text
stringlengths 0
3.53M
| meta
dict |
---|---|
C'est un sondage commandé par la mairie de Paris. Un sondage majoritairement favorable au maintien de la piétonisation des voies sur berges mais qui montre une fracture entre les générations. 62 % des moins de 35 ans y sont favorables . En revanche 60 % des plus de 60 ans sont contre.
EXCLUSIF - France Bleu Paris : 55 % des Parisiens pour le maintien de la piétonisation des voies sur berges
Un sondage qui doit donner du baume au coeur à Anne Hidalgo entre le fiasco Vélib' ou ce mercredi l'affaire streeteo. Un sondage commandé par la mairie de Paris que vous dévoile France Bleu Paris alors que vendredi doit paraître au bulletin municipal le nouvel arrêté pour "maintenir la piétonnisation" des voies sur berges qui doit prendre en compte les recommandations émises par le tribunal administratif, qui avait annulé le 21 février cette décision phare de la maire de Paris.
55 % pour, 45% contre
Pour 55 % des personnes interrogées, il faut maintenir la piétonisation et la fermeture des voies sur berges à la circulation automobile. Logiquement, 45% sont eux favorables à la réouverture de cet axe aux voitures.
Un écart d'opinions entre les générations
Toujours selon ce sondage 62 % des moins de 35 ans y sont favorables . En revanche 60 % des plus de 60 ans sont contre. Ecart également géographique entre les habitants du Nord-Est de Paris , favorables à 58% et ceux de l'ouest de la capitale opposés à 52 %.
Autre enseignement, il y a également une fracture entre les nouveaux arrivants (ancienneté de moins de 5 ans) qui sont à 83 % pour le maintien de la fermeture à la circulation automobile et les plus anciens habitants (plus de 15 ans dans la capitale) contre à 52%.
Sondage réalisé entre le 2 et 8 mars auprès de 1000 personnes constituant un échantillon représentatif de la population parisienne âgée de 18 ans et plus selon la méthode des quotas. | {
"perplexity_score": 1266.1,
"pile_set_name": "OpenWebText2"
} |
Hot Products
Clean water sistern pumps
Franklin Electric Co. Inc. has released its C1 Series stainless steel submersible cistern pumps designed for use in gray water/filtered effluent service applications, with the ability to pass solids up to 1/8-inch in diameter during normal operation without impacting the life of the pump. The C1 Series is constructed of a 304 stainless steel motor and outer shell with engineered polymer hydraulics providing superior corrosion resistance and abrasive handling. Additional pump features include robust thermoplastic discharge head to avoid breakage during installation and operation; removable, 5-inch-wide base for secure and reliable mounting; motor lead connection protected with a rubber boot and secured with a stainless steel strain relief; and unique bottom suction design that allows for maximum fluid drawdown without compromising durability or overall pump life. The C1 Series is available in flow ratings of 10, 20 and 30 gpm, with a maximum shut-off pressure of over 100 psi and is available with a high quality 115 V or 230 V, 1/2 hp motor.
‘Passion Frost’ pieris
The first variegated Pieris with red flowers, ‘Passion Frost’ is hardy to Zone 6a. Evergreen with a bushy habit, this plant is disease tolerant and suitable as a patio or garden plant, reaching 50 inches tall by 40 inches wide. Liners are available from Silver Falls Nursery; managed by Concept Plants.
Pre-emergent herbicide
New Gemini™ liquid pre-emergent herbicide from Everris is designed to be applied with a hand-held or tractor-mounted sprayer, and features a selective combination of two proven and commonly used active ingredients, prodiamine and isoxaben. This convenient premixed formulation provides greater broad-spectrum control to prevent over 125 species of broadleaf and annual grasses, including crabgrass, spurge and chickweed. Field- or container-grown crops, including woodies, tropical ornamentals and perennials, can be protected from broadleaf and grassy weeds. | {
"perplexity_score": 556.6,
"pile_set_name": "Pile-CC"
} |
Weblinks
“This course is meant especially for professional musicians, music teachers, students and all music-makers who wish to widen their experience. Chamber music, Orchestra, lectures and concerts in the wonderful hall of the baroque castle of Zell/Pram.“ Visit website for more information. (ed.) | {
"perplexity_score": 495.3,
"pile_set_name": "Pile-CC"
} |
/**
* This file has no copyright assigned and is placed in the Public Domain.
* This file is part of the mingw-w64 runtime package.
* No warranty is given; refer to the file DISCLAIMER.PD within this package.
*/
long double fabsl (long double x);
long double
fabsl (long double x)
{
#if defined(__x86_64__) || defined(_AMD64_) || defined(__i386__) || defined(_X86_)
long double res = 0.0L;
asm volatile ("fabs;" : "=t" (res) : "0" (x));
return res;
#elif defined(__arm__) || defined(_ARM_) || defined(__aarch64__) || defined(_ARM64_)
return __builtin_fabsl (x);
#endif /* defined(__x86_64__) || defined(_AMD64_) || defined(__i386__) || defined(_X86_) */
} | {
"perplexity_score": 1492.4,
"pile_set_name": "Github"
} |
[The collecting and processing system of the sound signal of larynx].
This paper presents a new kind of collecting and processing system of the sound signal of larynx where double sound cards and software filter are used. The installation of the double sound cards and processing proposal of software are mainly discussed and a new kind of ADC method of dual-channel sound signal is put forward in this paper. This system has the feature of reliable performance, simple installation and easy maintenance. | {
"perplexity_score": 440.4,
"pile_set_name": "PubMed Abstracts"
} |
HOLLYWOOD, Fla (Reuters) - Barrick Gold Corp’s $18 billion hostile bid for rival Newmont Mining Corp is a “logical” tie-up that would generate value for shareholders of both companies and create an unrivaled global producer of the yellow metal, Chief Executive Officer Mark Bristow said in an interview on Monday.
Mark Bristow, chief executive officer of Barrick Gold, speaks during an interview at the Investing in African Mining Indaba conference in Cape Town, South Africa February 5, 2019. REUTERS/Mike Hutchings
Barrick, already the world’s largest gold producer, on Monday launched a takeover bid for its U.S.-based rival, encouraging it to ditch a previously announced $10 billion takeover of Goldcorp Inc.
“This gold industry needs to become more relevant to investors,” Bristow said on the sidelines of the BMO Global Metals & Mining Conference in Florida. “This deal drives a further rationalization in our industry.”
The deal comes less than two months after Barrick closed on its buyout of rival Randgold Resources, and represents an aggressive move by Bristow, considered one of the shrewdest minds in the gold industry, to consolidate as quickly as possible.
While Bristow moved fast to reorganize Barrick since taking the helm last month, Newmont CEO Gary Goldberg has said he will retire at the end of 2019 after, he hopes, the Goldcorp deal closes.
Goldberg’s departure has not gone unnoticed by Bristow, who has fashioned it into his own pitch to shareholders.
“By the way: Newmont’s management’s leaving and we’re not,” Bristow said.
Investors across the industry are “definitely not pleased” with Newmont’s Goldcorp bid and view it as a kind of “value destruction,” Bristow said.
“We’re pointing out that this current (Newmont-Goldcorp) proposal takes away the opportunity for both sets of shareholders to participate in one of the few logical M&A transactions available to the industry,” said Bristow.
“The (Newmont) merger with Goldcorp adds no Tier One assets to their portfolio,” he said.
Bristow said he has talked to his shareholders and those at Newmont in “general” terms about his hostile bid, but not specifically. He said he has no concerns about ultimately receiving their approval.
Newmont has suggested that instead of an outright sale, the two companies could combine Nevada operations in a joint venture. Newmont has 19 mines in the state, adjacent to Barrick’s own operations.
Bristow rejected the idea, saying it would not bring the same cost savings as combining the two companies.
“You won’t unlock the full value in a JV,” he said. “We genuinely feel that we have the capacity to unlock this value once and for all.” | {
"perplexity_score": 341.3,
"pile_set_name": "OpenWebText2"
} |
Vehicle or automobile insurance exists to provide financial protection against physical damage and/or bodily injury resulting from traffic accidents and against liability that could arise therefrom. Typically, a customer purchases a vehicle insurance policy for a policy rate having a specified term. In exchange for payments from the insured customer, the insurer pays for damages to the insured which are caused by covered perils, acts, or events as specified by the language of the insurance policy. The payments from the insured are generally referred to as “premiums,” and typically are paid on behalf of the insured over time at periodic intervals. An insurance policy may remain “in-force” while premium payments are made during the term or length of coverage of the policy as indicated in the policy. An insurance policy may “lapse” (or have a status or state of “lapsed”), for example, when premium payments are not being paid or if the insured or the insurer cancels the policy.
Premiums may be typically determined based upon a selected level of insurance coverage, location of vehicle operation, vehicle model, and characteristics or demographics of the vehicle operator. The characteristics of a vehicle operator that affect premiums may include age, years operating vehicles of the same class, prior incidents involving vehicle operation, and losses reported by the vehicle operator to the insurer or a previous insurer. Past and current premium determination methods do not, however, account for use of autonomous vehicle operating features. The present embodiments may, inter alia, alleviate this and/or other drawbacks associated with conventional techniques. | {
"perplexity_score": 306.1,
"pile_set_name": "USPTO Backgrounds"
} |
Both Sputnik 1 and Vostok 1 were launched from Baikonur Cosmodrome, located in desert of Kazakhstan. It has since served as a launch pad for generations upon generations of spacecraft, including the International Space Station. Take a tour of Baikonour as it looks today.
The photo above was taken by Bill Ingalls/NASA.
The Cosmonaut Hotel, where some astronauts have been accommodated before and after their flights
(via Alexpgp)
Flight Engineer Karen Nyberg of NASA pauses for a photo while signing a hotel room door at the Cosmonaut Hotel, 2013
(Photo by NASA/Bill Ingalls)
The Soyuz TMA-05M spacecraft is rolled out by train on its way to the launch pad, 2012
(via NASA/Carla Cioffi)
Extreme Danger Zone
(via NASA/Bill Ingals)
An Orthodox Priest blesses members of the media, the crew and the Soyuz rocket, photos from 2012 and 2013
(Photo by NASA/Bill Ingalls 1 – 2 and Carla Cioffi)
The Soyuz TMA-05M launches in 2012
(Photo by NASA/Carla Cioffi)
The Energia Launch Site and its flame bucket
(via alexpgp 1 -2)
The crawlers for Energia and Buran
(via Baikonur and EnglishRussia)
Abandoned facilities, pipes, and launch pads
You can see more abandoned Soviet space facilities here, including a secret laboratory, a military town, and the first flight control center used during Gagarin's mission.
The Fading Grandeur of Abandoned Soviet Space Facilities The Soviet Union launched Sputnik and gave the United States a run for its money in the Space Race. Read more
(via Baikonur and drugoi)
The Buran test model OK-M, now restored to its original condition
(via drugoi)
Abandoned military buildings
(via EnglishRussia)
A big sign commemorating space exploration on the Main Street in the city
(via Ken & Nyetta)
The Proton Club at Area 95 at the Baikonur Space Port – it has an auditorium, a kitchen, a hall with pong-pong, and pool tables
(via Alexpgp)
A full-size Soyuz rocket is on display near the main post office
(via Alexpgp)
On the fields of Baikonur
(via Neil Berrett)
There are some interesting things near the street
(via Neil Berrett)
The SS-17 ballistic missile as a monument
(via Baikonur)
"Peace to the World!"
(via alexpgp)
A tower block with a cool space-themed artwork
(via Baikonur)
The former officer's club, now a disco on the main square
(via Baikonur)
The house of Yuri Gagarin
This is the bed where the famous cosmonaut spent his last night before flight.
(via Russia Blog/Photo by Anton Verstakov and Baikonur)
The statue of Gagarin
(via Baikonurfest)
A bronze bust of Felix Dzerzhinsky (known as Bloody Felix or Iron Felix), the founder and first leader of the Soviet Secret Police Cheka in 1917
(via Russia Blog/Photo by Anton Verstakov)
Skateboard park
(via Russia Blog/Photo by Anton Verstakov)
The many former names of Baikonur (Zarya village, Leninski village and Leninsk city – it was renamed to Baikonur only in 1995)
(via Esther Dyson)
Bonus: Parts of the Russian Moon Rocket N1 on a Baikonur playground in 1998
(via Leuband) | {
"perplexity_score": 711.2,
"pile_set_name": "OpenWebText2"
} |
IN THE COURT OF APPEALS OF TENNESSEE
AT NASHVILLE
ASSIGNED ON BRIEFS MAY 24, 2001
PAMELA JEAN ANNESS v. MICHAEL MARIO CHAPDELAINE, SR.
Direct Appeal from the Chancery Court for Williamson County
No. 20784; The Honorable Russ Heldman, Judge
No. M2000-01792-COA-R3-CV - Filed September 14, 2001
This appeal arises from the Appellee’s filing of a Petition to Change Custody in the Chancery Court
of Williamson County. Following a hearing, the trial court entered an Order granting custody of the
parties’ minor children to the Appellee. The trial court ordered the Appellant to pay child support
in the amount of $1,480.00 per month. The Appellant appeals the amount of child support set by
the trial court. For the reasons stated herein, we affirm in part, reverse in part, and remand the trial
court’s decision.
Tenn. R. App. P. 3; Appeal as of Right; Judgment of the Chancery Court Affirmed in Part,
Reversed in Part and Remanded
ALAN E. HIGHERS, J., delivered the opinion of the court, in which DAVID R. FARMER , J., and HOLLY
KIRBY LILLARD, J., joined.
P. Edward Schell, Franklin, TN, for Appellant
Julia E. Stovall, Franklin, TN, for Appellee
OPINION
I. Facts and Procedural History
The Appellant, Michael Mario Chapdelaine, Sr. (“Mr. Chapdelaine”), and the Appellee,
Pamela Jean Anness (“Ms. Anness”) were divorced in 1993. On October 3, 1996, Mr. Chapdelaine
was awarded custody of the parties’ children, and Ms. Anness was awarded visitation with the
children. On March 14, 2000, Ms. Anness filed a Petition to Modify Custody of the parties’ three
minor children in the Chancery Court of Williamson County.
The hearing on the Petition was held on April 26, 2000. Mr. Chapdelaine testified that he
was employed as a truck driver and was the owner and publisher of a local phone directory. Mr.
Chapdelaine testified that his 1999 federal income tax return reflected that his income from both jobs
was $25,385.00. On cross examination, Mr. Chapdelaine testified that he did not earn $900.00 per
week truck driving. Rather, Mr. Chapdelaine testified that his truck driving income varied by the
week. Mr. Chapdelaine testified that “one week I got around four hundred and something dollars,
and then the other one was around $510.00, another one is nine hundred and something dollars.”
Mr. Chapdelaine testified that, though he was employed as a truck driver, he was not working as a
truck driver because he was working on the phone directory. Mr. Chapdelaine testified that every
year he worked for three or four months on the phone directory and did not work as a truck driver.
Following the hearing, the trial court found that a substantial and material change of
circumstances had occurred but declined to conduct a comparative fitness analysis. The trial court
appointed a Guardian ad Litem to conduct an investigation and offer evidence to the trial court. The
hearing reconvened on May 22, 2000 at which time the Guardian ad Litem presented her findings
to the trial court. Following the hearing, the trial court ordered the parties to file written proposals
for child support of the three minor children.
Both Ms. Anness and Mr. Chapdelaine submitted proposals for child support in the event Ms.
Anness received custody of the children. Ms. Anness proposed that Mr. Chapdelaine pay $1,480.00
per month in child support. Ms. Anness based this amount on an income of $900.00 per week truck
driving and $1,107.84 per month for the phone directory. Ms. Anness claimed that, following the
hearing, Mr. Chapdelaine quit his truck driving job so that he would not have to pay child support
on that income. Ms. Anness argued that Mr. Chapdelaine was willfully unemployed so that the trial
court should set child support based on his ability to earn as a truck driver. Mr. Chapdelaine
proposed that he pay $343.00 per month in child support. Mr. Chapdelaine based this amount on
his earnings from the phone directory. Mr. Chapdelaine stated that he was no longer truck driving
and had no intention of truck driving unless he could be guaranteed a local route. Mr. Chapdelaine
claimed that he was not willfully unemployed.
On June 19, 2000, the trial court issued an Order which provided that custody of the children
be awarded to Ms. Anness and visitation of the children be awarded to Mr. Chapdelaine. The trial
court ordered Mr. Chapdelaine to pay Ms. Anness $1,480.00 per month in child support in
accordance with the Tennessee Child Support Guidelines. The trial court based this amount on Mr.
Chapdelaine’s ability to earn $900.00 per week as a truck driver and his earnings from phone book
publishing of $1,107.84 per month. The trial court acknowledged testimony at the hearing that Mr.
Chapdelaine was no longer driving a truck but found that Mr. Chapdelaine’s ability to earn had not
diminished. The trial court stated that Mr. Chapdelaine was willfully and voluntarily
underemployed. This appeal followed.
II. Standard of Review
The standard of review for a non-jury case is de novo upon the record. See Wright v. City
of Knoxville, 898 S.W.2d 177, 181 (Tenn. 1995). There is a presumption of correctness as to the
trial court’s factual findings, unless the preponderance of the evidence is otherwise. See TENN. R.
-2-
APP . P. 13(d). For issues of law, the standard of review is de novo, with no presumption of
correctness. See Ridings v. Ralph M. Parsons Co., 914 S.W.2d 79, 80 (Tenn. 1996).
III. Law and Analysis
The following two issues are presented for our review: (1) whether the trial court incorrectly
determined the amount of Mr. Chapdelaine’s child support obligation; and (2) whether Ms. Anness
is entitled to an award of attorney’s fees on appeal. We will examine each of these issues in turn.
The first issue presented for our review is whether the trial court incorrectly determined the
amount of Mr. Chapdelaine’s child support obligation. The trial court found that Mr. Chapdelaine
was willfully and voluntarily underemployed. The trial court ordered Mr. Chapdelaine to pay
$1,480.00 per month in child support based on his ability to earn $900.00 per week as a truck driver
and his earnings from phone book publishing of $1,107.84 per month. Mr. Chapdelaine argues that
the evidence presented at the hearing preponderates against the trial court’s finding that he had the
ability to earn $900.00 per week as a truck driver. Mr. Chapdelaine requests this Court to establish
child support based on his income of $25,389.00 as reflected on his 1999 federal income tax return.
In determining child support, courts must apply as a rebuttable presumption the child support
guidelines promulgated by the Tennessee Department of Human Services. See TENN. CODE ANN .
§ 36-5-101(e)(1) (1996). Under the child support guidelines, the amount of child support is
calculated based on a percentage of the obligor’s net income. See TENN. COMP. R. & REGS. ch.
1240-2-4-.03 (1994). In certain cases, however, the court must compute child support based on a
percentage of the obligor’s potential income rather than net income. See Brooks v. Brooks, 992
S.W.2d 403, 407 (Tenn. 1999). “If an obligor is willfully and voluntarily unemployed or
underemployed, child support shall be calculated based on a determination of potential income, as
evidenced by educational level and/or previous work experience.” TENN. COMP. R. & REGS. ch.
1240-2-4-.03(d).
In order for the trial court to compute child support based on the obligor’s potential income,
the court must make a threshold finding that the obligor was willfully and voluntarily unemployed
or underemployed. See Marcus v. Marcus, No. 02A01-9611-CV-00286, 1998 WL 29645, at *3
(Tenn. Ct. App. Jan. 28, 1998). There may be an implicit finding of willful and voluntary
unemployment or underemployment on the basis of the trial court’s ultimate decision. See Ralston
v. Ralston, No. 01A01-9804-CV-00222, 1999 WL 562719, at *7 n.7 (Tenn. Ct. App. Aug. 3, 1999)
(citing Hyden v. Hyden, No. 02A01-9611-CH-00273, 1997 WL 593800, at *3 (Tenn. Ct. App. Sept.
25, 1997)).
The determination of whether an obligor is willfully and voluntarily unemployed or
underemployed is dependent upon the factual background of the case. See id. at *3. Willful and
voluntary unemployment or underemployment does not occur solely in cases where the obligor
becomes unemployed or underemployed with the intent to avoid child support obligations. See
Garfinkel v. Garfinkel, 945 S.W.2d 744, 748 (Tenn. Ct. App. 1996) (citing Ford v. Ford, No. 02A01-
-3-
9507-CH-00153, 1996 WL 560258, at *1 (Tenn. Ct. App. Oct. 3, 1996)). Cases differ as to whether
an obligor is willfully and voluntarily unemployed or underemployed. See Brooks v. Brooks, 992
S.W.2d 403, 407 (Tenn. 1999) (finding that an obligor who sold his successful business and began
a cattle breeding operation was willfully and voluntarily underemployed); Marcus v. Marcus, No.
02A01-9611-CV-00286, 1998 WL 29645, at *1 (Tenn. Ct. App. Jan. 28, 1998) (finding that an
obligor who was terminated from his job and started an internet business was not willfully and
voluntarily underemployed); Garfinkel, 945 S.W.2d at 748 (finding that an obligor who quit his job
in physics to live off income from rental properties was willfully and voluntarily underemployed).
In the case at bar, the trial court made an initial determination that Mr. Chapdelaine was
willfully and voluntarily underemployed. We agree. In 1999, Mr. Chapdelaine earned $25,385.00
as both a truck driver and owner and publisher of a phone directory. The record reveals that Mr.
Chapdelaine quit his job as a truck driver following the April, 2000 hearing. Mr. Chapdelaine’s sole
income comes from the phone directory at which he made approximately $13,000.00 in 1999.
Although Mr. Chapdelaine is disinclined to work as a truck driver, we agree with the trial court’s
finding that Mr. Chapdelaine possesses the ability to earn an income as a truck driver. Mr.
Chapdelaine should not be allowed to lessen his child support obligation simply because he chooses
to no longer work as a truck driver. Accordingly, we affirm the trial court’s finding that Mr.
Chapdelaine was willfully and voluntarily underemployed.
Based on Mr. Chapdelaine’s status as willfully and voluntarily underemployed, the trial court
set Mr. Chapdelaine’s child support obligation at $1,480.00 per month. The trial court based this
amount on Mr. Chapdelaine’s ability to earn $900.00 per week as a truck driver and his earnings
from phone book publishing of $1,107.84 per month. We agree with the trial court’s finding that
Mr. Chapdelaine earned $1,107.84 per month from phone book publishing. We disagree, however,
with the trial court’s finding that Mr. Chapdelaine had the ability to earn $900.00 per week as a truck
driver. The child support set by the trial court implies that Mr. Chapdelaine had the ability to earn
$46,800.00 per year, or $900.00 per week, as a truck driver. We find no evidence of this in the
record. Mr. Chapdelaine’s 1999 federal income tax return reflected an income of approximately
$12,000.00 from truck driving. Mr. Chapdelaine testified that at times he had made $400.00 per
week, $500.00 per week, or $900.00 per week. Mr. Chapdelaine testified that he did not consistently
make $900.00 per week as a truck driver. We find that Mr. Chapdelaine does not have the ability
to earn $900.00 per week. Accordingly, we reverse the trial court’s determination of the amount of
child support to be paid by Mr. Chapdelaine and remand for a determination of child support based
on Mr. Chapdelaine’s net income.
The second issue presented for our review is whether Ms. Anness is entitled to an award of
attorney’s fees on appeal. Ms. Anness requests this Court to award her attorney’s fees necessitated
by this appeal. In support of her request, Ms. Anness cites section 36-5-103(c) of the Tennessee
Code. Section 36-5-103(c) permits a person to whom custody is awarded to recover his or her
attorney’s fees “incurred in enforcing any decree for alimony and/or child support, or in regard to
any suit or action concerning the adjudication of the custody or the change of custody of any child,
or children, of the parties, both upon the original divorce hearing and at any subsequent hearing.”
-4-
TENN. CODE ANN . § 36-5-103(c) (Supp. 1999). The decision to award attorney’s fees is within the
discretion of the court. See id. We respectfully deny Ms. Anness’ request for attorney’s fees on
appeal.
IV. Conclusion
For the foregoing reasons, the decision of the trial court is affirmed in part and reversed in
part. This case is remanded for a determination of child support based on Mr. Chapdelaine’s net
income. Costs of this appeal are taxed equally between the Appellant, Michael Mario Chapdelaine,
Sr., and the Appellee, Pamela Jean Anness, for which execution may issue if necessary.
___________________________________
ALAN E. HIGHERS, JUDGE
-5- | {
"perplexity_score": 306,
"pile_set_name": "FreeLaw"
} |
static int x = []() {std::ios::sync_with_stdio(false); cin.tie(0); return 0; }();
class Solution
{
public:
int maxAncestorDiff(TreeNode* root, int mx=INT_MIN, int mn=INT_MAX)
{
return root == nullptr ? mx - mn : max(maxAncestorDiff(root->left, max(mx, root->val), min(mn, root->val)),
maxAncestorDiff(root->right, max(mx,root->val), min(mn, root->val)));
}
}; | {
"perplexity_score": 3703.8,
"pile_set_name": "Github"
} |
5. Why did Mr. Stewart forbid Elinore from seeing the woman in #61 on Christmas Day?(a) She lived in sheep country. (b) She lived in Indian territory. (c) A snowstorm was coming. (d) She insulted Mr. Stewart.
Short Answer Questions
1. Which of the following is NOT true about Zebulon?
2. What did Elinore make for Ms. Lane?
3. LETTERS OF A WOMAN HOMESTEADER is a series of _________________.
4. What does Elinore's daughter use for a baby doll?
5. Elinore reports that if a Yankee had spoken to her like Zebulon had, she would have ___________________. | {
"perplexity_score": 215.3,
"pile_set_name": "Pile-CC"
} |
#!/bin/sh
# script is buggy; until patched just do exit 0
#exit 0
# add zeros to device or bus
add_zeros () {
case "$(echo $1 | wc -L)" in
1) echo "00$1" ;;
2) echo "0$1" ;;
*) echo "$1"
esac
exit 0
}
# bus and device dirs in /sys
USB_PATH=$(echo $MDEV | sed -e 's/usbdev\([0-9]\).[0-9]/usb\1/')
USB_PATH=$(find /sys/devices -type d -name "$USB_PATH")
USB_DEV_DIR=$(echo $MDEV | sed -e 's/usbdev\([0-9]\).\([0-9]\)/\1-\2/')
# dir names in /dev
BUS=$(add_zeros $(echo $MDEV | sed -e 's/^usbdev\([0-9]\).[0-9]/\1/'))
USB_DEV=$(add_zeros $(echo $MDEV | sed -e 's/^usbdev[0-9].\([0-9]\)/\1/'))
# try to load the proper driver for usb devices
case "$ACTION" in
add|"")
# load usb bus driver
for i in $USB_PATH/*/modalias ; do
modprobe `cat $i` 2>/dev/null
done
# load usb device driver if existent
if [ -d $USB_PATH/$USB_DEV_DIR ]; then
for i in $USB_PATH/$USB_DEV_DIR/*/modalias ; do
modprobe `cat $i` 2>/dev/null
done
fi
# move usb device file
mkdir -p bus/usb/$BUS
mv $MDEV bus/usb/$BUS/$USB_DEV
;;
remove)
# unload device driver, if device dir is existent
if [ -d $USB_PATH/$USB_DEV_DIR ]; then
for i in $USB_PATH/$USB_DEV_DIR/*/modalias ; do
modprobe -r `cat $i` 2>/dev/null
done
fi
# unload usb bus driver. Does this make sense?
# what happens, if two usb devices are plugged in
# and one is removed?
for i in $USB_PATH/*/modalias ; do
modprobe -r `cat $i` 2>/dev/null
done
# remove device file and possible empty dirs
rm -f bus/usb/$BUS/$USB_DEV
rmdir bus/usb/$BUS/ 2>/dev/null
rmdir bus/usb/ 2>/dev/null
rmdir bus/ 2>/dev/null
esac | {
"perplexity_score": 3869.6,
"pile_set_name": "Github"
} |
William Weekes (priest)
The Very Rev. William Haye Weekes (born Cambridge, 5 March 1867 - died Kenilworth 2 August 1945) was Dean of Bloemfontein in South Africa from 1922 to 1940.
He was educated at Bristol Grammar School and Sidney Sussex College, Cambridge; and ordained in 1891. After a curacy at St Sidwell, Exeter he was Chaplain to the Bishop of Bloemfontein. In 1896 he became Rector of Makefing. He was Rector at Beaconsfield from 1901 until 1912; and then of Kroonstad until 1917. He was Archdeacon of Kimberley from 1905 to 1917; and of Bloemfontein (and Vicar of the Cathedral Parish) from 1917 to 1940. He was appointed a Chaplain of the Order of St John of Jerusalem in 1931.
References
Category:1867 births
Category:People educated at Bristol Grammar School
Category:Alumni of Sidney Sussex College, Cambridge
Category:1945 deaths
Category:Archdeacons of Kimberley
Category:Archdeacons of Bloemfontein
Category:Deans of Bloemfontein
Category:South African Anglican priests | {
"perplexity_score": 91.8,
"pile_set_name": "Wikipedia (en)"
} |
Shared Interest
Shared Interest Society Limited is a fair trade financial co-operative based in the United Kingdom formed in 1990. Today it provides credit and financial services to fair trade producers, retailers, importers and exporters throughout the world. Shared Interest works with both Fairtrade International (formerly known as Fairtrade Labelling Organizations (FLO)) and the World Fair Trade Organization (WFTO). In 2004, the Shared Interest Foundation was formed as a charitable subsidiary, providing training and support services to producers, complementing the financial services offered by the Society. Shared Interest received the Queen's Award for Enterprise in 2008.
History
The idea that led to Shared Interest was the creation of Mark Gerard Hayes, then an investment banker with 3i, now an academic economist at Cambridge University, who was the first managing director from 1990 to 1999. Inspired by the success of Traidcraft in harnessing socially responsible investment for the finance of fair trade, Hayes approached Traidcraft founder Richard Adams in 1986, beginning a collaboration that culminated in the formation of Shared Interest in 1990 as a special form of co-operative saving and loan society.
The initial £100,000 funding (subsequently repaid) for the launch of the Society came from Traidcraft, Joseph Rowntree Charitable Trust, and a similar co-operative established in 1975 in the Netherlands, now called Oikocredit. However the creation of Shared Interest was finally made possible by the action of SIAL (Scottish Churches Action for World Development Investment Association Limited), an Oikocredit Support Association, who provided the first 200 members and £300,000 of capital in the form of shares in Oikocredit. Oikocredit was Shared Interest's main channel for lending in its first five years.
Once Shared Interest had reached a capital of £4 million (1994), a planned transition took place to establish its own lending business by the creation of a clearing house with what is now the World Fair Trade Organization, to finance directly fair trade between the Global North and Global South and increasingly within Southern markets themselves. Shared Interest continued to support Oikocredit by the issue of loan stock until 2005, after which Oikocredit established its own UK office.
Structure
Shared Interest Society Limited
The Society is registered under the Co-operative & Community Benefit Societies Act 2014. Its membership is almost entirely composed of UK individuals (some 11,500 in 2018), who invest withdrawable share capital (£43 million in 2019), which is used to provide credit facilities to organisations engaged in fair trade. The society had 34 staff (2012), mostly in the UK, with established regional offices around the world.
The Society is unusual in having a council of ordinary members as well as a Board of Directors. Both bodies are elected; the Council acts as a select committee which scrutinises the work of the Board. Furthermore, a majority of the members of Council are nominated for election by a process of random selection, similar to jury service, in the interests of wider participation.
How it works: by opening an account, a person becomes a member of the Society and buys non-transferable withdrawable shares to the value of their investment. £1 buys one share and people can invest between £100 and £100,000. Shared Interest is the only accredited open share offer to have received the Community Shares Standard five years ago. It is very different from a charitable donation as, once your account is open, a person can withdraw money from their account as well as add to it. All members have an equal voice regardless of the amount in their account.
Shared Interest Foundation
In 2004, Shared Interest Society Ltd. established a subsidiary charity, to provide business and financial management training for fair trade organisations, as well as grants to support individual organisations and the fair trade movement as a whole. To date, the Foundation's work has been funded largely by donations from the Society's members.
The nature of the financial requirement
International trade and production involves long processes which take much time. For example, many months elapse between the sowing of a crop in the tropics and the final purchase by a consumer of a finished product in a European supermarket. The money laid out at each stage of production and distribution is called working capital. For smaller producer organisations to access international markets on terms consistent with their independence, if at all, requires access to working capital, by both producers and fair trade distributors, beyond what is available from banks. Normally this extra working capital would come from profit-maximising shareholders in some form or from accumulated past profits. Shared Interest provides unsecured finance, similar to trade credit. Shared Interest can do this only because its own members are prepared to accept the risk of loss on their investment in Shared Interest, and to accept the limited and currently lower financial returns resulting from the high costs of dealing with emerging organisations in the Global South.
In 2018, Shared Interest lent money to 363 organisations representing 470,421 individuals. They worked in areas where other lenders are less keen to operate in order to deepen impact and support those farmers in greatest need. Very few social lenders operate with smaller lending facilities or more vulnerable groups. Shared Interest works primarily with organisations who are certified as fair trade as they believe these producers align with their own values. The fair trade movement aims to promote fair and equal trading terms for producers in developing countries. It is based around ten key principles:
• Creating Opportunities for Economically Disadvantaged Producers
• Transparency and Accountability
• Fair Trading Practices
• Payment of a Fair Price
• Ensuring no Child Labour and Forced Labour
• Commitment to Non Discrimination, Gender Equity and Women's Economic Empowerment, and Freedom of Association
• Ensuring Good Working Conditions
• Providing Capacity Building
• Promoting Fair Trade
• Respect for the Environment
The finance mechanism
The diagram illustrates the lending process:
The order is placed by a buyer (e.g. a coffee importer) with the producer (e.g. a coffee farming co-operative)
Shared Interest makes an advance payment on behalf of buyers to the producers
The producer is able to borrow an additional amount against that order to cover their expenses
The goods are delivered
The final payment is made to the producer; the buyer re-pays the credit provided by Shared Interest
References
External links
Shared Interest Society Ltd
Fairtrade International
The World Fair Trade Organization
Coops UK
Shared Interest Society: fair lending for fair trade
Category:Fair trade organizations
Category:Co-operatives in the United Kingdom
Category:Economy of the United Kingdom
Category:Ethical banking
Category:Organizations established in 1990
Category:1990 establishments in England | {
"perplexity_score": 233.7,
"pile_set_name": "Wikipedia (en)"
} |
49ers Injury Update Ahead of Wednesday's Practice
The San Francisco 49ers received good news about Donavin Newsom after the linebacker suffered a head injury during Tuesday's practice. Newsom is said to be "doing fine", per a 49ers public relations rep, and is expected to be released from the hospital Wednesday afternoon.
Here's the rest of the injury report. Oh note, Jaquiski Tartt (ribs) looks to be a full participant on Wednesday. | {
"perplexity_score": 453.4,
"pile_set_name": "Pile-CC"
} |
Gold(i) catalyzed tandem cyclization of propargylic esters to 4-acyloxy-1,2-dihydroquinolines.
An effective synthetic protocol for structurally diverse 4-acyloxy-1,2-dihydroquinoline compounds has been accomplished by a gold(i)-catalyzed tandem [3,3]-rearrangement and intramolecular hydroamination of propargylic esters, affording the desired products in good yields. Moreover, the asymmetric variant of this cyclization has also been achieved using a chiral nitrogen acyclic carbene (NAC) gold(i) complex. These products have application in the enantioselective synthesis of an aromatase inhibitor within three simple steps. | {
"perplexity_score": 212.8,
"pile_set_name": "PubMed Abstracts"
} |
UNPUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 98-6837
JOHN ED FLAMER,
Plaintiff - Appellant,
versus
CAPTAIN ROWLETT, Security Chief; WARDEN
BASKERVILLE; B. B. HOLLIFIELD, Lieutenant;
DOCTOR FISHER, Mental Health,
Defendants - Appellees.
Appeal from the United States District Court for the Eastern
District of Virginia, at Norfolk. Henry C. Morgan, Jr., District
Judge. (CA-98-311-2)
Submitted: September 10, 1998 Decided: September 24, 1998
Before MURNAGHAN, MICHAEL, and MOTZ, Circuit Judges.
Affirmed by unpublished per curiam opinion.
John Ed Flamer, Appellant Pro Se.
Unpublished opinions are not binding precedent in this circuit.
See Local Rule 36(c).
PER CURIAM:
Appellant appeals the district’s order dismissing his 42
U.S.C. § 1983 (1994) complaint. The district court ordered Appel-
lant to either consent to the collection of the filing fee from his
inmate account or to submit the full filing fee within thirty days.
See 28 U.S.C.A. § 1915(b)(1) (West 1994 & Supp. 1998). The court
dismissed the case without prejudice when Appellant failed to com-
ply with the order. Finding no abuse of discretion, we affirm the
district court’s order. We dispense with oral argument because the
facts and legal contentions are adequately presented in the mate-
rials before the court and argument would not aid the decisional
process.
AFFIRMED
2 | {
"perplexity_score": 707.1,
"pile_set_name": "FreeLaw"
} |
Q:
Static cast of enum to bool, performance warning from Compiler
I have the following declared in my project:
enum class OType : bool { Dynamic=true, Static=false };
OType getotype();
I'm using the following function:
double ComputeO(double K,bool type)
I'm calling it this way :
ComputeO(some double, static_cast<bool>(getotype()))
For this static_cast I'm getting a nice:
warning C4800: 'const dmodel::OType ' : forcing value to bool 'true' or 'false' (performance warning)
I don't know how to get rid of it,I specify the cast explicitly shouldnt it be enough ?
Note: I'm using VC11 ( Visual Studio 2012 )
Thks.
A:
See https://msdn.microsoft.com/en-us/library/b6801kcy.aspx, which describes the warning. In particular, it says:
Casting the expression to type bool will not disable the warning,
which is by design.
Just rewrite your call like this:
enum class OType : bool { Dynamic=true, Static=false };
OType getotype();
double ComputeO(double K,bool type);
int main()
{
ComputeO(1.0, getotype() == OType::Dynamic);
} | {
"perplexity_score": 1250.4,
"pile_set_name": "StackExchange"
} |
Introduction
============
Hereditary breast and ovarian cancer (HBOC) is an autosomal dominant syndrome with incomplete penetrance. The two most commonly mutated genes in HBOC are *BRCA1* and *BRCA2*, which are essential components of the double-strand break repair system ([@b1-ol-06-03-0725]). Almost 3,500 cancer-associated mutations, scattered throughout the two genes, have so far been reported in the Breast Cancer Information Core (BIC) database (<http://research.nhgri.nih.gov/bic/>). The present study reports a new germline nucleotide 3020insCT/c.2901insCT mutation detected in the *BRCA1* gene. In general, germline mutations in known breast cancer risk genes account for \~20% of breast cancers associated with a family history. It is therefore crucial to identify these individuals to offer appropriate cancer management and understand the contribution of *BRCA1* and *BRCA2* mutation-associated risks.
Case report
===========
A 55-year-old non-Ashkenazi Spanish female diagnosed with breast cancer (at 51 years old) and ovarian cancer (at 55 years old) and treated at the University Clinic of Navarra (CUN; Pamplona, Navarra, Spain), was transferred to the genetic counseling unit. The clinical history of the patient lead us to consider the possibility of HBOC syndrome. Following verbal and written informed consent, genomic DNA was extracted from a peripheral blood sample and the *BRCA1* and *BRCA2* genes were sequenced on an automated analyzer (ABI PRISM^®^ 3130XL; Applied Biosystems, Foster City, CA, USA). The results were compared to the consensus wild-type sequences (Genbank NM_007294.2 for *BRCA1* and Genbank NM_000059.1 for *BRCA2*). A 3020insCT/c.2901insCT frameshift mutation was identified in exon 11 of *BRCA1* ([Fig. 1](#f1-ol-06-03-0725){ref-type="fig"}). The insertion was confirmed by repeated analyses including reverse-primer sequencing. A *BRCA1*-Multiplex Ligation-dependent Probe Amplification (MLPA) analysis was performed, in order to investigate whether the mutation was able to lead to an exon rearrangement. The results indicated that none of the *BRCA1* alleles showed deletion and/or duplication (results not shown).
Genetic analysis was recommended to the only other individual at risk in patient's family, namely the twin sister, and the analysis showed that she did not carry the mutation.
Discussion
==========
A 3020insCT/c.2901insCT frameshift mutation in exon 11 of the *BRCA1*, which has yet to be reported in the BIC database, was detected in a 55-year-old non-Ashkenazi Spanish female diagnosed with breast and ovarian cancer. Since other family members were not available for genetic analysis, the segregation of the mutation could not be established. From the literature available, it may be deduced that the mutation leads to the deletion of the coiled-coil domain and BRCA1 C terminus (BRCT) domains of the BRCA1 protein. The coiled-coil region is critical for transcriptional activation through its interaction with the basic leucine zipper (bZIP) domain of the JunB protein. *In vitro* and *in vivo* experiments suggest that this BRCA1-JunB interaction is particularly important for the suppression of ovarian cancer ([@b2-ol-06-03-0725]). The lack of the coiled-coil domain in the present patient may have been closely correlated with the development of the ovarian cancer. However, BRCA1 has a pivotal function within the BRCA1-associated genome surveillance complex through the coordination of the actions of damage-sensing and executive repair proteins. Solyom *et al*([@b3-ol-06-03-0725]) showed that the Abraxas protein serves as a central organizer of a large BRCA1 holoenzyme complex. Abraxas directly binds, via its phosphorylated C terminus, to the BRCA1 BRCT motifs, linking BRCA1 to a core protein complex dedicated to ubiquitin chain recognition and hydrolysis at DNA double-strand breaks ([@b3-ol-06-03-0725],[@b4-ol-06-03-0725]). Moreover, BRCT domains in BRCA1 are able to bind DNA strand breaks and ends *in vitro*, which is enhanced by the formation of the BRCA1-BARD1 heterodimer ([@b5-ol-06-03-0725]). The structural studies of Kobayashi *et al* showed that the BRCT domain partially inserts into the major groove and makes extensive contacts with the DNA backbone ([@b6-ol-06-03-0725]), suggesting the possibility that proteins with BRCT domains may act as DNA sensors and transducers of DNA damage response signaling. The mutation identified in the present study would markedly compromise these functions, with profound biological consequences. The premature stop codon at amino acid 1000 leads to a truncated protein that has 70% of its normal length. The advantage of having mutant *BRCA1* human breast cancer cell lines is that the impact of pathogenic human mutations may be evaluated in the context of a human genetic background. A previous study of 41 human breast cancer cell lines identified a *BRCA1* mutant cell line, SUM149PT, with a nucleotide deletion at position 2288 ([@b7-ol-06-03-0725]). The resulting truncated BRCA1 protein lacked the C-terminal BRCT and coiled-coil domains similar to the present patient. Nuclear BRCA1 protein expression was not detectable in the cell line, therefore corroborating the tumor suppressor function of BRCA1 and the pathogenicity of the mutation.
The next step was to search for bibliographic evidence of the present mutation in *BRCA1-*knockout animal models. The homozygous loss of *BRCA1* generally leads to early embryonic lethality, although it is possible to extend the viability though the removal of p53 function. Among the range of models available, McCarthy *et al* designed truncated human *BRCA1*f22-24/p53^+/−^ mice (harboring the second BRCT domain), that develop estrogen receptor-negative (ER^−^) and progesterone receptor-negative (PR^−^) tumors lacking HER2 protein overexpression and gene amplification ([@b8-ol-06-03-0725]). This phenotype is similar to 64--90% of human *BRCA1*-mutation breast cancers, so called 'triple negative' breast cancers. The immunophenotypic features of the present patient's tumor indicated a noticeably different pattern, being ER^+^, PR^+^ and ErbB2-negative. It has been reported that 10--36% of *BRCA1* mutation-related invasive breast cancers are, in fact, ER^+^. Furthermore, *BRCA1* mutation carriers who are older or post-menopausal at the time of the diagnosis of breast cancer are more likely to have an ER^+^ breast cancer ([@b9-ol-06-03-0725],[@b10-ol-06-03-0725]). With regard to the origin of these ER^+^*BRCA1*-related breast cancers, Lim *et al* observed the expansion of a committed luminal progenitor population, containing ER^+^ and ER^−^ cells, in preneoplastic tissues of *BRCA1* mutation carriers and proposed the luminal progenitor cells as the cell of origin for *BRCA1*-associated cancers ([@b11-ol-06-03-0725]). In mouse models with the deletion of *BRCA1*, the expression of ER in the resulting tumors appears to depend on whether *BRCA1* is deleted at an earlier or later stage of cell differentiation ([@b12-ol-06-03-0725]--[@b14-ol-06-03-0725]). These studies suggest that *BRCA1*-deficient ER^+^ tumors may derive from *BRCA1* loss in an ER^+^ luminal progenitor cell.
Another key point is the therapeutic approach for ER^+^*BRCA1*-associated breast cancers. Given the availability of effective therapies that exploit defects in homologous recombination, such as PARP-1 inhibitors and cisplatin, it is increasingly important to determine whether these therapies are likely to be effective in ER^+^*BRCA1*-mutant cancers. A recent study by Kaplan *et al* indicated that ER^+^*BRCA1*-related breast cancers are indistinguishable from ER^−^*BRCA1*-related cancers in their nuclear expression of PARP-1, suggesting that ER^+^*BRCA1*-related breast cancers may respond well to drugs that exploit BRCA1 deficiency ([@b15-ol-06-03-0725]). ER^+^*BRCA1*-related breast cancers appear to be a unique group and efforts should be made to identify the individuals for whom estrogen-modifying agents are likely to be particularly effective.
The authors are grateful to all patients and their families.
![Chromatogram of breast cancer (*BRCA*)*1* exon 11 showing the 3020insCT/c.2901insCT in the heterozygous state (arrow) in the peripheral blood of the patient.](OL-06-03-0725-g00){#f1-ol-06-03-0725} | {
"perplexity_score": 578.5,
"pile_set_name": "PubMed Central"
} |
// Code generated by protoc-gen-go. DO NOT EDIT.
// source: google/cloud/videointelligence/v1p1beta1/video_intelligence.proto
package videointelligence
import (
fmt "fmt"
proto "github.com/golang/protobuf/proto"
duration "github.com/golang/protobuf/ptypes/duration"
timestamp "github.com/golang/protobuf/ptypes/timestamp"
_ "google.golang.org/genproto/googleapis/api/annotations"
longrunning "google.golang.org/genproto/googleapis/longrunning"
status "google.golang.org/genproto/googleapis/rpc/status"
math "math"
)
import (
context "golang.org/x/net/context"
grpc "google.golang.org/grpc"
)
// Reference imports to suppress errors if they are not otherwise used.
var _ = proto.Marshal
var _ = fmt.Errorf
var _ = math.Inf
// This is a compile-time assertion to ensure that this generated file
// is compatible with the proto package it is being compiled against.
// A compilation error at this line likely means your copy of the
// proto package needs to be updated.
const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package
// Video annotation feature.
type Feature int32
const (
// Unspecified.
Feature_FEATURE_UNSPECIFIED Feature = 0
// Label detection. Detect objects, such as dog or flower.
Feature_LABEL_DETECTION Feature = 1
// Shot change detection.
Feature_SHOT_CHANGE_DETECTION Feature = 2
// Explicit content detection.
Feature_EXPLICIT_CONTENT_DETECTION Feature = 3
// Speech transcription.
Feature_SPEECH_TRANSCRIPTION Feature = 6
)
var Feature_name = map[int32]string{
0: "FEATURE_UNSPECIFIED",
1: "LABEL_DETECTION",
2: "SHOT_CHANGE_DETECTION",
3: "EXPLICIT_CONTENT_DETECTION",
6: "SPEECH_TRANSCRIPTION",
}
var Feature_value = map[string]int32{
"FEATURE_UNSPECIFIED": 0,
"LABEL_DETECTION": 1,
"SHOT_CHANGE_DETECTION": 2,
"EXPLICIT_CONTENT_DETECTION": 3,
"SPEECH_TRANSCRIPTION": 6,
}
func (x Feature) String() string {
return proto.EnumName(Feature_name, int32(x))
}
func (Feature) EnumDescriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{0}
}
// Label detection mode.
type LabelDetectionMode int32
const (
// Unspecified.
LabelDetectionMode_LABEL_DETECTION_MODE_UNSPECIFIED LabelDetectionMode = 0
// Detect shot-level labels.
LabelDetectionMode_SHOT_MODE LabelDetectionMode = 1
// Detect frame-level labels.
LabelDetectionMode_FRAME_MODE LabelDetectionMode = 2
// Detect both shot-level and frame-level labels.
LabelDetectionMode_SHOT_AND_FRAME_MODE LabelDetectionMode = 3
)
var LabelDetectionMode_name = map[int32]string{
0: "LABEL_DETECTION_MODE_UNSPECIFIED",
1: "SHOT_MODE",
2: "FRAME_MODE",
3: "SHOT_AND_FRAME_MODE",
}
var LabelDetectionMode_value = map[string]int32{
"LABEL_DETECTION_MODE_UNSPECIFIED": 0,
"SHOT_MODE": 1,
"FRAME_MODE": 2,
"SHOT_AND_FRAME_MODE": 3,
}
func (x LabelDetectionMode) String() string {
return proto.EnumName(LabelDetectionMode_name, int32(x))
}
func (LabelDetectionMode) EnumDescriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{1}
}
// Bucketized representation of likelihood.
type Likelihood int32
const (
// Unspecified likelihood.
Likelihood_LIKELIHOOD_UNSPECIFIED Likelihood = 0
// Very unlikely.
Likelihood_VERY_UNLIKELY Likelihood = 1
// Unlikely.
Likelihood_UNLIKELY Likelihood = 2
// Possible.
Likelihood_POSSIBLE Likelihood = 3
// Likely.
Likelihood_LIKELY Likelihood = 4
// Very likely.
Likelihood_VERY_LIKELY Likelihood = 5
)
var Likelihood_name = map[int32]string{
0: "LIKELIHOOD_UNSPECIFIED",
1: "VERY_UNLIKELY",
2: "UNLIKELY",
3: "POSSIBLE",
4: "LIKELY",
5: "VERY_LIKELY",
}
var Likelihood_value = map[string]int32{
"LIKELIHOOD_UNSPECIFIED": 0,
"VERY_UNLIKELY": 1,
"UNLIKELY": 2,
"POSSIBLE": 3,
"LIKELY": 4,
"VERY_LIKELY": 5,
}
func (x Likelihood) String() string {
return proto.EnumName(Likelihood_name, int32(x))
}
func (Likelihood) EnumDescriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{2}
}
// Video annotation request.
type AnnotateVideoRequest struct {
// Input video location. Currently, only
// [Google Cloud Storage](https://cloud.google.com/storage/) URIs are
// supported, which must be specified in the following format:
// `gs://bucket-id/object-id` (other URI formats return
// [google.rpc.Code.INVALID_ARGUMENT][google.rpc.Code.INVALID_ARGUMENT]). For more information, see
// [Request URIs](/storage/docs/reference-uris).
// A video URI may include wildcards in `object-id`, and thus identify
// multiple videos. Supported wildcards: '*' to match 0 or more characters;
// '?' to match 1 character. If unset, the input video should be embedded
// in the request as `input_content`. If set, `input_content` should be unset.
InputUri string `protobuf:"bytes,1,opt,name=input_uri,json=inputUri,proto3" json:"input_uri,omitempty"`
// The video data bytes.
// If unset, the input video(s) should be specified via `input_uri`.
// If set, `input_uri` should be unset.
InputContent []byte `protobuf:"bytes,6,opt,name=input_content,json=inputContent,proto3" json:"input_content,omitempty"`
// Requested video annotation features.
Features []Feature `protobuf:"varint,2,rep,packed,name=features,proto3,enum=google.cloud.videointelligence.v1p1beta1.Feature" json:"features,omitempty"`
// Additional video context and/or feature-specific parameters.
VideoContext *VideoContext `protobuf:"bytes,3,opt,name=video_context,json=videoContext,proto3" json:"video_context,omitempty"`
// Optional location where the output (in JSON format) should be stored.
// Currently, only [Google Cloud Storage](https://cloud.google.com/storage/)
// URIs are supported, which must be specified in the following format:
// `gs://bucket-id/object-id` (other URI formats return
// [google.rpc.Code.INVALID_ARGUMENT][google.rpc.Code.INVALID_ARGUMENT]). For more information, see
// [Request URIs](/storage/docs/reference-uris).
OutputUri string `protobuf:"bytes,4,opt,name=output_uri,json=outputUri,proto3" json:"output_uri,omitempty"`
// Optional cloud region where annotation should take place. Supported cloud
// regions: `us-east1`, `us-west1`, `europe-west1`, `asia-east1`. If no region
// is specified, a region will be determined based on video file location.
LocationId string `protobuf:"bytes,5,opt,name=location_id,json=locationId,proto3" json:"location_id,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *AnnotateVideoRequest) Reset() { *m = AnnotateVideoRequest{} }
func (m *AnnotateVideoRequest) String() string { return proto.CompactTextString(m) }
func (*AnnotateVideoRequest) ProtoMessage() {}
func (*AnnotateVideoRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{0}
}
func (m *AnnotateVideoRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_AnnotateVideoRequest.Unmarshal(m, b)
}
func (m *AnnotateVideoRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_AnnotateVideoRequest.Marshal(b, m, deterministic)
}
func (m *AnnotateVideoRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_AnnotateVideoRequest.Merge(m, src)
}
func (m *AnnotateVideoRequest) XXX_Size() int {
return xxx_messageInfo_AnnotateVideoRequest.Size(m)
}
func (m *AnnotateVideoRequest) XXX_DiscardUnknown() {
xxx_messageInfo_AnnotateVideoRequest.DiscardUnknown(m)
}
var xxx_messageInfo_AnnotateVideoRequest proto.InternalMessageInfo
func (m *AnnotateVideoRequest) GetInputUri() string {
if m != nil {
return m.InputUri
}
return ""
}
func (m *AnnotateVideoRequest) GetInputContent() []byte {
if m != nil {
return m.InputContent
}
return nil
}
func (m *AnnotateVideoRequest) GetFeatures() []Feature {
if m != nil {
return m.Features
}
return nil
}
func (m *AnnotateVideoRequest) GetVideoContext() *VideoContext {
if m != nil {
return m.VideoContext
}
return nil
}
func (m *AnnotateVideoRequest) GetOutputUri() string {
if m != nil {
return m.OutputUri
}
return ""
}
func (m *AnnotateVideoRequest) GetLocationId() string {
if m != nil {
return m.LocationId
}
return ""
}
// Video context and/or feature-specific parameters.
type VideoContext struct {
// Video segments to annotate. The segments may overlap and are not required
// to be contiguous or span the whole video. If unspecified, each video is
// treated as a single segment.
Segments []*VideoSegment `protobuf:"bytes,1,rep,name=segments,proto3" json:"segments,omitempty"`
// Config for LABEL_DETECTION.
LabelDetectionConfig *LabelDetectionConfig `protobuf:"bytes,2,opt,name=label_detection_config,json=labelDetectionConfig,proto3" json:"label_detection_config,omitempty"`
// Config for SHOT_CHANGE_DETECTION.
ShotChangeDetectionConfig *ShotChangeDetectionConfig `protobuf:"bytes,3,opt,name=shot_change_detection_config,json=shotChangeDetectionConfig,proto3" json:"shot_change_detection_config,omitempty"`
// Config for EXPLICIT_CONTENT_DETECTION.
ExplicitContentDetectionConfig *ExplicitContentDetectionConfig `protobuf:"bytes,4,opt,name=explicit_content_detection_config,json=explicitContentDetectionConfig,proto3" json:"explicit_content_detection_config,omitempty"`
// Config for SPEECH_TRANSCRIPTION.
SpeechTranscriptionConfig *SpeechTranscriptionConfig `protobuf:"bytes,6,opt,name=speech_transcription_config,json=speechTranscriptionConfig,proto3" json:"speech_transcription_config,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VideoContext) Reset() { *m = VideoContext{} }
func (m *VideoContext) String() string { return proto.CompactTextString(m) }
func (*VideoContext) ProtoMessage() {}
func (*VideoContext) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{1}
}
func (m *VideoContext) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VideoContext.Unmarshal(m, b)
}
func (m *VideoContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VideoContext.Marshal(b, m, deterministic)
}
func (m *VideoContext) XXX_Merge(src proto.Message) {
xxx_messageInfo_VideoContext.Merge(m, src)
}
func (m *VideoContext) XXX_Size() int {
return xxx_messageInfo_VideoContext.Size(m)
}
func (m *VideoContext) XXX_DiscardUnknown() {
xxx_messageInfo_VideoContext.DiscardUnknown(m)
}
var xxx_messageInfo_VideoContext proto.InternalMessageInfo
func (m *VideoContext) GetSegments() []*VideoSegment {
if m != nil {
return m.Segments
}
return nil
}
func (m *VideoContext) GetLabelDetectionConfig() *LabelDetectionConfig {
if m != nil {
return m.LabelDetectionConfig
}
return nil
}
func (m *VideoContext) GetShotChangeDetectionConfig() *ShotChangeDetectionConfig {
if m != nil {
return m.ShotChangeDetectionConfig
}
return nil
}
func (m *VideoContext) GetExplicitContentDetectionConfig() *ExplicitContentDetectionConfig {
if m != nil {
return m.ExplicitContentDetectionConfig
}
return nil
}
func (m *VideoContext) GetSpeechTranscriptionConfig() *SpeechTranscriptionConfig {
if m != nil {
return m.SpeechTranscriptionConfig
}
return nil
}
// Config for LABEL_DETECTION.
type LabelDetectionConfig struct {
// What labels should be detected with LABEL_DETECTION, in addition to
// video-level labels or segment-level labels.
// If unspecified, defaults to `SHOT_MODE`.
LabelDetectionMode LabelDetectionMode `protobuf:"varint,1,opt,name=label_detection_mode,json=labelDetectionMode,proto3,enum=google.cloud.videointelligence.v1p1beta1.LabelDetectionMode" json:"label_detection_mode,omitempty"`
// Whether the video has been shot from a stationary (i.e. non-moving) camera.
// When set to true, might improve detection accuracy for moving objects.
// Should be used with `SHOT_AND_FRAME_MODE` enabled.
StationaryCamera bool `protobuf:"varint,2,opt,name=stationary_camera,json=stationaryCamera,proto3" json:"stationary_camera,omitempty"`
// Model to use for label detection.
// Supported values: "builtin/stable" (the default if unset) and
// "builtin/latest".
Model string `protobuf:"bytes,3,opt,name=model,proto3" json:"model,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *LabelDetectionConfig) Reset() { *m = LabelDetectionConfig{} }
func (m *LabelDetectionConfig) String() string { return proto.CompactTextString(m) }
func (*LabelDetectionConfig) ProtoMessage() {}
func (*LabelDetectionConfig) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{2}
}
func (m *LabelDetectionConfig) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_LabelDetectionConfig.Unmarshal(m, b)
}
func (m *LabelDetectionConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_LabelDetectionConfig.Marshal(b, m, deterministic)
}
func (m *LabelDetectionConfig) XXX_Merge(src proto.Message) {
xxx_messageInfo_LabelDetectionConfig.Merge(m, src)
}
func (m *LabelDetectionConfig) XXX_Size() int {
return xxx_messageInfo_LabelDetectionConfig.Size(m)
}
func (m *LabelDetectionConfig) XXX_DiscardUnknown() {
xxx_messageInfo_LabelDetectionConfig.DiscardUnknown(m)
}
var xxx_messageInfo_LabelDetectionConfig proto.InternalMessageInfo
func (m *LabelDetectionConfig) GetLabelDetectionMode() LabelDetectionMode {
if m != nil {
return m.LabelDetectionMode
}
return LabelDetectionMode_LABEL_DETECTION_MODE_UNSPECIFIED
}
func (m *LabelDetectionConfig) GetStationaryCamera() bool {
if m != nil {
return m.StationaryCamera
}
return false
}
func (m *LabelDetectionConfig) GetModel() string {
if m != nil {
return m.Model
}
return ""
}
// Config for SHOT_CHANGE_DETECTION.
type ShotChangeDetectionConfig struct {
// Model to use for shot change detection.
// Supported values: "builtin/stable" (the default if unset) and
// "builtin/latest".
Model string `protobuf:"bytes,1,opt,name=model,proto3" json:"model,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *ShotChangeDetectionConfig) Reset() { *m = ShotChangeDetectionConfig{} }
func (m *ShotChangeDetectionConfig) String() string { return proto.CompactTextString(m) }
func (*ShotChangeDetectionConfig) ProtoMessage() {}
func (*ShotChangeDetectionConfig) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{3}
}
func (m *ShotChangeDetectionConfig) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_ShotChangeDetectionConfig.Unmarshal(m, b)
}
func (m *ShotChangeDetectionConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_ShotChangeDetectionConfig.Marshal(b, m, deterministic)
}
func (m *ShotChangeDetectionConfig) XXX_Merge(src proto.Message) {
xxx_messageInfo_ShotChangeDetectionConfig.Merge(m, src)
}
func (m *ShotChangeDetectionConfig) XXX_Size() int {
return xxx_messageInfo_ShotChangeDetectionConfig.Size(m)
}
func (m *ShotChangeDetectionConfig) XXX_DiscardUnknown() {
xxx_messageInfo_ShotChangeDetectionConfig.DiscardUnknown(m)
}
var xxx_messageInfo_ShotChangeDetectionConfig proto.InternalMessageInfo
func (m *ShotChangeDetectionConfig) GetModel() string {
if m != nil {
return m.Model
}
return ""
}
// Config for EXPLICIT_CONTENT_DETECTION.
type ExplicitContentDetectionConfig struct {
// Model to use for explicit content detection.
// Supported values: "builtin/stable" (the default if unset) and
// "builtin/latest".
Model string `protobuf:"bytes,1,opt,name=model,proto3" json:"model,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *ExplicitContentDetectionConfig) Reset() { *m = ExplicitContentDetectionConfig{} }
func (m *ExplicitContentDetectionConfig) String() string { return proto.CompactTextString(m) }
func (*ExplicitContentDetectionConfig) ProtoMessage() {}
func (*ExplicitContentDetectionConfig) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{4}
}
func (m *ExplicitContentDetectionConfig) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_ExplicitContentDetectionConfig.Unmarshal(m, b)
}
func (m *ExplicitContentDetectionConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_ExplicitContentDetectionConfig.Marshal(b, m, deterministic)
}
func (m *ExplicitContentDetectionConfig) XXX_Merge(src proto.Message) {
xxx_messageInfo_ExplicitContentDetectionConfig.Merge(m, src)
}
func (m *ExplicitContentDetectionConfig) XXX_Size() int {
return xxx_messageInfo_ExplicitContentDetectionConfig.Size(m)
}
func (m *ExplicitContentDetectionConfig) XXX_DiscardUnknown() {
xxx_messageInfo_ExplicitContentDetectionConfig.DiscardUnknown(m)
}
var xxx_messageInfo_ExplicitContentDetectionConfig proto.InternalMessageInfo
func (m *ExplicitContentDetectionConfig) GetModel() string {
if m != nil {
return m.Model
}
return ""
}
// Video segment.
type VideoSegment struct {
// Time-offset, relative to the beginning of the video,
// corresponding to the start of the segment (inclusive).
StartTimeOffset *duration.Duration `protobuf:"bytes,1,opt,name=start_time_offset,json=startTimeOffset,proto3" json:"start_time_offset,omitempty"`
// Time-offset, relative to the beginning of the video,
// corresponding to the end of the segment (inclusive).
EndTimeOffset *duration.Duration `protobuf:"bytes,2,opt,name=end_time_offset,json=endTimeOffset,proto3" json:"end_time_offset,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VideoSegment) Reset() { *m = VideoSegment{} }
func (m *VideoSegment) String() string { return proto.CompactTextString(m) }
func (*VideoSegment) ProtoMessage() {}
func (*VideoSegment) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{5}
}
func (m *VideoSegment) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VideoSegment.Unmarshal(m, b)
}
func (m *VideoSegment) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VideoSegment.Marshal(b, m, deterministic)
}
func (m *VideoSegment) XXX_Merge(src proto.Message) {
xxx_messageInfo_VideoSegment.Merge(m, src)
}
func (m *VideoSegment) XXX_Size() int {
return xxx_messageInfo_VideoSegment.Size(m)
}
func (m *VideoSegment) XXX_DiscardUnknown() {
xxx_messageInfo_VideoSegment.DiscardUnknown(m)
}
var xxx_messageInfo_VideoSegment proto.InternalMessageInfo
func (m *VideoSegment) GetStartTimeOffset() *duration.Duration {
if m != nil {
return m.StartTimeOffset
}
return nil
}
func (m *VideoSegment) GetEndTimeOffset() *duration.Duration {
if m != nil {
return m.EndTimeOffset
}
return nil
}
// Video segment level annotation results for label detection.
type LabelSegment struct {
// Video segment where a label was detected.
Segment *VideoSegment `protobuf:"bytes,1,opt,name=segment,proto3" json:"segment,omitempty"`
// Confidence that the label is accurate. Range: [0, 1].
Confidence float32 `protobuf:"fixed32,2,opt,name=confidence,proto3" json:"confidence,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *LabelSegment) Reset() { *m = LabelSegment{} }
func (m *LabelSegment) String() string { return proto.CompactTextString(m) }
func (*LabelSegment) ProtoMessage() {}
func (*LabelSegment) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{6}
}
func (m *LabelSegment) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_LabelSegment.Unmarshal(m, b)
}
func (m *LabelSegment) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_LabelSegment.Marshal(b, m, deterministic)
}
func (m *LabelSegment) XXX_Merge(src proto.Message) {
xxx_messageInfo_LabelSegment.Merge(m, src)
}
func (m *LabelSegment) XXX_Size() int {
return xxx_messageInfo_LabelSegment.Size(m)
}
func (m *LabelSegment) XXX_DiscardUnknown() {
xxx_messageInfo_LabelSegment.DiscardUnknown(m)
}
var xxx_messageInfo_LabelSegment proto.InternalMessageInfo
func (m *LabelSegment) GetSegment() *VideoSegment {
if m != nil {
return m.Segment
}
return nil
}
func (m *LabelSegment) GetConfidence() float32 {
if m != nil {
return m.Confidence
}
return 0
}
// Video frame level annotation results for label detection.
type LabelFrame struct {
// Time-offset, relative to the beginning of the video, corresponding to the
// video frame for this location.
TimeOffset *duration.Duration `protobuf:"bytes,1,opt,name=time_offset,json=timeOffset,proto3" json:"time_offset,omitempty"`
// Confidence that the label is accurate. Range: [0, 1].
Confidence float32 `protobuf:"fixed32,2,opt,name=confidence,proto3" json:"confidence,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *LabelFrame) Reset() { *m = LabelFrame{} }
func (m *LabelFrame) String() string { return proto.CompactTextString(m) }
func (*LabelFrame) ProtoMessage() {}
func (*LabelFrame) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{7}
}
func (m *LabelFrame) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_LabelFrame.Unmarshal(m, b)
}
func (m *LabelFrame) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_LabelFrame.Marshal(b, m, deterministic)
}
func (m *LabelFrame) XXX_Merge(src proto.Message) {
xxx_messageInfo_LabelFrame.Merge(m, src)
}
func (m *LabelFrame) XXX_Size() int {
return xxx_messageInfo_LabelFrame.Size(m)
}
func (m *LabelFrame) XXX_DiscardUnknown() {
xxx_messageInfo_LabelFrame.DiscardUnknown(m)
}
var xxx_messageInfo_LabelFrame proto.InternalMessageInfo
func (m *LabelFrame) GetTimeOffset() *duration.Duration {
if m != nil {
return m.TimeOffset
}
return nil
}
func (m *LabelFrame) GetConfidence() float32 {
if m != nil {
return m.Confidence
}
return 0
}
// Detected entity from video analysis.
type Entity struct {
// Opaque entity ID. Some IDs may be available in
// [Google Knowledge Graph Search
// API](https://developers.google.com/knowledge-graph/).
EntityId string `protobuf:"bytes,1,opt,name=entity_id,json=entityId,proto3" json:"entity_id,omitempty"`
// Textual description, e.g. `Fixed-gear bicycle`.
Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"`
// Language code for `description` in BCP-47 format.
LanguageCode string `protobuf:"bytes,3,opt,name=language_code,json=languageCode,proto3" json:"language_code,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *Entity) Reset() { *m = Entity{} }
func (m *Entity) String() string { return proto.CompactTextString(m) }
func (*Entity) ProtoMessage() {}
func (*Entity) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{8}
}
func (m *Entity) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_Entity.Unmarshal(m, b)
}
func (m *Entity) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_Entity.Marshal(b, m, deterministic)
}
func (m *Entity) XXX_Merge(src proto.Message) {
xxx_messageInfo_Entity.Merge(m, src)
}
func (m *Entity) XXX_Size() int {
return xxx_messageInfo_Entity.Size(m)
}
func (m *Entity) XXX_DiscardUnknown() {
xxx_messageInfo_Entity.DiscardUnknown(m)
}
var xxx_messageInfo_Entity proto.InternalMessageInfo
func (m *Entity) GetEntityId() string {
if m != nil {
return m.EntityId
}
return ""
}
func (m *Entity) GetDescription() string {
if m != nil {
return m.Description
}
return ""
}
func (m *Entity) GetLanguageCode() string {
if m != nil {
return m.LanguageCode
}
return ""
}
// Label annotation.
type LabelAnnotation struct {
// Detected entity.
Entity *Entity `protobuf:"bytes,1,opt,name=entity,proto3" json:"entity,omitempty"`
// Common categories for the detected entity.
// E.g. when the label is `Terrier` the category is likely `dog`. And in some
// cases there might be more than one categories e.g. `Terrier` could also be
// a `pet`.
CategoryEntities []*Entity `protobuf:"bytes,2,rep,name=category_entities,json=categoryEntities,proto3" json:"category_entities,omitempty"`
// All video segments where a label was detected.
Segments []*LabelSegment `protobuf:"bytes,3,rep,name=segments,proto3" json:"segments,omitempty"`
// All video frames where a label was detected.
Frames []*LabelFrame `protobuf:"bytes,4,rep,name=frames,proto3" json:"frames,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *LabelAnnotation) Reset() { *m = LabelAnnotation{} }
func (m *LabelAnnotation) String() string { return proto.CompactTextString(m) }
func (*LabelAnnotation) ProtoMessage() {}
func (*LabelAnnotation) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{9}
}
func (m *LabelAnnotation) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_LabelAnnotation.Unmarshal(m, b)
}
func (m *LabelAnnotation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_LabelAnnotation.Marshal(b, m, deterministic)
}
func (m *LabelAnnotation) XXX_Merge(src proto.Message) {
xxx_messageInfo_LabelAnnotation.Merge(m, src)
}
func (m *LabelAnnotation) XXX_Size() int {
return xxx_messageInfo_LabelAnnotation.Size(m)
}
func (m *LabelAnnotation) XXX_DiscardUnknown() {
xxx_messageInfo_LabelAnnotation.DiscardUnknown(m)
}
var xxx_messageInfo_LabelAnnotation proto.InternalMessageInfo
func (m *LabelAnnotation) GetEntity() *Entity {
if m != nil {
return m.Entity
}
return nil
}
func (m *LabelAnnotation) GetCategoryEntities() []*Entity {
if m != nil {
return m.CategoryEntities
}
return nil
}
func (m *LabelAnnotation) GetSegments() []*LabelSegment {
if m != nil {
return m.Segments
}
return nil
}
func (m *LabelAnnotation) GetFrames() []*LabelFrame {
if m != nil {
return m.Frames
}
return nil
}
// Video frame level annotation results for explicit content.
type ExplicitContentFrame struct {
// Time-offset, relative to the beginning of the video, corresponding to the
// video frame for this location.
TimeOffset *duration.Duration `protobuf:"bytes,1,opt,name=time_offset,json=timeOffset,proto3" json:"time_offset,omitempty"`
// Likelihood of the pornography content..
PornographyLikelihood Likelihood `protobuf:"varint,2,opt,name=pornography_likelihood,json=pornographyLikelihood,proto3,enum=google.cloud.videointelligence.v1p1beta1.Likelihood" json:"pornography_likelihood,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *ExplicitContentFrame) Reset() { *m = ExplicitContentFrame{} }
func (m *ExplicitContentFrame) String() string { return proto.CompactTextString(m) }
func (*ExplicitContentFrame) ProtoMessage() {}
func (*ExplicitContentFrame) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{10}
}
func (m *ExplicitContentFrame) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_ExplicitContentFrame.Unmarshal(m, b)
}
func (m *ExplicitContentFrame) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_ExplicitContentFrame.Marshal(b, m, deterministic)
}
func (m *ExplicitContentFrame) XXX_Merge(src proto.Message) {
xxx_messageInfo_ExplicitContentFrame.Merge(m, src)
}
func (m *ExplicitContentFrame) XXX_Size() int {
return xxx_messageInfo_ExplicitContentFrame.Size(m)
}
func (m *ExplicitContentFrame) XXX_DiscardUnknown() {
xxx_messageInfo_ExplicitContentFrame.DiscardUnknown(m)
}
var xxx_messageInfo_ExplicitContentFrame proto.InternalMessageInfo
func (m *ExplicitContentFrame) GetTimeOffset() *duration.Duration {
if m != nil {
return m.TimeOffset
}
return nil
}
func (m *ExplicitContentFrame) GetPornographyLikelihood() Likelihood {
if m != nil {
return m.PornographyLikelihood
}
return Likelihood_LIKELIHOOD_UNSPECIFIED
}
// Explicit content annotation (based on per-frame visual signals only).
// If no explicit content has been detected in a frame, no annotations are
// present for that frame.
type ExplicitContentAnnotation struct {
// All video frames where explicit content was detected.
Frames []*ExplicitContentFrame `protobuf:"bytes,1,rep,name=frames,proto3" json:"frames,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *ExplicitContentAnnotation) Reset() { *m = ExplicitContentAnnotation{} }
func (m *ExplicitContentAnnotation) String() string { return proto.CompactTextString(m) }
func (*ExplicitContentAnnotation) ProtoMessage() {}
func (*ExplicitContentAnnotation) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{11}
}
func (m *ExplicitContentAnnotation) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_ExplicitContentAnnotation.Unmarshal(m, b)
}
func (m *ExplicitContentAnnotation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_ExplicitContentAnnotation.Marshal(b, m, deterministic)
}
func (m *ExplicitContentAnnotation) XXX_Merge(src proto.Message) {
xxx_messageInfo_ExplicitContentAnnotation.Merge(m, src)
}
func (m *ExplicitContentAnnotation) XXX_Size() int {
return xxx_messageInfo_ExplicitContentAnnotation.Size(m)
}
func (m *ExplicitContentAnnotation) XXX_DiscardUnknown() {
xxx_messageInfo_ExplicitContentAnnotation.DiscardUnknown(m)
}
var xxx_messageInfo_ExplicitContentAnnotation proto.InternalMessageInfo
func (m *ExplicitContentAnnotation) GetFrames() []*ExplicitContentFrame {
if m != nil {
return m.Frames
}
return nil
}
// Annotation results for a single video.
type VideoAnnotationResults struct {
// Output only. Video file location in
// [Google Cloud Storage](https://cloud.google.com/storage/).
InputUri string `protobuf:"bytes,1,opt,name=input_uri,json=inputUri,proto3" json:"input_uri,omitempty"`
// Label annotations on video level or user specified segment level.
// There is exactly one element for each unique label.
SegmentLabelAnnotations []*LabelAnnotation `protobuf:"bytes,2,rep,name=segment_label_annotations,json=segmentLabelAnnotations,proto3" json:"segment_label_annotations,omitempty"`
// Label annotations on shot level.
// There is exactly one element for each unique label.
ShotLabelAnnotations []*LabelAnnotation `protobuf:"bytes,3,rep,name=shot_label_annotations,json=shotLabelAnnotations,proto3" json:"shot_label_annotations,omitempty"`
// Label annotations on frame level.
// There is exactly one element for each unique label.
FrameLabelAnnotations []*LabelAnnotation `protobuf:"bytes,4,rep,name=frame_label_annotations,json=frameLabelAnnotations,proto3" json:"frame_label_annotations,omitempty"`
// Shot annotations. Each shot is represented as a video segment.
ShotAnnotations []*VideoSegment `protobuf:"bytes,6,rep,name=shot_annotations,json=shotAnnotations,proto3" json:"shot_annotations,omitempty"`
// Explicit content annotation.
ExplicitAnnotation *ExplicitContentAnnotation `protobuf:"bytes,7,opt,name=explicit_annotation,json=explicitAnnotation,proto3" json:"explicit_annotation,omitempty"`
// Speech transcription.
SpeechTranscriptions []*SpeechTranscription `protobuf:"bytes,11,rep,name=speech_transcriptions,json=speechTranscriptions,proto3" json:"speech_transcriptions,omitempty"`
// Output only. If set, indicates an error. Note that for a single
// `AnnotateVideoRequest` some videos may succeed and some may fail.
Error *status.Status `protobuf:"bytes,9,opt,name=error,proto3" json:"error,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VideoAnnotationResults) Reset() { *m = VideoAnnotationResults{} }
func (m *VideoAnnotationResults) String() string { return proto.CompactTextString(m) }
func (*VideoAnnotationResults) ProtoMessage() {}
func (*VideoAnnotationResults) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{12}
}
func (m *VideoAnnotationResults) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VideoAnnotationResults.Unmarshal(m, b)
}
func (m *VideoAnnotationResults) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VideoAnnotationResults.Marshal(b, m, deterministic)
}
func (m *VideoAnnotationResults) XXX_Merge(src proto.Message) {
xxx_messageInfo_VideoAnnotationResults.Merge(m, src)
}
func (m *VideoAnnotationResults) XXX_Size() int {
return xxx_messageInfo_VideoAnnotationResults.Size(m)
}
func (m *VideoAnnotationResults) XXX_DiscardUnknown() {
xxx_messageInfo_VideoAnnotationResults.DiscardUnknown(m)
}
var xxx_messageInfo_VideoAnnotationResults proto.InternalMessageInfo
func (m *VideoAnnotationResults) GetInputUri() string {
if m != nil {
return m.InputUri
}
return ""
}
func (m *VideoAnnotationResults) GetSegmentLabelAnnotations() []*LabelAnnotation {
if m != nil {
return m.SegmentLabelAnnotations
}
return nil
}
func (m *VideoAnnotationResults) GetShotLabelAnnotations() []*LabelAnnotation {
if m != nil {
return m.ShotLabelAnnotations
}
return nil
}
func (m *VideoAnnotationResults) GetFrameLabelAnnotations() []*LabelAnnotation {
if m != nil {
return m.FrameLabelAnnotations
}
return nil
}
func (m *VideoAnnotationResults) GetShotAnnotations() []*VideoSegment {
if m != nil {
return m.ShotAnnotations
}
return nil
}
func (m *VideoAnnotationResults) GetExplicitAnnotation() *ExplicitContentAnnotation {
if m != nil {
return m.ExplicitAnnotation
}
return nil
}
func (m *VideoAnnotationResults) GetSpeechTranscriptions() []*SpeechTranscription {
if m != nil {
return m.SpeechTranscriptions
}
return nil
}
func (m *VideoAnnotationResults) GetError() *status.Status {
if m != nil {
return m.Error
}
return nil
}
// Video annotation response. Included in the `response`
// field of the `Operation` returned by the `GetOperation`
// call of the `google::longrunning::Operations` service.
type AnnotateVideoResponse struct {
// Annotation results for all videos specified in `AnnotateVideoRequest`.
AnnotationResults []*VideoAnnotationResults `protobuf:"bytes,1,rep,name=annotation_results,json=annotationResults,proto3" json:"annotation_results,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *AnnotateVideoResponse) Reset() { *m = AnnotateVideoResponse{} }
func (m *AnnotateVideoResponse) String() string { return proto.CompactTextString(m) }
func (*AnnotateVideoResponse) ProtoMessage() {}
func (*AnnotateVideoResponse) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{13}
}
func (m *AnnotateVideoResponse) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_AnnotateVideoResponse.Unmarshal(m, b)
}
func (m *AnnotateVideoResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_AnnotateVideoResponse.Marshal(b, m, deterministic)
}
func (m *AnnotateVideoResponse) XXX_Merge(src proto.Message) {
xxx_messageInfo_AnnotateVideoResponse.Merge(m, src)
}
func (m *AnnotateVideoResponse) XXX_Size() int {
return xxx_messageInfo_AnnotateVideoResponse.Size(m)
}
func (m *AnnotateVideoResponse) XXX_DiscardUnknown() {
xxx_messageInfo_AnnotateVideoResponse.DiscardUnknown(m)
}
var xxx_messageInfo_AnnotateVideoResponse proto.InternalMessageInfo
func (m *AnnotateVideoResponse) GetAnnotationResults() []*VideoAnnotationResults {
if m != nil {
return m.AnnotationResults
}
return nil
}
// Annotation progress for a single video.
type VideoAnnotationProgress struct {
// Output only. Video file location in
// [Google Cloud Storage](https://cloud.google.com/storage/).
InputUri string `protobuf:"bytes,1,opt,name=input_uri,json=inputUri,proto3" json:"input_uri,omitempty"`
// Output only. Approximate percentage processed thus far. Guaranteed to be
// 100 when fully processed.
ProgressPercent int32 `protobuf:"varint,2,opt,name=progress_percent,json=progressPercent,proto3" json:"progress_percent,omitempty"`
// Output only. Time when the request was received.
StartTime *timestamp.Timestamp `protobuf:"bytes,3,opt,name=start_time,json=startTime,proto3" json:"start_time,omitempty"`
// Output only. Time of the most recent update.
UpdateTime *timestamp.Timestamp `protobuf:"bytes,4,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VideoAnnotationProgress) Reset() { *m = VideoAnnotationProgress{} }
func (m *VideoAnnotationProgress) String() string { return proto.CompactTextString(m) }
func (*VideoAnnotationProgress) ProtoMessage() {}
func (*VideoAnnotationProgress) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{14}
}
func (m *VideoAnnotationProgress) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VideoAnnotationProgress.Unmarshal(m, b)
}
func (m *VideoAnnotationProgress) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VideoAnnotationProgress.Marshal(b, m, deterministic)
}
func (m *VideoAnnotationProgress) XXX_Merge(src proto.Message) {
xxx_messageInfo_VideoAnnotationProgress.Merge(m, src)
}
func (m *VideoAnnotationProgress) XXX_Size() int {
return xxx_messageInfo_VideoAnnotationProgress.Size(m)
}
func (m *VideoAnnotationProgress) XXX_DiscardUnknown() {
xxx_messageInfo_VideoAnnotationProgress.DiscardUnknown(m)
}
var xxx_messageInfo_VideoAnnotationProgress proto.InternalMessageInfo
func (m *VideoAnnotationProgress) GetInputUri() string {
if m != nil {
return m.InputUri
}
return ""
}
func (m *VideoAnnotationProgress) GetProgressPercent() int32 {
if m != nil {
return m.ProgressPercent
}
return 0
}
func (m *VideoAnnotationProgress) GetStartTime() *timestamp.Timestamp {
if m != nil {
return m.StartTime
}
return nil
}
func (m *VideoAnnotationProgress) GetUpdateTime() *timestamp.Timestamp {
if m != nil {
return m.UpdateTime
}
return nil
}
// Video annotation progress. Included in the `metadata`
// field of the `Operation` returned by the `GetOperation`
// call of the `google::longrunning::Operations` service.
type AnnotateVideoProgress struct {
// Progress metadata for all videos specified in `AnnotateVideoRequest`.
AnnotationProgress []*VideoAnnotationProgress `protobuf:"bytes,1,rep,name=annotation_progress,json=annotationProgress,proto3" json:"annotation_progress,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *AnnotateVideoProgress) Reset() { *m = AnnotateVideoProgress{} }
func (m *AnnotateVideoProgress) String() string { return proto.CompactTextString(m) }
func (*AnnotateVideoProgress) ProtoMessage() {}
func (*AnnotateVideoProgress) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{15}
}
func (m *AnnotateVideoProgress) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_AnnotateVideoProgress.Unmarshal(m, b)
}
func (m *AnnotateVideoProgress) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_AnnotateVideoProgress.Marshal(b, m, deterministic)
}
func (m *AnnotateVideoProgress) XXX_Merge(src proto.Message) {
xxx_messageInfo_AnnotateVideoProgress.Merge(m, src)
}
func (m *AnnotateVideoProgress) XXX_Size() int {
return xxx_messageInfo_AnnotateVideoProgress.Size(m)
}
func (m *AnnotateVideoProgress) XXX_DiscardUnknown() {
xxx_messageInfo_AnnotateVideoProgress.DiscardUnknown(m)
}
var xxx_messageInfo_AnnotateVideoProgress proto.InternalMessageInfo
func (m *AnnotateVideoProgress) GetAnnotationProgress() []*VideoAnnotationProgress {
if m != nil {
return m.AnnotationProgress
}
return nil
}
// Config for SPEECH_TRANSCRIPTION.
type SpeechTranscriptionConfig struct {
// *Required* The language of the supplied audio as a
// [BCP-47](https://www.rfc-editor.org/rfc/bcp/bcp47.txt) language tag.
// Example: "en-US".
// See [Language Support](https://cloud.google.com/speech/docs/languages)
// for a list of the currently supported language codes.
LanguageCode string `protobuf:"bytes,1,opt,name=language_code,json=languageCode,proto3" json:"language_code,omitempty"`
// *Optional* Maximum number of recognition hypotheses to be returned.
// Specifically, the maximum number of `SpeechRecognitionAlternative` messages
// within each `SpeechRecognitionResult`. The server may return fewer than
// `max_alternatives`. Valid values are `0`-`30`. A value of `0` or `1` will
// return a maximum of one. If omitted, will return a maximum of one.
MaxAlternatives int32 `protobuf:"varint,2,opt,name=max_alternatives,json=maxAlternatives,proto3" json:"max_alternatives,omitempty"`
// *Optional* If set to `true`, the server will attempt to filter out
// profanities, replacing all but the initial character in each filtered word
// with asterisks, e.g. "f***". If set to `false` or omitted, profanities
// won't be filtered out.
FilterProfanity bool `protobuf:"varint,3,opt,name=filter_profanity,json=filterProfanity,proto3" json:"filter_profanity,omitempty"`
// *Optional* A means to provide context to assist the speech recognition.
SpeechContexts []*SpeechContext `protobuf:"bytes,4,rep,name=speech_contexts,json=speechContexts,proto3" json:"speech_contexts,omitempty"`
// *Optional* If 'true', adds punctuation to recognition result hypotheses.
// This feature is only available in select languages. Setting this for
// requests in other languages has no effect at all. The default 'false' value
// does not add punctuation to result hypotheses. NOTE: "This is currently
// offered as an experimental service, complimentary to all users. In the
// future this may be exclusively available as a premium feature."
EnableAutomaticPunctuation bool `protobuf:"varint,5,opt,name=enable_automatic_punctuation,json=enableAutomaticPunctuation,proto3" json:"enable_automatic_punctuation,omitempty"`
// *Optional* For file formats, such as MXF or MKV, supporting multiple audio
// tracks, specify up to two tracks. Default: track 0.
AudioTracks []int32 `protobuf:"varint,6,rep,packed,name=audio_tracks,json=audioTracks,proto3" json:"audio_tracks,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *SpeechTranscriptionConfig) Reset() { *m = SpeechTranscriptionConfig{} }
func (m *SpeechTranscriptionConfig) String() string { return proto.CompactTextString(m) }
func (*SpeechTranscriptionConfig) ProtoMessage() {}
func (*SpeechTranscriptionConfig) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{16}
}
func (m *SpeechTranscriptionConfig) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_SpeechTranscriptionConfig.Unmarshal(m, b)
}
func (m *SpeechTranscriptionConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_SpeechTranscriptionConfig.Marshal(b, m, deterministic)
}
func (m *SpeechTranscriptionConfig) XXX_Merge(src proto.Message) {
xxx_messageInfo_SpeechTranscriptionConfig.Merge(m, src)
}
func (m *SpeechTranscriptionConfig) XXX_Size() int {
return xxx_messageInfo_SpeechTranscriptionConfig.Size(m)
}
func (m *SpeechTranscriptionConfig) XXX_DiscardUnknown() {
xxx_messageInfo_SpeechTranscriptionConfig.DiscardUnknown(m)
}
var xxx_messageInfo_SpeechTranscriptionConfig proto.InternalMessageInfo
func (m *SpeechTranscriptionConfig) GetLanguageCode() string {
if m != nil {
return m.LanguageCode
}
return ""
}
func (m *SpeechTranscriptionConfig) GetMaxAlternatives() int32 {
if m != nil {
return m.MaxAlternatives
}
return 0
}
func (m *SpeechTranscriptionConfig) GetFilterProfanity() bool {
if m != nil {
return m.FilterProfanity
}
return false
}
func (m *SpeechTranscriptionConfig) GetSpeechContexts() []*SpeechContext {
if m != nil {
return m.SpeechContexts
}
return nil
}
func (m *SpeechTranscriptionConfig) GetEnableAutomaticPunctuation() bool {
if m != nil {
return m.EnableAutomaticPunctuation
}
return false
}
func (m *SpeechTranscriptionConfig) GetAudioTracks() []int32 {
if m != nil {
return m.AudioTracks
}
return nil
}
// Provides "hints" to the speech recognizer to favor specific words and phrases
// in the results.
type SpeechContext struct {
// *Optional* A list of strings containing words and phrases "hints" so that
// the speech recognition is more likely to recognize them. This can be used
// to improve the accuracy for specific words and phrases, for example, if
// specific commands are typically spoken by the user. This can also be used
// to add additional words to the vocabulary of the recognizer. See
// [usage limits](https://cloud.google.com/speech/limits#content).
Phrases []string `protobuf:"bytes,1,rep,name=phrases,proto3" json:"phrases,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *SpeechContext) Reset() { *m = SpeechContext{} }
func (m *SpeechContext) String() string { return proto.CompactTextString(m) }
func (*SpeechContext) ProtoMessage() {}
func (*SpeechContext) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{17}
}
func (m *SpeechContext) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_SpeechContext.Unmarshal(m, b)
}
func (m *SpeechContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_SpeechContext.Marshal(b, m, deterministic)
}
func (m *SpeechContext) XXX_Merge(src proto.Message) {
xxx_messageInfo_SpeechContext.Merge(m, src)
}
func (m *SpeechContext) XXX_Size() int {
return xxx_messageInfo_SpeechContext.Size(m)
}
func (m *SpeechContext) XXX_DiscardUnknown() {
xxx_messageInfo_SpeechContext.DiscardUnknown(m)
}
var xxx_messageInfo_SpeechContext proto.InternalMessageInfo
func (m *SpeechContext) GetPhrases() []string {
if m != nil {
return m.Phrases
}
return nil
}
// A speech recognition result corresponding to a portion of the audio.
type SpeechTranscription struct {
// Output only. May contain one or more recognition hypotheses (up to the
// maximum specified in `max_alternatives`).
// These alternatives are ordered in terms of accuracy, with the top (first)
// alternative being the most probable, as ranked by the recognizer.
Alternatives []*SpeechRecognitionAlternative `protobuf:"bytes,1,rep,name=alternatives,proto3" json:"alternatives,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *SpeechTranscription) Reset() { *m = SpeechTranscription{} }
func (m *SpeechTranscription) String() string { return proto.CompactTextString(m) }
func (*SpeechTranscription) ProtoMessage() {}
func (*SpeechTranscription) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{18}
}
func (m *SpeechTranscription) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_SpeechTranscription.Unmarshal(m, b)
}
func (m *SpeechTranscription) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_SpeechTranscription.Marshal(b, m, deterministic)
}
func (m *SpeechTranscription) XXX_Merge(src proto.Message) {
xxx_messageInfo_SpeechTranscription.Merge(m, src)
}
func (m *SpeechTranscription) XXX_Size() int {
return xxx_messageInfo_SpeechTranscription.Size(m)
}
func (m *SpeechTranscription) XXX_DiscardUnknown() {
xxx_messageInfo_SpeechTranscription.DiscardUnknown(m)
}
var xxx_messageInfo_SpeechTranscription proto.InternalMessageInfo
func (m *SpeechTranscription) GetAlternatives() []*SpeechRecognitionAlternative {
if m != nil {
return m.Alternatives
}
return nil
}
// Alternative hypotheses (a.k.a. n-best list).
type SpeechRecognitionAlternative struct {
// Output only. Transcript text representing the words that the user spoke.
Transcript string `protobuf:"bytes,1,opt,name=transcript,proto3" json:"transcript,omitempty"`
// Output only. The confidence estimate between 0.0 and 1.0. A higher number
// indicates an estimated greater likelihood that the recognized words are
// correct. This field is typically provided only for the top hypothesis, and
// only for `is_final=true` results. Clients should not rely on the
// `confidence` field as it is not guaranteed to be accurate or consistent.
// The default of 0.0 is a sentinel value indicating `confidence` was not set.
Confidence float32 `protobuf:"fixed32,2,opt,name=confidence,proto3" json:"confidence,omitempty"`
// Output only. A list of word-specific information for each recognized word.
Words []*WordInfo `protobuf:"bytes,3,rep,name=words,proto3" json:"words,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *SpeechRecognitionAlternative) Reset() { *m = SpeechRecognitionAlternative{} }
func (m *SpeechRecognitionAlternative) String() string { return proto.CompactTextString(m) }
func (*SpeechRecognitionAlternative) ProtoMessage() {}
func (*SpeechRecognitionAlternative) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{19}
}
func (m *SpeechRecognitionAlternative) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_SpeechRecognitionAlternative.Unmarshal(m, b)
}
func (m *SpeechRecognitionAlternative) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_SpeechRecognitionAlternative.Marshal(b, m, deterministic)
}
func (m *SpeechRecognitionAlternative) XXX_Merge(src proto.Message) {
xxx_messageInfo_SpeechRecognitionAlternative.Merge(m, src)
}
func (m *SpeechRecognitionAlternative) XXX_Size() int {
return xxx_messageInfo_SpeechRecognitionAlternative.Size(m)
}
func (m *SpeechRecognitionAlternative) XXX_DiscardUnknown() {
xxx_messageInfo_SpeechRecognitionAlternative.DiscardUnknown(m)
}
var xxx_messageInfo_SpeechRecognitionAlternative proto.InternalMessageInfo
func (m *SpeechRecognitionAlternative) GetTranscript() string {
if m != nil {
return m.Transcript
}
return ""
}
func (m *SpeechRecognitionAlternative) GetConfidence() float32 {
if m != nil {
return m.Confidence
}
return 0
}
func (m *SpeechRecognitionAlternative) GetWords() []*WordInfo {
if m != nil {
return m.Words
}
return nil
}
// Word-specific information for recognized words. Word information is only
// included in the response when certain request parameters are set, such
// as `enable_word_time_offsets`.
type WordInfo struct {
// Output only. Time offset relative to the beginning of the audio, and
// corresponding to the start of the spoken word. This field is only set if
// `enable_word_time_offsets=true` and only in the top hypothesis. This is an
// experimental feature and the accuracy of the time offset can vary.
StartTime *duration.Duration `protobuf:"bytes,1,opt,name=start_time,json=startTime,proto3" json:"start_time,omitempty"`
// Output only. Time offset relative to the beginning of the audio, and
// corresponding to the end of the spoken word. This field is only set if
// `enable_word_time_offsets=true` and only in the top hypothesis. This is an
// experimental feature and the accuracy of the time offset can vary.
EndTime *duration.Duration `protobuf:"bytes,2,opt,name=end_time,json=endTime,proto3" json:"end_time,omitempty"`
// Output only. The word corresponding to this set of information.
Word string `protobuf:"bytes,3,opt,name=word,proto3" json:"word,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *WordInfo) Reset() { *m = WordInfo{} }
func (m *WordInfo) String() string { return proto.CompactTextString(m) }
func (*WordInfo) ProtoMessage() {}
func (*WordInfo) Descriptor() ([]byte, []int) {
return fileDescriptor_9e6ec0147460ac77, []int{20}
}
func (m *WordInfo) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_WordInfo.Unmarshal(m, b)
}
func (m *WordInfo) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_WordInfo.Marshal(b, m, deterministic)
}
func (m *WordInfo) XXX_Merge(src proto.Message) {
xxx_messageInfo_WordInfo.Merge(m, src)
}
func (m *WordInfo) XXX_Size() int {
return xxx_messageInfo_WordInfo.Size(m)
}
func (m *WordInfo) XXX_DiscardUnknown() {
xxx_messageInfo_WordInfo.DiscardUnknown(m)
}
var xxx_messageInfo_WordInfo proto.InternalMessageInfo
func (m *WordInfo) GetStartTime() *duration.Duration {
if m != nil {
return m.StartTime
}
return nil
}
func (m *WordInfo) GetEndTime() *duration.Duration {
if m != nil {
return m.EndTime
}
return nil
}
func (m *WordInfo) GetWord() string {
if m != nil {
return m.Word
}
return ""
}
func init() {
proto.RegisterEnum("google.cloud.videointelligence.v1p1beta1.Feature", Feature_name, Feature_value)
proto.RegisterEnum("google.cloud.videointelligence.v1p1beta1.LabelDetectionMode", LabelDetectionMode_name, LabelDetectionMode_value)
proto.RegisterEnum("google.cloud.videointelligence.v1p1beta1.Likelihood", Likelihood_name, Likelihood_value)
proto.RegisterType((*AnnotateVideoRequest)(nil), "google.cloud.videointelligence.v1p1beta1.AnnotateVideoRequest")
proto.RegisterType((*VideoContext)(nil), "google.cloud.videointelligence.v1p1beta1.VideoContext")
proto.RegisterType((*LabelDetectionConfig)(nil), "google.cloud.videointelligence.v1p1beta1.LabelDetectionConfig")
proto.RegisterType((*ShotChangeDetectionConfig)(nil), "google.cloud.videointelligence.v1p1beta1.ShotChangeDetectionConfig")
proto.RegisterType((*ExplicitContentDetectionConfig)(nil), "google.cloud.videointelligence.v1p1beta1.ExplicitContentDetectionConfig")
proto.RegisterType((*VideoSegment)(nil), "google.cloud.videointelligence.v1p1beta1.VideoSegment")
proto.RegisterType((*LabelSegment)(nil), "google.cloud.videointelligence.v1p1beta1.LabelSegment")
proto.RegisterType((*LabelFrame)(nil), "google.cloud.videointelligence.v1p1beta1.LabelFrame")
proto.RegisterType((*Entity)(nil), "google.cloud.videointelligence.v1p1beta1.Entity")
proto.RegisterType((*LabelAnnotation)(nil), "google.cloud.videointelligence.v1p1beta1.LabelAnnotation")
proto.RegisterType((*ExplicitContentFrame)(nil), "google.cloud.videointelligence.v1p1beta1.ExplicitContentFrame")
proto.RegisterType((*ExplicitContentAnnotation)(nil), "google.cloud.videointelligence.v1p1beta1.ExplicitContentAnnotation")
proto.RegisterType((*VideoAnnotationResults)(nil), "google.cloud.videointelligence.v1p1beta1.VideoAnnotationResults")
proto.RegisterType((*AnnotateVideoResponse)(nil), "google.cloud.videointelligence.v1p1beta1.AnnotateVideoResponse")
proto.RegisterType((*VideoAnnotationProgress)(nil), "google.cloud.videointelligence.v1p1beta1.VideoAnnotationProgress")
proto.RegisterType((*AnnotateVideoProgress)(nil), "google.cloud.videointelligence.v1p1beta1.AnnotateVideoProgress")
proto.RegisterType((*SpeechTranscriptionConfig)(nil), "google.cloud.videointelligence.v1p1beta1.SpeechTranscriptionConfig")
proto.RegisterType((*SpeechContext)(nil), "google.cloud.videointelligence.v1p1beta1.SpeechContext")
proto.RegisterType((*SpeechTranscription)(nil), "google.cloud.videointelligence.v1p1beta1.SpeechTranscription")
proto.RegisterType((*SpeechRecognitionAlternative)(nil), "google.cloud.videointelligence.v1p1beta1.SpeechRecognitionAlternative")
proto.RegisterType((*WordInfo)(nil), "google.cloud.videointelligence.v1p1beta1.WordInfo")
}
// Reference imports to suppress errors if they are not otherwise used.
var _ context.Context
var _ grpc.ClientConn
// This is a compile-time assertion to ensure that this generated file
// is compatible with the grpc package it is being compiled against.
const _ = grpc.SupportPackageIsVersion4
// VideoIntelligenceServiceClient is the client API for VideoIntelligenceService service.
//
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
type VideoIntelligenceServiceClient interface {
// Performs asynchronous video annotation. Progress and results can be
// retrieved through the `google.longrunning.Operations` interface.
// `Operation.metadata` contains `AnnotateVideoProgress` (progress).
// `Operation.response` contains `AnnotateVideoResponse` (results).
AnnotateVideo(ctx context.Context, in *AnnotateVideoRequest, opts ...grpc.CallOption) (*longrunning.Operation, error)
}
type videoIntelligenceServiceClient struct {
cc *grpc.ClientConn
}
func NewVideoIntelligenceServiceClient(cc *grpc.ClientConn) VideoIntelligenceServiceClient {
return &videoIntelligenceServiceClient{cc}
}
func (c *videoIntelligenceServiceClient) AnnotateVideo(ctx context.Context, in *AnnotateVideoRequest, opts ...grpc.CallOption) (*longrunning.Operation, error) {
out := new(longrunning.Operation)
err := c.cc.Invoke(ctx, "/google.cloud.videointelligence.v1p1beta1.VideoIntelligenceService/AnnotateVideo", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
// VideoIntelligenceServiceServer is the server API for VideoIntelligenceService service.
type VideoIntelligenceServiceServer interface {
// Performs asynchronous video annotation. Progress and results can be
// retrieved through the `google.longrunning.Operations` interface.
// `Operation.metadata` contains `AnnotateVideoProgress` (progress).
// `Operation.response` contains `AnnotateVideoResponse` (results).
AnnotateVideo(context.Context, *AnnotateVideoRequest) (*longrunning.Operation, error)
}
func RegisterVideoIntelligenceServiceServer(s *grpc.Server, srv VideoIntelligenceServiceServer) {
s.RegisterService(&_VideoIntelligenceService_serviceDesc, srv)
}
func _VideoIntelligenceService_AnnotateVideo_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(AnnotateVideoRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(VideoIntelligenceServiceServer).AnnotateVideo(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.videointelligence.v1p1beta1.VideoIntelligenceService/AnnotateVideo",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(VideoIntelligenceServiceServer).AnnotateVideo(ctx, req.(*AnnotateVideoRequest))
}
return interceptor(ctx, in, info, handler)
}
var _VideoIntelligenceService_serviceDesc = grpc.ServiceDesc{
ServiceName: "google.cloud.videointelligence.v1p1beta1.VideoIntelligenceService",
HandlerType: (*VideoIntelligenceServiceServer)(nil),
Methods: []grpc.MethodDesc{
{
MethodName: "AnnotateVideo",
Handler: _VideoIntelligenceService_AnnotateVideo_Handler,
},
},
Streams: []grpc.StreamDesc{},
Metadata: "google/cloud/videointelligence/v1p1beta1/video_intelligence.proto",
}
func init() {
proto.RegisterFile("google/cloud/videointelligence/v1p1beta1/video_intelligence.proto", fileDescriptor_9e6ec0147460ac77)
}
var fileDescriptor_9e6ec0147460ac77 = []byte{
// 1807 bytes of a gzipped FileDescriptorProto
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xa4, 0x58, 0xcd, 0x6f, 0x23, 0x49,
0x15, 0xa7, 0xed, 0xc4, 0x89, 0x9f, 0x9d, 0xd8, 0x53, 0x71, 0x12, 0x27, 0x3b, 0x93, 0xc9, 0xf6,
0x82, 0x94, 0x1d, 0x90, 0x4d, 0xc2, 0x6a, 0x61, 0x67, 0x61, 0xb5, 0x8e, 0xd3, 0xd9, 0x58, 0x64,
0x62, 0xab, 0xec, 0x09, 0x0c, 0x0c, 0x6a, 0x3a, 0xdd, 0xe5, 0x4e, 0x33, 0xed, 0xae, 0xde, 0xee,
0xea, 0x30, 0x73, 0x5b, 0x3e, 0x24, 0x90, 0x40, 0x5c, 0x46, 0x48, 0xfc, 0x09, 0x88, 0x23, 0xff,
0x00, 0x17, 0x2e, 0x70, 0xe5, 0x84, 0x04, 0x37, 0xfe, 0x0b, 0x2e, 0xab, 0xae, 0xaa, 0xb6, 0xdb,
0x76, 0xbe, 0x9c, 0xdc, 0xdc, 0xef, 0xe3, 0xf7, 0x3e, 0xea, 0xd5, 0x7b, 0xaf, 0x0c, 0x0d, 0x9b,
0x52, 0xdb, 0x25, 0x75, 0xd3, 0xa5, 0x91, 0x55, 0xbf, 0x70, 0x2c, 0x42, 0x1d, 0x8f, 0x11, 0xd7,
0x75, 0x6c, 0xe2, 0x99, 0xa4, 0x7e, 0xb1, 0xeb, 0xef, 0x9e, 0x11, 0x66, 0xec, 0x0a, 0x9e, 0x9e,
0x66, 0xd6, 0xfc, 0x80, 0x32, 0x8a, 0x76, 0x04, 0x44, 0x8d, 0x43, 0xd4, 0xa6, 0x20, 0x6a, 0x43,
0x88, 0xcd, 0x87, 0xd2, 0x98, 0xe1, 0x3b, 0x75, 0xc3, 0xf3, 0x28, 0x33, 0x98, 0x43, 0xbd, 0x50,
0xe0, 0x6c, 0xbe, 0x27, 0xb9, 0x2e, 0xf5, 0xec, 0x20, 0xf2, 0x3c, 0xc7, 0xb3, 0xeb, 0xd4, 0x27,
0xc1, 0x98, 0xd0, 0x96, 0x14, 0xe2, 0x5f, 0x67, 0x51, 0xbf, 0x6e, 0x45, 0x42, 0x40, 0xf2, 0x1f,
0x4f, 0xf2, 0x99, 0x33, 0x20, 0x21, 0x33, 0x06, 0xbe, 0x14, 0x58, 0x97, 0x02, 0x81, 0x6f, 0xd6,
0x43, 0x66, 0xb0, 0x48, 0x22, 0xab, 0x7f, 0xcf, 0x40, 0xa5, 0x21, 0x9c, 0x22, 0xa7, 0x71, 0x10,
0x98, 0x7c, 0x1e, 0x91, 0x90, 0xa1, 0x77, 0x20, 0xef, 0x78, 0x7e, 0xc4, 0xf4, 0x28, 0x70, 0xaa,
0xca, 0xb6, 0xb2, 0x93, 0xc7, 0x8b, 0x9c, 0xf0, 0x3c, 0x70, 0xd0, 0x7b, 0xb0, 0x24, 0x98, 0x26,
0xf5, 0x18, 0xf1, 0x58, 0x35, 0xb7, 0xad, 0xec, 0x14, 0x71, 0x91, 0x13, 0x9b, 0x82, 0x86, 0x9e,
0xc1, 0x62, 0x9f, 0x18, 0x2c, 0x0a, 0x48, 0x58, 0xcd, 0x6c, 0x67, 0x77, 0x96, 0xf7, 0x76, 0x6b,
0xb7, 0x4d, 0x5a, 0xed, 0x50, 0x68, 0xe2, 0x21, 0x04, 0xfa, 0x31, 0x2c, 0x89, 0xc3, 0xe0, 0x36,
0x5f, 0xb3, 0x6a, 0x76, 0x5b, 0xd9, 0x29, 0xec, 0x7d, 0x78, 0x7b, 0x4c, 0x1e, 0x5f, 0x53, 0x68,
0xe3, 0xe2, 0x45, 0xea, 0x0b, 0x3d, 0x02, 0xa0, 0x11, 0x4b, 0xc2, 0x9d, 0xe3, 0xe1, 0xe6, 0x05,
0x25, 0x8e, 0xf7, 0x31, 0x14, 0x5c, 0x6a, 0xf2, 0x8c, 0xeb, 0x8e, 0x55, 0x9d, 0xe7, 0x7c, 0x48,
0x48, 0x2d, 0x4b, 0xfd, 0xff, 0x1c, 0x14, 0xd3, 0xf0, 0x08, 0xc3, 0x62, 0x48, 0xec, 0x01, 0xf1,
0x58, 0x58, 0x55, 0xb6, 0xb3, 0x77, 0x70, 0xb4, 0x2b, 0xd4, 0xf1, 0x10, 0x07, 0x31, 0x58, 0x73,
0x8d, 0x33, 0xe2, 0xea, 0x16, 0x61, 0xc4, 0xe4, 0xce, 0x98, 0xd4, 0xeb, 0x3b, 0x76, 0x35, 0xc3,
0x53, 0xf1, 0xc9, 0xed, 0x2d, 0x1c, 0xc7, 0x38, 0x07, 0x09, 0x4c, 0x93, 0xa3, 0xe0, 0x8a, 0x7b,
0x09, 0x15, 0xfd, 0x5a, 0x81, 0x87, 0xe1, 0x39, 0x65, 0xba, 0x79, 0x6e, 0x78, 0x36, 0x99, 0x36,
0x2e, 0xce, 0xa1, 0x79, 0x7b, 0xe3, 0xdd, 0x73, 0xca, 0x9a, 0x1c, 0x6c, 0xd2, 0x83, 0x8d, 0xf0,
0x2a, 0x16, 0x7a, 0xab, 0xc0, 0xbb, 0xe4, 0xb5, 0xef, 0x3a, 0xa6, 0x33, 0x2c, 0xbb, 0x69, 0x5f,
0xe6, 0xb8, 0x2f, 0x47, 0xb7, 0xf7, 0x45, 0x93, 0x90, 0xb2, 0x68, 0x27, 0x1d, 0xda, 0x22, 0xd7,
0xf2, 0xd1, 0xaf, 0x14, 0x78, 0x27, 0xf4, 0x09, 0x31, 0xcf, 0x75, 0x16, 0x18, 0x5e, 0x68, 0x06,
0x8e, 0x9f, 0xf6, 0x27, 0x37, 0x73, 0x6e, 0x38, 0x58, 0x2f, 0x8d, 0x35, 0xcc, 0xcd, 0x55, 0x2c,
0xf5, 0x1f, 0x0a, 0x54, 0x2e, 0x3b, 0x51, 0xe4, 0x41, 0x65, 0xb2, 0x62, 0x06, 0xd4, 0x22, 0xfc,
0x3e, 0x2f, 0xef, 0x7d, 0xf7, 0xae, 0xf5, 0xf2, 0x8c, 0x5a, 0x04, 0x23, 0x77, 0x8a, 0x86, 0xbe,
0x0e, 0x0f, 0x42, 0xd1, 0xde, 0x8c, 0xe0, 0x8d, 0x6e, 0x1a, 0x03, 0x12, 0x18, 0xbc, 0x38, 0x17,
0x71, 0x79, 0xc4, 0x68, 0x72, 0x3a, 0xaa, 0xc0, 0x7c, 0xec, 0x8c, 0xcb, 0x0b, 0x28, 0x8f, 0xc5,
0x87, 0xba, 0x0b, 0x1b, 0x57, 0xd6, 0xc7, 0x48, 0x45, 0x49, 0xab, 0x7c, 0x08, 0x5b, 0xd7, 0x1f,
0xe3, 0x15, 0x7a, 0x7f, 0x52, 0xe4, 0xa5, 0x95, 0x57, 0x0d, 0x69, 0xdc, 0xfd, 0x80, 0xe9, 0x71,
0xfb, 0xd4, 0x69, 0xbf, 0x1f, 0x12, 0xc6, 0x55, 0x0a, 0x7b, 0x1b, 0x49, 0xae, 0x92, 0x16, 0x5b,
0x3b, 0x90, 0x2d, 0x18, 0x97, 0xb8, 0x4e, 0xcf, 0x19, 0x90, 0x36, 0xd7, 0x40, 0x0d, 0x28, 0x11,
0xcf, 0x1a, 0x03, 0xc9, 0xdc, 0x04, 0xb2, 0x44, 0x3c, 0x6b, 0x04, 0xa1, 0x7e, 0xa1, 0x40, 0x91,
0xe7, 0x3c, 0x71, 0xad, 0x03, 0x0b, 0xb2, 0x0f, 0x48, 0x87, 0xee, 0xda, 0x4e, 0x12, 0x18, 0xb4,
0x05, 0xc0, 0x8b, 0xd4, 0x8a, 0xa5, 0xb9, 0x83, 0x19, 0x9c, 0xa2, 0xa8, 0xe7, 0x00, 0xdc, 0x83,
0xc3, 0xc0, 0x18, 0x10, 0xf4, 0x14, 0x0a, 0x33, 0x25, 0x05, 0xd8, 0x28, 0x1f, 0x37, 0x59, 0x72,
0x21, 0xa7, 0x79, 0xcc, 0x61, 0x6f, 0xe2, 0xa1, 0x43, 0xf8, 0xaf, 0xb8, 0xcb, 0xca, 0xa1, 0x23,
0x08, 0x2d, 0x0b, 0x6d, 0x43, 0xc1, 0x22, 0xc3, 0xd2, 0xe7, 0x38, 0x79, 0x9c, 0x26, 0xc5, 0x63,
0xc9, 0x35, 0x3c, 0x3b, 0x32, 0x6c, 0xa2, 0x9b, 0x71, 0x9d, 0x8b, 0xca, 0x2a, 0x26, 0xc4, 0x26,
0xb5, 0x88, 0xfa, 0x9f, 0x0c, 0x94, 0x78, 0x60, 0x8d, 0xe1, 0x2c, 0x46, 0x47, 0x90, 0x13, 0x66,
0x64, 0x60, 0xdf, 0x9c, 0xa1, 0x81, 0x70, 0x3d, 0x2c, 0xf5, 0xd1, 0x4f, 0xe0, 0x81, 0x69, 0x30,
0x62, 0xd3, 0xe0, 0x8d, 0xce, 0x49, 0x8e, 0x9c, 0x7e, 0x77, 0x01, 0x2d, 0x27, 0x50, 0x9a, 0x44,
0x1a, 0x1b, 0x2b, 0xd9, 0x59, 0xc7, 0x4a, 0xba, 0xa0, 0x52, 0x63, 0xe5, 0x18, 0x72, 0xfd, 0xf8,
0x8c, 0xc3, 0xea, 0x1c, 0x47, 0xfc, 0x60, 0x46, 0x44, 0x5e, 0x20, 0x58, 0x62, 0xa8, 0x7f, 0x53,
0xa0, 0x32, 0x71, 0x1b, 0xef, 0x5f, 0x41, 0xaf, 0x60, 0xcd, 0xa7, 0x81, 0x47, 0xed, 0xc0, 0xf0,
0xcf, 0xdf, 0xe8, 0xae, 0xf3, 0x8a, 0xb8, 0xce, 0x39, 0xa5, 0x16, 0xaf, 0x82, 0xe5, 0x99, 0x5c,
0x1e, 0xea, 0xe2, 0xd5, 0x14, 0xe6, 0x88, 0xac, 0x86, 0xb0, 0x31, 0x11, 0x40, 0xaa, 0x52, 0x4e,
0x87, 0xc9, 0x12, 0x53, 0xfd, 0x93, 0x3b, 0x8f, 0x9a, 0xf1, 0xb4, 0xfd, 0x26, 0x07, 0x6b, 0xfc,
0x9e, 0x8e, 0x6c, 0x61, 0x12, 0x46, 0x2e, 0x0b, 0xaf, 0xdf, 0xc4, 0x22, 0xd8, 0x90, 0x07, 0xa9,
0x8b, 0x4e, 0x9f, 0xda, 0x30, 0x65, 0xdd, 0x7d, 0x34, 0xe3, 0x79, 0xa6, 0x3c, 0x58, 0x97, 0xd8,
0x13, 0xf4, 0x10, 0x51, 0x58, 0xe3, 0x3b, 0xc1, 0xb4, 0xcd, 0xec, 0x7d, 0x6d, 0x56, 0x62, 0xe0,
0x29, 0x83, 0x9f, 0xc3, 0x3a, 0xcf, 0xd4, 0x25, 0x16, 0xe7, 0xee, 0x6b, 0x71, 0x95, 0x23, 0x4f,
0x99, 0x34, 0xa0, 0xcc, 0x63, 0x4c, 0xdb, 0xca, 0xdd, 0x6b, 0x95, 0x2b, 0xc5, 0x78, 0x69, 0x13,
0x0c, 0x56, 0x86, 0x3b, 0xcd, 0xc8, 0x4c, 0x75, 0x61, 0xd6, 0xad, 0xe1, 0xca, 0x7a, 0xc5, 0x28,
0xc1, 0x4f, 0xd5, 0x70, 0x00, 0xab, 0x97, 0xed, 0x2c, 0x61, 0xb5, 0xc0, 0xa3, 0xfb, 0xde, 0xbd,
0xb6, 0x15, 0x5c, 0xb9, 0x64, 0x4f, 0x09, 0xd1, 0x0e, 0xcc, 0x93, 0x20, 0xa0, 0x41, 0x35, 0xcf,
0x63, 0x43, 0x89, 0x8d, 0xc0, 0x37, 0x6b, 0x5d, 0xfe, 0x20, 0xc1, 0x42, 0x40, 0xfd, 0xad, 0x02,
0xab, 0x13, 0x2f, 0x92, 0xd0, 0xa7, 0x5e, 0x48, 0x10, 0x05, 0x34, 0x4a, 0x92, 0x1e, 0x88, 0xeb,
0x21, 0xef, 0xe1, 0xa7, 0x33, 0x1e, 0xc9, 0xd4, 0x35, 0xc3, 0x0f, 0x8c, 0x49, 0x92, 0xfa, 0x6f,
0x05, 0xd6, 0x27, 0xa4, 0x3b, 0x01, 0xb5, 0x03, 0x12, 0xde, 0x70, 0x2b, 0xdf, 0x87, 0xb2, 0x2f,
0x05, 0x75, 0x9f, 0x04, 0x66, 0x3c, 0xb6, 0xe3, 0x4e, 0x35, 0x8f, 0x4b, 0x09, 0xbd, 0x23, 0xc8,
0xe8, 0x23, 0x80, 0xd1, 0xce, 0x21, 0x77, 0xe9, 0xcd, 0xa9, 0xae, 0xd8, 0x4b, 0xde, 0x73, 0x38,
0x3f, 0xdc, 0x36, 0xd0, 0xc7, 0x50, 0x88, 0x7c, 0xcb, 0x60, 0x44, 0xe8, 0xce, 0xdd, 0xa8, 0x0b,
0x42, 0x3c, 0x26, 0xa8, 0xbf, 0x9b, 0x4c, 0xf3, 0x30, 0xb2, 0x00, 0x56, 0x52, 0x69, 0x4e, 0xfc,
0x95, 0x79, 0x6e, 0xdc, 0x39, 0xcf, 0x09, 0x3e, 0x4e, 0x1d, 0x62, 0x42, 0x53, 0xff, 0x9b, 0x81,
0x8d, 0x2b, 0x57, 0xdf, 0xe9, 0xb9, 0xae, 0x4c, 0xcf, 0xf5, 0x38, 0xe7, 0x03, 0xe3, 0xb5, 0x6e,
0xb8, 0x8c, 0x04, 0x9e, 0xc1, 0x9c, 0x0b, 0x3e, 0x78, 0x79, 0xce, 0x07, 0xc6, 0xeb, 0x46, 0x8a,
0x1c, 0x8b, 0xf6, 0x9d, 0x98, 0x10, 0x47, 0xd7, 0x37, 0xbc, 0x78, 0xf0, 0x67, 0xf9, 0x96, 0x5a,
0x12, 0xf4, 0x4e, 0x42, 0x46, 0x3f, 0x85, 0x92, 0xbc, 0x2b, 0xf2, 0xd9, 0x99, 0xf4, 0x9b, 0x6f,
0xcf, 0x7a, 0x4b, 0x92, 0x87, 0xe7, 0x72, 0x98, 0xfe, 0x0c, 0xd1, 0xa7, 0xf0, 0x90, 0x78, 0xc6,
0x99, 0x4b, 0x74, 0x23, 0x62, 0x74, 0x60, 0x30, 0xc7, 0xd4, 0xfd, 0xc8, 0x33, 0x59, 0x24, 0x9a,
0xc1, 0x3c, 0x77, 0x6c, 0x53, 0xc8, 0x34, 0x12, 0x91, 0xce, 0x48, 0x02, 0xbd, 0x0b, 0x45, 0x23,
0xb2, 0x1c, 0x1a, 0x5f, 0x67, 0xf3, 0x95, 0x68, 0x52, 0xf3, 0xb8, 0xc0, 0x69, 0x3d, 0x4e, 0x52,
0xdf, 0x87, 0xa5, 0x31, 0x2f, 0x50, 0x15, 0x16, 0xfc, 0xf3, 0xc0, 0x08, 0xe5, 0x20, 0xcb, 0xe3,
0xe4, 0x53, 0xfd, 0x85, 0x02, 0x2b, 0x97, 0x1c, 0x05, 0xfa, 0x19, 0x14, 0xc7, 0x72, 0x2b, 0xea,
0xe1, 0x70, 0xd6, 0x34, 0x60, 0x62, 0x52, 0xdb, 0x73, 0x62, 0xc8, 0xd4, 0x99, 0xe0, 0x31, 0x6c,
0xf5, 0xcf, 0x0a, 0x3c, 0xbc, 0x4e, 0x3c, 0x5e, 0x29, 0x47, 0xbd, 0x4b, 0x96, 0x43, 0x8a, 0x72,
0xd3, 0xca, 0x89, 0x8e, 0x60, 0xfe, 0xe7, 0x34, 0xb0, 0x92, 0x71, 0xb5, 0x77, 0xfb, 0x28, 0x7e,
0x40, 0x03, 0xab, 0xe5, 0xf5, 0x29, 0x16, 0x00, 0xea, 0x1f, 0x14, 0x58, 0x4c, 0x68, 0xe8, 0x3b,
0x63, 0x97, 0xf9, 0xc6, 0x15, 0x27, 0x75, 0x97, 0x3f, 0x80, 0xc5, 0xe4, 0xcd, 0x70, 0xf3, 0x63,
0x61, 0x41, 0x3e, 0x16, 0x10, 0x82, 0xb9, 0xd8, 0x0b, 0xb9, 0xe7, 0xf2, 0xdf, 0x4f, 0x7e, 0xaf,
0xc0, 0x82, 0xfc, 0xf7, 0x04, 0xad, 0xc3, 0xca, 0xa1, 0xd6, 0xe8, 0x3d, 0xc7, 0x9a, 0xfe, 0xfc,
0xa4, 0xdb, 0xd1, 0x9a, 0xad, 0xc3, 0x96, 0x76, 0x50, 0xfe, 0x0a, 0x5a, 0x81, 0xd2, 0x71, 0x63,
0x5f, 0x3b, 0xd6, 0x0f, 0xb4, 0x9e, 0xd6, 0xec, 0xb5, 0xda, 0x27, 0x65, 0x05, 0x6d, 0xc0, 0x6a,
0xf7, 0xa8, 0xdd, 0xd3, 0x9b, 0x47, 0x8d, 0x93, 0xcf, 0xb4, 0x14, 0x2b, 0x83, 0xb6, 0x60, 0x53,
0xfb, 0x61, 0xe7, 0xb8, 0xd5, 0x6c, 0xf5, 0xf4, 0x66, 0xfb, 0xa4, 0xa7, 0x9d, 0xf4, 0x52, 0xfc,
0x2c, 0xaa, 0x42, 0xa5, 0xdb, 0xd1, 0xb4, 0xe6, 0x91, 0xde, 0xc3, 0x8d, 0x93, 0x6e, 0x13, 0xb7,
0x3a, 0x9c, 0x93, 0x7b, 0x12, 0x00, 0x9a, 0x7e, 0x3c, 0xa2, 0xaf, 0xc2, 0xf6, 0x84, 0x7d, 0xfd,
0x59, 0xfb, 0x60, 0xd2, 0xcb, 0x25, 0xc8, 0x73, 0x87, 0x62, 0x56, 0x59, 0x41, 0xcb, 0x00, 0x87,
0xb8, 0xf1, 0x4c, 0x13, 0xdf, 0x99, 0x38, 0x3a, 0xce, 0x6e, 0x9c, 0x1c, 0xe8, 0x29, 0x46, 0xf6,
0x09, 0x03, 0x18, 0xed, 0x73, 0x68, 0x13, 0xd6, 0x8e, 0x5b, 0xdf, 0xd7, 0x8e, 0x5b, 0x47, 0xed,
0xf6, 0xc1, 0x84, 0x85, 0x07, 0xb0, 0x74, 0xaa, 0xe1, 0x17, 0xfa, 0xf3, 0x13, 0x2e, 0xf2, 0xa2,
0xac, 0xa0, 0x22, 0x2c, 0x0e, 0xbf, 0x32, 0xf1, 0x57, 0xa7, 0xdd, 0xed, 0xb6, 0xf6, 0x8f, 0xb5,
0x72, 0x16, 0x01, 0xe4, 0x24, 0x67, 0x0e, 0x95, 0xa0, 0xc0, 0x55, 0x25, 0x61, 0x7e, 0xef, 0xaf,
0x0a, 0x54, 0x79, 0xcf, 0x6b, 0xa5, 0x2a, 0xa7, 0x4b, 0x82, 0x0b, 0xc7, 0x24, 0xe8, 0x8f, 0x0a,
0x2c, 0x8d, 0xb5, 0x5b, 0x34, 0xc3, 0xe6, 0x78, 0xd9, 0x1f, 0x74, 0x9b, 0x8f, 0x12, 0xfd, 0xd4,
0x3f, 0x87, 0xb5, 0x76, 0xf2, 0xcf, 0xa1, 0xfa, 0xb5, 0x5f, 0xfe, 0xeb, 0x7f, 0x6f, 0x33, 0x8f,
0xd5, 0xcd, 0xc9, 0x3f, 0x33, 0xc3, 0xa7, 0xb2, 0xff, 0x92, 0xa7, 0xca, 0x93, 0xfd, 0x2f, 0x32,
0xf0, 0x0d, 0x93, 0x0e, 0x6e, 0xed, 0xcb, 0xfe, 0xa3, 0xab, 0x42, 0xec, 0xc4, 0x65, 0xda, 0x51,
0x7e, 0xf4, 0x42, 0x42, 0xd9, 0x34, 0x6e, 0xcf, 0x35, 0x1a, 0xd8, 0x75, 0x9b, 0x78, 0xbc, 0x88,
0xeb, 0x82, 0x65, 0xf8, 0x4e, 0x78, 0xf3, 0x5f, 0xaf, 0x1f, 0x4f, 0xf1, 0xfe, 0x92, 0xd9, 0xf9,
0x4c, 0x60, 0x37, 0xb9, 0x9b, 0x53, 0x9e, 0xd4, 0x4e, 0x77, 0x3b, 0xbb, 0xfb, 0xb1, 0xf2, 0x3f,
0x13, 0xd1, 0x97, 0x5c, 0xf4, 0xe5, 0x94, 0xe8, 0xcb, 0xd3, 0xc4, 0xce, 0x59, 0x8e, 0xfb, 0xf6,
0xad, 0x2f, 0x03, 0x00, 0x00, 0xff, 0xff, 0x82, 0x99, 0xe4, 0x9b, 0x15, 0x16, 0x00, 0x00,
} | {
"perplexity_score": 1394.9,
"pile_set_name": "Github"
} |
Q:
How to close a file handle which came from a parent process C#
I'm creating an application updater module at the moment and have encountered a problem with an open file handle.
The updater module is a separate program but is launched via the application which is being updated via Process.Start() when the user clicks the 'upgrade' option. One of the first things the updater does is close down the application which is being updated so that it can be reinstalled without any file access issues etc.
Everything is fine up until the point where I try to remove the install directory of the application which is being updated. I get an exception which says:-
The process cannot access the file because it is being used by another process.
I've followed things through using the SysInternals Process Explorer utility. The updater program is initially a child process of the application which is being updated, but once the application to be updated is killed off the updater program is then its own parent. The issue appears to be that the updater program has an open file handle for the install directory of the application which is being updated.
I can resolve the issue manually by closing the file handle in Process Explorer before the updater gets to the point of attempting to remove the install folder and then the exception does not get thrown. However I need some way to close this file handle in code or avoid the file handle being held by the updater program process in the first place.
I've tried using the WIN32 CreateProcess method to create the process without inheriting handles, but the file handle for the install folder is still held by the updater program.
Any advice would be much appreciated.
A:
This is probably the current directory of the process. If you start notepad with your install directory as it's current directory the same handle will appear. When you then use a file open dialog in notepad to navigate to some other directory the handle disappears.
Use Environment.CurrentDirectory to change the directory or create the child with a better current directory. | {
"perplexity_score": 555,
"pile_set_name": "StackExchange"
} |
The purse bid for the fight between light heavyweight world champion Adonis Stevenson and interim titlist Oleksandr Gvozdyk took place on Monday at a hotel in midtown Manhattan, but not without controversy that has left the fight in limbo.
There were three bidders: attorney Phil Weiss on behalf of Tom Brown's TGB Promotions, which offered $3.102 million; Stevenson promoter Yvon Michel, who bid $2.101 million; and Gvozdyk promoter Top Rank, represented by vice president Carl Moretti, which bid $1.675 million for a fight in which Stevenson is entitled to 65 percent of the winning bid and Gvozdyk 35 percent.
The issue arose when seconds after the bids were unsealed and TGB Promotions was declared the winner, Weiss withdrew the winning bid.
At that point, Michel was declared the winner and told Top Rank he would put the fight on Nov. 3 in Quebec City. However, Top Rank was not happy with how things went down, nor was the WBC supervisor of the purse bid, Bob Yalen. He reported what had occurred to WBC president Mauricio Sulaiman, who said the organization would rule on the situation by Thursday.
Top Rank believes that Brown and Michel colluded when it came to their bids because they would have both been determined by Al Haymon, Stevenson's powerful adviser who dictates Stevenson's career.
Arum and Moretti believe that Brown and Michel knew what each was bidding and that once they finished 1-2 to beat the Top Rank bid, TGB Promotions defaulted so Michel's lower bid would win the rights to the fight, which would mean much less money for Gvozdyk.
"What happened was outrageous on Haymon's part," Arum told ESPN. "When Tom Brown wins and then he pulls his bid so Yvon gets it with the lower bid? That's dirty pool. You win the purse bid and immediately say I'm passing? You can't do that."
Said Moretti: "Yalen, who was supervising the purse bid, said, 'You can't do that.' And then all hell breaks loose with everyone voicing an opinion. Yalen called Mauricio but they were not happy.
"The WBC said they would rule by Thursday on the outcome of the purse bid and I believe they will do the right thing."
Michel's getting the rights to the fight as the under-bidder is not set in stone. Under its rules, the WBC has the right to cancel the purse bid results because of the situation and it could order a new purse bid. That is one of the things the organization will be deciding in the next few days.
However, if Michel is awarded the rights to the fight, Arum said his side is still willing to do the bout.
"I talked with Yvon and I told him we are prepared not only to go to Quebec City but to give him full and complete support in promoting the event because I think that's a great fight and Quebec City is a lovely place," Arum said. "I told him that if Showtime (which puts on most of Haymon's major fights) doesn't step up and do the fight we'll talk to ESPN about doing the fight on one of our cards. But I talked to (Gvozdyk manager) Egis (Klimas) and we are not averse to fighting in Quebec City."
Michel denied any collusion on the bidding.
"I learned only shortly before the bid Phil Weiss was there representing TGB," Michel told ESPN. "I had never met him before the purse bid. I also had no idea how much he was going to bid.
"I spoke to Arum after and I was very happy and impressed by his cordiality, the collaboration he has offered, his personnel and his team's participation, to make this event a huge success as the quality of the fight deserves. I am convinced the event has all the ingredients to be a blockbuster."
Still, Arum was fuming over the actions of TGB Promotions.
"The WBC should make every promoter put up 10 percent of their purse bid and if they default then that money should go to the fighters in proportion to the purse split," Arum said. "In this case, TGB should have had to put up $310,000 and then when they withdrew their bid that money goes to the fighters and they're out of luck. They should make that a rule to prevent this s---. That said, Michel came up with a realistic bid and we're all in."
If Michel's bid is accepted, Stevenson would be entitled to $1,229,085 and Gvozdyk would receive $661,815. Another $210,100 -- 10 percent of Michel's bid -- would come off the top and be awarded as a bonus to the winner of the fight.
Michel's proposed date of the fight, Nov. 3, falls a month outside of the 90-day window the WBC stipulates that a promoter who wins a purse bid must put on the fight within. However, Arum said he would waive that deadline and allow Michel the extra month to do the fight. Of course, the WBC could invalidate the purse bid and order a new one.
"We will wait until the official WBC ruling but since (Groupe Yvon Michel) has done nothing wrong, the promoters of the champion and the contender are ready to work in close collaboration," Michel said. "Our bid has been logically calculated and is realistic in the current market so we should be allowed to proceed."
Brown did not return messages from ESPN seeking comment.
For a variety of reasons, Stevenson (29-1-1, 24 KOs), 40, of Montreal, has not made a mandatory defense for 4½ years. But following his majority draw with former titlist Badou Jack on May 19, Stevenson's ninth defense, the mandatory with Gvozdyk (15-0, 12 KOs) was ordered next even though Stevenson and Jack were interested in pursuing a rematch. Gvozdyk, 31, of Ukraine, claimed the vacant interim belt -- and the mandatory position -- by outpointing France's Mehdi Amar on March 17. | {
"perplexity_score": 459.8,
"pile_set_name": "OpenWebText2"
} |
Q:
How to modify google analytics code using google tag manager
I have the google analytics tracking code running on my site which I have added through google tag manager.
The code from google analytics in general looks like this:
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','https://www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-XXXXXXXX-1', 'auto');
ga('send', 'pageview');
however since I have added it through tag manager I only have the tag manager code in my page code which is:
<!-- Google Tag Manager -->
<noscript><iframe src="//www.googletagmanager.com/ns.html?id=XXX-XXXXXX"
height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript>
<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':
new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],
j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src=
'//www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);
})(window,document,'script','dataLayer','XXX-XXXXXX');</script>
<!-- End Google Tag Manager -->
Now I would need to add some lines of code in the google analytics code between:
ga('create', 'UA-XXXXXXXX-1', 'auto');
add *code* here
ga('send', 'pageview');
How can I do that? I did not find any possibility yet to modify the original analytics code within tag manager so would appreciate any assistance.
A:
That depends on what you want to do with that code.
Option 1
If it's something 'standard', Tag Manager should give you a fairly straight-forward form when you add a Universal Analytics tag - you can use this to set certain options within the tag:
Option 2
If this doesn't cover it, you can change the type of your GA tag to a custom js tag, put the original snippet in and make your changes directly. | {
"perplexity_score": 1485.2,
"pile_set_name": "StackExchange"
} |
Electrocerebral inactivity as a temperature effect: unlikely as an isolated etiology.
Although hypothermia is a cause of occasional cerebral inactivity, it appears that this change occurs only at temperatures well below those seen in most clinical conditions, even in intensive care units. Loss of EEG activity occurs at temperatures below the room temperature in the typical hospital. With elevated temperature, decline in voltage can occur, but it would appear that total cerebral inactivity does not occur solely from hyperthermia, and that the development of such records should strongly suggest to the clinician that there is some additional problem most likely involving anoxia or inadequate vascular supply, if it is clear that drugs are not the responsible factor. Extreme temperature change is usually medically provoked if well monitored. In the very special circumstances where temperature is deliberately varied, it appears that EEG activity can be expected to persist from 66 degrees to 106 degrees F. "Electrocerebral inactivity" should raise the possibility that etiologies other than temperature effect alone are involved. | {
"perplexity_score": 371.7,
"pile_set_name": "PubMed Abstracts"
} |
UNPUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
MASSACHUSETTS MUTUAL LIFE
INSURANCE COMPANY,
Plaintiff-Appellee,
No. 95-2725
v.
MASSOUD HEIDARY,
Defendant-Appellant.
Appeal from the United States District Court
for the District of Maryland, at Greenbelt.
Alexander Williams, Jr., District Judge.
(CA-94-2944-AW)
Argued: June 5, 1996
Decided: August 20, 1996
Before WIDENER, HALL, and MURNAGHAN, Circuit Judges.
_________________________________________________________________
Affirmed by unpublished per curiam opinion. Judge Hall wrote a dis-
senting opinion.
_________________________________________________________________
COUNSEL
ARGUED: Michael Joseph McAuliffe, QUINN, MCAULIFFE &
DUMAIS, Rockville, Maryland, for Appellant. Nell Berelson Stra-
chan, VENABLE, BAETJER & HOWARD, L.L.P., Baltimore, Mary-
land, for Appellee.
_________________________________________________________________
Unpublished opinions are not binding precedent in this circuit. See
Local Rule 36(c).
_________________________________________________________________
OPINION
PER CURIAM:
I.
On October 25, 1994, Appellee Massachusetts Mutual Life Insur-
ance Company ("MassMutual") filed a declaratory judgment action in
the United States District Court for the District of Maryland against
Appellant Massoud Heidary. MassMutual sought a declaration that
Heidary had made material misrepresentations to the company when
he applied for disability insurance, that Heidary had released the com-
pany from all obligations under the disability policy on October 15,
1991, and that Heidary was accordingly not entitled to benefits under
the policy.
In support of its claim for declaratory relief, MassMutual made the
following allegations. Heidary applied to the company for disability
insurance on April 4, 1990. MassMutual issued a disability policy,
numbered 9-391-944, to Heidary on April 26, 1990. 1 On July 30,
1991, following an automobile accident, Heidary filed a claim for
benefits. Upon investigating the claim, MassMutual discovered that
Heidary had made material misrepresentations in his initial applica-
tion for insurance: contrary to his claim to be a company president
with managerial responsibilities, he spent at least half his time work-
ing as an electrician; contrary to his claim to have no known disorder
of the joints and bones, he had suffered since childhood from a defor-
mity caused by a broken arm; and contrary to his claim to have an
annual income of $65,000, he earned $24,000 in 1990.
MassMutual further alleged that company officials then met with
Heidary at the Dulles Airport on October 15, 1991. MassMutual
_________________________________________________________________
1 A copy of the policy filed with this court indicates that the policy
became effective on April 12, 1990.
2
stated that, at that time, Heidary accepted (and later cashed) a check
representing reimbursement for all of the premiums he had paid, plus
interest, and signed a release form discharging the company from all
liability under the disability policy. Two years later, in December
1993, Heidary contacted MassMutual seeking benefits under the dis-
ability policy. MassMutual refused to pay.
In his answer to MassMutual's complaint, and in a subsequent
attempt to prove the existence of genuine issues of material fact, Hei-
dary asserted that, in a single application, he had applied for both life
insurance and disability insurance. Heidary also stated that his native
language was Farsi, suggesting that he could not easily read the
release form. He denied making material misrepresentations in his
application and stated that he believed both that the release form he
signed in October 1991 concerned a life insurance policy, rather than
a disability policy, and that the check he received and cashed repre-
sented both a refund of life insurance premiums and the first install-
ment of benefits under the disability policy.2
On August 11, 1995, the district court granted MassMutual's
motion for summary judgment. The court observed that, under Mary-
land law, "absent fraud, duress or mutual mistake, . . . one having the
capacity to understand a written document who reads and signs it, or,
without reading it or having it read to him, signs it, is bound by his
signature." Ray v. William G. Eurice & Bros. , 93 A.2d 272, 278 (Md.
1952); accord Creamer v. Helferstay, 448 A.2d 332, 339-42 (Md.
1982) (reaffirming the rule articulated in Ray and stating that, "absent
intentional, culpable conduct, such as fraud, duress or undue influ-
ence, a unilateral mistake is ordinarily not a ground for relief from a
contract"). Finding no evidence which could lead a rational juror to
conclude that fraud, duress, or a mutual mistake had occurred, the dis-
_________________________________________________________________
2 Heidary also asserted three counterclaims against MassMutual: that
the company had breached its insurance contract by refusing to pay dis-
ability benefits, had committed constructive fraud by failing to investi-
gate his application for insurance at the time it was made, and had
negligently misrepresented that the application was acceptable. On April
5, 1995, the district court severed Heidary's counterclaims from the
declaratory judgment action. Upon granting MassMutual's motion for
summary judgment, the court found Heidary's counterclaims moot.
3
trict court ruled that Heidary was bound by the terms of the release
form he signed in October 1991.
Heidary has argued that the district court erred when it granted
MassMutual's summary judgment motion.
The district court's grant of summary judgment must be reviewed
de novo. Tuck v. Henkel Corp., 973 F.2d 371, 374 (4th Cir. 1992),
cert. denied, 507 U.S. 918 (1993). The party moving for summary
judgment has "the burden of showing the absence of a genuine issue
as to any material fact." Adickes v. S. H. Kress & Co., 398 U.S. 144,
157 (1970). The underlying facts and all inferences from those facts
"must be viewed in the light most favorable to the party opposing the
motion." United States v. Diebold, Inc., 369 U.S. 654, 655 (1962).
"[T]here is no issue for trial unless there is sufficient evidence favor-
ing the nonmoving party for a jury to return a verdict for that party."
Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 249 (1986); accord
Russell v. Microdyne Corp., 65 F.3d 1229, 1240 (4th Cir. 1995)
("Summary judgment is . . . appropriate where the record taken as a
whole could not lead a rational trier of fact to find for the non-moving
party."). "If the evidence [presented by the nonmoving party] is
merely colorable, or is not significantly probative, summary judgment
may be granted." Id. at 249-50 (citations omitted); see also Felty v.
Graves-Humphreys Co., 818 F.2d 1126, 1128 (4th Cir. 1987) (stating
that trial judges have an "affirmative obligation" to prevent factually
unsupported claims from going to trial).
II.
Heidary bases his allegation of error upon the following factual
assertions. First, he does not read or speak English well; his native
language is Farsi. Second, using a single insurance application form,
he believed he had applied for both life insurance and disability insur-
ance. Third, Mohamed Reza Vaziri--a MassMutual agent who speaks
Farsi--was one of two MassMutual agents present at the October
1991 meeting and told Heidary, in Farsi, that (1) the check being
offered by the other MassMutual agent represented the first install-
ment of disability benefits and (2) the release form concerned only a
life insurance contract. Fourth, given the release form's use of the
phrase "on the life of Massoud Heidary" and the absence of any use
4
of the word "disability" in the release, he believed that the release was
effective with respect only to a life insurance policy.
Even though Vaziri has denied making the statements attributed to
him by Heidary, our duty to view the evidence in the light most favor-
able to Heidary compels us to proceed under the assumption that Hei-
dary's account of Vaziri's statements is accurate. We nevertheless
conclude that, on the basis of the evidence before us, no reasonable
trier of fact could return a verdict in favor of Heidary and that the dis-
trict court therefore did not err when it granted MassMutual's motion
for summary judgment. We reach that conclusion for the following
reasons.
First, no reasonable trier of fact could conclude that Heidary
applied--or reasonably believed he had applied--to MassMutual for
life insurance. Appearing at the top of the first page of the insurance
application submitted by Heidary were several boxes by which the
applicant was to indicate, with a check mark, the type of insurance he
wished to obtain or the means by which he wished to obtain it: "New
Life Insurance," "New Disability Insurance," "New Policy as
Exchange of Term Insurance," or "Conversion of Term or Disability
Insurance." On Heidary's application, only one box was checked--
the box next to the phrase "New Disability Insurance." The box next
to the phrase "New Life Insurance" was left blank. The one-and-one-
half-page section of the application titled "Life Insurance Data,"
beginning on the first page of the application, was left blank. The one-
and-one-half-page section titled "Disability Insurance Data" was fully
completed. While a number of questions appearing under the heading
"Complete for Life Application Only" were completed, those ques-
tions appeared as part of the "Agent's Statement," which was signed
only by the issuing agent.
Second, the insurance policy issued in response to Heidary's appli-
cation bears the title, on the first page of the policy, "Disability
Income Policy: Benefits Payable For Loss Of Earned Income." The
terms of the policy similarly unambiguously indicate that the policy
was a disability insurance policy, not a life insurance policy.3
_________________________________________________________________
3 Heidary has stated that he does not recall ever receiving a copy of the
policy and that he therefore had no means by which to determine the pol-
5
Third, if Heidary believed he could not read the release form he
signed in October 1991, he could have asked Vaziri or the other
MassMutual agent to read it to him. See Ray, 93 A.2d at 278 (stating
that a person with the capacity to understand a document is bound by
his signature on it even if he did not read it or"hav[e] it read to him").
Fourth, the release form Heidary signed clearly referred to the dis-
ability insurance policy by using the policy number. The form stated,
in pertinent part:
IN CONSIDERATION OF the payment of $4,185.43, repre-
senting a refund of premium plus interest under Policy No.
9 391 944 issued by Massachusetts Mutual Life Insurance
Company of Springfield, Massachusetts, on the life of Mas-
soud Heidary, the undersigned hereby delivers said policy to
said company for cancellation and hereby releases and for-
ever discharges said Company of and from all manner of
claims . . . which she/he ever had . . . by reason of the issu-
ance of said policy of insurance . . . .
It is true that the release makes reference to a policy "on the life of
Massoud Heidary." MassMutual argues that those words do not sug-
gest that a life insurance policy was being rescinded, but instead
"properly manifest a reference [to] Heidary as the life in being to
which the document applies." We find the release's language, in
solely that respect, ambiguous: a rational trier of fact could easily
conclude that a reader of only that portion of the document would
believe that it was a life insurance policy that was being cancelled. As
MassMutual points out, though, the release makes clear reference to
the number of the disability insurance policy. In light of that fact,
together with the fact that Heidary applied for and was issued only a
disability insurance policy and that the release form makes reference
to a refund of premiums plus interest--thereby disallowing the infer-
ence that the check offered to and accepted by Heidary represented
the first installment of disability benefits--we find (1) that no reason-
_________________________________________________________________
icy's nature. Even if that is true--and we must assume that it is--it is not
a factual allegation tending to show fraud, duress, or mutual mistake, and
therefore does not enable Heidary to escape from the terms of the release
form he signed in October 1991. See Ray, 93 A.2d at 278.
6
able trier of fact could conclude that the release form was fatally
ambiguous and (2) that no reasonable trier of fact could conclude that
Heidary was not bound by his signature on the form due to fraud,
duress, or mutual mistake. See Ray, 93 A.2d at 278; Creamer, 448
A.2d at 339-42.
For the foregoing reasons,4 the judgment of the district court is
AFFIRMED.
HALL, Circuit Judge, dissenting:
The release form is not clear on its face; even the majority has to
concede that the form's reference to "Policy No. 9 391 944 . . . on the
life of Massoud Heidary" could have led someone reading that por-
tion of the form to "believe that it was a life insurance policy that was
being cancelled." Ante, at 6.1 The majority's decision rests completely
_________________________________________________________________
4 Though we have not relied upon the observation in reaching our con-
clusion, it might also be noted that, during oral arguments, counsel for
MassMutual stated that, "to the penny," the amount of premiums
refunded to Heidary corresponded to the cost of obtaining disability
insurance during the period in question.
1 The other portions of the form on which the majority relies -- the
number of the disability policy and the reference to a refund of premiums
(see majority op. at 6) -- lend scant support to its decision. The inclusion
of the "Policy No." -- not, by the way,"Disability Policy No." -- is vir-
tually irrelevant; few persons have committed to memory even a snippet
of what may be numerous insurance policy numbers, (e.g., auto, home-
owner's, health and hospitalization, life, disability). When we factor in
Heidary's allegation that he never received a copy of the policy (a fact
that we assume to be true, see id. at 5-6 n.3), the relevance of the policy
number in the release form approaches zero.
Similarly, the reference to "a refund of premiums" is hardly supportive
of MassMutual's position. The refund language is consistent with Hei-
dary's claim that he was told that part of the amount was indeed a refund
of the premiums under the policy "on the life of" Heidary. That the form
said "refund," but (according to Heidary) included disability benefits as
well, is no more a basis for summary judgment for the company as the
inclusion of the words "on the life of" is a basis for summary judgment
for Heidary. See King v. Bankerd, 492 A.2d 608, 612 (Md. 1985)
(ambiguities in contract are resolved against the drafter). The release
form simply does not, by itself, mandate judgment against Heidary at this
point.
7
on its conclusion that no trier of fact could find that Heidary "reason-
ably believed he had applied" for a life insurance policy in addition
to the disability policy. Id. at 5. This conclusion is reached after an
examination of the policy application itself, without recourse to any
other evidence. My examination of the same document, together with
the other evidence (all viewed in the light most favorable to Heidary),
leads me to conclude that Heidary's belief was not so unreasonable
as to preclude a finding of fraud.
The question is not whether Heidary had an enforceable agreement
for life insurance coverage, but, rather, whether his alleged misappre-
hension of fact -- that he had such a policy -- was so unreasonable
as to bar his claim of fraud. In evaluating the reasonableness of the
belief, it must be borne in mind that he is also alleging that the agent
exploited his misapprehension by explaining that only a life insurance
policy was being affected by the form.
The application was filled out by the agent and signed by Heidary
in two places. On the seventh page is an "Agent's Statement." Under
section 4, headed in bold type "Complete for Life Application Only,"
Heidary's income is listed, and two other lines (unearned income and
spouse's income) are crossed through to indicate that they are not
applicable. Section 5, "Marital Status," has been completed, as has
section 8, which asks about other policies "on the life of the Insured."
While the form alone certainly could not establish a claim for life
insurance benefits, it also is not so clear as to preclude, as a matter
of law, Heidary's fraud claims regarding the release form. I believe
that a jury could find that Heidary's belief that he had applied for two
policies was not unreasonable.
Once this hurdle is crossed, it is a small step to conclude that a jury
could also find that Heidary reasonably thought he was rescinding the
policy "on [his] life" in return for life insurance premiums to date and
a partial payment on his disability claim.2 When all the evidence is
_________________________________________________________________
2 The majority posits two other bases for affirmance. One basis, that the
policy itself was clearly a disability policy only (ante, at 5), is irrelevant
in light of Heidary's allegation (which the majority concedes must be
believed at this point in the litigation, id. at n.3) that he never received
a copy of the policy.
8
taken into account -- a hurried meeting at the airport on the heels of
Heidary's initial claim; his reluctance to sign an ambiguous release
form until a fellow speaker of Farsi explained the necessity of his sig-
nature to get his disability benefits; his limited grasp of English, par-
ticularly written English; prompt and repeated attempts to discover
why he was not getting continued benefits3 -- I believe there remain
genuine issues of material fact that merit further consideration.
Accordingly, I would vacate the judgment and remand for further pro-
ceedings.
I respectfully dissent.
_________________________________________________________________
The other basis, that Heidary could have asked one of the agents to
read the release to him (id. at 6), ignores the essence of Heidary's fraud
claim. He asserts that he asked for an explanation of the form and that
he was told that it was merely a rescission of his life insurance policy and
a prerequisite for the initial payment of disability benefits. That he did
not have it read to him word for word is hardly a basis for summary
judgment for the insurance company.
3 When disability benefits did not follow, Heidary claims that, after
repeated telephone calls to MassMutual, he finally received a letter from
the company explaining what had happened. A friend wrote a letter for
him that began: "After some two years of telephone requests, thank you
for finally clearifying [sic] the reason that Mass Mutual cancelled my
disability policy"; the letter then recounted the same story that forms the
basis of his fraud claims.
9 | {
"perplexity_score": 197.5,
"pile_set_name": "FreeLaw"
} |
/*
* SonarLint for Visual Studio
* Copyright (C) 2016-2020 SonarSource SA
* mailto:info AT sonarsource DOT com
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program; if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*/
using System;
using System.Collections.Generic;
using System.Diagnostics;
using System.IO;
using System.IO.Abstractions;
using System.Linq;
using EnvDTE;
using SonarLint.VisualStudio.Core.Binding;
using SonarLint.VisualStudio.Core.Helpers;
using SonarLint.VisualStudio.Integration.Resources;
namespace SonarLint.VisualStudio.Integration
{
internal class SolutionRuleSetsInformationProvider : ISolutionRuleSetsInformationProvider
{
public const char RuleSetDirectoriesValueSpliter = ';';
private readonly IServiceProvider serviceProvider;
private readonly ILogger logger;
private readonly IFileSystem fileSystem;
public SolutionRuleSetsInformationProvider(IServiceProvider serviceProvider, ILogger logger)
: this(serviceProvider, logger, new FileSystem())
{
}
internal SolutionRuleSetsInformationProvider(IServiceProvider serviceProvider, ILogger logger, IFileSystem fileSystem)
{
this.serviceProvider = serviceProvider ?? throw new ArgumentNullException(nameof(serviceProvider));
this.logger = logger ?? throw new ArgumentNullException(nameof(logger));
this.fileSystem = fileSystem ?? throw new ArgumentNullException(nameof(fileSystem));
}
public IEnumerable<RuleSetDeclaration> GetProjectRuleSetsDeclarations(Project project)
{
if (project == null)
{
throw new ArgumentNullException(nameof(project));
}
return GetProjectRuleSetsDeclarationsIterator(project);
}
private IEnumerable<RuleSetDeclaration> GetProjectRuleSetsDeclarationsIterator(Project project)
{
/* This method walks through all of the available configurations (e.g. Debug, Release, Foo) and
* attempts to fetch the values of a couple of properties from the project (CodeAnalysisRuleSet
* and CodeAnalysisRuleSetDirectories). The collected data is put into a data object
* and returned to the caller. The collected data includes the DTE Property object itself, which
* is used later to update the ruleset value.
*
* TODO: consider refactoring. The code seems over-complicated: it finds the "ruleset"
* property for all configurations, then backtracks to find the configuration, then looks
* for the corresponding "ruleset directories" property.
* Note: we are now fetching the "ruleset directories" property from the MSBuild project,
* rather than through the DTE (the previous version of this code that used the DTE fails
* for C# and VB projects that use the new project system).
*/
var declarations = new List<RuleSetDeclaration>();
var projectSystem = this.serviceProvider.GetService<IProjectSystemHelper>();
var ruleSetProperties = VsShellUtils.GetProjectProperties(project, Constants.CodeAnalysisRuleSetPropertyKey);
Debug.Assert(ruleSetProperties != null);
Debug.Assert(ruleSetProperties.All(p => p != null), "Not expecting nulls in the list of properties");
if (!ruleSetProperties.Any())
{
logger.WriteLine(Strings.CouldNotFindCodeAnalysisRuleSetPropertyOnProject, project.UniqueName);
}
foreach (Property ruleSetProperty in ruleSetProperties)
{
string activationContext = TryGetPropertyConfiguration(ruleSetProperty)?.ConfigurationName ?? string.Empty;
string ruleSetDirectoriesValue = projectSystem.GetProjectProperty(project, Constants.CodeAnalysisRuleSetDirectoriesPropertyKey, activationContext);
string[] ruleSetDirectories = ruleSetDirectoriesValue?.Split(new[] { RuleSetDirectoriesValueSpliter }, StringSplitOptions.RemoveEmptyEntries) ?? new string[0];
string ruleSetValue = ruleSetProperty.Value as string;
var declaration = new RuleSetDeclaration(project, ruleSetProperty, ruleSetValue, activationContext, ruleSetDirectories);
declarations.Add(declaration);
}
return declarations;
}
public string GetSolutionSonarQubeRulesFolder(SonarLintMode bindingMode)
{
bindingMode.ThrowIfNotConnected();
var projectSystem = this.serviceProvider.GetService<IProjectSystemHelper>();
string solutionFullPath = projectSystem.GetCurrentActiveSolution()?.FullName;
// Solution closed?
if (string.IsNullOrWhiteSpace(solutionFullPath))
{
return null;
}
string solutionRoot = Path.GetDirectoryName(solutionFullPath);
string ruleSetDirectoryRoot = Path.Combine(solutionRoot,
bindingMode == SonarLintMode.LegacyConnected ?
Constants.LegacySonarQubeManagedFolderName :
Constants.SonarlintManagedFolderName);
return ruleSetDirectoryRoot;
}
public bool TryGetProjectRuleSetFilePath(RuleSetDeclaration declaration, out string fullFilePath)
{
if (string.IsNullOrWhiteSpace(declaration.RuleSetPath))
{
fullFilePath = null;
return false;
}
var options = new List<string>();
options.Add(declaration.RuleSetPath); // Might be a full path
options.Add(PathHelper.ResolveRelativePath(declaration.RuleSetPath, declaration.RuleSetProjectFullName)); // Relative to project
// Note: currently we don't search in rule set directories since we expect the project rule set
// to be relative to the project. We can add this in the future if it will be needed.
fullFilePath = options.FirstOrDefault(fileSystem.File.Exists);
return !string.IsNullOrWhiteSpace(fullFilePath);
}
private static Configuration TryGetPropertyConfiguration(Property property)
{
Configuration configuration = property.Collection.Parent as Configuration; // Could be null if the one used is the Project level one.
Debug.Assert(configuration != null || property.Collection.Parent is Project, $"Unexpected property parent type: {property.Collection.Parent.GetType().FullName}");
return configuration;
}
}
} | {
"perplexity_score": 2472.7,
"pile_set_name": "Github"
} |
This invention relates to a brake lathe for drum and disc rotor brakes for grinding the inside cylindrical surface of a brake drum and for machining the opposite parallel surfaces of a disc rotor and, more particularly, to a brake lathe for use in automotive repair shops.
Brakes lathes for resurfacing brake drums and disc rotors are well known and have been used in the art. These lathes commonly utilize a rotating spindle provided along an axis of the brake lathe housing and which accepts at one end thereof the brake device to be machined. The other end of the spindle is driven by a source of power such as a motor. A cutting tool is provided on a moveable platform attached to the lathe so as to advance the cutting tool into the brake drum or disc rotor. The depth of cut can be adjusted by moving the tool platform or by a depth-of-cut adjustment on the tool itself. These known brake lathes have the disadvantage that the cutting tool or boring bar which is normally used to resurface or grind the inside cylindrical surface of the brake drum is located on a mounting surface or platform which is disposed between the operator and the axis of the lathe housing. Accordingly, when the operator needs to adjust the depth of cut for work on a brake drum or to otherwise observe the cutter operation, the operator must lean over the lathe to view the cutting operation which takes place along the horizontal radius of the brake drum located on the operator's side of the lathe. This procedure is awkward and, therefore, the adjustment or observation is difficult to perform. Further, in combination brake-drum and disc-rotor lathes, the location of the guide surface or platform for the boring bar interferes with the placement of inboard and outboard cutters which are utilized to machine the opposite parallel surfaces of a disc rotor and which are also located between the operator and the brake lathe housing.
These and other disadvantages are overcome by the present invention wherein there is provided a brake lathe for use with both brake drums and disc rotors which permits the operator to view the cutting operation of a brake drum machining without leaning over the machine. Further, the brake drum and disc rotor cutting tools are advantageously provided on opposite sides of the brake lathe housing. Still further, the present invention also provides separate platforms for brake drum and disc rotor operations which are independent of one another. | {
"perplexity_score": 403.7,
"pile_set_name": "USPTO Backgrounds"
} |
Q:
How to modify a token in a text file?
I have 3 config files with a token like "[DBPASSWORD]" that I'd like to modify from my "build" task wiht Phing. I didn't find a task that performs what I need and before writing my own task for this I'd like to know if anyone has a better solution.
Thanks!
A:
To answer to my own question, I finally did it like this. My conf file has this tokens:
user: %%dbUser%%
password: %%dbPassword%%
I had to copy this file, config.yml.dist to config.yml, and change the tokens, so I did this:
<copy file="./config.yml.dist" tofile="./config.yml">
<filterchain>
<replacetokens begintoken="%%" endtoken="%%">
<token key="dbUser" value="myUser" />
<token key="dbPassword" value="myPassword" />
</replacetokens>
</filterchain>
</copy>
And thats it. | {
"perplexity_score": 1602,
"pile_set_name": "StackExchange"
} |
Q:
Single-boot vs dual-boot
Will a single-boot install run any better than a dual-boot?
Running Ubuntu-mate (16.04 beta 64bit) alongside Vista. 2GB ram, Athlon 64 x2 5200+. Ubuntu is running fine. (Better than Vista, actually.) But only using a sliver of disk space thanks to years of running Vista.
A:
A Single boot install is not going to affect the performance of the currently running instance of OS. While running your OS, the other partitions are read as storage like it would read a usb stick.
p.s. Vista is known for heavy RAM memory usage (1-1.5Gb OS alone) so you are right, you should be experiencing better performance on Ubuntu as it it less demanding. | {
"perplexity_score": 1082.6,
"pile_set_name": "StackExchange"
} |
Q:
Force mounting an external disk that is not recognized
I recently bought a 4 TB naked (no enclosure) external hard drive that I mount via a Newer Tech dock (the ones where you insert the naked drive like bread in a toaster) and is connected to my MacBook pro via FireWire 800.
About a month later I wanted to use the drive and it would not mount.
Disk Utility reports that it is "Not Mounted".
When I connect the drive I get this:
The disk you inserted was not readable by this computer.
So I tried terminal commands like:
diskutil list
which yelds this:
I also tried:
mount force /dev/disk3
and got:
mount: You must specify a filesystem type with -t.
and then:
mount force -t Apple_HFS /dev/disk3
which outputs:
usage: mount [-dfruvw] [-o options] [-t external_type] special node
mount [-adfruvw] [-t external_type]
mount [-dfruvw] special | node
I also tried:
diskutil repairVolume /dev/disk3
which gives back:
Error starting file system repair for disk3: Unrecognized file system (-69846)
and finally:
sudo gpt -r show /dev/disk3
which returns:
I am at a loss, can anyone give me some advice on how to mount this drive?
A:
Just when I was about to give up, format the drive and lose my data, somehow I was able to fix the drive so I am posting what exactly I did in terminal for the benefit of other people who might come across this post and have the same problem. I hope this will be helpful to somebody:
Admins-MacBook-Pro:~ admin$ diskutil mount /dev/disk3
Volume on disk3 failed to mount; if it has a partitioning scheme, use "diskutil mountDisk"
If the volume is damaged, try the "readOnly" option
If the volume is an APFS Volume, try the "diskutil apfs unlockVolume" verb
Admins-MacBook-Pro:~ admin$ mount force /dev/disk3
mount: You must specify a filesystem type with -t.
Admins-MacBook-Pro:~ admin$ mount -t /dev/disk3
Admins-MacBook-Pro:~ admin$ mount force -t /dev/disk3
usage: mount [-dfruvw] [-o options] [-t external_type] special node
mount [-adfruvw] [-t external_type]
mount [-dfruvw] special | node
Admins-MacBook-Pro:~ admin$ mount -t force /dev/disk3
usage: mount [-dfruvw] [-o options] [-t external_type] special node
mount [-adfruvw] [-t external_type]
mount [-dfruvw] special | node
Admins-MacBook-Pro:~ admin$ diskutil verifyDisk /dev/disk3
Nonexistent, unknown, or damaged partition map scheme
If you are sure this disk contains a (damaged) APM, MBR, or GPT partition
scheme, you might be able to repair it with "diskutil repairDisk /dev/disk3"
Admins-MacBook-Pro:~ admin$ diskutil repairDisk /dev/disk3
Nonexistent, unknown, or damaged partition map scheme
If you are sure this disk contains a (damaged) APM, MBR, or GPT partition map,
you can hereby try to repair it enough to be recognized as a map; another
"diskutil repairDisk /dev/disk3" might then be necessary for further repairs
Proceed? (y/N) y
Partition map repair complete; you might now want to repeat the
verifyDisk or repairDisk verbs to perform further checks and repairs
Admins-MacBook-Pro:~ admin$ diskutil repairDisk /dev/disk3
Repairing the partition map might erase disk3s1, proceed? (y/N) y
Started partition map repair on disk3
Checking prerequisites
Checking the partition list
Adjusting partition map to fit whole disk as required
Checking for an EFI system partition
Checking the EFI system partition's size
Checking the EFI system partition's file system
Checking the EFI system partition's folder content
Checking all HFS data partition loader spaces
Checking booter partitions
Reviewing boot support loaders
Checking Core Storage Physical Volume partitions
Updating Windows boot.ini files as required
The partition map appears to be OK
Finished partition map repair on disk3
Admins-MacBook-Pro:~ admin$
Since I've tried pretty much every terminal line under the sun, I think the key was the sequence in which this worked, which was:
mount -t /dev/disk3
mount force -t /dev/disk3
diskutil verifyDisk /dev/disk3
diskutil repairDisk /dev/disk3
diskutil repairDisk /dev/disk3
When I heard tried to verifyDisk and repairDisk a few days ago it had not worked but somehow with this sequence it was able to repair the partition map
Thank you to all of you guys who have tried to help me with this.
I am glad to have my data back ;) | {
"perplexity_score": 2033.2,
"pile_set_name": "StackExchange"
} |
Smad7 inhibits angiotensin II-induced hypertensive cardiac remodelling.
Smad7 plays a negative regulatory role in many inflammatory diseases, but its effect on hypertensive disease remains unknown. The present study tested the hypothesis that overexpression of Smad7 may have therapeutic potential for angiotensin II (Ang II)-mediated hypertensive cardiac remodelling. Hypertensive heart disease was induced in mice by subcutaneous infusion of Ang II for 28 days and treated with Smad7 by a non-invasive ultrasound-microbubble-mediated inducible Smad7 gene transfer. We found that cardiac Smad7 was largely reduced in the hypertensive heart and overexpression of cardiac Smad7 protected against the fall in the left ventricular (LV) ejection fraction (EF), an increase in LV mass, and cardiac inflammation and fibrosis such as up-regulation of pro-inflammatory cytokines (IL-1β, TNF-α) and fibrotic markers (collagen I, α-SMA), and infiltration of CD3(+) T cells and F4/80(+) macrophages. Further studies revealed that inactivation of the Sp1-TGF-β/Smad3-NF-κB (NF-κB, nuclear factor κB) pathways and prevention of cardiac miR-29 loss were mechanisms by which overexpression of Smad7 inhibited Ang II-mediated cardiac remodelling. Importantly, we also found that treatment with Smad7 when hypertensive cardiopathy established at day 14 halted the progression of cardiac injury by blunting the fall of EF and an increase in LV mass, and blocking TGF-β/Smad3-mediated cardiac fibrosis and NF-κB-driven inflammation. Smad7 plays a protective role in Ang II-induced cardiac remodelling via mechanisms involving the Sp1-TGF-β/Smad-NF-κB-miR-29 regulatory network. Thus, Smad7 may be a novel therapeutic agent for hypertensive cardiovascular diseases. | {
"perplexity_score": 308.2,
"pile_set_name": "PubMed Abstracts"
} |
Dana Lewis (basketball)
Dana Lewis (born October 16, 1949) is a retired American collegiate and professional basketball player. Lewis was a 1st Round selection (#12 overall) of the Philadelphia 76ers in the 1971 NBA Draft out of the University of Tulsa.
Early life
In 1966, Dana Lewis moved with his mother from New York City to Newark, New Jersey. He attended Weequahic High School in Newark. There he played basketball and was a teammate of future NBA player Mo Layton in a highly successful program. In 1966-1967 Weequahic went undefeated and won the Group 4 State Championship, defending their title from the year before.
Weequahic High School in 1965–66 and 1966–67 had each of the five starters go on to play college basketball. Two reached the National Basketball Association. The five were Layton, Lewis, Leroy Cobb, George Watson and Bill Mainor. Layton played with Phoenix and Portland in the NBA after a college career at the University of Southern California. Mainor played at Fordham, and Cobb and Watson played at Southern California with Layton.
“Yes, that was quite a ballclub,” reminisced Les Fein, the Weequahic coach. “Not only were the boys excellent players, but they were gentlemen.”
College career
Following his high school career, Lewis was heavily recruited. The Associated Press release on April 19, 1967 read as follows: "NEWARK, N.J. (AP) Dana Lewis, Wcequahic High School's 6-foot-10 All-America basketball player, rejected the recruiting efforts of virtually every major college in the country and announced that he will attend Oral Roberts University in Tulsa, Okla., for religious reasons. Oral Roberts, which is only two years old, is named after and administered by the world-famed evangelist, acknowledged spiritual leader of the Pentecostal Church, to' which Lewis' family belongs. Lewis led Weequahic to 40 straight victories and two New Jersey State championships."
As a 6’10" Center playing for Oral Roberts University in Tulsa, Oklahoma as a freshman, Lewis averaged 16.0 points and 10.2 rebounds in 24 games.
Lewis' mother had influenced him to attend Oral Roberts University for his first collegiate season, and after one season he wished to transfer. Deciding to stay in town and transfer to the University of Tulsa, Lewis needed a release from ORU to be eligible. While awaiting a release, Lewis stayed in Tulsa and got a job hauling hay. He eventually paid his own tuition the first semester at Tulsa by working a construction job. Finally, Oral Roberts himself wrote a handwritten release for Lewis to be able to play for Tulsa.
At Tulsa, Lewis averaged 20.3 points and 11.9 bounds in 1969-1970 and 23.3 points and 13.5 rebounds in 1970-1971, while playing under coach Ken Hayes. In 1970, Lewis was named the "Missouri Valley Conference Newcomer of the Year.". In 1970-1971, Lewis led the Missouri Valley Conference in scoring and was First-Team All-MVC in both Tulsa seasons. Lewis still holds the Tulsa record for Rebounds in a game with 26, vs. MacMurray College, on Dec. 27, 1969.
Overall, in 52 games for Tulsa, Lewis averaged a double-double of 21.8 points and 12.7 rebounds over his two seasons.
After graduating from Tulsa, Lewis was selected for the World University Games, where Team USA earned a bronze medal, losing to USSR in the final. George McGinnis was a teammate on the USA team.
Professional career
Lewis was drafted in the 1st Round (12th overall) of the 1971 NBA Draft by the Philadelphia 76ers on May 9th 1971. Lewis was also drafted by the Virginia Squires in the 1971 ABA Draft. He chose to sign with the 76ers. Originally signing a 6-year $500,000 mostly guaranteed contract, Lewis was cut by the 76ers on Sept. 27, 1972 after the third game of the season, before appearing in an NBA game.
Lewis went on to play four seasons in the Eastern Basketball Association. He played for the Hartford Capitols (1971-1974) and the Cherry Hill Pros (1974-1975). The Capitols won the League title in 1973-1974 as Lewis averaged 12.3 points and 15.3 rebounds.
Later, Lewis played in the Philippine Basketball Association as an "import" for Presto and Great Taste Coffee Makers teams from 1976-1979.
Honors
Lewis was inducted into the University of Tulsa Athletics Hall of Fame in 2019.
References
Category:1949 births
Category:Living people
Category:African-American basketball players
Category:American men's basketball players
Category:Basketball players from New Jersey
Category:Centers (basketball)
Category:Oral Roberts Golden Eagles men's basketball players
Category:Philadelphia 76ers draft picks
Category:Sportspeople from Newark, New Jersey
Category:Tulsa Golden Hurricane men's basketball players
Category:Virginia Squires draft picks
Category:Weequahic High School alumni | {
"perplexity_score": 167.1,
"pile_set_name": "Wikipedia (en)"
} |
Background
==========
Programs teaching mindful awareness to promote well-being have become a recent topic of inquiry among researchers \[[@B1]\]. Rooted in Buddhist traditions and formally developed by Jon Kabat-Zinn in the 1980s, mindfulness has developed secularly to describe a process of becoming aware of present experience and, through that awareness, reducing emotional and physical distress \[[@B2]\]. Mindfulness has been described as more than merely a relaxation technique; rather, it is mental training to develop awareness and acceptance skills to cope with daily events that may otherwise lead to heightened anxiety and stress \[[@B3]\]. Mindfulness-based programs enhance awareness and acceptance of conscious states and teach people to approach daily situations \"mindfully\" \[[@B4]\].
Research demonstrating the efficacy of mindfulness-based stress reduction (MSBR) in promoting health is mounting although randomized, controlled studies and the inclusion of minority older adult populations are both largely absent from the literature. Past research on mindfulness-based stress reduction (MBSR) programs has demonstrated enhanced coping, improved self-efficacy, and better symptom control in general populations without control groups \[[@B3],[@B5]\]. The few randomized controlled trials of MBSR have been in specific clinical populations such as cancer \[[@B6]\], rheumatoid arthritis patients \[[@B7]\]or those with chronic pain \[[@B8]\]. Studies have shown MBSR to be effective in treatment of chronic pain \[[@B2],[@B8]-[@B10]\], anxiety disorders \[[@B11]\], and hypertension \[[@B12]\]. Reibel et al. demonstrated that MBSR increases health-related quality of life and social functioning, while decreasing physical pain, role limitations caused by physical health, and anxiety and depression among mixed diagnosis patients \[[@B13]\]. While MBSR programs have been shown to be related to positive outcomes, the research evidence to date hass been limited to clinical populations \[[@B3]\]. Further, little evidence exists for the efficacy of MBSR programs among older adults \[[@B5]\]or in low-income, urban minority populations \[[@B14]\].
Older adults, we hypothesized, could be a particularly responsive group to train in mindfulness due to their life experience accompanied by a potentially increased ability to examine their lives as well as the capacity, honed by aging-related changes, to accept their life. Low-income minority older adults, we further hypothesized, might have more stressors\[[@B15]\], more depression \[[@B16],[@B17]\] and more social isolation \[[@B18],[@B19]\] and thus more possible benefit from mindfulness training. However, there was no literature base or prior reports of experience with this population to indicate low-income minority older adults\' acceptance of training that has formerly been associated with East Asian religious practices. Therefore, the purpose of the current study was to examine the perceptions of a mindfulness-based program in a sample of low-income minority older adults. Due to the mounting evidence regarding its effectiveness in reducing stress, increasing self-efficacy, and managing physical ailments, mindfulness was proposed as an effective intervention for minority older adults living with multiple social and physical concerns. Our team is currently using a randomized clinical trial to test these hypotheses. The goals of the present study were to assess older minority adult participants\' openness to the intervention, understand which components of the intervention were most important to them, and examine their application of the mindful awareness training outside of the intervention. Determining acceptance or openness to this intervention was an important first step in acquiring information that could be used to develop further mindfulness-based interventions for this underserved population at high risk for chronic multi-morbidities.
In order to determine openness to this intervention, we decided to ask a group of older low-income African -American adults about their perceptions of the program. Based on their answers, we could tailor future programs. We decided on a focus group methodology to accomplish this.
Focus group research is a qualitative method of collecting data that allows researchers to understand experiences from the perspective of the participants (Patton, 2002). Focus groups allow participants to interact with each other as they answer questions posed by the researcher. In doing so, they allow for individuals to disagree or expand on other participants\' comments. Focus groups are a useful approach to elicit first-hand information from participants. The rising popularity of focus groups highlights the uniqueness of their group context. This allows for the facilitation of efficient data collection and the potential to elicit participant views related to experiences involving motivations, feelings, attitudes and opinions on health-related issues among challenging and/or vulnerable target populations \[[@B20],[@B21]\]. Advantages of using focus groups include: (1) being less intimidating than one-on-one interviewing but providing more depth than questionnaires (2) having sensitivity to participants\' culture and age by acknowledging participants as experts and obtaining insight into participants\' own language and concepts (4) allowing group interactions to take place, (3) permitting researchers to learn more about the degree of consensus on a topic, and (4) encouraging dialogue and dialectic between researchers and participants in order to mutually identify, describe, analyze and attempt to resolve key issues \[[@B22],[@B23]\]. Because oral history is a strong tradition in many minority communities, inviting participants to describe their experiences is generally believed to be an effective approach to data collection with minority older adults.
Methods
=======
In order to collect data regarding the perceptions of a mindfulness-based program implemented among a group of low-income minority older adults, a focus group design was selected. Three focus groups were one hour each conducted with members of ELDERSHINE, a mindfulness-based program designed for older adults.
*The*ELDERSHINE *Program*
-------------------------
ELDERSHINE is a psycho-educational program designed to foster awareness of internal states; promote positive mental and physical health through mindfulness; and build individual and neighborhood capacity through civic engagement and the creation of a caring community. The design of a series of eight workshops creates a sequential and cohesive program. The program teaches mindfulness-based stress reduction skills adapted from Jon Kabat-Zinn\'s MBSR program and was developed by one of the co-authors (A.B.C.) to teach older adults how to meditate and use mindfulness in their daily lives. Modifications from MBSR include: briefer meditation periods; shorter weekly sessions; emphasis on seated meditations rather than mindful movements or walking meditation (due to physical limitations of participants); and no daylong retreat. In lieu of a workbook, participants received a folder and weekly handouts were given out at each session with program concepts and poetry in large type to facilitate easier reading.
ELDERSHINE invites participants to discover and mobilize their strengths and foster resiliency within themselves as individuals and as a community of elders who can share wisdom and strength as they support and nurture one another. The ELDERSHINE core program consists of eight 90 minute sessions. Each weekly session includes three guided meditations; an opportunity to discuss participants\' home practice and integration of mindful skills; a time for positive sharing (called sharing \"Victories\"); and a group process that allows participants to learn through reflection on their own experience, activity and supportive dialogue. A nourishing snack at a \"tea party\" served after each workshop encourages socialization, extended conversation among participants, and a focus on healthy eating.
Participants
------------
Participants for the study included members of an ELDERSHINE program being conducted in a low-income senior housing facility in Baltimore, Maryland. The moderator of the ELDERSHINE group verbally invited members to participate in the focus groups. The moderator also announced she would not attend the focus groups. Those interested were called the night before to increase attendance. Thirteen individuals participated in the study. Three separate small focus groups (of 4, 4, and 5 participants) were conducted to increase participation in discussion by having small groups. This is within the optimal range of 4-8 participants \[[@B23]\]. These groups included almost every regular ELDERSHINE attendee. All participants were low income African-American women over the age of 60 years old and younger than 90. They were all Protestants (Baptist, Methodist, and Apostolic). Their education level ranged from less than 8 years of school through obtaining some college education. This study was approved by the IRB at the Johns Hopkins School of Public Health. All participants provided oral consent.
Procedures
----------
Our team tape-recorded the focus group sessions, and both the moderator and the trained research assistant took notes during and after the sessions. A focus group interview guide and probes guided each focus group session. Two of the groups were moderated by one of the investigators on the project (S.L.S), and one was moderated by another investigator (R.L.P). The same trained research assistant took notes during all sessions and transcribed the sessions from the audiotapes afterwards.
For each session, the moderator started the discussion by informing the group of the purpose of the session. Any questions that the participants had were answered prior to beginning the discussion.
After all participants\' questions were answered, the following four questions were asked to guide discussion:
1\. What has ELDERSHINE meant to you?
2\. Do you feel that you have changed in any way due to your involvement in ELDERSHINE?
3\. What parts of ELDERSHINE have meant the most to you?
4\. How would you describe ELDERSHINE to others?
Analysis
--------
Following each focus group session, the audiotapes were transcribed verbatim by the research assistant into Microsoft Word 2000. Primary themes from the focus groups were identified by inductive content analysis (Patton, 2002; Straus & Corbin, 1990). The level of analysis was across cases and across sessions to allow for themes to be developed overall for all participants.
The focus group interview guide dictated the topics of data analysis.^31^The investigators first analyzed the data with multiple readings of interview transcripts to gain a general sense of the data along with review of researcher field notes which included researcher observations on communication factors including body language, gestures, tones and voice intensity \[[@B23]\]. We meticulously recorded initial findings to maintain a clear audit trail. Preliminary coding of concepts followed, with categorization and a search for themes (see steps, below). We examined the data for themes, patterns, commonalities and variation. We continually validated categories, themes, and conclusions by referring back to the data. We also examined theme variations.
We achieved data trustworthiness through collection and review of field notes by the trained research assistant at each focus group session, as noted above. Each investigator described and interpreted their own behavior and experiences in relation to the research and each participant which enhanced the credibility of the data \[[@B24]\]. We used field notes to provide a clear decision trail concerning the study, describing and justifying what was actually done and the reasons for doing so \[[@B24]\].
Judgment regarding trustworthiness and authenticity was made using member checking and participant review techniques described by Lincoln and Guba \[[@B25]\]. Participants were assured that their comments would be reported in a confidential manner, using pseudonyms in the actual group sessions, in transcripts and in research reports.
Results
=======
Analysis of the focus group responses revealed three primary themes in the ELDERSHINE program: 1) stress management; 2) learning, practicing and using mindfulness, and 3) social support. Participants in ELDERSHINE articulated perceived benefits of the program as well as their ability to acquire and transfer skills learned in the program to their everyday lives.
1) Stress management
--------------------
The first question that was asked in the focus group sessions was, \"What has ELDERSHINE meant to you?\" The primary theme that emerged across all of the focus groups was the ability to use meditation skills in coping with stressors in their life. These stressors included, growing older with some physical pain, medical tests, financial strain, and having children/grandchildren with significant mental, physical, financial or legal hardships. As an example of how ELDERSHINE participation had helped with stress management, one participant remarked:
\"And then with the meditation part of it, it just takes you away from your everyday concerns in life and for that, for that moment, you are in such a restfulness. You don\'t even know you\'re really sitting there in the chair sometimes, you\'re somewhere, wherever, \[you know\] the meditation might take you. And, I think that\'s what I like about coming to ELDERSHINE.
Another participant stated:
\"When I meditate it\'s like a soothing thing inside, and relaxing. Very relaxing. You don\'t think about, you don\'t actually hear nothing, you don\'t hear nobody. And it\'s, just like I said before, it\'s very soothing. It\'s better than taking a massage, put it to you that way. All the things that really \[bug\] and bother you at that particular time melts away and then your whole day is a good day because it doesn\'t, to me, actually, I don\'t have these pains until I maybe bend over to do something, but other than that, it don\'t bother you. It\'s just a good relaxing day. When you go to bed at night, you really can relax, you can sleep, have a very good peaceful night. And then, the next day, when you\'re not in ELDERSHINE, you can do the same thing then, but you might not do it at the same time, but at a different hour of the day.\"
Furthermore, the meditation was described as spiritual and related to God by this group. One participant remarked:
\"ELDERSHINE is a meditation of our spiritual \[lives\]. We might not mention God\'s name all the time, but He\'s there all the time. It is our spiritual self that\'s being nurtured.\"
This distinction between spirituality and religiosity is one that is often made much of in academic circles. However, from the perspective of our Protestant participants, people with traditional religious commitments are willing to learn and practice meditation without fear of supplanting their usual religious practices.
2) Applying meditation to their daily lives and stresses
--------------------------------------------------------
A second theme that emerged was that mindfulness meditation was a new practice and one which they were learning to apply to different areas of their lives. Participants revealed that they learned how to meditate and how to use meditation in their lives to reduce stress. One participant stated:
\"I had to go to the hospital for an MRI, and, I told Amy \[the program designer and interventionist\] I took her voice with me, going into the MRI you know, I love the Lord very much, and I\'m not taking away from God, but I took her with me with God into the MRI going through the tube and all the \"clunk, clunk, clunk\" noise you hear in there. I took Amy\'s voice with me to help, you know, help me, quiet me down and I wouldn\'t have to go through all that \[without it\].\"
Several other participants offered examples of ways they were applying the skills they were learning
\"And when you get depressed or you feeling sad, you meditate, it helps. I have experienced that the past week, you understand? And it\'s really helped me by meditating.\"
\"You can always learn something and learn how to meditate. Meditat\[ion\] is giving yourself a chance to think before you speak. Knowing what you\'re doing. It slows you down, \[to think\] of better things.\"
\"You catch yourself getting all upset or kind of worked up or disturbed a bit, so \[you say\] \'let me go on my break\"\... I have a special chair that I sit in now\.... All the thoughts and bad feelings you had all been melted away because your body is relaxed into your meditation. And then you come out of your meditation, you really feel like a really good person. You feel more relaxed and you can go about doing what you have to do.\"
3) Social Support
-----------------
An additional theme that emerged was that ELDERSHINE allowed participants to make friends and to share their lives. One participant described this theme in the following manner:
ELDERSHINE, it brings the different neighbors together and that they can talk and they can have some peaceful time together. Bringing people together and they feel comfortable talking about different things in life because they get to know the people in the circle.\"
In addition to sharing with each other, participants specifically mentioned sharing \"victories\" as an important component of ELDERSHINE. This is a time in which each participant describes something that brought them joy or that they accomplished during the week, even as simple as getting out of bed in the morning. One participant described this part of the weekly program when she stated:
\"You go in every week you come in and you talk about your victories, what \[you\] might have done that week, something you, in your life that was just a great victory to you. So you get to share in front of everybody your victory.\"
The building in which ELDERSHINE takes place is a high rise for low-income older adults and has no common spaces or common programs. A final theme that emerged was that being in this group increased their social support, specifically the number of people that they believed they could turn to for assistance or for whom they could provide support. One participant commented:
\"When I first came here, I didn\'t call nobody but my sister. My sister live on the seventh floor, When I \[don\'t know who\] I\'m gonna call, I call my sister. But, now I\'ve got plenty of people, I call them.\"
Another participant stated:
\"You come together, you know, and know your neighbors and talk to them, understand, you know? \[When they have\] something going on, they\'ve got problems too, it\'s really good, it\'s really good.\"
Participants reported feeling connection to and respected by others in the group. As one participant remarked,
\"I would tell them, it\'s a place to meet friends and share thoughts with one another.\"
Sharing victories and talking with each other were among the ways that the participants reported that they learned respect for one another, focused on others, and fostered valuable connections and enhanced communication skills. As one participant reported,
\"It teach\[es\] you how to respect each other, how to listen to each other and don\'t talk while somebody\'s talking.\"
Discussion
==========
In this focus group study with low-income minority older adult participants of a mindfulness-based program, we found that those who were in the intervention reported learning meditation skills, used it to cope with stressors in their lives, and increased their sense of community in a socially-isolating building.
These findings, though limited to female participants of one mindfulness program in one low-income housing project, are important. Because there is evidence that mindfulness programs may help in management of illness and low-income minority adults often suffer from multiple chronic health problems, our findings could suggest further research in an underserved population with this low-cost mindfulness-based intervention. Further, older adults are at a time in life when a reflective, stationary intervention, delivered in-residence could be an ideal mechanism to improve health. The demonstrated ability to incorporate the training into use with stressful medical tests and other challenging episodes during the course of day-to-day life shows that the benefits may reach beyond the in-class training.
Additionally, social support is important in both health promotion and during treatment for diseases like cancer, particularly among underserved populations. For example, informal and formal social support networks are believed to decrease barriers to cancer treatment in African-American older adults. In a study performed by Guidry et al, \[[@B26]\]African American cancer patients were more likely to report a need for formal and informal sources of support during treatment than were Caucasian Americans. Older African Americans may require enhanced and multi-faceted cancer support because they are known to possess generally poorer health status and fewer financial resources than their non-minority counterparts \[[@B27]\].
Future research should examine the specific psychological, social, and physiological effects of a mindfulness-based stress reduction program for older adults. This focus group study has revealed that program participants, in addition to being receptive and willing to participate in the program, enjoyed the meditation and mindfulness practices, continued to effectively utilize the techniques outside of the program, and gained social support from the program. All themes emerged in all three focus groups which encompassed the bulk of the data. There is some homogeneity of experience because of the demographic homogeneity, the common sharing of experience in the meditation group, and the fact that they all participants live in the same apartment building. Though the themes were broad, they did not warrant sub-categorization. Our team has also conducted a randomized clinical pilot trial of mindfulness meditation training with low- income minority older adults at a separate low-income housing building and with people who have never tried meditation \[[@B28]\].
A few limitations should be mentioned. The participants were only women. It is unknown whether men would have the same reactions to the ELDERSHINE program. However, low income minority communities of older adults are predominantly women. A second limitation is that the participants had been participating in ELDERSHINE for a range of time, some as many as three years. This is both a limitation and a strength. The limitation is that we cannot be sure these findings would apply to those who participated in the more typical 8 week mindfulness program. The strength is that, for the interviewed participants, the program is clearly relevant and sustainable demonstrated by the continued participation. A third limitation is the focus group participants knew each other. This may have limited negative comments due to social desirability bias \[[@B29]\]. A fourth limitation is that we did not stop the sampling due to data saturation but rather stopped due to near universality of focus group attendance by the ELDERSHINE participants. Because we offered the focus groups in the participants\' apartment building at a convenient time and offered food, the three focus groups included virtually everyone in the mediation group.
Conclusion
==========
In conclusion, this study has shown preliminary acceptability and perceived benefits evidence of a mindfulness-based stress reduction program for low-income minority older adults. Similar to research that has shown that mindfulness-based interventions may be effective to reduce stress, increase self-efficacy, and manage psychological and physical ailments among younger populations, study findings suggest that similar benefits may be achievable in older, more vulnerable populations.
Competing interests
===================
The authors declare that they have no competing interests.
Authors\' contributions
=======================
SLS provided some of the focus groups, collaborated on the analysis and drafted the manuscript. JW participated in the analysis and the writing of the manuscript. ABC provided the meditation groups and participated in the writing of the manuscript. RLP provided some of the focus groups, collaborated on the analysis and participated in the writing of the manuscript. All authors read and approved the final manuscript.
Pre-publication history
=======================
The pre-publication history for this paper can be accessed here:
<http://www.biomedcentral.com/1472-6882/11/44/prepub> | {
"perplexity_score": 445.5,
"pile_set_name": "PubMed Central"
} |
Sunday, May 13, 2018
Thanks a million - Catch the bug SSS-610
This is my card using the above sketch. I used the image called Izzy Flower.. This set has quite a few images in it. You might want to check it out.. I colored the image with copics. I then cut the piece down and went around the background with a flower design from Simon Says and Ranger ink. I then used Stampin up design paper for the background design. The sentiment is from Simon says. I went over the flower with Spectrum Noir sparkle pen.
what a cute little lady Billieand love all the flowers on this cardCute and sweet card for a girlI was at Doctor and he send me to make rontgenmy sholder right is pain since 3 monthI dont want to get operationI will search a Gymnastik for the shoulder-painI type so less BillieI like to work with my right hand dont want to get Operationpray for me sweet friendMany thanks for joining with us at Papercraft Challenges this timehugsMonika
Catch the bug
Translate
Pinterest
About Me
Hello my name is Billie and THANK YOU FOR STOPPING BY: I am a wife, mother to four, grandmother, great grandmother, a sister and friend. I love to play in my craft room and create. We live in the country and have 2 little four legged kid. | {
"perplexity_score": 1322.5,
"pile_set_name": "Pile-CC"
} |
Alps crash 'a picture of horror'
Show Caption Hide Caption White House on crash: No link to terrorism found USA TODAY's Hadley Malcolm speaks with Kim Hjelmgaard regarding the latest details from the press conference of the Lufthansa plane crash.
SAINT-LOUIS, France -- The pilots of a doomed German jetliner sent no distress call as the Airbus A320 went into a sharp, eight-minute descent Tuesday before crashing into the rugged French Alps, killing all 150 people aboard and leaving a scene of utter destruction.
"The site is a picture of horror,'' German Foreign Minister Frank-Walter Steinmeier said after viewing the crash scene from the air.
All on board the Germanwings Airbus A320 were presumed dead, French officials said. The victims included two infants, two opera singers and 16 German high school students and their teachers returning from an exchange trip to Spain. It was the deadliest crash in France in decades.
The mystery over the cause was deepened by the lack of a distress call and the loss of radio contact with air traffic control as it rapidly descended from a 38,000-feet cruising altitude, France's aviation authority said. One of the plane's two black box recorders was recovered at the crash site.
The White House issued a statement saying that no link to terrorism had been found.
Al Diehl, a former crash investigator for the National Transportation Safety Board, said the plane's high speed at low altitude, as evidenced by the wide scattering of small pieces of wreckage, suggested "extreme distress."
"When you get down the below the levels of the mountains and you're still going over 400 knots, either you're totally incapacitated or you have a horrific onboard emergency, or mechanically the aircraft is just not functioning," Diehl said. "You'd never fly an aircraft at 400 mph-plus anywhere close to those extreme terrain features."
The crash so distressed Germanwings crews that many did not show up for work, forcing mass flight cancellations, the RT news organization reported.
"One must not forget: many of our Germanwings crews have known crew members who were on board the crashed plane," Lufthansa CEO Carsten Spohr said in a written statement.
Lufthansa owns Germanwings, which was forced to cancel 30 flights across Europe, the Bild and RT news organizations reported.
First responders were let down from helicopter cables into the crash zone before the search was ended for the day by darkness.
"We saw an aircraft that had literally been ripped apart. The bodies are in a state of destruction. There is not one intact piece of wing or fuselage," Bruce Robin, prosecutor for the city of Marseille, told Reuters news service after flying over the area.
"It's a tragedy on our soil," French President Francois Hollande said. "I want to express all my solidarity to the families of the victims of this air accident. This is a bereavement, a tragedy."
In Washington, President Obama called the crash "particularly heartbreaking because it apparently includes the loss of so many children.'' He said he spoke with German Chancellor Angela Merkel to express condolences and planned to speak with Spain's president.
"Our thoughts and our prayers are with our friends in Europe, especially the people of Germany and Spain, following a terrible airplane crash in France,'' Obama said.
"Our teams are in close contact, and we're working to confirm how many Americans may have been on board,'' Obama said. "Germany and Spain are among our strongest allies in the world, and our message to them is that as their steadfast friend and ally, America stands with them at this moment of sorrow."
French authorities called off the search after dark. About 10 gendarmes will spend the night at the crash site to guard it, and search operations will resume at daybreak, Lt. Col. Jean-Marc Meninchini of the regional police rescue service, said. Recovery operations are expected to last a week, he said.
Sixteen schoolchildren and two teachers from the Joseph-König school in Haltern am See, near Düsseldorf, perished in the crash. They were returning from an exchange program in Spain.
"This is pretty much the worst thing you can imagine," Haltern Mayor Bodo Klimpel said.
Germanwings Flight 9525 departed Barcelona for a two-hour flight to Duesseldorf at 10:01 a.m. local time — more than 20 minutes late. Air-traffic controllers lost contact with the Airbus A320 at 10:53 a.m., airline CEO Thomas Winkelmann said.
Air-traffic controllers issued a distress signal after losing contact with the plane and recognizing the steep descent. The pilots never issued such a signal.
In Barcelona, the origin of the flight, and in Düsseldorf, crisis teams were aiding traumatized family members and airline staff. Family members are to be bused to the area.
Winkelmann said 144 passengers — including two babies — and six crew were aboard. .
Winkelmann said a sudden descent lasted about eight minutes and that air-traffic controllers lost contact with the jet at about 6,000 feet. He added that the pilot had more than 10 years of experience and that the plane was inspected fully last summer and checked over on Monday. Safety experts from France, Germany and Spain were en route to the crash site, he added.
Winkelmann said 67 Germans were on board -- there was no immediate confirmation on other nationalities.
Germanwings is a relatively low-cost subsidiary of Lufthansa popular with German tourists. It has expanded service to Spain in recent years. Twelve flights go between Barcelona and Düsseldorf every week.
The airline canceled most of Tuesday's remaining flights from Düsseldorf and some other airports as well, German broadcaster Ard reported.
"All employees of Germanwings and Lufthansa are deeply saddened," Winkelmann said. "Their thoughts and prayers are with the families and friends of the passengers and crew."
Lufthansa said it was operating under the theory that the crash was an accident.
The White House issued a statement saying Obama had been briefed by Lisa Monaco, his assistant for homeland security and counterterrorism, and that no link to terrorism had been found at this time, the statement said.
"Our thoughts and prayers are with the victims and their families and loved ones," the statement said. The U.S. State Department issued similar condolences, adding that the U.S. "stands ready to offer assistance and support" to the nations investigating the crash.
Hollande said the plane was carrying nationals from Spain, Germany and Turkey. He said that he wasn't aware of any French citizens aboard the plane. A manifest had not been released.
Merkel said many passengers were from Germany and that she would go to the region Wednesday.
Flight tracking systems indicated the plane's altitude was 38,000 feet at 10:30 a.m. when it began declining at a rate of more than 3,000 feet per minute. Eight minutes later it was down to 11,400 feet. At that point the Flightaware tracking system could provide no further statistics.
French Prime Minister Manuel Valls said the crash occurred near Digne-les-Bains, in the Alpes-de-Haute-Provence region — about 65 miles north of Nice. Debris from the crash has been located at an elevation of about 6,000 feet.
Capt. Benoit Zeisser of the Digne-le-Bains police told the French network iTele there were some clouds but the cloud ceiling was not low. Police tweeted a warning to people not to get close to the scene of the crash.
Sébastien Giroud, who lives in the hamlet of Prads-Haute Bléone, told TV station France Info that he saw the plane flying at an unusually low altitude and feared for the worse.
"I saw the plane flying very low for two or three seconds," he said. "When I saw it I understood that it wouldn't go too far."
Another resident said he saw the plane 800 meters from the ground, and described it as white aircraft with orange on the tail.
"I saw that the prow was lower than the tale, but I could not say it was nose-diving," Jean-Marie told Le Parisien. "I saw it during five seconds before it disappeared behind the mountains."
Valls said he had sent Interior Minister Bernard Cazeneuve to the scene of the crash, the first of a commercial jet on French soil since a Concorde jet crash outside Paris in July 2000 killed 113 people.
Airbus said it was sending a "go-team of technical advisers" to aid international authorities in the investigation. Lufthansa spokeswoman Kim Jucknat said the airline also has launched an investigation.
"My deepest sympathy goes to the families and friends of our passengers and crew," Lufthansa Group CEO Carsten Spohr said in a statement. " This is a dark day for Lufthansa."
Bacon reported from McLean, Va.; Contributing: Jane Onyanga-Omara and Kim Hjelmgaard in London; Bart Jansen in Washington, D.C.; William M. Welch in Los Angeles; Associated Press | {
"perplexity_score": 271,
"pile_set_name": "OpenWebText2"
} |
Q:
Main function Concept in C
I am wondering if it is possible that Can you write two functions in which one function executes before main and the other function executes after main function?? This was asked in a quiz contest, and I am finding difficulty in searching the answer for it.
A:
For running stuff at exit you can use atexit
#include <stdio.h>
#include <stdlib.h>
void we_are_dying()
{
printf("Get the doctor!\n");
}
int main(void) {
atexit(we_are_dying);
// your code goes here
printf("We are done\n");
return 0;
}
For running stuff before main I do not think this is possible. | {
"perplexity_score": 2045.1,
"pile_set_name": "StackExchange"
} |
Carrie-Anne Moss
Carrie-Anne Moss (born August 21, 1967) is a Canadian actress. Following early roles on television, she rose to international prominence for her role of Trinity in The Matrix trilogy (1999–2003). She has starred in Memento (2000), Red Planet (2000), Chocolat (2000), Fido (2006), Snow Cake (2006), Disturbia (2007), Unthinkable (2010), Silent Hill: Revelation (2012), and Pompeii (2014).
She also portrayed Jeri Hogarth in several television series of the Marvel Cinematic Universe, most notably Jessica Jones (2015–2019).
Early life
Carrie-Anne Moss was born in Burnaby, British Columbia, the daughter of Barbara and Melvyn Moss. She has an older brother, Brooke. Moss's mother reportedly named her after The Hollies' 1967 hit song, "Carrie Anne", which had been released in May that year. Moss lived with her mother in Vancouver as a child. At the age of 11, she joined the Vancouver children's musical theatre and later went on to tour Europe with the Magee Secondary School Choir in her senior year.
Career
1990s and breakthrough
While in Spain, Moss obtained a role as Tara, the clerk to Judge Bruce Marshall (Ramy Zada in season 1, Bruce Abbott in season 2), in the drama series Dark Justice, her first television appearance. She moved from Barcelona to Los Angeles with the series in 1992. Moss left Dark Justice before the series' third and final season and was replaced by Elisa Heinsohn as Samantha "Sam" Collins. She enrolled at the American Academy of Dramatic Arts in Pasadena upon her return, and she subsequently starred in Fox's prime time soap opera Models Inc., a spin-off of Melrose Place, as a model, starring alongside Dallas alumna Linda Gray. The series was cancelled in July 1995. She headlined a short-lived made-in-Canada series entitled Matrix. For most of the 1990s, she appeared in several television series such as Street Justice, Baywatch, F/X: The Series, Due South, for which she scored a nomination for the Gemini Award for Best Guest Actress in a Drama. Many of her film roles in the decade were in B movies, including Flash-fire (1994), The Soft Kill (1994), Tough-guy (1994), Lethal Tender (1996), Sabotage (1996) and The Secret Life of Algernon (1997).
Her breakthrough role came when she played Trinity in the science fiction thriller The Matrix (1999). Her role demanded extreme acrobatic actions, and she underwent a three-hour physical test during casting. The film grossed over US$460 million worldwide and was highly acclaimed by critics, some of whom have considered it one of the greatest science fiction films ever made. Moss asserted that prior to being cast in The Matrix, she had "no career". It launched Moss into international recognition and transformed her career; in a New York Daily News interview, she stated, "The Matrix gave me so many opportunities. Everything I've done since then has been because of that experience. It gave me so much." Moss was nominated for a Saturn Award for Best Actress, and for the MTV Movie Award for Breakthrough Female Performance.
2000s
Moss had four film releases in 2000—Chocolat, Red Planet, The Crew and Memento. In the romantic comedy Chocolat, she took on the role of Caroline Clairmont, a cold, devoutly pious woman living in a French village. As part of an overall positive response towards the film, The New York Times remarked that Moss, "as an upright widowed mother swathed in mournful baby blue, radiates glimmers of hurt; she shows it's not easy to keep up such a front." The film made US$152 million at the international box office. The science fiction thriller Red Planet saw her play the commander and leader of a rescue mission to Mars. A.V Club felt that Moss was "largely reduced to worrying while modeling a series of tight-fitting space fashions". Despite an US$80 million budget, the film only grossed US$33 million worldwide. She appeared as detective Olivia Neal in the crime black comedy The Crew, directed by Michael Dinner and starring Burt Reynolds, Seymour Cassel and Richard Dreyfuss.
In Christopher Nolan's neo-noir psychological thriller Memento, she starred opposite Guy Pearce portraying a manipulative bartender who meets a man suffering from anterograde amnesia. Producer Jennifer Todd suggested Moss for the part after being impressed by her performance in The Matrix. While actress Mary McCormack lobbied for the role, Nolan decided to cast Moss as Natalie, saying, "She added an enormous amount to the role of Natalie that wasn't on the page". The film became a sleeper hit, being acclaimed by critics and earning US$39.7 million over a US$9 million budget. She won the Independent Spirit Award for Best Supporting Female for her performance.
Moss reprised the role of Trinity in the back-to-back sequels The Matrix Reloaded and The Matrix Revolutions, both released in 2003. Like the original, The Matrix Reloaded received positive critical reception, and became a major box office hit, grossing US$742.1 million worldwide. The Matrix Revolutions received a lukewarm critical reception, but made US$427.3 million globally. During an interview with BBC Online, Moss expressed her pride for starring in the franchise, which she described as a "segment of [her] life": "It's deep and it's beautiful to have been part of it for so long. It's pretty spectacular". She provided voiceovers for video game and animated spin-offs of the films.
In 2005, Moss starred with Aaron Eckhart and Ben Kingsley in the little-seen thriller Suspect Zero, as FBI agent Fran Kulok, and was part of an ensemble cast in the independent dramedy The Chumscrubber, which premiered at the Sundance Film Festival. Moss appeared in the zombie comedy Fido (2006), playing a housewife in a 1950s-esque alternate universe where radiation from space has turned the dead into zombies. She noted the "very rich" and "very visual" script for the film, and became drawn to the project for its "underlying messages about control and domination". The film was an opening night film at the Toronto International Film Festival and received largely favourable reviews, with Los Angeles Times calling it a "crafty mixture of George Romero and Douglas Sirk". Moss played the neighbour of an autistic woman in the small-scale romantic drama Snow Cake (2006), starring Alan Rickman and Sigourney Weaver. It was released in selected theatres, to positive reviews from critics. Moss earned a nomination for Genie Award for Best Performance by an Actress in a Supporting Role.
In the Hitchcockian thriller Disturbia (2007), Moss portrayed the mother of a troubled teenager (Shia LaBeouf) who suspects one of his neighbours is a serial killer. The film was met with a positive critical reception and made US$117.8 million around the globe. She played one of the people who are brought together in the wake of a deadly car accident in the independent drama Normal (2007), released for selected theatres. Moss appeared opposite Julia Roberts, Willem Dafoe and Ryan Reynolds in the drama Fireflies in the Garden, which revolved around the inner lives and affairs of a family. The production premiered at the 2008 Berlin International Film Festival and was released theatrically in the United States in October 2011. She starred in the straight-to-DVD romantic comedy Love Hurts (2009), alongside Richard E. Grant and Jenna Elfman.
2010s
In the thriller Unthinkable (2010), directed by Gregor Jordan and co-starring Samuel L. Jackson and Michael Sheen, Moss played the leader of an FBI counter-terrorism team assigned to interrogate a man who threatens to detonate three nuclear bombs in the United States. The film was released direct-to-DVD and generated controversy over its subject matter. She took on the role of antagonist Claudia Wolf in the sequel to the 2006 horror film Silent Hill, Silent Hill: Revelation (2012). Budgeted at US$20 million, the film grossed US$52.3 million worldwide, but has garnered an overwhelmingly negative reception among film critics and fans alike. Mentioning Moss in its review for the film, The New York Times remarked that the supporting actors "deserve much, much better". She voiced the character Aria in the video games Mass Effect 2 (2010) and Mass Effect 3 (2012).
She had a four-episode arc in the series Chuck between 2011 and 2012, and played the regular role of Las Vegas Assistant District Attorney Katherine O'Connell in the CBS period drama series Vegas, which premiered in September 2012, but was cancelled after its first season, despite an overall positive response. Writing for The New York Times, Mike Hale felt that Moss "feels out of place in this frontier tale, but looks great in snug wool suits". Moss obtained the role of Penelope, a California candidate for governor who runs a free health clinic, in the political thriller Knife Fight (2012), directed by Bill Guttentag and co-starring Rob Lowe. The film premiered at the Tribeca Film Festival and was released for a two-theater run and digital platforms. Moss headlined with Heather Graham the psychological dark comedy Compulsion (2013), in which they both played women occupying neighbouring apartments, each one grappling with psychological disorders that begin to overtake their lives. The film opened for limited release. She voiced the character of Admiral Wells in the fantasy animated film The Clockwork Girl (2014).
She starred with Kit Harington, Emily Browning and Jared Harris in the 3D historical disaster picture Pompeii (2014), produced and directed by Paul W. S. Anderson. The film, inspired by the eruption of Mount Vesuvius in 79 that destroyed the Roman Empire city Pompeii, saw her portray Aurelia, the wife of the city governor (Harris). With an over-US$80 million budget, the film only grossed US$23.2 million in North America, but its worldwide gross total was US$117.8 million. In the independent drama Elephant Song (2014), directed by Charles Binamé, Moss starred opposite Bruce Greenwood and Xavier Dolan as the wife of a psychiatrist (Greenwood). The film was screened at the Toronto International Film Festival, and in its review for the film, Variety described her role as "a pushily self-centered second wife" and found her part to be "a poorly integrated subplot" in the film. In 2015, she voiced a widowed mother in the made-for-television animated film Pirate's Passage, was one of the narrators in the documentary Unity, and appeared as the wife of Victor Frankenstein in Frankenstein, an updated adaptation of Mary Shelley's book.
In 2015, Moss appeared in Jessica Jones as Jeri Hogarth, an attorney and potentially powerful ally to the title character. The gender of the character was changed from male to female for the series, and the character was made a lesbian. Moss signed on to the series after reading the first two scripts, having been pitched the character by producer Jeph Loeb and screenwriter Melissa Rosenberg. She described the character by saying that "she's fierce, she's strong, she's powerful, and she likes that power". The web series premiered on Netflix, to critical acclaim. Moss has also reprised her role of Jeri Hogarth in the second-season finale of Daredevil, and has had recurring arcs in Iron Fist and The Defenders. Moss took on the lead role of Dr Athena Morrow, an AI researcher invited to reverse engineer a consciousness program, in the second season of the science-fiction series Humans. Moss filmed a supporting part in the supernatural horror film The Bye Bye Man (2017), playing what Variety described as "the world's most soft-edged hard-bitten police detective". Despite negative reviews, the film grossed US$24 million worldwide on a budget of US$7 million.
Personal life
Moss married American actor Steven Roy in 1999, and they have two sons and a daughter. They live in Los Angeles.
She is also the founder of Annapurna Living, a lifestyle brand designed to empower women through mindfulness, meditation & devotion.
Filmography
Film
Television
Video games
Awards and nominations
References
External links
Category:1967 births
Category:Living people
Category:20th-century Canadian actresses
Category:21st-century Canadian actresses
Category:Actresses from British Columbia
Category:American Academy of Dramatic Arts alumni
Category:Best Newcomer Empire Award winners
Category:Canadian expatriate actresses in the United States
Category:Canadian film actresses
Category:Canadian television actresses
Category:Canadian video game actresses
Category:Canadian voice actresses
Category:Best Actress Genie and Canadian Screen Award winners
Category:Best Supporting Actress Genie and Canadian Screen Award winners
Category:Independent Spirit Award winners
Category:People from Burnaby
Category:People with acquired American citizenship | {
"perplexity_score": 145.9,
"pile_set_name": "Wikipedia (en)"
} |
先日、ケイトの新たな旅を描く人気シリーズ最新作“Syberia: The World Before”をアナウンスしたフランスの歴史あるパブリッシャー兼デベロッパ「Microids」が、昨晩プレスリリースを発行し、国際的なビジネスの拡大を視野に入れた成長戦略の一環として、なんと日本オフィスを設立したことが明らかになりました。
これは、日本市場における“ギア・クラブ アンリミテッド”の成功に伴い、日本オフィスの設立を決定したもので、Martial Meyssignac氏が日本オフィスの代表を務め、Microids作品の販売だけでなく、日本の象徴的なタイトルと仏Microidsの契約を目指しているとのこと。
この他、さらなる取り組みとして、2009年に“Microids”を買収した親会社である“Amuman Interactive”の名称そのものを“Microids”に変更。Amuman InteractiveのCEO兼創設者Stéphane Longeard氏が新たな“Microids”のCEOに就任し、かつて“Microids”を設立したElliot Grassiano氏と共にスタジオの運営にあたることが判明しています。
さらに、インディーレーベル“Microids Indie”の取り組みに関する強化もアナウンスされ、インディ専門チームが設立されるほか、インディ分野で活躍した経歴を持つVincent Dondaine氏が同レーベルのVPに就任し、今後のインディビジネスを率いるとのこと。
“Microids”の業績については、現在の総収益のうち83%がフランス国外の販売によって占められ、アドベンチャーゲームとレーシングゲーム、レトロゲーム、ライセンスタイトルを柱とするポートフォリオの拡充に伴い、直近の4年間は毎年50%もの収益増と成長を達成したと報じられています。
“Microids”の日本オフィス設立に伴い、“Syberia 3”以降の作品を含む人気アドベンチャーの日本語対応が実現するか、今後の取り組みに大きな期待が掛かるところです。 | {
"perplexity_score": 5098.2,
"pile_set_name": "OpenWebText2"
} |
Q:
get_template_part() isn't loading author information
Using get_template_part() I parted some of my theme's common post templates. My post template is content-general.php. Without parting thing is going fine. But just after parting the template — using WP_DEBUG, true — I discovered it's showing some errors in loading author information:
Notice: Undefined variable: authordata
Along with:
Notice: Trying to get property of non-object
I have the following code, where I have $authordata:
<a class="url fn n" href="<?php echo get_author_posts_url( false, $authordata->ID, $authordata->user_nicename ); ?>" title="<?php printf( __( 'View all posts by %s', 'your-theme' ), $authordata->display_name ); ?>">
<?php the_author(); ?>
</a>
I followed this WPSE thread and tried globalizing $post inside the template file (content-general.php) like:
<?php global $post; ?>
and the template is called within a default WordPress loop. But the problem is not solved.
A:
With this answer with good practices, by Chip Bennett, in mind just do a simple global thing — add global $authordata to your template file:
<?php global $authordata; ?>
Follow the Codex's Global Variables article for details about the global practice.
Quoting the portion specific to the Question:
$authordata (object) Returns an object with information about the author, set alongside the last $post. | {
"perplexity_score": 2213,
"pile_set_name": "StackExchange"
} |
970 So.2d 841 (2007)
SMITH
v.
STATE.
No. 3D07-2561.
District Court of Appeal of Florida, Third District.
December 12, 2007.
Decision without published opinion. Mand. denied. | {
"perplexity_score": 637.8,
"pile_set_name": "FreeLaw"
} |
The aim of this project is to test the hypothesis that smooth muscle cells from patients with Crohn's disease and ulcerative colitis induce expression of CD1d on intestinal epithelial cells, which in turn leads to an inappropriate inflammatory response. We propose to determine if certain candidate cytokines are responsible for the upregulation of CD1d, which is an antigen-presenting MHC-like protein. Supernatants from co-cultures of patient (and control) smooth muscle cells and an intestinal epithelial cell line are sent to the immunomodulation core lab for analysis. | {
"perplexity_score": 112.4,
"pile_set_name": "NIH ExPorter"
} |
Sara,
My contact is
Fred Ritts at Brickfield, Bruchette, Ritts & Stone, PC
202.342.0800
Just in case you need to talk to someone directly. I will be out for just a
little while, please call me on my cell if you need me immediately.
281.782.6397.
Many thanks,
Lucy | {
"perplexity_score": 919.2,
"pile_set_name": "Enron Emails"
} |
Welcome to the Piano World Piano ForumsOver 2 million posts about pianos, digital pianos, and all types of keyboard instruments
Join the World's Largest Community of Piano Lovers
(it's free)
It's Fun to Play the Piano ... Please Pass It On!
I think that duets (on the same piano) are always on separate pages and piano duets (on two pianos) are on the same page/system.
If anything I would assume that it would be easier for a beginner to see just his/her two staves and play as they always play, but listen something additional on the back, rather than see two extra staves bellow his/her and having to decide what to play, how to 'gap' these two and move on to the next two and so on...
This is my understanding as well as far as how music is generally notated. If you have music that is not on separate pages for Primo and Secondo, then I'd photocopy and cut and paste them so that they were that way. I think it's very important since kids are not used to reading on a multi-staff system.
As a student with about 3 yrs experience I can tell you that seperate pages is MUCH less stressful! No doubt about it.
_________________________XVIII-XXXVIIFollow your teacher's instructions and practice wisely/much, and you'll soon wonder how you ever found it hard. BobPicklePerformance anxiety: make it part of your daily routine and deal with it...Cope! zrtf90
I think as a teacher, I like to see two scores together in one page so that I know what is going on for both players in my studio. However, I think my students response better when they are in separate page because it is less confusing. Conclusion, I just hope that all the publishers will publish the duet in two version:1. Secondo and Primo in separate page for easy use for students, and2. Secondo and Primo in same page for easy use for teachers.
Just like the orchestra score, it is easier for the conductor to read the conductor score with all the instruments, but easier for orchestra player to see only his or her part on the page.
I cannot STAND it when duet parts are written on the same page. It seems unnecessarily confusing and even I (the teacher!) find it difficult to read sometimes. Unfortunately a lot of beginner/elementary duet books seem to be laid out this way. I have numerous duet books that I just haven't used yet as it would definitely require some photocopying, cutting and pasting before I'd be happy to present it to a student.
Dallas Weekley and Nancy Arganbright, the noted team of duet players and editors, have decided it is better to print the Primo and Secondo parts on the same page, one on top of another, with all the measures aligned. All of their recent editions of duet music do that.
However, I've also seen recent editions of duets that print Primo on the right and Secondo on the left. These recent editions have made improvements from horrible, older editions in these ways: 1) the editors have clearly labeled measure numbers instead of the dumb rehearsal "letters,"2) each system (between Primo and Secondo) starts on the same measure in the music, 3) the print is large and clear, and4) there is a lot of margin and space between systems in which to pencil in rehearsal notes.
Dallas Weekley and Nancy Arganbright, the noted team of duet players and editors, have decided it is better to print the Primo and Secondo parts on the same page, one on top of another, with all the measures aligned. All of their recent editions of duet music do that.
My reason for not going that way and instead opting for the left-right page is that:
a. It could be mixed as a piano duet in two pianos, quite easily (and frankly this is what traditionally looks like)b. It's far harder for each pianist to actually follow while performing. (more about that later)
Quote:
However, I've also seen recent editions of duets that print Primo on the right and Secondo on the left. These recent editions have made improvements from horrible, older editions in these ways: 1) the editors have clearly labeled measure numbers instead of the dumb rehearsal "letters,"2) each system (between Primo and Secondo) starts on the same measure in the music, 3) the print is large and clear, and4) there is a lot of margin and space between systems in which to pencil in rehearsal notes.
Without having studied other quatre mains scores, I can say that I did all 4 of the above because... they made sense.
measure numbers, same system and same measure number, large and clear (all the score anyhow) and ample marginal space.
I should also note that, while for printing it IS inconvenient and costs more, I went for landscape format instead of portrait: It's much better in the eye of the duet, sitting on the same bench, etc. Tried the portrait version, and couldn't work with it as a pianist!
Ahhh... why not?
Here's a couple of pages from the first work in my work. Keep in mind that page 2 (the first link) doesn't have a page number, exactly because it's the very fist page of a 40 page score!) | {
"perplexity_score": 426.3,
"pile_set_name": "Pile-CC"
} |
[Stability analysis of an enhanced load sharing dynamic pedicle screw fixation device and its equivalent rigid device].
To compare the stability of an enhanced load sharing dynamic pedicle screw fixation device with its equivalent rigid device and to evaluate biomechanical roles of the dynamic fixation. A model of L(1) body fracture was produced on seven specimens of fresh adult cadaver spine from T(10) to L(4). Both dynamic and rigid devices were applied in the specimens to strength the injured level. Ranges of three dimensional movements and stiffness under flexion-compression were measured in intact, injured and stabilized specimens. Both dynamic and rigid devices were found to provide significant stability for injured segment in flexion-extension and lateral bending. In axial rotation, the devices could restore the stability to levels similar to those in an intact spine. Results indicated 40% increase in range of motion in flexion-extension and 24.1 Nmm reduction in stiffness of flexion-compression for dynamic device, compared with the rigid device. The dynamic device offers a design that may enhance load sharing without sacrificing the stability and will decrease stress-shielding and stress concentration. | {
"perplexity_score": 877.3,
"pile_set_name": "PubMed Abstracts"
} |
Q:
Enable backups of Digital Ocean Instances using Salt Cloud
I have set up a Salt Master and have got everything to work well but there has been one thing I have not been able to figure out and trying to search for the answer is proving to be difficult so I thought I would see if anyone else has come across this. I have a profile setup in digital ocean that is setup up like the following:
digitalocean-ubuntu:
provider: my-digitalocean-config
image: Ubuntu 14.04 x32
size: 512MB
location: New York 1
backups_enabled: True
When I run the profile it creates the proper instance with all the options correct but the backups_enabled doesn't seem to work. I have tried going on both digital ocean's website as well as looking through the salt documents but I can't figure out if the command changed or isn't supported anymore? If someone knows the answer I would be very grateful to learn what I'm doing wrong.
A:
Salt has two versions of their digital ocean API. One for V1 and one for V2. I wasn't using the newer version so there were issues trying to enable new features. | {
"perplexity_score": 582.9,
"pile_set_name": "StackExchange"
} |
Q:
no default constructor exists
I'm having some trouble with a class that was working fine and now doesn't seem to want to work at all.
The error is "No appropriate default constructor available"
I am using the class in two places I'm making a list of them and initializing then adding them to the list.
Vertice3f.h
#pragma once
#include "Vector3f.h"
// Vertice3f hold 3 floats for an xyz position and 3 Vector3f's
// (which each contain 3 floats) for uv, normal and color
class Vertice3f{
private:
float x,y,z;
Vector3f uv, normal, color;
public:
// If you don't want to use a UV, Normal or Color
// just pass in a Verctor3f with 0,0,0 values
Vertice3f(float _x, float _y, float _z, Vector3f _uv,
Vector3f _normal, Vector3f _color);
~Vertice3f();
};
Vertice3f.cpp
#include "Vertice3f.h"
Vertice3f::Vertice3f(float _x, float _y, float _z,
Vector3f _uv, Vector3f _normal, Vector3f _color){
x = _x;
y = _y;
z = _z;
uv = _uv;
normal = _normal;
color = _color;
}
It is being using in my OBJModelLoader class as follows:
list<Vertice3f> vert3fList;
Vertice3f tvert = Vertice3f(
x = (float)atof(
vertList[i].substr(
vertList[i].find("v") + 1,
vertList[i].find(" ", vertList[i].find("v") + 2, 10)
).c_str()
),
y = (float)atof(
vertList[i].substr(
vertList[i].find(" ", vertList[i].find("v") + 4, 10) + 1,
vertList[i].find(" ", vertList[i].find("v") + 13, 10)
).c_str()
),
z = (float)atof(
vertList[i].substr(
vertList[i].find(" ", vertList[i].find("v") + 13, 10) + 1,
vertList[i].find(" ", vertList[i].find("v") + 23, 10)
).c_str()
),
::Vector3f(0.0f,0.0f,0.0f),::Vector3f(0.0f,0.0f,0.0f),::Vector3f(0.0f,0.0f,0.0f)
);
vert3fList.push_back(
tvert
);
I have tried defining a default constructor myself so in the .h I put
Vertice3f();
and in the cpp
Vertice3f::Vertice3f(){
x = 0.0f;
y = 0.0f;
z = 0.0f;
uv = Vector3f(0.0f,0.0f,0.0f);
normal = Vector3f(0.0f,0.0f,0.0f);
color = Vector3f(0.0f,0.0f,0.0f);
}
So, I'm not sure why it can't find a default constructor or how to appease the compiler. I'm sure it's user error because the compiler probably knows what it's doing.
Any help is greatly appreciated, I will answer any other questions you have, just ask.
A:
I'd guess that the missing default constructor is the default constructor of Vector3f class, not of Vertice3f class. Your constructor of Vertice3f attempts to default-construct its Vector3f members, which leads to the error.
This is why your attempts to provide default constructor for Vertice3f don't change anything. The problem lies, again, with Vector3f.
To fix it either provide all necessary default constructors (assuming it agrees with your design), or rewrite the constructor of Vertice3f by using initializer list instead of in-body assignment
Vertice3f::Vertice3f(float _x, float _y, float _z,
Vector3f _uv, Vector3f _normal, Vector3f _color) :
x(_x), y(_y), z(_z), uv(_uv), normal(_normal), color(_color)
{}
This version no longer attempts to default-construct anything. And using initializer list instead of in-body assignment is a good idea in any case. | {
"perplexity_score": 1619.5,
"pile_set_name": "StackExchange"
} |
Q:
PHP Youshido GraphQL issue with nested fields
I am using version v1.4.2.18. The library can be found here: https://github.com/Youshido/GraphQL
I am trying to accomplish the following:
query {
articleSummary(id:1) {
title,
body,
article {
id
}
}
}
I have an ArticleSummaryField.php:
class ArticleSummaryField extends AbstractField
{
public function build(FieldConfig $config)
{
$config->addArgument('id', new NonNullType(new StringType()));
}
public function getType()
{
return new ArticleSummaryType();
}
public function resolve($value, array $args, ResolveInfo $info)
{
return [
'title' => 'test title',
'body' => 'test body',
'article' => $args['id']
];
}
}
Then the ArticleSummaryType.php:
class ArticleSummaryType extends AbstractObjectType
{
public function build($config)
{
$config
->addField('title', new StringType());
->addField('body', new StringType());
->addField('article', new ArticleField());
}
}
Then the ArticleField.php has the getType method return the ArticleType which has the id field.
However what i am getting is an error:
Fatal error: Uncaught Error: Call to undefined method ArticleField::getNullableType() in .../vendor/youshido/graphql/src/Execution/Processor.php on line 135
What seems to be happening is that when $targetField->getType() on line 135 in src/Execution/Processor.php is called its returning the ArticleField class, not the ArticleType class.
I would expect that to return the class as declared in the 'getType' method on the ArticleField class.
Am i going about this wrong for nesting fields? Or is there a bug in the library?
A:
To accomplish this you only pass the Field class as the first argument.
class ArticleSummaryType extends AbstractObjectType
{
public function build($config)
{
$config
->addField('title', new StringType());
->addField('body', new StringType());
->addField(new ArticleField());
}
}
Then in the field class you can override getName to set the name for the field as needed or it will use the class name as the field name. | {
"perplexity_score": 2369.9,
"pile_set_name": "StackExchange"
} |
Congrats to Alex Ramirez for scoring 4 goals in a single game…a hat-and-a-half trick or something like that.
Close to something like this:
On 3 December 2008 Carlos Tevez of Manchester United scored a ‘grand slam’ against Blackburn Rovers. This consisted of a header, penalty kick (right footed), left foot and right foot.
Anyway, all the scoring meant the game was pretty uneventful for the defense. In the first half a Jako forward cracked a powerful shot that bounced off the bottom of the crossbar but was gracefully saved by Matt Wharton.
In the 2nd half Ibu got a little bored as keeper and baited a Jako forward with a drop-kick gift. He tried to lob our tall Gambian friend but missed the goal by a mile.
Ah yes, the early BML kickoff. On one hand it makes it a bit difficult to plan wicked Saturday night festivities, yet on the other hand you’ve got still got the rest of your Sunday to do with as you please.
Both teams looked short on players during warm up. After the lineup and friendly greeting, City only had 10 guys on the field when the kickoff whistle blew.
About 15 minutes later, with a full eleven on the pitch, things started to warm up for Taipei City offensively. Michael Christie took a nice half-volley from outside the 18-yard box to beat the keeper. 1-0 City.
Then we had some more goals, please forgive me if they’re not in the right order.
Gustavo dribbled through the Jako defense for a tidy finish on the keeper, 2nd game scoring streak. 2-0
Tim cracked a well-placed shot past the keeper just on the edge of the 18-yard box. 3-0
Unlucky deflection as Taipei City scores its first own goal. 3-1
Michael Christie again with a diagonal wormburner from outside the 18 across the goal into the bottom left corner. 4-1 (2 goals from center-mid, nicely done!)
Ross beats defender and keeper with a header from Spencer’s cross. Final score 5-1.
It may sound like a one-sided game but Rojen made 3 spectacular one-on-one saves as substitute keeper…without which we would have easily been under heavy pressure from Jako. | {
"perplexity_score": 518.3,
"pile_set_name": "Pile-CC"
} |
*HOT* Watch Mila J In – “Smoke, Drink, Break Up” Music Video!
The Chilombo sisters are holding it down. While Jhené Aiko enjoys her own success, her older sister Mila J steps into the spotlight with the dance-heavy video for “Smoke, Drink, Break-Up.” But just because they share the same parents, don’t expect the same sound. [Read more – HERE] | {
"perplexity_score": 279.8,
"pile_set_name": "Pile-CC"
} |
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is the Netscape Portable Runtime (NSPR).
*
* The Initial Developer of the Original Code is
* Netscape Communications Corporation.
* Portions created by the Initial Developer are Copyright (C) 1998-2000
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
#include "primpl.h"
#if !defined (USE_SVR4_THREADS)
/*
* using only NSPR threads here
*/
#include <setjmp.h>
void _MD_EarlyInit(void)
{
}
PRWord *_MD_HomeGCRegisters(PRThread *t, int isCurrent, int *np)
{
if (isCurrent) {
(void) setjmp(CONTEXT(t));
}
*np = sizeof(CONTEXT(t)) / sizeof(PRWord);
return (PRWord *) CONTEXT(t);
}
#ifdef ALARMS_BREAK_TCP /* I don't think they do */
PRInt32 _MD_connect(PRInt32 osfd, const PRNetAddr *addr, PRInt32 addrlen,
PRIntervalTime timeout)
{
PRInt32 rv;
_MD_BLOCK_CLOCK_INTERRUPTS();
rv = _connect(osfd,addr,addrlen);
_MD_UNBLOCK_CLOCK_INTERRUPTS();
}
PRInt32 _MD_accept(PRInt32 osfd, PRNetAddr *addr, PRInt32 addrlen,
PRIntervalTime timeout)
{
PRInt32 rv;
_MD_BLOCK_CLOCK_INTERRUPTS();
rv = _accept(osfd,addr,addrlen);
_MD_UNBLOCK_CLOCK_INTERRUPTS();
return(rv);
}
#endif
/*
* These are also implemented in pratom.c using NSPR locks. Any reason
* this might be better or worse? If you like this better, define
* _PR_HAVE_ATOMIC_OPS in include/md/unixware.h
*/
#ifdef _PR_HAVE_ATOMIC_OPS
/* Atomic operations */
#include <stdio.h>
static FILE *_uw_semf;
void
_MD_INIT_ATOMIC(void)
{
/* Sigh. Sure wish SYSV semaphores weren't such a pain to use */
if ((_uw_semf = tmpfile()) == NULL)
PR_ASSERT(0);
return;
}
void
_MD_ATOMIC_INCREMENT(PRInt32 *val)
{
flockfile(_uw_semf);
(*val)++;
unflockfile(_uw_semf);
}
void
_MD_ATOMIC_ADD(PRInt32 *ptr, PRInt32 val)
{
flockfile(_uw_semf);
(*ptr) += val;
unflockfile(_uw_semf);
}
void
_MD_ATOMIC_DECREMENT(PRInt32 *val)
{
flockfile(_uw_semf);
(*val)--;
unflockfile(_uw_semf);
}
void
_MD_ATOMIC_SET(PRInt32 *val, PRInt32 newval)
{
flockfile(_uw_semf);
*val = newval;
unflockfile(_uw_semf);
}
#endif
void
_MD_SET_PRIORITY(_MDThread *thread, PRUintn newPri)
{
return;
}
PRStatus
_MD_InitializeThread(PRThread *thread)
{
return PR_SUCCESS;
}
PRStatus
_MD_WAIT(PRThread *thread, PRIntervalTime ticks)
{
PR_ASSERT(!(thread->flags & _PR_GLOBAL_SCOPE));
_PR_MD_SWITCH_CONTEXT(thread);
return PR_SUCCESS;
}
PRStatus
_MD_WAKEUP_WAITER(PRThread *thread)
{
if (thread) {
PR_ASSERT(!(thread->flags & _PR_GLOBAL_SCOPE));
}
return PR_SUCCESS;
}
/* These functions should not be called for Unixware */
void
_MD_YIELD(void)
{
PR_NOT_REACHED("_MD_YIELD should not be called for Unixware.");
}
PRStatus
_MD_CREATE_THREAD(
PRThread *thread,
void (*start) (void *),
PRThreadPriority priority,
PRThreadScope scope,
PRThreadState state,
PRUint32 stackSize)
{
PR_NOT_REACHED("_MD_CREATE_THREAD should not be called for Unixware.");
}
#else /* USE_SVR4_THREADS */
/* NOTE:
* SPARC v9 (Ultras) do have an atomic test-and-set operation. But
* SPARC v8 doesn't. We should detect in the init if we are running on
* v8 or v9, and then use assembly where we can.
*/
#include <thread.h>
#include <synch.h>
static mutex_t _unixware_atomic = DEFAULTMUTEX;
#define TEST_THEN_ADD(where, inc) \
if (mutex_lock(&_unixware_atomic) != 0)\
PR_ASSERT(0);\
*where += inc;\
if (mutex_unlock(&_unixware_atomic) != 0)\
PR_ASSERT(0);
#define TEST_THEN_SET(where, val) \
if (mutex_lock(&_unixware_atomic) != 0)\
PR_ASSERT(0);\
*where = val;\
if (mutex_unlock(&_unixware_atomic) != 0)\
PR_ASSERT(0);
void
_MD_INIT_ATOMIC(void)
{
}
void
_MD_ATOMIC_INCREMENT(PRInt32 *val)
{
TEST_THEN_ADD(val, 1);
}
void
_MD_ATOMIC_ADD(PRInt32 *ptr, PRInt32 val)
{
TEST_THEN_ADD(ptr, val);
}
void
_MD_ATOMIC_DECREMENT(PRInt32 *val)
{
TEST_THEN_ADD(val, 0xffffffff);
}
void
_MD_ATOMIC_SET(PRInt32 *val, PRInt32 newval)
{
TEST_THEN_SET(val, newval);
}
#include <signal.h>
#include <errno.h>
#include <fcntl.h>
#include <sys/lwp.h>
#include <sys/procfs.h>
#include <sys/syscall.h>
THREAD_KEY_T threadid_key;
THREAD_KEY_T cpuid_key;
THREAD_KEY_T last_thread_key;
static sigset_t set, oldset;
void _MD_EarlyInit(void)
{
THR_KEYCREATE(&threadid_key, NULL);
THR_KEYCREATE(&cpuid_key, NULL);
THR_KEYCREATE(&last_thread_key, NULL);
sigemptyset(&set);
sigaddset(&set, SIGALRM);
}
PRStatus _MD_CREATE_THREAD(PRThread *thread,
void (*start)(void *),
PRThreadPriority priority,
PRThreadScope scope,
PRThreadState state,
PRUint32 stackSize)
{
long flags;
/* mask out SIGALRM for native thread creation */
thr_sigsetmask(SIG_BLOCK, &set, &oldset);
flags = (state == PR_JOINABLE_THREAD ? THR_SUSPENDED/*|THR_NEW_LWP*/
: THR_SUSPENDED|THR_DETACHED/*|THR_NEW_LWP*/);
if (_PR_IS_GCABLE_THREAD(thread) ||
(scope == PR_GLOBAL_BOUND_THREAD))
flags |= THR_BOUND;
if (thr_create(NULL, thread->stack->stackSize,
(void *(*)(void *)) start, (void *) thread,
flags,
&thread->md.handle)) {
thr_sigsetmask(SIG_SETMASK, &oldset, NULL);
return PR_FAILURE;
}
/* When the thread starts running, then the lwpid is set to the right
* value. Until then we want to mark this as 'uninit' so that
* its register state is initialized properly for GC */
thread->md.lwpid = -1;
thr_sigsetmask(SIG_SETMASK, &oldset, NULL);
_MD_NEW_SEM(&thread->md.waiter_sem, 0);
if ((scope == PR_GLOBAL_THREAD) || (scope == PR_GLOBAL_BOUND_THREAD)) {
thread->flags |= _PR_GLOBAL_SCOPE;
}
/*
** Set the thread priority. This will also place the thread on
** the runQ.
**
** Force PR_SetThreadPriority to set the priority by
** setting thread->priority to 100.
*/
{
int pri;
pri = thread->priority;
thread->priority = 100;
PR_SetThreadPriority( thread, pri );
PR_LOG(_pr_thread_lm, PR_LOG_MIN,
("(0X%x)[Start]: on to runq at priority %d",
thread, thread->priority));
}
/* Activate the thread */
if (thr_continue( thread->md.handle ) ) {
return PR_FAILURE;
}
return PR_SUCCESS;
}
void _MD_cleanup_thread(PRThread *thread)
{
thread_t hdl;
PRMonitor *mon;
hdl = thread->md.handle;
/*
** First, suspend the thread (unless it's the active one)
** Because we suspend it first, we don't have to use LOCK_SCHEDULER to
** prevent both of us modifying the thread structure at the same time.
*/
if ( thread != _PR_MD_CURRENT_THREAD() ) {
thr_suspend(hdl);
}
PR_LOG(_pr_thread_lm, PR_LOG_MIN,
("(0X%x)[DestroyThread]\n", thread));
_MD_DESTROY_SEM(&thread->md.waiter_sem);
}
void _MD_SET_PRIORITY(_MDThread *md_thread, PRUintn newPri)
{
if(thr_setprio((thread_t)md_thread->handle, newPri)) {
PR_LOG(_pr_thread_lm, PR_LOG_MIN,
("_PR_SetThreadPriority: can't set thread priority\n"));
}
}
void _MD_WAIT_CV(
struct _MDCVar *md_cv, struct _MDLock *md_lock, PRIntervalTime timeout)
{
struct timespec tt;
PRUint32 msec;
int rv;
PRThread *me = _PR_MD_CURRENT_THREAD();
msec = PR_IntervalToMilliseconds(timeout);
GETTIME (&tt);
tt.tv_sec += msec / PR_MSEC_PER_SEC;
tt.tv_nsec += (msec % PR_MSEC_PER_SEC) * PR_NSEC_PER_MSEC;
/* Check for nsec overflow - otherwise we'll get an EINVAL */
if (tt.tv_nsec >= PR_NSEC_PER_SEC) {
tt.tv_sec++;
tt.tv_nsec -= PR_NSEC_PER_SEC;
}
me->md.sp = unixware_getsp();
/* XXX Solaris 2.5.x gives back EINTR occasionally for no reason
* hence ignore EINTR for now */
COND_TIMEDWAIT(&md_cv->cv, &md_lock->lock, &tt);
}
void _MD_lock(struct _MDLock *md_lock)
{
mutex_lock(&md_lock->lock);
}
void _MD_unlock(struct _MDLock *md_lock)
{
mutex_unlock(&((md_lock)->lock));
}
PRThread *_pr_current_thread_tls()
{
PRThread *ret;
thr_getspecific(threadid_key, (void **)&ret);
return ret;
}
PRStatus
_MD_WAIT(PRThread *thread, PRIntervalTime ticks)
{
_MD_WAIT_SEM(&thread->md.waiter_sem);
return PR_SUCCESS;
}
PRStatus
_MD_WAKEUP_WAITER(PRThread *thread)
{
if (thread == NULL) {
return PR_SUCCESS;
}
_MD_POST_SEM(&thread->md.waiter_sem);
return PR_SUCCESS;
}
_PRCPU *_pr_current_cpu_tls()
{
_PRCPU *ret;
thr_getspecific(cpuid_key, (void **)&ret);
return ret;
}
PRThread *_pr_last_thread_tls()
{
PRThread *ret;
thr_getspecific(last_thread_key, (void **)&ret);
return ret;
}
_MDLock _pr_ioq_lock;
void _MD_INIT_IO (void)
{
_MD_NEW_LOCK(&_pr_ioq_lock);
}
PRStatus _MD_InitializeThread(PRThread *thread)
{
if (!_PR_IS_NATIVE_THREAD(thread))
return;
/* prime the sp; substract 4 so we don't hit the assert that
* curr sp > base_stack
*/
thread->md.sp = (uint_t) thread->stack->allocBase - sizeof(long);
thread->md.lwpid = _lwp_self();
thread->md.handle = THR_SELF();
/* all threads on Solaris are global threads from NSPR's perspective
* since all of them are mapped to Solaris threads.
*/
thread->flags |= _PR_GLOBAL_SCOPE;
/* For primordial/attached thread, we don't create an underlying native thread.
* So, _MD_CREATE_THREAD() does not get called. We need to do initialization
* like allocating thread's synchronization variables and set the underlying
* native thread's priority.
*/
if (thread->flags & (_PR_PRIMORDIAL | _PR_ATTACHED)) {
_MD_NEW_SEM(&thread->md.waiter_sem, 0);
_MD_SET_PRIORITY(&(thread->md), thread->priority);
}
return PR_SUCCESS;
}
static sigset_t old_mask; /* store away original gc thread sigmask */
static int gcprio; /* store away original gc thread priority */
static lwpid_t *all_lwps=NULL; /* list of lwps that we suspended */
static int num_lwps ;
static int suspendAllOn = 0;
#define VALID_SP(sp, bottom, top) \
(((uint_t)(sp)) > ((uint_t)(bottom)) && ((uint_t)(sp)) < ((uint_t)(top)))
void unixware_preempt_off()
{
sigset_t set;
(void)sigfillset(&set);
sigprocmask (SIG_SETMASK, &set, &old_mask);
}
void unixware_preempt_on()
{
sigprocmask (SIG_SETMASK, &old_mask, NULL);
}
void _MD_Begin_SuspendAll()
{
unixware_preempt_off();
PR_LOG(_pr_gc_lm, PR_LOG_ALWAYS, ("Begin_SuspendAll\n"));
/* run at highest prio so I cannot be preempted */
thr_getprio(thr_self(), &gcprio);
thr_setprio(thr_self(), 0x7fffffff);
suspendAllOn = 1;
}
void _MD_End_SuspendAll()
{
}
void _MD_End_ResumeAll()
{
PR_LOG(_pr_gc_lm, PR_LOG_ALWAYS, ("End_ResumeAll\n"));
thr_setprio(thr_self(), gcprio);
unixware_preempt_on();
suspendAllOn = 0;
}
void _MD_Suspend(PRThread *thr)
{
int lwp_fd, result;
int lwp_main_proc_fd = 0;
thr_suspend(thr->md.handle);
if (!_PR_IS_GCABLE_THREAD(thr))
return;
/* XXX Primordial thread can't be bound to an lwp, hence there is no
* way we can assume that we can get the lwp status for primordial
* thread reliably. Hence we skip this for primordial thread, hoping
* that the SP is saved during lock and cond. wait.
* XXX - Again this is concern only for java interpreter, not for the
* server, 'cause primordial thread in the server does not do java work
*/
if (thr->flags & _PR_PRIMORDIAL)
return;
/* if the thread is not started yet then don't do anything */
if (!suspendAllOn || thr->md.lwpid == -1)
return;
}
void _MD_Resume(PRThread *thr)
{
if (!_PR_IS_GCABLE_THREAD(thr) || !suspendAllOn){
/*XXX When the suspendAllOn is set, we will be trying to do lwp_suspend
* during that time we can't call any thread lib or libc calls. Hence
* make sure that no resume is requested for Non gcable thread
* during suspendAllOn */
PR_ASSERT(!suspendAllOn);
thr_continue(thr->md.handle);
return;
}
if (thr->md.lwpid == -1)
return;
if ( _lwp_continue(thr->md.lwpid) < 0) {
PR_ASSERT(0); /* ARGH, we are hosed! */
}
}
PRWord *_MD_HomeGCRegisters(PRThread *t, int isCurrent, int *np)
{
if (isCurrent) {
(void) getcontext(CONTEXT(t)); /* XXX tune me: set md_IRIX.c */
}
*np = NGREG;
if (t->md.lwpid == -1)
memset(&t->md.context.uc_mcontext.gregs[0], 0, NGREG * sizeof(PRWord));
return (PRWord*) &t->md.context.uc_mcontext.gregs[0];
}
int
_pr_unixware_clock_gettime (struct timespec *tp)
{
struct timeval tv;
gettimeofday(&tv, NULL);
tp->tv_sec = tv.tv_sec;
tp->tv_nsec = tv.tv_usec * 1000;
return 0;
}
#endif /* USE_SVR4_THREADS */ | {
"perplexity_score": 3659.4,
"pile_set_name": "Github"
} |
1. Field of the Invention
This invention relates to a thermocompression bonding tool used for mounting a semiconductor device or element such as IC, LSI, etc. on a substrate plate.
2. Description of the Prior Art
Lately, various electronic devices using semiconductor elements have been developed and technical progress in this field has become remarkable. In order to draw out the electric properties of semiconductor elements and allow the properties to sufficiently be shown, it is required to bond electrodes formed on the semiconductor devices with leads of a package (inner lead bonding) and bond the leads with outer terminals of a printed circuit substrate (outer lead bonding).
Bonding of the electrodes of semiconductor devices with the leads of a package has hitherto been carried out by a method comprising bonding metallic fine wires (bonding wires) of gold or copper one by one by a tool called capillary, namely, by wire bonding. A mounting method by a wireless bonding technique, using no bonding wire, has lately been watched with keen interest, instead of this wire bonding technique, by excellent features, e.g. high mounting efficiency, large degree of freedom in package designing, etc.
TAB (Tape Automated Bonding) system in which all electrodes of a semiconductor device are in a lump thermocompression-bonded to a film carrier (a printed pattern is formed on a laminated tape of a Cu foil and resin, followed by plating with Sn or Au) has been put to practical use, for example, in mounting ASIC (Application Specific Integerated Circuit) or a liquid crystal display driver. Mounting of TAB system has often been used not only in the inner lead bonding but also in the outer lead bonding. In the outer lead bonding by TAB system, the outer lead of the film carrier is bonded with the printed circuit substrate or lead frame as an outer terminal. In the case of bonding with the printed circuit substrate, a lead of Cu plated with, for example, Sn is bonded with a substrate electrode of, for example, Au using a solder. In the case of bonding with the lead frame, Au on the film carrier tape is bonded with Ag on the lead frame by thermocompression.
For the thermocompression in the mounting by TAB system, there are used tools called bonding tools which can be classified into two kinds of a constant heating system and pulse heating system and can be used properly depending upon the properties of materials to be bonded, etc. Herein, the constant heating system is a system in which a tool is constantly heated directly or indirectly, pressed against a workpiece to be bonded and subjected to heating and melting bonding or thermocompression bonding. The pulse heating system is a system in which a tool is pressed against a workpiece under directly or indirectly heated state for a constant time, cooled to a predetermined temperature, followed by release of the compression against the workpiece, and then subjected to heating, melting and bonding or thermocompression. Namely, this pulse heating system is a system for carrying out heating and cooling of a tool with a constant cycle.
Furthermore, tools having markedly improved properties have lately been developed by the use of diamond as a tool end material. In particular, a tool using a tool end material comprising polycrystalline diamond coated on a specified substrate by a gaseous phase synthesis method (Japanese Patent Laid-Open Publication No. 224349/1990 and Japanese Patent Application No. 62905/1994) has widely been used because of the excellent heat resistance, wear resistance, etc. of the tool.
The constant heating tool is, for example, a tool having a shape as shown in FIG. 1, which comprises a tool shank 1 with a penetrating hole 2 for mounting a heater (not shown) and a tool end material 3 to be always maintained at a thermocompression temperature of 500.degree. to 600.degree. C. by passing electric current through the heater to heat it. This tool is mainly used for bonding other bonding materials than solders.
On the other hand, the pulse heating tool is, for example, a tool 4 having a shape as shown in FIG. 2 or FIG. 3 and the tool of FIG. 2 is the most commonly used pulse heating tool made of a metal or alloy. This tool is mechanically fixed to a bonding machine via a hole 6 for fitting, and after pressing the tool end surface 5 to a workpiece to be bonded, the tool body 4 itself having electrical conductivity is self-heated by passing electric current with a pulse of several second unit corresponding to the cycle of bonding. The tool of FIG. 3 is designed in such a manner that a tool material 3 is bonded to the end of a shank 7 via a bonding metal 8 in the similar manner to the constant heating tool of FIG. 1. This tool aims at improving the wear resistance, heat resistance, etc. of the tool of FIG. 2 by the use of another material than the metals or alloys used in the tool body of FIG. 2. These tools are often used in the case of mainly using a solder for a workpiece to be bonded.
The pulse heating tool is preferably used for soldering, because in the case of a tool of the constant heating system, there arises a problem that the tool is still heated after bonding and the melted solder, adhered to the end surface of the tool, is drawn up with the tool, resulting in contact of bonded parts with each other, while in the case of the pulse heating system, the tool is withdrawn after cooled to a temperature of lower than the melting point of the solder and thus, such a problem does not arise to result in good bonding.
Even when a solder is not used, in many times, the pulse heating tool is more preferably used, since the inflow of heat into a bonding machine is less and the thermal breakage of the machine is hard to occur, as compared with the constant heating tool.
In TAB mounting of ASIC, TCP (Tape Carrier Package) mounted by semiconductor elements by the above described inner lead bonding is bonded with a lead frame using a bonding tool having a different shape. In this case, mounting is carried out by a system (constant heating system) comprising constant heating directly or indirectly a tool having an end shape of a hollow square frustum with an end surface of a rectangular frame to be a pressing surface as shown in FIG. 10 and pressing it to a workpiece to be bonded, made of Au or Ag, thus effecting the thermocompression thereof.
Such a tool as having the same shape can be applied to a use of mounting a lead of an integrated circuit on a bonding part of a printed circuit substrate precoated with a solder by soldering. In the case of mounting by soldering, the constant heating system results in a problem that since the pressing of the tool is released and the tool is drawn up while a melted solder is adhered to the pressing surface of the tool, adjacent bonding parts are brought into contact with each other. This is not preferable. In this case, therefore, another system (pulse heating system) is employed comprising pressing a tool to a workpiece for a constant time while directly or indirectly heating the tool, then cooling to a constant temperature, releasing the pressing to the workpiece and heating, melting and bonding.
Among mounting techniques by the wireless bonding, in particular, mounting by the flip chip system is capable of corresponding to pitch-narrowing of substrate leads because of directly bonding with the substrate utilizing bumps formed on LSI and has been developed as a mounting method which can be expected to improve the mounting efficiency. In fact, this mounting method has been employed, for example, for mounting MPU of work stations or personal computers, mounting of driver LSI on glass substrates in the production of liquid crystal pannels, etc.
In the mounting of MPU, there is used a mounting method comprising using a tool directly or indirectly heated at a temperature range of 200.degree. to 400.degree. C. to melt and bond a bump consisting of a solder, adsorbing in vacuum and transporting LSI, then pressing it for a constant time and cooling to 200.degree. C. or lower, after which the pressing of the tool is released.
Since in a process for the production of a liquid crystal panel, driver LSI is mounted on a glass substrate via a thermosetting ACF (anisotropic conductive film), in addition to the above described method, there is used a mounting method comprising adsorbing in vacuum and transporting LSI and then pressing it for a constant time under such a sate that the tool is directly or indirectly heated at a temperature range of 200.degree. to 400.degree. C.
As to the properties of such a bonding tool, excellent heat resistance and wear resistance are required, since any one of the tools is constantly or intermittently maintained at a high temperature and a concentrated load is repeatedly applied to a thermocompression bonding part on the tool surface. From this point of view, a hard material consisting predominantly of diamond has been used as a tool material of bonding tool.
Of the tool materials having been used at the present time, single crystal diamond is most excellent as a material property, so this material corresponding to a size of 10 to 15 mm square as a shape of standard tool end under the existing circumstances in the constant heating tool as shown in FIG. 1 is very expensive and application thereof is limited to a small size tool.
On the other hand, sintered diamond can be obtained with a relatively large size, but has a problem, in particular, when using an iron group metal as a binder material as disclosed in Japanese Patent Publication No. 12126/1977, that the heat resistance is insufficient to result in a shortened service life. When the sintered diamond is used as a tool material, as disclosed in Japanese Patent Laid-Open Publication No. 33865/1986, this sintered body has a problem, due to use of Si and/or SiC as a binder for the purpose of improving the heat resistance, that bonding of diamond grains with each other is too weak to maintain a practical wear resistance.
In contrast, ceramics such as sintered bodies consisting predominantly of Si, Si.sub.3 N.sub.4, SiC or AlN, coated with polycrystalline diamond by a gaseous phase synthesis method, as disclosed in Japanese Patent Laid-Open Publication No. 224349/1990, exhibit excellent properties comparable to single crystal diamond and can be produced with a low cost, so that they have lately been applied to many uses.
From this point of view, it has been proposed to use a hard material consisting predominantly of diamond, instead of metals such as Mo, W, etc. as in the prior art, for the end material of a tool for the outer lead bonding. The inventors propose, as a first embodiment of the present invention, to use cemented carbides coated with polycrystalline diamond by a gaseous phase synthesis method as a tool end material of a tool capable of exhibiting excellent properties for uses of not only the inner lead bonding but also the outer lead bonding. FIG. 4 is a schematic view of one example of the tool structure of the present invention, comprising a diamond-coated substrate 3, tool end surface (polycrystalline diamond) 5, machine fitting parts 6, shank 7 and brazing material 8.
As described above, the tool described in Japanese Patent Laid-Open Publication No. 224349/1990 having various excellent features has broadly been used, but has some problems to be further solved. Firstly, in this tool, ceramics are used as a substrate to be coated with diamond and accordingly, a problem on strength often takes place depending on the using conditions. That is, the problem is lowering of the durability of the ceramics when a bonding load is large or the heating temperature of the tool is high.
Lately, the shape of a semiconductor device itself tends to be large-sized or long-sized with the increase of functions or integrations of the semiconductor device and for the purpose of improving the efficiency, it is begun to employ a system for mounting in lump a plurality of semiconductor devices. Correspndingly to this tendency, it is required for bonding tools to render the shapes thereof large-sized or long-sized. However, in the tool of such a shape, a lowering tendency of liability as to the strength of a ceramic substrate by a larger volume effect is undeniable, as compared with that of a small-sized shape.
Furthermore, another problem than the strength relates to a heat response when this material is used for a pulse heating tool. As apparent from the structure shown in FIG. 3, a pulsating instantaneous heat generation in a shank is propagated through the ceramic substrate and reaches the surface of polycrystalline diamond. Accordingly, the heat response of the tool, determining a mounting cycle, largely depends on the thermal conductivity of the substrate. In the case of the substrate disclosed in Japanese Patent Laid-Open Publication No. 224549/1990, in fact, if its material does not have highly thermal conductivity, the thermal conductivity of the tool is not sufficient and the mounting cycle is thus lengthened by at least two times as long as tools of metals or alloys, as shown in FIG. 2. This is a problem.
Therefore, it is considered most suitable to use a high strength and high thermal conductivity material as a substrate for an ideal TAB tool, which is coated with polycrystalline diamond by a gaseous phase synthesis method. From this point of view, cemented carbides are considered suitable as a substrate for a TAB tool.
The coating technique of polycrystalline diamond onto a cemented carbide substrate has actively been developed for the purpose of mainly aiming at applying to cutting tools and as to the bonding strength of a diamond film having hitherto been considered to be a problem, various improving methods have been proposed. In particular, a surface modifying method comprising subjecting cemented carbides to a heat treatment under special conditions, as disclosed in Japanese Patent Laid-Open Publication No. 330959/1993, is effective for improving the bonding strength. According to this method, the bonding strength between a cemented carbide substrate and diamond coating layer is improved by subjecting a WC-based cemented carbide having a composition comprising, as a binder phase component, 0.5 to 30% by weight of Co and, as a hard dispersed phase forming component, (a) WC, (b) Group IVa, Va and VIa metals of Periodic Table except W or solid solutions thereof with at least one of carbides, nitrides, carbonitrides, oxides, borides, borocarbides, boronitrides and borocarbonitrides thereof and (c) WC and/or (d) WC and Group IVa, Va and VIa metals of Periodic Table except W or solid solutions thereof with at least one of carbides, nitrides, carbonitrides, oxides, borides, borocarbides, boronitrides and borocarbonitrides thereof and unavoidable impurities to a heat treatment, thus modifying the surface thereof and then coating it with polycrystalline diamond by a gaseous phase synthesis method. In this publication, it is further described that when at least one of carbides, nitrides and carbonitrides of at least one of Group IVa, Va and VIa metals of Periodic Table except W is further contained as the hard phase, the high temperature hardness of the substrate can be increased by the presence of these carbides, nitrides and carbonitrides, preferably in a proportion of 0.2 to 40 weight %.
However, the materials,described herein include a broad range of compositions varying in property and it has not been made to study which composition or which property is suitable as a material for bonding tools, of these materials.
When using a tool having the structure shown in FIG. 4 for soldering for a long time, there arises a problem that the polycrystalline diamond of the tool end part 5 is stripped from the brazed part to shorten the service life of the tool, in spite of that the polycrystalline diamond itself of the tool end part 5 is not so damaged. The cause of this problem consists in that the solder is melted and evaporated during bonding, adheres to the soldered part and diffused through the solder to change the composition of the solder and to form a brittle intermetallic compound, thus resulting in lowering of the bonding strength by the solder.
Furthermore, in order to improve the mounting efficiency by carrying out at once mounting of a plurality of electronic parts, a tool of several tens mm in length is not sufficient and accordingly, a long-sized tool has lately been desired. For example, in the mounting of a liquid crystal driver, a tool with a length of about at most 400 mm has been required. Even in the case of such a long-sized tool, it has been required for realizing a uniformly bonded state that the flatness of the pressing surface of a tool is at most 3 .mu.m and the maximum temperature gradient is at most 10.degree. C.
As the above described tool, for example, a tool of the pulse heating system using molybdenum or tungsten as the tool material is disclosed in Japanese Utility Model Publication No. 30142/1990. In the tool using such a metal, however, a part in contact with the bonding material is gradually subject to damage by the repeated heating and pressing, thus resulting in a problem that it is difficult to maintain a uniformly bonded state for a long period of time. In such a metallic tool, however, a cleaning working to remove periodically the solder or oxide adhered to the pressing surface is required, during which damage by a cleaning grindstone changes the flatness of the tool pressing surface and unfavorably affects the bonded state. This is a large problem.
In order to solve these problems, it has been considered effective to use a hard material consisting predominantly of diamond or cBN (cubic boron nitride) excellent in heat resistance and wear resistance as a tool end material. However, single crystal diamond is has poor practical utility because of being limited in size. In the case of a diamond or cBN sintered body, moreover, there is a problem that it is difficult to work it into an end shape as shown in FIG. 10 and to maintain the flatness of the end surface at a high temperature within a precision range required for a long time since the property of the sintered body is affected by a metallic or non-metallic binder.
In any mounting method, the bonding tool must have an excellent heat resistance as its property, since it is constantly or intermittently allowed to be present under high temperature state. That is, it is required of the tool to directly press LSI without breakage of LSI and to maintain the surface roughness and flatness of the tool end surface under good state without thermal damage for a long time. However, the use of a metallic tool of an Invar alloy or Mo, etc. having hitherto been used up to the present time results in a problem that the property is gradually deteriorated.
Furthermore, as referred to above, the tool surface should periodically be cleaned since the heated and sublimated solder or resin is solidified and adhered thereto. The cleaning is generally carried out by mechanically removing the adhered material, but during the same time, the tool of the prior art meet with a problem that the end surface is scraped to change the shape and a good mounting operation cannot be continued. | {
"perplexity_score": 395.3,
"pile_set_name": "USPTO Backgrounds"
} |
Remember then-presidential candidate Barack Obama’s “Yes We Can” video from the 2008 campaign? Well, Iran’s president has his own version too, albeit five years late.
The video was made by supporters of newly elected Iranian President Hassan Rouhani, who has billed himself as a moderate reformer. But is Rouhani really willing to change Iran?
Radio Free Europe/Radio Liberty Correspondent Golnaz Esfandiari (@GEsfandiari) and freelance journalist Ali Gharib (@AliGharib) discussed the video on AMERICA with Jorge Ramos. | {
"perplexity_score": 444.1,
"pile_set_name": "OpenWebText2"
} |
Matt Mickiewicz
Matt Mickiewicz (born June 27, 1983) is an internet entrepreneur best known as the co-founder of SitePoint. Mickiewicz also co-founded the web companies Flippa, 99designs and Hired.
Early life
Mickiewicz was born in Kraków, Poland, lived in Hamelin, Germany and currently resides in Vancouver, Canada. He created his first website at the age of 14, called Webmaster-Resources.com, which later became SitePoint. At 16, Mickiewicz traveled to Melbourne with his mother and met his soon to be business partner and co-founder, Mark Harbottle. At 16, Mickiewicz found himself closing $10,000 advertising deals between classes at high school. Mickiewicz barely finished high school and did not attend college.
Career
In 2008, Mickiewicz spun off 99designs from SitePoint, which went on to raise $35 million in capital from Accel Ventures, Michael Dearing/Harrison Metal, Dave Goldberg (SurveyMonkey), Anthony Casalena, and Stewart Butterfield (Flickr). In June 2009, Mickiewicz and Harbottle launched Flippa.com, the largest marketplace for buying and selling websites in the world. In the fall of 2012, Mickiewicz co-founded DeveloperAuction.com which raised $2.7 million and was later renamed as Hired. The company later raised a $15 million Series-A round in March 2014. By December 2014, Hired was reportedly valued at $200m and had raised an additional $15m in capital in its Series B round.
Mickiewicz was named a 30 Under 30 Entrepreneur by Forbes and INC in 2011, a Smart Company 30 under 30 in 2012, and frequently speaks at conferences and seminars worldwide.
References
External links
Category:Web developers
Category:Computer programmers
Category:Businesspeople from Vancouver
Category:Polish emigrants to Canada
Category:Living people
Category:Businesspeople from Kraków
Category:1983 births | {
"perplexity_score": 300.6,
"pile_set_name": "Wikipedia (en)"
} |
New cyclooxygenase-2/5-lipoxygenase inhibitors. 3. 7-tert-butyl-2, 3-dihydro-3,3-dimethylbenzofuran derivatives as gastrointestinal safe antiinflammatory and analgesic agents: variations at the 5 position.
We report an expansion of the scope of our initial discovery that 5-keto-substituted 7-tert-butyl-2,3-dihydro-3,3-dimethylbenzofurans (DHDMBFs) are antiinflammatory and analgesic agents. Several other functional groups have been introduced at the 5 position: amides, amidines, ureas, guanidines, amines, heterocycles, heteroaromatics, and heteroaryl ethenyl substituents in the 5 position all provide active compounds. These compounds are dual cyclooxygenase (COX) and 5-lipoxygenase (5-LOX) inhibitors. They inhibit both COX-1 and COX-2 with up to 33-fold selectivity for COX-2. | {
"perplexity_score": 158,
"pile_set_name": "PubMed Abstracts"
} |
S2A Modular Offers Affordable Net Zero Homes With Renewable Energy Components
March 19th, 2019 by Steve Hanley
S2A Modular in Southern California is building a factory to manufacture modular net-zero-energy private homes, condominiums, apartment complexes, and commercial buildings. In an interview with Renewable Energy Magazine, co-founder and CEO Brian Kudzas says, “Right now there’s a need in the construction industry to be able to move faster than the traditional model does. In the traditional model, you stop at night, stop at the weekend, stop when it’s raining — it’s just start-stop, start-stop.
“In the modular industry, you’ve got first shift, second shift, third shift. It really doesn’t stop. Because of that, speed is so important. If you take a 2000 square foot home, on average, and build it traditionally, it takes you about a year to get that thing from start to finish. In the modular, you can do that within about three months, total. It’s about a week in the factory — that’s about 90 percent of the home — and then it gets transported. It only takes a day or two to actually set and then you’ve got the final 10 percent of the building materials to actually finish the home off, so we tell clients about a three month time frame.”
Speed is important for a number of reasons, not the least of which is economics. If you are having a house built, payments on your construction loan begin when the first dollars are lent to the builder and go up each time the bank disperses another dollop of dollars. In the end, the homeowner can be on the hook for a year’s worth of mortgage payments before even moving in.
The S2A Modular concept has attracted a lot of interest from developers in other countries, like China, Mexico, and Pakistan. “Instead of shipping those orders, we’re looking simply to build a factory in those and oversee them, almost like a franchise concept,” Kudzas says. The first homes will be constructed for customers in Southern California but the company already has an order for 62 homes in Montana.
While the company’s target market is US homes of about 2,000 square feet, the modular concept can be adapted to any size home. Kudzas says there is a lot of interest in what he calls ADU or Accessory Dwelling Units — standalone units of about 600 square feet that provide a place where elderly or special needs members of a family can live independently.
The company says renewable energy products are integral parts of building homes that are energy self-sufficient. Excess electricity will be exported to the local grid at times, while at other times the home may draw power from the grid. But over the course of a year, each home will create as much energy as it uses. The modular approach allows for a more energy efficient building envelope with superior insulation properties, better windows and doors, and energy efficient appliances. Heat pumps with the highest efficiency available will also be part of the process.
Kudzas says some of the biggest corporations in the world are interested in being part of the process. “It’s Amazon, Google, Mitsubishi, LG, it’s a combination. There’s so many people coming at us wanting us to use their products, so we’re investigating everything as the factory gets built as to what eventual suppliers we’re going to be using. Those names I mentioned, most of them are very much in front of us and we’ll probably end up using all of them.”
The best news is that with its modular approach, S2A Modular can provide a superior building for about 20% less money than a traditional structure. Much of those savings come from saving time by building in a factory versus building on site. Time is money and the more quickly the process can be completed, the less it costs. A home that would typically cost $700,000 can be completed by S2A Modular for about $560,000, meaning a lower mortgage payment and lower taxes for the owner.
Building modular means creating a more energy efficient package than is possible by trying to retrofit an existing structure. “It’s difficult for the average consumer to go out and retrofit their homes with special windows and insulation and doors and all the special components because the home was built in the 1950s,” Kudzas says. “Think of a Tesla car and taking that Tesla battery out and putting it into a Ford Fusion. It’s never going to work.”
The heart of the concept is the inclusion of a residential storage battery, such as the Tesla Powerwall. “Our concept is that if you’re going to start with the concept of running a home off a residential storage battery, you’re going to need to surround that with specialized home components to capture as much energy as possible. So we’re starting with that concept and that’s the game-changer.”
Appreciate CleanTechnica’s originality? Consider becoming a CleanTechnica member, supporter, or ambassador — or a patron on Patreon.
Sign up for our free daily newsletter or weekly newsletter to never miss a story.
Have a tip for CleanTechnica, want to advertise, or want to suggest a guest for our CleanTech Talk podcast? Contact us here.
Latest Cleantech Talk Episode | {
"perplexity_score": 301.4,
"pile_set_name": "OpenWebText2"
} |
GETTY More than 110,000 migrants are estimated to have arrived in Europe since the turn of the year
FREE now SUBSCRIBE Invalid email Make the most of your money by signing up to our newsletter fornow We will use your email address only for sending you newsletters. Please see our Privacy Notice for details of your data protection rights.
The handbook - an "action plan on migrant smuggling" - will offer hauliers "best practice advice" on minimising the risk of stowaways in lorries. The astonishing revelation came after Ukip MEP Mike Hookem accused the European Commission of "putting EU rules above the safety of haulage drivers". Machete-wielding migrants have turned Calais into a "war zone" with truckers saying they have to cheat death to keep Britain moving. During 12-months of chaos gangs have targeting UK-bound freight with drivers threatened at knifepoint, beaten and their trailers torn to shreds as armed refugees run amok. Some companies now avoid the gauntlet of hate and avoid the port altogether. The Road Haulage Association (RHA), which represents British truckers, said it was "only a matter of time" before one was killed.
GETTY The self-help manual is not expected to be ready until next year
European Commissioner Dimitris Avramopoulos denied the Schengen Area had assisted people trafficking and turned transport routes into gauntlets. But a promise to publish a handbook provoked fury this side of the Channel after months of well-documented running battles in Calais. RHA chief executive Richard Burnett said: "Publishing a guidance booklet next year is not going to make any difference to the current crisis at Calais. "We stand by our call for the deployment of the French military in and around the port now. Only they have the resources needed to stop this migrant mayhem. Failure to do so means it's only a matter of time before a British bound driver is seriously hurt or even killed." Many blame the lack of border controls for vast numbers of migrants being able to make their way to France and Belgium from southern Europe.
GETTY A British truckers union said it would only be a matter of time before someone was killed
Mr Hookem, who was threatened with a gun last summer during a visit to a migrant camp near Dunkirk, claimed the failure to re-impose border checks put "EU rules above the safety of haulage drivers". He said: "For many months, British drivers have been trying to get their voices heard as their lorries are ruined, their cargo damaged and their lives in danger as they are threatened with crowbars and other weapons. "The reason these people can get to camps in Calais, Dunkirk and now Zeebrugge is because of Schengen and the EU becoming a borderless zone which naturally facilitates the illegal movement of people." One trucker called the "action plan" a joke, adding: "We need physical help, not a bit of paper to cover up the fact they are doing nothing."
GETTY Ukip MEP Mike Hookem called for more to be done about the danger to truckers
Some £89billion worth of UK trade passes through Calais each year but violence engulfing the port is now so bad many haulage companies are avoiding it altogether. Two thirds of haulage companies claim they have bene forced to change routes or schedules to avoid the crisis in Calais. Ukip employment spokeswoman Jane Collins said: "By the time the European Commission get round to doing anything there won't be any British people working in haulage, just foreign lorry drivers in old British trucks working for the people traffickers." | {
"perplexity_score": 510.5,
"pile_set_name": "OpenWebText2"
} |
Housing Complaints
We respond to complaints regarding hazardous conditions in rental properties, both residential and commercial. A complaint must be filed by the resident/tenant of the dwelling in order for Environmental Health to respond. The order in which complaints are processed is based on risk. First priority is given to those situations that involve imminent threats to public health and safety.
For housing complaints in the Cities of Auburn, Colfax, Lincoln, Rocklin, Roseville, and Loomis, please contact the City code enforcement. Environmental Health will respond to complaints in unincorporated areas of Placer County.
High Priority Items
Those items that must be repaired within 48-72 hours of notification to the property management/landlord:
Lack of potable (clean) water or hot water.
Lack of electricity.
Lack of heat.
Sewage backup into dwelling or released onto the ground.
Before filing a complaint, individuals must first notify the property management/landlord and attempt to resolve the issue. If a resolution has not been reached within 48-72 hours, a complaint may be filed.
Low Priority Items
Those items that should be addressed within 30 days of notification to the property management/landlord:
Dampness
Vermin or pest infestations
NOTE: Environmental Health does NOT address bed bug issues
Garbage accumulation
Inadequate structural maintenance
Severely dilapidated structures
In order for Environmental Health to investigate, every effort must be made to work with the property management/landlord to resolve the problem. Written proof of notification to the property management/landlord must be submitted with the complaint and at least 30 days must have passed since the notification. Complaints submitted without proof of notification to property management/landlord will not be investigated.
Written notification to the property management/landlord should be submitted via a certified letter with a return receipt and must contain the following information:
The condition which is making the dwelling unlivable.
The expected outcome to make the dwelling livable.
The timeline for repairs (30 days).
Your intentions should repairs not be made within the timeline.
Once the property management/landlord has been notified and the 30 days for repairs have passed without response, a complaint may be filed.
Low priority complaints are processed in the order in which they are received
All Other Items
Those items that will NOT be addressed by Environmental Health include:
Landlord/Tenant or Tenant/Tenant disputes including eviction, non-payment of rent, breach of contract, withholding of rent, etc.
Vacated dwellings – if the complainant has vacated or is expected to vacate within the next 30 days either by choice or eviction, except for High Priority Items, the complaint will not be investigated.
Filing a Complaint
When filing a complaint be sure to fill out the form completely. Ensure the following items are included: | {
"perplexity_score": 531.9,
"pile_set_name": "Pile-CC"
} |
In a number of control systems, for example transportation vehicle operation control systems, there is a need for amplifier apparatus which is failsafe in its operation. One of the main considerations in the design of amplifier apparatus for use in such a system is that the amplifier apparatus gain be controlled within safe limits in the event of a failure in the amplifier apparatus.
According to the here described apparatus, an improved failsafe inverting amplifier is disclosed which is widely useful and relatively economical when compared with failsafe inverting amplifiers of the prior art. | {
"perplexity_score": 309.7,
"pile_set_name": "USPTO Backgrounds"
} |
Sarah Palin Slams D.C.’s ‘Corrupt Bastards Club’ in Ferocious Column
Sarah Palin has had enough of the Establishment Republicans in D.C. fighting harder against the conservatives who put them in office than the Democrats and she’s firing back at the corrupt bastards in D.C.
In Alaska we had a group of politicos who chuckled as they dubbed themselves the “CBC,” which stands for “Corrupt Bastards Club.” But it was no laughing matter. I, and many others, took them on. We won. When I served as chairman of our state’s Oil and Gas Commission, I reported on the cronyism of the chair of my own Party, who had been appointed by our governor to that same energy regulating commission. (Click here to see a reporter’s reaction to a short Newt Gingrich interview on the matter.) The whistle blowing resulted in him receiving the largest ethics fine in the state’s history. But that was just the tip of the oily iceberg. The FBI investigated Alaskan lawmakers for taking bribes from the oil industry in exchange for votes favorable to that industry, and politicos ended up in jail.* The lawmakers actually called themselves the Corrupt Bastards Club and even emblazoned the CBC initials on baseball caps they gifted each other — that’s how untouchable they believed they were. But average, concerned citizens said, “enough is enough,” and shook things up. Though some of the CBC members ended up in horizontal pinstripes, much of the compromised party apparatus stayed in power.
…Today, doesn’t it seem like we have a Corrupt Bastards Club in D.C.? On steroids? It might not be as oily and obvious as its Alaska counterpart, but it’s just as compromised because its members, too, are indifferent to what their actions mean for We the People.
I’m prepared to be attacked for suggesting this comparison of the D.C. political establishment with the CBC. But I call it like I see it. And lived it. The fight over defunding socialized healthcare, aka Obamacare, should have opened everyone’s eyes to call it the same.
…Americans, if you’re faced with a 300% increase (or even a 65% increase like my family) in your health care premiums for crappier coverage, doesn’t “free” socialized medicine all of a sudden sound appealing?
And that’s how Americans will be led down the primrose path to a single-payer system. People will be frustrated, worn out, and broke under this new government burden. Many will end up concluding they’ll settle for — then demand — full socialized medicine because they’ll see how the unworkable Obamacare will break our health care system (where, presently, no one is turned away from emergency rooms and we have many public and private safety nets for people in need), along with busting our personal bank accounts. The cry will go out, “Can’t you just put us all in a sort of Medicaid-like system? It’ll be much less confusing than these awful exchange websites and a lot less expensive!” As things stand, many who are getting slammed by Obamacare will inevitably settle for less out of necessity. And that’s the left’s declared plan: a single-payer system. They said it. I didn’t.
…When Harry Reid laughs and says, “Yes, yes! Absolutely, yes!” when asked if his goal was to move Obamacare to a single-payer system of full socialized medicine, he’s spilling the truth. The evidence is right before our eyes. Please open yours, GOP establishment.
…So what was the GOP establishment’s game plan to fight this march towards socialism? They’ve been busy denouncing Sens. Ted Cruz and Mike Lee and their supporters, along with the good House Members who fought for our one chance to defund Obamacare. But what were the wayward Republicans’ alternative plans? They thought we could ignore the implementation of Obamacare and simply focus on some future electoral victories in the hope that some day the stars will align and we’ll have super majorities in the House and Senate along with a Republican president who would hopefully repeal this disastrous soon-to-be set in stone new “entitlement.”
There’s a big problem with that scenario. It overlooks the everyday reality before our eyes. As Obamacare is being implemented, Americans can’t afford to pay for it. We can’t even sign up for it on the impossibly cumbersome websites, but the IRS will fine us for not doing so anyway! Obama gave his pals, and Congress gave themselves, tickets off this train wreck via waivers. Cruz and Lee fought for us to get the same relief the big guys got. The media and disloyal politicians turned on them and, divided, we lost. Now we little guys are stuck on this train, which will soon collide with hardship and real-world economics that don’t pencil out. Friends, by the time the electoral stars align for this hoped-for GOP hat trick the country will be out billions, if not trillions, more of our tax dollars and will have already begged D.C. to relieve us of this corporatist nightmare even if it means a socialized single-payer system. And once there, do you think we’ll ever go back and strip this “entitlement”? Unarguable history proves otherwise.
The only credible plan of action was to do everything in our power to delay the implementation of Obamacare — defund it, postpone it, whatever — while at the same time work to elect a majority to repeal it. That is what Cruz and Lee and those Tea Party aligned House Members were doing. There was no other credible alternative plan to seize the constitutionally appropriate opportunity to legislatively close the purse strings to stop the juggernaut of full socialized medicine.
….GOP politicians claim they’re against Obamacare and promise to repeal it. But when it came time to stand up and use the Constitutional tools they have — the power of the purse strings — to finally halt the implementation, they balked, waved the white flag, and joined the lapdog media in trashing the good guys who fought for us….
…The media wants you to believe that the partial government shutdown “fractured” the Republican machine from grassroots commonsense conservatives who go by the acronym TEA Party (that stands for “Taxed Enough Already”). No, Tea Party patriots rose up because the Republican machine “fractured” itself years ago by marginalizing its conservative base. The recent “slimdown” didn’t cause the fracture. It happened because of the fracture — because wayward Republicans have refused for years to stand up and fight for economic freedom and limited government, despite campaigning on those principles every election cycle. That’s how we got into this debt-ridden mess in the first place. They campaigned one way, but governed another.
It’s the establishment’s choice whether this fracture remains unfixed because the conservative grassroots will never give up the fight for freedom. Never. Never. Generations of our sons and daughters sent off to war to protect our freedom have paid too high a price for us to ever give up the fight.
I’d rather spend my time fighting the Democrats instead of the Establishment Republicans in D.C., but if the only way to save this country is to defeat them first, then that’s what we’ll do.
This man should be taken to court!
On the “Headlines” on his web page, HBO “Real Time†host Bill Maher reports that for his upcoming show in Springfield, Massachusetts, “the Massachusetts Democratic Party has a limited number of tickets available.â€
Because Democrats love it when Maher goes on Twitter with vile thoughts like how Tea Party wives think of Rand Paul or Ted Cruz “when their husband is humping themâ€:
Its official: women in the Tea Party have replaced Rand Paul with #TedCruz as the guy they think of when their husband is humping them
— Bill Maher (@billmaher) October 23, 2013
It might remind some Maher fans and foes of his rougher talk on HBO that Sarah Palin would er, “hump” Rick Perry…if he was black.
In the Springfield Republican newspaper, writer George Lenker was granted a Maher interview and asserted “whether you agree with him or not, you have to admit his views are at very least well informed.” Maher then asserted that conservatives were complete lunkheads:
The difference between the government shutdown in the 90s – and even just Republicans in the 1990s – is all based on where they now get their information. Now they just live in this bubble of FOX News and Matt Drudge and Rush Limbaugh and a thousand books by Ann Coulter and chain emails from their Uncle Cletus. No oxygen gets into that bubble. It’s sealed tight. It’s like one of those airlocks in science-fiction ships. It’s like, once the alien gets into the airlock you have to abandon ship. They just don’t get good information.
And even sadder is that their Congress people don’t even get good information. There’s that Ted Yoho guy – and he’s not the only one – who actually thinks defaulting on the debt would be a good thing for the market. But those people vote for people who think like them. They think that Ted Yoho being a moron and a hostage taker is a good thing.
it doesn’t matter Democrat or Republican, we have only one goal is to fight for the country and for the America people. we have to throw out all the corrupted dishonest high rank officials keep on destroying the country and our future generation.
It’s true. The republicans thought more about their votes in 2014 than helping the American people. I have noted who voted to reinstate the partial gov shutdown and will not be voting for them in future elections – I won’t forget! And now Kagen, NC democratic senator, wants a delay in Obamacare. She’ll not get my vote either as she wanted the law in the law in the first place. The democrats are in between a rock and a hard place and let’s just hope somewhere along the line that they come to their senses, but don’t expect them to be for the American people – they are only out for your vote! | {
"perplexity_score": 399.4,
"pile_set_name": "Pile-CC"
} |
Q:
Limit jQuery Cookie Plugin to 1 hour
I am creating a cookie using the jQuery cookie plugin. I want to limit it to 1 hour, instead of 1 day. Through the docs the lowest value that it gives an example of is 1 day. How can I lessen this value from 1 day, to 1 hour?
jQuery.cookie('data', data, { expires: 1 }); // this limits to 1 day
I came across this with just plan javascript, but It didn't seem to work for me with the plugin. Comes back with time() is not defined
jQuery.cookie('data', data, { expires: time()+3600 }); // this limits to 1 day
Is this possible?
A:
Use a Date object with the date of expiration
jQuery.cookie('data', data, {
expires: new Date(+new Date() + (60 * 60 * 1000))
}); | {
"perplexity_score": 946.4,
"pile_set_name": "StackExchange"
} |
RIGZONE DAILY NEWS -- FRIDAY, FEBRUARY 15, 2002
------------------------------------------------------------
Daily News from the worldwide upstream oil & gas industry
to view the complete version, please go to:
http://www.rigzone.com/newsletter_show.asp?n_id=223
------------------------------------------------------------ | {
"perplexity_score": 11.2,
"pile_set_name": "Enron Emails"
} |
372 F.2d 626
Captain Tom BARBER, Appellant,v.The MOTOR VESSEL "BLUE CAT", a 32' Catamaran, her engines, apparel, tackle and equipment et al., Appellees.
No. 23182.
United States Court of Appeals Fifth Circuit.
January 31, 1967.
Gary P. Eidelstein, Miami Beach, Fla., for appellant.
James L. Hurley, Frank J. Marston, Miami, Fla., for appellees, Fowler, White, Gillen, Humkey & Trenam, Miami, Fla., of counsel.
Before BROWN, GEWIN and GOLDBERG, Circuit Judges.
JOHN R. BROWN, Circuit Judge.
A case simple in setting, small in amount, has become complicated and the subject of much judicial travail — with now more to come — because of two factors. The first is that the Libelant, or more likely his first proctor who since withdrew, became mesmerized by the title "Master" in describing the status of the Libelant seeking a lien for wages. The second is that the Trial Court forgot the lesson so often brought home by us that at this day and time dismissal of a claim — land-based, waterborne, amphibious, equitable, legal, maritime, or an ambiguous, amphibious mixture of all of them, Mike Hooks, Inc. v. Pena, 5 Cir., 1963, 313 F.2d 696, 1963 AMC 355, on the basis of the barebone pleadings is a precarious one with a high mortality rate. Millet v. Godchaux Sugars, Inc., 5 Cir., 1957, 241 F.2d 264, esp. n. 1.1
The libel was brought by "Captain Tom Barber" against the BLUE CAT. How unlike such a person might well be from one who as "Lord of the Quarter deck" is master of all he surveys, Avera v. Florida Towing Corp., 5 Cir., 1963, 322 F.2d 155, 1963 AMC 2110; United Geophysical Co. v. Vela, 5 Cir., 1956, 231 F.2d 816, 819, 1956 AMC 745, is revealed by the libel's captions description of the BLUE CAT — "a 32' catamaran." The libel then alleged that Captain Barber "was engaged as captain" at a minimum specified salary. But after exceptions to the original libel on the ground that the Master had no lien were sustained, the amended libel added much. "Further" it alleged, Barber "was engaged to ferry the vessel from Galveston * * * to Miami, Florida * * *." It then went on to assert that under his arrangement with the vessel owner, Barber at the request of the "vessel, her master, agent, owner, representative or the person or persons to whom the management, custody or control of said vessel"2 had been entrusted, had "furnished * * * services, materials, supplies [and] labor" for and to the vessel in the value of $2,766.50 as detailed in the annexed bill of particulars. The "Bill of Particulars" listed 67 specific occasions between fitting out at Galveston on December 4, 1963, and the last item on February 28, 1964, subsequent to arrival of the vessel in Miami, Florida, on January 7, 1964.3
In a record which contains naught but the amended libel, the categorical exception that "as captain, libelant has no maritime lien for services performed while acting in that capacity" (emphasis added) and the unrevealing order of dismissal4 with no reported colloquy of the argument to indicate whether the Trial Court ever considered the numerous cases which do allow some liens despite the title "Master," we have to assume that the Judge thought it was a case of all or none so far as Barber's own labors were concerned.
And herein lies the error. For in a variety of situations, the cases, many of them ancient, recognize that this much-criticized prohibition of a lien to the Master for wages5 has its own ameliorations. Where the so-called "Master" or "Captain" performs work which is essentially that of a crew member, deck or engine room, and now the shore-based Sieracki-Ryan-Yaka vicarious seamen, Ove Skou v. Hebert, 5 Cir., 1966, 365 F.2d 341, 344, 1966 AMC 2223, he is not denied the protection of security which Mr. Justice Gray, in the plagiaristic tendencies of Judges echoing the salt water extravagance of Sir William Scott, later Lord Stowell, described as "sacred."6
Thus, as though written about Barber and the BLUE CAT, Judge Sibley declared that "Knowles speaks of himself as captain, but it appears that he was the crew also. A true master has in the United States no lien for his wages, but Knowles, constituting the entire crew of this small boat, as crew may claim one." Swift v. Knowles, 5 Cir., 1939, 100 F.2d 977, 978, 1939 AMC 148. Indeed, we have sounded the same theme. Burdine v. Walden (The Atlantan), 5 Cir., 1937, 91 F.2d 321, 322, 1937 AMC 1149; see also Rathbun v. Halvorson (The Patsea), 5 Cir., 1960, 181 F.2d 57. The right to the security of a lien for wages for services which are the equivalent of a crewman's labor is the thing which gives the claim and the claimant the character, and "their real character is a question of fact." Collyer v. S.S. Favorite, S.D.N.Y., 1939 AMC 1015. See Norris, Seamen § 449 at 470 (2d ed. 1962). The fact that a person is described or describes himself or signs ship's papers as "master" is not conclusive as to his status as a seaman. Wandtke v. Anderson, 9 Cir., 1934, 74 F.2d 381, 1935 AMC 130; Matter of Southern Pac. Golden Gate Ferries, N.D. Calif.S.D., 1942, 1942 AMC 1581, 1585; Owen v. United States, S.D.N.Y., 1945, 1945 AMC 595; Vlavianos v. The Cypress, 4 Cir., 1948, 171 F.2d 435, 439, 1949 AMC 9.
Indeed, in the Shipowner's brief, which itself is remarkable for its failure to cite a single case or undertake to distinguish any of these,7 there is an apparent acquiescence in their complete correctness. Perhaps this is a key to what went on below. For the brief states, "In passing it should be mentioned that" a number of cases hold "that the mere fact that one is designated as a master does not automatically preclude a right to a lien upon his vessel for wages." Offering the only distinction, the brief goes on, "However, it should be noted that in those cases the foregoing rule of law was pronounced following a trial on the merits of the case and involved instances wherein the particular claimant involved did perform services of a nature other than those ordinarily and customarily performed by masters of vessels. In other words, the Court looked beyond the mere designation or title of master and adjudicated liens when services were performed in some other capacity." But how does a Libelant get a trial on the merits to establish these facts when the libel is dismissed on the shipowner's exceptions? With the liberality of the admiralty which presaged that of the Civil Rules which have now become the new dispensation, 39 F.R.D. 73 (1966), the least one can expect is that the libel, amplified by the detailed Bill of Particulars covering Barber's own activities, would be read in the light of Conley v. Gibson, 1957, 355 U.S. 41, 78 S.Ct. 99, 2 L.Ed.2d 80.
To dismiss the libel with prejudice was to go too fast too soon. As with nearly every one of these situations, the Trial Court failed to require the parties to exploit the marvelous tools now available by summary judgment or otherwise8 to demonstrate whether the facts, as distinguished from what the lawyers said the facts would be, would bear out a claim and if so to what extent. Tyler v. Peel Corp., 5 Cir., 1967, 371 F.2d 788. Now a year and a half later, the case must go back to decide whether such facts exist as to a claim that arose in 1963.
Reversed and remanded.
Notes:
1
To the cases listed in Millet, a hurried check of the annotations reveals that the following should be added to the tally: Brunswick Corp. v. Vinberg, 5 Cir., 196.., 370 F.2d 605 (Fla.) [No. 22907, ............]; Due v. Tallahassee Theatres, Inc., 5 Cir., 1964, 333 F.2d 630 (Fla.); City of Fort Lauderdale v. East Coast Asphalt Corp., 5 Cir., 1964, 329 F.2d 871 (Fla.), cert. denied, 379 U.S. 900, 85 S.Ct. 187, 13 L.Ed.2d 175; Shull v. Pilot Life Ins. Co., 5 Cir., 1963, 313 F.2d 445 (Fla.); Santiesteban v. Goodyear Tire & Rubber Co., 5 Cir., 1962, 306 F.2d 9 (Fla.); Brotherhood of Railroad Trainmen v. Central of Georgia Ry. Co., 5 Cir., 1962, 305 F.2d 605 (Ga.); Arthur H. Richland Co. v. Harper, 5 Cir., 1962, 302 F.2d 324 (Fla.); Smoot v. State Farm Mut. Automobile Ins. Co., 5 Cir., 1962, 299 F.2d 525 (Ga.); Fitz-Patrick v. Commonwealth Oil Co., 5 Cir., 1960, 285 F.2d 726 (Tex.); Mannings v. Board of Public Instruction, 5 Cir., 1960, 277 F.2d 370 (Fla.); Buras v. Timolat, 5 Cir., 1960, 275 F.2d 797 (La.), cert. denied 364 U.S. 879, 81 S.Ct. 167, 5 L.Ed. 2d 101; Mitchell v. E-Z Way Towers, Inc., 5 Cir., 1959, 269 F.2d 126 (Fla.); Black v. First National Bank, 5 Cir., 1958, 255 F.2d 373 (Ala.); Carss v. Outboard Marine Corp., 5 Cir., 1958, 252 F.2d 690 (Fla.); Baldwin v. Morgan, 5 Cir., 1958, 251 F.2d 780 (Ala.); Dotschay v. National Mut. Ins. Co., 5 Cir., 1957, 246 F.2d 221 (Fla.); Seaboard Finance Co. v. Martin, 5 Cir., 1957, 244 F.2d 329 (La.). See also Moritt v. Fine, 5 Cir., 1957, 242 F.2d 128, 132 (dissent)
Distinguishable, but not far removed, are those instances of reversals where the Trial Court rendered summary judgment on the barebones pleadings. Demandre v. Liberty Mut. Ins. Co., 5 Cir., 1959, 264 F.2d 70 (La.); Travelers Ins. Co. v. Busy Electric Co., 5 Cir., 1961, 294 F. 2d 139 (La.); Fowler v. Southern Bell Telephone & Telegraph Co., 5 Cir., 1965, 343 F.2d 150 (Ga.). Under the "spell of local state practice," Arthur H. Richland Co. v. Harper, supra, 302 F.2d at 326, the mortality rate in Florida appeals still runs high. Of the cases previously and herein listed reversed since 1938 for improvident orders dismissing complaints for failure to state a claim, cases from Florida still represent about 50% of the total (16 of 30). See Moritt v. Fine, supra, 242 F.2d at 132 n. 2 (dissent).
2
This is a substantial paraphrase of §§ 972, 971 of the Maritime Lien Act, 46 U.S.C.A. § 971 et seq
3
Itemized with evidential detail, these showed by date and place the number of hours spent by Barber in performing a variety of specific jobs including: fitting out, repairing engines, renewing valve cover gaskets, cleaning fuel filters, repairing fuel lines, power steering, replacing fuel filters, repacking stuffing box, cleaning, sanding decks, hull and bulkhead, removal and renewal of all outside varnish and other tasks totaling 503 hours at the specified rate of $5.50 per hour as the equivalent of the usual rate for shipwright or engine mechanic
4
The Trial Court did allow recovery of $150 paid by Barber as wages to a seaman hired by him
5
See Gilmore & Black, Admiralty § 9-20 at 513, n. 88, and The Mariner, D.C. Mass., 1924, 298 F. 108, 1924 AMC 882; Norris, Seamen § 449 (2d ed. 1962)
6
See Gilmore & Black, Admiralty § 9-20 at 514, quoting from The John G. Stevens that claims for seaman's wages are "sacred liens, and, so long as a plank of the ship remains, the sailor is entitled, against all other persons, to the proceeds as a security for his wages." 1898, 170 U.S. 113, 119, 18 S.Ct. 544, 547, 42 L. Ed. 969, 972; Norris, Seamen § 298 at 336 n. 6 (2d ed. 1962)
7
Giving tit for tat, a Big Roland for a Little Oliver, S.S. Bethflor v. Thomas, 5 Cir., 1966, 364 F.2d 634, 635 n. 5, we can readily understand why so little heed may have been paid to Barber's brief. The quotations from cases though never distorting the substance of the Court's holding are inaccurate, contain words that cannot be found and far too much are that abomination of appellate advocacy the quotation of a "headnote" as though it were the words of the Court. A headnote is, of course, an indispensable and valuable tool for purposes of legal research, but it is ordinarily not what the Judge said, but rather a condensed, concise version of what the Editor understood the Court to hold, say, or both
8
Admiralty R. 30A (Depositions), 31 (Interrogatories), 32 (Discovery), 32B (Request for Admissions), 58 (Summary Judgment), 28 U.S.C.A. (1950, supp. 1966); cf. F.R.Civ.P. 26, 33, 34, 36, 56, the corresponding rules of civilp rocedure now applicable in admiralty proceedings. 39 F.R.D. 73 (1966) | {
"perplexity_score": 280.3,
"pile_set_name": "FreeLaw"
} |
/* ****************************************************************************
*
* Copyright (c) Microsoft Corporation.
*
* This source code is subject to terms and conditions of the Apache License, Version 2.0. A
* copy of the license can be found in the License.html file at the root of this distribution. If
* you cannot locate the Apache License, Version 2.0, please send an email to
* dlr@microsoft.com. By using this source code in any fashion, you are agreeing to be bound
* by the terms of the Apache License, Version 2.0.
*
* You must not remove this notice, or any other, from this software.
*
*
* ***************************************************************************/
using System.Diagnostics;
namespace System.Management.Automation.Interpreter
{
internal abstract class GreaterThanInstruction : Instruction
{
private static Instruction s_SByte, s_int16, s_char, s_int32, s_int64, s_byte, s_UInt16, s_UInt32, s_UInt64, s_single, s_double;
public override int ConsumedStack { get { return 2; } }
public override int ProducedStack { get { return 1; } }
private GreaterThanInstruction()
{
}
internal sealed class GreaterThanSByte : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
sbyte right = (sbyte)frame.Pop();
frame.Push(((sbyte)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanInt16 : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
Int16 right = (Int16)frame.Pop();
frame.Push(((Int16)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanChar : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
char right = (char)frame.Pop();
frame.Push(((char)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanInt32 : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
Int32 right = (Int32)frame.Pop();
frame.Push(((Int32)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanInt64 : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
Int64 right = (Int64)frame.Pop();
frame.Push(((Int64)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanByte : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
byte right = (byte)frame.Pop();
frame.Push(((byte)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanUInt16 : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
UInt16 right = (UInt16)frame.Pop();
frame.Push(((UInt16)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanUInt32 : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
UInt32 right = (UInt32)frame.Pop();
frame.Push(((UInt32)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanUInt64 : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
UInt64 right = (UInt64)frame.Pop();
frame.Push(((UInt64)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanSingle : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
Single right = (Single)frame.Pop();
frame.Push(((Single)frame.Pop()) > right);
return +1;
}
}
internal sealed class GreaterThanDouble : GreaterThanInstruction
{
public override int Run(InterpretedFrame frame)
{
double right = (double)frame.Pop();
frame.Push(((double)frame.Pop()) > right);
return +1;
}
}
public static Instruction Create(Type type)
{
Debug.Assert(!type.IsEnum);
switch (type.GetTypeCode())
{
case TypeCode.SByte: return s_SByte ?? (s_SByte = new GreaterThanSByte());
case TypeCode.Byte: return s_byte ?? (s_byte = new GreaterThanByte());
case TypeCode.Char: return s_char ?? (s_char = new GreaterThanChar());
case TypeCode.Int16: return s_int16 ?? (s_int16 = new GreaterThanInt16());
case TypeCode.Int32: return s_int32 ?? (s_int32 = new GreaterThanInt32());
case TypeCode.Int64: return s_int64 ?? (s_int64 = new GreaterThanInt64());
case TypeCode.UInt16: return s_UInt16 ?? (s_UInt16 = new GreaterThanUInt16());
case TypeCode.UInt32: return s_UInt32 ?? (s_UInt32 = new GreaterThanUInt32());
case TypeCode.UInt64: return s_UInt64 ?? (s_UInt64 = new GreaterThanUInt64());
case TypeCode.Single: return s_single ?? (s_single = new GreaterThanSingle());
case TypeCode.Double: return s_double ?? (s_double = new GreaterThanDouble());
default:
throw Assert.Unreachable;
}
}
public override string ToString()
{
return "GreaterThan()";
}
}
} | {
"perplexity_score": 2184.1,
"pile_set_name": "Github"
} |
When there's no victim or crime under the UCR guidelines, police have the option of file a report known as a "police information report," but Davis said that is only necessary ifadditional information is gathered by officers beyond the dispatch reports that needs to be memorialized, such as a witness interview or evidence of a weapon. In this case, police who got to the scene didn't learn anything more than what the callers had provided. | {
"perplexity_score": 265.2,
"pile_set_name": "OpenWebText2"
} |
Q:
Converting UTC to local time returns strange result
I have a solution of three projects:
Core
Outlook Add-In
ASP.NET Website
Both, the Outlook Add-In and the Website use the same methods from Core project to get data from SQL Server. When I write my data into database, I convert all DateTime values of two tables into UTC time:
POLL_START POLL_END
2013-07-31 12:00:00.000 2013-08-01 12:00:00.000
and
PICK_DATE
2013-07-31 12:00:48.000
2013-07-31 13:00:12.000
When I get the data in my Outlook Add-In, this is the correct result:
When opening the same in my website, the picks are fine:
But my start and end time are "broken" - the offset is added, bute the wrong hours are used:
Here's the code for my converting, that both, Outlook and the website, use:
private static void ConvertToLocalTime(POLL item)
{
item.POLL_START = item.POLL_START.FromUTC();
item.POLL_END = item.POLL_END.FromUTC();
}
private static void ConvertToLocalTime(PICK pick)
{
if (pick.PICK_DATE != null) pick.PICK_DATE = ((DateTime)pick.PICK_DATE).FromUTC();
}
And the implementation of DateTime.FromUtc():
public static DateTime FromUTC(this DateTime value)
{
var local = TimeZoneInfo.Local;
return TimeZoneInfo.ConvertTime(value, TimeZoneInfo.Utc, local);
}
I had the same result with DateTime.ToLocalTime().
Anyone an idea?
EDIT 1:
This is how the start and end gets displayed on the website (end with End instead of Start):
var startCell = new TableCell
{
Text = String.Format(
@"<a href='{0}' title='{2}' target='_blank'>{1:dd.MM.yyyy HH:mm \U\T\Czzz}</a>",
Common.GetTimeAndDateHyperlink(_poll.Start, "Vote Start"),
_poll.Start,
ConvertToLocalTimeZone),
CssClass = "InfoContent"
};
And the picks:
answerCell = new TableCell
{
Text = String.Format(
@"<a href='{0}' title='{2}' target='_blank'>{1}</a>",
Common.GetTimeAndDateHyperlink(ao.Time, ao.RealAnswer),
ao.RealAnswer,
ConvertToLocalTimeZone)
};
ao.RealAnswer returns the formated DateTime string:
return String.Format(WholeTime == true ? "{0:d}" : @"{0:dd.MM.yyyy HH:mm \U\T\Czzz}", Time);
A:
I solved the issue now. The DateTime values for start and end didn't get correctly converted: The values weren't casted to local time.
The reason, why the website displayed the time as local time is, that the SQL server stores every DateTime value as DateTimeKind.Unspecified instead of keeping the specified data (e.g. DateTimeKind.Utc) during the insert. When reading the data from the server, all Kinds are DateTimeKind.Unspecified, so the .ToString() of DateTime uses the local kind. This results into the UTC time + local UTC offset. | {
"perplexity_score": 2736.8,
"pile_set_name": "StackExchange"
} |
Facebook's std::vector optimization - iamsalman
https://github.com/facebook/folly/blob/master/folly/docs/FBVector.md
======
jlebar
If you're interested in these sorts of micro-optimizations, you may find
Mozilla's nsTArray (essentially std::vector) interesting.
One of its unusual design decisions is that the array's length and capacity is
stored next to the array elements themselves. This means that nsTArray stores
just one pointer, which makes for more compact DOM objects and so on.
To make this work requires some cooperation with Firefox's allocator
(jemalloc, the same one that FB uses, although afaik FB uses a newer version).
In particular, it would be a bummer if nsTArray decided to allocate space for
e.g. 4kb worth of elements and then tacked on a header of size 8 bytes,
because then we'd end up allocating 8kb from the OS (two pages) and wasting
most of that second page. So nsTArray works with the allocator to figure out
the right number of elements to allocate without wasting too much space.
We don't want to allocate a new header for zero-length arrays. The natural
thing to do would be to set nsTArray's pointer to NULL when it's empty, but
then you'd have to incur a branch on every access to the array's
size/capacity.
So instead, empty nsTArrays are pointers to a globally-shared "empty header"
that describes an array with capacity and length 0.
Mozilla also has a class with some inline storage, like folly's fixed_array.
What's interesting about Mozilla's version, called nsAutoTArray, is that it
shares a structure with nsTArray, so you can cast it to a const nsTArray*.
This lets you write a function which will take an const nsTArray& or const
nsAutoTArray& without templates.
Anyway, I won't pretend that the code is pretty, but there's a bunch of good
stuff in there if you're willing to dig.
[http://mxr.mozilla.org/mozilla-
central/source/xpcom/glue/nsT...](http://mxr.mozilla.org/mozilla-
central/source/xpcom/glue/nsTArray.h)
~~~
nly
> One of its unusual design decisions is that the array's length and capacity
> is stored next to the array elements itself.
GNU stdlibc++ does this for std::string so you get prettier output in the
debugger. The object itself only contains a char*.
~~~
byuu
Seems like that would prevent small string optimization (a union of a small
char array and the heap char pointer.) That lets me store about 85% of the
strings in my assembler without any heap allocation, and is a huge win in my
book.
~~~
nly
Indeed, they don't do SSO. Reference counted COW, which violates the standard.
------
userbinator
_When the request for growth comes about, the vector (assuming no in-place
resizing, see the appropriate section in this document) will allocate a chunk
next to its current chunk_
This is assuming a "next-fit" allocator, which is not always the case. I think
this is why the expansion factor of 2 was chosen - because it's an integer,
and doesn't assume any behaviour of the underlying allocator.
I'm mostly a C/Asm programmer, and dynamic allocation is one of the things
that I very much avoid if I don't have to - I prefer constant-space
algorithms. If it means a scan of the data first to find out the right size
before allocating, then I'll do that - modern CPUs are _very_ fast "going in a
straight line", and realloc costs add up quickly.
Another thing that I've done, which I'm not entirely sure would be possible in
"pure C++", is to adjust the pointers pointing to the object if reallocation
moves it (basically, add the difference between the old and new pointers to
each reference to the object); in theory I believe this involves UB - so it
might not be "100% standard C" either, but in practice, this works quite well.
~~~
kabdib
I solved an "realloc is really costly" problem by ditching the memory-is-
contiguous notion, paying a little more (really just a few cycles) for each
access rather than spending tons of time shuffling stuff around in memory.
This eliminated nearly all reallocations. The extra bit of computation was
invisible in the face of cache misses.
I'm guessing that most customers of std::vector don't really need contiguous
memory, they just need something that has fast linear access time. In this
sense, std::vector is a poor design.
~~~
colomon
No, that's quite intentional. If you don't need contiguous memory, you can
consider using std::deque.
[http://www.cplusplus.com/reference/deque/deque/](http://www.cplusplus.com/reference/deque/deque/)
~~~
kabdib
There are weasel words in the standard that let implementations still be
pretty inefficient. The problem is that memory reallocation is a leaky
abstraction, and an interface that doesn't make guarantees about memory
behavior can't be relied upon at scale.
The implementation of std::deque I just read uses a circular queue, resized to
a power of two upon growth. It would exhibit the same bad performance as
std::vector.
~~~
yoklov
Are you sure? You're not allowed to invalidate iterators or pointers to
elements in a deque, so it shouldn't be reallocating memory (aside from its
underlying map of nodes, which will need to grow very rarely).
Libstdc++ describes how it's implemented here: [https://github.com/gcc-
mirror/gcc/blob/master/libstdc%2B%2B-...](https://github.com/gcc-
mirror/gcc/blob/master/libstdc%2B%2B-v3/include/bits/stl_deque.h#L650-L733)
Libc++ doesn't have as descriptive a comment but it's impemented basically the
same way here [https://github.com/llvm-
mirror/libcxx/blob/master/include/de...](https://github.com/llvm-
mirror/libcxx/blob/master/include/deque)
~~~
nly
You might not want to use deque because of how much memory it can use while
still small, e.g. libc++s implementation uses a 4KiB page:
[http://rextester.com/VIB96468](http://rextester.com/VIB96468)
In the GNU stdlibc++ implementation the object itself is pretty large (and
they use a page size of 512 bytes):
[http://rextester.com/RHYKB83240](http://rextester.com/RHYKB83240)
------
CJefferson
I'm glad to see this catch on and the C level primitives get greater use.
This has been a well known problem in the C++ community for years, in
particular Howard Hinnant put a lot of work into this problem. I believe the
fundamental problem has always been that C++ implementations always use the
underlying C implementations for malloc and friends, and the C standards
committee could not be pursaded to add the necessary primitives.
A few years ago I tried to get a reallic which did not move (instead returned
fail) into glibc and jealloc and failed. Glad to see someone else has
succeeded.
------
shin_lao
I think the Folly small vector library is much more interesting and can yield
better performance (if you hit the sweet spot).
[https://github.com/facebook/folly/blob/master/folly/docs/sma...](https://github.com/facebook/folly/blob/master/folly/docs/small_vector.md)
From what I understand, using a "rvalue-reference ready" vector implementation
with a good memory allocator must work at least as good as FBVector.
------
jeorgun
Apparently the libstdc++ people aren't entirely convinced by the growth factor
claims:
[https://gcc.gnu.org/ml/libstdc++/2013-03/msg00059.html](https://gcc.gnu.org/ml/libstdc++/2013-03/msg00059.html)
------
cliff_r
The bit about special 'fast' handling of relocatable types should be obviated
by r-value references and move constructors in C++11/14, right?
I.e. if we want fast push_back() behavior, we can use a compiler that knows to
construct the element directly inside the vector's backing store rather that
creating a temporary object and copying it into the vector.
~~~
marksamman
emplace_back was added in C++11 which does just that:
[http://en.cppreference.com/w/cpp/container/vector/emplace_ba...](http://en.cppreference.com/w/cpp/container/vector/emplace_back)
------
darkpore
You can get around a lot of these issues by reserving the size needed up
front, or using a custom allocator with std::vector. Not as easy, but still
doable.
The reallocation issue isn't fixable this way however...
~~~
thrownaway2424
You can use a feedback directed optimization pass to choose the initial size.
------
ajasmin
TLDR; The author of malloc and std::vector never talked to each other. We
fixed that!
... also most types are memmovables
------
pbw
Are there benchmarks, speedup? Seems strange to leave out that information or
did I just miss it?
~~~
shadytrees
Yes!
[https://www.google.com/search?q=folly+facebook+benchmarks](https://www.google.com/search?q=folly+facebook+benchmarks)
~~~
pbw
I don't see the results. Like a graph that shows std::vector vs. folly. I mean
isn't that the entire point?
------
14113
Is it normal to notate powers using double caret notation? (i.e. ^^) I've only
ever seen it using a single caret (^), in what presumably is meant to
correspond to an ascii version of Knuth up arrow notation
([https://en.wikipedia.org/wiki/Knuth's_up-
arrow_notation](https://en.wikipedia.org/wiki/Knuth's_up-arrow_notation)). I
found it a bit strange, and confusing in the article having powers denoted
using ^^, and had to go back to make sure I wasn't missing anything.
~~~
Sidnicious
It's likely to distinguish it from XOR, which is the carat operator in many
programming languages.
~~~
kevin_thibedeau
It is still weird. * * is the other established convention used for
exponentiation in languages like Python, Ada, m4, and others.
~~~
merraksh
But * * has an entirely different meaning in C/C++.
~~~
taejo
Only as a prefix operator; * has a pointer-related meaning for prefix and an
arithmetic meaning for infix, there's no reason * * shouldn't be the same.
~~~
phs2501
That'd be a syntactic ambiguity (in C-type languages) between "a * * b" being
a to the power of b (i.e. "(a) * * (b)") or "a * * b" being a times the
dereferencing of the pointer b (i.e. "(a) * (*b)"). You may be able to
disambiguate this by prescedence, though it would be very ugly in the lexer
(you could never have a STARSTAR token, it would have to be handled in the
grammar) and would be terribly confusing.
------
xroche
Yep, this is my biggest issue with C++: you now have lambdas functions and an
insane template spec, but you just can not "realloc" a new[] array. Guys,
seriously ?
~~~
bnegreve
If you need to realloc a fixed size array, souldn't you use a std::vector
instead?
~~~
marksamman
You probably should, but the problem is still there because std::vector
implementations don't use realloc. They call new[] with the new size, copy
over the data and delete[] the old chunk. This eliminates the possibility to
grow the vector in-place.
~~~
bnegreve
It's the same with realloc: there is no guarantee that it will grow the chunk
in place.
~~~
xroche
No. Modern realloc are efficient, when moving large memory blocks, because
they rely on the kernel ability to quickly relocate memory regions without
involving memcpy() (through mremap() on Linux).
Edit: shamelessly citing my blog entry on this subject:
[http://blog.httrack.com/blog/2014/04/05/a-story-of-
realloc-a...](http://blog.httrack.com/blog/2014/04/05/a-story-of-realloc-and-
laziness/)
~~~
davidtgoldblatt
This isn't true for either of the common high performance mallocs. tcmalloc
doesn't support mremap at all, and jemalloc disables it in its recommended
build configuration. glibc will remap, but any performance gains that get
realized from realloc tricks would probably be small compared to the benefits
of switching to a better malloc implementation.
------
general_failure
In Qt, you can mark types as Q_MOVABLE_TYPE and get optimizations from a lot
of containers
------
thomasahle
The factor-2 discussion is quite interesting. What if we could make the next
allocated element always fit exactly in the space left over by the old
elements?
Solving the equations suggest a fibonacci like sequence, seeded by something
like "2, 3, 4, 5". Continuing 9, 14, 23 etc.
~~~
judk
he golden ratio and then rounding down. What's the point of putting 4 into the
seed sequence?
~~~
thomasahle
Without _4_ , the sequence would be _2, 3, 5_. Then the next value would be
_9_ by fibonacci. But that's bigger than the _5_ we get from adding up all the
unallocated pieces ( _2_ and _3_ ).
We could use just _2, 3, 4_ as a seed, but we can't use the fibonacci formula
before the fourth element is added. Try some different seeds for yourself,
it's trickier than you'd think.
------
malkia
For big vectors, if there is obvious way, I always hint vector with reserve()
- for example knowing in advance how much would be copied, even if a bit less
gets copied (or even if a bit more, at the cost of reallocation :().
------
ck2
_Then the teleporting chief would have to shoot the original_
As an aside, there was a great Star Trek novel where there was a long range
transporter invented that accidentally cloned people.
(I think it was "Spock Must Die")
~~~
dalke
There's also the ST:TNG episode "Second Chances".
[http://en.wikipedia.org/wiki/Second_Chances_%28Star_Trek:_Th...](http://en.wikipedia.org/wiki/Second_Chances_%28Star_Trek:_The_Next_Generation%29)
where Riker is duplicated. (There's also the good/bad Kirk in 'The Enemy
Within', and the whole mirror universe concept, but those aren't duplicates.)
------
jheriko
i used to be a big fan of this sort of stuff, but the better solution for many
of the problems described is to avoid array resizing.
if std::vector is your bottleneck you have bigger problems i suspect.
reminds me a bit of eastl as well... which is much more comprehensive:
[http://www.open-
std.org/jtc1/sc22/wg21/docs/papers/2007/n227...](http://www.open-
std.org/jtc1/sc22/wg21/docs/papers/2007/n2271.html)
------
johnwbyrd
If you're spending a lot of time changing the size of a std::vector array,
then maybe std::vector isn't the right type of structure to begin with...
------
judk
How is it reasonable to expect that previously freed memory would be available
later for the vector to move to?
------
chickenandrice
Greetings Facebook, several decades ago welcomes you. Game programmers figured
out the same and arguably better ways of doing this since each version of
std::vector has been released. This is but a small reason most of us had in-
house stl libraries for decades now.
Most of the time if performance and allocation is so critical, you're better
off not using a vector anyway. A fixed sized array is much more cache
friendly, makes pooling quite easy, and eliminates other performance costs
that suffer from std::vector's implementation.
More to the point, who would use a c++ library from Facebook? Hopefully don't
need to explain the reasons here.
~~~
dbaupp
_> More to the point, who would use a c++ library from Facebook? Hopefully
don't need to explain the reasons here._
Could you explain them for those of us not in the loop? Does Facebook have a
bad reputation for C++?
~~~
DonPellegrino
I would also like expanations, because Facebook actually has a good reputation
when it comes to their compiled languages engineers. Their C++ and D engineers
built HHVM/Hack, their OCaml engineers built some great analysis tools and
much of the supporting code for the HHVM/Hack platform, etc., the list goes
on, so I'd like to know why someone would want to avoid their C++ library
based on the "Facebook" name only.
~~~
chickenandrice
Because Facebook also has a reputation of not playing nice with people, the
rules, intellectual property, and so on. This is hardly a company anyone
should support or trust and if you can't figure that out, I can't help you.
As far as their work on HHVM, it was necessary due to failure by bad
technology choices from the start. There's very little interesting about this
work unless you somehow love PHP, want to make debugging your production
applications more difficult, and refuse to address your real problems. I am
100% sure no one outside of the PHP community cares about anything Facebook
has done in C++.
Simply having a large company with lots of developers who might have even had
good reputations elsewhere or even be smart doesn't mean much. Having worked
in many places with lots of smart developers, I can tell you stories about too
many geniuses in the room. Calling Facebook developers engineers is also about
as apt as calling janitors sanitation engineers. We're programmers, or
developers, or perhaps software architects at best depending on the position.
I happen to have an EE and CS degree but given I do programming for a living,
I'd hardly call myself an engineer. But we're way off topic :)
~~~
otterley
> As far as their work on HHVM, it was necessary due to failure by bad
> technology choices from the start.
HHVM arose out of Facebook's desire to save on server purchasing and operating
costs. Facebook could run perfectly well without it on Plain Old PHP, but
they'd have to buy and power more servers.
I'd hardly call PHP a "bad technology choice" given the outstanding financial
success of many companies that use it.
------
boomshoobop
Isn't Facebook itself an STD vector?
~~~
general_failure
Funny :)
------
johnwbyrd
Show me a programmer who is trying to reoptimize the STL, and I'll show you a
programmer who is about to be laid off.
The guy who tried this at EA didn't last long there.
~~~
xroche
The STL is not optimized at all in this case, this is precisely the point. And
like it or not, but Facebook has talented engineers to do that.
~~~
richardwhiuk
The STL isn't a library that can be optimized - it's a interface definition
with expected complexity requirements. By it's nature (i.e. not tied to a
platform) it doesn't have specific benchmark numbers. Specific implementations
(e.g. MSVCRT, the GC++ implementation, the clang implementation) can be, and
are.
------
kenperkins
> ... Rocket surgeon
That's a new one. Usually it's rocket scientist or brain surgeon. What exactly
does a rocket surgeon do? :)
~~~
krallja
[http://www.sensible.com/rsme.html](http://www.sensible.com/rsme.html)
[http://tvtropes.org/pmwiki/pmwiki.php/Main/ThisAintRocketSur...](http://tvtropes.org/pmwiki/pmwiki.php/Main/ThisAintRocketSurgery)
[http://www.urbandictionary.com/define.php?term=rocket%20surg...](http://www.urbandictionary.com/define.php?term=rocket%20surgery) | {
"perplexity_score": 570.7,
"pile_set_name": "HackerNews"
} |
A marine/freshwater biomedical research and training core center is proposed. Its objectives will be to facilitate the development and use of aquatic animals as models of human disease processes of environmental significance. Principal efforts will be directed toward use of aquatic animals for mutagenesis and teratogenesis investigation with environmental pollutants such as hydrocarbons and metals as etiologic agents. The development of this center will foster training of environmental scientists in these interrelated fields. | {
"perplexity_score": 338.4,
"pile_set_name": "NIH ExPorter"
} |
Al-Jamiatul Asaria Darul Hadees
Al-Jamiatul Asaria Darul Hadees, Mau is an Islamic Educational Institution (Madrasa) located in Mau in eastern Uttar Pradesh which was established in 1954. Besides providing traditional Islamic education, Jamia Asaria has also opened contemporary educational institutions such as Darul Hadees Higher Secondary Boys School, Mau. This institute has produced many Muslim scholars of national and international repute also such as Sheikh Dr. Obaidur Rahman, Sheikh Meraj Rabbani, Salim Ansari, etc.
See also
Jamia Islamia Faiz-e-Aam
Darul Uloom Mau
References
Category:Islamic education in India
Category:Madrasas in India
Category:Mau
Category:Mau district | {
"perplexity_score": 316.9,
"pile_set_name": "Wikipedia (en)"
} |
Q:
Geocoder initialization fails
I am getting a NullPointerException when trying to declare the Geocoder in my application. I have the following declaration :
public class MainActivity extends Activity {
private Geocoder geocoder = new Geocoder(this, Locale.getDefault());
...
}
I get the following LogCat :
03-20 10:48:55.729: D/AndroidRuntime(604): Shutting down VM
03-20 10:48:55.729: W/dalvikvm(604): threadid=1: thread exiting with uncaught exception
(group=0x40a71930)
03-20 10:48:56.209: E/AndroidRuntime(604): FATAL EXCEPTION: main
03-20 10:48:56.209: E/AndroidRuntime(604): java.lang.RuntimeException: Unable to instantiate activity ComponentInfo{com.example.coord/com.example.coord.MainActivity}: java.lang.NullPointerException
03-20 10:48:56.209: E/AndroidRuntime(604): at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:2106)
03-20 10:48:56.209: E/AndroidRuntime(604): at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:2230)
03-20 10:48:56.209: E/AndroidRuntime(604): at android.app.ActivityThread.access$600(ActivityThread.java:141)
03-20 10:48:56.209: E/AndroidRuntime(604): at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1234)
03-20 10:48:56.209: E/AndroidRuntime(604): at android.os.Handler.dispatchMessage(Handler.java:99)
03-20 10:48:56.209: E/AndroidRuntime(604): at android.os.Looper.loop(Looper.java:137)
03-20 10:48:56.209: E/AndroidRuntime(604): at android.app.ActivityThread.main(ActivityThread.java:5041)
03-20 10:48:56.209: E/AndroidRuntime(604): at java.lang.reflect.Method.invokeNative(Native Method)
03-20 10:48:56.209: E/AndroidRuntime(604): at java.lang.reflect.Method.invoke(Method.java:511)
03-20 10:48:56.209: E/AndroidRuntime(604): at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:793)
03-20 10:48:56.209: E/AndroidRuntime(604): at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:560)
03-20 10:48:56.209: E/AndroidRuntime(604): at dalvik.system.NativeStart.main(Native Method)
03-20 10:48:56.209: E/AndroidRuntime(604): Caused by: java.lang.NullPointerException
03-20 10:48:56.209: E/AndroidRuntime(604): at android.content.ContextWrapper.getApplicationContext(ContextWrapper.java:109)
03-20 10:48:56.209: E/AndroidRuntime(604): at com.example.coord.MainActivity.<init>(MainActivity.java:21)
03-20 10:48:56.209: E/AndroidRuntime(604): at java.lang.Class.newInstanceImpl(Native Method)
03-20 10:48:56.209: E/AndroidRuntime(604): at java.lang.Class.newInstance(Class.java:1319)
03-20 10:48:56.209: E/AndroidRuntime(604): at android.app.Instrumentation.newActivity(Instrumentation.java:1054)
03-20 10:48:56.209: E/AndroidRuntime(604): at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:2097)
Line 21 is my Geocoder declaration. What is wrong with my code?
A:
The context is only available when the activity is started so you cannot initialize the geocoder in the class body. Try to initialize it in the onCreate or onResume method instead...
public class MainActivity extends Activity {
private Geocoder mGeocoder;
@Override
protected void onCreate(Bundle _icicle) {
super.onCreate(_icicle);
mGeocoder = new Geocoder(getApplicationContext(), Locale.getDefault());
}
} | {
"perplexity_score": 2332.9,
"pile_set_name": "StackExchange"
} |
So I Missed the Deadline for Mobilegeddon. Now What?
More in this section
Regardless of its name, the new mobile-friendly algorithm update is not the end of the world. Sure, it is better if you were able to employ a mobile–friendly or responsive design prior to the April 21st deadline, but if you didn’t, you are not doomed. You are doomed, however, if you have no intention of fixing it. With the exception of a small minority of websites that, for whatever reason, did not receive much traffic from mobile users to begin with, chances are, you'll need to make some adjustments.
And even if you are "lucky" enough to be in that small percentage of websites that receive little to no mobile traffic, that too is likely to change in the near future. As we've said before, the move to mobile is a very real trend that will only continue to overtake traditional desktop traffic. Whether this algorithm is affecting you now or not, it definitely will down the road. The bottom line: If you do not do something to address the mobile compatibility of your website, you're going to be missing out on website visits; visits that could have lead to business. Don't let that happen. Follow these steps to make amends with Google.
Don’t Panic.
Maybe reading this article was the first you have heard of the mobile-friendly algorithm? Or maybe it's been in the back of your mind for some time, but has just now surfaced among all of your other tasks and to-dos that fill it up on a day to day basis. Maybe you didn't believe it would affect you. Whatever the reason, you missed the deadline, and there's a good chance that if you haven't seen a dip in your website traffic, you probably will soon. Just remember, panicking will do nothing but put off the changes that need to be made.
Accept That Something Needs To Change.
The good news is, it’s not all or nothing. Just because you missed the deadline does not mean you can’t still address the problem and recover or even improve. The sooner you understand and come to terms with the fact you need to have a mobile presence to compete in today's search landscape, the better and less costly it will be for your business or organization.
Take Action.
Talk to an expert about your options. Global Reach can help find solutions for both large and small budgets. Though there will be an investment to make, it is one which is well worth it. Think about it this way: every month you pay a hosting fee to rent space on the internet for your website to live on. If you refuse to go mobile, you're essentially paying for a space that fewer and fewer people will find. We can help you find a solution and are willing to be flexible in offering options for financing the changes that need to be made. Contact us today to get the conversation started. | {
"perplexity_score": 248.1,
"pile_set_name": "Pile-CC"
} |
Federal workers earning $150,000 or more has risen tenfold in past five years - chailatte
http://www.nydailynews.com/opinions/2010/11/13/2010-11-13_the_fat_of_the_land.html
======
ENOTTY
They should really compare industry to industry to see if the pay with
benefits are similar.
For example, with all these new regulations on the financial industry, how are
you going to attract financial professionals to government service to enforce
these regulations. If they're making 5 figures in government while their
classmates are making 6 or 7 figures in the private sector, would it be really
surprising if we can't find enough smart and savvy financial cops?
------
percept
Heavily slanted. Some points from the source article:
"workers earning $150,000 or more make up 3.9% of the workforce" (the original
headline was "More federal workers' pay" which paints a different mental
picture).
"The biggest pay hikes have gone to employees who have been with the
government for 15 to 24 years"
"Physicians rewarded. Medical doctors at veterans hospitals, prisons and
elsewhere earn an average of $179,500"
IT in particular is poorly compensated when compared to the private sector. In
fact the government would be better off hiring large numbers at private
sector-level salaries instead of outsourcing to private contractors at huge
markups (Robert Gates made the same point with regard to defense contracting).
But the forces aligned against "stunning" federal pay aren't likely to oppose
continued outsourcing.
They're also carefully carving the pie to exclude federal defense workers:
"Freeze federal salaries for three years, with the exception of defense
paychecks."
------
makecheck
It sounds ridiculous on the surface, but at least consider cost of living. You
can't compare salaries without knowing where the people are. Assuming they are
mostly in DC, how expensive is that compared to other parts of the country?
~~~
percept
Ridiculously expensive.
------
kevinpet
I think we need to chop government worker pay severely, but I don't like the
misleading way this headline frames the problem. That is -- I think others may
correctly point out that this is a very odd metric to quote, and hence people
must need to fudge the numbers to argue the case. The more accurate is what
Rand Paul just said -- federal total compensation averages $120k vs. $60k for
private sector. The only subtlety there is total compensation including
benefits vs. salary.
The problem with those making more than X has increased by Y is that you can
always generate extreme numbers by choosing X appropriately. Imagine there was
a large subset of our all-knowing overlords making $145k five years ago. Maybe
this was the cap for some particular level in the hierarchy. Now assume they
got a 5% raise. Bam, huge increase in number of feds making over $150k. True,
but misleading.
If you want subtlety, there are studies out there comparing apples to apples
(since federal employees are skewed towards professionals) and still finds
massive pay differences. | {
"perplexity_score": 667,
"pile_set_name": "HackerNews"
} |
5*o + 128
What is the k'th term of -662, -1318, -1974, -2630?
-656*k - 6
What is the c'th term of -5426, -5425, -5424?
c - 5427
What is the n'th term of 391, 781, 1157, 1513, 1843, 2141, 2401, 2617?
-n**3 - n**2 + 400*n - 7
What is the v'th term of -123, -490, -1105, -1968, -3079, -4438?
-124*v**2 + 5*v - 4
What is the g'th term of -214, -426, -638, -850, -1062, -1274?
-212*g - 2
What is the o'th term of -9337, -9341, -9355, -9385, -9437, -9517, -9631, -9785?
-o**3 + o**2 - 9337
What is the p'th term of -497, -990, -1483, -1976, -2469, -2962?
-493*p - 4
What is the h'th term of 28, 35, 52, 85, 140?
h**3 - h**2 + 3*h + 25
What is the c'th term of -41, -96, -187, -314, -477, -676, -911?
-18*c**2 - c - 22
What is the z'th term of -49, -38, -15, 26, 91?
z**3 + 4*z - 54
What is the i'th term of -586, -574, -560, -544, -526, -506, -484?
i**2 + 9*i - 596
What is the m'th term of -421, -351, -267, -163, -33, 129?
m**3 + m**2 + 60*m - 483
What is the m'th term of 30, 72, 134, 216, 318, 440?
10*m**2 + 12*m + 8
What is the r'th term of 324, 315, 306?
-9*r + 333
What is the i'th term of -18, -67, -142, -237, -346, -463, -582, -697?
i**3 - 19*i**2 + i - 1
What is the v'th term of -5, -17, -47, -101, -185, -305, -467, -677?
-v**3 - 3*v**2 + 4*v - 5
What is the k'th term of 23, 49, 89, 149, 235?
k**3 + k**2 + 16*k + 5
What is the s'th term of -147, -294, -441?
-147*s
What is the i'th term of 2046, 2044, 2032, 2004, 1954, 1876, 1764?
-i**3 + i**2 + 2*i + 2044
What is the a'th term of -12657, -12658, -12659, -12660, -12661, -12662?
-a - 12656
What is the b'th term of -98, -275, -516, -827, -1214?
-b**3 - 26*b**2 - 92*b + 21
What is the x'th term of 9099, 9100, 9101, 9102, 9103?
x + 9098
What is the a'th term of 179, 181, 185, 191, 199?
a**2 - a + 179
What is the f'th term of 866, 878, 904, 950, 1022, 1126, 1268, 1454?
f**3 + f**2 + 2*f + 862
What is the r'th term of -30, -12, 34, 120, 258, 460, 738?
2*r**3 + 2*r**2 - 2*r - 32
What is the t'th term of -29, -42, -41, -26, 3, 46?
7*t**2 - 34*t - 2
What is the k'th term of -27, -49, -71?
-22*k - 5
What is the a'th term of -248, -249, -266, -305, -372, -473?
-a**3 - 2*a**2 + 12*a - 257
What is the b'th term of -104, -208, -312, -416?
-104*b
What is the l'th term of -192, -214, -244, -282, -328, -382?
-4*l**2 - 10*l - 178
What is the f'th term of 4458, 4463, 4470, 4479, 4490, 4503, 4518?
f**2 + 2*f + 4455
What is the b'th term of -2, -7, -16, -29, -46, -67, -92?
-2*b**2 + b - 1
What is the b'th term of -204, -816, -1832, -3252, -5076, -7304, -9936?
-202*b**2 - 6*b + 4
What is the b'th term of 471, 945, 1419, 1893?
474*b - 3
What is the q'th term of 208, 207, 206, 205?
-q + 209
What is the n'th term of -51, -64, -87, -120, -163?
-5*n**2 + 2*n - 48
What is the k'th term of 60, 118, 176, 234, 292?
58*k + 2
What is the o'th term of 115, 120, 127, 136, 147, 160?
o**2 + 2*o + 112
What is the b'th term of -655, -649, -641, -631, -619, -605?
b**2 + 3*b - 659
What is the m'th term of -31, -134, -299, -520, -791, -1106, -1459?
m**3 - 37*m**2 + m + 4
What is the f'th term of 12, 52, 162, 378, 736, 1272, 2022?
6*f**3 - f**2 + f + 6
What is the v'th term of -4685, -4693, -4715, -4757, -4825, -4925?
-v**3 - v**2 + 2*v - 4685
What is the j'th term of -974, -978, -984, -992, -1002, -1014, -1028?
-j**2 - j - 972
What is the n'th term of 129, 33, -75, -201, -351?
-n**3 - 89*n + 219
What is the i'th term of -4, 2, 20, 56, 116, 206, 332?
i**3 - i - 4
What is the s'th term of 2689, 10756, 24207, 43048, 67285?
s**3 + 2686*s**2 + 2*s
What is the c'th term of 163, 328, 505, 700, 919, 1168, 1453, 1780?
c**3 + 158*c + 4
What is the m'th term of 1201, 1210, 1219, 1228, 1237, 1246?
9*m + 1192
What is the x'th term of 69, 99, 131, 165, 201, 239?
x**2 + 27*x + 41
What is the q'th term of 33, 47, 63, 75, 77, 63, 27?
-q**3 + 7*q**2 + 27
What is the w'th term of 54, 69, 82, 87, 78, 49?
-w**3 + 5*w**2 + 7*w + 43
What is the n'th term of 2968, 2969, 2970, 2971, 2972?
n + 2967
What is the o'th term of -7, 9, 57, 155, 321, 573, 929?
3*o**3 - 2*o**2 + o - 9
What is the x'th term of -7, -8, 1, 26, 73, 148, 257?
x**3 - x**2 - 5*x - 2
What is the m'th term of -180, -343, -496, -633, -748, -835?
m**3 - m**2 - 167*m - 13
What is the g'th term of 746, 744, 740, 734?
-g**2 + g + 746
What is the a'th term of -36, -17, 4, 27?
a**2 + 16*a - 53
What is the p'th term of 248, 242, 222, 182, 116, 18, -118, -298?
-p**3 - p**2 + 4*p + 246
What is the x'th term of 200, 213, 226?
13*x + 187
What is the s'th term of 28, 42, 56?
14*s + 14
What is the j'th term of -45, -39, -29, -15?
2*j**2 - 47
What is the c'th term of -84, -112, -158, -222, -304?
-9*c**2 - c - 74
What is the z'th term of 28, 47, 70, 103, 152, 223, 322, 455?
z**3 - 4*z**2 + 24*z + 7
What is the t'th term of 6, -26, -58?
-32*t + 38
What is the g'th term of 9673, 9672, 9671, 9670?
-g + 9674
What is the s'th term of -25, -32, -35, -34, -29, -20?
2*s**2 - 13*s - 14
What is the q'th term of 101, 237, 383, 545, 729, 941, 1187?
q**3 - q**2 + 132*q - 31
What is the j'th term of -928, -1866, -2820, -3796, -4800, -5838, -6916, -8040?
-j**3 - 2*j**2 - 925*j
What is the b'th term of 93, 162, 261, 378, 501?
-2*b**3 + 27*b**2 + 2*b + 66
What is the d'th term of 41, 230, 551, 1010, 1613, 2366, 3275, 4346?
d**3 + 60*d**2 + 2*d - 22
What is the u'th term of -6, -15, -22, -27, -30?
u**2 - 12*u + 5
What is the l'th term of -4, 11, 62, 155, 296?
l**3 + 12*l**2 - 28*l + 11
What is the j'th term of 308, 310, 312, 314, 316, 318?
2*j + 306
What is the v'th term of 30, 1, -16, -15, 10, 65, 156?
v**3 - 36*v + 65
What is the k'th term of -54, -84, -116, -150, -186?
-k**2 - 27*k - 26
What is the t'th term of -91, -93, -97, -103?
-t**2 + t - 91
What is the f'th term of -58, -60, -28, 56, 210, 452, 800, 1272?
3*f**3 - f**2 - 20*f - 40
What is the d'th term of 22, 19, 16, 13, 10?
-3*d + 25
What is the i'th term of 84, 97, 124, 171, 244, 349?
i**3 + i**2 + 3*i + 79
What is the w'th term of -2005, -2003, -2001, -1999, -1997?
2*w - 2007
What is the a'th term of -521, -509, -489, -461, -425, -381, -329?
4*a**2 - 525
What is the l'th term of -1726, -1717, -1708?
9*l - 1735
What is the d'th term of 18795, 18812, 18843, 18894, 18971, 19080, 19227, 19418?
d**3 + d**2 + 7*d + 18786
What is the w'th term of 418, 419, 420, 421, 422, 423?
w + 417
What is the q'th term of 0, 2, -6, -30, -76?
-q**3 + q**2 + 6*q - 6
What is the a'th term of -136, -138, -140, -142?
-2*a - 134
What is the h'th term of 9, 111, 213, 315?
102*h - 93
What is the h'th term of 85, 82, 79, 76, 73?
-3*h + 88
What is the a'th term of 2, 7, 24, 59, 118, 207?
a**3 - 2*a + 3
What is the z'th term of -3852, -3854, -3856, -3858, -3860, -3862?
-2*z - 3850
What is the g'th term of -1866, -1873, -1882, -1893?
-g**2 - 4*g - 1861
What is the u'th term of -33123, -33125, -33127, -33129, -33131, -33133?
-2*u - 33121
What is the j'th term of -1116, -2237, -3358, -4479, -5600?
-1121*j + 5
What is the c'th term of 12, 46, 90, 150, 232, 342, 486?
c**3 - c**2 + 30*c - 18
What is the f'th term of -170, -175, -190, -221, -274, -355?
-f**3 + f**2 - f - 169
What is the y'th term of 4, -10, -40, -92, -172, -286, -440?
-y**3 - 2*y**2 - y + 8
What is the r'th term of -29, -81, -133, -185, -237?
-52*r + 23
What is the z'th term of -3, 9, 35, 81, 153, 257, 399, 585?
z**3 + z**2 + 2*z - 7
What is the y'th term of 12462, 12464, 12466, 12468?
2*y + 12460
What is the p'th term of 35, 67, 95, 119, 139, 155?
-2*p**2 + 38*p - 1
What is the r'th term of -332, -333, -336, -341, -348?
-r**2 + 2*r - 333
What is the k'th term of -68, -128, -188, -248, -308?
-60*k - 8
What is the u'th term of 53, 52, 51, 50, 49, 48?
-u + 54
What is the p'th term of -8, -7, -4, 1?
p**2 - 2*p - 7
What is the d'th term of 205, 206, 209, 214, 221, 230?
d**2 - 2*d + 206
What is the t'th term of -37, -40, -43, -46, -49, -52?
-3*t - 34
What is the s'th term of 33, 45, 57, 69?
12*s + 21
What is the f'th term of -92, -88, -96, -122, -172, -252, -368?
-f**3 + 11*f - 102
What is the i'th term of -314, -540, -766, -992, -1218, -1444?
-226*i - 88
What is the x'th term of 7, 43, 113, 223, 379, 587?
x**3 + 11*x**2 - 4*x - 1
What is the h'th term of 19, 34, 47, 58, 67, 74?
-h**2 + 18*h + 2
What is the h'th term of 24, 36, 74, 150, 276, 464?
2*h | {
"perplexity_score": 436.9,
"pile_set_name": "DM Mathematics"
} |
Hi there! Make sure to enter EU Webstore and crested account there. You can get there by selecting region in the right upper corner in the website. Then you will see it in the list. We are making it more clear now
Amazing! So happy to finally see this announcement; Congrats Eve Team and Community! My own concern though is on the Eve V screen to choose your configuration, I can’t seem to get past the first page to select my Keyboard and Accessories. I went to different browsers and tried it on mobile as well. I couldn’t seem to click on any configuration to make it go to the next page. Could you post screenshots of those pages?
One final note on this. I’m a huge fan of Eve the company and of the community and I certainly want Eve to succeed.
At $1599 USD, the V is also $400 USD cheaper than the Dell XPS 13" 2 in 1 yet has twice the amount ram. I look at the V’s pricing as not competitive but disruptive.
I hope Eve will secure backup suppliers for the screens that they are shipping from Sharp. If the V starts selling 100,000+ units then it will start to affect existing established players in a material way. The best thing to do in their position would be to crush EVE while it’s still a small player. Try to create the perception that Eve always runs into problems and is unreliable. It’s fairly easy for Microsoft, Dell, Asus, etc. to put pressure on Sharp by giving them an ultimatum to deal with us or Eve - “take your pick”.
While some might take this as conspiracy theory talk, all I can say is in the business world there is no such thing as ethics. If there is a threat to the bottom line then that threat must be dealt with swiftly.
It’s fairly easy for Microsoft, Dell, Asus, etc. to put pressure on Sharp by giving them an ultimatum to deal with us or Eve - “take your pick”.
It is illegal by law in various regions. Thats the reason why Intel was fined when they put a similar ultimatum to OEMs to prevent them from using AMD products.
Also the “big boss” at Microsoft doesn’t really care if its the Eve V or Surface Pro that sells, because at the end of the day, they are a software company, and all they really want is to sell Windows. Now, if the V has a Linux/Android variant and it sells reasonably well, then it might become a problem for them.
Don’t forget the EUR price does account for a smooth tax experience however. Us Canadians (and Australians and any others with a weaker currency!) have to pay for a ridiculous exchange (I paid 1.37CAD to 1USD), plus a 2.5% fee on my card for the privilege to Visa, plus extra shipping (compared to the US) and extra to cover tax. US do have different tax rules WRT incoming goods as well. If I wanted the V, I can’t do much about the tax and shipping and had to make my peace with the mentioned factors (it’ll be worth it!) | {
"perplexity_score": 445.5,
"pile_set_name": "Pile-CC"
} |
Prenatal multivitamin supplementation and rates of pediatric cancers: a meta-analysis.
Prenatal supplementation of folic acid has been shown to decrease the risk of several congenital malformations. Several studies have recently suggested a potential protective effect of folic acid on certain pediatric cancers. The protective role of prenatal multivitamins has not been elucidated. We conducted a systematic review and meta-analysis to assess the potential protective effect of prenatal multivitamins on several pediatric cancers. Medline, PubMed, EMBASE, Toxline, Healthstar, and Cochrane databases were searched for studies published in all languages from 1960 to July 2005 on multivitamin supplementation and pediatric cancers. References from all articles collected were reviewed for additional articles. Two blinded independent reviewers assessed the articles for inclusion and exclusion. Rates of cancers in women supplemented with multivitamins were compared with unsupplemented women using a random effects model. Sixty-one articles were identified in the initial search, of which, seven articles met the inclusion criteria. There was an apparent protective effect for leukemia (odds ratio (OR)=0.61, 95% confidence interval (CI)=0.50-0.74), pediatric brain tumors (OR=0.73, 95% CI=0.60-0.88) and neuroblastoma (OR=0.53, 95% CI=0.42-0.68). In conclusion, maternal ingestion of prenatal multivitamins is associated with a decreased risk for pediatric brain tumors, neuroblastoma, and leukemia. Presently, it is not known which constituent(s) among the multivitamins confer this protective effect. | {
"perplexity_score": 304.4,
"pile_set_name": "PubMed Abstracts"
} |
Sudden Fear
Sudden Fear Is a 1952 American film noir thriller directed by David Miller, and starring Joan Crawford and Jack Palance in a tale about a successful woman who marries a murderous man. The screenplay by Lenore J. Coffee and Robert Smith was based upon the novel of the same name by Edna Sherry.
Plot
Myra Hudson (Crawford) is a successful Broadway playwright who rejects Lester Blaine (Palance) as the lead in her new play. Later, she meets Lester on a train bound for San Francisco, is swept off her feet, and, after a brief courtship, marries him.
Lester learns that Myra is writing her will and plans to leave the bulk of her fortune to a foundation. He plots her murder in cahoots with Irene Neves (Gloria Grahame), an old girlfriend hiding in the wings.
Myra discovers their plans and concocts a diabolical scheme to kill Lester and place the blame on Irene, but the complex timing so she herself is provided with an alibi starts to unravel. Lester learns of Myra's intentions and chases her through the streets of San Francisco in his car while she is on foot. Myra is able to avoid him but Lester mistakes Irene for Myra (she has dressed to resemble her) and is about to run her down. Myra shouts to stop him but he realizes too late. He tries to avoid Irene but crashes, killing them both. Myra overhears the two pronounced dead and breathes a sigh of relief as she walks off safely into the night.
Cast
Joan Crawford as Myra Hudson
Jack Palance as Lester Blaine
Gloria Grahame as Irene Neves
Bruce Bennett as Steve Kearney
Virginia Huston as Ann Taylor
Mike Connors as Junior Kearney
Reception
Critical response
When the film was released, the film critic for The New York Times, A. H. Weiler, reviewed the film favorably, writing, "Joan Crawford should be credited with a truly professional performance in Sudden Fear ... The entire production has been mounted in excellent taste and, it must be pointed out, that San Francisco and Los Angeles, Bunker Hill area, in which most of the action takes place, is an excitingly photogenic area. David Miller, the director, has taken full advantage of the city's steep streets and panoramic views. And, in his climactic scenes in a darkened apartment and a chase through its precipitous dark alleys and backyards he has managed to project an authentically doom-filled atmosphere."
Otis L. Guernsey Jr., also wrote a positive review in the New York Herald Tribune. He wrote, "The scenario...is designed to allow Miss Crawford a wide range of quivering reactions to vicious events, as she passes through the stage of starry-eyed love, terrible disillusionment, fear, hatred, and finally hysteria. With her wide eyes and forceful bearing, she is the woman for the job."
More recently, Village Voice reviewer Melissa Anderson wrote that Sudden Fear "fits into and defies different genres, its convention-scrambling partly the result of the fact that the film looks both forward and back." Dennis Schwartz liked the film, but questioned some of the film's plot points, saying that "David Miller stylishly directs this disturbing psychological gargoyle thriller ... [Yet] ... the suspense is marred by plot devices that don't hold up to further scrutiny. Joan Crawford has a chance to act out on her hysteria after her happy marriage is unmasked as a charade, and does a fine job of trying to remain calm while knowing her hubby and girlfriend are planning to kill her ... The film is grandly topped off by Charles B. Lang Jr. and his remarkably glossy black-and-white photography."
Crawford received her third and final Oscar nomination for this film, the one and only time she competed against arch-rival Bette Davis for Best Actress, who was nominated (for the ninth time) for The Star. Neither actress won; Shirley Booth took home the prize for Come Back, Little Sheba.
Noir analysis
In 1984, film noir historian Spencer Selby noted, "Undoubtedly one of the most stylish and refined woman-in-distress noirs."
Accolades
Laurel Awards win
Golden Laurel: Best Dramatic Performance, Female: Joan Crawford
Academy Awards nominations
Best Actress: Joan Crawford
Best Supporting Actor: Jack Palance
Best Cinematography, Black-and-White: Charles Lang
Best Costume Design, Black-and-White: Sheila O'Brien
Golden Globe Awards nomination
Best Motion Picture Drama Actress: Joan Crawford
Home media
Sudden Fear was first released on VHS by Kino Video. Kino also released the film on Region 1 DVD in 2003. In 2006, the film was also released as part of Film Noir - The Dark Side of Hollywood DVD box set by Kino Video. in 2016, the fim was released on Blu Ray by Cohen Film Collection.
References
External links
Sudden Fear at Reel SF - Movie locations with "then and now" images
Category:1952 films
Category:1950s thriller films
Category:American thriller films
Category:American films
Category:American black-and-white films
Category:English-language films
Category:RKO Pictures films
Category:Film noir
Category:Films scored by Elmer Bernstein
Category:Films based on American novels
Category:Films based on thriller novels
Category:Films directed by David Miller
Category:Films set in San Francisco
Category:Films shot in New York City
Category:Films shot in San Francisco | {
"perplexity_score": 321.3,
"pile_set_name": "Wikipedia (en)"
} |
/*
* format - Haxe File Formats
*
* Copyright (c) 2008-2009, The Haxe Project Contributors
* All rights reserved.
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* - Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* - Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE HAXE PROJECT CONTRIBUTORS "AS IS" AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE HAXE PROJECT CONTRIBUTORS BE LIABLE FOR
* ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
* DAMAGE.
*/
package format.png;
enum Color {
ColGrey( alpha : Bool ) ; // 1|2|4|8|16 without alpha , 8|16 with alpha
ColTrue( alpha : Bool ); // 8|16
ColIndexed; // 1|2|4|8
}
typedef Header = {
var width : Int;
var height : Int;
var colbits : Int;
var color : Color;
var interlaced : Bool;
}
enum Chunk {
CEnd;
CHeader( h : Header );
CData( b : haxe.io.Bytes );
CPalette( b : haxe.io.Bytes );
CUnknown( id : String, data : haxe.io.Bytes );
}
typedef Data = List<Chunk>; | {
"perplexity_score": 1452.4,
"pile_set_name": "Github"
} |
Search
I despise doctors and dentists, and not just because I hate going for checkups and went to law school so am somewhat programmed to. I hate them because they order tests they don’t need, keep you waiting in their offices and then act like the crap that comes out of them is lavender and smells like a rose.
Take my ex-dentist, please. Just last month she tried to give me two root canals. Feeling suspicious, mostly because she didn’t bother to even look at my teeth before she told me I needed them, but also because of her Russian accent and the fact that she looked and sounded more like a hooker than a dentist.
Off I went to my old dentist that I trust (and looks like Tom Selleck) but is 200 miles away, only to have my suspicions confirmed. Not only did I not need the root canals, I didn’t even have cavities. All I can say about dentist #1 is: The Russian bitch lied.
Why do they lie and do unnecessary procedures? MONEY. One or two unnecessary fillings and a root canal adds up, that’s about $2000 extra in her pocket. I think these doctors / dentists should lose their licenses after just one of these incidents. A few of the really egregious cases have gone to prison.
So what to do? You have to learn to say no and get second opinions if it feels off to you. I had a strange feeling about my dentist/hooker and followed up on it with a dentist I’ve known for years. Had I not, I would be out a lot of money and who knows what from the treatment I didn’t need.
Bottom line? All anyone cares about these days is themselves and their bank account and most medical “professionals” have ordered tests and done treatments that aren’t necessary. Patient beware. | {
"perplexity_score": 420.3,
"pile_set_name": "Pile-CC"
} |
Q:
Python: Evaluating a board position using stockfish from the python-chess library
I am trying to create an engine but my evaluation function is terrible so I decided to use stockfish to evaluate it for me.
import chess
import chess.engine
def stockfish_evaluation(board, time_limit = 0.01):
engine = chess.engine.SimpleEngine.popen_uci("stockfish/stockfish_10_x64")
result = engine.play(board, chess.engine.Limit(time=time_limit))
return result.info["score"]
board = chess.Board("rnbqkbnr/pppppppp/8/8/8/8/PPPPPPPP/RNBQKBNR w KQkq - 0 1")
result = stockfish_evaluation(board)
print(result)
but it prints out:
KeyError: 'score'
A:
I think you are using the wrong function, it should be engine.analyse not engine.play
import chess
import chess.engine
def stockfish_evaluation(board, time_limit = 0.01):
engine = chess.engine.SimpleEngine.popen_uci("stockfish_10_x64")
result = engine.analyse(board, chess.engine.Limit(time=time_limit))
return result['score']
board = chess.Board("rnbqkbnr/pppppppp/8/8/8/8/PPPPPPPP/RNBQKBNR w KQkq - 0 1")
result = stockfish_evaluation(board)
print(result)
#+58 | {
"perplexity_score": 3332.7,
"pile_set_name": "StackExchange"
} |
The objective of this project is to provide an answer to a major question concerning the sarcoplasmic reticulum, namely what is the mechanism of calcium transport through the phospholipid bilayer. The role of protein through the membrane will be investigated in which multiple subunit aggregates of the Ca ion-activated ATPase mediate calcium transport. Protein aggregate formation will be determined by chemical crosslinking followed by analysis of crosslinked proteins by sodium dodecyl sulfate gel electrophoresis, and freeze-fracturing electron microscopy. These methods will be used to look for changes in the oligomeric state of membrane proteins as the Ca 2 ion-activated ATPase is interconverted between the different enzymatic states that accompany calcium accumulation. To determine the role of Calsequestrin and Calcium Binding Protein, possible interactions between these minor protein components and the Ca ion-activated ATPase in terminal cisternae-derived sarcoplasmic reticulum vesicles will be investigated. The calcium pumping activity of cardiac sarcoplasmic reticulum can be stimulated 3-fold by the action of a cAMP-dependent protein kinase. To determine whether this stimulation is mediated via protein-protein interactions, the relationship between the many proteins in cardiac sarcoplasmic reticulum and the Ca 2 ion-activated ATPase will be investigated as the extent of kinase-mediated phosphorylation is varied. In addition interactions between the protein phosphorylated by the kinase, Phospholamban, and the Ca 2 ion-activated ATPase will be looked for to determine the mechanism by which this phosphorylation can increase Ca 2 ion-activated ATPase activity. The goal of this project is to show whether ionic channels in membranes can be regulated by changes in monomer-oligomer equilibria of membrane proteins. | {
"perplexity_score": 213.2,
"pile_set_name": "NIH ExPorter"
} |
[Neonatal mortality and morbidity. Priorities in perinatal care (author's transl)].
Perinatal mortality rates have been decreasing from 25 to 15 0/00 at the Port-Royal maternity hospital from 1969 to 1978. The incidence of materno-foetal infection has been stable within the last 10 years, around 1.2% live-births; mortality linked with these infections represents 28% of early neonatal deaths and remains nearly as high as mortality from malformations. The incidence of Idiopathic Respiratory Distress Syndrome has been decreasing as low as 0.3% live births (14% between 28 and 34 weeks of gestation). The risk appears not high enough to justify the systematic use of prenatal glucocorticoids. Birth injury in the full term newborn occurs at a rate of 1 0/00 births in the most severe cases. In cases of moderate severity, the incidence has been decreasing from 1% to 1 0/00 births within the last 5 years, probably due to improved obstetrical care. | {
"perplexity_score": 228.6,
"pile_set_name": "PubMed Abstracts"
} |
Q:
Trouble passing multi-word argument from bash to expect
I have looked at some of the related questions and answers in here, but i'm still stumped :-(
I wish to pass a multi-word command from a bash script to an expect script. Inside the expect script, the multi-word command will be executed by a send statement.
So, the multi-word command is:
get dump perf 0
It is stored in the bash script in a variable called usrcmd.
The expect script is called like this:
./userspecifiedcmd.exp root $password $server $usrcmd
In the expect script, the multi-word command is extracted as follows:
set usercommand [lrange $argv 3 3]
And the multi-word command is executed as follows: send "$usercommand\r"
RESULTS...
The string actually sent by the send statement is: get
I have tried putting quotes around the $usrcmd variable when I launch the expect script, like this:
./userspecifiedcmd.exp root $password $server "$usrcmd"
When I do that, the string sent by the send statement is: {get dump perf 0}
My gut tells me there is a simple fix. Is my gut correct?
Thx!
A:
The expect script should be called like this:
./userspecifiedcmd.exp root "$password" "$server" "$usrcmd"
Always quote your shell variables unless you have a compelling to omit them.
In expect, map the args to variables like this:
lassign $argv user password server usercommand
The lrange command returns a list, and when you handle a list like a string, you get the {} artifacts. Be aware of your Tcl data types: handle lists as lists, strings as strings. When you have a list, use join to "convert" it into a string cleanly.
The Tcl manual pages are helpful: http://tcl.tk/man/tcl8.5/TclCmd/contents.htm
As is the Tcl tutorial: http://tcl.tk/man/tcl8.5/tutorial/tcltutorial.html | {
"perplexity_score": 1581.5,
"pile_set_name": "StackExchange"
} |
Q:
Is there a way to include an external Params block in a Rails Grape resource?
I'm using Ruby on Rails 4 and Grape.
I'd like my Grape Resources to take up a little space so that they are more readable by other developers.
In the last few days we have been integrating the Stripe API (as an example)
and in the params do section of the Resources there are code blocks like this:
desc 'Add bank account' do
headers API::V1::Defaults.xxxxxxx
success API::V1::Entities::xxxxxxx
end
params do
requires :external_account, type: Hash, allow_blank: false, desc: 'Bank account nested data' do
requires :bank_account, type: Hash, allow_blank: false, desc: 'Bank account nested data' do
requires :id, type: String, desc: 'Stripe token for bank account'
requires :account_holder_name, type: String, desc: 'Bank account holder name'
requires :account_holder_type, type: String, desc: 'Bank account holder type [individual or company]'
optional :bank_name, type: String, desc: 'Bank name'
requires :country, type: String, desc: 'Bank account country'
optional :currency, type: String, desc: 'Bank account currency'
requires :routing_number, type: String, desc: 'Bank account routing number'
requires :name, type: String, desc: 'Bank account holders name'
requires :status, type: String, desc: 'Bank account status'
requires :last4, type: Integer,
desc: 'Account holder ID number.'
end
requires :client_ip, type: String, desc: 'IP address of user for Stripe service agreement'
end
requires :email, type: String, desc: 'Users email'
requires :business_type, type: String, desc: 'Individual or Company'
requires :tos_acceptance, type: Hash, allow_blank: false, desc: 'Type of Service' do
requires :date, type: Integer, desc: 'ToS [date]'
requires :ip, type: String, desc: 'ToS [ip]'
end
optional :individual, type: Hash do
requires :first_name, type: String, desc: 'Individuals [first name]'
requires :last_name, type: String, desc: 'Individuals [last name]'
requires :ssn_last_4, type: String, desc: 'Individuals SSN number'
optional :dob, type: Hash do
requires :day, type: String, desc: 'Individuals date of birth [day]'
requires :month, type: String, desc: 'Individuals date of birth [month]'
requires :year, type: String, desc: 'Individuals date of birth [year]'
end
end
optional :company, type: Hash do
requires :name, type: String, desc: 'Company [first name]'
requires :email, type: String, desc: 'Company [email]'
requires :phone, type: String, desc: 'Company [phone]'
end
end
# ...
oauth2
post '/' do
# ...
end
How can I make that params block go to another file (for example inside a file in the helpers folder) and the params block can be included?
I tried to do this with include API::V1::Helpers::my_helper but I don't know how to insert the params block. Can someone help me, please?
A:
You might use shared params
module SharedParams
extend Grape::API::Helpers
params :pagination do
optional :page, type: Integer
optional :per_page, type: Integer
end
end
class API < Grape::API
helpers SharedParams
desc 'Get collection.'
params do
use :pagination
end
get do
# your logic here
end
end | {
"perplexity_score": 1835.9,
"pile_set_name": "StackExchange"
} |
1. Field of the Invention
The present invention relates to a lubricant heating system for use with an internal combustion engine.
2. Description of the Prior Art
It takes a warming-up time of several minutes for an internal combustion engine of an automobile or the like to have its lubricant temperature raised to a sufficient level for its normal operation after it has been started. Moreover, the unevaporated fuel, which may steal into the air-fuel mixture sucked into a combustion chamber during the operation of the engine, may flow down a piston through a clearance, which is formed between the facing ends of a piston ring, during the compression stroke of the piston until it steals into the lubricant below a crankcase. This tendency is increased when the internal combustion engine is run at a cold place or when an alcohol fuel is used. Moreover, the lubricant, which has been mixed with the fuel, has its viscosity lowered to invite a disadvantage that its lubricating performance is degraded. | {
"perplexity_score": 284.9,
"pile_set_name": "USPTO Backgrounds"
} |
In vitro pro-oxidant/antioxidant role of carvacrol, thymol and their mixture in the intestinal Caco-2 cell line.
The food industry needs to provide consumers with fresh and healthy products. In this context, food packaging plays an important role. Thus, certain essential oils are being incorporated into plastic polymers to confer better preservative properties. The oregano essential oil contains carvacrol and thymol, two important polyphenols. Considering their increasing use in active food packaging, the evaluation of their suitability and safety is of great interest. In the present work, a concentration-dependent increase in the antioxidant effects of carvacrol, thymol, and their mixture (10:1) was determined using DPPH and ABTS assays. In addition, the safety of these compounds was tested in vitro. Reactive oxygen species and glutathione levels were measured after exposing cells for 24 and 48 h to different concentrations of carvacrol, thymol and their mixture. The abilities of these compounds to protect against or revert the effects of H2O2 on cells were also studied. The results showed that oxidative stress plays a role in the damage induced by carvacrol and the mixture at high concentrations. However, at lower concentrations, both compounds and their mixture were shown, for the first time, to protect cells against the damage induced by the H2O2. | {
"perplexity_score": 287.1,
"pile_set_name": "PubMed Abstracts"
} |
Multiple familial seborrheic keratoses.
The early occurrence of seborrheic keratoses is described in 3 members of a family. The autosomal dominant transmission of seborrheic keratoses in this family provides further evidence for a genetic (polygenic) predisposition to seborrheic keratoses. | {
"perplexity_score": 57.1,
"pile_set_name": "PubMed Abstracts"
} |
Wafer level manufacturing processes are employed for example in manufacturing integrated circuits, image sensors, micro lens arrays, etc. Such parallel wafer level manufacturing uses a limited number of process steps to simultaneously obtain thousands of such devices, reducing their manufacturing cost. However, the fabrication and assembly of arrayed wafer level manufactured LCL devices remain as some of the most challenging process steps. Tailored approaches must be developed for each specific manufacturing process.
Electrically controllable (tunable), gradient index, liquid crystal lenses (TLCL's) are known in the art. As an example, see Applicant's international PCT patent application publication WO2009/153764 dated Dec. 23, 2009. Wafer-scale manufacturing of such TLCL's is known from Applicant's international PCT patent application publication WO2010/075627 dated Jul. 8, 2010.
Contamination of the liquid crystal material by resin material used to form reservoir walls is a problem during manufacturing. In the mentioned WO2010/075627, this problem is mitigated by the use of a pre-cured inner reservoir wall and an outer wall that is less cured, so as to allow for a good bond between substrates, while reducing the risk of liquid crystal contamination. | {
"perplexity_score": 491.8,
"pile_set_name": "USPTO Backgrounds"
} |
Q:
Breaking down an audio player into an MVC structure
Imagine an audio player that does 3 main things:
Manipulates and creates data (progress length, time conversion, volume calculation etc)
Listens to user interactions / inputs and triggers manipulation of data or visibility of gui components
Displays and updates gui components on screen.
Where in the MVC would you put which of the above?
I was thinking:
- First is part of the model
- Second the controller
- Third the view
However, im not entirely sure which is why im asking.
A:
Data manipulation and creation should be handled by the model.
The view would be the actual GUI, with all the controls such as play/pause/volume etc. Each control would have events associated with it, such as play_click, pause_click, volume_up etc.
The presenter would have event handlers for these view events. Whenever an event occurs, the associated handler would execute, causing changes in the model and/or view as required.
For example, if the model contains a volume property, and the view raises a volume_up event, the onVolume_up event handler in the presenter will execute, causing the volume property of the model to increment, and also update the view accordingly.
Note that the presenter does not depend on the view. So tomorrow you can change your entire GUI, and you wouldn't have to touch the presenter or the model.
You can set up all of this manually yourself, or use a framework like Knockoutjs. | {
"perplexity_score": 800.2,
"pile_set_name": "StackExchange"
} |
Marie-Soleil Blais
Marie-Soleil Blais (born 21 November 1988) is a Canadian professional racing cyclist, who currently rides for UCI Women's Continental Team .
References
External links
Category:1988 births
Category:Living people
Category:Canadian female cyclists
Category:Place of birth missing (living people) | {
"perplexity_score": 111.1,
"pile_set_name": "Wikipedia (en)"
} |
We help peopleremember their rituals,connect to their heritage,and build community.
Welcome,
I'm Kristin.
Born and raised in California, I hold two rich cultural heritages dear. I help ethnically blended couples and mixed race people create nourishing new rituals, drawing on time-honored wisdom.
I'm so glad you're here!
I’m a Japanese American and Jewish home cook with a passion for throwing epic dinner parties.
For most of my life, I felt like I didn’t belong, both with people who looked like me and people who didn’t. Over the years, I’ve carved out a place just for us- a place where mochi latkes and traditional Japanese tea ceremony on Shabbat is nourishing and totally a thing.
This mashup may not have looked “traditional” to our ancestors, but they will to our children and future generations. You don’t have to figure this out alone - let’s do it in community. | {
"perplexity_score": 320,
"pile_set_name": "Pile-CC"
} |
Phosphorylation of insulin receptor substrate-1 serine 307 correlates with JNK activity in atrophic skeletal muscle.
c-Jun NH(2)-terminal kinase (JNK) has been shown to negatively regulate insulin signaling through serine phosphorylation of residue 307 within the insulin receptor substrate-1 (IRS-1) in adipose and liver tissue. Using a rat hindlimb suspension model for muscle disuse atrophy, we found that JNK activity was significantly elevated in atrophic soleus muscle and that IRS-1 was phosphorylated on Ser(307) prior to the degradation of the IRS-1 protein. Moreover, we observed a corresponding reduction in Akt activity, providing biochemical evidence for the development of insulin resistance in atrophic skeletal muscle. | {
"perplexity_score": 452.6,
"pile_set_name": "PubMed Abstracts"
} |
ose -4 = -w + 2. Suppose 2*f - 4*h - w = 0, -4*f - 4*h = -0*f - 24. Sort -2, f, -1/3.
-2, -1/3, f
Let a(l) = -l - 2. Let u be a(0). Suppose -4*w + 1 + 7 = 0. Sort w, u, 3.
u, w, 3
Let x = 4.3 - 8. Sort -2/5, 4, x in increasing order.
x, -2/5, 4
Suppose -6*c - 6 + 18 = 0. Sort c, -4, 7.
-4, c, 7
Let b be (-6)/(-9) - 76/6. Let o = b - -27. Suppose o = 2*n + 3*n. Put -4, n, 4 in ascending order.
-4, n, 4
Let f be 0 + -2 - (-2 + 1). Let i = 8 + -6. Let l be (-2)/(-3) - 17/3. Sort l, i, f in decreasing order.
i, f, l
Suppose 2*t + 7 = 5. Put 3, -5, t, -6 in descending order.
3, t, -5, -6
Let m = -173 + 173. Put m, 5, -3 in ascending order.
-3, m, 5
Let z = -5 + 7. Let l = z + -6. Put 3, l, 1 in decreasing order.
3, 1, l
Suppose o = 3*d + 1, 5*o + d + 2*d - 5 = 0. Sort 7, 0.1, o, -0.4 in descending order.
7, o, 0.1, -0.4
Let j = 40.31 + -40. Let x = -0.01 + j. Let t = -2 + 3. Sort t, x, 2.
x, t, 2
Let s = 13 + -24. Let o = -14 - s. Sort o, 1, 2 in descending order.
2, 1, o
Suppose -2*d = d - 9. Sort d, -5, -1, 5 in increasing order.
-5, -1, d, 5
Let o = -0.14 + 0.54. Let b = 20 - 20.1. Put -6, b, o in ascending order.
-6, b, o
Let b(q) = -q**2 + 5*q + 3. Let p be b(6). Suppose 2*r + 9 + 11 = 4*h, -35 = -5*h + 5*r. Let k = p + h. Sort 5, k, -1.
-1, k, 5
Suppose -2 = -l + 1. Suppose -l*a - 25 = -4*z + 7, z - 21 = 4*a. Let i(m) = -m**2 - 3*m + 2. Let t be i(a). Sort 2, t, 3.
t, 2, 3
Suppose 2*d + 2*d - 20 = 0, -3*m - 5*d + 37 = 0. Put 5, 0, m in decreasing order.
5, m, 0
Suppose -3*g + 31 = 5*k, 6*g + 24 = 4*k + 8*g. Sort k, -29, 1.
-29, 1, k
Let v be 64/272*1/2. Let t be -1 + 0 + (-5)/(-7). Sort v, 0.1, t in decreasing order.
v, 0.1, t
Let a = -17 - -29. Suppose 0*o + 2*o - z = -7, -a = 4*z. Put 3, 1, o in descending order.
3, 1, o
Let b(j) = 6*j**2 + 2*j + 1. Let c be b(-1). Suppose 2*x - 4*x + 6 = -2*i, -2*x = 3*i - 11. Sort 3, c, i.
i, 3, c
Suppose -f - 20 = 4*f. Let r = 2 - 1. Let b = -2/45 + 4/9. Put b, r, f in decreasing order.
r, b, f
Suppose x + 0*b = 5*b + 10, -2*x + 4*b + 2 = 0. Suppose 3*w + q + 1 = 7*w, 5*w - 2*q - 5 = 0. Sort 2, w, x in decreasing order.
2, w, x
Let r = -3 - -8. Let w be r*5/((-50)/(-32)). Let l = -11 + w. Sort -0.2, 2, l in ascending order.
-0.2, 2, l
Let t = 0 + -5. Let j be 1 + 2*39/(-60). Sort -0.2, j, t in ascending order.
t, j, -0.2
Let v = 22.98 + -23. Sort -5, v, -1/11 in ascending order.
-5, -1/11, v
Suppose -4*q + 20 = 0, 0 = 4*w - 5*q + 9 - 0. Suppose 0 = t + w*j - 8, -3*t + 13 = -t + 5*j. Suppose -19 = 3*p - 4. Put p, t, -1 in descending order.
t, -1, p
Let r(b) = b**3 - 8*b**2 - 6*b - 12. Let o be r(9). Let d be (-26)/(-5) + (-3)/o. Put -5, d, -3 in decreasing order.
d, -3, -5
Let c = -31 + 30.8. Let m = 0.7 + -0.2. Sort 1/8, m, c in decreasing order.
m, 1/8, c
Let q(y) = -y**2 - 4*y + 2. Suppose 2*o + 2*p + 9 = -5, -2*o - 4 = -3*p. Let f be q(o). Suppose 100 = 17*j + 3*j. Sort j, 2, f in decreasing order.
j, 2, f
Let l be 1 + ((-4)/1 - 1). Sort -1, l, 2 in increasing order.
l, -1, 2
Let l(q) = -2*q - 3. Let v be l(-4). Let o(s) = -3*s**3 - s**2 - 2*s - 1. Let u be o(-1). Let c = -3 + u. Put c, v, 1 in decreasing order.
v, 1, c
Let n = 0.13 - 4.13. Put 2/11, -0.2, n in increasing order.
n, -0.2, 2/11
Let u = 11904889 - 15869214233/1333. Let t = u - 96/43. Let v = 43/93 + t. Put 5, v, -3 in descending order.
5, v, -3
Let r be (1/(-17))/(3/(-6)). Let i(h) = 3*h**3 + 2*h**2 - 1. Let q be i(-1). Let x = q - -7. Sort r, x, 0.4 in increasing order.
r, 0.4, x
Let g be ((-9)/(-24))/(126/(-1304)). Let c = -25/6 - g. Let s = -16 - -210/13. Put c, s, -0.3 in ascending order.
-0.3, c, s
Suppose 0*k = 3*a + 3*k, -2*k = 5*a - 15. Put a, -6, 1 in increasing order.
-6, 1, a
Let c(s) = 4*s. Let k be c(1). Suppose v = -4*v. Let o(j) = -j - 5. Let g be o(-8). Sort k, g, v in descending order.
k, g, v
Let t = -215/3 - -70. Put 2, 14, t in decreasing order.
14, 2, t
Suppose m - 5*m + 2*s - 2 = 0, -5*m + 5*s + 5 = 0. Let z be (0 + -6)/((-3)/m). Suppose 2*w = -p + 1, -2*w = -0*w + 4. Put z, 4, p in ascending order.
z, 4, p
Let f(z) = 2*z**3 + z**2. Let a be f(1). Suppose u - 8 = -a. Let t = -6 + 3. Sort u, -1, t in descending order.
u, -1, t
Suppose -50 = 5*r - 8*c + 5*c, 0 = r - c + 10. Let f be 14/70 - 48/r. Sort -3, f, 0.3 in increasing order.
-3, 0.3, f
Let k = -3.24 - -0.24. Sort -1/10, k, 1 in ascending order.
k, -1/10, 1
Let v(a) = a**3 + 46*a**2 - 51*a - 192. Let t be v(-47). Suppose -3*d - 20 = 4. Let s be d/(-3) - 1/(-3). Sort t, -5, s in ascending order.
-5, t, s
Suppose -20 - 16 = 4*q. Let n = q + 14. Let v(o) = o + 1. Let a be v(-4). Sort 2, n, a in descending order.
n, 2, a
Let p = 0.8 + 2.2. Let a be (-30)/(-9)*54/(-45). Put 0.5, p, a in decreasing order.
p, 0.5, a
Suppose -5*l - 11 = -31. Suppose 0 = 2*z - 6*z + 12. Suppose -15 = -5*o, -2*o = -2*k - 3*o - 1. Sort z, l, k in descending order.
l, z, k
Let v = 8 - 7.6. Put 4, -3, v in descending order.
4, v, -3
Suppose 0*w = 5*z - 5*w + 25, 22 = -5*z + 2*w. Let d = -0.12 + 6.12. Let y = 5.6 - d. Sort 0.1, y, z in decreasing order.
0.1, y, z
Let z = 5.7 - 10.7. Put -3, z, -6 in decreasing order.
-3, z, -6
Suppose -v - 36 = -5*v - 4*b, 4*v = -b + 30. Let g be (1 - -1)*1 - v. Let a(s) = s - 7. Let z be a(5). Sort z, -4, g in increasing order.
g, -4, z
Let r = 24 + -23. Let p = r + 0. Put p, 5, 2 in descending order.
5, 2, p
Let a = -6 - -4. Let t = 443/45 - 94/9. Sort a, 0.1, t in ascending order.
a, t, 0.1
Let m(t) = t**2 - 3*t - 6. Let v be m(-3). Sort v, -4, -2 in descending order.
v, -2, -4
Let l = 58.5 + -59. Sort -1/16, l, -2/5.
l, -2/5, -1/16
Suppose 0 = -2*n + r - 5, -5*r + 27 - 2 = 5*n. Sort 5, n, -3 in descending order.
5, n, -3
Let b(i) = i**3 - 9*i**2 + 4. Let q be b(9). Put 1, -3, 5, q in decreasing order.
5, q, 1, -3
Suppose r - 2*a = -38, -2*a = -4*r + 8*r + 102. Let z = r - -31. Sort z, 4, 6.
z, 4, 6
Let d = -11.3 - -12. Let a = d + -0.7. Put 5, -0.4, a in descending order.
5, a, -0.4
Let v be -2 - ((-2 - -1) + -5). Suppose q + v = -2. Let c = 8 + q. Sort c, -2/9, -0.3 in increasing order.
-0.3, -2/9, c
Let r be (-31)/8 + 1 + 3. Let q = -7.1 - -7. Let t = 0.3 + -0.2. Sort r, q, t in ascending order.
q, t, r
Let x = 66 - 65. Let l(w) = 3*w**3 - 2*w + 1. Let u be l(1). Put u, 0, x in ascending order.
0, x, u
Let v = 207 - 212. Sort 45, -2, v, -4 in decreasing order.
45, -2, -4, v
Suppose -4*i = -4*g, -2*i = 1 + 1. Let d = 1.33 + -1.4. Let p = 0.13 - d. Put p, g, 2/7 in ascending order.
g, p, 2/7
Suppose m = 2*m - 4. Let o be (0/1)/3 - m. Sort o, 5, 1 in descending order.
5, 1, o
Let c be 1/((4/6)/(-2)). Let o(f) = f**2 + 8*f + 2. Let v be o(-8). Let n be 11/v + 2/(-4). Sort c, n, -4 in increasing order.
-4, c, n
Let k(q) = -5*q - 5 + 0*q**2 + 5*q**2 + 0*q - 6*q**2. Let j be k(-4). Put -3, -1/3, j in descending order.
-1/3, j, -3
Suppose w - 2 = -6. Let y be 2/8 - 2/w. Sort 3, y, -4/9 in descending order.
3, y, -4/9
Let k be (1 - 1)/((-8)/(-4)). Let b be (k - -1)/(6/24). Put 1/3, 1, b in ascending order.
1/3, 1, b
Suppose v - t = -4*v - 23, -12 = 2*v + t. Put 1, 13, v in increasing order.
v, 1, 13
Let q be ((-1)/(-18))/((-2)/4). Let n be 46 - 47 - (-5)/1. Sort -2, n, q in descending order.
n, q, -2
Let c = -88 + 80.8. Let l = -7 - c. Sort 3/2, -3, l in increasing order.
-3, l, 3/2
Let y be ((-48)/21 - -2)*-7. Sort -5, y, -4 in increasing order.
-5, -4, y
Let j = -4 + 7. Sort -2/33, j, 1.
-2/33, 1, j
Let c = 1 + -1. Suppose c = -2*y + 6*y. Put -2, y, -0.1 in descending order.
y, -0.1, -2
Let h = 21 + -20. Put h, 2, -3 in decreasing order.
2, h, -3
Let u = -31 - -31.23. Let c = u - 0.13. Sort 6, -4, c in descending order.
6, c, -4
Let u(a) = -2*a + 2. Let o be u(-8). Let l be (o/(-12))/(6/(-8)). Put -1, 1, l in decreasing order.
l, 1, -1
Let q be (-1 - 0)/(7/14). Sort -12, 3, q in decreasing order.
3, q, -12
Let a(x) = x**3 + x**2 + 1. Suppose 4 = 2*f - 4*f. Let d be a(f). Sort d, 5, 2 in increasing order.
d, 2, 5
Suppose 3*v + 7 = -z + 3*z, 0 = 5*z + 2*v - 8. Suppose -4 = 2*u + 2. Sort z, -4, u in decreasing order.
z, u, -4
Let g(p) = p**2 + 7*p + 6 - 2 - 3. Let t be g(-7). Put 4, 0, t in decreasing order.
4, t, 0
Suppose -3*d = d. Let m(f) = 2*f**3 - 4*f**2 + 2*f. Let q be m(2). Put q, -4, d in ascending order.
-4, d, q
Let k = 33 - 37. Put k, 0.3, 5 in | {
"perplexity_score": 1077.5,
"pile_set_name": "DM Mathematics"
} |
Rotherham
Rotherham () is a minster town in South Yorkshire, England, which together with its conurbation and outlying settlements to the north, south and south-east forms the Metropolitan Borough of Rotherham, with a recorded population of 257,280 in the 2011 census. Historically in the West Riding of Yorkshire, its central area is on the banks of the River Don below its confluence with the Rother on the traditional road between Sheffield and Doncaster. Rotherham was well known as a coal mining town as well as a major contributor to the steel industry. Traditional industries included glass making and flour milling.
History
Early history
Iron Age and Roman settlements dot the area covered by the district, including a small Roman fort to the south-west in the upper flood meadow of the Don at Templeborough. Rotherham was founded in the very early Middle Ages. Its name is from Old English hām 'homestead, estate', meaning 'homestead on the Rother'. The river name was carried into Old English from Brittonic branch of Celtic words: ro- 'over, chief' and duβr 'water', thus 'main river'; a similar size namesake is in East Sussex, see Rother. It established itself as a Saxon market town, on a Roman road near a forded part of the River Don.
By the late Saxon period, Rotherham was at the centre of a large parish on the Don's banks.
Following the Norman Conquest an absentee lord held the most inhabited manor, Nigel Fossard (however today's city proper takes in eight outyling Domesday estates). The Domesday 'Book' or Survey records this lord of the manor with a Norman name took the place of the Saxon lord Hakon holding 20 years before in 1066 and was tenant of an overlord of hundreds of such manors, Robert de Mortain, the Conqueror's half-brother. The central assets at the time were medium in rank among manors: eight adult male householders were counted as villagers, three were smallholders and one the priest, three ploughlands were tilled by one lord's plough team and two and a half men's plough teams were active. The manor's other resources were a church, four loosely called 'acres' of meadow, and seven of woodland. Rotherham had a mill valued at an ordinary half of one pound sterling.
His successors, the De Vesci family, rarely visited the town and did not build a castle but maintained a Friday market and a fair. In the mid 13th century, John de Vesci and Ralph de Tili gave all their possessions in Rotherham to Rufford Abbey, a period of growing wealth in the church. The monks collected tithes from the town and gained rights to an extra market day on Monday and to extend the annual fair from two to three days.
The townsmen of Rotherham formed the "Greaves of Our Lady's Light", an organisation which worked with the town's three guilds. It was suppressed in 1547 but revived in 1584 as the feoffees of the common lands of Rotherham, and remains in existence.
In the 1480s the Rotherham-born Archbishop of York, Thomas Rotherham, instigated the building of a College of Jesus or Jesus College, Rotherham to rival the colleges of Cambridge and Oxford. It was the first brick building in what is now South Yorkshire and taught theology, religious chant and hymns, grammar and writing.
The College and new parish church of All Saints made Rotherham an enviable and modern town at the turn of the 16th century. The college was dissolved in 1547 in the reign of Edward VI, its assets stripped for the crown to grant to its supporters. Very little remains of the original building in College Street. Walls of part of the College of Jesus are encased within number 23 and Nos 2, 2A, 4 (later for a time Old College Inn, a beerhouse), 6 and 8 Effingham Street. A doorway was rescued from the demolition and relocated to nearby Boston Park in 1879. Fragments of walls are the earliest surviving brick structure in South Yorkshire and are remains of the key institution to Rotherham's growth into a town of regional significance. Sixty years after the College's dissolution Rotherham was described by a wealthy visitor as falling from a fashionable college town to having admitted gambling and vice. The history of Thomas Rotherham and education in the town are remembered in the name of Thomas Rotherham College.
Industrial Revolution
The region had been exploited for iron since Roman times, but it was coal that first brought the Industrial Revolution to Rotherham. Exploitation of the coal seams was the driving force behind the improvements to navigation on the River Don, which eventually formed the Sheffield and South Yorkshire Navigation system of navigable inland waterways.
In the early Industrial Revolution major uses of iron demanded good local ore and established processing skills for iron strength, qualities found in Rotherham's smelting plants and foundries. Iron, and later steel, became the principal industry in Rotherham, surviving into the 20th century. The Walker family built an iron and steel empire in the 18th century, their foundries producing high quality cannon, including some for the ship of the line HMS Victory, and cast iron bridges, one of which was commissioned by Thomas Paine.
Rotherham's cast iron industry expanded rapidly in the early 19th century, the Effingham Ironworks, later Yates, Haywood & Co, opened in 1820. Other major iron founders included William Corbitt and Co; George Wright and Co of Burton Weir; Owen and Co of Wheathill Foundry; Morgan Macauley and Waide of the Baths Foundry; the Masbro’ Stove Grate Co belonging to Messrs. Perrot, W. H. Micklethwait and John and Richard Corker of the Ferham Works. G & WG Gummer Ltd exported brass products across the world, supplying fittings for hotels, hospitals, Turkish baths and the RMS Mauretania. Their fittings could also be found on five battleships used in World War II and HMS Ark Royal.
The Parkgate Ironworks was established in 1823 by Sanderson and Watson, and changed ownership several times. In 1854, Samuel Beal & Co produced wrought iron plates for Isambard Kingdom Brunel's famous steamship the SS Great Eastern. In 1864, the ironworks was taken over by the Parkgate Iron Co. Ltd, becoming the Park Gate Iron and Steel Company in 1888. The company was purchased by Tube Investments Ltd in 1956 and closed in 1974. Steel, Peech and Tozer's massive Templeborough steelworks (now the Magna Science Adventure Centre) was, at its peak, over a mile (1.6 km) long, employing 10,000 workers, and housing six electric arc furnaces producing 1.8 million tonnes of steel a year. The operation closed down in 1993.
The first railway stations, Holmes and Rotherham Westgate both on the Sheffield and Rotherham Railway opened on 31 October 1838. Holmes station was located close to the works of Isaac Dodds and Son, pioneers in the development of railway technology. Later railway stations included Parkgate and Aldwarke railway station on the Manchester, Sheffield and Lincolnshire Railway, which opened in July 1873, the Parkgate and Rawmarsh railway station on the North Midland Railway and the Rotherham Masborough railway station also on the North Midland Railway.
Rotherham Forge and Rolling Mill occupied an island in the river known as Forge Island. It's managing director was Francis Charles Moss of Wickersley before his death in 1942. The site was later occupied by a Tesco superstore and is set to be the location for a new leisure development with a proposed cinema, food and drink outlets and a hotel.
Joseph Foljambe established a factory to produce his Rotherham plough, the first commercially successful iron plough.
A glass works was set up in Rotherham in 1751, and became Beatson Clark & Co, one of the town's largest manufacturers, exporting glass medicine bottles worldwide. Beatson Clark & Co was a family business until 1961, when it became a public company. The glass works operated on the same site, although the family connection ceased and the company is owned by Newship Ltd, a holding company linked to the industrialist John Watson Newman. It continues to the manufacture glass containers for the pharmaceutical, food and drinks industries. In the 19th century, other successful industries included pottery, brass making and the manufacture of cast iron fireplaces. Precision manufacturing companies in the town include AESSEAL, Nikken Kosakusho Europe, MTL Advanced, MGB Plastics and Macalloy. Rotherham is the location of the Advanced Manufacturing Park (AMP), which is home to a number of world-class companies including Rolls-Royce and McLaren Automotive.
Milling grain into flour was a traditional industry in Rotherham, formerly in the Millmoor area, hence Rotherham United F.C.'s nickname "The Millers". Flour milling continued at the Rank Hovis town mill site on Canklow Road until September 2008. The site of the mill is a warehousing and distribution facility for Premier Foods.
Enterprise Zone 1983
In 1983 Rotherham became a designated Enterprise Zone with benefits and incentives given to attract new industry and development in the area. Within the first year ten new companies were established within the zone. The former chemical works at Barbot Hall, which had been empty and derelict, was developed into a new industrial estate and named 'Brookside', after Mangham Brook, running alongside it .
Floods of 2007
Rotherham was affected by flooding in the summer of 2007, which caused the closure of central roads, schools, transport services and damaged residential and commercial property, including the Parkgate Shopping complex and the Meadowhall Centre, which suffered considerable internal water damage. Ulley Reservoir caused major concern and forced the evacuation of thousands of homes when its dam showed signs of structural damage, threatening to break and release water into the suburbs of Treeton, Brinsworth and Canklow as well as potentially flooding the Junction 33 electrical sub-station. Rother FM evacuated its studios, passing its frequency temporarily to neighbouring station Trax FM. A stretch of the M1 motorway was closed for three days owing to the flood risk in the event of a breach of the reservoir. Fire service and police officers used thirteen high-powered pumps to lower the water level in the reservoir and reduce pressure on the dam wall, which was damaged but held. By summer 2008, the reservoir and surrounding country park reopened.
A new wetland and flood storage area, Centenary Riverside park, has since been built by Rotherham Council and the Environment Agency to prevent flooding in the future. The Wildlife Trust for Sheffield and Rotherham manages the site as a local nature reserve. The site is home to the massive sculpture Steel Henge, a Stonehenge replica which is in fact made from iron ingots.
Child sexual exploitation scandal
Following a 2012 article published in The Times alleging the cover-up of organised, large-scale sexual abuse of young children by gangs of people of Pakistani origin in Rotherham, Rotherham Council commissioned Professor Alexis Jay, a former chief social work adviser to the Scottish government, to lead an independent inquiry about the handling of the cases and a suspected child exploitation network. She issued an exploitation report stretching beyond police-level investigated cases. Her report of August 2014 revealed an unprecedented scale of reported child sexual abuse within an urban area of this size over a 16-year period. Subsequently, Eric Pickles, the Secretary of State for Communities and Local Government, commissioned Louise Casey to conduct a Best Value investigation of Rotherham Council. She issued a report of her findings in February 2015.
Both reports stated that a majority of the known perpetrators were of Pakistani heritage, and reported a denial of severity which was to a large extent the responsibility of Councillors. Casey's report concluded that at the time of her inspection the Council was not fit for the purpose, and identified some necessary measures for preventing further repetition. On 4 February 2015, after receiving Casey's report, Pickles said that commissioners would be appointed to run the council pending new elections, and the council leader and cabinet resigned en masse to allow for a 'fresh start'. The National Crime Agency was called in to investigate whether Rotherham councillors were complicit in hiding the depth and scale of the child abuse (the figure of 1,400 children is now said to be conservative) due to a "fear of losing their jobs and pensions" following a concern that they might be considered "racist" if they spoke out. Also, according to the new report, the councillors were driven by "misplaced political correctness".
Jayne Senior, a former youth town worker, was reported to have worked for more than a decade to expose rampant child sexual abuse in Rotherham, but she was met with "indifference and scorn". Senior was awarded an MBE in the 2016 Birthday Honours.
Education
Rotherham has three further education institutions and colleges. These are Thomas Rotherham College, Dearne Valley College and the Rotherham College of Arts and Technology. The Rotherham College of Arts and Technology has a campus in the Rotherham town centre and a second site in Dinnington, as well as a nearby, smaller campus for the construction-based subjects taught, such as bricklaying.
Governance
Local governance
The Labour Party, who have controlled the authority since its 1974 incorporation currently hold 74% of local government seats. Rotherham's shadow cabinet local opposition is currently UKIP with 20% of the seats, no longer the Conservative Party who went from 8% to 4% of seats in 2014, Independents account for 2% of seats and having had elections by thirds every other year. The method of election is changing to whole council elections every four years, from 2016.
In 2013, Professor Alexis Jay published a report about the Rotherham child sexual exploitation scandal (1997–2013). Following the report's publication, the council leader, Roger Stone of the Labour Party, resigned - an act of contrition the report said should have been made years earlier - saying he would take full responsibility for "the historic failings described so clearly in the report." Labour Councillors Gwendoline Russell, Shaukat Ali and former council leader Roger Stone were suspended from the Labour Party, as was former Deputy Council Leader Jahangir Akhtar, who had lost his council seat in 2014. Chief Executive, Martin Kimber, said no council officers would face disciplinary action. Kimber announced on 8 September that he intended to step down in December 2014, and offered his "sincere apology to those who were let down". The council's director of children's services, Joyce Thacker, also left the authority by mutual agreement. Malcolm Newsam was appointed as Children's Social Care Commissioner in October 2014, and subsequently Ian Thomas was appointed as interim director of children's services.
Shaun Wright, the Police and Crime Commissioner (PCC) for South Yorkshire from 2012, was the Labour councillor in charge of child safety at the council for five years from 2005-10. He initially refused demands to resign as PCC from the Home Secretary, Theresa May, as well as members of his own party and local Labour MP Sarah Champion, saying: "I believe I am the most appropriate person to hold this office at this current time." He resigned from the Labour Party on 27 August 2014, after an ultimatum by the party to either resign or face suspension from the party. Wright stood down as PCC on 16 September, saying that the prominence given to his role distracted from "the important issue, which should be everybody's focus - the 1,400 victims outlined in the report - and in providing support to victims and bringing to justice the criminals responsible for the atrocious crimes committed against them."
The former Chief Constable, Meredydd Hughes, who served from 2004 to 2011 and who had unsuccessfully stood for the Labour Party nomination in the Police Crime Commissioner elections, was told by Labour MP Keith Vaz that he had 'failed' abuse victims.
The inspector, Louise Casey aided by seven assistant inspectors produced the Inspection Report on 4 February 2015. Following its conclusion that the Council was not fit for purpose the minister directed that the powers of the Council (RMBC) be transferred to his department and the cabinet would need to resign unless RMBC made sufficient representations within 14 days to contradict the report. The Secretary of State empowered a team of five Commissioners to replace councillors before a full election in 2016 and on the Report's strength, stated that as the authority was not currently fit for purpose its powers would not revert until the dis-empowered councillors could prove their fitness to carry out all of the Council's duties without intervention. One of these commissioners was appointed to specialise in child protection.
Representation in the national legislature
Like all of South Yorkshire the area consists of representatives of the Labour Party at the Parliamentary level whose seats have been almost universally cast among analysts as 'safe', that is having enjoyed 'substantial' majorities over a 'long' period of time; a typecast which heightens the incumbency factor present in first past the post elections. The town's seat, including all its near suburbs, has been held by Labour MPs since a by-election in 1933. After the resignation and jailing of Denis MacShane in November 2012 due to expenses abuse, this area required a by-election in 2012 and Sarah Champion for Labour became the MP at that by-election.
Geography
The town in great part occupies the slopes of two hills; that in the west is the start of a north-west crest topped by Keppel's Column, that in the east is a narrower crest alongside the Rother known as Canklow Hill, topped by a protected formally laid out public area, Boston Park, less than 500 east of and 80 metres above the Rother. The Rother here is between 32 and 34 metres above sea level. The south scarp here is slightly higher still, the Canklow Hill Earthworks, a Scheduled Ancient Monument, one of relatively few in the borough, as pre-dating recorded history. This compares to 524 listed buildings and structures by English Heritage in the district. Samuel Lewis describing the town with its townships as having nearly 14,000 people in 1848, described the southern green slope by saying the town lies "partly on the acclivities of an eminence...great improvements have been made within the last twenty years; in the immediate neighbourhood, several substantial and respectable dwellings have been recently built".
Rotherham's commercial town centre occupies the valley in between these hills on the navigable part of the River Don flowing from the south-west after it has turned approximately due north. The town centre is less than below and north of the confluence of the Rother flowing from the south. The Mid Don Valley continues adjoining towns in the north of the Metropolitan Borough.
Beyond the town centre and away from the Don Valley, the Rotherham district is largely rural, containing a mixture of retired people, larger properties, some farming and tourism and the landscaped Wentworth Woodhouse estate, where the last surviving kiln of the Rockingham Pottery can be seen.
Aside from two regular roads and two bypasses (one being the motorway network), Sheffield is connected directly by the Trans Pennine Trail which passes the Meadowhall shopping centre on both sides (which between the two places) as it includes Sheffield as southern detour.
Rotherham Central station has frequent trains connecting to Sheffield in a time of 14 minutes; Manchester through a change in Sheffield is accessible in a similar circa 70 minutes to nearer Leeds and York as many towns and suburbs in South Yorkshire and West Yorkshire are all stops on Rotherham's railway – it is Doncaster which has the East Coast Main Line providing express intercity services.
Districts and suburbs of Rotherham include.
Kimberworth
Town Centre
East Dene
Masbrough
Bradgate
Canklow
Deepdale
Clifton
Herringthorpe
Brinsworth
Catcliffe
Waverley
Dalton
Dalton Magna
Listerdale
Wingfield
Keppel
Greasbrough
Eastwood
Wickersley
Bramley
Whiston
Parkgate
Aldwarke
Rawmarsh
Maltby
Templeborough
Green belt
Rotherham is within a green belt region that extends into the wider surrounding counties, and is in place to reduce urban sprawl, prevent the towns in the Sheffield built-up area conurbation from further convergence, protect the identity of outlying communities, encourage brownfield reuse, and preserve nearby countryside. This is achieved by restricting inappropriate development within the designated areas, and imposing stricter conditions on permitted building.
The green belt was first adopted in 1979, and the size in the borough in 2017 amounted to some , covering 72% of the overall borough. The green belt surrounds the Rotherham urban area, with larger outlying towns and villages within the borough such as Treeton, Swallownest and Thurcroft also exempted. However, smaller villages, hamlets and rural areas such as Morthen, Ulley, Guilthwaite, Hooton Roberts and Old Ravenfield are 'washed over', so minimising unsuitable development in these.
A subsidiary aim of the green belt is to encourage recreation and leisure interests, with rural landscape features, greenfield areas and facilities including the Wentworth Woodhouse estate and temple, River Rother, northern portions of the River Don and Hooton Brook, Pinch Mill Brook, several golf courses, Ulley reservoir, Herringthorpe allotments, Rotherham Roundwalk and Sheffield Country Walk/Trans-Pennine trails, Thurcroft Hall, and Valley Park.
Demography
In 2011, Rotherham had a population of 109,691, this figure is for an urban subdivision and roughly corresponds with ward and output area boundaries. The population in 2001 was 117,262 but the figure includes Catcliffe which was a separate subdivision a decade later, so there may not have been an actual decrease in population.
The population of Rotherham is increasing slightly because 110,550 people lived in the town in 2014.
In 2011, 14.4% of Rotherham's population were non-white British compared with 8.1% for the surrounding borough. Rotherham town has over double the percentage of Asian people compared with the Metropolitan Borough of Rotherham and a slightly larger percentage of black people. Rotherham is about as ethnically diverse as Middlesbrough and Doncaster and in 2001, 93.0% of Rotherham's residents were White British.
Landmarks
Rotherham Minster or All Saints' Church in All Saints Square built largely of neat-cut pieces of sandstone and low-pitch lead roofs dates from the 15th century and includes parts from earlier Saxon and Norman structures. Clayton and Bell working to George Gilbert Scott's designs constructed the east window. Stained glass makers and designers A. Gibbs, Camm Brothers, Heaton, Butler and Bayne and James Bell are known makers of the other windows. Gargoyles flank its clock on each face. It has a "recessed octagonal spire with crocketed arrises and pinnacled shafts rising from corner faces and a gilded weathervane." Architectural critics Pevsner and Simon Jenkins considered it "the best perpendicular [style] church in the country" and "the best work in the county", respectively. It is a listed building in the highest category of architecture, Grade I.
Close to the town centre is the 15th-century Chapel of Our Lady of Rotherham Bridge (or "Chapel on the Bridge"), beside Chantry Bridge (a road bridge opened in the 1930s). It is one of four surviving bridge chapels in the country. The chapel was restored in 1923, having been used as the town jail and a tobacconist's shop.
Built in the 18th century, Clifton House houses Clifton Park Museum. The remains of the 16th-century College of Jesus are in the town centre. Boston Castle, in the grounds of Boston Park, was built as a hunting lodge by Thomas Howard, 3rd Earl of Effingham between 1773 and 1774 to mark his opposition to British attempts to crush the Americans in their war for independence. It is named after Boston, Massachusetts, the scene of the Boston Tea Party.
On the outskirts of Rotherham, a brick-built glass making furnace, the Catcliffe Glass Cone, is the oldest surviving structure of its type in Western Europe and one of four remaining in the United Kingdom – the others being the Red House Cone in the Wordsley centre of the Dudley Glassworks in the West Midlands, Lemington Glass Works west of Newcastle upon Tyne and Alloa in Scotland. Threatened with demolition in the 1960s, it has been preserved as a Scheduled Ancient Monument and stands as a focal point in a sheltered housing complex and close to the path leading up the Rother valley.
South of Maltby in the east of the district, half-way to Worksop are the ruins of Roche Abbey, among the small minority in the United Kingdom bearing multi-storey walls, as most others are no more than foundations or a single storey of ruins following the Dissolution of the Monasteries in the 1530s.
Culture and attractions
Museums
The Magna Science Adventure Centre, an interactive science and adventure centre built in a former steel works in Templeborough, has become one of the most popular tourist destinations in the region.
Clifton Park Museum medium-sized museum in Clifton Park. Admission is free.
Entertainment
The Civic Theatre and an Arts Centre is in the town centre.
The Westgate district of the town centre is home to many pubs, bars and clubs and is the focal point of Rotherham's nightlife. .
In 2015, The former Tesco forge island superstore became a car park and temporary Bus Station since the store moved to a new home in the town centre as the Extra store.
Events
Rotherham holds several public events through the year:- A fashion show Rotherham Rocks in July, takes place in 'All Saints Square' and Rotherham by the Sea, in August, is held in Clifton Park, which is transformed into a seaside beach with sand, deckchairs and other traditional seaside attractions. Rotherham Show is an annual event, held in Clifton Park, with stalls from all sectors of the community, shows and live bands in September.
In 2016 Rotherham's first carnival took place. The People's Parade which included over 400 people including costumes from Rampage, Luton - Batala a 50 piece Brazilian samba band and hundreds of local people, schools and community groups. The parade lead to a festival in the park with flags, decor 'Eh Up Rotherham' sign, rides, stalls Djs and bands, workshops and activities.
Parks
Clifton Park, in the town centre, includes sport facilities, an outdoor paddling pool, a small fairground and an adventure park.
Minster Gardens is an urban park in the heart of the town centre, next to Rotherham Minster and All Saints Square. It has an amphitheatre and space for open-air events, with stepped seating, lawns, grass terracing and a meadow area.
Music
Rotherham has several Brass band clubs. It has also produced many classic and progressive rock bands, supported by the Classic Rock Society, such as Deadline, Saxon, Jive Bunny, Bring Me the Horizon, Phuturistix, Disarm and Soul Seekerz.
Shopping
Rotherham town centre has various chain stores including Tesco Extra. Following the availability of "Vitality Grants" from 2009 onwards, a number of new independent businesses opened in the town centre such as Yella Brick Road. In 2015, Rotherham won the Great British High Street award for its independent town centre shopping. Judges praised the transformation of key properties and the restoration of its "historic core". A plaque commemorating the award was unveiled by Secretary of State for Local Government & Committees Sajid Javid MP in September 2016.
In film, art and literature
In film
Chef-writer Jamie Oliver's television series Jamie's Ministry of Food (2008) was based in Rotherham. He aimed to make Rotherham "the culinary capital of the United Kingdom" by his 'Pass it on' scheme, teaching groups some of which went on to work in restaurants.
The Arctic Monkeys' song "Fake Tales of San Francisco" has a tribute line: "Yeah I'd love to tell you all my problem. You're not from New York City, you're from Rotherham".
The 2013 film Five Pillars was largely set and filmed in Rotherham, which is also the hometown of the writer and director.
Sport
The town's association football team, Rotherham United plays in League One, the third tier of English Football. The team currently plays at the New York Stadium. Historically the town was represented by Rotherham Town, and Rotherham County, who both played in the Football League.
Rotherham Titans rugby union team reached the Guinness Premiership in 1999 and 2003 before being relegated. The club plays at the Clifton Lane Sports Ground. The town is also represented in rugby league by the Rotherham Giants of the Rugby League Conference.
Former Formula One team Virgin Racing were based in Dinnington in the borough.
IndyCar and former ChampCar and Formula One driver Justin Wilson was from Woodall, which is in the Metropolitan Borough of Rotherham. Motorcycle speedway racing was staged in the town about 1930.
Hurdler Chris Rawlinson, Olympic gold medallist sailor Paul Goodison, Olympic silver medallist Peter Elliott, former England goalkeeper David Seaman, golfer Danny Willett and 2010 FIFA World Cup Final referee Howard Webb are all from Rotherham.
Three greyhound racing tracks existed in or around the town. They were Rotherham Greyhound Stadium (1933-1974); around Millmoor (1930-1933) and in Hellaby. The racing was independent (not affiliated to the sports governing body the National Greyhound Racing Club) and all three tracks were known as flapping tracks, which was the nickname given to independent tracks.
Freedom of the borough
On Monday 3 August 2009 Rotherham became the first town to bestow the Freedom of the Borough on the Yorkshire Regiment, giving it the right to march through the town with "flags flying, bands playing and bayonets fixed". At a ceremony outside the Town Hall, the Regiment paraded two Guards of soldiers who had recently returned from Iraq and the Colours of the 3rd Battalion Yorkshire Regiment (Duke of Wellington's), led by the Kings Division Band, under the command of Lieutenant Colonel Vallings, the battalion commanding officer. The Mayor of Rotherham, Councillor Shaukat Ali, on behalf of the borough, presented the Freedom Scroll to Colonel Simon Newton, who accepted the honour for the regiment. The regiment is the only military unit to become Honorary Freemen of the Borough.
Notable people
Rotherham is the hometown of the Chuckle Brothers, Arsenal and England goalkeeper David Seaman, along with World Cup and English Premier League referee Howard Webb. Sean Bean began his acting career in Rotherham while actors Liz White, Ryan Sampson, Dean Andrews and Darrell D'Silva also hail from Rotherham, as does former leader of the Conservative Party, William Hague, and Sir Donald Coleman Bailey. Presenter James May grew up in Rotherham. His co-presenter on Top Gear Jeremy Clarkson trained to be a journalist at the Rotherham Advertiser.
Comedians Sandy Powell and Duggie Brown were born in Rotherham, as was actress Lynne Perrie. Christopher Wolstenholme of Muse, Dean Andrews of Life On Mars, artist Margaret Clarkson, band Jive Bunny & The Mastermixers and singer-actor Rob McVeigh were all born or mostly raised in Rotherham.
Twin towns
Rotherham's official twin towns are:
Saint-Quentin, Aisne, France
Partner towns
Rotherham has three partner towns:
Cluj-Napoca, Romania
Riesa, Germany
Zabrze, Poland
See also
Rotherham Tramway
Trolleybuses in Rotherham
References
Further reading
Rotherham Timeline
Rotherham Greats
External links
Rotherham Metropolitan Borough Council
Boston Castle, Rotherham, website
Category:Towns in South Yorkshire
Category:Geography of the Metropolitan Borough of Rotherham
Category:Folly castles in England
Category:Pages including recorded pronunciations (UK English) | {
"perplexity_score": 241.1,
"pile_set_name": "Wikipedia (en)"
} |
World leaders traveling to this year’s Davos Economic Forum in Switzerland will reportedly board about 1,700 private jet flights to reach their destination, where ironically the topic of how to tackle “climate change denial” will be discussed.
The annual globalist confab of power brokers, economists, journalists, world leaders, pop stars and titans of industry meets through Friday to flesh out various issues they believe to be affecting the planet.
One of the items on the agenda: “How can we tackle climate change denial?,” a problem threatening the implementation of a carbon tax scheme long in the works.
Oblivious to the irony, forum attendees from all over the world booked tens of hundreds of flights into Geneva, collectively spending hours polluting the airways.
“Roughly 1,700 private flights are expected over the course of the week, which is twice as many as normal, according to WINGX Advance, a tracking firm,” CNN Money reports.
A June 2008 Institute for Policy Studies report, entitled, “High Flyers: How Private Jet Travel is Straining the System, Warming the Planet and Costing You Money,” (.pdf) revealed “An hour of flying in a private jet burns as much fuel as an entire year of driving.”
“Four passengers flying in a private Cessna Citation X from Los Angeles to New York will each emit 8,892 pounds of CO2 into the atmosphere. This is more than five times as much CO2 emitted by a commercial air passenger making the same trip,” the report added.
“Don’t worry. I’m sure these will be non-polluting private jets powered by carbon offsets and unicorn magic,” jests FrontPageMag.com’s Daniel Greenfield. “They will not in any way add to the heat death of the earth. Unlike you, toting your groceries home in a plastic bag in the back on an SUV.”
Among this year’s meeting attendees is none other than climate change advocate, multi-millionaire and former vice president Al Gore, whose name has become synonymous with the ongoing effort to convince humans we’re the primary cause of global warming, a stance many non-establishment scientists largely contradict.
Scientists at the Indian Science Congress, for example, recently expressed concerns that “man-made global warming” was being blown out of proportion, pointing out that polar ice caps were melting before humans were on Earth.
“While I agree that glaciers are melting because of global warming, if this is because of man, then what was the reason for the melting of the glaciers in the Gondwana period long before man arrived on the planet?” asked Dhruv Sen Singh, a University of Lucknow geologist.
Even meteorologist John Coleman, the co-founder of the Weather Channel cable network, openly questions climate change-promoting science.
“The polar ice is increasing, not melting away,” Coleman said in an open letter to the Intergovernmental Panel on Climate Change. “Polar Bears are increasing in number.”
“Heat waves have actually diminished, not increased. There is not an uptick in the number or strength of storms (in fact storms are diminishing).”
“I have studied this topic seriously for years,” he added. “It has become a political and environment agenda item, but the science is not valid.”
Despite a host of dissenting voices, an overwhelming majority of the U.S. Senate passed a measure Wednesday declaring “climate change is real and is not a hoax.”
While voting in favor of the measure, Oklahoma Senator James Inhofe pointed out that the only “hoax” regarding climate change is the belief that it is man-made.
“Climate is changing, and climate has always changed, and always will, there’s archeological evidence of that, there’s biblical evidence of that, there’s historic evidence of that, it will always change,” Inhofe stated. “The hoax is that there are some people that are so arrogant to think that they are so powerful that they can change climate. Man can’t change climate.”
Watch: Lord Christopher Monckton puts climate change in its place once and for all.
The Emergency Election Sale is now live! Get 30% to 60% off our most popular products today! | {
"perplexity_score": 356.5,
"pile_set_name": "OpenWebText2"
} |
The Presidential election of 1928 was not a close one. Yet, it was memorable for the reason that the losing Democratic candidate, New York Governor Al Smith, was the first Catholic to be nominated for the Presidency by a major party. Although Smith’s religion was not the main reason he lost, it certainly didn’t help. And it gave Smith’s opponents, who distrusted him for his stance on the repeal of Prohibition and for being from New York City, even more ammunition to use against him.
In 1956, a political scientist named Edmund A. Moore looked back to 1928 and examined the election strictly in terms of Smith’s religion. It’s not a particularly relevant book to us today since: 1) a Catholic, John F. Kennedy, would be elected President in 1960, 2) there have been subsequent Catholic nominees for the Presidency and Vice-Presidency (John Kerry in 2004, Geraldine Ferraro as Vice President in 1984, and current Vice President Joe Biden), 3) Catholics appear all over the political spectrum now (Dennis Kucinich and Rick Santorum were both Catholic candidates in 2012.) and 4) there was a major party Mormon nominee in Mitt Romney and the U.S. was practically in a state of war against that religion during the 19th Century. America has come a long way in hating religion and we save our dumbest and most vile invective for Islam.
When we last saw Smith in 1924, his delegates at the Democratic Convention in New York successfully blocked the nomination of William McAdoo and forced the Democrats into nominating a compromise candidate, John W. Davis, who … did not win.
In 1928 Smith was the presumptive nominee. Anti-Smith forces decided that the best way to stop the Catholic “wet” governor of New York was to find a “dry” Catholic. Montana senator Thomas Walsh took a few delegates to the convention in Houston, but it was not nearly enough to stop Smith’s momentum. The Democrats finished their business in three days. Arkansas Senator Joseph Robinson was the Vice Presidential Nominee.
The Republicans were running the very popular Secretary of Commerce Herbert Hoover, who was generally considered to be the brains behind the very popular Calvin Coolidge. Senator Charles Curtis of Kansas was nominated for Vice President.
In 1928, American Catholics were a scary bunch to many for a variety of reasons, although not many of them made a lot of sense. There was a general fear of people who tended to live in big cities (as Smith did). There was a widely-held belief that a Catholic president would be more obedient to the Pope than to the American people.
Smith tried to react to the religious arguments against him, but he never could find the right approach. The problem facing him was that some of the arguments were so outlandish (like turning the White House over to the Pope) that it was hard to argue against something so outlandish without sounding foolish. Magazines like The Atlantic Monthly had long articles with discussions of Smith’s “Catholic problem.”
Another problem Smith faced was that with the focus on his religion as well as his opposition to Prohibition, nobody really knew what Smith’s positions on other matters were. Also, because Smith sounded “ethnic”, Republican opponents reveled in pointing out his lack of education and dearth of foreign policy experience as compared to the Stanford-educated and world renowned Hoover. (This book doesn’t discuss Smith’s positions on any matter in any depth.)
With the American economy booming, Smith faced an uphill battle in 1928. But, with Southern Democrats fearful of a Catholic because he was, for lack of a better word, different, Smith’s base of support was gone. Hoover routed Smith by a 444-87 margin in the electoral vote and by a 58%-40% margin in the popular vote. Hoover was able to pick off the Southern states of Texas, Florida, Virginia, North Carolina, and Tennessee. Smith even lost his home state of New York. The only states that Smith won were states in the Deep South with almost no Republican voters as well as two narrow wins in Massachusetts and Rhode Island.
Smith was hoping that by running in 1928, he would still be popular among Democrats and be considered a top candidate for 1932. That idea had one problem that Smith didn’t foresee. With Smith running for President, the Democrats found a new man to run for New York Governor. His name was Franklin D. Roosevelt, a longtime Smith ally. When 1932 rolled around, the two men were no longer allies. They were competitors.
American politics has never been pretty. Mud has been thrown since the Election of 1796. My impression from this book is that it was clear that there was a significant part of America that didn’t want a candidate like Al Smith to win. His Catholicism was just one facet of why people feared him. The fact that he was from a city, and not just any city, but THE BIGGEST CITY still left a good chunk of America afraid. If Smith hadn’t been Catholic, there would have been some other reason to go after his character.
The Election of 1928 showed that America was, for the most part, full of shallow, fearful bigots who were easily manipulated by more powerful forces. Would Al Smith been a good President? Probably not. After the election, Smith went to work for those same big business concerns that he campaigned against. The losers were all the people who were manipulated into believing the worst things about a large part of the American population. Or do the American people just prefer to be told whom to hate?
If one were able to go back in time to 1924, most people would be stunned by a lot of things. Communications that seemed glacial in pace, medical care that wouldn’t be very good, and also that the United States was dominated by people who believed that the country should be run by people who were white, who didn’t drink any alcohol, and, for good measure, had only a passing acquaintance with science.
For the most part, the America of 1924 was an unpleasant place for those who were not part of the ruling class. The conflict between all of the disparate parts of American life at the time came to a head in the disastrous Democratic convention of 1924.
Robert K. Murray’s book from 1976 has a straightforward title about how long it took for the Democrats to nominate a candidate for President in 1924. It took the Democrats 16 days, packed into a sweltering Madison Square Garden in New York, to finally nominate someone to go be a sacrificial lamb running against incumbent Calvin Coolidge, who had quickly gained in popularity as the American economy began to flourish. Murray’s book is a great read, rich with detail, and surprisingly not too bogged down with details. There is a good feel for the time period, although you do leave the book with the feeling that everyone in New York in 1924 thought that everyone from outside of New York was a stupid hick and beneath them. Which is to say, New York is still the same.
The Democrats had a lot of problems in 1924, but perhaps their biggest was that a large chunk of their support in 1924 came from the Ku Klux Klan. In the 1920s, the Klan had developed a system where people could easily join up. Becoming a Klan member didn’t mean that you were in favor of burning crosses and lynching African-Americans. It just meant that you liked a country that was white, Protestant, and free of immigrants (except of course for the immigrants that your family came from, they were OK). Estimates of Klan membership in the 1920s ranged from 3 to 8 MILLION people. Some state governments, such as Indiana’s, were essentially run by the Klan.
Prohibition was the other big wedge issue for the Democrats. The party was split between rural conservatives who supported it and urban moderates and progressives who found the idea intolerable.
Herbert Hoover seemingly had everything you would want from a President. He was well-educated, with a degree in geology from Stanford. He had traveled the world. He was a successful businessman. He showed he could organize people all over the world to ward off famine.
And when he became President, he was awful. Faced with an unprecedented economic crisis (that was not his fault), Hoover, in crude test pilot/astronaut speech, screwed the pooch. Whatever Hoover had accomplished before in life, was forgotten under the weight of massive unemployment and a shrinking economy,
William E. Leuchtenburg, who has written extensively on the history of the Great Depression, does not paint a sympathetic portrait of Hoover. Instead, Hoover comes across as vainglorious, although tempered by a desire to serve the public. But, Hoover wanted the public to respect him and love him because he was Herbert Hoover. Out of office, Hoover turned into a bitter reactionary. But, as Hoover would say in his retirement (he lived until he was 90) about how endured all the taunts, “I just outlived all the bastards.”
Herbert Clark Hoover was born into a Quaker family on August 10, 1874 in West Branch, Iowa. He was orphaned at the age of 10 and sent off to live with an uncle in Oregon. Not surprisingly, Hoover had a very unhappy childhood. His uncle, who had recently lost his son, didn’t find Herbert Hoover a suitable replacement. But, Hoover did get an education. And, in 1891, Hoover was admitted to the first ever class of a new university in California: Leland Stanford Junior University. Hoover’s field of study was geology.
While at Stanford, Hoover found the eye of another woman who was in the geology major. Actually, she was the ONLY woman in the geology major at the time. Her name was Lou (short for Louise) Henry. The two would eventually marry in 1899. In addition to raising two children, Herbert and Lou collaborated on an English translation of the 16th Century textbook on metallurgy called De re metallica.
Hoover was also the student manager of the football team. He is credited with coming up with the idea for the first Cal-Stanford Big Game in March of 1892. Stanford won the first meeting 14-10, although the game was delayed supposedly because Hoover neglected to bring a football with him.
Fresh out of college, Hoover managed to get a job with the English mining firm of Bewick, Moening, and Company. He traveled the world inspecting mines for the company. He became an expert at getting mines that were not meeting production quotas up to speed. By the age of 27, Hoover was a full partner in the firm and moved to London fulltime.
In 1908, Hoover left Bewick and became a consultant. He made millions hopping around the globe trying to get mines to produce more. His style was autocratic, but highly successful.
Leuchtenburg points out that despite Hoover being orphaned at a young age, he didn’t try to be much of a parent to his own two sons. While on his frequent travels, he would communicate infrequently with his children and even his wife.
When World War I began in 1914, Hoover’s public profile shot up. Hoover helped finance the journeys of numerous American expatriates back to the United States. Many had found their lines of credit cut off by banks because of the war. But, the biggest problem Europe faced was hunger.
Belgium was the country where much of the initial fighting took place, and, according, it suffered the most. Hoover managed to convince both the British and German to allow him to bring in relief supplies to prevent a humanitarian crisis. Hoover was also determined to make sure that the relief went directly to the people who needed it, and was not siphoned off to any army. Hoover’s efforts in Belgium made him a worldwide figure.
Once the United States entered the war in 1917, President Woodrow Wilson summoned Hoover back to the United States to head up the newly created Food Administration. Hoover was charged with keeping America’s food supply going to meet the added demand of a war.
Hoover did not want to have to resort to rationing. Instead, he created a small army of volunteers (nearly all of the women) to go door to door to encourage people to forego meat on Mondays or wheat products on Wednesdays. Hoover was given wide latitude by Congress and the President to act as he saw fit. He was dubbed “the food czar.” No matter what the title was, Hoover got results. The United States did not have to force the rationing of food during World War I.
When the war was over, Hoover was possibly the most popular political figure in the United States. Hoover supported Wilson’s efforts during the negotiations at Versailles. He came out in favor of the League of Nations. He opposed the stepped up prosecutions of Communists by Wilson’s Attorney General Mitchell Palmer. Hoover was the darling of the Progressive movement. One prominent Democrat, Franklin Delano Roosevelt, hoped that the party could convince Hoover to run for President in 1920.
There was one problem: nobody knew what party Hoover belonged to. Hoover had never explicitly said so. Finally, in the summer of 1920, Hoover announced that he was a Republican. One reason for this was that Hoover did not wish to be identified with racist Southern Democrats. Also, Hoover could see that the Democrats were sure losers in 1920.
After Warren Harding swept into office in the 1920 election, Hoover was offered his choice of Cabinet positions. Hoover opted for the job of Secretary of Commerce. This was an unusual choice as the job had little cachet attached to it. (Can you name the current Secretary of Commerce?)
Hoover revolutionized the office of Secretary of Commerce. He was able to convince the President and Congress to add more responsibilities to the job. Under Hoover, the Commerce Department took control of the Census, the regulation of air travel, and the regulation of radio frequencies. Hoover established commissions to study pretty much any issue that he felt that the Commerce Department might have some responsibility for.
After Calvin Coolidge became President after the death of Harding, Hoover remained in the job. Coolidge did not particularly care for Hoover, sarcastically referring to him as “the Boy Wonder.” But, Hoover could not be replaced. He had made himself indispensible in the eyes of the public.
During the great famine of 1921 in the Soviet Union, Hoover led a relief effort there, despite the objections of many who wanted nothing to do with the Communist regime there. Ironically, Hoover may have done more harm than good. Soviet foreign policy expert George Kennan would later claim that Hoover’s efforts in the USSR served only to legitimize the leadership of Lenin. Hoover would be one of the few Republicans who wanted to normalize relations with the USSR. (This wouldn’t happen until 1933.)
In 1927, one of the largest natural disasters ever to befall the United States hit. It was the Mississippi River Flood. Over 700,000 people had to leave their homes. 27,000 square miles of land were flooded. Over 200 people died.
Hoover was tabbed by Coolidge to head up the relief efforts. This was an area where Hoover did his best. He traveled throughout the affected areas, ordering people to fix problems, not in a week, not in a day, but NOW. Orders were given by Hoover. He expected them to be obeyed. Hoover also made sure that aid was equally distributed to both white and black victims of the flood. This earned him the enmity of some in the South, but further burnished his image with Progressives.
When Calvin Coolidge chose not to run for another term in 1928, Hoover was the presumptive Republican nominee for President. He faced little opposition and had to do little campaigning to win the nomination. Although the Republican Convention was held in Kansas City, it was still not the practice at the time for the candidate to be present to receive the nomination. So, Hoover gave his acceptance speech at Stanford Stadium.
The election of 1928 was no contest. The Democrats nominated New York governor Al Smith, who was the first Catholic nominee from a major party. America was not ready to elect a Catholic, especially one who favored the repeal of Prohibition. Hoover won 58% of the popular vote and 40 of the 48 states. Hoover even won four states of the Confederacy, Texas, Florida, Virginia, and Tennessee, which was quite a feat for that era.
Hoover’s inaugural address was full of high-flying language.
We are steadily building a new race—a new civilization great in its own attainments. The influence and high purposes of our Nation are respected among the peoples of the world. We aspire to distinction in the world, but to a distinction based upon confidence in our sense of justice as well as our accomplishments within our own borders and in our own lives.
—-
This is not the time and place for extended discussion. The questions before our country are problems of progress to higher standards; they are not the problems of degeneration. They demand thought and they serve to quicken the conscience and enlist our sense of responsibility for their settlement. And that responsibility rests upon you, my countrymen, as much as upon those of us who have been selected for office.
Ours is a land rich in resources; stimulating in its glorious beauty; filled with millions of happy homes; blessed with comfort and opportunity. In no nation are the institutions of progress more advanced. In no nation are the fruits of accomplishment more secure. In no nation is the government more worthy of respect. No country is more loved by its people. I have an abiding faith in their capacity, integrity and high purpose. I have no fears for the future of our country. It is bright with hope.
Hoover had big plans for his Administration. He wanted to streamline government regulations and was prepared to establish numerous commissions to accomplish this. (This has been a popular technique since). There was a proposal to build what would become the St. Lawrence Seaway, the San Francisco-Oakland Bay Bridge, a dam in Boulder Canyon of the Colorado River (which would become Hoover Dam). There were also plans to reform the Federal prison system. Hoover also canceled all leases for oil drilling on Federal lands.
Ten days later, Black Thursday hit Wall Street. Over 12 million shares (besting the previous high by 4 million) were traded at the New York Stock Exchange on October 24, 1929. The Dow Jones average dropped from 305 to 299. But, Wall Street said that there was little to worry about. On the following Monday, the Dow dropped to 260. And on Tuesday, it was 230. The slide would continue until 1932. The Dow lost 89% compared to its high on September 3, 1929.
The Wall Street Crash was just one symptom of the many problems of the Great Depression. Banks began to rein in credit (or simply just fail) and foreclose on homes and farms. Industries cut back on wages or laid off employees. People saw their life savings disappear.
Hoover, faced with an unprecedented crisis, took steps that most economists believed only exacerbated the problems. One of the biggest blunders was his signing of the Smoot-Hawley Tariff in June of 1930. This bill raised tariffs to unprecedented levels. The result was a sharp decline in imports. Also, other nations passed their own protective tariff measures.
Despite his background in humanitarian causes, Hoover gave the impression that he didn’t care much about the problems that many Americans were facing. Part of this was from the fact that Hoover was now a President. He had to work with Congress and politicians with different agendas. He found himself in a position where he had less authority to get things done. Hoover was also strongly opposed to any Federal government handouts, feeling that they contrary to the spirit of individualism that he was trying to build in the country.
Hoover was also convinced that the biggest problem with the economy was the Federal Government’s budget deficit. Hoover raised income taxes and sharply curtailed Federal spending. The net effect of this was to suck even more money out of the economy. (For a dissenting opinion, you can read this book.)
By October of 1931, when Hoover returned to Shibe Park to see the Philadelphia Athletics play the St. Louis Cardinals in the World Series, he was booed. Few Presidents had ever received such a public reaction like that at that time. (It’s not unusual now. Here’s the reaction George W. Bush got in 2001. By 2008, the reaction was different. Barack Obama’s reception at the 2009 All-Star Game could be described as “mixed.”) A growing number of homeless people formed communities that were dubbed “Hoovervilles.”
Despite his wide travels in the world, Hoover was not an expert on foreign policy. He hoped to ease tensions between the United States and Latin America, but ended up sending troops using troops to prop up a right wing regime in Nicaragua, setting up the long battle between the Somoza regime and the Sandinistas that would last until the Reagan years. (Hoover would withdraw the troops before he left office.) Hoover, like most other world leaders of the time, did not do much of anything to stem the rise of German fascism or Japanese militarism.
The nadir of his unpopularity may have been in July of 1932 when a group of World War I veterans marched to Washington asking Congress to pay them a promised bonus for their military service a few years early. The ragtag group camped out in Washington, but Hoover ordered the Army to clear them out. Under the direction of Douglas MacArthur, the Army routed the so called “Bonus Army” from their encampment. The Army was portrayed as using brutal means to accomplish this, although most accounts agree that it didn’t take much force to get the protesters to move. Also, rolling tanks down the streets of Washington tend to make people less inclined to protest.
There was one forward looking project that Hoover tried in an effort to provide some help. In the summer of 1932, Hoover started a program called the Reconstruction Finance Corporation. It was a government entity that would provide loans to state and local government, along with banks and other financial institutions. But, the program was bogged down in bureaucracy and little of the money that the RFC was authorized to lend was spent during Hoover’s term in office.
Hoover was pleased that the Democrats nominated Franklin Roosevelt for President in 1932, feeling that he had a much better chance of beating him in November. Hoover thought that Roosevelt was an intellectual lightweight. But, Hoover could not overcome his unpopularity. He was also no match for Roosevelt as a campaigner. Roosevelt seemed energetic and positive. Hoover was dour and stuffy.
After winning 40 states in 1928, Hoover would win just six in 1932. Hoover received just 39% of the popular vote and only 59 electoral votes, 36 of them from Pennsylvania. Hoover’s home state of California gave him just 37% of the vote.
During the campaign, Hoover was personally hurt by Roosevelt’s claim that Hoover had encouraged reckless speculation in the stock market. (In fact, Hoover had done the opposite as Secretary of Commerce.) Hoover wanted to have Roosevelt work with him during the transition to calm the financial markets. But, Roosevelt refused and remained silent.
On March 4, 1933, Hoover had to hold in his emotions as Franklin Roosevelt took the oath of office. He felt as if his life’s work had all been for naught.
After remaining quiet for about a year after the election, Hoover began to speak out against Roosevelt. He denounced the New Deal programs as socialistic. (Ironically, one of Hoover’s closest friends overseas was British Prime Minister James Ramsay McDonald, one of the most leftward leaning PMs in history.) He considered Roosevelt to be one of the most dangerous men to ever be President. Roosevelt responded in not so subtle ways. Interior Secretary Harold Ickes had the name of Hoover Dam changed to Boulder Dam (it would be later changed back.)
After Roosevelt’s death, Hoover headed up a commission for President Harry Truman that examined government waste and inefficiency. This job won Hoover some plaudits.
Eventually, Hoover took on the air of a beloved elder statesman. The Republicans held “farewell” celebrations for him at their conventions in 1952, 1956, and 1960. The Senate honored Hoover in 1957 with Massachusetts Senator John F. Kennedy feting the former President. Hoover was too ill to attend the 1964 convention, although nominee Barry Goldwater offered his respects.
Hoover was working on his own biography of Franklin Roosevelt before his death. It has never been published or even released to scholars for inspection because, according to Leuchtenburg, its tone is so strident that it would tarnish Hoover’s reputation more than Roosevelt’s.
Herbert Hoover died on October 20, 1964 in New York City at the age of 90. He was buried back in his native Iowa alongside his wife Lou, who had died in 1944.
Leuchtenburg has penned an interesting biography of a man who was very hard to know. The private side of Hoover was seldom revealed, even to people in his own family. Leuchtenburg tries to shed light on an almost entirely opaque figure.
Hoover was someone who Americans, at least for a while, admired. But they didn’t seem to actually like him. Hoover didn’t want to be liked. He wanted to get things done, but he never could figure out how to get things done as President. When you become President, you have to know how to work with people, not just order them around. Hoover likely came to the White House expecting to do great things, but the Great Depression ended those hopes.
Would Hoover had fared better during a time of prosperity? We don’t know. But, you can only judge Hoover by what he did with the situation he was given. In a country that was losing hope, Hoover offered almost none.
After World War I, Hoover started a research institute at Stanford to study the cause of the war. Since then, the Hoover Institution has become of the one most influential conservative think tanks in the United States, covering all aspects of public policy. Some of its fellows have included Condoleezza Rice, George Shultz, Edwin Meese, Milton Friedman, and Thomas Sowell.
Hoover was the last sitting Cabinet member to be elected President and only the fourth one overall. The other three were James Madison, James Monroe, and John Quincy Adams, all of whom were Secretaries of State.
The only other candidate from the two major parties who attended a Pac-10 university was Barry Goldwater in 1964. Goldwater attended, but did not graduate from the University of Arizona.
Calvin Coolidge assumed the Presidency in 1923 as something of a cipher. But, by the time he left office in 1929, he was one of the most popular men in America. And, very quickly, that popularity vanished with the onset of the Great Depression. Just who was this taciturn man from New England?
David Greenberg, a Rutgers University history professor and a columnist for Slate.com, does an excellent job of putting the life and times of Calvin Coolidge into perspective. Greenberg doesn’t spare Coolidge from some blame for the Great Depression. He does provide a motive for Coolidge’s policies, however. Also, Greenberg delves into the public persona of one of the first Presidents who mastered the public relations game, and was able to capitalize on a new medium that was going to transform politics: radio.
Calvin Coolidge came into this world on July 4, 1872 as John Calvin Coolidge in Plymouth Notch, Vermont. His father was a farmer and store owner, and like many people in small towns, held a variety of elected offices. Calvin (who dropped John as a teenager) lost his mother in 1885 to tuberculosis that was complicated by injuries suffered in a horseback accident. His only sibling, a sister named Abigail, died five years later from appendicitis.
Without his mother around, Calvin became a shy and somewhat withdrawn child. His father sent him to a boarding school, where Coolidge had a hard time making friends at first. Slowly, he came out of his shell and became a leader at his school. Speech and debate proved to be his specialties.
Coolidge would go on to study at Amherst. There he would meet two lifelong friends, and political allies, Dwight Morrow and Harlan Stone. After graduating Amherst, Coolidge studied law as an apprentice in Northampton, Massachusetts. And in 1898, Coolidge won a seat on the Northampton city council, kicking off a career in politics.
For a man who appeared to be very quiet and withdrawn, it would seem unlikely that Coolidge could propel himself into the highest office in the country. But, as Greenberg demonstrates, Coolidge was extraordinarily shrewd in grabbing opportunities to move up the political ladder, as well as presenting himself as a man who could be a leader.
By 1911, Coolidge had been elected to the Massachusetts State Senate. And in 1913, Coolidge became the President of the State Senate. From this position, Coolidge positioned himself with key Republican leaders in Massachusetts, some of whom would be key financiers in his campaigns for higher office.
In 1915, Coolidge was elected to his first of three one-year terms as lieutenant governor of Massachusetts. And in 1918, Coolidge reached what many thought would be the highest position a man like him could hope to obtain, governor of Massachusetts.
Coolidge’s term as governor was marked by reducing government spending and streamlining the bureaucracy of Massachusetts. But, Coolidge might have faded into obscurity if the police officers of Boston had not gone on strike in 1919.
This strike was no ordinary strike. Nearly the entire force walked off the job, leaving the streets of Boston open for roving gangs of thieves and looters.
At first Coolidge didn’t want to intervene, preferring Boston’s mayor to handle the situation. After two days of rioting, in which three people were killed, Coolidge fired the striking officers and sent off a telegram to Samuel Gompers, who was negotiating for the police men, that read, in part, “There is no right to strike against the public safety by anybody, anywhere, any time.”
Coolidge made sure the newspapers saw this telegram. And the public lauded Coolidge for his tough stance on the strike, and his visibility on the national stage increased. The Republicans put him on the ticket in 1920 as Vice President with Warren Harding.
Being shut out of Harding’s scandal-ridden White House turned out to be a good thing for Coolidge. When Harding passed away in August of 1923, Coolidge was able to assume the Presidency without any of the baggage from the numerous scandals that were about to come to light.
No one was sure what to make of the new President. Some thought he would be a lightweight compared to Harding (and Harding was about as lightweight as Presidents come). But, Coolidge surprised people with his quiet and seemingly honest and forthright style.
And what was happening during this time in America? Foremost, the country was prosperous. Wages were increasing. Productivity was up. People could buy and spend freely it seemed. The U.S. economy, bolstered by booming industries in automobiles and radios, looked to be in great shape.
Coolidge, advised by Secretary of Treasury Andrew Mellon, proposed a hefty tax cut, eliminating many surtaxes on the highest income brackets. These had been put in place to help the economy during World War I. But in peacetime, Coolidge and Mellon though that stimulating the economy with tax cuts would ultimately help out all income levels.
Congressional opposition kept Coolidge from getting all that he wanted in the tax bill, but there was enough left to satisfy him. And, according to Greenberg, left America with an economic model that would be adopted 57 years down the road by Ronald Reagan.
In 1924, Coolidge decided to run for President in his own right. This might have been a daunting task. No Vice President, with the exception of Theodore Roosevelt, who had assumed the Presidency after a death had been elected in his own right. And Coolidge was no Teddy Roosevelt.
But, Coolidge was no political innocent. His three principal opponents on the Republican side all were removed in expert ways.
Pennsylvania governor Gifford Pinchot, one of Roosevelt’s last disciples to hold a high office, was asked by Coolidge to help mediate a strike among coal miners in his state, but he had to follow White House directions, effectively taking Pinchot out of the race.
Henry Ford was another rival. Coolidge offered to sell Ford the Federal hydroelectric plant at Muscle Shoals, Alabama. After this, Ford decided against running against Coolidge. (The move was later blocked in Congress.)
The third Republican opponent was Wisconsin senator Robert La Follette, a Progressive. La Follette’s Progressive movement was shut out of decision making at the White House, and Coolidge’s people controlled the party regulars, who were needed to have any chance of gaining the nomination. La Follette would run as a third party candidate.
The Democrats provided even less opposition to Coolidge than his own party. With the resurgence of the Ku Klux Klan throughout the nation, the Democrats found themselves being identified as the party of the Klan because of their strength in the South. The Democrats took 103 ballots and 10 days before coming up with a nominee in 1924, as the party split over support for the Klan. It was a New York lawyer (although born in West Virginia) named John W. Davis who got the nomination.
Bruce Barton, a public relations man who worked in the White House and deftly crafted Coolidge’s image, had celebrities, such as Al Jolson, campaign for the President. (In 1924, Hollywood and Broadway were dominated by Republicans.) Coolidge also used the radio to deliver speeches, which allowed him to reach a much wider audience than ever before. Greenberg estimated that the crowds of people who showed up for Theodore Roosevelt’s speeches were about 13 million people. Coolidge could reach more than that with just one radio address. (You can listen to some of Coolidge’s speeches here.)
Coolidge, like Harding in 1920, won the election in a landslide. The Democrats won only in the states of the Confederacy, plus Oklahoma. Coolidge won 54.4% of the vote and Davis won only 28.8% of the popular vote, the lowest percentage for a Democratic nominee ever. Third party candidate La Follette won 16% of the vote and carried his home state of Wisconsin.
In his full term in office, Coolidge continued his pro-business policies. It was in January 1925 when Coolidge issued his famous statement “The principal business of America is business.” Greenberg also points out that Coolidge followed up that statement with “The chief ideal of the American people is idealism.”
This means that either: 1) Coolidge truly had a pro-business agenda, 2) Coolidge’s idealism was about business’s ability to improve the nation, 3) Coolidge was just trying to sound smart or profound, 4) it was all an act. It was likely all four.
Coolidge’s election energized the stock markets. Millions of people who had never invested before turned to the stock market with the hope of quick riches. Real estate prices soared in some markets, especially in Florida. Few people believed that there would be any end in sight to this prosperity.
While the economy soared, America was faced with numerous internal conflicts. Women, now with the right to vote, were starting to assert their independence and sexuality during this time. Civil rights remained an issue that had to be confronted. American literature, music, and art were all undergoing rapid changes.
And what was Coolidge’s response to all this? Not much. He just kept quiet (an image he cultivated) and tried to present the image that he was taking care of things. He wanted Americans to believe that their president was a simple guy. He liked to go back to his farm to work. (Be sure to dress appropriately!)
Over in Europe, the situation was not as rosy. Nearly every European country had built up huge debts that they owed to the United States. Germany was also trying to pay off reparations as well. Germany ended up facing a hyperinflation scare where, at one time, one U.S. dollar was worth 4.2 TRILLION marks.
Coolidge, while trying to maintain an isolationist stance, did encourage some international agreements that were supposed to alleviate the debt problem, as well as reduce the chance of another world war. But, not much more was produced other than toothless agreements such as the Kellogg-Briand Pact, which was supposed to prohibit the use of war as an instrument of national policy. Its effectiveness proved to be limited, to put it kindly.
Although Coolidge did not wish to get involved in European matters, he had a different view toward Latin America. Coolidge and Morrow had to work hard behind the scenes to prop up the Mexican government of Alvaro Obregon. When Obregon was replaced by Plutarco Elias Calles in 1923, more problems followed, as Calles moved to nationalize businesses and the holdings of the Catholic Church.
Then in 1926, Coolidge ran into a problem in Nicaragua when he withdrew Marines who had been supporting the government there. With the Marines gone, civil war broke out in Nicaragua. And Coolidge had to send the Marines back.
Coolidge’s friend, Dwight Morrow, was able to negotiate a solution to the problem in Mexico. However, the problems of Nicaragua would be a thorn in the side of American presidents for the next 60 years.
In 1928, when Coolidge addressed the Pan-American Congress in Havana, he spoke of the region’s shared goals. But, Coolidge found few friends. The Pan-American Congress almost adopted a resolution condemning the U.S. for intervening in the affairs of other countries in the region. At the last minute, American delegate Charles Evans Hughes was able to get the resolutuion withdrawn.
In August of 1927, Coolidge famously announced his intention not to run for a second full term in 1928 by handing reporters small slips of paper that read, “I do not choose to run for president in 1928.” Coolidge had felt that he had done enough as President and had little to gain by running for another term. Also, Coolidge had still never recovered psychologically from the death of his son, Calvin Jr., in 1924 from an infected blister.
And so, Coolidge departed the White House in March of 1929. His Secretary of Commerce, Herbert Hoover, took over. And, as most of us know, the stock markets crashed a few months after Hoover was sworn in. And soon after that, the Great Depression began.
The economic hard times made people look back at Coolidge and wonder if he was responsible for the calamity.
Greenberg gives Coolidge a mixed report card. He feels that Coolidge didn’t act to put any controls on the stock market or banking systems because he felt it wasn’t the Federal government’s role. No one had done so before, and it would be especially unlike Coolidge to have taken the lead in this field. But, Coolidge had to have known that the rise in the price of stocks couldn’t be sustained. Greenberg writes that Coolidge’s tax cutting policies encouraged speculation in corporate stocks, instead of bonds, further inflating their prices, and screwing up (this is a technical term used by economists!) credit markets. (Since corporate taxes were lower, corporations paid out larger dividends.)
According to Greenberg, the difficult in assessing Coolidge is that he is evaluated by people who knew what the problems with the U.S. economy were. But, few people from 1923 through 1928 foresaw those problems. (Some people did, but no one who was in a policy making position did.) Coolidge ran the country according to a political philosophy that got him from a job as a city councilman in Northampton, Massachusetts, all the way to the White House.
Franklin Roosevelt’s New Deal would make Coolidge’s laissez faire policies seem almost quaint. But, they would be revived in 1980 when Ronald Reagan was elected. And another Republican who knew how to manipulate his public image and get his programs through Congress would return to the White House.
When Coolidge passed away in January of 1933, he was already an afterthought to some. Dorothy Parker, upon being told that Coolidge had passed away, remarked, “How could they tell?”
Coolidge’s Vice President, Charles Dawes, began his term with a speech excoriating the Senate for having obsolete rules. Early in 1925, Coolidge faced a contentious nomination for his Attorney General candidate, Charles Warren. It appeared that the Senate was going to tie 40-40 on the nomination (ties don’t go to the nominee). Dawes, as President of the Senate, could have cast the deciding vote in favor of Sargent. However, when the vote came up, Dawes was taking a nap back at his hotel. The Senate voted without him present and rejected the nomination. Coolidge rarely spoke to Dawes again after that.
America’s 29th President, Warren Gamaliel Harding, has not fared well in the eyes of historians. He is viewed as a weak leader who appointed corrupt friends to high government positions. He was accused of extramarital affairs and fathering illegitimate children. People have speculated that he was murdered by his wife. And not many people even know or cared about what happened during his Administration.
John W. Dean (yes, that John W. Dean, from Watergate times) took on the task of trying to find out who the real Warren Harding was. And why Dean? Is it because he is an expert on presidential scandals? No, it’s actually because Dean grew up in Marion, Ohio, the same town where Harding grew up and lived most of his life. Dean has spent a good amount of his life studying the life of Harding.
Dean has been rather harsh toward other Presidents in books he’s written (namely Richard Nixon and George W. Bush), but in this biography, Dean is almost sympathetic to one of the lesser lights to inhabit the White House. Dean tries to get you to believe that Harding was a decent man, who was in over his head, yet still tried his best.
However, it is hard to believe that someone like Warren Harding ever made it to the White House. Harding did little in his political life except be nice to the right people and “look” presidential. He accomplished little on the domestic front, and his principal foreign policy initiative, the Washington Naval Disarmament Conference, was soon forgotten.
When Harding was 18, he was able to get the financing (all $300 of it) that let him purchase the Marion Star newspaper in his Ohio hometown. Harding loved running a newspaper and developed an interest in politics because of it.
One of the local figures in Marion that Harding took on was the richest man in town, Amos Kling. Eventually, Kling’s daughter, Florence, married Harding, despite the protestations of her father. Florence Harding had borne a child out of wedlock before marrying Warren Harding, although that son ended up being raised by her father, who described his grandson as his “son.” Kling disapproved of Harding and started a rumor campaign in Marion that described Harding as being part African-American. (Kling actually used a far less polite term.) Harding would have to confront stories about his ancestry throughout his life.
Florence, often described as the woman who pushed Warren into politics, actually didn’t do so, according to Dean. Harding decided to run for the state legislature on his own. While serving in Columbus, Harding developed a reputation as being an all around nice guy, who gave good speeches. This eventually elevated Harding into the lieutenant governor’s job in Ohio, but when he tried for the governor’s job in 1910, he was defeated.
Harding started his political comeback when he put William Howard Taft’s name into nomination at the Republican Convention in 1912. In 1914, when Ohio held its first direct senatorial election, Harding won and he and Florence headed off to Washington.
While in the Senate, Harding generally tried to spend most of his time developing connections that could help his standing. He befriended a senator from New Mexico named Albert Fall. This would end up not being a good career move in the long run for Harding. But, at least Fall had a nice mustache.
After eight years of Woodrow Wilson and the Democrats in the White House, the American voters were ready to vote Republican. Wilson’s popularity had plummeted after World War I with the rejection of the Treaty of Versailles and the League of Nations. Wilson suffered a debilitating stroke and for the final 18 months of his term, he was rarely seen in public, and the government was run mostly by Wilson’s wife and some key aides.
Nevertheless, Wilson thought he could run for a third term. He was politely told by people that he shouldn’t do so. (Primarily because Wilson was almost dead and could barely talk or see.) Theodore Roosevelt was talked about as a candidate to run for the White House in 1920, but those plans were interrupted when Roosevelt died in 1919.
So, the two major political figures for the 1920 Presidential campaign (Wilson and Roosevelt) were either dead or incapacitated. Into the void, entered Warren Harding, the nice guy from Ohio.
Harding started his campaign in the winter of 1919, but his strategy, formed by Ohio’s Republican boss, Harry Daugherty, was to not try to win the nomination outright, but rather to just hang around during the primaries (which were still in their infancy) and then hope for a deadlocked convention. Harding’s plan was to try to offend as few people as possible.
And Harding’s plan worked. Leonard Wood, who had served with Roosevelt in Cuba in the Spanish-American War, was the leader among a crowded field heading into the Republican Convention. But Wood had irritated too many people during his campaign. No majority was reached by the Friday of the convention. Most observers felt that the delegates wanted to nominate someone on Saturday. Why? So they wouldn’t have to pay for an extra day of hotels. And on that Saturday, Harding ended up as the choice of the Convention on the tenth ballot.
Harding ran against another Ohioan, Governor James Cox (who had a young assistant Secretary of the Navy named Franklin Delano Roosevelt as his running mate, a counterpoint to dour Massachusetts governor Calvin Coolidge, Harding’s running mate). It would be the first election in which women could vote. It was a landslide. Harding won over 60% of the vote and racked up 404 electoral votes. Harding became the first sitting member of the United States Senate to be elected President.
Almost from the outset, Harding ran into problems in office. His Cabinet had some good people in it, such as Secretary of State Charles Evans Hughes, Secretary of Labor James Davis, Secretary of Commerce Herbert Hoover, and Secretary of the Treasury Andrew Mellon. However, Harding also picked friends like Daugherty to be Attorney General and Fall to be Secretary of the Interior. Florence’s personal physician, Charles Forbes, would be in charge of veterans medical affairs.
Harding, like seemingly every President, felt that there was too much government spending, and he needed to rein it in. And, like most Presidents, he wasn’t all that successful at doing that. Harding did establish the Bureau of the Budget (now the Office of Management and Budget) which may be the one legacy of Harding’s administration that lives on today that people have heard of.
Dean tries to detail other legislative initiatives that Harding tried, but none of them stand out. Harding vetoed a plan to award World War I vets a bonus because he didn’t like the way it was funded (primarily, because it wasn’t funded at all). There were some attempts at raising tariffs, which were a pet cause of Republicans of the time. Harding also tried to limit immigration, but that didn’t work as desired because Harding was hesitant to order wide-scale deportations. Dean paints a picture of Harding as a diligent worker, but someone who just didn’t have the temperament to be an executive. He was someone who was your pal, not your boss.
Harding had one minor success in foreign affairs when he was able to get the major powers (U.S, Britain, and Japan) to come to Washington (with Hughes mediating) and negotiate a treaty that was supposed to slow down (or stop all together) the buildup in naval armaments. This was a noble idea. But, World War II spoke to the lasting effect of that treaty.
Scandals started to touch the White House early in 1923. Forbes was discovered to have sold large amounts of surplus government medical supplies to private companies seemingly below cost. But, Forbes actually was taking kickbacks on the deals and enriching himself. Forbes was dismissed from his post.
In the summer of 1923, the Hardings embarked on a trip for the West Coast and Alaska, in order to relax and also to do some campaigning for his own agenda. Harding became the first President to visit Alaska and the first to visit Canada. But while golfing in Portland, Harding took ill with severe chest pains. Harding, who came into office with a bad heart and likely had suffered a mild undiagnosed heart attack in the winter, was suffering from congestive heart failure and pneumonia. In an era before antibiotics and detailed knowledge of cardiological problems, there was little that doctors could do for Harding. He passed away in San Francisco on August 2, 1923 at age 57.
Not long after Harding’s passing, more scandals came to the fore. The most famous was the Teapot Dome scandal. Interior Secretary Fall had been leasing what were supposed to be protected oil reserves to private interests, headed by California oilmen Harry Sinclair and Edward Doheny. The fact that Fall leased them was not the problem. The problem was that Sinclair and Doheny had furnished Fall with bribes in order to get the leases. Eventually, Fall would go to prison for receiving the bribes, although Sinclair and Doheny were acquitted of giving a bribe. Attorney General Daugherty was caught up in this scandal, as well as several others. (It would take a lot of space to list them.) Daugherty resigned his position, but was never convicted of any crime.
In addition to the real scandals, a cottage industry about fabricating Presidential scandals sprung up. A woman named Nan Britton wrote a book called The President’s Daughter, where she claimed to have had an affair with Harding in the White House and having a child with him. H.L. Mencken gave the book a favorable review and sales skyrocketed. Most historians believe that no such affair with Britton occurred. Harding did have at least one extramarital affair before he became President, according to Dean.
A man named Gaston Means got author May Dixon Thacker to write a book about his “reminiscences” of Harding. It was titled The Strange Death of President Harding. It was supposed to revelatory and accused Florence Harding of poisoning her husband. The book is considered to be almost, but not quite, entirely untrue. Nevertheless, Florence Harding is still thought by some to have murdered her husband.
Warren Harding didn’t leave much of a legacy. His election showed the danger of electing a President who just looked the part. He came from an era where speeches with passages like this:
America’s present need is not heroics, but healing; not nostrums, but normalcy; not revolution, but restoration; not agitation, but adjustment; not surgery, but serenity; not the dramatic, but the dispassionate; not experiment, but equipoise; not submergence in internationality, but sustainment in triumphant nationality.
were considered brilliant oratory.
Dean states that his main reason for writing about Harding was to set the record straight on him. And to that extent, he succeeds. Warren Harding was not a great president, but he wasn’t a horrible person. He just was unremarkable, and overly loyal to his friends. He was a man who stumbled into the highest office in the land by pissing off fewer people than his opponents. It seems that Americans haven’t used that technique for electing a President subsequently.
Harding’s successor, the laconic and phlegmatic Calvin Coolidge, would actually be the President who become far more famous and beloved by the American people.
Author Malcolm Gladwell in his book Blink, described the “Warren Harding Effect”, where people judge a person instantly, but use the wrong clues.
Harding appointed former President Taft to be Chief Justice. Harding’s Secretary of Agriculture, Henry C. Wallace, was the father of Henry A. Wallace, who would hold the same position under Franklin Roosevelt, and then later serve as Vice President for one term. | {
"perplexity_score": 210.4,
"pile_set_name": "Pile-CC"
} |
Some lads are more clever than others.
Mike Hayes of Rochelle, Illinois, long ago proved he was one of the more clever types. Back in 1987, while a chemistry freshman at the University of Illinois, he came up with a novel idea to solve his tuition and college expenses problem. Figuring that just about anyone could spare a penny, he brazenly asked everyone to do it.
He wrote to Chicago Tribune columnist Bob Greene, asking him to request each of his readers send Hayes a penny. The notion tickled the veteran columnist’s fancy enough that he was willing to go along with it, writing:
No one likes being used, but in this case I’m willing. It sounds like fun. Mike Hayes, 18, is a freshman science major at the University of Illinois in Champaign. He is looking for a way to finance his college education, and he decided that my column is the answer. “How many people read your column?” he asked me. I told him I didn’t know. “Millions, right?” he said. “All over the country, right?” I said I supposed that was true. “Well, here’s my idea,” he said, and proceeded to explain. I’ll break it down simply: Mike Hayes wants every person who is reading this column right this minute to send him a penny. “Just one penny,” Hayes said. “A penny doesn’t mean anything to anyone. If everyone who is reading your column looks around the room right now, there will be a penny under the couch cushion, or on the corner of the desk, or on the floor. That’s all I’m asking. A penny from each of your readers.”
You wouldn’t think a scheme like that would be wildly successful. But it was.
In less than a month, the “Many Pennies for Mike” fund was up to the equivalent of 2.3 million pennies. Not everyone was content to send merely a penny (hence the “equivalent” statement above) — many sent nickels, dimes, quarters and even more. There’s something lovable about a kid who asks you for a penny. Ask Debra Sue Maffett, Miss America 1983. Not only did she send a cheque for $25, but her donation was accompanied by a letter saying she admired him. “She even signed the letter ‘Love,'” Mike said.
Donations came in from every state in the United States, plus Mexico, Canada, and the Bahamas. Yes, he ended up with the $28,000 he’d set out to get.
But 1987 was a long time ago, you say. Whatever happened to this lad?
He went on to earn his degree in food science from the University of Illinois. As for why this scheme worked: “I didn’t ask for a lot of money,” Hayes said. “I just asked for money from a lot of people — 2.8 million people [of Chicago].”
Perhaps the last word is best left to the lad’s father, Bill Hayes: “When Mike first told me about his idea, I just laughed and said that I thought it was dumb. Which shows you that he’s smarter than I am.” | {
"perplexity_score": 272.7,
"pile_set_name": "OpenWebText2"
} |
Ep 80: Occupying a Position of Leadership vs Being a Leader
Listen to the Episode Here:
For many people, occupying a position of leadership and being a leader are one and the same. If you examine closely however, you will realise they are two different things. For starters, those occupying leadership positions have the tendency to only want their image to be bright and shiny. Effective leaders on the other hand need to have access to all ways of being including foolishness, embarrassment, and looking stupid. Why is knowing the distinction between the two important for leaders? What should be done about this? You’ll be able to clearly one from the other after you listen to today’s episode so don’t forget to tune in! | {
"perplexity_score": 335.9,
"pile_set_name": "Pile-CC"
} |
One day last year I was doing my usual daily jaunt through the interwebs, and I came across an announcement for a new Blood Bowl comic book from Titan Comics called Blood Bowl More Guts, More Glory! I was interested, but since I’m not a huge comic book fan, I promptly forgot all about. Then about a week ago, the memory of the announcement randomly popped into my head. I jumped onto Amazon, found that there was now a trade paperback collection of all 4 issues, and promptly made an order.
Now, I should say that this is not my first experience with a Blood Bowl comic book. Back in early 2009, Boom! Studios released a Matt Forbeck written comic called Blood Bowl: Killer Contract. I stumbled across a trade paperback collection of the issues several years later in the graphic novel section of Half-Priced Books here in town. The best that could be said of Blood Bowl: Killer Contract is that it’s a comic book set in the Blood Bowl universe. I guess I couldn’t really have expected much more as I’m sure it’s not exactly easy to write a story about a board game. Still, I was a little disappointed that the comic didn’t revolve around a particularly important team or involve major Star Players. Aside from that, it was a reasonably enjoyable read.
With my original Blood Bowl comic book experience in mind, I had realistic expectations for More Guts, More Glory! and as such, I was able to enjoy the read a bit more than Killer Contract. Like Killer Contract, More Guts, More Glory! is really just a story set in the Blood Bowl universe. The game itself is more of a backdrop than anything as the story focuses on Dreng Sturnblud. Dreng is a past his prime Blitzer who is given a second chance to lead his new team to victory. Along the way, he has to deal with scheming Dwarves, minions of Chaos, and various other bad types.
The story is decent and the artwork is really nice, but more than anything for me, it’s just another piece to add to the Blood Bowl collection. It’s a little more fluff to add to the background. One of these days, I wish someone will produce a comic book telling one of the well known background stories, like the discovery of the book of Nuffle, but until then…
As a bonus, here are some pics from Blood Bowl: Killer Contract in case anyone is interested in picking up a copy on Amazon or eBay. | {
"perplexity_score": 372,
"pile_set_name": "OpenWebText2"
} |
1. Field of the Invention
The present invention relates to an organic light emitting display, and more particularly, to an organic light emitting display having pixel data self-retaining functionality.
2. Description of the Prior Art
Because flat panel displays (FPDs) have advantages of thin appearance, low power consumption, and low radiation, various kinds of flat panel displays have been developed and widely applied in a variety of electronic products such as computer monitors, mobile phones, personal digital assistants (PDAs), or flat panel televisions. Among them, active matrix organic light emitting displays (AMOLEDs) have gained more and more attention due to further advantages of self-emitting light source, high brightness, high emission rate, high contrast, fast reaction, wide viewing angle, and extensive range of working temperature.
FIG. 1 is a structural diagram schematically showing a prior-art active matrix organic light emitting display 100. As shown in FIG. 1, the active matrix organic light emitting display 100 comprises a gate driving circuit 110, a data driving circuit 120, a plurality of pixel circuits 140, and a power unit 190. Each pixel circuit 140 includes a first transistor 141, a second transistor 142, a storage capacitor 143, and an organic light emitting diode 144. The power unit 190 is employed to provide a high power voltage Vdd and a low power voltage Vss which are furnished to each pixel circuit 140. The gate driving circuit 110 and the data driving circuit 120 are utilized for providing plural gate signals and plural data signals respectively. Each pixel circuit 140 employs corresponding gate and data signals to control the light-emitting driving operation of one organic light emitting diode 144 based on the voltage difference between the high power voltage Vdd and the low power voltage Vss. However, while the active matrix organic light emitting display 100 is displaying a still frame, the gate driving circuit 110 and the data driving circuit 120 still continue to provide the gate and data signals for periodically performing writing operations on the pixel circuits 140. And therefore the power consumption of displaying a still frame is substantially equal to that of displaying motion frames. | {
"perplexity_score": 447.2,
"pile_set_name": "USPTO Backgrounds"
} |
[Cranio-cervical posture and hyoid-mandibular-pharyngeal equilibrium in the presence of factors related to respiratory dysfunction].
The goal of this study is to know the modifications of the cranio-cervical posture which accompany the functional anomalies by the nasal breathe of black African children. The study consists of a cephalometric comparison. Sixteen parameters measured on cephalograms of 98 schoolboys from 6 to 15 years were used. The children were divided into two groups according to their usual mode of breathing: 50 mouth-breathing children and 48 nasal breathers. The mode of breathing used three clinical tests: the mirror test, Rosenthal test and nasal reflex. The results show a significant difference of slope the cervical column between the two groups of children (t student). The oral breathers have the rhinopharyngeal airway dimensions more narrowed. The hyoid bone is more distant of the epiglottis and the mandible is more divergent. However, factor analysis of cephalometric variables suggested that craniocervical angulation (C2C4/SN) is independent of the other variables in oral breathers. Its dependence with is clear in nasal breathers. The children with predominantly mouth breathing exhibent a cranio-cervical hyperextension which could not closely be associated hyo-mandibulo-pharyngeal equilibrium. | {
"perplexity_score": 511.6,
"pile_set_name": "PubMed Abstracts"
} |
after our 3 days in paradise (a.k.a. fitzroy island) we headed to the next destinations on our north-east coast trip! it was time for kuranda, a cute little village in the rainforest and the granite gorge – to cuddle the wallabies! READ MORE | {
"perplexity_score": 576.5,
"pile_set_name": "Pile-CC"
} |