthanised. I'm obviously a committed animal lover & you guys aren't, so please go waste your time elsewhere! you would need to find out what the cat bylaw is in the area you are moving too but overall I would suggest leaving them behind no matter how difficult this may be... there are plenty of cats in Canada who can use your help too (I am in Canada myself) I will warn you though - its not allowed to simply rescue cats off your street.. if you find a stray you MUST report finding it or you can be charged with theft ALSO flying is dangerous.. cats are smaller than dogs and such a long flight will be very difficult on them.. although rare there are horror stories about pets freezing while in flight - again something more likely to happen to a small cat than a big dog.. There are also by-laws in Australia in regard to how many cats you are allowed to keep. The cats you wish to take, are they the ones still out on the street? It may be very traumatic for them, as CF said, for a 17(?) hour flight. Please consider taking then to a shelter. Hi there...each Canadian province have special requirements, as do other federal departments and agencies such as Environment Canada and the Canadian Food Inspection Agency. Therefore you need to contact the province you will be moving to to learn if there's a limit on importing pet cats. I've included some links below if you haven't already seen them. Each Canadian arena has appropriate requirements, and added federal departments and agencies such as Environment Canada and the Canadian Food Inspection Agency. Therefore, you charge to acquaintance you will be affective to learn, if you accept a pet cat to bind imports of the province.
{ "pile_set_name": "Pile-CC" }
Body image and virtual reality in eating disorders: is exposure to virtual reality more effective than the classical body image treatment? Body image (BI) disturbances are considered to be central in eating disorders (ED) psychopathology. There are few studies focused on the treatment of BI disturbances in ED, and most of them have used "traditional methods." The purpose of the present study was to probe the effectiveness of one specific component in the assessment and treatment of BI in ED by means of virtual reality (VR). Two treatment conditions were applied: (a) The Standard Body Image Treatment Condition (SBIT) and (b) the VR Condition. Thirteen eating disordered patients were randomly assigned to one of those conditions. No differences between both conditions were found in general ED measures, but patients treated in the VR condition showed a greater significant improvement in specific BI measures. These results suggest that BI treatment with VR could be more targeted to its disturbances. than traditional techniques are.
{ "pile_set_name": "PubMed Abstracts" }
[05/13/10 - 10:38 AM]Oxygen Makes a Splash This Summer with a Dazzling Line Up of Water Cooler Worthy Shows"BGC Miami" and "Hair Battle Spectacular," due in August, join the previously announced "Jersey Couture" and "Dance Your Ass Off." [via press release from Oxygen] OXYGEN MAKES A SPLASH THIS SUMMER WITH A DAZZLING LINE UP OF WATER COOLER WORTHY SHOWS New York, NY - May 13, 2010 - Oxygen spices up summer 2010 with all new buzz worthy original programming beginning with the series premiere of "Jersey Couture" on Tuesday, June 1 at 10:00 PM ET/PT and the return of the hit dance/weight loss competition series "Dance Your Ass Off" hosted by Mel B (Spice Girls) on Monday, June 7 at 11 PM ET/PT. Later this summer, "Bad Girls" fans will get their next dose of guilty pleasure when the fifth season takes a new city by storm as "BGC Miami" premieres in August. And viewers will have to get their weaves in check when the new, over-the-top competition series "Hair Battle Spectacular," hosted by Brooke Burns, launches this August. Oxygen's groundbreaking real time water cooler destination, www.OxygenLive.com will continue as a companion to every original series with a live digital viewer experience. For fans who no longer want to wait until the next morning to chat about the latest gossip, OxygenLive provides a social media dashboard in which fans can socialize, interact and react in real time through a live chat, Facebook and Twitter all in one place while the show airs. From Jersey's "First Family of Fashion" to "thinspirational" contestants, hot Miami action to an outrageous battle of the tresses; Oxygen has enough summer heat for everyone. Oxygen's summer line up is as follows: "Jersey Couture" - Premieres Tuesday, June 1 at 10pm ET/PT From prom dresses to mother-of-the bride gowns, leopard print to gold sequins, Diane & Co. has it all. Owned by the Scali family, Diane & Co. is the fashion playground for Diane's daughters, Kimberly and Christina, who are the eyes into this world of high fashion and family hi-jinks. Kimberly's business sense and Christina's fairytale aspirations make a great combination, but mixing family with business sometimes proves to have its challenges. Ultimately, the clients reap the rewards of the talented Scali family because at the end of the day, it's all about providing women with a Cinderella experience of a lifetime! "Jersey Couture" is produced by Magilla Entertainment with Brian Flanagan and Matthew Ostrom serving as executive producers. Laura Palumbo Johnson and Jacqueline Cardillo Garofano are co-executive producers. "Dance Your Ass Off" - Premieres Monday, June 7 at 11pm ET/PT *Regular timeslot premiere Monday, June 14 at 10pm ET/PT This critically acclaimed series returns for season two with new host, Mel B. The hybrid dance/weight loss competition series features talented, full-figured contestants who take to the stage to unleash their inner thin. They will battle each other on the dance floor - as well as on the scale -- for a shot at a $100,000 grand prize. The expert panel of judges includes Lisa Ann Walter, Danny Teeson and a weekly guest judge. Magical Elves' Dan Cutforth, Jane Lipsitz and Charlie Haykel serve as executive producers. Lisa Ann Walter conceived the original "Dance Your Ass Off" and executive produces along with Kate Rigg. "BGC Miami" - Premieres in August The fifth season premiere of "Bad Girls Club" hits the beaches of Miami this summer. In this fan favorite series, seven self-proclaimed "bad girls" live together in a beautiful mansion. In a house full of women with similarly explosive personalities, clashes constantly erupt between roommates and housemates. Season four posted record ratings in first quarter 2010 and made network history as the best performing series ever. "Bad Girls Club" is produced by Bunim-Murray Productions. "Hair Battle Spectacular" - Premieres in August Hosted by actress Brooke Burns, "Hair Battle Spectacular" is a competition series that pits 10 of America's hottest stylists against each other to see who can deliver the biggest and best in fantasy hair design. Part sculpture and part pop art, each challenge will require the stylists to create outrageous hair designs that resemble everything from multi-layer wedding cakes to toys with moveable pieces. But in the end, only one hairdo will be left standing. The stylists present their hair creations in classic �Hair Battle' mode: live and out loud with a fully produced, dramatic and stylized performance. After each challenge, the judges: award-winning fantasy hair designer Derek J, celebrity stylist Lindsay Albanese and a rotating guest judge, critique the designers on creativity, execution and overall presentation. In addition to spectacular blow-by-blow drama on the hair battle runway, there is also the day-to-day drama between the cohabitating stylists who fight each week to stay in the battle and win the ultimate prize of $100,000. "Hair Battle Spectacular" is produced by 3 Ball Productions with JD Roth, Todd Nelson, Adam Greener, and Mike Nichols serving as executive producers. About Oxygen Media Oxygen Media is a multiplatform lifestyle brand that delivers relevant and engaging content to young women who like to "live out loud." Oxygen is rewriting the rulebook for women's media by changing how the world sees entertainment from a young woman's point of view. Through a vast array of unconventional and original content including "Bad Girls Club," "Dance Your Ass Off" and "Tori & Dean: Home Sweet Hollywood," the growing cable network is the premier destination to find unique and groundbreaking unscripted programming. A social media trendsetter, Oxygen is a leading force in engaging the modern young woman, wherever they are, with popular features online including OxygenLive, shopOholic, makeOvermatic, tweetOverse and hormoneOscope. Oxygen is available in 76 million homes and online at www.oxygen.com, or on mobile devices at wap.oxygen.com. Oxygen Media is a service of NBC Universal.
{ "pile_set_name": "Pile-CC" }
/* This file is part of the mp project. * Copyright (c) 2017 MerryMage * SPDX-License-Identifier: 0BSD */ #pragma once #include <type_traits> namespace mp { /// Casts a metavalue from one type to another template<class T, class V> using value_cast = std::integral_constant<T, static_cast<T>(V::value)>; } // namespace mp
{ "pile_set_name": "Github" }
Program and Abstracts of Higher Geometric Structures along the Lower Rhine XI, March 8-9, 2018 This is the eleventh of a series of short workshops jointly organized by the Geometry/Topology groups in Bonn, Nijmegen, and Utrecht, all situated along the Lower Rhine. The focus lies on the development and application of new structures in geometry and topology such as Lie groupoids, differentiable stacks, Lie algebroids, generalized complex geometry, topological quantum field theories, higher categories, homotopy algebraic structures, higher operads, derived categories, and related topics.
{ "pile_set_name": "Pile-CC" }
Atriklines The atriklines or artiklines () was a Byzantine court official responsible for organizing feasts and banquets in the imperial palace. Along with maintaining order at imperial banquets, he was tasked with ensuring that guests were received in the correct order of precedence according to their court rank and office. The atriklines performed and fulfilled his duties by utilizing a list known as a kletorologion (κλητορολόγιον) containing the officials, dignitaries, and ministers who possessed the right to be entertained in the palace. The roster itself would undergo alterations in order to account for the establishment of new offices, the elimination of old offices, and changes made to the guest order of precedence. A prominent atriklines was a certain Philotheos, who in 899 held the imperial title of protospatharios and authored the only surviving example of a kletorologion. References Sources Category:Byzantine palace offices
{ "pile_set_name": "Wikipedia (en)" }
# Apache This directory contains the Makefile and the template manifest for the most recent version of Apache web server (as of this writing, version 2.4.41). This was tested on a machine with SGX v1 and Ubuntu 16.04. The Makefile and the template manifest contain extensive comments. Please review them to understand the requirements for Apache running under Graphene-SGX. We build Apache from the source code instead of using an existing installation. On Ubuntu 16.04, please make sure that the following packages are installed: ```sh sudo apt-get install -y build-essential flex libapr1-dev libaprutil1-dev libpcre2-dev \ apache2-utils libssl-dev ``` # Quick Start ```sh # build Apache and the final manifest make SGX=1 # run original Apache against HTTP and HTTPS benchmarks (benchmark-http.sh, uses ab) make start-native-server & ./benchmark-http.sh 127.0.0.1:8001 ./benchmark-http.sh https://127.0.0.1:8443 kill -SIGINT %% # run Apache in non-SGX Graphene against HTTP and HTTPS benchmarks make start-graphene-server & ./benchmark-http.sh 127.0.0.1:8001 ./benchmark-http.sh https://127.0.0.1:8443 kill -SIGINT %% # run Apache in Graphene-SGX against HTTP and HTTPS benchmarks SGX=1 make start-graphene-server & ./benchmark-http.sh 127.0.0.1:8001 ./benchmark-http.sh https://127.0.0.1:8443 kill -SIGINT %% # you can also test the server using other utilities like wget wget http://127.0.0.1:8001/random/10K.1.html wget https://127.0.0.1:8443/random/10K.1.html ``` # Running Apache with Different MPMs The Apache server can run with several different multi-processing modules (MPMs). The two popular ones are *Prefork* and *Worker* MPMs. The Prefork MPM uses multiple child processes with one thread each, and each process handles one connection at a time. The Worker MPM uses multiple child processes with many threads each, and each thread handles one connection at a time. The supplied Makefile allows to run Apache in both configurations: ```sh make start-native-server # run with Prefork MPM make start-graphene-server # run with Prefork MPM make start-native-multithreaded-server # run with Worker MPM make start-graphene-multithreaded-server # run with Worker MPM ```
{ "pile_set_name": "Github" }
For windows users, it is easy yet excellent to convert videos freely with Freemake Video Converter; while for Mac users, you may be in a great dilemma in case of wondering to put videos on your Mac with this program as this free yet amazing video converter is only designed for Windows7/Vista/XP. If you are still searching for a Freemake Video Converter for Mac alternative, you are in the right place. Eager to find the answer? Yes, downloading Freemake Video Converter for Mac version is no longer a hard nut to crack so far as you possess a Mac video converter. Here I’d like to share you the Freemake Video Converter to Mac alternative-MacX Video Converter Free Edition. This Freemake alternative is a 100% free yet powerful video converter, which is designed specifically for Mac users, enabling you to convert among a wide range of video formats including MP4, MOV, MKV, FLV, AVI, etc. You can therefore enjoy videos free on iPhone, iPad, iPod, and so on. Step 1: Add Video Files to the Freemake Video Converter for Mac Alternative After finish Freemake Video Converter for Mac download, install and run it. Click "Add File" to select file you want to convert. This free Mac video converter supports batch conversion, so you can import and convert several files at a time. Step 2: Choose Output Video Format Take the output format you want. Besides, resolution, bit rate and other video settings have been provided, and you can change them to suit your needs. Step 3: Select the Output Folder Click "Browse" button to choose the path where you want to save the output files in. Step 4: Press the "Start" button As an awesome Freemake Video Converter for Mac alternative, MacX Video Converter Pro comes with more excellent features compared with the former one. For instance, presets for iDVD and iMovie are available; what’s more, screenshots from video can be captured with this alternative to Freemake Video Converter for Mac. See more information, please visit: ***********.macxdvd.com/mac-dvd-video-converter-how-to/download-freemake-video-converter-for-mac.htm
{ "pile_set_name": "Pile-CC" }
Blackburn Rovers defender Charlie Mulgrew (14) during the EFL Sky Bet Championship match between Brighton and Hove Albion and Blackburn Rovers at the American Express Community Stadium, Brighton and Hove, England on 1 April 2017. Photo by Bennett Dean. Blackburn Rovers skipper signs two and a half year contract extension Blackburn Rovers defender Charlie Mulgrew (14) during the EFL Sky Bet Championship match between Brighton and Hove Albion and Blackburn Rovers at the American Express Community Stadium, Brighton and Hove, England on 1 April 2017. Photo by Bennett Dean. Blackburn Rovers captain Charlie Mulgrew has signed a new contract with the Championship side, the club have confirmed. The skipper’s new deal runs through to 2021, with a two and a half year extension agreed. Scottish defender Charlie Mulgrew was a mainstay in the heart of Tony Mowbray’s defence last season, and won a place in the PFA League One Team of the Year as Rovers won promotion to the Championship. Since arriving from Scottish Premier League giants Celtic in the summer of 2016, Scotsman Mulgrew has been an influential force in the Rovers side. In their promotion season last year, Mulgrew featured 41 times in the League, scoring 14 goals from the back and picking up five assists. Mulgrew has helped guide Rovers within touching distance of the Championship Play-Off places in the early stages of this season, despite struggling with a rib injury in the past few weeks. Blackburn Rovers are looking to build for the long-term under Tony Mowbray, signing up key players to long term contracts and investing in young talents such as Ben Brereton and Adam Armstrong. First team men Darragh Lenihan, Richie Smallwood and Bradley Dack all penned new deals in the summer, and Mulgrew is the latest star man to commit their future to the Ewood Park side. “It was pretty straight forward, as Rovers is a club I want to be at. I’ve loved every minute of being here, it’s a great club to be at and a club that’s doing well,” Mulgrew told the Rovers club website. “It feels like a club heading in the right direction. Since the manager has come in we’ve been moving well and the plans for the future are great. I’ll be doing all I can to help move the club forward. “It’s been a bit of a rollercoaster, but ever since I walked through the door it’s been a club that I’ve wanted to fight for. After going down I was desperate to help bring the club back. “Now we want to push on. We have a great changing room, a great manager and great staff. It’s the perfect place to be, so I’m delighted to stay. “I loved my first year at the club despite relegation and I wanted to move the club forward. Now we can push on and see how far we can go.”
{ "pile_set_name": "Pile-CC" }
Q: How can I access my plist in another viewcontroller? I have one 3 arrays that i am trying to save to 3 different plists in one view and then load that data into an array in another view. I am having trouble figuring out how to access the data in the plist in my other view and save it correctly in my initial view. Here is the code from my first view. NSFileManager *fileManager = [NSFileManager defaultManager]; NSArray *documentPaths = NSSearchPathForDirectoriesInDomains(NSDocumentationDirectory, NSUserDomainMask, YES); NSString *documentsDirectory = [documentPaths objectAtIndex:0]; NSString *documentsDirectory1 = [documentPaths objectAtIndex:1]; NSString *documentsDirectory2 = [documentPaths objectAtIndex:2]; NSString *documentsDirectory3 = [documentPaths objectAtIndex:3]; NSString *documentPlistPath1 = [documentsDirectory stringByAppendingPathComponent:@"balance.plist"]; NSString *documentsPlistPath2 = [documentsDirectory1 stringByAppendingPathComponent:@"principal.plist"]; NSString *documentsPlistPath3 = [documentsDirectory2 stringByAppendingPathComponent:@"interest.plist"]; NSString *documentsPlistpath4 = [documentsDirectory3 stringByAppendingPathComponent:@"dates.plist"]; [dateValues writeToFile:documentsPlistpath4 atomically:YES]; [balanceLabels writeToFile:documentPlistPath1 atomically:YES]; [pricipalLabels writeToFile:documentsPlistPath2 atomically:YES]; Any help is greatly appreciated! Thanks! A: create an array NSArray *array = @[@"abc", @"cba"]; get path to plist file NSString *documentsFolderPath = [NSSearchPathForDirectoriesInDomains(NSDocumentDirectory, NSUserDomainMask, YES) objectAtIndex:0]; NSString *fileName = @"my_plist_file"; NSString *filePath = [documentsFolderPath stringByAppendingPathComponent:fileName]; save an array to .plist [array writeToFile:filePath atomically:YES]; read an array from .plist NSArray *arrayFromDisk = [NSArray arrayWithContentsOfFile:filePath];
{ "pile_set_name": "StackExchange" }
Typical direct access storage subsystems (DASS) include a controller connected to one or more disk files. The disk files are also called head-disk-assemblies (HDAs). The controller may be a physically separate device or may be integrated with the HDAs in a single device. The HDAs contain the actual data storage hardware. The controller provides the external computer interface for the subsystem. DASS is used herein to refer to the combination of one or more HDAs with a controller whether they are in separate devices or integrated in a single device. Each HDA contains one or more platters or disks on which data is recorded. The data is written in concentric circles on the disks which are called tracks. The data on the tracks must be organized according to a set of rules which are typically fixed in the design of the disk system. For example, the design of the disk system may require that the data be written in fixed length records or the design may allow variable length records to be written. Fixed record length designs, often referred to as fixed block architectures (FBA), typically subdivide tracks into sectors. One known technique for writing and reading variable length records is to use the count-key-data (CKD) format. As used hereinafter, `tracks` means tracks or sectors unless otherwise noted. The data on the tracks typically includes user data and system control data. Because defects may occur in the disk surfaces it is conventional to reserve spare or alternate space on the disks which can be used to logically replace areas with defects. In a device that uses sectors, the additional space will be alternate sectors. Variable record length devices typically use entire tracks for alternates. To distinguish them from alternate tracks, the original tracks are called primary tracks. The design of the disk system must provide a way to establish a linkage between a primary track and an alternate track so that some types of read and write commands which reference the primary track will be executed upon the alternate track. One method of achieving this linkage is to reserve a portion of each track for control information which determines whether an alternate track has been established for that track and, if so, gives the address of the alternate track. There may also be separate control data kept on the disk file which identifies the tracks deemed to be defective. The design typically allows a subset of the available commands to ignore the linkage so that, for example, read and write tests may be performed on the primary track even after the linkage has been established. Because the use of alternate tracks may have undesirable effects, techniques have been developed for adjusting for defects in a track without using an alternate track. In one scheme control information is written on the track ahead of the detect which allows the system to ignore or skip over the defect. This control information may be called skip-displacement information. Since skip-displacements cannot correct for an unlimited number of defects, it is customary to provide alternate track capability in addition to skip-displacement capability. In a system which allows skip-displacement information or its equivalent to be used to adjust for defects, it is possible to perform tests on a suspect track to determine exactly where the defects are, then write skip-displacements codes on the disk to correct the problem. Testing the track for errors requires that data be written on the track which destroys the user data that may be on the track. Therefore, prior to testing the suspect track, the user data must be copied to a backup track. If the testing and writing or skip-displacement information successfully adjusts for all of the defects on the track, then the user data can be copied from the backup track back to the original track. If the defects cannot be corrected then the system must use its alternate track technique to replace the bad track. The process of testing the track for defects and writing skip-displacement type information to correct for defects is known as media maintenance (MM). Media Maintenance for fixed block architecture (FBA) devices is accomplished by marking blocks defective and either assigning an alternate block or `slipping` the contents of blocks down a cylinder to use a spare block whose normal location is at the end of a cylinder. Since the proper testing of the suspect track requires that a very large number of read and writes be performed, media maintenance may require several minutes for one track. The conventional method of using an alternate location in count-key-data (CKD) DASS systems requires the ability to read and write control information at the beginning of the original track as well as on the alternate location. The beginning of the track is reserved for the `track header` which consists of Home Address (HA) and Record Zero (R0) count fields. The HA contains a flag which indicates whether an alternate track has been assigned and the R0 count field is used to record the pointer to all alternate track. For those cases where the part of the track affected by a media defect is in the header, customer data access is lost along with the ability to assign an alternate location for customer usage while media maintenance is being performed. The MM process may be interrupted by power failures or other system faults which prevent completion of the MM operations. This may result in leaving the device in an unknown state with respect to the MM operations which were in process. O. Akiba in a published Japanese patent application (JP 02-236747) has purportedly described a method for restarting a duplexed DASD after a power failure in such a way as to insure that the integrity of duplexing is maintained. When a power failure monitoring device detects a power failure, a CPU retrieves the control table of the duplexed DASD and takes out the equivalent information such as the block number of an updating processing under execution, etc., and duplicates and saves it on the nonvolatile memory. When the power source is recovered, the processing is restarted to complete the duplexing. Y. Katsuki in a published Japanese patent application (JP 02-42519) has purportedly described a method for restarting a computer application after a power failure by storing the processing state on a disk. The IPL program reads the state data from disk and restarts the application. U.S. Pat. No. 4,648,031 to E. H. Jenner describes a method for restarting a computer system after an interruption using two types of data structures. The first data structure contains the locations of interest in a recovery log for a "work unit". A second structure is maintained for each of the resource managers containing its operational state, and the relative addresses in the recovery log of the beginning and ending of its interest scope. Resource managers may be restarted by reestablishing the state of the managed collections during a current status phase, starting with the most recent check-pointed state advanced by subsequent records of changes in the log to the point of interruption. In a published European patent application (EP-295424) D. J. Haderle, et al. describe a method for use in database systems which establishes a prior point of consistency including partial transaction rollback in a transaction-oriented system using write-ahead logging. In response to a failure the system determines the point in the log at which REDO processing is to start. Data are gathered, in an analyzer phase, by scanning the log from the last complete checkpoint to the log end to find data on dirty pages and to identify those transactions which were executing at the instant of failure. The activities are repeated for all transactions up to the failure point and log modifications are input on the pages of the log. In the UNDO phase all currently-executing transactions are; rolled back. Thus, there is a need not solved by the prior art for MM techniques which guarantee completion despite system faults.
{ "pile_set_name": "USPTO Backgrounds" }
Even if her samba chops were substandard, Bristol Palin perfected her controversy skills on "Dancing with the Stars." abc.com November 24, 2010 ADVERTISEMENT Sign Up for Our free email newsletters 10 things you need to know today Today's best articles Today's top cartoons The good news newsletter The week's best photojournalism Daily business briefing Bristol Palin finished in third place on last night's "Dancing With the Stars" finale, behind Kyle Massey and the season's champion, Dirty Dancing star Jennifer Grey — a reassuring result, no doubt, for fans who had bemoaned the poorly reviewed contestant's success to date. Still, regardless of the outcome, Palin was clearly "Dancing's" main attraction this season, proving that a political pedigree and dancing are a combustible mix: A record 24 million viewers tuned in to watch her final dance on Monday night. How did Bristol's controversial tenure change the show — and her public image? (Watch the final results announcement) And not just any political contestant — another Tea-Party-connected one: All the anger over Bristol's advances was a recipe for success, says David Zurawik at The Baltimore Sun. And if the Sarah Palin-approved Christine O'Donnell joins the cast next season, as rumored, "the cycle will repeat itself with even higher ratings." The failed Delaware Senate candidate will advance despite a lack of talent, ABC will blame "angry Tea Party folks" who are "gaming the network's otherwise honest system." Meanwhile, the "liberal media outlets will lap up that phony narrative like catnip.""Jennifer Grey wins 'Dancing' — but ABC wins bigger" Bristol made the competition — and the criticism – personal: Like her mother, Bristol "made a virtue of inexperience," says Alessandra Stanley at The New York Times. But she took the wrong tack by using "hardened" language to address her many critics and "ended up as a political activist" by taking on her mother's enemies as her own. Bristol chose to be a contestant so she could "establish her own identity," but she "ended up right back where she began: as Sarah Palin's daughter.""The TV watch: 'Dancing' in circles"
{ "pile_set_name": "Pile-CC" }
Q: JavaFX - Множество кнопок с одинаковым действием Есть несколько кнопок записанных в FXML файле, и всем им задано onAction = "setWall" Как при нажатии на любую из кнопок обращаться к нажатой кнопке? A: Так: public void setWall(ActionEvent actionEvent) { if (actionEvent.getSource() instanceof Button) { Button button = (Button) actionEvent.getSource(); } }
{ "pile_set_name": "StackExchange" }
<?php /** * @package Freemius * @copyright Copyright (c) 2015, Freemius, Inc. * @license https://www.gnu.org/licenses/gpl-3.0.html GNU General Public License Version 3 * @since 1.0.7 */ if ( ! defined( 'ABSPATH' ) ) { exit; } /** * Class FS_Key_Value_Storage * * @property int $install_timestamp * @property int $activation_timestamp * @property int $sync_timestamp * @property object $sync_cron * @property int $install_sync_timestamp * @property array $connectivity_test * @property array $is_on * @property object $trial_plan * @property bool $has_trial_plan * @property bool $trial_promotion_shown * @property string $sdk_version * @property string $sdk_last_version * @property bool $sdk_upgrade_mode * @property bool $sdk_downgrade_mode * @property bool $plugin_upgrade_mode * @property bool $plugin_downgrade_mode * @property string $plugin_version * @property string $plugin_last_version * @property bool $is_plugin_new_install * @property bool $was_plugin_loaded * @property object $plugin_main_file * @property bool $prev_is_premium * @property array $is_anonymous * @property bool $is_pending_activation * @property bool $sticky_optin_added * @property object $uninstall_reason * @property object $subscription */ class FS_Key_Value_Storage implements ArrayAccess, Iterator, Countable { /** * @var string */ protected $_id; /** * @since 1.2.2 * * @var string */ protected $_secondary_id; /** * @since 2.0.0 * @var int The ID of the blog that is associated with the current site level options. */ private $_blog_id = 0; /** * @since 2.0.0 * @var bool */ private $_is_multisite_storage; /** * @var array */ protected $_data; /** * @var FS_Key_Value_Storage[] */ private static $_instances = array(); /** * @var FS_Logger */ protected $_logger; /** * @param string $id * @param string $secondary_id * @param bool $network_level_or_blog_id * * @return FS_Key_Value_Storage */ static function instance( $id, $secondary_id, $network_level_or_blog_id = false ) { $key = $id . ':' . $secondary_id; if ( is_multisite() ) { if ( true === $network_level_or_blog_id ) { $key .= ':ms'; } else if ( is_numeric( $network_level_or_blog_id ) && $network_level_or_blog_id > 0 ) { $key .= ":{$network_level_or_blog_id}"; } else { $network_level_or_blog_id = get_current_blog_id(); $key .= ":{$network_level_or_blog_id}"; } } if ( ! isset( self::$_instances[ $key ] ) ) { self::$_instances[ $key ] = new FS_Key_Value_Storage( $id, $secondary_id, $network_level_or_blog_id ); } return self::$_instances[ $key ]; } protected function __construct( $id, $secondary_id, $network_level_or_blog_id = false ) { $this->_logger = FS_Logger::get_logger( WP_FS__SLUG . '_' . $secondary_id . '_' . $id, WP_FS__DEBUG_SDK, WP_FS__ECHO_DEBUG_SDK ); $this->_id = $id; $this->_secondary_id = $secondary_id; if ( is_multisite() ) { $this->_is_multisite_storage = ( true === $network_level_or_blog_id ); if ( is_numeric( $network_level_or_blog_id ) ) { $this->_blog_id = $network_level_or_blog_id; } } else { $this->_is_multisite_storage = false; } $this->load(); } protected function get_option_manager() { return FS_Option_Manager::get_manager( WP_FS__ACCOUNTS_OPTION_NAME, true, $this->_is_multisite_storage ? true : ( $this->_blog_id > 0 ? $this->_blog_id : false ) ); } protected function get_all_data() { return $this->get_option_manager()->get_option( $this->_id, array() ); } /** * Load plugin data from local DB. * * @author Vova Feldman (@svovaf) * @since 1.0.7 */ function load() { $all_plugins_data = $this->get_all_data(); $this->_data = isset( $all_plugins_data[ $this->_secondary_id ] ) ? $all_plugins_data[ $this->_secondary_id ] : array(); } /** * @author Vova Feldman (@svovaf) * @since 1.0.7 * * @param string $key * @param mixed $value * @param bool $flush */ function store( $key, $value, $flush = true ) { if ( $this->_logger->is_on() ) { $this->_logger->entrance( $key . ' = ' . var_export( $value, true ) ); } if ( array_key_exists( $key, $this->_data ) && $value === $this->_data[ $key ] ) { // No need to store data if the value wasn't changed. return; } $all_data = $this->get_all_data(); $this->_data[ $key ] = $value; $all_data[ $this->_secondary_id ] = $this->_data; $options_manager = $this->get_option_manager(); $options_manager->set_option( $this->_id, $all_data, $flush ); } /** * @author Vova Feldman (@svovaf) * @since 2.0.0 */ function save() { $this->get_option_manager()->store(); } /** * @author Vova Feldman (@svovaf) * @since 1.0.7 * * @param bool $store * @param string[] $exceptions Set of keys to keep and not clear. */ function clear_all( $store = true, $exceptions = array() ) { $new_data = array(); foreach ( $exceptions as $key ) { if ( isset( $this->_data[ $key ] ) ) { $new_data[ $key ] = $this->_data[ $key ]; } } $this->_data = $new_data; if ( $store ) { $all_data = $this->get_all_data(); $all_data[ $this->_secondary_id ] = $this->_data; $options_manager = $this->get_option_manager(); $options_manager->set_option( $this->_id, $all_data, true ); } } /** * Delete key-value storage. * * @author Vova Feldman (@svovaf) * @since 1.0.9 */ function delete() { $this->_data = array(); $all_data = $this->get_all_data(); unset( $all_data[ $this->_secondary_id ] ); $options_manager = $this->get_option_manager(); $options_manager->set_option( $this->_id, $all_data, true ); } /** * @author Vova Feldman (@svovaf) * @since 1.0.7 * * @param string $key * @param bool $store */ function remove( $key, $store = true ) { if ( ! array_key_exists( $key, $this->_data ) ) { return; } unset( $this->_data[ $key ] ); if ( $store ) { $all_data = $this->get_all_data(); $all_data[ $this->_secondary_id ] = $this->_data; $options_manager = $this->get_option_manager(); $options_manager->set_option( $this->_id, $all_data, true ); } } /** * @author Vova Feldman (@svovaf) * @since 1.0.7 * * @param string $key * @param mixed $default * * @return bool|\FS_Plugin */ function get( $key, $default = false ) { return array_key_exists( $key, $this->_data ) ? $this->_data[ $key ] : $default; } /** * @author Vova Feldman (@svovaf) * @since 2.0.0 * * @return string */ function get_secondary_id() { return $this->_secondary_id; } /* ArrayAccess + Magic Access (better for refactoring) -----------------------------------------------------------------------------------*/ function __set( $k, $v ) { $this->store( $k, $v ); } function __isset( $k ) { return array_key_exists( $k, $this->_data ); } function __unset( $k ) { $this->remove( $k ); } function __get( $k ) { return $this->get( $k, null ); } function offsetSet( $k, $v ) { if ( is_null( $k ) ) { throw new Exception( 'Can\'t append value to request params.' ); } else { $this->{$k} = $v; } } function offsetExists( $k ) { return array_key_exists( $k, $this->_data ); } function offsetUnset( $k ) { unset( $this->$k ); } function offsetGet( $k ) { return $this->get( $k, null ); } /** * (PHP 5 &gt;= 5.0.0)<br/> * Return the current element * * @link http://php.net/manual/en/iterator.current.php * @return mixed Can return any type. */ public function current() { return current( $this->_data ); } /** * (PHP 5 &gt;= 5.0.0)<br/> * Move forward to next element * * @link http://php.net/manual/en/iterator.next.php * @return void Any returned value is ignored. */ public function next() { next( $this->_data ); } /** * (PHP 5 &gt;= 5.0.0)<br/> * Return the key of the current element * * @link http://php.net/manual/en/iterator.key.php * @return mixed scalar on success, or null on failure. */ public function key() { return key( $this->_data ); } /** * (PHP 5 &gt;= 5.0.0)<br/> * Checks if current position is valid * * @link http://php.net/manual/en/iterator.valid.php * @return boolean The return value will be casted to boolean and then evaluated. * Returns true on success or false on failure. */ public function valid() { $key = key( $this->_data ); return ( $key !== null && $key !== false ); } /** * (PHP 5 &gt;= 5.0.0)<br/> * Rewind the Iterator to the first element * * @link http://php.net/manual/en/iterator.rewind.php * @return void Any returned value is ignored. */ public function rewind() { reset( $this->_data ); } /** * (PHP 5 &gt;= 5.1.0)<br/> * Count elements of an object * * @link http://php.net/manual/en/countable.count.php * @return int The custom count as an integer. * </p> * <p> * The return value is cast to an integer. */ public function count() { return count( $this->_data ); } }
{ "pile_set_name": "Github" }
[Cloning and analysis of phage Fab antibodies of mouse male specific antigen]. To clone mouse phage antibodies against H-Y antigen from a phage antibody library, three cycles of affinity enrichment of the mouse phage antibody library with male spleen cells and two cycles of nonspecific absorption with female spleen cells were performed. The presence of mouse Fab on the phage surface was determined by ELISA and sequence analysis. 9 of 15 strains can bind to male spleen cells with the specific activity. Recombination rate of the phage antibody library clones is 60%. Sequence analysis of the PCR products of plasmid DNA of E5 clones show VH and Vkappa had common characteristics shared by other known variable region of antibodies. The mouse phage Fab antibody could be used for identifying H-Y antigen, and for the development of sex determination of early embryos in mammals.
{ "pile_set_name": "PubMed Abstracts" }
The present invention relates in general to computer input systems and in particular to a system for acquiring and validating computer input data produced by a touchscreen. A touchscreen typically comprises a set of photodetectors and a set of light emitting diodes (LEDs), one LED corresponding to each photodetector. The photodetectors and LEDs are distributed along the edges of a computer terminal screen with each LED and its corresponding photodetector being mounted on opposite edges of the screen so that each LED transmits a beam of light across the screen to its corresponding photodetector. The LEDs and photodetectors are arranged so that some light beams produced by the LEDs traverse the screen in a vertical direction while other light beams traverse the screen in a horizontal direction. The horizontal and vertical light beams are spaced so as to form a regular, rectangular grid in front of the screen. Parallel beams are close enough together so that when an operator touches the screen with a finger, the finger usually prevents at least one vertical beam and at least one horizontal beam from striking its corresponding photodetector. Each photodetector produces an output signal of a high or low logic state depending on whether or not it detects the corresponding light beam, and the position of the operator's finger on the screen can be ascertained from the state of the photodetector output signals, provided the finger intercepts at least one horizontal and one vertical beam. Touchscreen systems are commonly used in computerized systems such as digital oscilloscopes which display menus on a screen because a touchscreen permits an operator to make a menu selection by directly touching a selectable item on the displayed menu rather than, for example, by depressing a pushbutton elsewhere on the oscilloscope. In such an application, a touchscreen not only eliminates or reduces the need for pushbuttons, it also tends to reduce opportunity for operator error since menu item selection is direct and intuitive. Typically an interface device responsive to the output signal produced by each photodetector will store data indicating the state of each photodetector in a memory device. Touchscreen systems of the prior art typically utilize either of two methods for transferring the stored touchscreen state data to a computer so that the computer can determine from this data when and where the screen is being touched or "untouched". According to a "clocked" method of the prior art, the computer periodically reads the stored touchscreen data, determines whether any change in the data has taken place and takes appropriate action. According to an "interrupt" method of the prior art, the interface device includes provisions for determining when a change has occurred in the touchscreen data and sends an interrupt signal to the computer indicating a change in the touchscreen data. The computer then reads the data stored in the memory device to determine how the state of the touchscreen output signals have changed and then takes appropriate action. In order to provide prompt response to operator input, it is necessary when utilizing the clocked method to read the touchscreen state data fairly often. Since the process of reading and analyzing all the data typically takes a substantial amount of processing time, the processing time overhead in monitoring the touchscreen is fairly high. In applications where operator input through the touchscreen is relatively infrequent, the computer processing time overhead for handling touchscreen input can be reduced by utilizing the interrupt method because the computer reads and processes touchscreen data only when the operator has just touched or "untouched" the touchscreen. However the interrupt method can be troublesome. An operator's finger normally shakes no matter how steady he tries to hold it, and when the edge of operator's finger is close to one or more beams, this normal vibration of the finger can cause the finger to intermittently intercept the beams. This in turn causes the scanning device to repeatedly interrupt the computer to tell the computer that the operator has changed the touchscreen input. The computer responds as if the operator were making repeated, alternative touchscreen input selections and may carry out a succession of actions unintended by the operator. The computer may also carry out an unintended succession of actions when the operator rapidly moves his finger across the screen without first moving his finger out of the light beam grid. What is needed is a method for providing touchscreen state data input to a computer which does not utilize large amounts of computer overhead during periods when an operator is not touching a touchscreen or when an operator's finger causes the data to change several times in rapid succession.
{ "pile_set_name": "USPTO Backgrounds" }
Site Navigation Here is a screenshot of our site with the menu topics expanded. Just “mouse over” the menu topics and they will expand as in this image. I’ve also pointed out how the links throughout the website are yellow gold. Click on the “yellow gold” links and they will take you to the new pages throughout the website. I hope this helps those of you who are new to our website and websites in general. I never have overweight dogs because I use portion control. If one of my dogs is gaining weight I cut back on how much I serve. The homemade dog food recipes I feed are very nutritious and make this method easy. Feeding kibble can be problematic because of the high carb content of kibble. The high carb content can cause a dog to pack on the fat. Try feeding you dog the easy raw dog food recipe and use portion control. Click here to view this dog food recipe. Thank you Ed….great meal for your little ones. I have 8 dogs currently and they are big dogs including four seniors and a Pit Bull who is developing problems with her spine. I’ve been feeding them home made food for about ten years. My husband has been unemployed for a year now and I’ve been mixing home-made with Science Diet mainly as the kibble helps stretch it out. Would you have any suggestions about making treats with fruit? Thanks so much, your video and information is excellent! I try to avoid kibble all together. A good treat is to cook some beef liver, then cut it up into bite size pieces. I do this then store it in the freezer. For something easy, click here to view a good freeze dried beef treat that does not contain any fillers. Hi Ed I just started my 5 year old american Bulldog that has lots of Allergies on homemade dog food, He has taken to it he loves it. But I am worried that it is not enough Vitimins or I might be missing something, The food is boiled chicken,Carrots,broccoli, rice, and sweet Potatoes what do you think about a supplement ? and if so which are good products? You site is great !!!! you are right you need to feed some supplements to prevent a nutritional deficiency disease. Try the “easy cooked dog food recipe” it has good supplement recommendations. Click here to view this dog food recipe. Hi, I love your website! I have had dogs for 4 years and my first dogs as an adult (49 years). I was given a Toy Poodle and then a friend couldn’t care for his Rat Terrier and the two had puppies and I kept one: a “Rattle” I suppose.. Anyhow, I am so confused as to give my dogs a better diet and a long life without all the fillers, and colors added. I am looking for recipes with cooked meat since I fear the bacteria in meat now unless it’s organice and I cannot afford ogranic now. I have 3 Chi-Chi s and 1 French Bull dog. I was tired of the Commerical Dog food and all the added problems and cost that comes with it. I decided to start making my own dog food by starting off with the Easy Cooked dog food recipe on this websit. We just started it and they really seem to like it. I use to feed my dogs twice a day and I am not sure if I should with the homemade dog food. Can any give me some advice on this? Also, if it’s ok to do so, what amounts do I following? Hi we just rescued a German shepherd from the German shepherd rescue and she has had really bad diarrhea but is drinking plenty of water. I’m feeding the same kind of food they were so I was curious if there is something I could make for her cause she is now not eating that much. I am very intrigued by your website and homemade dog food. I have a awesome Yellow lab who just turned 8 and she has allergies to everything. I was feeding her “Go” but they just changed the ingredient from sweet potato to white potato which she can’t have. She has a list of things she cannot eat. Eggs is one and the list continues. I would love to make her food from scratch but your recipe has eggs and rice..she also has a problem with her small intestions they are shaped like a u and she has “Colic” episodes which we have corrected by feeding her bran with her dry dog food..We have learned to keep her “Colic’ like problems to bay by braning her like I bran my horses. So what I am trying to ask her is how do you go about making a homemade food when she has so many allergies..do you have any suggestions. Would greatly appreciate your help, my vets have been trying to force me to feed her foods that are not good for her..thank you blessings I think dogs develop allergies because their systems are running on empty. So constantly removing items as they develop a sensitivity just adds fuel to the fire and makes it worse. I would try and feed the most nutritious homemade dog food and see if you can’t get items to drop off the list. Hi Ed, I have a 3 year old goldendoodle who has had stomach issues since 6 months. He is allergic to chicken, fish, and we think grain. At this point we have been feeding him Dr. Harvey’s Veg To Bowl and cooking ground beef and ground lamb and adding digestive enzymes. I really like your recipe and was wondering if potatoes can be a substitute for the rice and should veggies be added? FYI : We have tried raw food and he hates it 🙂 Thank you! Hi, I have two four legged children, one is a Aussie (11 yrs. young) and the other Pit-mix (9 months). My Aussie was dianosed with a heart condition in late 2011 and the puppy seems to be alergic to commerial to dogfood. I ‘m now trying to make homemade food, I have started with chicken, rice, peas, carrots and boiled eggs with the shells. They LOVE IT!! I have been giving my Aussie fish oil since day one, and now my puppy. Is there something else that I should be adding to the homemade food?? I have a small 9 year old dog I rescued. She was allowed to eat wet cat food anytime she wanted it. She weighs 17 lbs. and should weigh approximately 12 lbs. She weighed 18 lbs. when I got her 2 1/2 weeks ago. I fed her buffalo bill WD and Hills WD. She will no longer eat either. I baked a chicken breast and she ate that with English peas. She will not eat green beans. What is a good recipe to give her so she receives needed vitamins, etc. and still lose weight? Hi Ed, I just watched your video on making the homemade dogfood. It looks great and I’m going to make some. Can I order the supplements on line? I am also a animal lover:). Thankyou for making the video. Heidi Hi Ed, I have a new puppy coming to me in a few weeks. She will come having been started on puppy chow. What is the process to start a new puppy on the raw recipe. I am concerned about weight loss. My older dog lost a couple of pounds starting out on this diet. He is doing fine now. Any suggestions for the new puppy? My first time on your site, it is very straightforward and a wealth of info., this certainly won’t be my last. My husband and I have two Aussie Cattle dogs, ages 4 and 6 years. They run around on our 65 acre farm all day and are always there to move horses, or even our chickens. I do not make food for them now, but this is my goal. My question is can I use cattle organs from my local buthcher? We buy our beef from a local farm and our local butcher cuts and wraps it for us. He always asks if we want any of the organs or bones. We have always said no thank you until this year thinking maybe I could use these for dog food. If so will you plesase note if there are any beef organs that a dog should avoid, and how they should be prepared. i.e. cooked, ground up, used in replacement of grnd. beef? I have been reading your website and am very interested in trying your “raw dog food recipe.” How long will this last in the fridge?I was in the pet food store the other day and there was a speaker talking to a bunch of people promoting their dog food. Someone spoke up and said that service dogs that ate raw food were not allowed in hospitals if they ate this kind of diet because they could have samonella and other bad bacteria in on their teeth and in their mouth. Also if they pooped it would be in their as well so they were very cautious because it could expose patients to it. Was wondering what you thought and if we need to be concerned? Thanks Dogs are like reptiles and normally have salmonella in their system. That said, they are going to get it on their whiskers. So if you are concerned feed one of the cooked dog food recipes like the chicken and rice dog food recipe. I have 4 toy poodles. I did the 24 hour fast and started them on this home made diet with the dinovite and lick o chops. They seemed to do fine the first 3 days. On the 4th day they all had diarrhea one also had blood. I tried cooking the beef some and leaving it pink but I dont know about this. They stay in their crates during the day while we are at work and we cant come home to this mess every day. Any suggestions. hi i was wondering if you know of any sort of recipies that are good for a dog about 5 years old and is a pomeranian and seems to be stuck on table food and treats.. i know this isnt good for him. i try regular dog food he wont touch it. i give him vitamans to try and supliment what he dosent eat and thats hard to keep up with. i gess what i am asking is do you have any realy good recipes that even this dog might like ? and any good vitimans that i could put in his meals being of a small breed that he is . thank you! About Us My name is Ed Lukacevic and I'm an incurable animal lover! I have spent my life working with birds, reptiles, horses and especially dogs. Optimum nutrition for the animals in my care has been my passion. Ads Archives Recent Posts homemadedogfood.com Our goal is to help you feed your dog the healthiest food possible. We believe the best dog food is made at home with healthy ingredients. Reward your dog today with healthy, tasty dog food you make in your own kitchen.
{ "pile_set_name": "Pile-CC" }
Pages Friday, March 20, 2015 Onward to Oxford: Falmouth Falcons As part of our efforts to preview all 32 teams competing in the European Quidditch Cup (EQC), the Quidditch Post is chatting with representatives from each team. Today we spoke with Nathan Jones, captain of the Falmouth Falcons. Photo by: Alice Clark Quidditch Post: Falmouth was one of the last two teams to qualify for EQC, only gaining a slot when no other team filled the "other" slots. What does it mean for the team to have the opportunity to compete? Nathan: To be honest, it means an awful lot. It's only been a year since we competed in our first tournament, and the team has come leaps and bounds. This EQC spot just proves to the rest of the UK what I have always known: that Falmouth is becoming a force to be reckoned with. At times it's been a struggle to get the team to realise its own quality, and I think the qualification will help the players realise that if they keep pushing forward as hard as they have been, then it's possible that this team could become something that's really special. QP: What are your goals for EQC? Nathan: First and foremost, our goal is to learn. There is going to be a wealth of talent at EQC, and we hope to use our experience there to develop ourselves as a team. As for ranking-based goals, we are pretty open-minded. To say that we are happy wherever we finish is not true, as we always strive to win regardless of the quality of the opposition. It just wouldn't be in our nature not to strive for the best possible outcome. A lot of teams will be expecting us to simply roll over due to the nature of how we qualified, but that could be their downfall. We have defied expectations in the past, and we won't be stopping that now! QP: As far as the experience, what do you hope the team takes away? Nathan: I suppose the most important thing to take from it will be the big game experience. Knowing how to handle the pressure of a large-scale tournament and how to compete against the bigger teams is what separates a top 10 team from a real contender. We want to be real contenders, and as such are going to have to learn how to play in the big matches. From a slightly less competitive perspective, I hope my players have a great time. They have all worked so hard this year and really deserve to have a great experience. QP: Are there particular teams you hope to play? Nathan: There's the usual British teams that we hope to rematch with, the foremost of which is probably the London Unspeakables, who we have a really strong relationship/rivalry with. We are also looking forward to facing the unknown in a host of European teams we don't have any experience of. Oh, and Paris Frog; we have heard the team is very good, and we love to play the best. QP: Who would you say are some of Falmouth’s key players? Nathan: There's an obvious answer there in Alex Brown. He's fast and clever in his seeking, and I know that if we hold teams within SWIM, we always have a good chance of coming out on top. But over the last couple of tournaments, there has been a real upturn in quality amongst a large proportion of our team. Conor Watson, after switching to keeper, has become a real dynamic player who is able to influence plays at any time. Liam Parr, if he can stop following my lead and getting injured constantly, is capable of banging in hoops. On the beater front, Alicia Ackroyd had a really amazing British Quidditch Cup to add to some already talented beaters in our squad. However, the way we play quidditch relies on there being a high standard throughout the team, and as such key players become less important in comparison to cohesion. I know it sounds cheesy, but it's true; any player on our squad is capable of positively influencing the outcome of games on their day. QP: How would you describe the team's style? Nathan: I would probably have to say instinctive. We rely on everyone to know where their teammates are at all times, which means we can pick out gaps in a defence and capitalise on them quickly. We probably spend less time near the hoops than most other British teams, but if we're there, then there's a good chance we are going to score. It's a style that is developing at all times, and we are hoping that EQC gives us a chance to test it out against a wider variety of opposition. QP: Falmouth is one of the most isolated teams in the UK; do you think that has any impact on the team? Nathan: At the start, yes. It took at least six months for us to get enough tournament experience to be competitive, but now that we have got that it really doesn't impact us on pitch. In the last couple of months, we have been to Southampton, Oxford, Nottingham, and even Edinburgh. We have a fantastic president who works in conjunction with the committee and ensures that we never miss out on playing opportunities. Ultimately, that combats any disadvantages we may suffer from due to our location. QP: Anything else you think our readers should know about Falmouth? Nathan: Not particularly. We're a friendly bunch, so if they do have any questions, come visit us at EQC; we can usually be found at our small Cornish camp that we always set up at tournaments!
{ "pile_set_name": "Pile-CC" }
Q: Why is "All horses have the same color" considered a false proof by induction? Upon reading of All horses have the same color "paradox", I began to wonder a couple of things. First of all, to me the inductive step seems flawed. Just because I have $n$ white horses, does not mean that the $n+1$ will be white, too. The only explanation to make the inductive step work seems to me that the actual statement we are assuming as base case it's not "there are at least $n$ horses of the same color", but rather "$P(n)$ = any grouping of $n$ horses is such all the horses in that grouping have the same color". Now this makes the inductive step works, but it's completely useless, as $P(2)$ already implies that all the horses have the same color. And of course the base case $P(2)$ is not true because it's equivalent to our problem. Setting to prove $P(2)$ is the same as proving that all horses have the same color. So I can't understand why this has been considered a "false" proof by induction; either the inductive step does not work or it's completely useless. The wikipedia page linked before explains the problem as The problem in the argument is the assumption that because each of these two sets contains only one color of horses, the original set also contained only one color of horses. Because there are no common elements (horses) in the two sets, it is unknown whether the two horses share the same color. Which does not make any sense to me.. It's like looking at the finger instead that at the moon. Is there something wrong with my understanding of induction? Edit Admittedly, the base case is $P(1)$ and not $P(2)$. But the point holds;the only implication we need is $P(1) \implies P(2)$. All the subsequent implications are useless; a proof of this type is seldom called a proof by "induction". Otherwise all proofs are by induction! :) What is even the point of establishing what $P(n)$ is? Just prove $P(2)$ and use as known fact $P(1)$ as you would do with any other known fact. Edit 2 Since there has been some confusion about what I asked, I'll explain my thought process: 1) Begin reading the proof. Imagine that the statement is "P(n) = at least n horses have the same color", and if by induction on $n$ this hold for every $n$, then QED. 2) Realize the inductive step does not work 3) Understand that the proposition to be proved has been (silently) changed and now it's "P(n) = any grouping of $n$ horses is such all the horses in that grouping have the same color"." 4) Realize that $P(2)$ is what we want to prove. 5) Wonder why on earth we are trying to show $P(n)$ for $n > 2$. Induction proof usually works because the final statement to be proved come from the fact that it works for all $n$. Here $n=2$ suffice, so it is really odd. 6) Starting to think I've missed something here. But hey, it's a false proof, let's see what was wrong. 7) Turns out that the outline of the proof is fine but here's the catch: of all the implications $P(1) \implies P(2)$ is not valid hence the whole $P(n)$ cannot be valid. 8) Thinking (again) that this seems weird. Wonder if I've missed something . By extended discussion it turns out that my understanding of induction was right. This lead me to believe that is is a bad example because it "seems" like a proof by induction but really some essential elements are not present. It's not that is wrong (apart from the failed implication), is that it gives a very bad idea of what a proof by induction is A: The flaw lies in the sentence "the first horse in the group is of the same color as the horses in the middle, who in turn are of the same color as the last horse". When $n=2$, this does not apply as there are no horses "in the middle", hence the "first" and "last" horses needn't be of the same color. So $P(1)$ holds, and $P(n)$ does imply $P(n+1)$, but provided $n>2$: this suffices to ruin the argument. A: Yes, proving $P(2)$ is good enough and you don't really need induction. The trouble is that $P(2)$ is false. The induction argument is there to obfuscate this fact by referring to a generic $n$ and hoping the reader doesn't notice that the general argument fails for $n=2$. That's why it's a false proof by induction.
{ "pile_set_name": "StackExchange" }
Filed 6/3/14 In re C.M. CA2/8 NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication or ordered published for purposes of rule 8.1115. IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA SECOND APPELLATE DISTRICT DIVISION EIGHT In re C.M., a Person Coming Under the B248239 Juvenile Court Law. (Los Angeles County Super. Ct. No. CK97329) LOS ANGELES COUNTY DEPARTMENT OF CHILDREN AND FAMILY SERVICES, Plaintiff and Respondent, v. TAMMI A., Defendant and Appellant. APPEAL from an order of the Superior Court of Los Angeles County, Terry T. Truong, Juvenile Court Referee. Affirmed. Patti L. Dikes, under appointment by the Court of Appeal, for Defendant and Appellant. John F. Krattli, County Counsel, James M. Owens, Assistant County Counsel, and Jessica S. Mitchell, Deputy County Counsel, for Plaintiff and Respondent. ****** Tammi A. (mother) appeals from the juvenile court’s dispositional order issued pursuant to Welfare and Institutions Code section 361, subdivision (c)(1),1 contending substantial evidence did not support removing her daughter C.M. from her custody. Mother further contends the juvenile court abused its discretion in releasing C.M. to her father Gene M. (father)2 on the condition that he and C.M. reside with her paternal grandparents and prohibiting father from monitoring mother’s visits with C.M. We conclude the juvenile court erred in relying on section 361, subdivision (c)(1) because C.M. did not reside with mother at the time the petition in this case was initiated, but the error was harmless because the juvenile court’s order fell well within the discretion granted under section 361, subdivision (a)(1), the applicable provision. We also find no abuse of discretion in the other conditions set by the juvenile court. We therefore affirm. BACKGROUND C.M. was born in March 2011. She lived with mother and her maternal grandmother for the first few days of her life until father and her paternal grandparents removed her from mother’s care. C.M. then apparently resided with mother and father between March and May 2011, but when father was arrested for drug offenses in May 2011, father left C.M. with her paternal grandparents. The paternal grandparents filed a petition with the probate court in June 2011 for temporary legal guardianship, which was granted. That probate proceeding generated this dependency case based on a referral pursuant to Probate Code section 1513, former subdivision (c).3 On August 1 All further statutory references are to the Welfare and Institutions Code, unless otherwise indicated. 2 Father is not a party to the instant appeal. 3 At the time of the referral, Probate Code section 1513, former subdivision (c) required the probate court to refer the case to the relevant social services agency for dependency investigation if there are allegations a parent is unfit. (Prob. Code, § 1513, former subd. (c), amended by Stats. 2012, ch. 638, § 14; see In re Kaylee H. (2012) 205 Cal.App.4th 92, 101.) If the social services agency files a section 300 petition, “the juvenile court has exclusive jurisdiction of all issues regarding custody 2 12, 2011, the probate court terminated the paternal grandparents’ guardianship,4 but C.M. continued to reside with her paternal grandparents, not with mother, at least through the January 15, 2013 filing of the petition in this case. 1. Original Petition, Detention Report, and Hearing The Los Angeles County Department of Children and Family Services (DCFS) filed the instant petition on January 15, 2013, pursuant to section 300, subdivision (b) alleging in count b-1 that mother had a six-year history of substance abuse, currently used methamphetamine and marijuana, had used marijuana while pregnant with C.M., had tested positive for marijuana on October 24, 2012, and had been under the influence of marijuana while C.M. was in her care. In count b-2, DCFS alleged mother had mental and emotional problems, including diagnoses of depression and postpartum depression, and she had failed to take her prescribed medications. DCFS alleged mother’s actions put C.M.’s physical health and safety at risk. The detention report noted mother had been the subject of a referral in March 2011, one day after C.M. was born, alleging mother had been using marijuana and had been diagnosed with bipolar disorder but had been off her medication during her pregnancy. According to the investigation, mother admitted using marijuana and going off her bipolar medication when she found out she was pregnant, although she claimed to have restarted her medication and had an appointment with her psychiatrist in May 2011. She stated C.M. was with her father, and her paternal grandparents cared for her while father worked. Mother said father did not allow her to have unsupervised visits because there was a “post partum incident” after C.M. was born. Mother would not go into detail, but she said she had been texting father “a lot of crazy stuff.” When asked, mother stated she had “no plan” for C.M. Father reported and visitation of the child, and all issues and actions regarding paternity of the child.” (Kaylee H., supra, at p. 102.) 4 We grant the parties’ joint request to take judicial notice of the docket in the probate case. 3 he had C.M. since she was two days old, and mother had sent him “mean text messages,” which concerned him. When he removed C.M. from mother’s home, he did so with the maternal grandmother’s consent. He said he was willing and able to care for C.M. and had arranged for his parents to watch her while he worked. He wanted mother in C.M.’s life, but he thought visits needed to be supervised for now. DCFS substantiated the allegations of neglect and that C.M. was born positive for marijuana, but it nevertheless closed the referral because C.M. appeared well cared for with father, who was protective and would not allow unsupervised visits by mother. Moreover, mother was living with the maternal grandmother at the time, who felt mother was not a threat to C.M. and did a good job caring for her. In the June 15, 2011 guardianship petition, C.M.’s paternal grandparents also claimed mother had severe mental health issues, had been diagnosed with bipolar disorder, and did not stay on her medications. Mother also had a drug abuse history, as did father, and C.M. tested positive for marijuana at birth. A September 20, 2012 referral based on the probate matter alleged C.M. had been the victim of emotional abuse and general neglect by mother, and general neglect by father. It noted C.M.’s paternal grandparents had initiated the guardianship action based on mother’s mental health issues, failure to take her medication, and sending father text messages when C.M. was born, stating she wished C.M. was dead and she was going to harm herself by driving off the road. It noted both mother and father had a history of methamphetamine and marijuana use. A social worker met with father, C.M., and the paternal grandparents on September 25, 2012. The social worker observed C.M. was appropriately groomed and dressed, she appeared happy and comfortable, and she was free of obvious marks or bruises. Father stated mother had mental health issues and often texted him inappropriate messages. Two days after C.M. was born, he and the paternal grandparents took C.M. from mother and the maternal grandmother. At that time, father and the paternal grandparents were going to visit C.M. when father received 4 “disturbing text messages” from mother. When they arrived to see C.M., they found mother was gone and C.M. was left with her maternal grandmother and a friend. Following that visit, father and the paternal grandparents had C.M. in their care until May 17, 2011, when father was arrested for drug issues. After his arrest, he arranged for C.M. to live with her paternal grandparents. Father said C.M.’s maternal grandmother agreed, telling him to “get the baby out” of the environment. Father admitted he had a drug problem, but he was now drug free, claiming he had stopped using drugs over a year prior. He reported completing a “prop 36” program and continued to pay for hair follicle drug tests every 60 days to provide to the probate court. He reported living by himself, working full time, attending Narcotics Anonymous meetings, and visiting C.M. daily. He expressed concerns about mother’s capability of caring for C.M. and believed C.M. was safer with her paternal grandparents. He favored the paternal grandparents being granted guardianship but expressed that he would eventually like to have custody of C.M. The paternal grandparents reported they had ongoing concerns with mother’s mental health status. The paternal grandmother cited an incident during which she invited C.M.’s maternal grandmother and mother to attend an outing to a museum, during which mother “had an outburst” and cornered the paternal grandmother in an intimidating manner. The paternal grandmother stated mother goes “back and forth” thanking the paternal grandparents for taking care of C.M. She was also unaware if mother was receiving mental health treatment or currently using drugs. The paternal grandfather and father reported mother continued to text father random inappropriate messages, such as when she wrote, “I can’t wait to stick this needle in me deep . . . .” The paternal grandfather stated even after mother sent those kinds of messages she would show up for visits appearing fine. The paternal grandmother also stated mother sent text messages and made statements implying the paternal grandmother and father had inappropriate sexual relations and that the paternal grandfather was a pedophile. They stated none of those claims were true. 5 The social worker met with mother on October 2, 2012. Mother denied the allegations, but admitted she used marijuana one month prior to C.M.’s birth and C.M. was born positive for marijuana; admitted she was bipolar and did not take her medication during her pregnancy; and admitted she suffered postpartum depression after C.M. was born. She reported she had resumed taking her medication and was under the care of a psychiatrist she sees every two to four months. She admitted texting father after C.M. was born, but denied saying she wished C.M. was dead. She explained she was texting father the “horrible things” he had said to her because she had been exhausted after giving birth and father had insulted her during labor. She further explained that, after she and C.M. had come home from the hospital, the maternal grandmother told her to get some air and leave C.M. with her, which mother did. However, she left at the time she was supposed to take C.M. to the paternal grandparents’ house for a visit. She texted father to say C.M. was not with her, which she believed scared father when she did not show up at the paternal grandparents’ house with C.M. She said she was just “venting.” The maternal grandmother asked the paternal family for help, so father and the paternal grandparents took C.M. to their home, and she stayed there for the weekend before going to live with father. Mother also went to live with father at that time, and the paternal grandparents provided daycare while mother worked. Mother confirmed father was arrested in May 2011 for drug-related issues, after which he refused to bring C.M. to mother and left her with the paternal grandparents, who insisted on keeping her. Mother claimed she did not have a car so C.M. remained with them. Mother eventually went to law enforcement for assistance in getting C.M. back, but they could not help her because she did not have a formal custody order for C.M. She then went to court to obtain a custody order on the same day the paternal grandparents filed the guardianship petition in probate court. She said she did not support the paternal grandparents getting guardianship because she wanted custody of C.M. and believed they were not encouraging a bond between her and C.M. 6 Mother admitted a history of drug use, claiming she “didn’t use drugs until [her] mid 20’s.” She said “it’s been months” since she used methamphetamines. She used marijuana “3 or 4 weeks ago” and produced what appeared to be a medical marijuana card set to expire in November 2012. She provided the social worker with the negative results of a hair follicle test on May 7, 2012, and a “parenting certificate” dated January 5, 2012. She indicated she wanted C.M. returned to her. Mother tested positive for marijuana on October 24, 2012. In an October 26, 2012 “upfront assessment” by the Santa Anita Family Service, mother reported first using cocaine, cannibis, and methamphetamine at age 22 and using cannibis a week and a half prior to the assessment when she was given a medical marijuana card to help her with anxiety and depression. She denied having a substance abuse problem and did not see a need for alcohol or drug treatment. The report noted that although mother had completed an 18-month program for co-occurring disorders following a 2006 conviction for methamphetamine possession, she was minimizing her substance abuse and should be subject to random drug testing. DCFS conducted a team decisionmaking meeting on January 10, 2013, with mother, father, the paternal grandparents, the maternal grandmother, and C.M.5 At the meeting, mother claimed she had been “sabotaged” and the paternal grandparents wanted to keep C.M.; similarly, the maternal grandmother claimed the paternal grandparents had “plotted” against mother. Mother wanted to receive DCFS services and the maternal grandmother believed mother should receive them. Father stated he did not feel able to care for C.M. on his own and was open to DCFS services. The paternal grandparents stated, “all we care about is [C.M.]” During the meeting, mother exhibited erratic behavior by speaking loudly, twisting in her chair, and standing up in an aggressive way, all of which resulted in security escorting her out of 5 There was another referral on January 4, 2013, also apparently arising from the probate case, alleging emotional abuse and general neglect by mother and neglect by father. After investigation, the allegations of emotional abuse were deemed unfounded and the allegations of general neglect deemed inconclusive. 7 the meeting room. In light of these actions, DCFS remained concerned about mother’s mental health stability, even though mother claimed to have continued taking her medication. The meeting resulted in DCFS detaining C.M. because, although C.M. was not at current risk of abuse or neglect with her paternal grandparents, neither mother nor father was suitable to provide care for C.M. at that time. As for father, his visits were to remain monitored by the paternal grandparents. Even though he had completed a drug program, parenting course, and hair follicle drug tests, he admitted he was not ready to provide care for C.M. on his own. Mother’s visits also remained monitored as ordered by the probate court, even though she completed a parenting course and submitted to hair follicle tests. DCFS noted mother tested positive for marijuana in October 2012. Both mother and father agreed C.M. could be placed with the paternal grandparents while DCFS filed a petition. The court held the detention hearing on January 15, 2013. Mother expressed her desire to have “as much visitation as possible. It seems that the probate matter has drug on for around two years now, and mother has not always been able to arrange visitation with the paternal grandparents. Mother reports that they’re not very supportive of reunification and often changed the visitation schedule. So we’re just asking for specific visitation orders.” DCFS indicated it was important that the court order monitored visitation for mother and that father not monitor those visits. The court detained C.M. from mother and released her to father’s custody on the condition he reside with the paternal grandparents and continue to drug test “clean.” The court ordered mother and father to stay at least 100 yards away from one another; they were also to have no contact in any way, including by electronic means such as email and text message. Both were ordered to participate in random drug testing and mother would be provided with no or low cost referrals to a drug program. Mother was awarded no less than four hours of visitation a week and father was ordered not to monitor mother’s visits. 8 2. Amended Petition and Section 385 Application DCFS filed an amended petition on February 25, 2013, adding count b-3 alleging father had a 15-year history of methamphetamine abuse, currently abused alcohol, and had a recent toxicology screening indicating diluted results, all of which put C.M.’s physical health and safety at risk. In the detention report, the investigator explained father initially denied any knowledge of the diluted test result, but then admitted he had been drinking “a few beers while working on [his] house.” He did not realize the toxicology screening included alcohol and he did not want to test positive for it. The paternal grandmother expressed willingness to care for C.M. and to monitor father’s visits with her. The report indicated mother continued to have visitation one time per week monitored by DCFS staff. Based on the same diluted test result, DCFS also filed a section 385 application to modify the existing court order releasing C.M. to father with family maintenance services. It recommended C.M. be removed from father’s care and placed with her paternal grandmother.6 At a February 25, 2013 hearing on the amended petition and the section 385 request, the court dismissed the original section 300 petition in favor of the amended petition and granted the section 385 petition, detaining C.M. from father and ordering her placed with the paternal grandmother. At the hearing, mother complained the paternal grandparents have allowed her to have “barely . . . two hours of visits per week.” As a result, the court ordered that parents were to have weekly monitored visits for a minimum of four hours. 3. Jurisdiction/Disposition Report and Hearing In preparation for the combined jurisdiction/disposition hearing set for March 4, 2013, an investigator met with C.M., who was very active, running, jumping, sitting in a chair independently, playing with toys, and throwing a ball. She said “hi” and “bye” 6 Because the paternal grandfather had arrests from 1966 and 1967, he had moved out of the home until DCFS could obtain a criminal waiver. 9 and the paternal grandmother reported she could say a few other words. She did not display any emotional or behavioral issues. Mother was interviewed, during which she paced and wrung her hands to the point they were red, and she did not make eye contact with the investigator. Regarding the allegations of substance abuse, she once again admitted she tested positive for marijuana when C.M. was born, but she had a “card” so she believed she was using it legally to help with her moods. She denied smoking it daily. She admitted “[m]ethamphetamine is in [her] history” and she took it and other prescription drugs without a prescription. She had an ADHD7 diagnosis and was “experimenting.” She was in a two-year program for “co-occurring” diagnoses, and she moved to Orange County in 2006, where she completed a program through “Prop 36.” She was in a 90-day inpatient program and a sober living program. She claimed to have taken Adderall “[f]rom time to time,” but denied using “street drugs.” She sometimes went to meetings, but not often lately because she would go for hikes or ride her bike to get natural adrenaline to keep her “very balanced.” She stated she and father used methamphetamine “from time to time” during their relationship. Mother further explained she had a bipolar diagnosis, which was first diagnosed when she was 17 years old, and again when she was 22, at which point she was given medication. She was also diagnosed with posttraumatic stress disorder stemming from a childhood molestation. She had psychotic episodes when she was a teenager through her early 20’s and she was hospitalized, but she claimed it had not happened recently. She got into the habit of taking her medication while she lived in Orange County, and identified several different medications she was taking currently. She said she had a couple of upcoming therapy and psychiatric appointments. She claimed the paternal grandparents took C.M. from her. When father was arrested in May 2011, the paternal grandparents lied to her and said he was away on a business trip, at which point they detained C.M. Mother could not do anything 7 Attention Deficit Hyperactivity Disorder. 10 because she did not have a custody decree. When the court released C.M. to father’s custody, mother did not understand why. She claimed the paternal grandmother had an “unhealthy attachment” to C.M. and she had made false allegations against mother based on text messages mother sent to father. She said father got “kind of abusive” to her while she was pregnant. She had not been taking medication while she was pregnant and experienced a “crash of emotions” after C.M. was born, prompting her to “vent[]” in text messages. She admitted sending text messages like “Die baby, die,” but claimed she was only repeating things father said to her while she was pregnant. She also admitted sending text messages to father and attempting to speak with him after the court issued the no-contact order, but father did not respond. The report attached approximately 25 pages of text messages and calls from mother between March 2011 and January 2013. Mother also claimed the paternal grandparents and father “did some kind of family abduction.” Because they would not answer the phone, mother and a friend named Paula drove by the paternal grandparents’ house and saw them leave with C.M. Mother followed them and called the police, but because father was with C.M., the police took no action. Mother confronted them in the lobby of a hotel at a casino and they would not let her see C.M. Father told the investigator he and mother met when they were both using drugs. He did not think she was using drugs much during her pregnancy, but he was not sure. He said she would not take the follicle tests after a while because they were too expensive. He stopped speaking with her when the no-contact order was issued, but she continued to contact him. He admitted to multiple substance abuse arrests, but indicated he attends alcoholics anonymous and narcotics anonymous meetings and has been able to abstain from using drugs by focusing on his relationship with C.M. But in DCFS’s view, he had not demonstrated a long period of stability or that he was willing and able to care for C.M., which put C.M. at risk of future abuse and neglect. With regard to the allegations of mother’s mental and emotional problems, father said, “I had never seen any of [mother’s] mental health issues because they 11 didn’t come out until after [C.M.] was born. Did you see the text messages? She said horrible things.” He said he received a phone call from a 323 area code the previous week and he thought it was his boss. But it was mother, and when he called the number back, he reached the inpatient mental health department at Kaiser Permanente. Even though they were supposed to have no contact in light of the court’s order, mother texted him four hours after court adjourned and had since sent him about 75 text messages. One time he went to his house and she was there, but she took off when he called the police. He also learned at some point she had found a note on his front door containing the phone number of his high school friend, and she began calling him. Father “can’t begin to understand why.” In his opinion, mother “has problems.” The paternal grandparents were also interviewed. The paternal grandmother did not know much about mother’s drug history but “suspect[s] she’s using when she gets this dark look in her eyes. It’s a hateful, ugly look. She sweats profusely, all the way through her blouse. She will go a few weeks where she appears OK, but that ends and she’s back to having issues, again.” The paternal grandfather knew father had been taking hair follicle tests, but when he offered to pay for mother to take those tests, she shaved her head. The paternal grandmother explained she did not know when mother would “go off on these episodes.” Mother told her she has psychotic breaks and, according to the paternal grandmother, “[s]he’s obviously suicidal.” She mentioned the museum incident when mother became “belligerent” and began screaming at her. Moreover, earlier on the day of the interview mother was supposed to visit C.M., but she got “out of control” and the social worker had to cancel the visit. The paternal grandmother explained she went to probate court after the incident of mother following them to the hotel at the casino, during which mother made a “horrible scene.” She did not think anything would help mother. The paternal grandfather reported mother had told him she had been put on a hospital hold before. He had received phone calls from a 323 area code and when he 12 called the number, he reached the inpatient facility at Kaiser Permanente, which made him think mother was there. Mother did things that did not “make any sense,” such as visiting C.M. with him monitoring and then posting messages on Facebook calling him a “faggot, pedophile grandfather.” He said, “I’m tired of this. We went to [probate] [c]ourt to protect [C.M.] It’s not what I thought I would be doing at this point in my life.” Mother’s friend Paula was interviewed and said she was with mother during her pregnancy. She claimed father was “very abusive to her,” including calling her “old and decrepit” in the delivery room. Paula said mother had no postpartum depression and was a great mother; she was just “really stressed out.” When mother said she was going to pick up C.M. after the paternal grandmother took her, the paternal grandmother said “no.” Paula was with mother when she followed the paternal grandparents, father, and C.M. to the hotel at the casino; she observed the paternal grandparents take C.M. to the hotel room and father block mother so she could not get to her. According to Paula, “[i]t was really traumatic.” Also attached to the DCFS report were the results of psychological testing of mother. Most of the results were rendered invalid by her unwillingness to fully reveal herself and her attempts to present herself favorably, but the evaluating doctor was able to conclude she had average self-esteem and self-confidence, she had a low probability of having a substance abuse disorder, and she would not likely overreact or be unduly harsh with children in her care. Another test suggested mother was conscientious, orderly, efficient, dependable, industrious, and persistent, although those results could have been caused by an individual who was interested in looking good in a testing situation. DCFS reported mother had a monitored visit with C.M. on February 7, 2013, during which mother became very aggressive toward the paternal grandmother, claiming the paternal grandparents had “stolen” C.M. The social worker intervened and determined the visit should not proceed as planned. Mother began yelling and was asked to leave. The social worker escorted mother out, reminding her to have no 13 contact with the paternal family. Mother became increasingly upset and said she should just “give up the fight” because the paternal grandparents “want my baby and no one is listening to me.” The social worker called for an ambulance because mother was so upset, but mother quickly walked away before it could arrive, stating she did not want to go to the hospital. The social worker recommended mother receive immediate counseling. A week later, mother was able to visit C.M. without the paternal grandparents present because the social worker arranged transportation for C.M. to avoid contact between mother and the paternal grandparents. The DCFS report also included two declarations from mother, along with numerous attachments, which largely recounted the facts described in the DCFS report. In the first declaration, she explained father urged her to have an abortion and, if she did not, the paternal grandmother would attempt to take C.M. and otherwise “cause problems.” Mother’s medical records indicated her methamphetamine use was in remission and she stated she did not use methamphetamines during her pregnancy due to concern for C.M.’s welfare. She also did not take any prescribed medications during pregnancy because she feared possible birth defects. She claimed that, while she was in the delivery room, father said she was “too old and decrepit” to have a baby and he hoped she would become incontinent and have “zebra-stripe stretch marks” all over her body. The paternal grandmother was there and silently condoned father’s remarks. After C.M. was born, father refused to be supportive in any way. After mother took C.M. home, father and the paternal grandparents took C.M. with the maternal grandmother’s consent, assuring her they would return C.M. the next day. A day and a half later, mother and father agreed to take care of C.M. together at father’s home. When father was arrested in May 2011, the paternal grandparents lied to mother about what happened. When father was released from jail, he became irate and threatened that the paternal grandparents would take C.M. and mother would not see her again. Mother recounted calling the sheriff’s department, which could not assist her, and she described the incident when she followed father and the paternal grandparents to the hotel at the casino to recover C.M. 14 Mother’s second declaration focused on alleged failures by the probate court and the DCFS and her fitness as a parent based on her parenting classes, counseling, drug testing and treatment, and psychological evaluations. For example, she completed a parenting class in January 2012; completed a 30-day individual counseling course in December 2011; participated in a chemical dependency treatment program at Kaiser Permanente between March and May 2012; and completed a five- month alcohol prevention and treatment and group therapy program in September 2011. As of June 2011, she was compliant with her medications and showed improvement. The juvenile court also received a letter indicating mother would attend a four-week intensive outpatient program in March 2013. She tested negative for drugs in July and September 2011, and May and June 2012. On this record, DCFS concluded mother’s erratic behavior did not appear to be under control. Although clearly she loved her daughter, “her mental health issues have not yet adequately been addressed at this time, and she had not been able to demonstrate she is emotionally stable at this time.” DCFS also noted she had an “extensive substance abuse history.” Although she did not use “street drugs,” she admitted illegally using prescription medication, despite having completed a full treatment program. She did not have an appropriate plan for sobriety and admitted to occasional use. She also admitted using drugs to help her balance her mental health issues. Her mental health issues compounded with her substance abuse issues would require an extensive amount of work, attention, and support, and she would need “extensive support and help prior to releasing [C.M.] to her care.” DCFS was concerned with father’s “conflicting perspectives” between his expressed desire to care for C.M. and his statements he was not ready to care for her on his own. Because father had not demonstrated a long period of stability or that he was willing and able to care for C.M., his “seeming ambivalence” about her care put her at risk of future abuse and neglect with him. DCFS recommended C.M. be declared a dependent of the court and detained. It recommended mother receive an Evidence Code section 730 evaluation and 15 participate in “Parents Beyond Conflict,” weekly random and on-demand drug testing, a substance abuse treatment program, and Narcotics Anonymous and Alcoholics Anonymous meetings. It recommended father receive family maintenance services and participate in weekly random and on-demand drug testing, an outpatient substance abuse treatment program, Narcotics Anonymous and Alcoholics Anonymous meetings, individual therapy, and Parents Beyond Conflict. It further recommended mother have monitored visitation. DCFS submitted a supplemental report for the March 4, 2013 hearing focused on the allegations of drug and alcohol abuse by father. The report noted father had regular visits with C.M. for more than four hours a week, which have been monitored by the paternal grandmother. Mother also had a four-hour visit with C.M. on C.M.’s birthday, which went well. However, on the same day the paternal grandmother reported that neighbors told her two women in a car took photographs of her house on February 26, 2013, and she believed they were mother and the maternal grandmother. After his diluted test results, father tested negative for drugs and alcohol. Mother failed to randomly drug test on February 8, 2013, but when the investigator reminded her to do so, she said she would. DCFS concluded that, although father reported he was prepared to care for C.M., C.M. remained at risk because father indicated he continued to consume alcohol regularly while leaving C.M. with her paternal grandparents and his position on caring for C.M. has “flip-flopped.” Thus, DCFS reiterated its recommendations in its initial report, but recommended both father and mother have monitored visitation. C.M. remained temporarily detained with her paternal grandmother. At the contested jurisdiction/disposition hearing on March 4, 2013, mother pled no contest for jurisdictional purposes to count b-1 related to her substance use. With certain modifications, the court found that count true as follows: “The child [C.M.]’s mother, Tammi A[.], has a history of methamphetamine use, and is a current user of marijuana, which renders the mother incapable of providing regular care for the child. The mother used marijuana during the mother’s pregnancy with the child. On 16 10/24/2012, the mother had a positive toxicology screen for marijuana. On prior occasions in 2012, the mother was under the influence of marijuana while the child was in the mother’s care and supervision. The mother’s substance use endangers the child’s physical health and places the child at risk of harm.” The court dismissed count b-2 related to mother’s mental and emotional problems, finding an insufficient nexus had been shown. The court dismissed count b- 3 related to father’s alcohol and substance abuse because insufficient evidence had been presented. The court proceeded immediately to disposition, declaring C.M. a dependent of the court and finding clear and convincing evidence there was a substantial danger to C.M.’s physical and emotional health and well-being if C.M. were returned to mother’s physical custody, and there was no reasonable means to ensure her safety without removing her from mother’s custody. Despite the record indicating C.M. did not reside with mother, the court ordered “[C.M.] removed from [mother], a parent with whom she was residing at the time the petition was filed.” Over objection by the DCFS, the court ordered C.M. released to father on the condition he and C.M. reside with the paternal grandparents. The court ordered father to participate in family maintenance services, random drug testing, and a drug treatment program if he missed any tests or tested “dirty.” The court ordered that mother undergo a psychiatric evaluation, take prescribed medication, and participate in random weekly drug testing, parenting classes, and individual counseling. She was given monitored visitation with C.M. with DCFS discretion to liberalize. The court set the next hearing pursuant to section 364. Mother timely appealed. DISCUSSION 1. Removal Pursuant to Section 361, Subdivision (c) All the parties and the juvenile court assumed section 361, subdivision (c)(1) governed the disposition in this case. Section 361, subdivision (c)(1) provides in relevant part, “A dependent child may not be taken from the physical custody of his or her parents or guardian or guardians with whom the child resides at the time the 17 petition was initiated, unless the juvenile court finds clear and convincing evidence of any of the following circumstances . . . [¶] (1) There is or would be a substantial danger to the physical health, safety, protection, or physical or emotional well-being of the minor if the minor were returned home, and there are no reasonable means by which the minor’s physical health can be protected without removing the minor from the minor’s parents or guardian’s physical custody. . . .” We asked the parties to file supplemental briefs8 on whether the juvenile court erred in applying section 361, subdivision (c) because C.M. was not in mother’s physical custody and was not residing with her at the time the initial section 300 petition was initiated on January 15, 2013. Both parties conceded C.M. was not living with mother at the time the petition was filed, but both took the position that section 361, subdivision (c) should be interpreted to include legal custody or other custodial rights even in the absence of actual physical custody, and C.M.’s parents retained custodial rights when the probate court terminated the paternal grandparents’ temporary legal guardianship in August 2011. We cannot accept this interpretation. Whatever parental rights might be included in the term “custody” when that term is used in the Welfare and Institutions Code without qualification (see, e.g., In re Austin P. (2004) 118 Cal.App.4th 1124, 1130 [discussing the meaning of “custody” in § 361.2, subd. (a)]), or even in the term “physical custody” as used in section 361, subdivision (c), that provision expressly governs removal of a child from the physical custody of a parent with whom the child resides at the time the petition was initiated. C.M. did not reside with mother on January 15, 2013, the date the petition was initiated, so section 361, subdivision (c) did not apply. Although mother contends this interpretation creates an ambiguity in the juvenile dependency law when parents have full legal and physical custodial rights to a child who does not live with them, that ambiguity was not created by law, but by mother herself. Assuming she had the right to have C.M. reside with her, she did not 8 We grant mother’s request to file her supplemental brief one day late. 18 enforce that right, as she conceded in her supplemental brief. As a result, the juvenile court’s dispositional order did not meet the conditions for section 361, subdivision (c) to apply. Because the juvenile court’s dispositional order limited mother’s control of C.M., it was governed by section 361, subdivision (a)(1),9 which states in pertinent part, “In all cases in which a minor is adjudged a dependent child of the court on the ground that the minor is a person described by Section 300, the court may limit the control to be exercised over the dependent child by any parent or guardian and shall by its order clearly and specifically set forth all those limitations. . . . The limitations may not exceed those necessary to protect the child. . . .” This provision allows the court to “limit the control of the parent over the dependent child” (Teresa J. v. Superior Court (2002) 102 Cal.App.4th 366, 375) and enables the juvenile court to make orders in the child’s best interest (see id. at pp. 375-376). Although the juvenile court erred in applying section 361, subdivision (c), that error was harmless because sufficient evidence would have readily supported the juvenile court’s order under the best interests standard in section 361, subdivision 9 While mother suggested in a footnote in her opening brief that section 361.2, subdivision (a) might apply, she conceded in her supplemental brief it does not. DCFS agreed, as do we. Section 361.2, subdivision (a) states, “When a court orders removal of a child pursuant to Section 361, the court shall first determine whether there is a parent of the child, with whom the child was not residing at the time that the events or conditions arose that brought the child within the provisions of Section 300, who desires to assume custody of the child. If that parent requests custody, the court shall place the child with the parent unless it finds that placement with that parent would be detrimental to the safety, protection, or physical or emotional well-being of the child.” Section 361.2 “comes into play after a child has been removed from the physical custody of his or her parents under section 361, subdivision (c).” (In re A.A. (2012) 203 Cal.App.4th 597, 608.) Here there was no such removal because, as discussed above, C.M. was not in mother’s physical custody, and the juvenile court dismissed the allegations against father and ordered C.M. to be released to him on the condition he reside with the paternal grandparents. 19 (a).10 “In reviewing the sufficiency of the evidence on appeal we consider the entire record to determine whether substantial evidence supports the court’s findings. [Citation.] We do not pass on the credibility of witnesses, attempt to resolve conflicts in the evidence or weigh the evidence. Rather, we draw all reasonable inferences in support of the findings, view the record favorably to the juvenile court’s order and affirm the order even if other evidence supports a contrary finding. [Citations.]” (In re James R. (2009) 176 Cal.App.4th 129, 134-135 (James R.).) Mother admitted she had a history of methamphetamine use, she had taken other prescription drugs without a prescription, she used marijuana while pregnant with C.M., and C.M. tested positive for marijuana at birth. Mother also tested positive for marijuana in October 2012, and the October 26, 2012 upfront assessment noted mother denied having a substance abuse problem and suggested she was minimizing her substance abuse, recommending she be subject to further drug testing. In February 2013 mother also failed to randomly drug test. While she demonstrated commendable progress toward addressing those drug use issues, mother’s substance use supported placing C.M. with father on the condition he reside with the paternal grandparents in order to serve her best interests. Further, while the juvenile court dismissed the allegations related to mother’s mental and emotional issues, the court could have nevertheless considered mother’s pattern of mental and emotional problems to determine whether limiting mother’s control over C.M. was in C.M.’s best interests. Mother had gone off her medication for bipolar disorder when she found out she was pregnant and admitted father did not allow her to have unsupervised visits with C.M. because there had been a “post partum incident” after she was born and mother had been texting father “a lot of crazy stuff,” which father confirmed. Those texts included mother writing “I can’t wait to stick this 10 We reject the DCFS’s argument that mother forfeited her challenge to C.M.’s removal by not objecting to the sufficiency of the evidence in the juvenile court. (In re Javier G. (2006) 137 Cal.App.4th 453, 464; In re Brian P. (2002) 99 Cal.App.4th 616, 623.) 20 needle in me deep . . .” and “Die baby, die.” In fact, mother’s issues were serious enough that, two days after C.M. was born, father and the paternal grandparents took C.M. from her and the maternal grandmother. And when father was arrested in May 2011, father gave C.M. to her paternal grandparents with the maternal grandmother’s consent, where C.M. continued to reside. After C.M. went to live with her paternal grandparents, mother’s pattern of mental and emotional issues continued. For example, at the trip to the museum, mother “had an outburst” and became “belligerent” toward and screamed at the paternal grandmother. During the January 2013 team decisionmaking meeting, mother exhibited erratic behavior by speaking loudly, twisting in her chair, and standing up in an aggressive way, all of which resulted in security escorting her out. At her interview for the jurisdiction/disposition report, mother paced, wrung her hands to the point they were red, and did not make eye contact with the investigator. She admitted having a bipolar diagnosis and posttraumatic stress disorder stemming from a childhood molestation and she said she had not been taking medication while she was pregnant. She experienced a “crash of emotions” after C.M. was born, prompting her to “vent[]” in text messages, which she continued to send to father after the juvenile court’s no-contact order. At one point, mother followed the paternal grandparents and confronted them in a hotel at a casino. The paternal grandmother described it as a “horrible scene” and mother’s friend Paula described it as “really traumatic.” Father also reported he received phone calls and text messages from mother and called the police once when he arrived at his house and found her there. He also reported mother began calling father’s high school friend after finding his number on a note on father’s front door. He couldn’t “begin to understand why,” and in his opinion, mother “has problems.” The paternal grandmother explained she did not know when mother would “go off on these episodes.” Mother told her she has psychotic breaks and, according to the 21 paternal grandmother, “[s]he’s obviously suicidal.” In addition to the museum incident, the paternal grandmother reported that, earlier on the day of her interview for the jurisdiction/disposition report, mother was supposed to visit C.M., but she got “out of control” and the social worker had to cancel the visit. The paternal grandfather reported mother had told him she had been put on a hospital hold before and mother did things that did not “make any sense,” such as visiting C.M. with him monitoring and then posting messages on Facebook calling him a “faggot, pedophile grandfather.” This erratic behavior continued at a monitored visit with C.M. on February 7, 2013, when mother became very aggressive toward the paternal grandmother, so much so that the social worker had to intervene and end the visit. Outside, mother became increasingly upset, prompting the social worker to call for an ambulance, but mother quickly walked away before it could arrive, stating she did not want to go to the hospital. The social worker recommended mother receive immediate counseling. In light of these incidents, DCFS concluded mother’s erratic behavior did not appear to be under control and “her mental health issues have not yet adequately been addressed at this time, and she had not been able to demonstrate she is emotionally stable at this time.” Her mental health issues compounded with her substance abuse issues would require an extensive amount of work, attention, and support, and she would need “extensive support and help prior to releasing [C.M.] to her care.” In arguing the record did not support the juvenile court’s order, mother cites James R. and In re David M. (2005) 134 Cal.App.4th 822, but both cases are distinguishable because they addressed whether substantial evidence supported the juvenile court’s jurisdictional finding of a risk of physical harm under section 300, not whether substantial evidence supported limits to a parent’s control in the best interests of the child under section 361, subdivision (a). (See James R., supra, 176 Cal.App.4th at p. 134; David M., supra, at p. 829.) They also involved different facts. In James R., although the mother had a history of mental instability and substance abuse, there was no evidence of past abuse or neglect and the risk of future harm was speculative. 22 (James R., supra, at pp. 136-137.) Likewise, in David M., although the mother used marijuana at least once during pregnancy and delayed prenatal care, her child tested negative for drugs at birth and showed no signs of drug withdrawal. (David M., supra, at p. 829.) The mother also continued to use marijuana, but there was no evidence her drug use caused or would cause a risk of substantial harm to her children. (Id. at p. 830.) And the social services agency relied on an outdated report without conducting an independent investigation into the current allegations. (Id. at p. 831.) Here, by contrast, C.M. was born testing positive for marijuana, mother continued to use marijuana, and mother’s mental issues repeatedly manifested themselves, including while she was on a supervised visit with C.M. Mother also cites In re Alexis E. (2009) 171 Cal.App.4th 438, another section 300 case, for the proposition that the “the mere use of marijuana by a parent will not support a finding of risk to minors.” (Id. at p. 452.) The court in Alexis E. nevertheless found this principle inapplicable to the facts before it because the father did more than simply use medical marijuana; he previously used it illegally, he used it while his children were home, and his use had a negative effect on his demeanor toward the children, all of which created a risk of harm to the children. (Id. at pp. 451- 453.) Similarly here, there was more evidence than just mother’s alleged medical marijuana use to demonstrate a risk of harm to C.M., as we have discussed above. In sum, the record of mother’s substance use and mental and emotional issues sufficiently supported an order placing C.M. with father on the condition he reside with the paternal grandparents in order to serve C.M.’s best interests. 2. Placement with Father on Condition He Reside with Paternal Grandparents Mother challenges the juvenile court’s order placing C.M. with father on the condition he reside with the paternal grandparents, arguing the acrimony between her and the paternal grandparents will undermine her visitation and reunification services. DCFS has taken no position on this issue on appeal. “‘The juvenile court has broad discretion to determine what would best serve and protect the child’s interests and to fashion a dispositional order in accordance with this discretion.’ [Citation.] The 23 reviewing court will not reverse the court’s order in the absence of a clear abuse of discretion. [Citation.]” (In re Gabriel L. (2009) 172 Cal.App.4th 644, 652.) We find no abuse of discretion here. Father had a history of drug use, including his drug arrest in May 2011, and made conflicting statements about wanting C.M. to be returned to him but doubting whether he could adequately care for her on his own, which supported the juvenile court’s decision not to simply release C.M. to his care without conditions. C.M. had been living with her paternal grandparents almost since she was born and thrived with them, appearing appropriately groomed, happy, comfortable, and free of obvious marks or bruises. At the interview for the jurisdiction/disposition report, she was very active, running, jumping, sitting in a chair independently, playing with toys, throwing a ball, and saying a few words. She did not display any emotional or behavioral issues. Whatever acrimony existed between mother and the paternal grandparents, the juvenile court reasonably concluded that C.M.’s placement with father on the condition he reside with the paternal grandparents was the best option for her. If the situation between mother and the grandparents becomes an actual obstacle to mother’s reunification with C.M., the juvenile court can address that issue in future hearings. (§ 364, subd. (a); Cal. Rules of Court, rule 5.706(a).) 3. Prohibition of Father Monitoring Mother’s Visits Mother also challenges the juvenile court’s order prohibiting father from monitoring mother’s visits, arguing it will negatively impact her efforts “toward amicably co-parenting C.M. and runs contrary to the goal of resuming normal family relationships.” We review the juvenile court’s visitation order for abuse of discretion (In re Brittany C. (2011) 191 Cal.App.4th 1343, 1356), and find no abuse of discretion here. The juvenile court appropriately balanced mother’s interests in visitation with C.M.’s best interests and exercised its discretion to impose “conditions or requirements to further define the right to visitation in light of the particular circumstances of the case before it.” (In re Jennifer G. (1990) 221 Cal.App.3d 752, 24 757.) Only a few days after C.M. was born, mother sent father text messages that were so concerning that he and the paternal grandparents removed C.M. from her care. Mother’s erratic behavior so eroded her relationship with father that, in January 2013, the juvenile court ordered mother and father to have no contact and to stay 100 yards away from each other, which mother violated four hours after court adjourned and violated again when she showed up at father’s house, requiring father to call the police. The jurisdiction/disposition report also attached pages of mother’s disturbing text messages. In light of this evidence, and the lack of evidence to suggest mother’s visitation and reunification with C.M. would be compromised in any way without father’s supervision at visits, the juvenile court appropriately determined father should not monitor mother’s visits. DISPOSITION The juvenile court’s dispositional order is affirmed. FLIER, J. WE CONCUR: BIGELOW, P. J. RUBIN, J. 25
{ "pile_set_name": "FreeLaw" }
When artist Larry Rivers’ first art show opened in New York City in 1949, Clement Greenberg called him an “amazing beginner. . . a better composer of pictures than was Bonnard himself.” His work influenced and was inspired by his relationships with Beat Generation writers, particularly Frank O Hara, who wrote a poem as a response to this painting. It can be read here: http://www.poets.org/viewmedia.php/prmMID/20379
{ "pile_set_name": "Pile-CC" }
Uniform! Some parents have expressed confusion regarding the correct school uniform in different year groups. With summer term upon us, we have decided to clarify and illustrate the correct uniform, to avoid any further confusion. We will be asking the teachers to be strict with uniform this term, so forbidden items of clothing will be confiscated for the duration of the school day. Nursery & Reception We expect all children in these year groups to come to school in the Heavers Farm tracksuit and a pair of trainers. In the summer, children are permitted to wear navy blueshorts, and a whitepoloshirt, to avoid overheating. We do this so that all children can engage in the physical activities in our early years department. We believe that skirts, boots and other clothing can be restrictive for some children when taking part in these activities. Years 1 – 6 PE KIT Children wear their PE kit into school on any day their class has PE. This means that we expect them to be in the correct school PE uniform. Children may wear the Heavers Farm tracksuit, or their Heavers Farm school jumper. These are the only permitted jumpers. Children are permitted to wear black or navy blue shorts in the summer. Clothing should not have any large logos. Hoodies will now be confiscatedif children are wearing them inside the building. SCHOOL UNIFORM Our school uniform is all unisex, and consists of the following: Heavers Farm school jumper Dark trousers or skirt Heavers Farm school tie White shirt Black school shoes – no boots or trainers Black tights, or black or white socks (below the knee) Further, optionally: Dark grey shorts (summer only) Blue and white gingham summer dress (summer only) Long hair must be tied back, with no elaborate hairstyles permitted, as these can interfere with sports activities. No elaborate headbands or headwear allowed in school (other than for religious or medical reasons).
{ "pile_set_name": "Pile-CC" }
Convert Swf To Image 'Convert PDF to Image' is a simple to use, yet sophisticated file conversion utility specifically designed to convert PDF files into image files. If you need to convert one or thousands of PDFs, located in one or many different folders, into a variety of different image file types, this is the... Platforms: Windows, Windows 8, Windows 7, Windows Server 4Easysoft Mac SWF to FLV Converter is the best SWF to FLV Converter for Mac which convert SWF to FLV formats on Mac. Meanwhile, it also supports other input formats like WMV, ASF, 3GP, 3G2.In order to meet users™ needs, this SWF to FLV Converter for Mac gives you the access to do professional... Platforms: Mac Convert HTML to Image is a Windows Command Line Tool (Console Application) that helps you to generate thumbnail images of website pages, take full size screenshots of websites, convert mhtml and html pages to image. It captures the whole web pages content into JPEG, PNG, Bitmap, GIF or Tiff image... Platforms: Windows 4Easysoft SWF to Video Converter provides the comprehensive way to convert SWF to you need video format, like AVI, FLV, MP4, 3GP, WMV, MOV, MPEG, and other popular video formats. No matter the SWF file is made by yourself or downloaded from web, or from other place, you can output it to your... Platforms: Windows Convert PDF to image with just a few clicks. PDF to JPEG, PDF to JPG, PDF to PNG, PDF to BMP and PDF to TIFF conversion is supported. Adolix PDF to Image can work with encrypted PDF files as well as with large PDF documents. You can convert to image each page from a give PDF or define a custom... Platforms: Windows Okdo Pdf to Image Converter is the easiest and most advanced pdf to image converter. Convert PDF to image in batches with ease. With it, you can batch convert your PDF file to jpg,jpeg,bmp,gif,tiff,png,wmf,emf,ico,jp2,j2k,rle,tga,pcx format. User-friendly interface is very easy to use with merely... Platforms: Windows Incredibly easy to use for both novices and pros, 4Easysoft Mac SWF to WMA Converter is available to convert SWF to WMA on Mac with super fast conversion speed. Meanwhile, you can also add FLV, WMV, ASF, 3GP, 3G2 and extract WMA, MP3, MP2 audio formats from them playable on different MP3 players... Platforms: Mac DDVideo SWF to FLV Converter Standard, is a powerful and professional flash tool.which can gain volume for flash video files to the same volume without loss of original sound quality,and convert Flash(SWF) files to FLV,convert SWF to MP4,convert SWF to MPEG,convert SWF to WMV,convert SWF to... Platforms: Windows, Other Office to Image Pro is a windows utility that batchly convert Microsoft Office documents to Image documents. With Office to Image Pro users can convert Office to Image as *.jpg, *.png and *.bmp in batches. Office to Image Pro can help you create Image file from documents including All Office... Platforms: Windows Okdo Html to Image Converter is a small, fast and efficient html/htm to image converter. Own the most powerful conversion function. you can batch convert html to image with ease. The program can convert with high output quality and very fast speed. It supports various formats as jpg, png, emf,... Platforms: Windows 4Videosoft PDF to Image Converter for Mac can easily convert PDF to various image formats with high quality. You can convert PDF to image JPEG, PNG, GIF, BMP, TGA, PPM, JPEG 2000 and TIFF on Mac. This PDF to Image Converter for Mac allows you to convert all PDF pages or the selected page(s) only.... Platforms: Mac, Other office Convert Excel to Image Jpg/Jpeg Free is the best choice for you to convert Excel to image. The converter produces fully functional IMAGE documents with text, pictures, graphics etc, using the original excel formatting.It can create popular image formats as... Platforms: Windows SWF to Video Converter is a professional SWF converter for SWF to video conversion. It helps to convert SWF to AVI, MPEG, iPod/PSP (MP4), MOV, MKV, WMV and more other popular formats with rich editing functions such as crop, add watermark. Many other SWF converters can not convert... Platforms: Windows, Windows 8, Windows 7 Majorware Convert PDF to Image is a quality application software for converting PDF documents to various standard raster image file formats. Majorware Convert PDF to Image can currently export to PNG, JPEG, TIFF and BMP, while providing a wide range of options to control the output image size and... Platforms: Windows office Convert Excel to Image Jpg/Jpeg is the best choice for you to convert Excel to image. The converter produces fully functional IMAGE documents with text, pictures, graphics etc, using the original excel formatting.It can create popular image formats as JPG,BMP,GIF,TIF,TGA,RLE,PNG,EMF,WMF... Platforms: Windows
{ "pile_set_name": "Pile-CC" }
Gene--gene interaction among cytokine polymorphisms influence susceptibility to aggressive periodontitis. Aggressive periodontitis (AgP) is a multifactorial disease. The distinctive aspect of periodontitis is that this disease must deal with a large number of genes interacting with one another and forming complex networks. Thus, it is reasonable to expect that gene-gene interaction may have a crucial role. Therefore, we carried out a pilot case-control study to identify the association of candidate epistatic interactions between genetic risk factors and susceptibility to AgP, by using both conventional parametric analyses and a higher order interactions model, based on the nonparametric Multifactor Dimensionality Reduction algorithm. We analyzed 122 AgP patients and 246 appropriate periodontally healthy individuals, and genotyped 28 polymorphisms, located within 14 candidate genes, chosen among the principal genetic variants pointed out from literature and having a role in inflammation and immunity. Our analyses provided significant evidence for gene--gene interactions in the development of AgP, in particular, present results: (a) indicate a possible role of two new polymorphisms, within SEPS1 and TNFRSF1B genes, in determining host individual susceptibility to AgP; (b) confirm the potential association between of IL-6 and Fc γ- receptor polymorphisms and the disease; (c) exclude an essential contribution of IL-1 cluster gene polymorphisms to AgP in our Caucasian-Italian population.
{ "pile_set_name": "PubMed Abstracts" }
results within Features results within FEATURES, WOMEN Go all out this winter in the name of warmth and style, with mix-n-match textures. This lush edit is a total treat of grandma chic and bang-on-trend badness, letting you keep warm and carry on. Get ready to wrap up in tweed, throw on faux fur, get decorative in devoré, and cozy up in cable knits. In the freezing months, knitwear is not optional. Go oversized and chunky to refresh your collection, mixing in luxe jewel tones for additional opulence. Don't underestimate the power of texture to elevate your winter looks. From fleece to faux fur and shaggy shearling, the more tactile the better (not to mention warmer!). Christmas may be gone, but for most of us, winter's still here. And since we're all about the cozy, you'll catch us chillin' like villains in over-the-top texture until summer. Wanna be in our squad? Better get to the store ASAP and stock up. STAT. We are using cookies to give you the best experience on our site. Cookies are files stored in your browser and are used by most websites to help personalize your web experience. By continuing to use our website without changing the settings, you are agreeing to our use of cookies. We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to our use of cookies. Woohoo! You've added your first item to your favorites. You can access them anytime by clicking here. Time for an update? Primark.com supports the latest browsers including Chrome, Firefox and Safari. Make sure you've downloaded the latest version to get the best out of Primark.com
{ "pile_set_name": "Pile-CC" }
var searchData= [ ['scalebottom',['ScaleBottom',['../group__DefinesAndEnums.html#gga0ce2c64cfd247716fa581d00f90898bea32af467cdcd29ab969a72a9d7e390cf6',1,'processviewserver.h']]], ['scaleleft',['ScaleLeft',['../group__DefinesAndEnums.html#gga0ce2c64cfd247716fa581d00f90898beafb3516ca4523dbcb2e2d35f98ec80a8b',1,'processviewserver.h']]], ['scaleright',['ScaleRight',['../group__DefinesAndEnums.html#gga0ce2c64cfd247716fa581d00f90898bead1d548238f14e1cba9bc7f77e45cac3d',1,'processviewserver.h']]], ['scaletop',['ScaleTop',['../group__DefinesAndEnums.html#gga0ce2c64cfd247716fa581d00f90898bea404e6a352aafdb468a160a0e3d5cda66',1,'processviewserver.h']]], ['selection_5fevent',['SELECTION_EVENT',['../group__DefinesAndEnums.html#gga312edd1912b98b17988e584ecc4263b4a56c8885608944604893ca5d347b22c91',1,'processviewserver.h']]], ['shiftbutton',['ShiftButton',['../group__DefinesAndEnums.html#ggaff3c373fbc5395571529b98548868d68a54cab6db4f2ffe3a31a60e24aaf3529c',1,'processviewserver.h']]], ['showprefix',['ShowPrefix',['../group__DefinesAndEnums.html#ggafc241523540d1926a9c6fe8662484a85a8328c14e6a9ba54ddf4e06078993352b',1,'processviewserver.h']]], ['singleline',['SingleLine',['../group__DefinesAndEnums.html#ggafc241523540d1926a9c6fe8662484a85ae06262eb6a677c13f0467372a72e7900',1,'processviewserver.h']]], ['sizeallcursor',['SizeAllCursor',['../group__DefinesAndEnums.html#ggad19ba4f288a5afb7970196ceee05e47ead8564c75c5aab3868bbb79f29d686c28',1,'processviewserver.h']]], ['sizebdiagcursor',['SizeBDiagCursor',['../group__DefinesAndEnums.html#ggad19ba4f288a5afb7970196ceee05e47ea8822a713bf1153be1d0c4b1b1772d468',1,'processviewserver.h']]], ['sizefdiagcursor',['SizeFDiagCursor',['../group__DefinesAndEnums.html#ggad19ba4f288a5afb7970196ceee05e47ea3a8370a6ae416fb49715ba1ef2ce68f1',1,'processviewserver.h']]], ['sizehorcursor',['SizeHorCursor',['../group__DefinesAndEnums.html#ggad19ba4f288a5afb7970196ceee05e47ea368688633f569c7aa5e46b5b98af06df',1,'processviewserver.h']]], ['sizevercursor',['SizeVerCursor',['../group__DefinesAndEnums.html#ggad19ba4f288a5afb7970196ceee05e47ead970230a68ab79145b00b6a49e8144ed',1,'processviewserver.h']]], ['slider_5fevent',['SLIDER_EVENT',['../group__DefinesAndEnums.html#gga312edd1912b98b17988e584ecc4263b4aed45d81ba8371940a4d8efeadec012d1',1,'processviewserver.h']]], ['sliderbgboth',['SliderBgBoth',['../group__DefinesAndEnums.html#ggaa1030b42c31a426e513defee67660013a9140d38b0a7ebe167caf3eee8522dbd3',1,'processviewserver.h']]], ['sliderbgslot',['SliderBgSlot',['../group__DefinesAndEnums.html#ggaa1030b42c31a426e513defee67660013a22fc997867568f767d7aa8d9c499c1f6',1,'processviewserver.h']]], ['sliderbgtrough',['SliderBgTrough',['../group__DefinesAndEnums.html#ggaa1030b42c31a426e513defee67660013a52f8ee6154a952b3ec2e99792dc63410',1,'processviewserver.h']]], ['sliderbottom',['SliderBottom',['../group__DefinesAndEnums.html#gga1d42473674bc4ade801006b43f8a2faba91e92fc5d1249680c8ab10a607bd135e',1,'processviewserver.h']]], ['sliderleft',['SliderLeft',['../group__DefinesAndEnums.html#gga1d42473674bc4ade801006b43f8a2faba1fc700978401e3854345c869829e2855',1,'processviewserver.h']]], ['slidernone',['SliderNone',['../group__DefinesAndEnums.html#gga1d42473674bc4ade801006b43f8a2faba662fa3d1af4b3ea1a8d62ae48c21df3a',1,'processviewserver.h']]], ['sliderright',['SliderRight',['../group__DefinesAndEnums.html#gga1d42473674bc4ade801006b43f8a2faba896b9249ff404be640ed319045aa33e3',1,'processviewserver.h']]], ['slidertop',['SliderTop',['../group__DefinesAndEnums.html#gga1d42473674bc4ade801006b43f8a2fabaf7db05597d2ec9a3aa6a81195e404c0b',1,'processviewserver.h']]], ['solidline',['SolidLine',['../group__DefinesAndEnums.html#ggab70170afb6347d18ff9dac17e05e133eaa093aac47201f487076a14536d7d232e',1,'processviewserver.h']]], ['splithcursor',['SplitHCursor',['../group__DefinesAndEnums.html#ggad19ba4f288a5afb7970196ceee05e47eab0f6e696a437bacd7c841be70518a953',1,'processviewserver.h']]], ['splitvcursor',['SplitVCursor',['../group__DefinesAndEnums.html#ggad19ba4f288a5afb7970196ceee05e47ea3533cc58ea27efd561a6445e9aefea0e',1,'processviewserver.h']]], ['sqfoot2qcm',['SQFOOT2QCM',['../group__DefinesAndEnums.html#gga19aa07ac6b5e9b2e62d36d20580879f9a53c2d46bd24a03076ea336dffc9c417d',1,'processviewserver.h']]], ['sqinch2qmm',['SQINCH2QMM',['../group__DefinesAndEnums.html#gga19aa07ac6b5e9b2e62d36d20580879f9a0dce2337b6db17331a5b99428e2b6dca',1,'processviewserver.h']]], ['sqmile2qkm',['SQMILE2QKM',['../group__DefinesAndEnums.html#gga19aa07ac6b5e9b2e62d36d20580879f9a9739e9ea14c495318f349a3248bdd110',1,'processviewserver.h']]], ['sqyard2qm',['SQYARD2QM',['../group__DefinesAndEnums.html#gga19aa07ac6b5e9b2e62d36d20580879f9ac86edfbb55af25a7afac6bdcf4a1b929',1,'processviewserver.h']]], ['start',['Start',['../group__DefinesAndEnums.html#gga30301face56d4c560e457f9fcb79e239abd5f9c956752ce4dc707b4624b3a36f7',1,'processviewserver.h']]], ['startofblock',['StartOfBlock',['../group__DefinesAndEnums.html#gga30301face56d4c560e457f9fcb79e239a1e4b246d4da7f4677cbaaeae99386b0e',1,'processviewserver.h']]], ['startofline',['StartOfLine',['../group__DefinesAndEnums.html#gga30301face56d4c560e457f9fcb79e239ab95a90968166256090aac79a4ffa4468',1,'processviewserver.h']]], ['startofword',['StartOfWord',['../group__DefinesAndEnums.html#gga30301face56d4c560e457f9fcb79e239ad5dbe1ffeb4eb120afbc0c40df32db37',1,'processviewserver.h']]], ['strikeout',['StrikeOut',['../group__DefinesAndEnums.html#ggafc241523540d1926a9c6fe8662484a85ad8ed148498616720b9e2c1bae30d7d86',1,'processviewserver.h']]], ['styledpanel',['StyledPanel',['../group__DefinesAndEnums.html#gga55b506070847a13554f8b879c1bfb37ca81e59eb78823a16a034e8ae1dda6c815',1,'processviewserver.h']]], ['sunken',['Sunken',['../group__DefinesAndEnums.html#gga70fe851ed6ac8ee886b0d46acd615d00ad80b1ce00c68b3a51f1e862e726485fb',1,'processviewserver.h']]], ['svg_5fbounds_5fon_5felement',['SVG_BOUNDS_ON_ELEMENT',['../group__DefinesAndEnums.html#gga1d1fdb8ef10a7eb89196d12253e68dd0a8f9eefa8c1d0fc46150deed4115b629c',1,'processviewserver.h']]], ['svg_5fleft_5fbutton_5fpressed',['SVG_LEFT_BUTTON_PRESSED',['../group__DefinesAndEnums.html#gga1d1fdb8ef10a7eb89196d12253e68dd0a14dd7a8b20f66e8b189329d19f642232',1,'processviewserver.h']]], ['svg_5fleft_5fbutton_5freleased',['SVG_LEFT_BUTTON_RELEASED',['../group__DefinesAndEnums.html#gga1d1fdb8ef10a7eb89196d12253e68dd0a95fca526fc77b3a18b8cae0f36db0db7',1,'processviewserver.h']]], ['svg_5fmatrix_5ffor_5felement',['SVG_MATRIX_FOR_ELEMENT',['../group__DefinesAndEnums.html#gga1d1fdb8ef10a7eb89196d12253e68dd0a481ff051d16ad2d74d16661c91392714',1,'processviewserver.h']]], ['svg_5fmiddle_5fbutton_5fpressed',['SVG_MIDDLE_BUTTON_PRESSED',['../group__DefinesAndEnums.html#gga1d1fdb8ef10a7eb89196d12253e68dd0a60918ee8361e6b3591c8522ce6c1a235',1,'processviewserver.h']]], ['svg_5fmiddle_5fbutton_5freleased',['SVG_MIDDLE_BUTTON_RELEASED',['../group__DefinesAndEnums.html#gga1d1fdb8ef10a7eb89196d12253e68dd0afb9f7d70b0dcfee0d170e14b38ba4060',1,'processviewserver.h']]], ['svg_5fright_5fbutton_5fpressed',['SVG_RIGHT_BUTTON_PRESSED',['../group__DefinesAndEnums.html#gga1d1fdb8ef10a7eb89196d12253e68dd0a8701e2bb3afa97e53078686f882689f5',1,'processviewserver.h']]], ['svg_5fright_5fbutton_5freleased',['SVG_RIGHT_BUTTON_RELEASED',['../group__DefinesAndEnums.html#gga1d1fdb8ef10a7eb89196d12253e68dd0af7df34710b873e503b324899e5623869',1,'processviewserver.h']]], ['symmetric',['Symmetric',['../group__DefinesAndEnums.html#gga8d218a54579a0943de425d04427f27e7a33e94d2249181e0e1f815e7c0affc69b',1,'processviewserver.h']]] ];
{ "pile_set_name": "Github" }
What to Expect with Ultrasound in 5-Week Pregnancy The journey through pregnancy to birth is quite intricate. From the minute the egg meets the sperm, a baby begins its developmental process. It is in this early stage of development that the foundation is laid for a healthy pregnancy, which results in the birth of a healthy baby. Unfortunately, since this early stage involves a complex process, things could go wrong and ultimately result in loss of the pregnancy. If your doctor suspects a complication in your early pregnancy stage, s/he will use an ultrasound and blood tests to make a clearer diagnosis. Ultrasounds are done to visually see the development process taking place in your uterus and also to measure the progress. The earliest a heartbeat can be seen is when you are in your 5th week of pregnancy. This type of ultrasound is normally performed endovaginally. An endovaginal exam is not painful. Contrary to popular belief, it does not require you to have a full bladder. Why Should I Have Ultrasound at 5 Weeks Pregnancy? Some of the reasons why you should have an ultrasound when 5 weeks pregnant include: To detect any abnormalities. To confirm whether you are having one baby or more. To confirm whether the baby is growing normally. More so, if you are expecting twins or had a problematic pregnancy in the past. To show your placenta and baby’s positioning. For example, when your placenta in late pregnancy is low down, you may need to undergo a caesarean section. To check the size of the baby. You will also be able to know how far along you are in your pregnancy. How Will the Ultrasound Be Done? When preparing for your 5 week pregnant ultrasound, you may be asked not to urinate before the scan. Having a full bladder will push your womb up, thus giving it a much better picture. You will lie on your back and the doctor or nurse will apply some lubricating gel on your abdomen. The doctor will then take a small device and pass it forward and backwards over your abdomen and high-frequency sound will be beamed through the abdomen to your womb. The sound is then reflected back and ultimately creates a picture shown on a TV screen. If you find the image to be confusing, you can ask your doctor to explain it to you. It should be possible for your partner to join you during the ultrasound process and also take a picture of the same although it might cost you. What Can I See on Ultrasound at 5 Weeks? On your 5 weeks pregnant ultrasound, you should be able to see your gestational sac and the yolk sac which is always present when you are 5 weeks pregnant. If you are carrying fraternal twins, you will be able to see the yolk sac as well as the fetal poles in two separate sacs. However, if you are carrying identical twins, you will be able to see a single gestational sac and two yolk sacs and the embryo is about 1.25mm long. The gestational sac is that black area, while the yolk sac is the small white circle you see at the sac’s upper left. The yolk sac is the source of nutrients for the fetus. In size, the gestational sac at five months is about 6 to 12 mm and while the embryo is present, you cannot see it as it is the size of a rice grain. If your sonographer is experienced, s/he can detect the yolk sac via transvaginal ultrasound. This is when your gestational sac’s mean diameter is about 8mm to 10mm. Since the yolk sac is present, it means that it is an intrauterine pregnancy and ectopic pregnancy is automatically excluded. However, there are some rare cases where there is simultaneous extrauterine and intrauterine gestation. At the implantation site, there are spaces or cavities known as lacunary structures. Embryonic poles are adjacent to the yolk sac and will soon show cardiac activity. The reason why an embryonic pole is located near a wall is that it has a short connecting stalk. There are times where cardiac motion can be seen in a 2mm-3mm embryo when trans-vaginal ultrasonography is performed. This motion is invariably noticed when the embryo’s length is 5mm. At the end of the 5th week, the heart rate ranges to about 60 bpm to 90 bpm.
{ "pile_set_name": "Pile-CC" }
John F. Kennedy High School (La Palma, California) John F. Kennedy High School is a public, four-year high school and International Baccalaureate (IB) World School in the city of La Palma, California. Kennedy gets most of its students from the junior high school across the street, Walker Junior High School. History John F. Kennedy High School opened to 1,488 students in the 10th and 11th grades on September 14, 1964. For its first year of operation, there was no senior class. Kenneth MacPherson was Kennedy's first principal. Most buildings were ready except the dressing rooms, the gym, and playing fields. The school was to be named Centralia, in keeping with Board policy to name high schools after an elementary school district in the area; however, the assassination of John F. Kennedy in 1963 prompted a group of patrons to have the school (then under construction) renamed in his honor. It was one of the first schools in the country to have been named after the assassinated president. In the fall of 2011, the administration of Kennedy High School was criticized for its "Gold Card Program," in which students who performed well on the California Standardized Tests the previous year were given special recognition through special planners and ID cards, along with perks and bonuses at local businesses and throughout the school. Nearby Cypress High School had also implemented a similar program, but it did not receive as much media attention. Both schools have since removed or altered the program. Currently, Kennedy serves around 2,400 students in the 9th through 12th grades. Recent construction has added a quad area, a second practice gym, renovated classrooms, a new library and counseling center, a modular "4th court," as well as an extensive music building which includes an auditorium, two band rooms, two choir rooms, practice rooms, and a new pool. Sports Kennedy's sports teams are known as the Fighting Irish (the senior circle looks like a three leaf clover from above). They are a member of the Empire League in CIF's Southern Section. The school's main rival is Cypress High School. The Fighting Irish football team won the CIF-SS Southern Division Championship in 2006, adding to the AAA championship they had won in 1971. In 2017, the boys volleyball team captured their first CIF-SS Div IV championship in program history. It marked the first time in CIF Southern Section history a wild card team successfully captured the CIF title. Complete list of Kennedy team CIF SS Championships 1971 - Football - Div. 3A CIF Champion 1980 - Boys Soccer - Div. 3A CIF Champion 1984 - Girls Softball - Div. 4A CIF Champion 1988 - Girls Softball - Div. 3A CIF Champion 1988 - Boys Basketball - Div. 3A CIF Champion 1989 - Boys Baseball - Div. 3A CIF Champion 2003 - Boys Soccer - Div. 3 CIF Champion 2004 - Boys Soccer - Div. 3 CIF Champion 2006 - Football - CIF Southern Division Champion 2017 - Boys Volleyball - Div. 4 CIF Champion 2019 - Boys Baseball - Div. 4 CIF Champion Programs International Baccalaureate Diploma Programme The International Baccalaureate (IB) Diploma Programme is a prestigious and rigorous course of education that prepares students for study in the most elite colleges and universities worldwide. Kennedy High School has been authorized to offer the IB Diploma Programme since July 1999 and the programme is taught in English. Upon successful completion of all IB requirements and exams, students are awarded a second diploma (separate from their Kennedy diploma) that will grant one to two years of college credits. The University of California accepts IB Diploma holders as incoming sophomores. Band and Colorguard John F. Kennedy High School's band and colorguard is called the Shamrock Regiment. The band was formerly known as "The Guards." The band is a division 6A and is part of the SCSBOA. In the last 2 years(2018 & 2019), The Shamrock Regiment has made the SCSBOA 6a Championships. They have one of the best competition parade bands around the area. Choir The choir is known as the Kennedy Singers. The different groups are as follows: Harmonic Fusion, Treble Effects, Lyrical Tones, Vocal Motion, and Concert Choir. Notable alumni Brandon Baker, actor in films such as "Johnny Tsunami", "Johnny Kapahala:Back on Board" Alan Bannister, Former Major League Baseball player Ami Bera, Congressman, CA District #7 Casey Ellison, former child actor who appeared in TV sitcom "Punky Brewster" Casey Fien, Major League Baseball pitcher in the Seattle Mariners' Organization Greg Hansell, former major league baseball player Debra Jensen, former Coppertone model, Miss January, 1978 Playboy magazine Rhema McKnight, wide receiver for the University of Notre Dame, New Orleans Saints and San Diego Chargers Eddie Pleasant, outside line backer for the University of Oregon, strong safety for the Houston Texans John Stamos, actor Irene Kim, Northwestern Women's Golf References External links Kennedy High School website Category:High schools in Orange County, California Category:La Palma, California Category:International Baccalaureate schools in California Category:Public high schools in California Category:Educational institutions established in 1964 Category:1964 establishments in California Category:Monuments and memorials to John F. Kennedy in the United States
{ "pile_set_name": "Wikipedia (en)" }
Mosses from an Old Manse Mosses from an Old Manse is a short story collection by Nathaniel Hawthorne, first published in 1846. Background and publication history The collection includes several previously-published short stories, and was named in honor of The Old Manse where Hawthorne and his wife lived for the first three years of their marriage. The first edition was published in 1846. Hawthorne seems to have been paid $75 for the publication. Analysis Many of the tales collected in Mosses from an Old Manse are allegories and, typical of Hawthorne, focus on the negative side of human nature. Hawthorne's friend Herman Melville noted this aspect in his review "Hawthorne and His Mosses": William Henry Channing noted in his review of the collection, in The Harbinger, its author "had been baptized in the deep waters of Tragedy", and his work was dark with only brief moments of "serene brightness" which was never brighter than "dusky twilight". Critical reception After the book's first publication, Hawthorne sent copies to critics including Margaret Fuller, Rufus Wilmot Griswold, Edgar Allan Poe, and Henry Theodore Tuckerman. Poe responded with a lengthy review in which he praised Hawthorne's writing but faulted him for associating with New England journals, Ralph Waldo Emerson, and the Transcendentalists. He wrote, "Let him mend his pen, get a bottle of visible ink, come out from the Old Manse, cut Mr. Alcott, hang (if possible) the editor of 'The Dial,' and throw out of the window to the pigs all his odd numbers of the North American Review. A young Walt Whitman wrote that Hawthorne was underpaid, and it was unfair that his book competed with imported European books. He asked, "Shall real American genius shiver with neglect while the public runs after this foreign trash?" Generally, most contemporary critics praised the collection and considered it better than Hawthorne's earlier collection, Twice-Told Tales. Regarding the second edition, published in 1854, Hawthorne wrote to publisher James Thomas Fields that he no longer understood the messages he was sending in these stories. He shared, "I remember that I always had a meaning—or, at least, thought I had", and noted, "Upon my honor, I am not quite sure that I entirely comprehend my own meaning in some of these blasted allegories... I am a good deal changed since those times; and to tell you the truth, my past self is not very much to my taste, as I see in this book." Contents "The Old Manse" (1846) "The Birth-Mark" (1843) "A Select Party" (1844) "Young Goodman Brown" (1835) "Rappaccini's Daughter" (1844) "Mrs. Bullfrog" (1837) "Fire-Worship" (1843) "Buds and Bird-Voices" (1843) "Monsieur du Miroir" (1837) "The Hall of Fantasy" (1843) "The Celestial Rail-road "(1843) "The Procession of Life" (1843) "The New Adam and Eve" (1843) "Egotism; or, The Bosom-Serpent" (1843) "The Christmas Banquet" (1844) "Drowne's Wooden Image" (1844) "The Intelligence Office" (1844) "Roger Malvin's Burial" (1832) "P.'s Correspondence" (1845) "Earth's Holocaust" (1844) "The Old Apple-Dealer" (1843) "The Artist of the Beautiful" (1844) "A Virtuoso's Collection" (1842) Added to second edition in 1854 "Feathertop" (1852) "Passages from a Relinquished Work" (1834) "Sketches from Memory" (1835) References Further reading External links Literature Related to the Old Manse, Hawthorne in Salem Category:1846 short story collections Category:Short story collections by Nathaniel Hawthorne
{ "pile_set_name": "Wikipedia (en)" }
Psychosocial correlates of bulimic symptoms among NCAA division-I female collegiate gymnasts and swimmers/divers. In this study, we tested Petrie and Greenleaf's (2007) model of bulimic symptoms in two independent samples of female collegiate swimmers/divers and gymnasts. Structural equation modeling revealed support for the model, although it also suggested additional pathways. Specifically, general societal pressures regarding weight and body were related to the internalization of those ideals and, subsequently, to increases in body dissatisfaction. Pressures from the sport environment regarding weight and appearance were associated with more body dissatisfaction and more restrictive eating. Body dissatisfaction was related to more feelings of sadness, anger, and fear among the athletes. Negative affect, body dissatisfaction, and dietary restraint were related directly to bulimic symptoms, accounting for 55-58% of its variance. These results suggest that general sociocultural pressures are influential, but weight and appearance pressures in the sport environment may be even more pervasive and negative for female athletes.
{ "pile_set_name": "PubMed Abstracts" }
Legend: The detailed technical introduction to !VirtualBox which was formerly on this page has been moved to the "Technical background" chapter in the [http://www.virtualbox.org/wiki/Downloads#manual VirtualBox User Manual]. 3 The detailed technical introduction to !VirtualBox which was formerly on this page has been moved to the "Technical background" chapter in the [wiki:Downloads#manual VirtualBox User Manual].
{ "pile_set_name": "Pile-CC" }
Dear Editor, I read with interest the case by Ulucay et al. \[[@CR1]\] regarding a patient with chest discomfort in whom angiography revealed two separate left circumflex (LCx) arteries, one arising from the left main coronary artery and the other from the ostium of the right coronary artery. The patient refused to undergo computed tomography angiography (CTA) to define the course of the right-sided LCx artery and the authors speculated that the patient's symptoms might be due to the aberrant vessel following an interarterial course between the aortic root and pulmonary trunk. This letter draws attention to the angiographic image of the aberrant LCx artery illustrating this article, which does not favour an interarterial course, and aims to prevent confusion of the readers. As seen in a left anterior oblique caudal angiographic view, the aberrant LCx artery passes just beneath the aortic root forming a caudal-posterior loop to reach its normal position in the left atrioventricular groove. Such an angiographic picture is indeed compatible with a retroaortic course that is posterior to the aorta \[[@CR2]\]. The characteristic caudal and posterior loop formed by the retroaortic LCx artery could also have been identified in a right anterior oblique projection while during a 30° right anterior oblique ventriculography or aortography that vessel could have been seen in profile as a radiopaque 'dot' posteriorly and caudally to the non-coronary aortic sinus that is the aortic root sign \[[@CR2],[@CR3]\]. To the best of my knowledge, the only case of aberrant interarterial LCx artery ever reported in the English literature is the case by Hur et al. \[[@CR4]\] in which a 55-year-old man underwent CTA for chest pain and was found to have an interarterial right aortic sinus-connected LCx artery that crossed beneath the proximal segment of the left anterior descending artery before reaching the left atrioventricular groove; adenosine 201-thallium myocardial scintigraphy showed no perfusion defect in the territory of the ectopic vessel. Tomographic imaging techniques such as CTA are superior to conventional coronary angiography with regard to detection of aberrant coronary artery origin and proximal course, and certainly help in reaching the right diagnosis, particularly in ambiguous cases \[[@CR5]\]. Although intussusception of the proximal ectopic segment within the aortic wall media has been shown to be a consistent feature of the interarterial course, it has also been described in a case of right aortic sinus-connected retroaortic LCx artery \[[@CR6]\]. Hence, in such cases, particularly when the distribution of the LCx artery to the posterolateral wall is large and/or ischaemia has been documented across the LCx artery territory by a functional test or the patient presents with typical angina in the absence of significant atherosclerotic disease, CTA can be employed to investigate the possibility of an intramural retroaortic LCx artery course. The intramural segment will be narrowed relative to the distal reference extramural segment while its cross-section will be ovoid due to lateral compression \[[@CR5]\]. However, evaluation of the pathophysiological mechanisms leading to ischaemia and quantification of their significance can only be made with the use of intravascular ultrasound scanning \[[@CR6]\].
{ "pile_set_name": "PubMed Central" }
Q: Function returns BYTE array I want my function to return a BYTE array. The function is as follows. BYTE sendRecieveData(BYTE control, unsigned int value){ //Open connection to LAC HANDLE LACOutpipe; HANDLE LACInpipe; LACOutpipe=openConnection(MP_WRITE); LACInpipe=openConnection(MP_READ); //declare variables BYTE bufDataOut[3]; BYTE bufDataIn[3]; DWORD bufInProcess; DWORD bufOutProcess; //sets CONTROL bufDataOut[0]=control; //sets DATA to be sent to LAC BYTE low_byte = 0xff & value; BYTE high_byte = value >> 8; bufDataOut[1]=low_byte; bufDataOut[2]=high_byte; MPUSBWrite(LACOutpipe,bufDataOut,3,&bufOutProcess,1000); MPUSBRead(LACInpipe,bufDataIn,3,&bufInProcess,1000); MPUSBClose(LACOutpipe); MPUSBClose(LACInpipe); return bufDataIn[3]; } It doesn't return a byte array and when I change BYTE to BYTE[] or BYTE[3] it gives me an error. A: return bufDataIn[3]; means "return 4th element of bufDataIn array" and in this case it leads to undefined behaviour since the size of this array is 3. You can allocate memory for this new array in the body of your function and return pointer to its first element: BYTE* createArray(...) { BYTE* bufDataOut = new BYTE[3]; .... return bufDataOut; } Don't forget to delete it when you finish with it: { BYTE* myArray = createArray(...); ... delete[] myArray; } Even better, use std::vector<BYTE> and get rid of this ugly memory management with it ;) This ensures that the memory is properly freed on any return path, even when exceptions are thrown. A: Since your array is relatively small I'd recommend to pass your buffer as a function argument. void sendRecieveData(BYTE control, unsigned int value, BYTE (&buffdataIn)[3] ). Now, one will use this function as follows: BYTE result[3] = {0}; sendRecieveData(3, 0, result); This way you may avoid usage of dynamic memory allocation and make your code safer.
{ "pile_set_name": "StackExchange" }
How can Coddan helps to etsblish a trading name? How can Coddan helps to establish a brand name? The process of registering a business brand name is not extremely long and intricate. The proposed limited company name must go through numerous checks before it can qualify. We will complete a comprehensive search on your behalf, which will sift through over 10 million names. If your name is remotely similar to another existing label, we will inform you and guide you through every step of the way. Our reliable search processes the information with complete accuracy, even against the flow of the thousands of company names that continuously register each day. All you need to do is fill out our simple application form, providing your name and personal details, the proposed company name, and pay. The form should take no longer than five minutes to complete and is extremely straightforward. However, if you still require assistance, one of our business advisors will be more than willing to help. This business name registration form is online application through our website, but for those of you that are not confident in filling out electronic forms and paying electronically, we have the option of paper forms, which you can complete and send it to us. Once the whole process is complete and the company name registers, you will receive confirmation and have the option to purchase a physical copy of the certificate of incorporation. In the event that your company name is too similar to an existing business name, we will help provide alternatives that do not infringe on those names free of charge. You can call our consultants at Coddan Formations Agency and discuss business names and we will talk you through the process and offer simple tips and solutions to enable you to secure the name of your choice. The issue of sensitive words can cause problems for many company names that aim to have something specific in their company title. These sensitive words sometimes require proof from an external body in order to enable their usage; this is to prohibit people promoting a service that they are not legally qualified to do. Securing the right to use a sensitive word in a business name is often a long process that can halt the progress of the business name’s registration. For an additional fee, Coddan can conduct this extra duty on your behalf, by searching out the appropriate authority and securing the information needed to register the name. This will prevent you from doing any complicated research that we can perform quickly and easily.
{ "pile_set_name": "Pile-CC" }
// // HelpMenuViewModel.swift // ProtonVPN - Created on 27.06.19. // // Copyright (c) 2019 Proton Technologies AG // // This file is part of ProtonVPN. // // ProtonVPN is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // ProtonVPN is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with ProtonVPN. If not, see <https://www.gnu.org/licenses/>. // import Cocoa import vpncore protocol HelpMenuViewModelFactory { func makeHelpMenuViewModel() -> HelpMenuViewModel } extension DependencyContainer: HelpMenuViewModelFactory { func makeHelpMenuViewModel() -> HelpMenuViewModel { return HelpMenuViewModel(factory: self) } } class HelpMenuViewModel { typealias Factory = VpnManagerFactory & NavigationServiceFactory & VpnKeychainFactory & CoreAlertServiceFactory & FirewallManagerFactory private var factory: Factory private lazy var vpnManager: VpnManagerProtocol = factory.makeVpnManager() private lazy var navService: NavigationService = factory.makeNavigationService() private lazy var vpnKeychain: VpnKeychainProtocol = factory.makeVpnKeychain() private lazy var alertService: CoreAlertService = factory.makeCoreAlertService() private var firewallManager: FirewallManager { return factory.makeFirewallManager() } init(factory: Factory) { self.factory = factory } func openLogsFolderAction() { navService.openLogsFolder() } func selectClearApplicationData() { alertService.push(alert: ClearApplicationDataAlert { [self] in self.vpnManager.disconnect { [self] in self.clearAllDataAndTerminate() } }) } func openReportBug() { navService.showReportBug() } private func clearAllDataAndTerminate() { // firewall do { try FileManager.default.removeItem(at: AppConstants.FilePaths.firewallConfigDir()) } catch {} // keychain self.vpnKeychain.clear() AuthKeychain.clear() // app data if let bundleIdentifier = Bundle.main.bundleIdentifier { Storage.userDefaults().removePersistentDomain(forName: bundleIdentifier) Storage.userDefaults().synchronize() } do { try FileManager.default.removeItem(atPath: AppConstants.FilePaths.sandbox) // legacy } catch {} do { try FileManager.default.removeItem(atPath: AppConstants.FilePaths.starterSandbox) // legacy } catch {} // vpn profile self.vpnManager.removeConfigurations(completionHandler: nil) // quit DispatchQueue.main.async { NSApplication.shared.terminate(self) } } }
{ "pile_set_name": "Github" }
A therapist’s guide to staying productive when depressed or heartbroken - marojejian https://qz.com/1089589/how-to-stay-productive-when-youre-depressed-or-heartbroken/ ====== alexibm I am 35M terribly heartbroken after my most important relationship for which I had great hopes, ended in a complete disaster almost 10 months ago. Person I loved the most, cheated one, shitted on me, got engaged to guy, sent me pictures of her/dude + wedding band on OUR anniversary day, told me that she will name a dog after child we were planning to have, got dumped in 6 months, because he didn't want to have her 10 YO son and came back without apologies, and when I refused to take her back, she went to Switzerland police and got restraining order against me ... just to shit on me more. So, I am banned from entering Switzerland.(I live in US) To be honest, I followed a lot of things on this list, but it still doesn't help. To this day, my productivity is shit. Somehow, I accomplish things being asked of me, but I feel like empty shell of former me walking around. Have to admit, alcohol helps me a lot. ~~~ erokar If it's any consolation it sounds like your ex has a personality disorder with sadistic traits. It is unlikely she will ever make anyone happy, quite the opposite. ~~~ alexibm She has traits of [Borderline?] Personality Disorder, but I found out about BPD after whole thing went down in flames and I started doing research. She is 35. Attractive. Abused childhood, absent mother that went around banging man and abusive stepfather, father left when she was 2. She had 3 marriages that collapsed, numerous engagements that probably fell as well, and shit-load of relationships that are short-lived(6m-1y). And of course, all men were terrible. On top, she has eating disorder and thin as rail. Entire ordeal sounds like some evil plot to destroy me. My older friends, who went through divorces, were shocked and said this by far nastiest break-up they heard about. ~~~ mratzloff It's not uncommon for someone with BPD. It only gets worse over time unless the person makes a concerted effort to work with a trained specialist to manage the symptoms, and most don't. You are neither the first nor last to have a marriage fall apart as a result of BPD. It's fucked up, it's horrible, but you will survive it. Eventually you'll have days where you don't even think about it. That said, I highly recommend you speak to a therapist. There are things you are doing to attract these personalities and it's important to recognize it so you don't find yourself in the same situation in the future. Also, read this book immediately: [https://www.amazon.com/dp/1442238321](https://www.amazon.com/dp/1442238321) ------ arca_vorago I can say that as a combat vet with under control ptsd I just want to say these are good basic conversation points but I highly encourage people to attempt cognitive emotional behavioral therapy (CEBT/CBT), especially for people who dislike therapists and want to work throught their own shit. Once the science finally made it's way to practice, I have seen many fellow combat vets who responded poorly to other treatments make amazing progress under CBT/CEBT. [https://en.wikipedia.org/wiki/Cognitive_behavioral_therapy](https://en.wikipedia.org/wiki/Cognitive_behavioral_therapy) Drugs: Fuck that seratonin zombie bullshit! Try smoking some cannabis instead of drinking next time. I personally also have this theory that ayahuasca can cause ego-busting outlook shifts for people with everything from alcoholism to ptsd, but there hasn't been enought science done on the subject yet and I can't speak anecdotally because I haven't been able to afford the trip down to Peru. Other drugs with potential positive effects on ptsd/anxiety/depression are MDMA, peyote, morning glory, and salvia divinorum. Of course do your own research and consult a doc if you intend do any of this. It's a crime that so many potential medicines are illegal. ~~~ naasking MDMA and ketamine are employed in the UK for extreme depression and PTSD, IIRC. ~~~ DanBC I don't think MDMA is used, and if it is it's only used in research settings. There's a single clinic offering ketamine for depression. [http://www.oxfordhealth.nhs.uk/service_description/ketamine-...](http://www.oxfordhealth.nhs.uk/service_description/ketamine- clinic-for-depression/) ------ nxsynonym As someone who has major "on" and "off" period swings of productivity due to depression, this list is pretty on the mark. One thing I would add, which I've seen around here and other places, is the "no zero days" rule. Do at least one thing everyday to work towards your goal. Not only does this help instill discipline, it helps you prevent the snowball effect of having a bad day. ~~~ dualogy I absolutely need zero days rougly ever 8-10 days of full-time brain work. Nothing recuperates my fried circuits better than the occasional single day with _absolutely no agenda and not even the tiniest of goals_ , the rare day of _anything goes, nothing must_. Motivation drive and interest comes back so swiftly and with such vengeance on the next morning, I doubt there's _anything_ that remotely compares. Guess that's what this whole "weekend" notion was all about in the first place! =) ~~~ mbrameld Well, the comment about no zero days was in the context of trying to remain productive while depressed, not how to avoid burnout during periods of intense productivity. Do you agree context matters? ~~~ rjeli It's often ambiguous whether you're depressed, burned out, or both. ------ colechristensen This misses the mark as I see it because it doesn't emphasize the three most important things to helping depression: Bright light, sleep, and exercise. Light: get bright light to wake you up, experience bright light during the day (preferably sunlight), if you're having trouble sleeping, disconnect from any screens at least an hour before a scheduled time to sleep. Don't set up yourself in a dark closed-window living environment. Sleep: ahead of time, schedule times when you should be asleep and awake, always be trying to keep to this schedule. Stay out of the bedroom outside of these hours. Exercise: whether it's walking around the block, going to the gym, or hiking up a mountain, do what you can to exert yourself every day. It helps with the light and the sleep. These three things won't fix your problems but they will make everything better even if you can only improve them a little. ~~~ craftyguy >experience bright light during the day (preferably sunlight I'm in the Pacific NW, fall/winter/spring is coming.. :( ~~~ tqkxzugoaupvwqr Going outside and getting daylight on overcast days is still much, much better than any typical light indoors. If you measure the light in a room vs. outside, rooms are dark caves. Your eyes may say it isn’t dark, but you’ll get next to nothing indoors. This has a big effect on your mood and hormones. ~~~ craftyguy That's good to keep in mind. Some friends and coworkers are big on the 'happy lights' but they (the lights) make me want to pull out my eyeballs. Guess we'll have to get umbrellas and stand in the rain to be happy! ------ heartbroken20yo As a relatively young entrepreneur that fell in love a year ago, and then had the relationship fall apart a few months ago, I found falling in and out of love to destroy my productivity. I was in a multi month rut that I only crawled out of through therapy and understanding how to actually care about myself. As much as I know that I'd be better at handling the situation after having experience now, the sheer awfulness of having to run a business while feeling heartbroken turns me off from wanting another relationship. I guess I understand now why so many entrepreneurs I know have messy love lives. ~~~ anigbrowl It's not so much that you're not productive when depressed, as the awareness that achievement in other spheres of activity are not actually all that satisfying absent a nurturing relationship - also a problem for many lottery winners who find themselves trying and failing to consume happiness. I'm sorry that happened but you shouldn't treat it as an insurmountable problem. If you're just 20, your body isn't even completely done growing and you're also relatively inexperienced in dealing with intense emotions. You'll always bear the scars of the pain you felt from this relationship breaking up, and have regrets about whatever parts of it were caused by you, but you can and will heal. Being willing to accept help through therapy and reassess yourself means you're already a long way towards that. Be careful of the hesitancy to get into another relationship - a natural doubt, but one that can stiffen into a 'reaction-formation' is taken too far. It's certainly tempting (especially when you're younger) to just date casually for social and sexual companionship, but if you systematically avoid relationships then undertaking and sustaining new ones will be more difficult, and as you get older the frustrations and loneliness that can result will weigh increasingly heavy and result in bitterness. It may help to think of relating to others as a skill to be developed and continuously improved rather than as an achievement to be unlocked (which is way overstressed in media and marketing). A pet animal can help a lot with that. The obligations involved impose a sort of emotional discipline on you, but the rewards are unbounded as animals are generous with their affections. If you end up with a dog it will also improve your social life - people are well-disposed to the owner of a happy dog, and it also makes small talk much easier. ~~~ imcoconut This comment is extremely insightful and actionable. Thank you. ------ rkunnamp Stuff that helped me \- Staying near or staying along with your closest ones \- Sleep and Exercise \- Some ayurvedic pills that is known to relieve stress and help sleep ("Ashwagandha" to be specific. I wont say it is a magic pill, but when I take it , I used to get a deep sleep) ------ faitswulff Sometimes the most productive thing you can do is heal. ------ marojejian An essential element to resilience is to have a strong support group, ideally friends, or people who are going through a similar thing. In that vein - shameless plug: I've been working on a service (www.campfire.care) to build peer support groups for any focus. Groups of 5-10 people with the same issue meet regularly via video and stay connected via chat. The idea is that we are fundamentally social creatures, and struggling with a challenge alone is unhealthy. It is not therapy or a replacement for therapy. But peer support can be effective + inexpensive. And being part of a true peer group can provide a kind of value that professional mental health can't. You can't be friends with you therapist, and their job is not to truly empathize with you. Would love any thoughts / feedback! ~~~ DanBC You might be interested in the Q Community's work on peer support: [https://q.health.org.uk/q-improvement-lab/lab-1-peer- support...](https://q.health.org.uk/q-improvement-lab/lab-1-peer-support- available/) ~~~ marojejian Thanks! I will check this out. ------ dogruck If you're actually depressed, go see a professional. ~~~ asteli have you had to do this? there's a catch-22 here in that depression makes it way harder to invest the time in finding professional help. ~~~ dogruck Not personally. I've lost 2 loved ones to it. Just because it's hard to seek help doesn't mean that it's incorrect.
{ "pile_set_name": "HackerNews" }
474 F.Supp.2d 547 (2007) In re PARMALAT SECURITIES LITIGATION. This document relates to: Nos. 04 Civ. 0030(LAK). 04 MD 1653(LAK). United States District Court, S.D. New York. February 21, 2007. *548 James J. Sabella, New York City, Stuart M. Grant, John C. Kairis, Diane Zilka, Grant & Eisenhofer, P.A., Wilmington, *549 DE, Steven J. Toll, Washington, DC, Lisa M. Mezzetti, Chevy Chase, MD, Mark S. Willis, Julie Goldsmith Reiser, Joshua S. Devore, Washington, DC, Cohen, Milstein, Hausfeld & Toll, P.L.L.C., for Plaintiffs. Bruce R. Braun, Linda T. Coberly, Chicago, IL, Theodore Z. Polley, Ann Arbor, MI, Winston & Strawn LLP, for Defendant Grant Thornton LLP. MEMORANDUM AND ORDER KAPLAN, District Judge. This is a purported class action on behalf of purchasers of securities of Parmalat Finanziaria, S.p.A., ("Parmalat") for damages allegedly sustained when Parmalat collapsed following discovery of a massive fraud that reportedly involved the understatement of Parmalat's debt and the overstatement of its assets by billions of dollars. The matter is before the Court on a motion by Grant Thornton LLP ("GTUS") to dismiss the third amended complaint (the "TAC") as to it. I assume familiarity with my prior decisions in this case, including particularly those reported at 375 F.Supp.2d 278, which dealt with motions by GT-US and other accountants to dismiss the initial complaint (the "Auditor Opinion"), and 376 F.Supp.2d 472, which resolved similar motions by various defendant banks. Also important for purposes of this motion is the opinion in a related case brought by Dr. Enrico Bondi, Extraordinary Commissioner of Parmalat and related entities, which is reported at 421 F.Supp.2d 703 ("Bondi"). As the nature of the litigation and the allegations of the class plaintiffs and Dr. Bondi are sufficiently described for most purposes in the previous opinions, I omit any such description here. I discuss particulars of this pleading (which is 400 pages in length) only to the extent they are necessary to the resolution of this motion. I The essential background of this motion is the somewhat complex structure of Grant Thornton which, although perhaps differing in some particulars, is similar to that of the other major international accounting firms. What is commonly known as Grant Thornton in fact consists of a number of putatively separate legal entities that use the Grant Thornton name and market themselves as a global accounting organization. GT-US is the largest, accounting for about one-quarter of the fees generated by the global organization. Grant Thornton International ("GTI") is an Illinois corporation headquartered in London that creates auditing policies and procedures that must be followed by all member firms and reviews each member firm periodically to ensure compliance. Grant Thornton S.p.A. ("GT-Italy") was a member firm located in Italy that audited Parmalat during part of the period in which the fraud allegedly took place.[1] All are defendants here. GT-Italy has not challenged the sufficiency of any of the complaints. In the Auditor Opinion, I denied GTI's motion to dismiss, but granted that of GT-US. Following my ruling in Bondi, where I denied a motion by GT-US to dismiss that complaint,[2] class plaintiffs filed the TAC, in part to bring GT-US back into the case by conforming its allegations as to GT-US to Bondi's complaint. At this point, class plaintiffs assert that the TAC asserts claims against GT-US on two theories. First, they contend that GT-US is vicariously liable for primary *550 violations of Section 10(b) of the Securities Exchange Act of 1934 (the "1934 Act")[3] and Rule 10b-5 thereunder[4] allegedly committed by GT-Italy on a subagency theory, viz. that GT-Italy was an agent of GTI, which in turn was an agent of GUS. Second, they argue that the TAC states a claim against GT-US under Section 20(a) of the 1934 Act.[5] II GT-US first challenges the Rule 10b-5 claim on essentially three grounds. First, it asserts that agency liability under Rule 10b-5, to whatever extent it exists, is limited to circumstances in which the allegedly false statement by the primary violator, here GT-Italy, was attributed to the principal, here GT-US, at the time of its public dissemination. This, it contends, is required by Wright v. Ernst & Young LLP[6] and its progeny. The TAC, it says, alleges no such false statement. Second, it contends that imposing "GTI's liabilities on GT-US would be an end-run around GTI's corporate structure[7] and run afoul of Illinois law.[8] Finally, GT-US argues that the theory of agency espoused here by the class plaintiffs "is novel indeed."[9] Although it concedes that "traditional agency theories may still be available for claims under Section 10(b), `novel and expansive' theories are not."[10] They rely for this proposition on In re Global Crossing, Ltd. Securities Litigation ("Global Crossing III ").[11] A. The Supposed Attribution Requirement GT-US contends that Wright forecloses respondeat superior liability here because no false statement allegedly is attributed to the firms Wright, however, does no such thing. It is important to recognize, as an initial matter, that principals typically are liable for torts and crimes committed by their agents acting within the scope of their authority. This long has been applied to impose respondeat superior liability in federal securities and criminal cases even where the principal itself has committed no primary violation.[12] The liability *551 in such cases is vicarious — that is, it is based on the status of the defendant, not on the defendant's actions. In other words, liability is imposed on the principal "not because it committed some wrongdoing outside the purview of the statute which assisted the wrongdoing prohibited by the statute, but because its status merits responsibility for the tortious actions of its agent."[13] Wright's antecedent, the Supreme Court's decision in Central Bank of Denver v. First Interstate Bank of Denver,"[14] dealt with a question entirely separate from vicarious liability, viz. the nature of the conduct that runs afoul of Section 10(b) and Rule 10b-5. It held that there is no aiding and abetting liability under Section 10(b) and Rule 10b-5, essentially because aiding and abetting liability could not be reconciled with the text.[15]Wright followed in its wake, holding that 10b-5 liability for an accountant's private approval of a false press release issued by its client, but not attributed to the accountant, is foreclosed by Central Bank, as it alleged in substance nothing more than aiding and abetting.[16] The issue in Central Bank and Wright thus was the nature of the conduct that subjects one to Section 10(b) and Rule 10b-5 liability. Neither involved the entirely distinct question whether a principal, in consequence of its status, may be held liable on the basis of respondeat superior for a 10b-5 violation committed by its agent. I, however, decided precisely that question — adversely to GT-US's position — in the Auditor Opinion.[17] The fact that Central Bank and Wright left respondeat superior liability untouched is confirmed by Suez Equity Investors, L.P. v. Toronto-Dominion Bank.[18] Certain defendants there contended that they could not be held liable under Rule 10b-5 in light of Central Bank and Wright because the allegedly false report had been delivered by another. But the Court of Appeals rejected that argument, writing that those defendants: "contend that under Central Bank of Denver, N.A. v. First Interstate Bank of Denver, N.A., 511 U.S. 164, 114 S.Ct. 1439, 128 L.Ed.2d 119 (1994), and Wright v. Ernst & Young, LLP, 152 F.3d 169 (2d Cir.1998), they are not liable for the acts of DeRoziere. These cases are inapposite. In Central Bank the Supreme Court held that a party may riot bring a cause of action against one actor under § 10(b) for aiding and abetting the violation by another `actor because § 10(b) does not prohibit aiding and abetting." See 511 U.S. at 191, 114 S.Ct. 1439. Wright simply applied that holding. See 152 F.3d at 175. "The distinction between the case at bar and those cited is that in Central Bank and Wright there was no allegation that the defendants were agents of the alleged defrauder, acting for the defrauder. Rather, the Central Bank and Wright plaintiffs only alleged that the defendants knew of the purported fraud through transactions with the defrauders, but failed to expose the deception.[19]*552 Indeed, as Judge Koeltl cogently has suggested, a contrary view would preclude holding corporations and other business entities liable for securities frauds committed by their employees.[20] In sum, GT-US's reliance on Wright is fundamentally misplaced because it confuses the conduct necessary to violate lOb-5 with the quite separate matter of whether a principal may be held liable for the 10b-5 violation of its agent on the basis of the principal's status.[21] That issue already has been settled, at least for this litigation, contrary to GT-US's position. I see no reason to depart from that holding. B. GTI's Corporate Structure and Illinois Law GTI is an Illinois not-for-profit corporation of which GT-US is a member. Act 105, section 107.85 of chapter 805 of the Illinois statutes provides that "[t]he members of [such] a corporation shall not be personally liable for any debt or obligation of the corporation." GT-US therefore argues that it cannot be held liable for the violations of GT-Italy on plaintiffs' subagency theory, in the absence of a piercing of the corporate veil of GTI, because this statute excludes such liability. Once again, GT-US's argument confuses the issue. The statute it relies upon states the conventional rule that members or shareholders of a corporation, simply by virtue of that status, are not personally liable for the debts of their entities. But respondeat superior liability for criminal and tortious behavior rests on the entirely different concept that a principal bears legal responsibility for the actions of its agent that are committed in the course of the agency. Such liability thus turns on the principal's status as principal. Where the principal is also a corporate member or shareholder, vicarious liability on the basis of the status of member or shareholder is foreclosed by the statute. But the statute does not address the question whether a member or shareholder, in circumstances in which the member or shareholder is a principal and the wrongdoer its agent, is vicariously liable on the basis of its status as a principal. C. The Supposed Novelty of Plaintiffs Theory The sole basis for GT-US's attempt to attach significance for 10b-5 purposes to a perceived distinction between "traditional" and "novel" theories of agency is Global Crossing III.[22] To whatever extent the case actually supports such a distinction, which is debatable, it has no application here. In Global Crossing III, the Court dealt with securities fraud claims against the Canadian Imperial Bank of Commerce ("CIBC") and CIBC World Markets Corp. ("World Markets"), large shareholders in Global Crossing, that arose in connection with the massive accounting irregularities at Global Crossing. Insofar as is relevant here, the plaintiffs' theory was that CIBC and World Markets were liable on the theory of respondeat superior for false and misleading statements signed by Global Crossing directors who were World Markets employees chosen by CIBC to sit on the Global Crossing board of directors. In *553 dismissing this claim, Judge Lynch made essentially two points. First, directors have fiduciary duties to act on behalf of the companies on the boards of which they serve, not on behalf of the entities that appointed them.[23] Although he did not say it in so many words, the logical conclusion from that proposition is that the CIBC-World Markets designees were not acting within the scope of their authority as agents of CIBC and World Markets when they signed the false and misleading statements in their capacities as directors of Global Crossing. He went on to note that plaintiffs had "point[ed] to no case where a corporation has been held liable on a theory of respondeat superior for the actions of its employees in their capacities as independent directors sitting on the board of a different corporation" and that extension of respondeat superior liability to cover such cases would go considerably beyond previous practice in the securities area.[24] Second, Judge Lynch pointed out that the existence of control person liability under Section 20(a) of the 1934 Act, with its "good faith" defense, "counsels against novel and expansive applications of respondeat superior in this context."[25] GT-US has fastened on the second of these points. But its reliance is misplaced. As an initial matter, the holding that conventional principles of respondeat superior were insufficient to make CIBC and World Markets responsible for the actions of their designees on the Global Crossing board in their capacities as Global Crossing directors was quite sufficient to dispose of the motion. The observations about the need for caution in expanding respondeat superior in the securities law context appear to have been dicta. Moreover, there is reason to conclude that they are inconsistent with the law of this Circuit. In Marbury Management, Inc. v. Kohn,[26] the defendants sought to defeat claims made on respondeat superior theories by arguing that the existence of control person liability under Section 20(a) of the 1934 Act was inconsistent with permitting vicarious liability except under that statute. But the Second Circuit rejected that contention, stating that: "there is no warrant for believing that Section 20(a) was intended to narrow the remedies of the customers of brokerage houses or to create a novel defense in cases otherwise governed by traditional agency principles. On the contrary Section 28(a), 15 U.S.C. § 78bb, specifically enacts that the rights and remedies provided by the `34 Act shall be in addition to any and all rights and remedies that may exist at law or in equity."[27] In consequence, there is strong reason to conclude that respondeat superior liability exists in appropriate securities fraud cases without regard to whether the facts or the doctrine is characterized best as traditional or novel. But there ultimately is no need to decide that issue. Plaintiffs' theory here is simplicity itself. In their view, GT-Italy violated the securities laws to their detriment within the scope of its employment as an agent of GTI and a subagent of GT-US. Assuming they can prove that, there would be nothing at all novel about subjecting both GTI and GT-US to vicarious liability. The Restatement states with pristine clarity that "[t]he rules applicable to the liability of a principal for the acts of agents, are applicable to his liability for subservants and *554 other subagents insofar as their conduct has relation to the principal's affairs."[28] Cases to the same effect are legion[29] In consequence, even if GT-US were right in positing that "[a]lthough traditional agency theories may still be available for claims under Section 10(b), `novel and expansive theories' are not,"[30] the lack of novelty of the legal principles relied upon by plaintiffs would doom their argument.[31] III GT-US's final argument is that the Section 20(a) claim is insufficient because the TAC fails to allege control by GT-US over the transactions in question.[32] This argument too, in my view, is without merit. Section 20(a) of the 1934 Act provides: "Every person who, directly or indirectly; controls any person liable under any provision of this chapter or of any rule or regulation thereunder shall also be liable jointly and severally with and to the same extent as such controlled person to any person to whom such controlled person is liable, unless the controlling person acted in good faith and did not directly or indirectly induce the act or acts constituting the violation or cause of action."[33] The statute thus requires control only of a person liable under the chapter, not of the transaction constituting the violation. Requiring a plaintiff to plead and prove not only that the defendant controlled the person liable under the chapter, but also that the defendant had exercised control over the transaction constituting the violation, would be in serious tension and probably inconsistent with the language of the statute. It would be inconsistent also with my oft-stated view that a plaintiff relying on Section 20(a) is not obliged to allege or prove a controlling person's culpable participation in the violation.[34] And to whatever extent GT-US may be making a somewhat different point, viz., that the allegations of the complaint do not adequately allege that it had the ability to control the transactions at issue, I disagree. Conclusion For the foregoing reasons, the motion of Grant Thornton LLP to dismiss the third amended complaint [04 MD 1653 docket item 638, 04 Civ. 0030 docket item 551] is denied in all respects. For the sake of good order, I note that I exclude all materials other than the TAC that were submitted *555 on the motion and decline to convert it would into a motion for summary judgment. SO ORDERED. NOTES [1] Auditor Opinion, 375 F.Supp.2d at 283, 288. [2] 421 F.Supp.2d at 718-19. [3] 15 U.S.C. § 78j(b). [4] 17 C.F.R. § 240.10b-5. [5] 15 U.S.C. § 78t(a). [6] 152 F.3d 169 (2d Cir.1998). [7] Def. Mem. 10. [8] Id. (citing 805 ILL. COMP. STAT. 105/107.85, which states that "[t]he members of a [not for profit] corporation shall not be personally liable for any debt or obligation of the corporation"). [9] Def. Mem. 15. [10] Id. at 16 (emphasis in original). [11] No. 02 Civ. 0910(GEL), 2005 WL 2990646 (S.D.N.Y. Nov. 7, 2005). [12] New York Cent. & Hudson River R.R. Co. v. United States, 212 U.S. 481, 29 S.Ct. 304, 53 L.Ed. 613 (1909); see also, e.g., Marbury Mgmt., Inc. v. Kohn, 629 F.2d 705, 712-16 (2d Cir.), cert. denied, Wood Walker & Co. v. Marbury Mgmt., Inc., 449 U.S. 1011, 101 S.Ct. 566, 66 L.Ed.2d 469 (1980); Global Crossing III, 2005 WL 2990646, at *5. In fact, most circuits have explicitly held that respondeat superior applies in federal securities cases, and none currently regards the securities laws as supplanting the doctrine. See, e.g., Suez Equity Investors, L.P. v. Toronto-Dominion Bank, 250 F.3d 87, 101 (2d Cir.2001); Hollinger v. Titan Capital Corp., 914 F.2d 1564, 1576-77 (9th Cir.1990) (en banc), cert. denied, 499 U.S. 976, 111 S.Ct. 1621, 113 L.Ed.2d 719 (1991); In re Atl. Fin. Mgmt., Inc. Sec. Litig., 784 F.2d 29, 35 (1st Cir.1986), cert. denied, AZL Res., Inc. v. Margaret Hall Found., 481 U.S. 1072, 107 S.Ct. 2469, 95 L.Ed.2d 877 (1987); Commerford v. Olson, 794 F.2d 1319, 1323 (8th Cir.1986); Henricksen v. Henricksen, 640 F.2d 880, 887 (7th Cir.), cert. denied, 454 U.S. 1097, 102 S.Ct. 669, 70 L.Ed.2d 637 (1981); Marbury Mgmt., Inc., 629 F.2d at 712-16; Paul F. Newton & Co. v. Tex. Commerce Bank, 630 F.2d 1111, 1118 (5th Cir.1980); Holloway v. Howerdd, 536 F.2d 690, 694-95 (6th Cir.1976). [13] Am. Tel. & Tel. Co. v. Winback & Conserve Program, Inc., 42 F.3d 1421, 1431 (3d Cir. 1994) (emphasis in original). [14] 511 U.S. 164, 114 S.Ct. 1439, 128 L.Ed.2d 119 (1994). [15] Id. at 176-77, 114 S.Ct. 1439. [16] 152 F.3d at 173-75. [17] 375 F.Supp.2d at 291 n. 73. [18] 250 F.3d 87. [19] Id. at 100. [20] Vento & Co. of New York v. Metromedia Fiber Network, Inc., No. 97 Civ. 7751(JGK), 1999 WL 147732, at *13 (S.D.N.Y. Mar. 18, 1999). [21] GT — US relies on In re Global Crossing, Ltd. Sec. Litig., No. 02 Civ. 0910(GEL), 2005 WL 1907005, at *10 n. 8 (S.D.N.Y. Aug. 8, 2005), and Gabriel Capital, L.P. v. NatWest Finance, Inc., 122 F.Supp.2d 407, 430-31 (S.D.N.Y. 2000), both of which adopted the position they advocate, at least to some extent. They are not persuasive for the reasons set forth in the text. [22] 2005 WL 2990646. [23] Id. at *5. [24] Id. at *6. [25] Id. [26] 629 F.2d 705. [27] Id. at 716. [28] RESTATEMENT (SECOND) OF AGENCY § 255 (1958). [29] E.g., Blanchette v. Cataldo, 734 F.2d 869, 875 (1st Cir.1984); Reed v. Michael Realty & Assocs., No. 92 C 6751, 1994 WL 559225, at *8 (N.D.Ill. Oct. 7, 1994); Merritt v. Woodridge Court Condos. Assoc., No. 87 C 4073, 1988 WL 53166, at *6 (N.D.Ill. May 16, 1988). [30] Def. Mem. 16 (emphasis in original). [31] GT-US's contention that the TAC fails sufficiently to allege the subagency relationship (Def.Mem.4-6, 18-21), assuming the argument actually is addressed to that point as well as to its contention that the TAC fails sufficiently to allege facts that would justify piercing the GTI corporate veil, is without merit. The relevant allegations are practically a verbatim copy of those I upheld in Bondi, 421 F.Supp.2d at 719. Compare Bondi v. Grant Thornton Int'l, No. 04 Civ. 9771, First Am. Cpt. (docket item 121) ¶¶ 38-55, with TAC ¶¶ 176-92. [32] Def. Mem. 22-24. [33] 15 U.S.C. § 78t(a). [34] E.g., Auditor Opinion, 375 F.Supp.2d at 307-10. I recognize, of course, that there is a split of authority on this point. See Lapin v. Goldman Sachs Group, Inc., No. 04 Civ. 2236(KMK), 2006 WL 2850226, at *18-19 (S.D.N.Y. Sept. 29, 2006) (discussing split in S.D.N.Y.).
{ "pile_set_name": "FreeLaw" }
Description Cozi Family Organizer is the surprisingly simple way to manage everyday family life. With a shared calendar, reminders, grocery list and more, Cozi is a 3-time Mom’s Choice Award Winner and The TODAY Show “must-have app” for a better life. Cozi is free, easy to use, and available from any mobile device or computer. FAMILY CALENDAR • Keep track of everyone’s schedules with a simple color-coded calendar • Set reminders for yourself or others in the family so no one misses practice or an important event • Send automated daily or weekly agenda emails to any family member • See upcoming events quickly with 3D Touch and Widgets for iOS 10 SHOPPING LISTS & TO DO LISTS • Everyone in the family will always know what you need at the grocery store • See items added by other family members in real-time, and never forget the one thing you really need to make dinner • Create as many to do lists as you want - a shared to do list for the whole family, chore checklists for the kids, a vacation packing checklist, and more RECIPE BOX • Organize all your recipes in one place that's accessible anytime, anywhere - at home or at the store • Add ingredients to your shopping list quickly and schedule meals onto your calendar • Cook from your phone with helpful features like the no-dim button that keeps your screen on while you're cooking MORE ABOUT COZI • Your Cozi calendar, shopping lists, to do items, recipe box and family journal are accessible from any mobile device or computer • No matter where or how your family signs in to Cozi, everyone will be looking at the same information • The whole family shares one account that everyone can access using their own email address (as specified in Settings) and the shared family password RAVE REVIEWS ABOUT COZI • "Cozi is, in short, ridiculously handy. My only regret is that I waited this long to start using it." –PC World • "Cozi just works." –The Wall Street Journal • "This thing is indispensable for busy families" –CNET • "Too good to be true." –Family Fun Magazine • "Cozi is a FlyLady-approved application." –The FlyLady All the features listed above are free. Cozi also offers an optional ad-free premium subscription called Cozi Gold which gives you additional features like Contacts, Birthday Tracker, mobile app themes, more reminders, mobile month view, change notifications and more. Cozi Gold is $29.99 USD per year. Price may vary by location. Your subscription is charged to your credit card through your iTunes account and will automatically renew unless you cancel at least 24 hours before the end of the current period. You can manage your subscription in iTunes or visit Settings in Cozi after purchase. Cozi privacy policy: www.cozi.com/privacy-policy/ Cozi terms of use: www.cozi.com/terms-of-use/ Screenshots Reviews Invaluable 5 By a busy wife My husband and I depend on the ability to share all the information we have stored in Cozi. Doctor appointments, grocery list, tire sizes, gift idea. All the information we don’t want to store in our own brains is easily accessed via Cozi. Easy to use. Lifeline 5 By fufu coffee At this point idk what I’d do without my Cozi app! A must have, especially with 5~7 different schedules. Amazing app 5 By Maymomma97 My husband found this application. And it is absolutely AMAZING I know who is doing what, when and where within the family that is always on the go! We have been using this for quite a few years now. I don’t use any other calendar application. Cozi 5 By Mommadoochie Makes my life so easy. I know where everyone is in the family. List for groceries I don’t forget stuff. Love this app. Faithful customers should come first 2 By LatteChic I’ve been a Cozi Gold customer for 5 years ($29.99 I just learned of the reduced subscription rate ($19.99) offered to new customers two years ago...WOW, that is not how you keep this faithful customer!! What a Great App 5 By Jospeh S. This app lets all the family stay together on what’s happening with all the kids sports. Super 5 By La jincha Very useful love it thanks. Amazing Cosi 5 By jen_jane Since I have signed with Cosi, everything about my list so organized. Granny Barb 5 By Grandmabeader Excellent. It is very good at keeping me informed of all the family activities including mine as we live as a blended family (two generations). Very good!! Loving Cozi 5 By WiDellsJane Our family loves the Cozi app. We always know when and where we are supposed to be. Can’t live without it now.
{ "pile_set_name": "Pile-CC" }
Q: How can I create test-suites to run on VisualPHPUnit? I am using VisualPHPUnit and I am trying to organize my tests into suites (due to the fact that Selenium IDE does not export PHPUnit test suites). I am currently implementing the option of the configuration XML file. Yet,it is very limiting cause I want to run test suites on demand and not uploading each time on the server a new XML file (aka test suite). I know that I can create an XML file with many test-suites in it but I would like to run them individually. As you understand i am struggling towards DontRepeatYourself principle and code reuse.You know..just choose login.php , then the testcase and them logout.php and run them. Is something like this possible??? Moreover...would it be difficult VisualPHPUnit to parse only one XML file and create a dropdown box of testsuites to choose from and run? This is my XML file <phpunit> <!-- This is required for VPU to work correctly --> <listeners> <listener class="PHPUnit_Util_Log_JSON"></listener> </listeners> <testsuites> <testsuite name="TestSuite1"> <file>/var/www/VisualPHPUnit/app/unitTests/Login/Login.php</file> <file>/var/www/VisualPHPUnit/app/unitTests/CreateCourse/CreateCourse1.php</file> <file>/var/www/VisualPHPUnit/app/unitTests/Logout.php</file> </testsuite> </testsuites> </phpunit> A: actually the PHP formaters are once again available for Selenium IDE. You may want to check this out: https://addons.mozilla.org/en-us/firefox/addon/selenium-ide-php-formatters/ there are 2 php formaters: PHP_unit and PHP_Selenium
{ "pile_set_name": "StackExchange" }
Enokido Station Enokido Station (榎戸駅) is the name of two train stations in Japan: Enokido Station (Aichi) Enokido Station (Chiba)
{ "pile_set_name": "Wikipedia (en)" }
Nata, Botswana Nata is a village in Central District of Botswana. It is located in the northern part of the district, and is served by Nata Airport. The population was 4,150 at the 2001 census. The village of Nata lies along the Nata River, which carries its rainy season flow to the Makgadikgadi Pans, a seasonal hypersaline lake. See also Zoroga Mathangwane Village References Category:Populated places in Central District (Botswana) Category:Villages in Botswana
{ "pile_set_name": "Wikipedia (en)" }
Q: Does calling a method from a specific thread automatically make it run on a seperate core? For example, I make two threads: ExampleThread t1 = new ExampleThread(); ExampleThread t2 = new ExampleThread(); t1.start(); t2.start(); Then whatever is in the run() in each thread is finished. Yet, I know I can still call, say, t1.exampleMethod(); AFTER it's run() is completed. Does this work on it's own core? Thanks. A: First of all, you don't want to extend Thread but rather implement Runnable, and in fact doing so may help clear up some of your confusion, because even though t1 extends a Thread, your calling a method will not run on that thread, the t1 thread, but rather will run in the thread that it was called from. Also note that "after a Thread's run is complete", the Thread no longer runs -- it is done, gone, kaput.
{ "pile_set_name": "StackExchange" }
537 U.S. 966 GILv.UNITED STATES. No. 02-6333. Supreme Court of United States. October 15, 2002. 1 CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT. 2 C. A. 2d Cir. Certiorari denied. Reported below: 36 Fed. Appx. 468.
{ "pile_set_name": "FreeLaw" }
Q: Connect to mysql docker service from custom wordpress config file I want to connect my docker mysql service to my docker wordpress service via a custom wp-config file. This seems like a simple thing to do, but I can find no straightforward answer. I just want to know what to type as the value for this declaration in the wp-config.php file: define( 'DB_HOST', what_do_i_type_here ); I've been able to connect via 0.0.0.0:3307 on my host machine, and I can connect using the wordpress image environment variables WORDPRESS_DB_HOST, etc, but I haven't been able to figure out how to manually connect via the wp-config file. These are a few of the hosts I've tried: 0.0.0.0:3307 127.0.0.1:3307 172.23.0.1:3307 docker.for.mac.localhost:3307 host.docker.internal:3307 Here is my docker-compose: version: '3.3' services: db: image: mysql:5.7 volumes: - db_data:/var/lib/mysql restart: always environment: MYSQL_ROOT_PASSWORD: somewordpress MYSQL_DATABASE: wordpress MYSQL_USER: wordpress MYSQL_PASSWORD: wordpress ports: - "3307:3306" wordpress: depends_on: - db image: wordpress:latest ports: - "8000:80" links: - db:mysql volumes: - ./wp-content:/var/www/html/wp-content - ./wp-config.php:/var/www/html/wp-config.php - ./wp-blog-header.php:/var/www/html/wp-blog-header.php restart: always phpmyadmin: depends_on: - db image: phpmyadmin/phpmyadmin links: - db:mysql ports: - "8009:80" environment: MYSQL_USERNAME: wordpress MYSQL_ROOT_PASSWORD: somewordpress volumes: db_data: {} Here are the configurations in my wp-config file: # Database Configuration define( 'DB_NAME', 'wordpress' ); define( 'DB_USER', 'wordpress' ); define( 'DB_PASSWORD', 'wordpress' ); define( 'DB_HOST', '0.0.0.0:3307' ); // define( 'DB_HOST_SLAVE', '127.0.0.1' ); define('DB_CHARSET', 'utf8'); define('DB_COLLATE', 'utf8_unicode_ci'); A: Take a look at this page: Networking in compose Each container can reach the other by its hostname. You may use define( 'DB_HOST', db:3306 ); in wp-config.php file.
{ "pile_set_name": "StackExchange" }
European route E136 European route E 136 is a European highway located entirely in Møre og Romsdal and Oppland counties in Norway. The highway begins in the town of Ålesund in Møre og Romsdal county on the west coast of Norway and it goes east up through the Romsdalen valley and crossing into the upper Gudbrandsdalen Valley to end at the village of Dombås in Oppland county. Møre og Romsdal county Ålesund municipality Ålesund, to Ålesund Airport, Vigra at Spjelkavik (jointly with E136 until Skorga in Vestnes Municipality) Sørnes Tunnel (236 m) Skodje municipality Brusdal Ørskog municipality Sjøholt Vestnes municipality at Skorga (jointly with E136 from Spjelkavika in Ålesund) Tresfjord Bridge over the Tresfjorden Rauma municipality Vågstrand Tunnel (3,665 m) (Opens in 2014) Måndal Tunnel (2,080 m) Innfjord Tunnel (6,594 m) Rauma Bridge over the Rauma River (140 m) Åndalsnes Sogge Bridge at Åndalsnes Oppland county Lesja municipality at Lesja Dovre municipality at Dombås References External links 199136 E136 E136 E136 *
{ "pile_set_name": "Wikipedia (en)" }
Johnny Case (Cary Grant), a freethinking financier, has finally found the girl of his dreams - Julia Seton (Doris Nolan), the spoiled daughter of a socially prominent millionaire - and she's agreed to marry him. But when Johnny plans a holiday for the two to enjoy life while they are still young, his fiancée has other plans & that is for Johnny to work in her father's bank! And so, as he tries to decide whether to follow his head or his heart, Johnny can rely on at least one Seton in his corner. She's Linda Seton (Katharine Hepburn), the down-to-earth younger sister of his soon-to-be-wife, and she likes Johnny the way he is. This movie is epic. I have watched almost every movie of Katharine Hepburn's as well as Cary Grant's and I have to say this is in my top three! It's witty, entertaining, funny, you can see their own personalities shining through. To anyone else who is a movie buff like me you can tell where they're improvising, and truly having fun :) Although a casual speed, and you can see the overall result coming, it's a lot of fun watching how it will happen. This is a predictable plot but done terrifically by Grant & Hepburn with a great supporting cast. Into the vivid depiction of stodgy high society family with their expectations trapping the younger generation in lives that some don't want enters Grant breathing humor, sincerity and energy. You know he'll figure out he's with the wrong sister eventually but the ride's fun.
{ "pile_set_name": "Pile-CC" }
Dima-Bottego language The language of the Dima people, who lived to the east of the Omo River north of Lake Turkana, as described by Vittorio Bottego in an expedition to Ethiopia in 1897. It is known by only a few numerals, which do not obviously resemble another language. Data The Dima numerals 1–10 are recorded. 1 ekkā 2 ekkinā 3 dāsā 4 dəndāsā 5 osā 6 osəkər 7 fāṣā 8 orongo 9 kēriri 10 kēpēs 6 appears to be composed of 5+1. Notes Category:Unclassified languages of Africa Category:Languages of Ethiopia Category:Languages attested from the 1890s Category:Languages extinct in the 20th century
{ "pile_set_name": "Wikipedia (en)" }
Anti - Mage ( AGI ) Anti-Mage's passive Mana Break allows him to deal extra damage and deplete a spellcaster's supply of mana. As he grows into his powers, his Spell Shield makes him more resilient against magical attacks. Meanwhile, Blink gives him the ability to teleport across short distances for superb maneuverability. Seeking out weary casters, he uses Mana Void to inflict immense damage on those who are low on mana. Although Anti-Mage is disadvantaged against casters in the early game, his powers grow quickly, and there is no one better suited for destroying the greatest spellcasters at what ought to be their moment of triumph.
{ "pile_set_name": "Pile-CC" }
Determination of sunset yellow and tartrazine by differential pulse polarography. A study has been made of the polarographic (DC and DPP) behaviour of the food dyes Sunset Yellow and Tartrazine in acid and alkaline media and in the absence and presence of polyvinylpyrrolidone. Methods are proposed for the determination of both dyes by DPP over a concentration range of 0.1-10 ppm. The methods have been applied to their determination in soft drinks.
{ "pile_set_name": "PubMed Abstracts" }
Tuesday, July 26, 2016 EMERGENCE debut album launches with video and pre-sales... Thank you to everyone that supported our music, listened, gave feedback, and added fuel to the fire. You can preview and purchase the album at the link below! Emergence Lp by Tunnel A few people I want to thank directly...(from our liner notes) "Moe Espinosa for the early encouragement and industry insights. Gerald Good for the detailed notes and coming to the very first Tunnel show ever. Dietrich Shoenemann for mastering and hustling the vinyl. Dan Ryan for an amazing digital mastering experience at Studio 11. The STL/314 Techno crew for wanting to hear this material live before anyone. All of the WBM artists for keeping the faith and contributing to something larger than each of us. Andy Stroble for my first booking in Chicago! Komprezzor for always championing my sound. Bobby Dowell, for the burritos. Tom Kellogg, Kurt, Thea, Carrie and the DBN family. To all the DJs and Producers that have reached out and made me feel like I’m on the right path...Jason Patrick and Mia Wallace, thank you! Claude young Jr, thank you! Mirko, Davide, Gez and the Etichetta Nera family, I'm forever in your debt. Coum Records, Different is Different, Rheostatus, Aerotek, Teggno, SecreTechno, Grid Based Beats, and all the labels that have released our work, thank you for supporting. Above all my lovely, beautiful Vanessa, for loving an artist, the most thankless job on the planet."
{ "pile_set_name": "Pile-CC" }
CHARLESTON, SC June 21, 2014 – The Celebrity Smokin’ Chef promotion that the Charleston RiverDogs have held every Sunday home game so far this season continues this weekend. The ballclub has announced that Smoked Buffalo Frog Legs will be the special smoked dish available for Sunday, June 22. The Celebrity Chefs preparing the smoked delicacy will be Kim Otero and Mike Pendergrast from the Lowcountry Food Bank. Chefs Otero and Pendergrast will be at the game and stationed by the RiverDogs’ new smoker throughout the afternoon to promote the specific dish, ensure it is being served appropriately, and visit with fans. The Smoked Buffalo Frog Legs will be served in a tray with blue cheese dressing. Chefs Otero and Pendergrast will be serving up the tasty treat to fans for the RiverDogs game against the Kannapolis Intimidators which is scheduled to begin at 5:05 pm at Joseph P. Riley, Jr. Park on Sunday. The Smoked Buffalo Frog Legs will be available to all fans for the reasonable price of $7 for four. In addition, the RiverDogs will donate a portion of the proceeds from the smoked item to the Lowcountry Food Bank. “This promotion has been well received during our first five Sunday home games this season, and we’re excited to have Chefs Otero and Pendergrast from the Lowcountry Food Bank taking part in the fun this weekend,” said RiverDogs General Manager Dave Echols. “I’m anxious to try some Smoked Buffalo Frog Legs tomorrow, and we’re happy to help raise funds for the Lowcountry Food Bank in the process.” The RiverDogs are home through Thursday evening, and tickets are on sale for the remainder RiverDogs season. For more information, please contact the Riley Park Box Office at 843/577-DOGS (3647) or online at www.riverdogs.com. If fans cannot make it to the ballpark, they are encouraged to tune in to all the action this year both home and away worldwide on www.riverdogs.com and locally on 1250 WTMA, the RiverDogs’ new radio home. About the author Michael "Beach Mick" Hudson is the founder and Editor of Beach Carolina Magazine. Living along the coast of North Carolina, Mike has a passion for the beach and loves to bring news and events of the Carolinas to others around the world. Search Categories: We Are Social Disclaimer: Information appearing on BeachCarolina.com is intended only as a guide and is subject to change. Prices, descriptions, operating times, etc. are as accurate as possible, but cannot be guaranteed. Neither Beach Carolina Magazine nor the businesses listed within may be held responsible for typographical errors or subsequent changes in offerings.
{ "pile_set_name": "Pile-CC" }
Q: AJAX Posts multiple times in Chrome http://cl.ly/2D221O0J33421Y1v2V0Q Is there any way to avoid this? Works perfectly in Firefox, etc. votes.php: http://pastie.org/1369778 jQuery(function(){ jQuery("a.vote_down").click(function(){ //get the id the_id = $(this).attr('id'); // show the spinner $(this).parent().html("<img src='images/spinner.gif'/>"); //the main ajax request $.ajax({ type: "POST", data: "action=vote_down&id="+$(this).attr("id"), url: "/votes.php", success: function(msg) { $("span#votes_count"+the_id).fadeOut(); $("span#votes_count"+the_id).html(msg); $("span#votes_count"+the_id).fadeIn(1000); $("span#vote_buttons"+the_id).remove(); } }); }); }); A: Have you tried having your click handler return false; (placed at the end of the function, of course)? Or, try taking an argument in on that handler called e, and add e.stopPropagation(); Bottom line is, you wanna prevent the click event from bubbling once you've handled it.
{ "pile_set_name": "StackExchange" }
The threshold for diagnosing impaired fasting glucose: a position statement by the European Diabetes Epidemiology Group. The category of IFG was introduced in the late 1990s to denote a state of non-diabetic hyperglycaemia defined by a fasting plasma glucose (FPG) concentration between 6.1 and 6.9 mmol/l. In 2003 the American Diabetes Association recommended that this diagnostic threshold be lowered to 5.6 mmol/l. The justification for lowering the threshold has been questioned. This simple change in cut-off value creates a pandemic of IFG, with a two- to five-fold increase in the prevalence of IFG across the world. Such a change in threshold has far-reaching public health implications. The European Diabetes Epidemiology Group (EDEG) has reviewed the evidence for this lower cut-off point for the definition of IFG and concludes that the previous definition should not be altered. EDEG further recommends that the value of all categorical definitions of non-diabetic hyperglycaemia should be reconsidered.
{ "pile_set_name": "PubMed Abstracts" }
Q: deploying spring mvc web app to tomcat: classpath issue I am developing a small web app using Spring MVC framework. Basically, the app provides web interface, where user can upload XML file and verify it against specific XSD file. I put my XSD file within "src/main/webapp/XSDfoler". I put this folder into my Tomcat's classpath. (I am using Tomcat embedded into my Eclipse). In my code, in order to access my XSD file I simply used ClassPathResource("myXSD.xsd"); It works fine. Now, I created a .war file from my webapp and tried to deploy it to another standalone Tomcat. When trying to run it, it give NullPointer exception since it cannot locate "myXSD.xsd" file. So as I get it, I have to somehow include this file into classpath of this standalone Tomcat instance. I looked for some nice step by step tutorial or article explaining how to deploy webapp to a standalone Tomcat server after doing the development in IDE with embedded Tomcat. Could anyone please explain/help. Thanks! A: Try ServletContext context = httServletRequest.getSession().getServletContext(); InputStream is = context.getResourceAsStream("/XSDfoler/myXSD.xsd"); alternatively use getResource() instead of getResourceAsStream()
{ "pile_set_name": "StackExchange" }
Q: Codeigniter - How to redirect to a controller with javascript variable?($this->load->view() not working) I'm trying to convert current html page to pdf using TCPDF. I use Ajax to pass the html code to CreatePDF controller, but not sure why the "pdfreport" view cannot be open. In my controller CreatePDF: public function pdf() { $this->load->helper('pdf_helper'); //tcpdf helper file $HTMLInfo = $this->input->post('HTMLInfo'); //get html code from view $data['HTMLInfo'] = $HTMLInfo; $this->load->view('pdfreport', $data); } In View I have a "PDF" button, when click: $('#pdf').click(function(){ $.ajax({//ajax call type: 'post', url: '<?php echo base_url('CreatePDF/pdf'); ?>', data: {'HTMLInfo': document.getElementById('repTable').outerHTML}, success: function (data) { } }); }); If I replace $data['HTMLInfo'] with html code, and call CreatePDF directly, there's no problem to load the pdf page. If I use: $HTMLInfo = 'TEST'; <input type="button" onClick="location.href = '<?php echo site_url("CreatePDF/pdf/{$HTMLInfo}"); ?>'" value="HTMLInfo" /> There's also no problem to print out the "TEST" in pdf, but how to use "document.getElementById('repTable').outerHTML" instead of "TEST"? Can anyone help me on this? A: you need to redirect in your controller function if you try to load the view isn't work because ajax is background Task. Example public function pdf() { $this->load->helper('pdf_helper'); $HTMLInfo = $this->input->post('HTMLInfo'); if($HTMLInfo != "") { $urisegment = base64_encode($HTMLInfo); redirect("controller_name/function_name/'".$urisegment."'"); } } public function get_html($html){ $data = base64_decode($html); $this->load->view('pdfreport', $data); }
{ "pile_set_name": "StackExchange" }
There are no prizes for Round 1. But there will be prized for rounds 2,3,4 and 5. We will be sending winners of these four rounds a wrist band and a bandana. Rules will be: you must email your answers to trivia@royalchallengers.com . Everyone who has all answers right enters a lucky draw, winner gets the prize and must email their details to trivia@royalchallengers.com - you will only be allowed to send in ONE email, and the first email will be counted. On the blog, you can post questions but NOT answers. the final answers Q-1 In 2008 Season,How Many Matches Did RCB Won? Ans- 4 Matches Q-2 What is The Name Of Anil Kumble's Book and On Which Date It Was Released? Ans- Name of the Book-Wide Angle Date-17th March 2010 Q-3 On Which Date Rcb Played Their Final Match Against DC? Ans- 24th May 2009 Q-4 How Many Sixes Did Robin Utthapa Scored In This Years IPL(2010)? Ans- 27 Sixes
{ "pile_set_name": "Pile-CC" }
Micaflores, California Micaflores is an unincorporated community in Orange County, California, United States of America. It is near Disneyland. This area is located in the Southern portion of the Anaheim Resort Area and is a populated place. latitude 33.804 and longitude -117.908. The elevation is 138 feet. Micaflores appears on the Anaheim U.S. Geological Survey Map. References Category:Unincorporated communities in Orange County, California Category:Unincorporated communities in California
{ "pile_set_name": "Wikipedia (en)" }
Introduction {#s1} ============ Nonalcoholic fatty liver disease (NAFLD) is a cause of chronic liver disease that has gained increasing recognition over the past decade. The condition most commonly associated with NAFLD is chronic over nutrition with consequent obesity [@pone.0108132-Toshimitsu1]--[@pone.0108132-Nomura1] and, often, insulin resistance [@pone.0108132-Sanyal1], [@pone.0108132-Yang1]. NAFLD progresses to cirrhosis within 10 years in approximately 5% of patients and has been projected to become the most common indication for liver transplantation in the next 10--20 years [@pone.0108132-Adams1]--[@pone.0108132-Angulo1]. The biological basis for the wide histological spectrum that occurs in NAFLD remains poorly defined. New genomic and proteomic technologies have the potential to understand the complex pathogenic mechanisms of NAFLD [@pone.0108132-Guttmacher1]--[@pone.0108132-RodrguezSurez1]. For example, simultaneous assessment of gene expression in a large number of genes and protein peaks can help identify molecular pathways that are active in NAFLD [@pone.0108132-Xiao1]--[@pone.0108132-Honda1]. Proteomic analyses have been limited by poor sensitivity in detecting low-abundance proteins as well as difficulties with maintaining sample stability and data management. Recent advances in protein separation and improvements in both detection and identification of peptides and proteins have facilitated detailed characterization of complex biological samples, including the liver domain. Proteomic analysis may identify hepatic proteins that contribute to the development of nonalcoholic steatohepatitis (NASH) with progressive fibrosis. As reported by Muir et al. [@pone.0108132-Muir1], novel candidate targets for hepatocellular carcinoma (HCC) were identified by applying proteomic profiling approaches in PTEN-null NASH liver and tumor samples. Furthermore, differential abundance of hepatic proteins can be confirmed and further studied in a second phase of experiments, including immunohistochemical analysis of samples and a tandem mass spectrometric (MS/MS) approach. Simultaneous analysis of the relative expression of a large number of proteins in a sensitive manner may help to determine the relative expression of hepatic proteins across the histologic spectrum of NAFLD. In our study, we used the above-mentioned advanced proteomic technologies and sample selection based on disease-discordant monozygotic twins to identify NAFLD diagnostic markers. A matched co-twin analysis is a powerful method to detect biomarker profiles for medical conditions as compared with traditional case--control studies [@pone.0108132-vanDongen1]. Considering the subtle distinction in protein levels and the influence of genetic variation among experimental and control subjects [@pone.0108132-DeFranceschi1], a disease-discordant monozygotic twin study is a highly efficient way to mitigate the potentially confounding effects of human genetic polymorphisms [@pone.0108132-OHanlon1]. In the present study, we utilized this combined technological and clinical approach to find possible novel diagnostic markers of NAFLD. Materials and Methods {#s2} ===================== 1 Patients selection criteria {#s2a} ----------------------------- ### 1.1. Ethics Statement {#s2a1} All of the subjects understood the study procedures and signed the informed consents. This study protocol was approved by the Ethics Committee of Qingdao Municipal Hospital and was in compliance with the Helsinki Declaration. **1.2.** A total of 178 pairs of twins with a mean age of 40 were enrolled in 5 districts in the Qingdao municipality. From this sample, 63 pairs of eligible adult twins were recruited from the Qingdao Twin Registry [@pone.0108132-Pang1]. Zygosity of all same-sex twin pairs was determined by 16 multiple short tandem repeats [@pone.0108132-Tomsey1] at the central laboratory in the Qingdao Blood Bank. Between each pair, one was diagnosed with fatty liver disease (disease group, n =  63) and the other was considered the control (control group, n = 63). Subjects were excluded as follows: history of viral hepatitis, autoimmune hepatitis, and other forms of chronic liver disease including hepatic injury caused by substance abuse; and a current or past history of consumption of more than 20 g of alcohol daily. Moreover a twin-pair was excluded if one of the co-twins declined participation. In our study, the disease group fulfilled the diagnostic criteria of NAFLD as defined by the Chinese Liver Disease Association [@pone.0108132-Farrell1]. Weight and height were measured with the subject in lightweight clothes with their shoes removed. Weight was measured using a standing beam scale to the nearest 0.1 kg, and height was measured using a vertical scale with a horizontal moving headboard to the nearest 0.1 cm. Body mass index (BMI) was calculated as weight (kg) divided by square of height (m). Waist circumference (cm) was measured on a standing subject using a soft tape midway between the lowest rib and iliac crest to the nearest cm. Hip circumference was measured over the widest part of the gluteal region to the nearest cm, and the waist/hip ratio (WHR) was calculated as well. Blood pressure was measured using standard procedures. Abdominal (hepatic) liver ultrasound was performed in all the subjects. No liver biopsies were obtained in the frame of the present study. 2 Blood sampling management {#s2b} --------------------------- Fasting blood samples were obtained, and supernatants were extracted after 2 rounds of centrifugations at 1,000 g for 5 min and at 12000 g for 5 min, respectively. Then, 500 µlof supernatant of each sample was sub-packaged into collecting pipes and frozen at --80°C until further use. No serum samples were submitted to repeat freeze-thawing more than twice. Liver function tests included serum transaminases (AST: asparate aminotransferase and ALT: alanine aminotransferase), Gamma glutamyl transpeptidase (GGT), and prothrombin index. Serum glucose was also measured using a Semi-automatic Analyzer (Hitachi 7600). 3 Affinity Chromatography {#s2c} ------------------------- To abstract and purify the target peptides from the supernatant, different affinity chromatography methods were conducted, including ZipTip with C18 resin, ZipTip with C4 resin and PepClean C-18 Spin Columns. All processes were according to the manufacturer\'s protocols. After analyzing the samples via Peptide Mass Fingerprinting (PMF), we found that ZipTip with C18 resin was the most efficient method. 4 PMF {#s2d} ----- An aliquot of extracts (0.3 µl) was mixed with saturated alpha-cyano-4-hydroxy-cinnamic acid (CHCA) matrix, deposited on the MALDI plate, and air-dried at room temperature. To identify the most discriminating serum peptide profiles between subjects with and without NAFLD, we used MALDI-TOF MS (ABI, 4700 TOF/TOF) with the reflective mode. Introducing the batch mode, the mass spectra of peptides was generated at the 800--3500 Da optimization range by using an average of 1000 laser shots at a laser intensity of 5000 arbitrary units. Angiotensin I (Molecular Weight: 1296), Glu1-Fibrinopeptide B (Molecular Weight: 1570), ACTH (clip 1--17) (Molecular Weight: 2093) and ACTH (clip 18--39) (Molecular Weight: 2466) were used as the standard substances to normalize and minimize the error under 10 ppm. 5 Bioinformationanalysisof the serum peptide profiles {#s2e} ----------------------------------------------------- ### 5.1 Data Mining {#s2e1} All of the preliminary spectrograms were analyzed with Data Explorer software, and the data were output as a peak trace (ASCII format) with monoisotopic peaks and the intensity of the detected peptides. Each crest value represented a free peptide shown with the relative intensity versus the mass-to-charge ratio (m/z) values. ### 5.2 Screening {#s2e2} The Metalab bioinformatics software package was used to compare the mean intensity of two groups (disease and control). Each isotopic peak and discriminatory peptide peaks were selected. A Mann-Whitney U test was conducted to further validate the significant difference of specific peptide peaks between the two groups. A p\<0.01 was considered statistically significant. MSight software (Swiss Institute of Bioinformatics, Switzerland) was employed to construct the figure of discriminatory peaks. ### 5.3 Systemic Cluster, Principal Component Analysis (PCA) and Receiver Operator Characteristic (ROC) Curve {#s2e3} SPAA 16.5 was used to normalize the discriminatory peak intensity of each peptide and to subsequently analyze the PCA based on the normalized data. To demonstrate the intensity of splitting, thermography and dendrograms were conducted via systemic cluster analysis with Cluster 3.0 software (Version 1.33, University of Tokyo, Human Genome Center). The concrete cluster method was performed using Centroid linkage analysis. The discriminatory peptide diagnostic value for the diagnosis of NAFLD was assessed by determining the area under the curve (AUC) with ROC. 6 Identification of the discriminatory peptides {#s2f} ----------------------------------------------- To trace the sources of discriminatory peptides and the specific amino acid sequences, second order mass spectrography was conducted using MALDI- TOF- TOF(ABI 4700) based on the data from PMF analysis. The mass spectrum values were set as follows: reflective mode; batch mode; laser intensity: 6800; and laser shots: 2000 times. The MS/MS fragment data were exported as Sequest files and were used for database searches with the MASCOT search engine using the GSP Explore software (ABI. Inc). The parameters were set according to the following list ([Table 1](#pone-0108132-t001){ref-type="table"}). 10.1371/journal.pone.0108132.t001 ###### The parameters of database searches with the MASCOT search engine using the GSP Explore software. ![](pone.0108132.t001){#pone-0108132-t001-1} Detabase Swiss-Prot ------------------------- ----------------------------------- Type of search MS/MS Ion Search Enzyme No Variable modifications Carbamidomethyl (C),Oxidation (M) Mass values Monoisotopic Protein Mass Unrestricted Peptide Mass Tolerance ±0.15 Da Fragment Mass Tolerance ±0.3 Da Instrument type Default Results {#s3} ======= 1 Patient Demographics and Clinical Data {#s3a} ---------------------------------------- [Table 2](#pone-0108132-t002){ref-type="table"} presents the clinical, biochemical and ultrasound data observed in the studied population. It should be emphasized that no environmental factors could be found to explain the differences between the twins with and without NAFLD. The clinical data(BMI, waist circumference and WHR) and the biochemical data(AST, ALT, GGT and total bilirubin) were statistically significantly different between the 2 groups (P\<0.01). There was no difference in the prothrombin index (p\>0.05). 10.1371/journal.pone.0108132.t002 ###### Clinical and liver features of the study participants and the validation participants. ![](pone.0108132.t002){#pone-0108132-t002-2} Category Subcategory study participants validation participants -------------------------- ------------------------- -------------------- ------------------------- ----------- ----------- Age (years) 40.2±12.2 40.2±12.2 42.4±7.2 43.4±8.1 BMI (kg/m^2^) 33.1±5.9 22.2±3.8 30.1±1.6 24.3±2.0 waist circumference (cm) 92.0±12.8 78±10.5 97.3±7.3 82.0±7.5 WHR 0.93±0.08 0.76±0.05 0.92±0.05 0.86±0.06 Comorbidities Hypertension (%) 61 10 42 9 Diabetes mellitus (%) 46 0 28 2 Dyslipidemia (%) 43 13 35 11 Liver Function Tests AST (U/L) 64.6±38.7 31.5±9.3 69.4±11.5 28.7±11.4 ALT (U/L) 73.2±19.1 27.3±8.7 72.0±9.5 24.6±5.5 GGT (U/L) 79.3±18.9 34.6±7.5 68.6±7.6 27.1±12.4 Total bilirubin (mg/dL) 0.8±0.2 0.4±0.3 1.3±0.4 0.8±0.2 Prothrombin index(%) 82.6±13.8 84.2±15.8 83.3±1.5 83.5±2.3 Steatosis (ultrasound) 63 0 50 0 Values are expressed as mean±SD. BMI, body mass index; WHR, waist/hip ratio; AST, aspartate aminotransferase; ALT, alanine aminotransferase; ALP, alkaline phosphatase;GGT, gammaglutamyltranspeptidase; US: ultrasound examination. 2 Extraction and purification of serum low molecular weight free polypeptides {#s3b} ----------------------------------------------------------------------------- Theoretically, ZipTip with C18 resin can bind and purify polypeptide components with a molecular weight less than 5000Da. Of the three methods of affinity chromatography that we tested, PMF with ZipTip with C18 resin ([Figure 1](#pone-0108132-g001){ref-type="fig"}) was more effective and reproducible. In addition, the intensity and distribution of the peptides were superior to the other two methods. The abundant mass spectrum peaks were used for the second order mass spectrography to identify the specific amino acid sequences. [Figure 2](#pone-0108132-g002){ref-type="fig"} shows that the amount and intensity of the peptides purified by ZipTip with C4 resin were too low to conduct second order mass spectrography. Though PepClean C18 Spin Columns could abstract peptides from much more serum samples, it resulted in poor MS spectra. Thus, the optimal technique used in this study was affinity chromatography using Ziptip C18 and MALDI-TOF with reflective mode, which resulted in PMFs between 800--3500Da. ![MALDI-TOF MS spectra of one twin pair\'s peptide profile using C18 resin.\ (A) MALDI-TOF MS spectrum of the twin in the disease group. (B) MALDI-TOF MS spectrum of the twin in the control group.](pone.0108132.g001){#pone-0108132-g001} ![MALDI-TOF MS spectrum of the peptide profile using C4 resin.](pone.0108132.g002){#pone-0108132-g002} 3 Screening the discriminatory peptides {#s3c} --------------------------------------- The initial mass spectrum was transferred to ASCII format via Data Explorer software and stored as a peak list file. After comparing the intensities of the same isotopic peaks in the two groups using Metalab software, we screened 18 MS peaks that had significant differences. Among them, 11 peaks (861.1, 877.07, 904.5, 1206.57, 1350.64, 1518.7, 1690.9, 1777.94, 2931.29, 3190.4, 3261.4) were up-regulated, whereas 7 peaks (942.44, 1020.47, 1060.06, 1211.7, 1263.63, 1449.76, 2768.3) were down-regulated in the disease group as compared to the control group. [Table 3](#pone-0108132-t003){ref-type="table"} shows the mean intensities of the discriminatory peptides and [Figure 3](#pone-0108132-g003){ref-type="fig"} shows the Box-blot of the discriminatory peptide signal-intensities. Mass spectra comparing the signal-intensities of the discriminatory peaks are shown in [Figure 4](#pone-0108132-g004){ref-type="fig"}. ![Box-blot of the discriminatory peak signal-intensities.\ (A), (B), (C), (D) refer to signal-intensities of peaks1, 2, 4 and 5, respectively.](pone.0108132.g003){#pone-0108132-g003} ![MALDI-TOF MS spectra of the discriminatory peaks.\ (A) MALDI-TOF MS spectrum of peak1 (861Da) in the disease group. (B) MALDI-TOF MS spectrum of peak1 (861Da) in the control group.](pone.0108132.g004){#pone-0108132-g004} 10.1371/journal.pone.0108132.t003 ###### The mean intensities of the discriminatory peaks. ![](pone.0108132.t003){#pone-0108132-t003-3} Peaks Molecular Weight Mean intensities ----------------------------------------- ------------------ ------------------ ---------- Peak1[\*](#nt102){ref-type="table-fn"} 861.1 3.2290E3 1.5863E3 Peak2[\*](#nt102){ref-type="table-fn"} 877.07 2.6700E3 1.2976E3 Peak3[\*](#nt102){ref-type="table-fn"} 904.5 4.5305E3 1.4906E3 Peak4 942.44 6.6995E2 1.0869E3 Peak5 1020.47 4.4476E3 1.2251E4 Peak6 1060.06 2.3634E2 4.3490E2 Peak7[\*](#nt102){ref-type="table-fn"} 1206.57 2.7648E4 9.3652E3 Peak8 1211.7 3.5049E2 7.6896E2 Peak9 1263.63 1.0948E3 3.8355E3 Peak10[\*](#nt102){ref-type="table-fn"} 1350.64 1.0086E4 2.3314E3 Peak11 1449.76 5.0885E2 1.5149E3 Peak12[\*](#nt102){ref-type="table-fn"} 1518.7 4.3341E3 1.7353E3 Peak13[\*](#nt102){ref-type="table-fn"} 1690.9 3.4106E2 1.1129E2 Peak14[\*](#nt102){ref-type="table-fn"} 1777.94 5.2837E2 1.1562E2 Peak15 2768.3 2.1085E2 4.6206E2 Peak16[\*](#nt102){ref-type="table-fn"} 2931.29 8.4654E2 3.5836E2 Peak17[\*](#nt102){ref-type="table-fn"} 3190.4 2.7906E2 1.3702E2 Peak18[\*](#nt102){ref-type="table-fn"} 3261.4 4.1266E2 1.6163E2 \*the up-regulated peaks in NAFLD. 4 System cluster {#s3d} ---------------- As shown in the clustering for variables results ([Figure 5](#pone-0108132-g005){ref-type="fig"}), the up-regulated peaks (N1 = 11) and the down-regulated peaks (N2 = 7) resulted in 18 discriminatory peptides plit. All of the samples in the disease (A) and normal (B) groups were successfully separated following the clustering for individuals ([Figure 6](#pone-0108132-g006){ref-type="fig"}). ![Clustering for variables of the 18 discriminatory peaks.\ (N1) The 11 up-regulated peaks in the disease group. (N2) The 7 down-regulated peaks in the disease group.](pone.0108132.g005){#pone-0108132-g005} ![Clustering for individuals of the 126 samples.\ (A) The 63 disease samples. (B) The 63 control samples.](pone.0108132.g006){#pone-0108132-g006} 5 Principal Component Analysis (PCA) {#s3e} ------------------------------------ [Figure 7](#pone-0108132-g007){ref-type="fig"} showed the principal components of the samples and the principal components of indexes. All 126 samples were clearly classified into two groups: the disease group (A) and the control group (B). Charged with the selected index, the 18 discriminatory peaks were also classified into two groups: the up-regulated peaks (C) and the down-regulated peaks (D). All of the peaks were separated explicitly. ![Three-dimensional plot of the principal components of samples and indexes,respectively.\ (A) Disease group. (B) Control group. (C) The up-regulated peaks. (D) The down-regulated peaks.](pone.0108132.g007){#pone-0108132-g007} 6 ROC analysis {#s3f} -------------- For each of the 18 discriminatory peptide peaks, the AUC value was calculated ([Table 4](#pone-0108132-t004){ref-type="table"}). Only the components of peak 10, 12, and 14 were identified successfully by our MALDI-TOF-TOF analysis. Then, for these three discriminatory peaks whose AUC values were higher than 0.9, we conducted ROC curves ([Figure 8](#pone-0108132-g008){ref-type="fig"}) to compare their diagnostic efficacy. As shown, peak 14 had the highest diagnostic efficacy. ![Receiver operated curves of peaks 10, 12 and 14.](pone.0108132.g008){#pone-0108132-g008} 10.1371/journal.pone.0108132.t004 ###### Area under the curve of the 18 discriminatory peaks. ![](pone.0108132.t004){#pone-0108132-t004-4} Area Std. Error[a](#nt103){ref-type="table-fn"} Asymptotic sig[b](#nt104){ref-type="table-fn"} 95% CI -------- ------- -------------------------------------------- ------------------------------------------------ -------------- Peak1 0.798 0.039 0.000 0.722--0.873 Peak2 0.760 0.043 0.000 0.676--0,843 Peak3 0.794 0.041 0.000 0.714--0.874 Peak4 0.307 0.047 0.000 0.215--0.398 Peak5 0.166 0.037 0.000 0.093--0.238 Peak6 0.166 0.035 0.000 0.097--0.235 Peak7 0.869 0.032 0.000 0.807--0.932 Peak8 0.210 0.039 0.000 0.133--0.286 Peak9 0.066 0.020 0.000 0.026--0.106 Peak10 0.937 0.021 0.000 0.896--0.978 Peak11 0.066 0.025 0.000 0.018--0.115 Peak12 0.931 0.024 0.000 0.884--0.978 Peak13 0.916 0.023 0.000 0.871--0.961 Peak14 0.982 0.008 0.000 0.966--0.999 Peak15 0.109 0.027 0.000 0.056--0.161 Peak16 0.922 0.022 0.000 0.878--0.966 Peak17 0.869 0.030 0.000 0.810--0.928 Peak18 0.911 0.025 0.000 0.862--0.960 a: Under the nonparametric assumption. b: Null hypothesis: true area =  0.5. 7 Identification of the discriminatory peaks {#s3g} -------------------------------------------- Besides using MALDI-TOF-TOF to trace the sources of discriminatory peptides and their specific amino acid sequences, we also referred to previously published records [@pone.0108132-Pierson1]--[@pone.0108132-Zhang1] ([Table 5](#pone-0108132-t005){ref-type="table"}). Peaks 10, 12, and 14 were up-regulated peaks and corresponded to the peptide family Fibrinopeptide A and Complement C3f, respectively. According to the ROC analysis, Fibrinopeptide A and C3fhad the highest ROC values for distinguishing NAFLD cases from their normal controls. 10.1371/journal.pone.0108132.t005 ###### Peptide family and amino acid sequences. ![](pone.0108132.t005){#pone-0108132-t005-5} Peptide (m/z) Peptide family Amino acid sequence -------- --------------- ------------------ --------------------------------------------- Peak1 861.1 Unkown Unkown Peak2 877.07 Unkown Unkown Peak3 904.5 Bradykinin RPPGFSPF Peak4 942.44 Complement C3f HWESASLL Peak5 1020.47 Fibrinopeptide A DFLAEGGGVR Peak6 1060.06 Bradykinin RPPGFSPFR Peak7 1206.57 Fibrinopeptide A EGDFLAEGGGVR Peak8 1211.7 Complement C3 RIHWESASLL Peak9 1263.63 Fibrinopeptide A GEGDFLAEGGGVR Peak10 1350.64 Fibrinopeptide A SGEGDFLAEGGGVR Peak11 1449.76 Complement C3f THRIHWESASLL Peak12 1518.7 Fibrinopeptide A AD~dh~AGEGDFLAEGGGVR ~dh~A: dehydro-alanine Peak13 1690.9 Complement C3f KITHRIHWESASLL Peak14 1777.94 Complement C3f SKITHRIHWESASLL Peak15 2768.3 Fibrinogen α SSSYSKQFTSSTSYNRGDSTFESKS Peak16 2931.29 Fibrinogen α SSSYSKQFTSSTSYNRGDSTFESKSY Peak17 3190.4 Fibrinogen α SSSYSKQFTSSTSYNRGDSTFESKSYKM Peak18 3261.4 Fibrinogen α SSSYSKQFTSSTSYNRGDSTFESKSYKMA 8 ELISA-based validation experiment for serum Complement C3f and Fibrinopeptide A {#s3h} --------------------------------------------------------------------------------- To assess the clinical usefulness of these two candidate biomarkers, we conducted further validation studies by commercially available ELISA kits using 100 additional serum samples (50 NAFLD patients and 50 healthy controls from the Center of Health Examination, Qingdao Municipal Hospital) ([Table 2](#pone-0108132-t002){ref-type="table"}). Prior to ELISA analysis, serum samples were diluted 5-fold with sample dilution, the final volume of test samples was 50 µl, respectively. All procedures were according to the manufacturer\'s instructions. Spectrometer was used to test the OD values at the 450 µm of the spectrum band. The serum levels of these two candidate biomarker peptides were calculated on the basis of standard curves, respectively. We compared the concentrations of the Complement C3f (1466.929±78.306 pg/ml) and Fibrinopeptide A (4.189±0.326 ng/ml) in NAFLD group with in control group (C3f 1159.357±99.624 pg/ml; FPA 3.039±0.483 ng/ml) by independent-samples T test, respectively. The results revealed that peptides showed significant differences in their serum levels between the two groups (P\<0.05) as shown in [figure 9](#pone-0108132-g009){ref-type="fig"}. This validation experiment further indicated that FPA and Complement C3f may be potential diagnostic markers for NAFLD. ![Concentrations of FPA and Complement C3f in NAFLD group and control group, respectively.\ (A) Concentrations of FPA in NAFLD group and control group. (B) Concentrations of Complement C3f in NAFLD group and control group.](pone.0108132.g009){#pone-0108132-g009} Discussion {#s4} ========== Although most NAFLD patients are clinically asymptomatic, they are at an increased risk for hepatic fibrosis, cirrhosis and HCC [@pone.0108132-Bugianesi1], [@pone.0108132-Yasui1]. Liver biopsy represents the traditional gold standard for NAFLD diagnosis [@pone.0108132-Talwalkar1], [@pone.0108132-Vuppalanchi1]. Nevertheless, liver biopsy has limitations due to high cost, sampling error, and possible procedure-related morbidity and mortality [@pone.0108132-Cadranel1], [@pone.0108132-Poynard1]. The worldwide prevalence of NAFLD ranges from 6.3% to 33% with a median of 20% [@pone.0108132-Chalasani1], and thus liver biopsy would not be a practical and available approach for diagnosing NAFLD in a large population [@pone.0108132-Poynard2]. In addition, noninvasive diagnosis of NAFLD remains difficult. Serum aminotransferase levels and imaging tests such as ultrasound, computed tomography (CT), and magnetic resonance imaging (MRI) are primarily used to assess steatosis and possibly cirrhosis in patients with NAFLD[@pone.0108132-Clark1], [@pone.0108132-Mazhar1];however, they are not completely reliable. Serum aminotransferases levels can remain within normal ranges despite established NAFLD. For examples, NASH was diagnosed in up to 59% of NAFLD patients despite normal ALT levels [@pone.0108132-Fracanzani1], [@pone.0108132-Mofrad1]. Imaging tests lack sensitivity when steatosis affects less than 30% of the hepatocytes [@pone.0108132-Mazhar1]. Also, imaging tests are expensive and cumbersome as screening procedures. Therefore, reliable noninvasive methods for assessing the presence of NAFLD are urgently needed. Developing clinical prediction rules and non-invasive biomarkers for identifying NAFLD would represent major advances in the field[@pone.0108132-Musso2].In this respect, different high throughput ''unbiased'' approaches for biomarkers identification have emerged [@pone.0108132-Yilmaz1], [@pone.0108132-Yu1]. In our study, using a highly sensitive and specific approach which combines MALDI-TOF-MS and bioinformatics analyses [@pone.0108132-Yu1], we successfully established a peptidomics pattern that could distinguish NAFLD patients from their twin controls. Specifically, our results indicate that complement C3f and Fibrinopeptide A (FPA) are potentially noninvasive biomarkers for identifying patients with NAFLD. Though complement C3f and FPA have been found to be associated with some diseases, such as cognitive dysfunction in elderly patients and breast cancer[@pone.0108132-Zhang2], [@pone.0108132-Profumo1], and complement C3f has been reported to be associated with HCC[@pone.0108132-An1], the association between these two complements and the risk for incidental NAFLD have not yet been reported. Without data concerning the severity (in terms of inflammation and fibrosis) of NAFLD in our patients, the possible role of complement C3f and FPA cannot be completely documented. Further studies, coupled with histological classification, which characterizes NAFLD into simple steatosis, NASH or cirrhosis, need to be conducted. Despite these shortcomings, our study used two technologies with high technical specificity and sensitivity and was based on a disease-discordant monozygotic twin approach, and thus avoided many confounders. In addition, discordant monozygotic twin studies are a powerful method to identify DNA sequence variants, epigenetic variation and metabolites associated with disease and can aid in the detection of biomarker profiles for medical conditions [@pone.0108132-OHanlon2], [@pone.0108132-Vinberg1]. Conclusion {#s5} ========== In this study, applying sophisticated bioinformatics tools to analyze the complex data obtained from MALDI-TOF-MS analyses, we established a peptidomics pattern that could distinguish NAFLD patients from their twin controls. The differentially-regulated peptides identified in our study, especially Fibrinopeptide A and Complement C3f, may be potential diagnostic markers or therapeutic targets for NAFLD. However, further studies on the relationship between these biomarkers and NAFLD are warranted [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: SYX YNX. Performed the experiments: YNX NG ZHL YZC HPD MZ. Analyzed the data: YNX NG YZC. Contributed reagents/materials/analysis tools: YZC. Wrote the paper: YNX NG ZHL. [^3]: ¶These authors are co-first authors on this work.
{ "pile_set_name": "PubMed Central" }
Chelsea suffered 3-0 loss at home to Bournemouth this evening Blues boss Conte has had his say following the shock defeaet Italian has said that he is feeling “relaxed” after being questioned about the pressure surrounding his job SEE MORE: “Get out of my club” – Chelsea fans furious with certain... Chelsea suffered 3-0 defeat to Bournemouth at Stamford Bridge tonight Blues now won just two of last nine games in all competitions Fans took to social media to slate a certain Blues ace following the poor result SEE MORE: Chelsea 0-3 Bournemouth player ratings, stats and reaction: Former Blues a... Chelsea lost 3-0 to Cherries at Stamford Bridge Blues conceded all three goals in blistering second half spell from Howe’s side Conte’s side now won just two of last nine games in all competitions SEE MORE: “Last thing we need right now” – Chelsea fans left distraught as Blues ace taken off durin... Chelsea taking on Bournemouth at Stamford Bridge this evening Blues went into half time drawing 0-0 with Cherries Fans were distraught as key Chelsea ace was taken off through injury midway though first 45 SEE MORE: Done deal: Chelsea confirm Olivier Giroud shirt number, contract details after £1... Chelsea striker Michy Batshuayi is reportedly out of the squad to face Bournemouth tonight The Belgian is expected to complete a loan move to Borussia Dortmund Batshuayi is set to finalise the deal and undergo a medical with Dortmund today READ MORE: Antonio Conte highlights immediate concern abo...
{ "pile_set_name": "Pile-CC" }
The decoration module was linked to the character's mesh to follow that. Using lowpoly characters was a good choice for this project, they are very easy to create, animate, or make fast changes with, and the simplicity of their structure is hidden by the motion blur applied. The running girl was rendered with object motion blur, and the worker with image motion blur. The Environment Q: How do we make fast a sword to look believable? A: The sword was started with half a silhouette. This was continued with this half silhouette (notice, the vertices are all corners) and the vertices along this two lines are connected with lines. That means a quarter of the sword is ready. Mirror that quarter until you get a whole piece. Now I simply welded the coincident vertices, add Surface and transform all the vertices to smooth. Then it was collapsed to mesh and detached in different parts.
{ "pile_set_name": "Pile-CC" }
Turbine Halle Turbine Halle is a sports club based in the quarter of Giebichenstein in the city of Halle in the eastern German state of Saxony-Anhalt. With about 1,000 members in departments for track and field, association football, speedskating, table tennis, fistball, aerobics, sports for the handicapped and gymnastics it belongs to the biggest clubs of the city. The club sees itself being in continuation of the history of the Hallescher Fussball-Club Wacker 1900, founded in 1900. In its current form the club was founded on 15 July 1950 as BSG Turbine Halle, BSG being the abbreviation for Betriebssportgemeinschaft, meaning "company sports community," which was an organisational form of sports clubs in East Germany. The club since has experienced numerous fusions and name changes. In September 1954 SC Chemie Halle-Leuna, the football department of which formed in 1966 today's Hallescher FC, was formed by a split off of large parts of the football department. This club also maintains a claim to the footballing history of Turbine until 1954. The most noteworthy successes of Wacker and Turbine have been the Central German Championships of 1921, 1928 and 1934 and East German championships in 1949 and 1952. History Wacker Halle, as the club was generally referred to, won the Saale district – named after the river Saale – of the Central German championship twelve times between 1910 and its last edition 1933. These are all to be considered championships of one of numerous German first divisions. Main rivals here were Hallescher FC and to a lesser extent Borussia Halle, Sportfreunde Halle and SV Halle 98. Those title qualified for participation in the Central German Championships which Wacker won 1921 and 1928. In the ensuing play-off matches for the German Championship Wacker reached the semifinals in 1921, there losing at home in front of a crowd of 12,000 1–5 to the later winners 1. FC Nürnberg. In 1928 10,000 saw a 0–3 quarterfinal exit versus FC Bayern Munich. In 1933–34 Wacker became first champions of the newly incepted central German division of the Gauliga. In the qualification group for the semifinals of the national championship Wacker came with one win and five defeats last behind 1. FC Nürnberg, Dresdner SC and Borussia Fulda. In the next seasons Wacker finished second and seventh before being relegated as ninth. In 1941 the club managed to return and achieved third places in the first two seasons and eighth in 1944. The championship plate of 1952 After World War II Wacker Halle was dissolved, like all German clubs, an in 1946 SG Halle-Glaucha (SG stands for "sports community", Glaucha is an inner neighbourhood) was formed. In 1948 the new club was renamed into SG Freiimfelde Halle, Freiimfelde being an inner eastern district. In April 1949 the footballers of Freiimfelde, after having won the championship of Saxony-Anhalt, joined ZSG Union Halle, the Central Sports Community of the People-Owned Enterprises of Halle. The team from Halle reached the final of the Soviet zone, winning the 1949 Championship of the Eastern Zone with a 4–1 victory over SG Fortuna Erfurt in front of 50,000 in the Ostragehege stadium of Dresden. Still in the same year ZSG Union became one of the founding members of the Oberliga, the first division of the German Democratic Republic, the state founded on 7 October 1949 on the territory of the Soviet zone. The team finished the first two seasons on fifth, respectively sixth spot. After the first season the team played as BSG Turbine Halle. Attendance average in 1950–51 was just under 10.000. In the season 1951–52 the average rose to 22,170 per match and Turbine won the championship of East Germany, ahead of SG Volkspolizei Dresden and defenders BSG Chemie Leipzig. The form could not be retained and Turbine finished in 1953 on the 13th spot. Worse, after this season some of the most important players like Otto Knefler and coach Alfred "Fred" Schulz, who led the team to both championships, made off to West Germany in the context of the uprising of 1953 in East Germany. Nevertheless, in the 1953–54 DDR-Oberliga Turbine could improve to 8th position. The East German authorities were motivated by the West German World Cup win 1954 in Switzerland to make improvements to football in their country. BSGs were transformed to "Sport Clubs," often part of major bodies of industry. In Halle this led to the foundation of SC Chemie Halle-Leuna on 18 September 1954 and a large part of the football department of Turbine was transferred to this new entity. Chemie Halle-Leuna were given the Oberliga spot of Turbine, which was kept alive but forthwith played in lower leagues. Chemie Halle-Leuna these days exists as Hallescher FC. Both clubs, Turbine and Hallescher FC, claim the era between 1945 and 1954 as part of their history. BSG Turbine Halle was in 1990, after the re-unification of Germany, renamed to UTSV Turbine Halle; in 1995 the UTSV part was dropped. The football department of the club remains in the lower divisions and it plays today in the eighth tier Landesklasse. Stadium From 1936 to 1954 the club was at home at the Kurt-Wabbel-Stadion, which had a peak capacity of 35,000. Later, the Felsensportplatz, generally called the "Felsen," dating back to the 1930s, became the club's homeground. The peak capacity before the removal of the stands in 1999 was 12,000. Honours DDR-Oberliga Champions: 1952 Championship of the Eastern Zone Champions: 1949 Central German Championship Champions: 1921, 1928 Saale District Championship Winners: (12) 1910, 1911, 1912, 1914, 1920, 1921, 1924, 1925, 1928, 1931, 1932, 1933 References External links Turbine Halle (official website) Turbine Halle – Historie Germany – Championships 1902–1945'', Rec.Sport.Soccer Statistics Foundation Category:Football clubs in Germany Category:Football clubs in East Germany Category:Football clubs in Saxony-Anhalt Turbine Category:Association football clubs established in 1950 Category:1950 establishments in East Germany
{ "pile_set_name": "Wikipedia (en)" }
Rate the Artist: Music Submissions roundup: Grassfight, Syvia, Anjelia Here's our (almost) weekly appointment with the best records we found through our digital music submissions system (any artist can submit their music here). Grassfight might be the gazillionth indie band referencing Joy Division in their sound, but their songs are so good that we are definitely not going to complain about that. Besides, there are a lot of other elements here that make things interesting: this is compelling psych-goth rock that's dark enough to be credible, noisy enough to be truly edgy and punchy enough to be entertaining. As an added bonus, lead singer Nathan can pull off some seriously high tension cadences a la' Nick Cave - something that pushes the songs' climax to thundering heights (see EP opener "Never you Mind," streaming below). The guitar work in the EP is also pretty impressive, ranging from stabs of pure noise to fuzzy walls of sound, to simple acoustic parts to psychedelic, blurred background textures. If you like some sonic horror in your music, keep an ear out for these guys. &amp;lt;a href="http://grassfight.bandcamp.com/track/never-you-mind"&amp;gt;Never You Mind by Grassfight&amp;lt;/a&amp;gt; A collaboration between lead singer/songwriter Ruthy Mirsky and multi-instrumentalist/producer Simone Ghetti, Syvia is an electronic NYC outfit that crafts ethereal electronic pop and does it well. Their songs shine in particular in the melody and harmony departments, with Ruthy's voice adding the right amount of character to the mix. See them live at Cake Shop on November 23. Anjelia is a talented, emerging NJ based singer songwriter - and actress. Her song "A Long Way" is the highlight from her repertoire, and although it's probably a little too mainstream for us, it's undeniably a very good song with a catchy, interesting melody featuring an inpeccable vocal performance. Considering also the lady's looks, there's potential for a new, slightly more upbeat Lana Del Rey here. The Deli Magazine was born in NYC's Attorney Street in 2004, in the shape of a print issue with a then unknown band on its cover, called Grizzly Bear. Ths NYC blog came in 2005, then the SF one in 2006, and then 9 more in the following years. The Deli is focused on the coverage of emerging bands and solo artists with a 100% local focus - no exceptions!
{ "pile_set_name": "Pile-CC" }
--- abstract: 'We examine the effects of charge transfer inefficiency (CTI) during CCD readout on the demanding galaxy shape measurements required by studies of weak gravitational lensing. We simulate a CCD readout with CTI such as that caused by charged particle radiation damage in space-based detectors. We verify our simulations on real data from fully-depleted p-channel CCDs that have been deliberately irradiated in a laboratory. We show that only charge traps with time constants of the same order as the time between row transfers during readout affect galaxy shape measurements. We simulate deep astronomical images and the process of CCD readout, characterizing the effects of CTI on various galaxy populations. Our code and methods are general and can be applied to any CCDs, once the density and characteristic release times of their charge trap species are known. We baseline our study around p-channel CCDs that have been shown to have charge transfer efficiency up to an order of magnitude better than several models of n-channel CCDs designed for space applications. We predict that for galaxies furthest from the readout registers, bias in the measurement of galaxy shapes, $\Delta e$, will increase at a rate of $(2.65\pm 0.02)\times10^{-4}\textrm{yr}^{-1}$ at L2 for accumulated radiation exposure averaged over the solar cycle. If uncorrected, this will consume the entire shape measurement error budget of a dark energy mission surveying the entire extragalactic sky within about 4 years of accumulated radiation damage. However, software mitigation techniques demonstrated elsewhere can reduce this by a factor of $\sim10$, bringing the effect well below mission requirements. This conclusion is valid only for the p-channel CCDs we have modeled; CCDs with higher CTI will fare worse and may not meet the requirements of future dark energy missions. We also discuss additional ways in which hardware could be designed to further minimize the impact of CTI.' author: - 'Jason Rhodes, Alexie Leauthaud, Chris Stoughton, Richard Massey, Kyle Dawson, William Kolbe, Natalie Roe' title: 'The effects of charge transfer inefficiency (CTI) on galaxy shape measurements' --- Introduction ============ The past decade has seen enormous changes in the field of cosmology. A concordance cosmology in which the expansion of the universe is accelerating has been accepted (Spergel [et al.]{} 2007). This accelerated expansion was first demonstrated by observations of SN Ia (Riess [et al.]{} 1998; Perlmutter [et al.]{} 1998) and has been confirmed with other probes in recent years. This startling aspect of our Universe has prompted a wide variety of possible explanations (see, e.g., Caldwell 2004) and considerable effort has gone into developing concepts for dedicated space missions to probe the mysterious dark energy thought to be causing this accelerated expansion. These missions, which include the NASA/DOE Joint Dark Energy Mission and ESA’s Euclid mission, plan to use a variety of probes in order to constrain the properties of dark energy. It has become widely accepted that weak gravitational lensing, the small distortion of the observed shapes of background galaxies by foreground dark matter, is one of the most powerful probes of dark energy, provided that systematic effects can be controlled (Albrecht [et al.]{}2006). Space missions are attractive in large part due the greater ability to control many systematic effects (Rhodes [et al.]{} 2004a). The field of weak lensing by large-scale structure, or cosmic shear, developed in parallel to the study of dark energy as the dominant component of the Universe. From the first detections of cosmic shear a decade ago (Wittman [et al.]{} 2000; Bacon, Refregier & Ellis, 2000; Kaiser, Wilson, & Luppino, 2000; Van Waerbeke [et al.]{} 2000), surveys have grown in size and thus information content (see Hoekstra & Jain 2008 for a recent review). The culmination of this effort will be in the execution of the above-mentioned dedicated dark energy missions, which plan to survey up to 20000 square degrees, the entire extragalactic sky. It has become clear that control of systematic effects, both observational and astrophysical, is of paramount importance in making use of weak lensing as a probe of dark energy. The subtle shape changes induced by weak lensing require exquisite control of observational systematic effects, especially knowledge of the telescope’s point spread function (PSF). From the ground, thermal and gravity load-induced fluctuations in the telescope can change the PSF, and the atmospheric seeing both broadens the PSF and makes the PSF unstable on the timescale of astronomical exposures. These effects can be largely or completely mitigated by making observations in a thermally stable environment above the atmosphere. The control of systematics is a large factor in the drive towards a dedicated space mission. However, the harsh radiation environment of space has the potential to introduce an observational systematic effect due to charge traps created in CCD detectors by impacts from charged particles. These defects trap charge (either electrons in so-called n-channel CCDs or holes in p-channel CCDs) as charge is clocked across pixels toward the readout registers. When the charge is subsequently released from the trap, it shows up in a neighboring pixel, thus creating a trail along the readout direction. These trails obviously change the observed shapes of the galaxies in the images. These shape changes are coherent across the image, thus mimicking a weak lensing signal caused by dark matter. The degradation of charge transfer efficiency (CTE, this quantity is one minus the CTI, or charge transfer *inefficiency*) due to these radiation-damage induced traps has been observed in all Hubble Space Telescope (HST) imaging cameras: the Wide Field Planetary Camera 2 (WFPC2; Dolphin 2009), the Space Telescope Imaging Spectrograph (STIS; Goudfrooij [et al.]{} 2006), and the Advanced Camera For Surveys (ACS; Sirianni [et al.]{} 2005) and has hampered the sensitive shape measurements needed for weak lensing with those cameras (Rhodes [et al.]{}2004b; Schrabback [et al.]{} 2007; Rhodes [et al.]{} 2007). CTE degradation is a particularly difficult effect to correct for because its non-linear nature means that high signal-to-noise (S/N) stars which are typically used in weak lensing for PSF modeling will be affected less than the low S/N galaxies whose shapes are being measured. Thus, typical PSF deconvolution techniques are complicated by the effects of CTI. Thus, it is clear that future space weak lensing missions will need to minimize CTI due to radiation damage and have CCDs that are sufficiently well understood to allow for mitigation of the CTE degradation that does occur. In this paper we carry out a quantitative analysis of the effects of CTI in CCDs on the analysis of galaxy shapes for weak lensing, and explore techniques to mitigate the shape distortions due to trailing charge. We have developed a detailed model for the effect of charge traps based on data from irradiated CCDs, and applied it to simulated galaxies. We quantify the effects on measured galaxy shapes in simulated data as a function of galaxy size, CTI, and S/N. We base our analysis on data from p-channel CCDs fabricated at Lawrence Berkeley National Laboratory (LBNL) and irradiated with protons at the LBNL 88” cyclotron (Dawson et al 2008; hereafter D08). However, our methods are general and can be applied to any CCDs if the density and time constants of the charge traps are known. This paper is organized as follows. §\[sec:cte\] gives a brief overview of how charge is transferred between pixels during CCD readout and how different types of CCDs have performed after radiation damage. §\[sec:code\] describes the code we have developed to mimic the effects of CTI on CCD readout. In §\[sec:validation\] we validate that code by showing that it can reproduce the effects of CTE degradation as measured on real, irradiated LBNL CCDs. We apply our code to simulated astronomical images and detail the effects of CTI on the shapes of galaxies in §\[sec:simulations\]. We examine how this will effect the future space missions and give recommendations for mitigating the effects in §\[sec:future\]. Finally, we offer concluding remarks in §\[sec:conclusions\]. Background {#sec:cte} ========== CCD readout and charge transfer ------------------------------- During exposure, a photon incident on a CCD generates an electron-hole pair. In n-channel CCDs, the electrons drift into the potential well of the nearest pixel, which is created by an electrostatic potential gradient within the substrate. In p-channel CCDs, holes are collected instead, but we shall not distinguish between the two mechanisms hereafter. Charge (electrons or holes) accumulates in a well-defined volume, outside which the density falls rapidly to zero (Hardy, Murowinski & Deen 1998, Seabroke [et al.]{}2008). We are most concerned with the cross-sectional area of this cloud, which expands as a monotonic function of the amount of charge $n_e$. As illustrated in Figure \[fig:cte\_diagram\], we parameterize this as an effective height $h$ within the pixel; the variable need not really be the height, but that is a useful one-dimensional function for the purposes of explanation. Some CCDs contain a supplementary buried channel or “notch” constructed at the bottom of the potential well. This is a small region of slightly lower potential and, like the channel in an artificial river bed designed to improve the flow of a small amount of water, it will concentrate the first few electrons (or holes). The notch reduces the number of traps the charge packet is exposed to, by confining the charge to a smaller region. We model the notch by setting the height $h$ to zero below some notch depth $d$, and $$h(n_e)=\left( \frac{n_e-d}{w-d} \right) ^{\alpha}$$ above the notch, where $w$ is the full well depth (the total amount of charge that will fit in a pixel before it overflows) and $\alpha$, which depends on the construction of the potential but which is typically $\sim0.5$ (see for instance, Chiaberge [et al.]{} 2009 and Mutchler & Sirianni, 2005). Setting $h$ to zero below the notch is an approximation because it is possible that there are some traps in the notch. At any rate, the CCDs we model in this paper have no notch in the imaging region and thus this approximation does not affect the results presented here. At the end of the exposure, the charge must be moved to the amplifier electronics at the edge of the CCD to be read out and digitized. Each row of charge is first shuffled one pixel in the parallel direction, towards the serial readout register. This is typically accomplished using a 3-phase clock, as is the case for the CCDs described here (Janesick 2001), but can be approximated as a single operation (for a discussion of the consequences of this approximation, see Massey [et al.]{} 2009). Charge from the bottom-most row is transferred into the serial readout register and then shuffled using the same technique but in a perpendicular direction. The charge from each pixel is shifted onto a capacitor connected to an amplifier and then ‘counted’ by being sensed as a voltage and digitized. Read noise is the shot noise on this voltage and can be reduced by lengthening the sampling time, and thus slowing the readout rate. This process is then repeated once for each additional row of pixels: shuffling one row in the parallel direction and then through the serial readout register. As the charge is transferred from pixel to pixel, charge traps due to defects or impurities in the Si lattice temporarily capture passing charge, and release it after some delay. The typical capture time is effectively instantaneous (and if it is not, the lower capture rate can be equivalently modeled as a lower density of charge traps). The probability of release is governed by an exponential decay, with a characteristic time constant that depends upon the properties of the lattice and impurities, as well as the operating temperature of the detector (Shockley & Read 1952, Hall 1952). Several different species of charge traps may be present in any given device, with different characteristic release times $\tau$, and densities $\rho$. If the captured charge is released after its charge cloud has been shuffled along, the released charge appears as a faint trail behind the main charge packet. Trapping and trailing can occur in both the parallel and serial directions. Each column of pixels is independent and has a unique set of charge traps, while all of the rows share the same traps along the serial register. Note that even though the pixels and transfer mechanisms are physically similar in the two directions, the time per pixel transfer is typically $\sim 10^3$ shorter in the serial direction (D08). We demonstrate in §\[sec:validation\] that only charge traps with release times roughly similar to the clocking (time between transfers) affect galaxy shapes. Thus, separate species of charge traps can be important for parallel and serial transfers. CTE Effects in Irradiated CCDs ------------------------------ Thick, fully depleted p-channel CCDs have several advantages over conventional thin, n-channel CCDs, including enhanced quantum efficiency at near-infrared wavelengths, reduced fringing at near-infrared wavelengths, and significantly less degradation of CTE with a given accumulated radiation exposure. This last effect is particulary important for the measurement of subtle weak lensing-induced galaxy shape distortions. It arises due to the fact that the divacancy traps that are primarily responsible for CTI in p-channel devices are more difficult to form than the phosphorous vacancy traps that occur due to radiation damage in n-channel CCDs (Bebek [et al.]{} 2002; Janesick & Elliott 1992; D08; Spratt [et al.]{} 2005). We focus our analysis on p-channel CCDs precisely because it is more difficult to form traps in these types of CCDs than in existing n-channel CCDs. Marshall [et al.]{} (2004) compared the CTE responses of irradiated p-channel LBNL CCDs with n-channel CCDs. These n-channel devices are designed for space applications and are the ones used for the recently installed Wide Field Camera 3 on the HST. They found that a notch implant in the channels improved the CTE performance by a factor of 2 for both p-channel and n-channel devices. More importantly, they found that the CTE performance of p-channel devices is about an order of magnitude better than that of n-channel devices after irradiation. A re-analysis of the Marshall [et al.]{} data (Lumb 2009) indicates that the p-channel devices may only have about a factor of 3-8 better CTE (depending on the signal level, with the p-channel advantage being greater at low signal levels such as those expected in the images of faint galaxies). Likewise, a comparison by Gow [et al.]{}(2009) found a factor of 7 improvement in tolerance for parallel CTI (and 15 for serial CTI) in otherwise similar p and n-channel devices. Thus, thick, fully depleted p-channel CCDs are particularly attractive for a weak lensing space mission and we use them as the baseline for this study. We do, however, note that p-channel devices do not have the rich heritage that n-channel devices do, particularly in space applications. LBNL has developed radiation-hardened CCDs with the specific application of dark energy missions in mind (Holland [et al.]{}2006). These CCDS are composed of $3512\times3512$ $10.5\mu$m pixels with 4 readout registers and were baselined for the SuperNova Acceleration Probe (SNAP), a JDEM concept (Bebek 2007). The SNAP mission, like other candidate dark energy missions, would be at the L2 Earth-Sun Lagrange point, and we use the radiation flux there as the baseline for the flux experienced by a dark energy mission. A dark energy observatory will experience significant radiation exposure at L2, primarily from solar protons. Exposure to energetic protons leads to degraded CCD performance due to bulk damage from non-ionizing energy loss (NIEL) and charging of oxide layers from ionizing radiation. Bulk damage in the Si lattice is the dominant effect that manifests itself through increased CTI, increased dark current, and isolated hot pixels. Of these effects, an increase in CTI is the most likely to introduce systematic errors to a weak lensing survey. Software Algorithm to Mimic CTI {#sec:code} =============================== Our model for CTI is that inefficient charge transfers are caused by discrete charge traps embedded in pixels. These charge traps can capture and release single electrons (or holes). Each pixel of the detector contains a number of charge traps, that have a mean density $\rho$. Each trap is characterized by $h_{trap}$, its vertical location in the pixel and $\tau$, its characteristic release time constant. Different species of charge traps have different decay time constants and thus different values of $\tau$ (and $\rho$). Whenever a trap in a pixel containing $n_e$ electrons (or holes) is within the electron cloud, [[*i.e.*]{}]{} $h_{trap}<h(n_e)$, we assume that it immediately absorbs one electron from the free charge. When a full charge trap is above the free charge height (that is, not within the electron cloud), it is given an opportunity to decay. We have developed a code that mimics the readout of a CCD with imperfect CTI. For each column of pixels, we use the following procedure to “read out” the image and determine the observed charge in each pixel. This procedure is also illustrated graphically in Figure \[fig:flowchart\]. 1. Populate each pixel with free charge, as accumulated during an exposure, and calculate $h(n_e)$. 2. Define the locations of charge traps throughout the pixel array. This is done for multiple species of charge traps, each with a different $\rho$ and $\tau$. 3. For charge traps with $h_{trap}<h(n_e)$ fill the trap with one electron, and subtract one electron from the free charge in its pixel. 4. Read out the charge in pixel row $n=1$. 5. For $n=1$ to $n=n_{max}$ set the free charge in pixel $n$ to the free charge in pixel $n+1$. 6. For full traps with $h^{trap} > h(n_e)$, calculate the probability that the trap will decay (that is, release the charge), based on an exponential decay with time constant $\tau$. Generate a random number in the range \[0,1\] and, if the probability is less than the random number chosen, empty the trap and increase the free charge by 1 electron. 7. Repeat the previous four steps to calculate the measured charge in pixel rows $n=2$, $n=3$, .... Note that $n_{max}$ is decreased by one for each iteration. The image is then rotated by ninety degrees and exactly the same process is repeated to simulate serial transfers. The total number of operations to read out one row or column of $n_{pix}$ pixels is $(n_{pix})(n_{pix}+1)/2$. Thus, reading out out an entire $n_{pix} \times n_{pix}$ array scales as $n_{pix}^3$ and is computationally intensive. During a readout, a charge can be trapped multiple times in different pixels. This process inevitably adds noise to an image because we do not know the true locations of individual traps within the detector, but simply model the traps as a uniform density. We therefore ought to perform many iterations and average the results. As a more computationally efficient solution to this problem, we instead introduce “fractional traps”. That is, we place the same number of traps in each pixel and let each trap capture a “fractional electron” (with the fraction being $\rho$, the trap density per pixel, which can be less than $1$). We further divide the fractional trap in each pixel into $n_{levels}$ fractional traps, each located at a vertical position in multiples of $1/n_{levels}$. These traps release charge exactly as described above. We have found that setting $n_{levels}=10000$ allows us to reproduce the averaged results of many iterations with full traps placed randomly within the pixels (mimicking a real, physical CCD). However, the fractional trap method saves considerable computational overhead when simulating the effects of CTI on many thousands of images as described in §\[sec:simulations\]. Our code allows each trap to have a different $\tau$. However, as discussed below, we find that in each charge transfer direction, a small number of $\tau$ values (trap species) describe the behavior of physical detectors. Validation of the Charge Transfer Code {#sec:validation} ====================================== The charge transfer code has been tested and validated by creating simulated images designed to mimic the irradiated data used in D08. Using the same software as D08, we show that the code is able to reproduce the observed radiation damage effects as measured in the D08 data. Irradiation in the Lab to simulate Space Radiation -------------------------------------------------- The damaging particle radiation flux incident on a spacecraft depends on exactly when the mission occurs within the $\sim11$ year solar cycle (Barth [et al.]{} 2000). There is an order of magnitude difference in the flux of solar protons during the heaviest and lightest parts of the solar cycle (see, e.g. Figure 1 of Barth [et al.]{} 2000). In D08, the solar proton flux was modeled using the European Space Agency’s Space Environment Information System (SPENVIS). In SPENVIS, a simplified solar cycle consisting of 7 years near the maximum flux level and 4 years at zero flux is used. The total displacement damage (energy deposited in the silicon) is predicted from a uniform 4$\pi$ steradian spatial distribution of solar protons with an energy distribution derived from the Xapsos [et al.]{} (1999) model for solar proton emission. SPENVIS employs a statistical model based on data from previous solar cycles to predict the dose at $95\%$ confidence level (CL); that is, the prediction will underestimate the dose only $5\%$ of the time. D08 used the SPENVIS model to calculate the 95% CL solar proton flux incident on the CCDs, after passing through the shielding provided by the SNAP spacecraft and telescope, yielding an integrated NIEL exposure of $2.54 \times 10^6$ MeV/g (Si) for one year at solar maximum. D08 then characterized the CTE performance of thick, fully depleted LBNL p-channel CCDs by irradiating several CCDs at the LBNL 88-Inch Cyclotron with $12.5$ and $55$ MeV protons. Although a variety of irradiation levels were used, we only consider the $12.5$ MeV data with an irradiation level of $2\times10^{10}$ protons/cm$^2$. The NIEL factor for $12.5$ MeV protons is $8.9\times10^{-3} \textrm{MeV}\textrm{g}^{-1}\textrm {cm}^{-2}$ per proton (Jun [et al.]{} 2003). Thus, the $2\times10^{10}$ protons/cm$^2$ flux of 12.5 MeV protons used to irradiate the CCDs corresponds to $1.78 \times 10^{10}$ MeV/g (Si,) a total dose equivalent to ten solar cycles at 95% CL, using the SPENVIS approximation detailed here, or 110 years at L2. Although this accumulated radiation exposure is significantly higher than any proposed dark energy mission would encounter, the exaggerated radiation exposure makes it easier to characterize the detailed effects of CTE degradation. Since the number of traps (and thus the degradation of CTE) is linear with radiation exposure and the NIEL dose, the D08 accumulated radiation exposure can be used to estimate CCD performance over the course of a dark energy mission lifetime. Analysis of CTI Due to Radiation Damage --------------------------------------- The CTE of irradiated CCDs was measured using a $^{55}Fe$ x-ray source that emits K-alpha photons with energies of 5.9KeV. At the operating temperature of 133K, a single K-alpha x-ray will generate 1580 electron/hole pairs, which, depending on the location of the x-ray relative to the pixel potential wells, may be localized in a single pixel or shared among two or more pixels. In D08, CTE was characterized using single pixel events from the K-alpha peak, and the results showed that the irradiated LBNL CCDs are three times more affected by charge trailing in the parallel readout direction that in the serial readout direction. In this article, we disregard the serial CTE and only consider the trailing in the parallel direction since this will most affect galaxy shape measurements. The effects of irradiation on CTE was studied in two ways in D08. In the first method, called the $\it stacking$ method, CTE is characterized by the average charge collected for single pixel x-ray events as a function of the number of pixel transfers. Those x-ray events that experience more transfers lose a larger amount of charge due to CTI, as shown in Figure \[fig:test\_cte2\]. The serial and parallel CTE components are determined independently by fitting the fractional loss of each transfer to the data. The same single pixel x-ray events are used for a measurement of CTE using the $\it trailing$ method, in which the charge is counted in each trailing pixel as a fraction of the charge in the primary charge packet. The fractional trailing charge in each event is divided by the total number of transfers, and the results are averaged over all x-ray events. In other words, the averaged trails represent the fraction of charge left behind the primary charge packet for a single transfer. The effect of this trailing with a best fit to the data after irradiation and 1650 transfers is shown in Figure \[fig:test\_cte1\]. The total fractional charge integrated over these trails represents the CTI. To summarize and compare the two methods, the *stacking method offers a direct measurement of CTE*, measuring charge that is successfully transferred relative to the expected x-ray charge deposition, while the *trails method offers a direct measurement of CTI* by measuring the trailing charge relative to the charge in the leading pixel. The total fractional charge integrated over these trails represents the CTI. In practice, the analysis of the trails following x-ray events is limited by the ability to measure the faint trails after a large number of transfers in the presence of non-zero read noise. Because of the low S/N at large distances from the primary x-ray event, D08 fit only the first 45 pixels with a two term exponential. The charge in this two-term exponential represents approximately $2/3$ of the total charge lost due to CTE effects as identified in the stacking method. In a re-analysis of the D08 data, in which stacking plots were made with varying x-ray flux, we find strong evidence that the remaining charge must be attributed to one or more populations of traps with a much longer time constant. One such candidate is the C-O trap which has been independently identified in the LBNL CCDs in a previous analysis (Bebek [et al.]{} 2002) with a de-trapping time constant of many seconds compared to the typical time between pixel row transfers of 25 ms at the $70,000$ pixel/sec readout speed employed in D08. We therefore choose to model the CTI using three distinct trap populations instead of the two used by D08. We assign the third trap a time constant corresponding to 200 pixels in our analysis. The results of our fit are shown in Fig. \[fig:test\_cte1\] and the best-fit parameters are found to be: $\rho_1=0.35$, $\rho_2=0.49$, $\rho_3=0.7$, $\tau_1=10.0$, $\tau_2=0.486$, $\tau_3=200.0$, where $\tau$ is in units of ‘pixels’. These best fit parameters are tabulated in Table \[tab:params\_tab\]. There are, on average, about $1.5$ traps per pixel when summed over the three species; a mission that was at L2 for only about 5 years would thus have only about one twentieth that number of traps. We created a set of simulated images with the same characteristics of the D08 images to test our models. Overall, the agreement is good, as shown in Figure \[fig:test\_cte1\]. [ccccc]{} Trap Species & $\rho$ (traps per pixel) & $\tau$ (pixels) & $\tau$ (ms) & probable defect type\ 1 & 0.35 & 10.0 & 250 & Carbon-interstial (Ci)\ 2 & 0.49 & 0.486 & 12 & divacancy (VV)\ 3 & 0.7 & 200.0 & 5000 & carbon-oxygen (CO)\ As we show in §\[sec:simulations\], charge traps with time constants that are long relative to the time between parallel transfers in readout have negligible effect on galaxy shapes (i.e. they do not leave trails). The trapped charge is, however, removed from the object, and will thus affect photometry. Because our primary motivation is to study the impact of charge trailing on galaxy shapes, we chose to mimic the measured trails in D08 instead of matching the CTE as measured by the stacking method. We note that the opposite approach would be appropriate if our aim was to measure changes in photometry instead of shapes. Application of the CTE Code to Simulated Galaxy images {#sec:simulations} ====================================================== We create simulated galaxy images with de Vaucouleurs and exponential profiles and use the code described in §\[sec:code\] to introduce the effects of CTI on the galaxy images. We create galaxies as they would appear in the I-band of the proposed SNAP mission, which has a 2 meter mirror, $0.1$” pixels and 400 second exposures. The background level is chosen to be the average background for extragalactic observations taken from L2. The measured background is slightly lower than the input background because the CTI causes the flux to be dragged out into the overscan region of the CCD during readout. We create single galaxies in each image to avoid having the traps in a pixel be filled by charge from an object that has already passed through that pixel during readout. All objects are placed 1650 pixels from the readout register (close to the maximum of 1712 pixels from the readout register). This is done because objects farthest from the readout registers will encounter the most traps and suffer the worst CTI; we are trying to estimate the worst case scenario for galaxy shape measurement. We assume that the trap densities $\rho$ increase linearly over time, as traps accumulate due to radiation damage, and that the time release constants $\tau$ do not change because they are properties of the detector material itself. The assumption of linearity in trap density is not entirely accurate because the proton flux is dominated by solar radiation, which varies over the solar cycle. A specific analysis of any future dark energy mission will need to take into account the portion of the solar cycle in which the mission occurs. We make a further simplification by assuming that at the start of a mission a CCD will have no charge traps, so only traps accumulated during the time spent at L2 affect readout. This is of course not true, because real CCDs always have some imperfections even immediately after their production. In the case of the LBNL CCDs we are simulating, however, this turns out to be a good approximation because the pre-irradiation CTE is so high and the number of traps so low (see Table IV of D08). However, our results represent a best-case scenario for the number of traps (and thus CTI) as a function of time; the real CTI will be slightly worse. For each galaxy, we measure the shape both before and after the image is degraded with imperfect CTE. The shape is parameterized in the typical weak lensing fashion by a two component ellipticity $e_i$, where $e_1=\frac{I_{xx}-I_{yy}}{I_{xx}+I_{yy}}$ corresponds to elongation along the $x$ axis (for positive $e_1$) or the $y$ axis (for negative $e_1$), and $e_2=\frac{2I_{xy}}{I_{xx}+I_{yy}}$ corresponds to elongation at $\pm45$ degrees. Here, the shapes are described in terms of the second order moments of the pixel intensity $I$ such that $I_{ij}=\frac{\sum I w x_{i} x_{j}}{\sum Iw}$ where $x_i$ is the distance in pixels from the object centroid and $w$ is a Gaussian weight function. The ellipticities were measured using the method of Rhodes, Refregier, & Groth (2000; hereafter RRG). This method has been well-tested on real and simulated space-based data (see Leauthaud [et al.]{} 2007). Since we are only interested in perturbations to the galaxy shapes, we do not go through the somewhat complicated steps of point spread function deconvolution, which can introduce biases in shape measurements (Heymans [et al.]{} 2006; Massey [et al.]{} 2007). Instead, we only concern ourselves with $\Delta e$, which is relatively independent of the particularly shear measurement method. We explore the effects of S/N and galaxy size on $\Delta e$ but for the bulk of our analysis, we consider small, faint galaxies; any weak lensing survey will be dominated by galaxies that are faint and small relative to the PSF size. For the purposes of this paper, we only introduce parallel CTI into the simulated images and we set the serial CTE equal to 100%. We do this for two reasons. First, the parallel CTI smears objects in the vertical direction (negative $e_1$), but serial CTI smears them horizontally (positive $e_1$, the serial readout direction). Thus, just using the ellipticity $e$ as an indicator of CTI-induced galaxy shape changes means that the effects of serial and parallel CTI partially cancel. The combined effects change the *size* of the PSF, and thus must be corrected for in real images, but would provide an unfair test for these purposes. The second reason we concentrate just on parallel CTI is that the parallel CTE degradation is three times worse for a given radiation exposure (D08) and different charge trap species affect the parallel and serial CTE because of the different clocking times in the parallel and serial directions. Thus, we seek only to demonstrate that we understand the more influential effects of the parallel CTI on shape measurement in this paper. Effect of charge trap release time {#sec:tau} ---------------------------------- Figure \[fig:tau\_effect\] demonstrates the effect of charge trap release time $\tau$ on the measurement of photometry as measured by S/N (calculated via SExtractor; Bertin & Arnouts 1996, S/N =flux\_auto/fluxerr\_auto), astrometry (the $y$ centroid of an object), and shapes (rms size $d_{rms}=\sqrt{0.5(I_{xx}+I_{yy})}$ and ellipticity $e_{1}$). We measure the release time $\tau$ in units of “pixels,” the amount of time it takes to clock the charge by a certain number of pixels in the parallel readout direction (i.e., one “pixel” is the time between row shifts during readout). In terms of astrometry, photometry, and size, there are two limiting regimes. Charge traps with very short release times (or slow CCD readout) push charge from an object’s leading edge onto its core, and drag core charge into a short tail. Both effects shift the object away from the readout register. The net effect also increases the object’s size, because the core contains more charge than the wings. A small amount of flux can be lost from the wings into a tail, so $\Delta$flux is always slightly negative. However, the smoothing inherent in trailing correlates adjacent pixels and has the perverse effect of [*increasing*]{} the S/N. Note that the limiting behavior at low $\tau$ is as expected: in our model, all traps inside a charge cloud carry an electron to the adjacent pixel at every clock cycle. In a real CCD, some charge may be released from very fast charge traps part-way through the 3-stage clocking cycle and returned to their original pixel. This process would lower the effective density of charge traps with low $\tau$. Charge traps with long release times (or fast CCD readout) steal flux primarily from an object’s leading edge, and return it to the image in pixels well separated from the object. This stolen flux lowers the detection S/N. It also shifts the centroid as before, and decreases the size. For intermediate $\tau$, these effects are dominated by the addition of a tail, which increases the overall size. One curious dependency upon measurement method is that, while the rms size $d_{rms}$ decreases with $\tau$, the FWHM fitted by [SExtractor]{} [*increases*]{}: for example, $ \Delta$FWHM is negative for small $\tau$. This is presumably related to the net increase in detection S/N, and the segmentation of the image into fewer pixels that [SExtractor]{} determines belong to a given object. Note that if high $\tau$ were achieved by dramatically speeding the CCD readout, our assumption of instantaneous capture times may become invalid. A probabilistic capture mechanism over a finite time would result in lower effective densities of all traps, and potentially increased sensitivity to the density of charge throughout a pixel potential, changing the well filling parameters $\alpha$ and $d$. The spurious ellipticity induced in an object is interestingly different. The tail and the centroid shift induced by charge traps with short release times both elongate an object in the readout direction. As the tail lengthens, the spurious ellipticity initially increases. However, once the charge in the tail is sufficiently disconnected from the object and the object’s centroid shifts back towards the correct position, the spurious ellipticity begins to decrease. In the limiting case of charge traps with very long release times, charge missing from the object’s leading edge could potentially elongate the object perpendicular to the readout direction; however, the residual centroid shift in this case is sufficient to maintain a small ellipticity in the readout direction (this result may depend upon the object’s radial profile). Thus, we find that, in terms of weak lensing shear measurement, not all CTI is equally bad. Furthermore, there is a worst possible case, in which traps with release times corresponding to 3–4 clock cycles induce the most spurious ellipticity. This value depends upon the shape measurement method: with KSB (Kaiser, Squires & Broadhurst 1995) and RRG, it depends upon the size of the Gaussian weight function. The bump in $\Delta d(\tau)$ around this value is real and also depends upon this scale. However, from a more general argument about the dissociation of flux from an object in a very extended trail, it is clear that a local maximum in $|\Delta e_1|$ will be inevitable for all shear measurement methods. The clock speed is a parameter that can be tuned in the hardware. We discuss this possibility in §\[sec:future\]. Effects on galaxy morphology ---------------------------- We create a series of images at the fiducial irradiation level of D08 (110 years at L2). We created galaxies with De Vaucouleurs (DvC) profiles and exponential profiles. For the DvC galaxies, we varied S/N, size, and input ellipticity. For each different set of simulation parameters, we create 1000 simulated galaxies, each with a different, random sub-pixel position of the galaxy centroid and different background noise realization. We measure the size in terms of the rms size $d$. Small galaxies have a size close to that of the PSF, representing the typical galaxies that will dominate a lensing survey; large galaxies are significantly bigger than the PSF. The values of S/N, size, and ellipticity for the different simulations are shown in Table \[tab:simstable\]. The key result for weak lensing, the change in measured ellipticity, is illustrated in Figure \[fig:trap\_density\]. [llccccc]{} Profile & S/N & $\Delta$(S/N) & $e$ & $\Delta e$ & rms size $d_{rms}$ \[pixels\] & $|\Delta y |$\ DvC & low (13) & 1.1 & 0 & -0.028 & (small) 1.8 & 0.19\ DvC & low (13) & 1.1 & -0.17 & -0.024 & (small) 1.8 & 0.19\ DvC & low (13) & 1.2 & +0.17 & -0.031 & (small) 1.8 & 0.19\ DvC & high (50) & 0.7 & 0 & -0.024 & (small) 1.9 & 0.17\ DvC & low (20) & 0.3 & 0 & -0.010 & (large) 3.1 & 0.20\ DvC & high (50) & 3.0 & 0 & -0.010 & (large) 3.6 & 0.20\ Exponential & high (49) & 0.9 & 0 & -0.022 & (small) 1.9 & 0.18\ As expected, the small galaxies are significantly more affected by CTI than large galaxies. We also show that for small galaxies, brightness (S/N) is a mitigating factor (but not for large galaxies); small bright objects are slightly less affected by CTI than small faint ones. Another interesting feature recovered from these simulations is the dependence of $|\Delta e|=|\Delta e_{1}|$ on galaxy ellipticity. Galaxies that are already aligned along the readout direction ($e_{1}<0$ in the case of our simulations) are less affected by CTI than galaxies that are aligned perpendicular to the readout direction ($e_{1}>0$). Perturbations in the $y$ direction (such as CTI) affect galaxies that are already aligned in the $y$ direction less than galaxies aligned in the $x$ direction. Effects of trap density {#sec:plots} ----------------------- Figure \[fig:trap\_density\] also shows the results of simulations with varying trap densities. We increment the trap density (in all three species) from zero to the density that would be found after 220 years at L2 (twice the fiducial value from D08). At each of 50 evenly spaced points along this timeline, we create 100 simulated galaxies, each with a DvC profile (small, low S/N, $e=0$). As expected, the degradation of shape measurement increases linearly with trap density. We find that $$\label{eqn:delta_e_rate} \frac{{\mathrm d}\Delta e}{{\mathrm d}t}=(2.65\pm 0.02)\times10^{-4} \textrm{~[yr}^{-1}\textrm{~at L2]}$$ for a radiation dosage averaged over an 11-year solar cycle and yearly displacement damage dose of $1.6 × 10^6$ MeV per gram of Si. We make the simplifying assumption of zero traps (CTI$=0$) at time $t=0$. However, D08 show that the number of traps in a new LBNL CCD is smaller than the measurement error, so the approximation we make here is a good one. Consequences for the Future Space Missions {#sec:future} ========================================== Amara & Refregier (2008) ascertain that the multiplicative error on measured shear needs to be kept below one part in $10^{-3}$ in order that future dark energy missions not be dominated by systematic errors. This means that *all* sources of shear measurements error (not just the portion due to CTI) must be kept below $\Delta e<10^{-3}$ throughout the mission lifetime. This level of shape measurement accuracy is represented in Figure \[fig:trap\_density\] by a horizontal dotted line. The prediction for $\Delta e$ after a fiducial 5 year mission can be calculated from Equation (\[eqn:delta\_e\_rate\]). To avoid any assumption of linearity with $\rho$, however, we have also run a larger number of simulations at 2 and 5 years of mean L2 exposure. In each case, we created 3000 simulations to reduce measurement noise due to the sub pixel galaxy position and sky noise. We find that $\Delta e_{\textrm{2 years}}=0.490\pm0.01\times10^{-3}$ and $\Delta e_{\textrm{5 years}}=1.56\pm 0.02\times 10^{-3}$. That is, without any correction, a 5 year weak lensing mission will have the entire shape measurement error budget consumed by CTI-induced effects before the end of the mission, even with specially designed, fully depleted, radiation hardened, p-channel CCDs. Fortunately, recent work using data from the HST’s Advanced Camera for Surveys Wide Field Camera (ACS/WFC) has shown that software postprocessing can correct the effects of CTI on galaxy shapes by about a factor of 10 (Massey [et al.]{} 2009). Using the same code described here, trailed charge could be moved back to where it belonged in an iterative procedure restoring images to their true appearance. Massey [et al.]{} (2009) measured the time constants and number density of traps in ACS/WFC as a function of time, using extragalactic survey imaging that would be naturally available in any future survey without additional overhead. For this software, the factor of ten level of correction will be maintained down to the regime of future missions with much lower trap densities. One component of noise (due to variations in the number of traps in a given pixel, which we treat as a constant density) will be improved, but this affects only scatter in $\Delta e$ rather than the level itself. We therefore conclude that, *using CCDs with the characteristics of those in our study, and proven software mitigation techniques to achieve an additional factor of 10 correction, CTI in a future dark energy mission would be satisfactorily controlled at only 10% of the total shape error budget.*\ One way in which CTI models (and mitigation techniques) could potentially be pushed beyond correction by a factor of 10 would be to precisely locate individual charge traps, rather than treating them statistically. This would be most beneficial in the early years of a dark energy mission, when $\rho << 1$. Designing flexibility into the clocking speed, waveform, and voltage in CCD electronics provides the ability to locate traps via “pocket pumping” (Janesick 2001). Pocket pumping is a process in which a uniform level of charge introduced by a flat field lamp is rapidly shuffled back and forth thousands of times in the parallel direction. Following the charge shuffle, the charge is transferred to the readout transistor in the normal manner. The resulting image reveals accumulated charge captured and then released by each trap in the shape of a dipole of an overdensity neighboring an underdensity of charge. The orientation and strength of this dipole reveal the location of the trap within the pixel and the effectiveness of the trap. This can be repeated with different levels of initial charge to map out traps in 3 dimensions within the CCD. Because the readout time of the CCD is dominated by the clocking of serial charge, the pumping of charge in the parallel direction does not introduce a significant amount of overhead to the survey. For example, it takes approximately 45 seconds to record a normal image from the LBNL CCDs using the D08 clocking parameters. Image acquisition takes an additional 45 seconds for 20000 cycles of pocket pumping with a five pixel shift. Acquisition of five successive pocket-pumping images every week to reject cosmic rays and model the traps therefore would account for less than ten minutes of additional calibration time. Another suggested mitigation technique is “charge injection” (also called “fat zero” or “pre-flash”) in which charge is placed into the pixels in order to fill the traps. The charge injection is simply a method to increase the overall background level and fill the volume. However, this has the effect of increasing the background in an image (much like increasing the zodiacal background) and will reduce the S/N of the detected objects. This is obviously undesirable for a weak lensing experiment in which the observer is attempting to measure shapes of faint galaxies. We showed in §\[sec:tau\] that there exist clocking time scales that are maximally bad for shape measurement. If the clock cycle is 3–4 times the trap release time, then $\Delta e$ is maximized. Thus, future missions with weak lensing as a primary science driver should include an optimization of the charge clocking time in their CCD readout electronics. Increasing the rate at which charge is clocked serially, and thus increasing the rate at which parallel transfers of rows can be made, increases readout noise, resulting in an effective loss of survey depth; decreasing the rate at which charge is serially clocked increases the readout time and, if that dominates over factors like slew and settle time between exposures, will reduce survey area. Thus, careful consideration must be paid to the trade-offs in any such optimization. Furthermore, we are only making recommendations for how to minimize shape measurement errors due to CTI. Photometry is also degraded by traps with large values of $\tau$ relative to the charge clock period. This can remove charge from objects but place it far enough away that the shape is not significantly affected. Thus, trade-offs in charge clocking time must also take into account the photometric accuracy requirements of the mission. We finally note that the temperature at which detectors are operated at has significant effect on CTE, and thus future missions should be tested and optimized with this in mind. Conclusions {#sec:conclusions} =========== We have quantified the effect of CTI on measurements of weak gravitational lensing. We first simulated the transfer of charge within LBNL p-channel CCDs using a model for charge traps with three characteristic release times to reproduce the experimental results of D08. Using this model, we then simulated deep exposures of galaxies for weak lensing measurements from a space-based telescope subject to radiation damage. The resulting simulated data were used to quantify the effects of radiation damage on shape measurements of galaxies of various sizes and S/N levels, the true shapes of which were precisely known. Most galaxies in any weak lensing survey will be small and faint; as expected, we find that these suffer worst from the effects of CTI. The level of CTI-induced shape error $\Delta e$ will approach the total shape error budget of a dark energy mission (1 part in $10^{-3}$; Amara & Refregier 2008) after less than 4 years of radiation exposure at L2. Software mitigation techniques in image postprocessing, already proven on HST data (Massey [et al.]{} 2009), will be able to reduce the levels of shape error well below mission requirements. We have also suggested hardware capabilities, such as “pocket pumping” and adjustments to the readout speed, that may provide additional help. However, our numerical results are only valid for p-channel devices, whose CTE characteristics after radiation exposure have been shown to be superior to more common n-channel devices (Lumb 2009; Marshall [et al.]{} 2004). *Given the necessity of both hardware and software mitigation of CTI effects for successful mission operation, we recommend that future spacecraft be designed with detectors and mission parameters that ensure CTE characteristics no worse than the LBNL p-channel devices we simulated for this work.*\ There are several caveats to our results. First, we assumed that all galaxies are small, faint, and lie far from the readout register. Galaxies that are bright, large, or nearer the readout register will suffer less from CTI. Indeed, the average distance to the readout register will be exactly half of the worst case scenario we outlined, so the mean $\Delta e$ will be a factor of two lower. In a real mission, there will be several dithered exposures of each galaxy, with each dither placing the galaxy a different distance from the readout register; this may allow us to further model the effects of CTI on shapes and partially mitigate those effects. We also assumed a high level of radiation from the Sun for at least a portion of the mission due to modeling radiation flux in the heaviest part of a typical 11-year solar cycle. A mission flown during the level of minimum particle radiation at L2 would suffer less radiation damage, but a mission flown entirely during the maximum of the solar radiation flux would suffer more damage. This is a large uncertainty because the radiation flux due to the Sun can vary by an order of magnitude over the solar cycle (Barth [et al.]{} 2000). Furthermore, any real mission would need to adjust the flux according to the planned shielding on the spacecraft (D08 assume the SNAP design) and should take into account secondary particle cascades from reactions of high energy radiation with the shielding material (D08 ignored such secondary radiation). The ‘stacking’ and ‘trails’ methods probe different properties of CTE and we have chosen the fits to trails in D08 to model the effects of radiation exposure on shape measurements. We have only explored the charge transfer and radiation tolerance properties of a certain model of CCD operating at a single temperature; any future space-based weak lensing missions should undertake a similar analysis using the CCDs planned for that mission. Finally, if the CCDs contain a significant density of traps even before they are launched into the harsh radiation environment of space, the CTI will be worse throughout, and the useful mission lifetime reduced. Clearly, then, this paper is a first step, and any future mission should use a procedure similar to the one we have developed in this paper to meet specific mission requirements by fully optimizing its choice of CCDs, clocking rate, and shielding. [**Acknowledgments**]{} This work was supported in part by the Jet Propulsion Laboratory, operated by the California Institute of Technology under a contract with NASA. This work was also supported by the United States Department of Energy under contract No. DE-AC02-05CH11231. We thank Chris Bebek, Mike Lampton, Michael Levi, and Roger Smith for useful discussions about CCDs and CTE. AL acknowledges support from the Chamberlain Fellowship at LBNL and from the Berkeley Center for Cosmological Physics. RM is supported by STFC Advanced Fellowship \#PP/E006450/1 and FP7 grant MIRG-CT-208994. CS was supported by funding from the Office of Science at LBNL and Fermilab. Albrecht, A., [et al.]{}, 2006, astro.ph..9591A Amara, A., & Refregier, A., 2008, MNRAS, 391, 228 Bacon, D., Refregier, A., & Ellis, R., 2000, MNRAS, 318, 625 Barth, J., Isaacs, J., & Poivey, C., 2000,“The Radiation Environment for the next generation space telescope,” GSFC Bebek, C., 2007, NIMPA, 579, 848 Bebek, C., [et al.]{}, 2002, SPIE 4669, 161-171 Bertin, E., & Arnouts, S. 1996, A&AS, 117, 393 Caldwell, R., 2004, MPLA, 19, 1063 Chiaberge, M., [et al.]{}, 2009, Instrument Science Report ACS 2009-01, STScI Dawson, K., [et al.]{}, 2008, IEEE Transactions on Nuclear Science, 55, 1725 Dolphin, A., 2009, PASP, 121, 655 Goudfrooij, P., [et al.]{}, 2006, PASP 118, 1455 Gow, J., [et al.]{}, 2009, SPIE,7435, 74350F-2 Hall R., 1952, Phys. Rev. 87, 387 Hardy T., Murowinski R. & Deen M., 1998, IEEE Trans. Nuclear Sci. 45, 154 Heymans, C., [et al.]{}, 2006, MNRAS, 368, 1323 Hoekstra, H., & Jain, B., 2008, ARNPS, 58, 99 Holland, S.E., [et al.]{}, 2006, SPIE, 6276, 10H Dawson, K., [et al.]{}, 2003, IEEE Trans. Electronics Dev., 50, 225 Janesick, J., [et al.]{}, 1991, SPIE, 1447, 87 Janesick, J., & Elliott, T., 1992, ASPC, 23, 1J Janesick J., “Scientific Charge Coupled Devices”, 2001, SPIE (ISBN 0-8194-3698-4) Jun, I. [et al.]{}, 2003, NSS-IEEE, 50, 192. Kaiser, N., Squires, G., & Broadhurst, T., 1995, ApJ, 449, 460 Kaiser, N., Wilson, G., & Luppino, G., astro-ph/0003338 Leauthaud, A., [et al.]{}, 2007, ApJS, 172, 219 Lumb, D., 2009, SPIE, 743904 Massey, R., [et al.]{}, 2007, MNRAS, 376, 13 Massey, R., [et al.]{}, 2009, submitted Marshall, C., [et al.]{}, 2004, SPIE, 5499,542 Mutchler, M., & Siriani, M. 2005, Instrument Science Report ACS 2005-03, STScI Perlmutter, S., [et al.]{}, 1998, ApJ, 517, 565 Rhodes, J., [et al.]{}, 2007, ApJS, 172, 203 Rhodes, J., [et al.]{}, 2004, APh, 20, 377 Rhodes, J., [et al.]{}, 2004, ApJ, 605, 29 Rhodes, J., Refregier, A., & Groth, E., 2000, ApJ, 536, 79 Riess, A., [et al.]{}, 1998, AJ, 116, 1009 Schrabback, T., [et al.]{}, A&A, 468, 823 Seabroke G., [et al.]{}, 2008, SPIE, 7021, 49S Shockley W. & Read W., 1952, Phys. Rev. 87, 835 Sirianni, M., [et al.]{}, 2005, PASP 117, 1049 Spergel, D., [et al.]{}, 2007, ApJS, 170, 377s Spratt, J.P., [et al.]{} 2005, IEEE Trans Nuc Sci, 52, 6, 2695 Van Waerbeke, L., [et al.]{}, 2000, A&A, 538, 30 Wittman, D., [et al.]{}, 2000, Nature, 405, 143 Xapsos M.A., [et al.]{}, 1999, NASA/TP-1999-209763.
{ "pile_set_name": "ArXiv" }
# 方法论 推荐先看我的这本书: <<软件开发之殇>> https://item.jd.com/12641896.html 从事软件开发, 一定要有个好的方法论. 因为软件开发领域需要每天学习. 不能用笨方法去学习. 下面是我们从实战角度梳理出来的初学者最容易犯的错误. # 搜索时间过多/过短. 花多少时间来搜索合适? 1. 先自己试着搜索1~2小时. 我的正常搜索时间: 5~ 20分钟。 少数内容, 2小时内也基本搞定。 2. 如果2小时还搞不定,果断人肉问身边的同事同学。 3. 如果他还不知道,咱们就继续问别人。起码问3个。 4. 这时候, 别人起码能给到你很多线索。 再google/baidu. 5. 如果2小时后还不行,就上stackoverflow / tieba /zhidao /zhihu 上 发问。 重要问题: 给额外的分数 (例如在stackoverflow上,别人回答一个题目,得10分。 如果你分数多,就可以设置bonus , 最高可以给到 500) 我问过几个问题,90%都可以顺利在 stackoverflow上得到答案。 如果得不到的话,可能该问题就无解了。 # 官网上的内容比这本书的内容多的多? 该怎么办? 比如log4r 的官网有好多内容。 http://log4r.rubyforge.org/manual.html 咱们的: http://web.siwei.tech/web_components/log4r.html 80-20定律。 最有用的内容只有20%,但是它用在80%的地方, 所以,我们的策略: 1. 需求导向。 (我能解决实际的需求问题就行,其他的80%的内容,如果用不上,那就不学) 上面也回答了: 什么学,什么不学。 (看需求) 2. 在什么情况下学? 平时是不用学的。啥时候,老板说: 男主角,把这个需求作一下。 这个时候才学。 # 怎么学? 需求导向的话, 要作的事儿看起来是一个点,但是官网中有一堆东西。该怎么定位? 1. 如何定位? 不要根据官网来定位。 信息海量。除非你的英语阅读能力很强,经验老道。 使用google. 例如: 使用ruby on rails如何上传文件。 那么,我要作的,不是到rails官网看, 而是: google: 'rails file upload' ``` Ruby on Rails File Uploading - TutorialsPoint https://www.tutorialspoint.com/ruby...rails/rails-file-uploading.ht... You may have a requirement in which you want your site visitors to upload a file on your server. Rails makes it very easy to handle this requirement. Now we will ... ruby - Uploading a file in Rails - Stack Overflow stackoverflow.com/questions/14174044/uploading-a-file-in-rails 2013. 1. 5. - While there are plenty of gems that solve file uploading pretty nicely (see https://www.ruby-toolbox.com/categories/rails_file_uploads for a list), rails ... How to upload a file in ruby on rails? - Stack Overflow stackoverflow.com/.../how-to-upload-a-file-in-ruby-on-rails 2012. 7. 5. - I'm very new in ruby on rails. I'm stuck with a problem. I want to make a ... Thank you for example, I study rails too! It works in rails 3.1. My code: Form Helpers — Ruby on Rails Guides guides.rubyonrails.org/form_helpers.html What makes a file upload form different. How to post forms to external resources and specify setting an authenticity_token . How to build complex forms. ``` 所以,本着经验,stackoverflow的内容,是最精准的。 所以,我们点开的,不是官方网站 stackoverflow 上有两个问题, 一个问题15个星,一个问题35个星。 后者有62个回答。 而且 内容最简单: (超级简单) 于是,我就知道了。 官方网站就不用看了。 TODO: 好几个图。放到 methodologies 目录下。 # 如何搜索到这些知识? (上面回答了,google) # 大师是否一开始也看官网说明? (不看) 对于: 自己丝毫不了解的东西,我会先找到官方网站, 看看LOGO啥的, 找到文档的链接,看看hello world. 让自己心里有个底,知道这个东西的最权威的文档在哪里。 然后,我就去搜索。google. 不做就会死的事儿。 这时候没有时间一行一行的看代码。 就只能google. google完之后, 自己试。 (80%都是行的, 20%的情况会失败,往往是自己本地,没有这个环境) 例如: redis cache file 我就搜,然后,找到一个看起来最正确的答案(因为有很多么)亲手试。 但是发现不行: ``` while time.time() - t - expiry < 0: yield r.get(fpKey) So 1 roundtrip per iteration. With the function, you have: if r.exists(fpKey): return r.get(fpKey) ``` 不知道上面代码写在什么 地方(英语里叫context ), 所以这个时候,回到官方文档, 查看intro... 查看如何 搭建环境。。。跑起redis ... 之后,慢慢就知道, 上面的代码应该放到什么位置了。 # 知道如何用它,但是不知道如何提升/深入。 (看官方文档,或者源代码) 例如上面的,file upload, 官方文档中,专门有一段: ``` 5.1 What Gets Uploaded The object in the params hash is an instance of a subclass of IO. Depending on the size of the uploaded file it may in fact be a StringIO or an instance of File backed by a temporary file. In both cases the object will have an original_filename attribute containing the name the file had on the user's computer and a content_type attribute containing the MIME type of the uploaded file. The following snippet saves the uploaded content in #{Rails.root}/public/uploads under the same name as the original file (assuming the form was the one in the previous example). ``` # 是否每个软件都有裙带性? == 是否每个工具都有依赖关系? 是的。 但是完全不影响我们的使用。 (在java/oc/c中,到处都是import, include, 在ruby中,我们感受不到) 例子: rails. 会依赖好多好多: activesupport, active ``` rails (4.2.1) actionmailer (= 4.2.1) actionpack (= 4.2.1) actionview (= 4.2.1) activejob (= 4.2.1) activemodel (= 4.2.1) activerecord (= 4.2.1) activesupport (= 4.2.1) bundler (>= 1.3.0, < 2.0) railties (= 4.2.1) sprockets-rails ``` 对于 activerecord, 依赖了: ``` activerecord (4.2.1) activemodel (= 4.2.1) activesupport (= 4.2.1) arel (~> 6.0) ``` 对于 activemodel, 依赖了: ``` activemodel (4.2.1) activesupport (= 4.2.1) builder (~> 3.1) ``` 对于 activesupport, 还有更多: ``` activesupport (4.2.1) i18n (~> 0.7) json (~> 1.7, >= 1.7.7) minitest (~> 5.1) thread_safe (~> 0.3, >= 0.3.4) tzinfo (~> 1.1) ``` 所以,这是个方法论: A 依赖 B, B 依赖 C, C 依赖 D, 如果D 依赖回A 呢? 上面的现象,在java当中很常见。 其他语言,也一样。 ## 在操作系统中也是一样。 而且,还存在于: Linux, Windows, Mac当中。 例如,Linux, 为什么会存在: apt-get , yum ... 在mac中, 为什么会存在: homebrew ## 编译好的包 Homebrew, apt-get , 它们都是 package manager (第三方包的管理工具) ``` $ apt-get install git ``` 它会自动帮我们把相关的内容下载下来。 省的我们一个一个去寻找了。 相关的内容有: 1. 依赖的第三方包 2. 编译后的代码(直接可以执行了) 上面的文件: ubuntu/debian: .deb centos/redhat: .rpm mac: .dmg windows: .exe (会自动解压,然后把编译后的文件,copy到对应目录下) ## 最后一个例子。 例如,我们的生产服务器,往往都是只有命令行。 没有GUI。 为什么我们的桌面LINUX有GUI呢? 因为,桌面LINUX, 比服务器LINUX,多了一些软件。(xwindow) 例如, xwindow 可能有个组建,叫 font (字体)。 那么我安装这个font, 就要先安装 100个第三方包。 # 在ruby中,如何定位并且搜索? 例如: ``` $ gem install httparty ``` 之后, 下面代码会报错: ``` require 'httparty' response = HTTParty.get 'www.baidu.com' puts response.body, response.code, response.headers ``` 内容是: ``` liyun@hp:~/workspace/happy_book_rails$ ruby abc.rb /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `initialize': Connection refused - connect(2) for nil port 80 (Errno::ECONNREFUSED) from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `open' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `block in connect' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/timeout.rb:74:in `timeout' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:878:in `connect' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:863:in `do_start' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:852:in `start' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:1375:in `request' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/gems/2.2.0/gems/httparty-0.14.0/lib/httparty/request.rb:118:in `perform' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/gems/2.2.0/gems/httparty-0.14.0/lib/httparty.rb:560:in `perform_request' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/gems/2.2.0/gems/httparty-0.14.0/lib/httparty.rb:486:in `get' from /home/liyun/.rbenv/versions/2.2.1/lib/ruby/gems/2.2.0/gems/httparty-0.14.0/lib/httparty.rb:598:in `get' from abc.rb:2:in `<main>' ``` 我们如何定位问题呢? 要可以看懂这个 出错信息( error stack) 90%的语言(java, ruby, javascript... ), 都是从下到上的执行顺序。 (python: 从上到下看。。) 这个代码的执行顺序是从下往上: 1. 先找到 abc.rb 的第二行, 2. 在运行 httparty.rb 598 行 3. httparty.rb 486 行 ... 到最后, 执行的是 /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb 的 879行: 出错信息是: Connection refused - connect(2) for nil port 80 (Errno::ECONNREFUSED) 上面的出错信息,就是我要搜索的内容。 为了定位准确,(上面的消息跟ruby无关), 我加上 文件名 http.rb . 所以,我最终搜索的是: http.rb:879:in `initialize': Connection refused - connect(2) for nil port 80 (Errno::ECONNREFUSED) 结果: (截图) 发现第一个是push, 是gitlab 相关,我们不看(目测关联度极低)。 第二个结果: 跟ruby相关,果断点开, 发现是一个 rss 的问题。 跟httparty无关。 过。 第三个结果: 也是跟git相关。 跟httparty无关。 过。 反思: 搜索结果不准。 继续缩小范围。 于是,我加上 httpart , 搜索词换成了: ``` httparty http.rb:879:in `initialize': Connection refused - connect(2) for nil port 80 (Errno::ECONNREFUSED) ``` 发现结果没太大变化。 因为: google认为, 我们的搜索词, 没啥变化。 所以,我们修改关键词。 (google 会自动忽略: 879 这样的数字,有时候会,有时候又不会,我们就碰) 所以, 我们现在这样搜: ``` httparty Connection refused - connect(2) for nil port 80 (Errno::ECONNREFUSED) ``` 找到第二个: http://stackoverflow.com/questions/11768111/connection-refused-connect2-httparty 里面的一个答案: I was using an incorrect url. 于是我们就修改代码: ``` response = HTTParty.get 'www.baidu.com' ``` 改成: ``` response = HTTParty.get 'http://www.baidu.com' ``` ## httparty , 在ruby中报错,跟在rails中报错,是不一样的。 rails增加了: 3个分类: 1. Application Trace 2. Framework trace 3. Full trace 1. Application Trace ``` app/controllers/books_controller.rb:8:in `index' ``` 2. Framework trace (增加了好多rails 框架的出错路径) ``` /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `initialize' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `open' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `block in connect' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/timeout.rb:74:in `timeout' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:878:in `connect' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:863:in `do_start' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:852:in `start' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:1375:in `request' httparty (0.14.0) lib/httparty/request.rb:118:in `perform' httparty (0.14.0) lib/httparty.rb:560:in `perform_request' httparty (0.14.0) lib/httparty.rb:486:in `get' httparty (0.14.0) lib/httparty.rb:598:in `get' actionpack (4.2.1) lib/action_controller/metal/implicit_render.rb:4:in `send_action' actionpack (4.2.1) lib/abstract_controller/base.rb:198:in `process_action' actionpack (4.2.1) lib/action_controller/metal/rendering.rb:10:in `process_action' actionpack (4.2.1) lib/abstract_controller/callbacks.rb:20:in `block in process_action' activesupport (4.2.1) lib/active_support/callbacks.rb:117:in `call' activesupport (4.2.1) lib/active_support/callbacks.rb:117:in `call' activesupport (4.2.1) lib/active_support/callbacks.rb:555:in `block (2 levels) in compile' activesupport (4.2.1) lib/active_support/callbacks.rb:505:in `call' activesupport (4.2.1) lib/active_support/callbacks.rb:505:in `call' activesupport (4.2.1) lib/active_support/callbacks.rb:92:in `_run_callbacks' activesupport (4.2.1) lib/active_support/callbacks.rb:776:in `_run_process_action_callbacks' activesupport (4.2.1) lib/active_support/callbacks.rb:81:in `run_callbacks' actionpack (4.2.1) lib/abstract_controller/callbacks.rb:19:in `process_action' actionpack (4.2.1) lib/action_controller/metal/rescue.rb:29:in `process_action' actionpack (4.2.1) lib/action_controller/metal/instrumentation.rb:32:in `block in process_action' activesupport (4.2.1) lib/active_support/notifications.rb:164:in `block in instrument' activesupport (4.2.1) lib/active_support/notifications/instrumenter.rb:20:in `instrument' activesupport (4.2.1) lib/active_support/notifications.rb:164:in `instrument' actionpack (4.2.1) lib/action_controller/metal/instrumentation.rb:30:in `process_action' actionpack (4.2.1) lib/action_controller/metal/params_wrapper.rb:250:in `process_action' activerecord (4.2.1) lib/active_record/railties/controller_runtime.rb:18:in `process_action' actionpack (4.2.1) lib/abstract_controller/base.rb:137:in `process' actionview (4.2.1) lib/action_view/rendering.rb:30:in `process' actionpack (4.2.1) lib/action_controller/metal.rb:196:in `dispatch' actionpack (4.2.1) lib/action_controller/metal/rack_delegation.rb:13:in `dispatch' actionpack (4.2.1) lib/action_controller/metal.rb:237:in `block in action' actionpack (4.2.1) lib/action_dispatch/routing/route_set.rb:74:in `call' actionpack (4.2.1) lib/action_dispatch/routing/route_set.rb:74:in `dispatch' actionpack (4.2.1) lib/action_dispatch/routing/route_set.rb:43:in `serve' actionpack (4.2.1) lib/action_dispatch/journey/router.rb:43:in `block in serve' actionpack (4.2.1) lib/action_dispatch/journey/router.rb:30:in `each' actionpack (4.2.1) lib/action_dispatch/journey/router.rb:30:in `serve' actionpack (4.2.1) lib/action_dispatch/routing/route_set.rb:819:in `call' rack (1.6.4) lib/rack/etag.rb:24:in `call' rack (1.6.4) lib/rack/conditionalget.rb:25:in `call' rack (1.6.4) lib/rack/head.rb:13:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/params_parser.rb:27:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/flash.rb:260:in `call' rack (1.6.4) lib/rack/session/abstract/id.rb:225:in `context' rack (1.6.4) lib/rack/session/abstract/id.rb:220:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/cookies.rb:560:in `call' activerecord (4.2.1) lib/active_record/query_cache.rb:36:in `call' activerecord (4.2.1) lib/active_record/connection_adapters/abstract/connection_pool.rb:649:in `call' activerecord (4.2.1) lib/active_record/migration.rb:378:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/callbacks.rb:29:in `block in call' activesupport (4.2.1) lib/active_support/callbacks.rb:88:in `call' activesupport (4.2.1) lib/active_support/callbacks.rb:88:in `_run_callbacks' activesupport (4.2.1) lib/active_support/callbacks.rb:776:in `_run_call_callbacks' activesupport (4.2.1) lib/active_support/callbacks.rb:81:in `run_callbacks' actionpack (4.2.1) lib/action_dispatch/middleware/callbacks.rb:27:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/reloader.rb:73:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/remote_ip.rb:78:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/debug_exceptions.rb:17:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/show_exceptions.rb:30:in `call' railties (4.2.1) lib/rails/rack/logger.rb:38:in `call_app' railties (4.2.1) lib/rails/rack/logger.rb:20:in `block in call' activesupport (4.2.1) lib/active_support/tagged_logging.rb:68:in `block in tagged' activesupport (4.2.1) lib/active_support/tagged_logging.rb:26:in `tagged' activesupport (4.2.1) lib/active_support/tagged_logging.rb:68:in `tagged' railties (4.2.1) lib/rails/rack/logger.rb:20:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/request_id.rb:21:in `call' rack (1.6.4) lib/rack/methodoverride.rb:22:in `call' rack (1.6.4) lib/rack/runtime.rb:18:in `call' activesupport (4.2.1) lib/active_support/cache/strategy/local_cache_middleware.rb:28:in `call' rack (1.6.4) lib/rack/lock.rb:17:in `call' actionpack (4.2.1) lib/action_dispatch/middleware/static.rb:113:in `call' rack (1.6.4) lib/rack/sendfile.rb:113:in `call' railties (4.2.1) lib/rails/engine.rb:518:in `call' railties (4.2.1) lib/rails/application.rb:164:in `call' rack (1.6.4) lib/rack/lock.rb:17:in `call' rack (1.6.4) lib/rack/content_length.rb:15:in `call' rack (1.6.4) lib/rack/handler/webrick.rb:88:in `service' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/webrick/httpserver.rb:138:in `service' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/webrick/httpserver.rb:94:in `run' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/webrick/server.rb:294:in `block in start_thread' ``` 3. fulltrace 同上, 只不过增加了application trace 的内容: ``` /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `initialize' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `open' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:879:in `block in connect' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/timeout.rb:74:in `timeout' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:878:in `connect' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:863:in `do_start' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:852:in `start' /home/liyun/.rbenv/versions/2.2.1/lib/ruby/2.2.0/net/http.rb:1375:in `request' httparty (0.14.0) lib/httparty/request.rb:118:in `perform' httparty (0.14.0) lib/httparty.rb:560:in `perform_request' httparty (0.14.0) lib/httparty.rb:486:in `get' httparty (0.14.0) lib/httparty.rb:598:in `get' app/controllers/books_controller.rb:8:in `index' .... (以下同 framework trace ) ``` # 如何使用? 我个人: 1. 直接看rails 给出的提示。 (包括HTML页面的提示,和 rails server 的提示) ``` Completed 500 Internal Server Error in 3ms (ActiveRecord: 0.0ms) Errno::ECONNREFUSED (Connection refused - connect(2) for nil port 80): app/controllers/books_controller.rb:8:in `index' Rendered /home/liyun/.rbenv/versions/2.2.1/lib/ruby/gems/2.2.0/gems/actionpack-4.2.1/lib/action_dispatch/middleware/templates/rescues/_source.erb (4.9ms) Rendered /home/liyun/.rbenv/versions/2.2.1/lib/ruby/gems/2.2.0/gems/actionpack-4.2.1/lib/action_dispatch/middleware/templates/rescues/_trace.html.erb (2.0ms) Rendered /home/liyun/.rbenv/versions/2.2.1/lib/ruby/gems/2.2.0/gems/actionpack-4.2.1/lib/action_dispatch/middleware/templates/rescues/_request_and_response.html.erb (0.8ms) Rendered /home/liyun/.rbenv/versions/2.2.1/lib/ruby/gems/2.2.0/gems/actionpack-4.2.1/lib/action_dispatch/middleware/templates/rescues/diagnostics.html.erb within rescues/layout (17.4ms) ``` 如果还没有思路, 那么直接看: full trace # 对于一个新项目,如何着手做? 必须做到3点: 1. 要了解需求。 2. 要知道不同页面之间的跳转。 3. 要知道后台数据库的各个表之间的关系。 ## 不了解需求怎么办? 多问。 不要憋着。 不要自己猜,不要自己发挥,要让最直接的人来回答问题。 不耻下问。忘掉玻璃心。(很多人,你问对方的时候,对方会不耐烦。为啥不耐烦?以为他已经给别人讲过N遍了。 我们要发扬 滚刀肉的精神, 必须问清楚。 带着很专业的态度。让它和自己心里明白,如果我不懂,项目没法作。 了解需求的时候, 必须有个可以留存的东西(文字,图片,语音) 做到一次弄明白。如果不明白的话,一定是对方的逻辑错了,或者没说明白,而不是我们忘了。 ## 如果不熟悉页面之间的跳转,怎么办? 1. 自己亲手来画。页面的跳转关系。(加深印象) 2. 继续问。 ## 如何理清后台数据库的表之间的关系? 画图。 1. 画出所有的表。 (标出表的名字和主要的列即可) 2. 不要画的漂亮。不要用尺子去比着画,而是 手绘,歪歪扭扭的,但是: 快,可以任意修改而不心疼。 3. 所有的表都画出来之后, 连接出各个表之间的关系。 标注出 那边是 1 , 那边是多( *也行, N 也行) 以上几点都做完之后, 那么,就容易了,直接把主要的表的CRUD做出来。 ## 如何梳理需求? 1. 要了解 用例图。 把每个角色, 要干什么事儿,写出来。 ``` 学员 O ----> 可以报名 / \ ----> 可以查看课程分类 ----> 可以查看课程详情 ----> 可以注册 ``` 2. 要了解类图(class diagram). 画出class 之间的对应关系(不需要把它的所有属性都列出来) 3. 要熟练掌握:时序图(sequence diagram) 3.1 列出所有的角色 3.2 按照时间点,严格的一条一条的写,从上到下 3.3 在 3.2的基础上,每个角色, 找到谁,干什么事儿,都写出来。 掌握上面三种UML图就可以了。特别是第三种,是最强大的分析问题,梳理流程的方法。 忘掉:山寨图。 国内的人, 特别是半吊子的人,最喜欢画, http://img5.imgtn.bdimg.com/it/u=3293013674,2839859845&fm=21&gp=0.jpg 1. 没有起点, 2. 没有终点。 3. 三角干吗的,正方形干吗的,没有规范。 一定要流程图的话, 也使用UML的活动图。 http://www.ibm.com/developerworks/cn/rational/tip-drawuml/figure1.gif # 如何自学 ## 1. 英语不能差。 英语对于程序员,就好比鼻子对于大厨。 与国外大牛交流, 要用英文。 看国外官方文档, 都是英文(就连vuejs,作者是中国人, 官方文档都是英文. ruby 日本人写的,官方文档还是英文) 看stackoverflow, 全都是英文。 (stackoverflow 如果是 95分, 国内iteye, infoq 70分, csdn 30 分,给高了。) ## 2. 提高搜索,解决问题的能力。 遇到一个新技术,要有敏锐的嗅觉,知道:这个新技术的 1. 官方网站在哪里。 2. 源代码地址在哪里。 3. 再看这个新技术是否有前景。(一般搜索 “技术A怎么样?", 用英文,在google上搜,就会出来特别有价值的内容) 4. 如果有价值学习,那么就来到官网,看tutorial。guide. 5. 随着学习的深入,不断的问其他人,不断的参与新项目,要与人交流,所以ruby论坛,线上的要参加,线下的也要参加。 6. 多关注一些github。
{ "pile_set_name": "Github" }
From c4158ecd28dcfb03ce564ba5236a2c4780314806 Mon Sep 17 00:00:00 2001 From: Mike Frysinger Date: Sat, 05 Jan 2008 17:39:56 +0000 Subject: Merge r20095 by vapier from trunk: Make sure that the DSO has an hash table into its elf, otherwise skip the lookup over next DSO. Signed-off-by: Carmelo Amoroso <carmelo.amoroso@st.com> --- From 62181e83b61fa2a528fb905fef98aebfc9957249 Mon Sep 17 00:00:00 2001 From: Mike Frysinger Date: Sat, 05 Jan 2008 17:44:59 +0000 Subject: Merge r20204 by vapier from trunk: Do string comparisos as late as possible during symbol lookup. Signed-off-by: Carmelo Amoroso <carmelo.amoroso@st.com> --- diff --git a/ldso/ldso/dl-hash.c b/ldso/ldso/dl-hash.c index f44d0ec..2043c25 100644 --- a/ldso/ldso/dl-hash.c +++ b/ldso/ldso/dl-hash.c @@ -161,6 +161,10 @@ char *_dl_find_hash(const char *name, struct dyn_elf *rpnt, struct elf_resolve * if ((type_class & ELF_RTYPE_CLASS_COPY) && tpnt->libtype == elf_executable) continue; + /* If the hash table is empty there is nothing to do here. */ + if (tpnt->nbucket == 0) + continue; + /* Avoid calling .urem here. */ do_rem(hn, elf_hash_number, tpnt->nbucket); symtab = (ElfW(Sym) *) tpnt->dynamic_info[DT_SYMTAB]; @@ -199,12 +199,12 @@ char *_dl_find_hash(const char *name, st if (type_class & (sym->st_shndx == SHN_UNDEF)) continue; - if (_dl_strcmp(strtab + sym->st_name, name) != 0) - continue; if (sym->st_value == 0) continue; if (ELF_ST_TYPE(sym->st_info) > STT_FUNC) continue; + if (_dl_strcmp(strtab + sym->st_name, name) != 0) + continue; switch (ELF_ST_BIND(sym->st_info)) { case STB_WEAK: -- cgit v0.8.2.1
{ "pile_set_name": "Github" }
Brent Boggs Lawrence Brent Boggs (born December 18, 1955 in Fairmont, West Virginia) is an American politician and a Democratic member of the West Virginia House of Delegates representing District 34 since January 1997. Education Boggs earned his AS from Glenville State College. Elections 2012 Boggs was unopposed for both the May 8, 2012 Democratic Primary, winning with 3,110 votes, and the November 6, 2012 General election, winning with 4,741 votes. 1996 Boggs was initially elected to the District 34 seat in the 1996 Democratic Primary and the November 5, 1996 General election. 1998 Boggs was challenged in the 1998 Democratic Primary and won the November 3, 1998 General election against Republican nominee Alfred Lipps. 2000 Boggs was unopposed for the 2000 Democratic Primary and won the November 7, 2000 General election against Republican nominee Joseph Brannon. 2002 Boggs was unopposed for both the 2002 Democratic Primary and the November 5, 2002 General election. 2004 Boggs was unopposed for the 2004 Democratic Primary and won the November 2, 2004 General election against Republican nominee Bradley Shingler. 2006 Boggs was unopposed for both the 2006 Democratic Primary and the November 7, 2006 General election. 2008 Boggs was unopposed for the May 13, 2008 Democratic Primary, winning with 4,504 votes, and won the November 4, 2008 General election with 5,206 votes (83.4%) against Republican nominee Larry Bright. 2010 Boggs was unopposed for both the May 11, 2010 Democratic Primary, winning with 2,773 votes, and the November 2, 2010 General election, winning with 4,131 votes. References External links Official page at the West Virginia Legislature Brent Boggs at Ballotpedia Brent Boggs at the National Institute on Money in State Politics Category:1955 births Category:Living people Category:Glenville State College alumni Category:Members of the West Virginia House of Delegates Category:People from Gassaway, West Virginia Category:People from Fairmont, West Virginia Category:West Virginia Democrats Category:21st-century American politicians
{ "pile_set_name": "Wikipedia (en)" }
Champion Our Cause RISE TO THE CHALLENGE AND HELP US BRING CHANGE Bridging the health care divide in Pakistan. The Friends of Indus Hospital community is an expanding group of trustees and volunteers working round-the-clock to give back to their country by donating funds, organizing fund-raisers and improving awareness about the inspiring success of The Indus Hospital. So if you are a Pakistani expat living in the United States and you think you can rise to the challenge of working for a long-term change in Pakistan’s health care system, NOW is the time for you to take action. Whether you are a medical practitioner, a college student or a fund-raising enthusiast, you can be part of our cause in multiple ways. Call us on 201-836-4248 or email us with a brief background on friend@friendsofindushospital.com to be part of our thriving community.
{ "pile_set_name": "Pile-CC" }
/* header created automatically with -DGEN_TREES_H */ local const ct_data static_ltree[L_CODES+2] = { {{ 12},{ 8}}, {{140},{ 8}}, {{ 76},{ 8}}, {{204},{ 8}}, {{ 44},{ 8}}, {{172},{ 8}}, {{108},{ 8}}, {{236},{ 8}}, {{ 28},{ 8}}, {{156},{ 8}}, {{ 92},{ 8}}, {{220},{ 8}}, {{ 60},{ 8}}, {{188},{ 8}}, {{124},{ 8}}, {{252},{ 8}}, {{ 2},{ 8}}, {{130},{ 8}}, {{ 66},{ 8}}, {{194},{ 8}}, {{ 34},{ 8}}, {{162},{ 8}}, {{ 98},{ 8}}, {{226},{ 8}}, {{ 18},{ 8}}, {{146},{ 8}}, {{ 82},{ 8}}, {{210},{ 8}}, {{ 50},{ 8}}, {{178},{ 8}}, {{114},{ 8}}, {{242},{ 8}}, {{ 10},{ 8}}, {{138},{ 8}}, {{ 74},{ 8}}, {{202},{ 8}}, {{ 42},{ 8}}, {{170},{ 8}}, {{106},{ 8}}, {{234},{ 8}}, {{ 26},{ 8}}, {{154},{ 8}}, {{ 90},{ 8}}, {{218},{ 8}}, {{ 58},{ 8}}, {{186},{ 8}}, {{122},{ 8}}, {{250},{ 8}}, {{ 6},{ 8}}, {{134},{ 8}}, {{ 70},{ 8}}, {{198},{ 8}}, {{ 38},{ 8}}, {{166},{ 8}}, {{102},{ 8}}, {{230},{ 8}}, {{ 22},{ 8}}, {{150},{ 8}}, {{ 86},{ 8}}, {{214},{ 8}}, {{ 54},{ 8}}, {{182},{ 8}}, {{118},{ 8}}, {{246},{ 8}}, {{ 14},{ 8}}, {{142},{ 8}}, {{ 78},{ 8}}, {{206},{ 8}}, {{ 46},{ 8}}, {{174},{ 8}}, {{110},{ 8}}, {{238},{ 8}}, {{ 30},{ 8}}, {{158},{ 8}}, {{ 94},{ 8}}, {{222},{ 8}}, {{ 62},{ 8}}, {{190},{ 8}}, {{126},{ 8}}, {{254},{ 8}}, {{ 1},{ 8}}, {{129},{ 8}}, {{ 65},{ 8}}, {{193},{ 8}}, {{ 33},{ 8}}, {{161},{ 8}}, {{ 97},{ 8}}, {{225},{ 8}}, {{ 17},{ 8}}, {{145},{ 8}}, {{ 81},{ 8}}, {{209},{ 8}}, {{ 49},{ 8}}, {{177},{ 8}}, {{113},{ 8}}, {{241},{ 8}}, {{ 9},{ 8}}, {{137},{ 8}}, {{ 73},{ 8}}, {{201},{ 8}}, {{ 41},{ 8}}, {{169},{ 8}}, {{105},{ 8}}, {{233},{ 8}}, {{ 25},{ 8}}, {{153},{ 8}}, {{ 89},{ 8}}, {{217},{ 8}}, {{ 57},{ 8}}, {{185},{ 8}}, {{121},{ 8}}, {{249},{ 8}}, {{ 5},{ 8}}, {{133},{ 8}}, {{ 69},{ 8}}, {{197},{ 8}}, {{ 37},{ 8}}, {{165},{ 8}}, {{101},{ 8}}, {{229},{ 8}}, {{ 21},{ 8}}, {{149},{ 8}}, {{ 85},{ 8}}, {{213},{ 8}}, {{ 53},{ 8}}, {{181},{ 8}}, {{117},{ 8}}, {{245},{ 8}}, {{ 13},{ 8}}, {{141},{ 8}}, {{ 77},{ 8}}, {{205},{ 8}}, {{ 45},{ 8}}, {{173},{ 8}}, {{109},{ 8}}, {{237},{ 8}}, {{ 29},{ 8}}, {{157},{ 8}}, {{ 93},{ 8}}, {{221},{ 8}}, {{ 61},{ 8}}, {{189},{ 8}}, {{125},{ 8}}, {{253},{ 8}}, {{ 19},{ 9}}, {{275},{ 9}}, {{147},{ 9}}, {{403},{ 9}}, {{ 83},{ 9}}, {{339},{ 9}}, {{211},{ 9}}, {{467},{ 9}}, {{ 51},{ 9}}, {{307},{ 9}}, {{179},{ 9}}, {{435},{ 9}}, {{115},{ 9}}, {{371},{ 9}}, {{243},{ 9}}, {{499},{ 9}}, {{ 11},{ 9}}, {{267},{ 9}}, {{139},{ 9}}, {{395},{ 9}}, {{ 75},{ 9}}, {{331},{ 9}}, {{203},{ 9}}, {{459},{ 9}}, {{ 43},{ 9}}, {{299},{ 9}}, {{171},{ 9}}, {{427},{ 9}}, {{107},{ 9}}, {{363},{ 9}}, {{235},{ 9}}, {{491},{ 9}}, {{ 27},{ 9}}, {{283},{ 9}}, {{155},{ 9}}, {{411},{ 9}}, {{ 91},{ 9}}, {{347},{ 9}}, {{219},{ 9}}, {{475},{ 9}}, {{ 59},{ 9}}, {{315},{ 9}}, {{187},{ 9}}, {{443},{ 9}}, {{123},{ 9}}, {{379},{ 9}}, {{251},{ 9}}, {{507},{ 9}}, {{ 7},{ 9}}, {{263},{ 9}}, {{135},{ 9}}, {{391},{ 9}}, {{ 71},{ 9}}, {{327},{ 9}}, {{199},{ 9}}, {{455},{ 9}}, {{ 39},{ 9}}, {{295},{ 9}}, {{167},{ 9}}, {{423},{ 9}}, {{103},{ 9}}, {{359},{ 9}}, {{231},{ 9}}, {{487},{ 9}}, {{ 23},{ 9}}, {{279},{ 9}}, {{151},{ 9}}, {{407},{ 9}}, {{ 87},{ 9}}, {{343},{ 9}}, {{215},{ 9}}, {{471},{ 9}}, {{ 55},{ 9}}, {{311},{ 9}}, {{183},{ 9}}, {{439},{ 9}}, {{119},{ 9}}, {{375},{ 9}}, {{247},{ 9}}, {{503},{ 9}}, {{ 15},{ 9}}, {{271},{ 9}}, {{143},{ 9}}, {{399},{ 9}}, {{ 79},{ 9}}, {{335},{ 9}}, {{207},{ 9}}, {{463},{ 9}}, {{ 47},{ 9}}, {{303},{ 9}}, {{175},{ 9}}, {{431},{ 9}}, {{111},{ 9}}, {{367},{ 9}}, {{239},{ 9}}, {{495},{ 9}}, {{ 31},{ 9}}, {{287},{ 9}}, {{159},{ 9}}, {{415},{ 9}}, {{ 95},{ 9}}, {{351},{ 9}}, {{223},{ 9}}, {{479},{ 9}}, {{ 63},{ 9}}, {{319},{ 9}}, {{191},{ 9}}, {{447},{ 9}}, {{127},{ 9}}, {{383},{ 9}}, {{255},{ 9}}, {{511},{ 9}}, {{ 0},{ 7}}, {{ 64},{ 7}}, {{ 32},{ 7}}, {{ 96},{ 7}}, {{ 16},{ 7}}, {{ 80},{ 7}}, {{ 48},{ 7}}, {{112},{ 7}}, {{ 8},{ 7}}, {{ 72},{ 7}}, {{ 40},{ 7}}, {{104},{ 7}}, {{ 24},{ 7}}, {{ 88},{ 7}}, {{ 56},{ 7}}, {{120},{ 7}}, {{ 4},{ 7}}, {{ 68},{ 7}}, {{ 36},{ 7}}, {{100},{ 7}}, {{ 20},{ 7}}, {{ 84},{ 7}}, {{ 52},{ 7}}, {{116},{ 7}}, {{ 3},{ 8}}, {{131},{ 8}}, {{ 67},{ 8}}, {{195},{ 8}}, {{ 35},{ 8}}, {{163},{ 8}}, {{ 99},{ 8}}, {{227},{ 8}} }; local const ct_data static_dtree[D_CODES] = { {{ 0},{ 5}}, {{16},{ 5}}, {{ 8},{ 5}}, {{24},{ 5}}, {{ 4},{ 5}}, {{20},{ 5}}, {{12},{ 5}}, {{28},{ 5}}, {{ 2},{ 5}}, {{18},{ 5}}, {{10},{ 5}}, {{26},{ 5}}, {{ 6},{ 5}}, {{22},{ 5}}, {{14},{ 5}}, {{30},{ 5}}, {{ 1},{ 5}}, {{17},{ 5}}, {{ 9},{ 5}}, {{25},{ 5}}, {{ 5},{ 5}}, {{21},{ 5}}, {{13},{ 5}}, {{29},{ 5}}, {{ 3},{ 5}}, {{19},{ 5}}, {{11},{ 5}}, {{27},{ 5}}, {{ 7},{ 5}}, {{23},{ 5}} }; const uch _dist_code[DIST_CODE_LEN] = { 0, 1, 2, 3, 4, 4, 5, 5, 6, 6, 6, 6, 7, 7, 7, 7, 8, 8, 8, 8, 8, 8, 8, 8, 9, 9, 9, 9, 9, 9, 9, 9, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 0, 0, 16, 17, 18, 18, 19, 19, 20, 20, 20, 20, 21, 21, 21, 21, 22, 22, 22, 22, 22, 22, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29 }; const uch _length_code[MAX_MATCH-MIN_MATCH+1]= { 0, 1, 2, 3, 4, 5, 6, 7, 8, 8, 9, 9, 10, 10, 11, 11, 12, 12, 12, 12, 13, 13, 13, 13, 14, 14, 14, 14, 15, 15, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16, 17, 17, 17, 17, 17, 17, 17, 17, 18, 18, 18, 18, 18, 18, 18, 18, 19, 19, 19, 19, 19, 19, 19, 19, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 28 }; local const int base_length[LENGTH_CODES] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 10, 12, 14, 16, 20, 24, 28, 32, 40, 48, 56, 64, 80, 96, 112, 128, 160, 192, 224, 0 }; local const int base_dist[D_CODES] = { 0, 1, 2, 3, 4, 6, 8, 12, 16, 24, 32, 48, 64, 96, 128, 192, 256, 384, 512, 768, 1024, 1536, 2048, 3072, 4096, 6144, 8192, 12288, 16384, 24576 };
{ "pile_set_name": "Github" }
Q: Single SQL SELECT Returning multiple rows from one table row We have a table which is of the form: ID,Value1,Value2,Value3 1,2,3,4 We need to transform this into. ID,Name,Value 1,'Value1',2 1,'Value2',3 1,'Value3',4 Is there a clever way of doing this in one SELECT statement (i.e without UNIONs)? The column names Value1,Value2 and Value3 are fixed and constant. The database is oracle 9i. A: Give a union a shot. select ID, 'Value1' as Name, Value1 as Value from table_name union all select ID, 'Value2', Value2 as Value from table_name union all select ID, 'Value3', Value3 as Value from table_name order by ID, Name using union all means that the server won't perform a distinct (which is implicit in union operations). It shouldn't make any difference with the data (since your ID's should HOPEFULLY be different), but it might speed it up a bit. A: This works on Oracle 10g: select id, 'Value' || n as name, case n when 1 then value1 when 2 then value2 when 3 then value3 end as value from (select rownum n from (select 1 from dual connect by level <= 3)) ofs, t I think Oracle 9i had recursive queries? Anyway, I'm pretty sure it has CASE support, so even if it doesn't have recursive queries, you can just do "(select 1 from dual union all select 2 from dual union all select 3 from dual) ofs" instead. Abusing recursive queries is a bit more general- for Oracle. (Using unions to generate rows is portable to other DBs, though)
{ "pile_set_name": "StackExchange" }
Desert Land Act The Desert Land Act was passed by the United States Congress on March 3, 1877, to encourage and promote the economic development of the arid and semiarid public lands of the Western states. Through the Act, individuals may apply for a desert-land entry to irrigate and reclaim the land. This act amended the Homestead Act of 1862. Originally the act offered , although currently only 320 acres may be claimed. A precursor act in 1875, called the Lassen County Act, was pushed by Representative John K. Luttrell of the northeastern district of California, who wanted to speed up privatization of land east of the Sierra. This act enlarged the maximum allowable purchase for settlers from 160 acres to 640 acres. With the backing of Land Commissioner J. A. Williamson, Luttrell and Senator Aaron A. Sargent co-sponsored the Desert act which extended the Lassen County Act to cover several arid states and other regions of California. Intentions The original intent of the Desert Land Act was to instigate growth in the West by incentivizing people to move out West in the late 19th century and develop irrigation systems that would transform the land into usable space. While it encouraged growth, it also played a large role in water rights of the era. While settlers decided to move West to spread irrigation, rather than use the land solely for farming or cattle, it created a new dilemma for settlers as to how to use and share the water, be it on a communal or an individual basis. While many irrigation systems were set up communally, that eventually led to private water companies that owned large irrigation systems, which were built independently without consulting proper engineers. Outcomes Although the Desert Land Act was partly based on the Homestead Act and the Preemption Act (1841), it did not contain a key provision of those acts, the residence requirement. While the claimant had to improve the land, the claimant did not need to live on the land while the improvements were made. In the end, that led to a significant amount of fraud, and land speculation companies acquired tens of thousands of acres of California land by hiring "dummy entrymen" to make false claims of settlement. Well known areas that began as land patented under the Desert Land Act include the Salt River in Arizona, the Imperial Valley in California, the Snake River in Idaho, Gallatin, Montana, and Yakima, Washington. Many of these communities facilitated further growth through the help of the Reclamation Act of 1902. The peak of growth of these areas can be tracked by three separate eras prior to the current era: 1877-1887, 1888-1893, and 1893-1910. 1877 - 1887 The first decade after the Desert Land Act was passed was well known for fraudulent activity, especially by cattle producers. The era saw its end after a decline in the cattle industry. 1888 - 1893 The second era of the Desert Land Act saw a significant drop in fraudulent activity after an amendment to the Act that included stricter regulations and checks for irrigation systems, however was not entirely absent of fraudulent land ownership. The settlers were then required to submit maps and plans of irrigation to prevent violation of the act. Other amendatory acts to the law included encouraging communal placement of irrigation systems, and defined the progress of reclamation in the amount spent on the systems. The time period ended with the Panic of 1893. 1893 - 1910 The last era of the Desert Land Act began as the interest in irrigation and migration increased following the prosperity after the Depression of 1893. The last year of the era marks the peak of Desert Land Act original entries, over 15,000 in one year. 1910 - Present By 1920, nearly all present irrigation systems had been in place in all lands grown in the West from the act. References Category:1877 in American law Category:44th United States Congress Category:United States federal public land legislation Category:Settlement schemes
{ "pile_set_name": "Wikipedia (en)" }
There are literally hundreds of thousands of office buildings and other commercial property located in the United States and throughout the world (hereinafter “commercial properties”). And, because most businesses and commercial properties are required to operate during the day, they typically need substantial electrical energy during the daytime hours to provide power for utilities, including lighting, heating, cooling, etc. This is particularly true with heating and cooling requirements, such as during the extreme winter and extreme summer months, wherein the energy needed to maintain a comfortable work environment can be relatively high. These peak demands can place a; heavy burden on utility plants and grids that supply electrical power to commercial properties. Utility plants and grids often have to be constructed to meet the highest demand periods, which means that during the low demand periods, they will inevitably operate inefficiently, i.e., at less than peak efficiency and performance. This may be true even if the peak demand periods occur during only a small fraction of the time each day. Failure to properly account for such high demand periods, such as by over-designing the facilities to meet the peak demands, can result in the occurrence of frequent power outages and failures. Also, a failure in one area of the grid can cause tremendous stress and strain in other areas, wherein the entire system can fail, i.e., an entire regional blackout can occur. These demands can also place expensive burdens on commercial property owners and operators. Utility companies often charge a significant premium on energy consumed by commercial properties during peak demand hours. This practice is generally based on the well known principles of supply and demand, e.g., energy costs are higher when demand is high, and less when demand is low. And because most commercial property owners are forced to operate during the day, they are most often forced to pay the highest energy costs during the highest demand periods. Utility companies also charge for energy during peak demand periods by assessing a penalty or surcharge (hereinafter “demand charge”) on the maximum rate of consumption that occurs during a predetermined period, such as a one month period. A demand charge may be assessed, for example, based on the maximum “peak” rate of consumption that occurs during the period, wherein the demand charge can be assessed regardless of how short the peak “spike” or “surge” during that period is, and regardless of what rate may have applied immediately before and after the spike or surge. This demand charge can also be assessed regardless of the average consumption rate that may have otherwise been in effect during the period, which could be considerably lower than the peak. Even if the overall average rate of use is substantially lower, the demand charge can be based on a much higher peak spike or surge experienced during that period. These pricing practices are designed to help utility companies offset and/or recover the high cost of constructing utility power plants and grids that are, as discussed above, designed to meet the peak demand periods. They also encourage commercial property owners and operators to reduce energy consumption during peak periods, as well as to try to find alternative sources of energy, if possible. Nevertheless, since most commercial property owners and operators must operate their businesses during the day, and alternative sources of energy are not always readily available, they often find themselves having to use energy during the highest rate periods. Moreover, because energy consumption rates can fluctuate, and surges and spikes can occur at various times, potentially huge demand charges may be applied. Utility companies and other providers of energy have, in the past, implemented certain time-shifting methods, wherein energy supplied during low demand periods are stored, and then used later during peak demand periods. These methods typically involve storing energy, and then using that energy later, to supplement the energy provided by the grid. This theoretically enables more energy to be consumed when energy costs are low, and less energy to be consumed when energy costs are relatively high, thereby potentially reducing the higher rate costs. Several such energy storage methods have been used in the past, including compressed air energy storage systems, such as underground caverns. Thus far, however, one of the main disadvantages of such systems is that they are relatively energy inefficient. For example, compressed air energy systems have a tendency to lose a significant portion of the energy that is stored, so that the energy used from storage ends up actually costing more than the energy that was stored. These inefficiencies can make it so that the economic incentives to install energy storage systems of this kind are significantly reduced. Even though there are some advantages to such energy storage systems, the added costs associated with installing and operating such systems can become a financial burden, especially at the end-user level. Accordingly, commercial property owners and operators that use energy often have difficulty justifying the cost of installing and using such systems. Moreover, because of the expense of installation, they may have difficulties obtaining financing and approval, e.g., to attract investors and/or lenders to spend the money needed to develop and install such a system, because they often doubt whether they will be able to recoup the costs. A method and system is needed, therefore, that can be used by individual end-users of energy or commercial property owners and operators to control and regulate the end-user consumption of energy from the power grid, so that more energy can be consumed during low-cost, low-demand periods, and less energy can be consumed during high-cost, high-demand periods, to achieve not only a reduction in overall demand and reducing the spikes and surges that can occur during peak demand periods, but to reduce the overall stress and strain on the power grid, and provide a means of forecasting the cost savings that can be achieved over an extended period of time, which can justify the cost and expense of installing and operating the system, thereby making the system more widely used.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Bootstrap & Angular - Accordion toggle not on heading I have a basic Bootstrap accordion in my Angular App. By default, the accordion gets triggered by the 'heading'. I want to be able to trigger the accordion for an icon: <h4 class="panel-title"> <a data-ng-click="selectItem()"> <span class="glyphicon glyphicon-chevron-down" data-toggle="collapse" data-parent="#accordion" href="#collapseOne"></span> Collapsible Group Item #1 </a> </h4> This works fine (in a way), but it doesn't give me the result I'm looking for. In my application, people will be able to select the item by clicking on the heading, while clicking on the 'trigger' will display the children of that specific item (and not select it). If I leave the code like it is, the item is selected once I click the accordion trigger (which is an expected result I guess). I'm looking for a solution to make the item selectable while keeping the accordion (which won't select the item). I've tried using event.stopPropagation, but while it stops the item from being selectable using the trigger, the accordion doesn't work anymore. Plunkr: http://plnkr.co/edit/GyuYP1sT6JWaZdLcTCS4?p=preview Any ideas? A: Plunker Moved the chevron out of the "selecting area", and created a "title-bar" span that highlights pink on hover and blue on click without changing color of chevron arrow. The chevron arrow only affects the accordian, while the title-bar only affects highlight and selection. That is my interpretation of what you want. LMK if I am off. <div sclass="" ng-class=" itemSelected ? 'item active' : 'item inactive'"> <div class="acc-toggle"> <a class="glyphicon glyphicon-chevron-down" style="display: inline-block" data-toggle="collapse" data-parent="#accordion" href="#collapseOne" aria-expanded="true" aria-controls="collapseOne"> </a> </div> <span class="title-bar" data-ng-click="selectItem()" sng-class="{ 'active': itemSelected, 'inactive': itemSelected==false }" > Collapsible Group Item #1 </span> </div> And made the span child turn pink on hover and blue on click .acc-toggle { background-color: white; display: inline-block ; padding: 5px; } .title-bar { display: inline-block; padding: 5px; width: 90%; } .item { white-space: nowrap; border: 1px solid gray; width: 100%; } .item span { display: inline-block; } .item.active { background: blue; } .item.active:hover { background: blue; } .item.inactive:hover { background: pink; }
{ "pile_set_name": "StackExchange" }