texts
sequence
meta
dict
scores
sequence
avg_score
float64
0
1
num_sents
int64
1
101k
[ "Camgirl & Content Creator\n\nI love to share my private and most intimate moments with you! ", "❤️ I have no problem getting naked for all the world to see my sexy body. ", "I’m an easy going, down to earth kind of girl… 😇😘" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006287136347964406, 0.5774779319763184, 0.001957283355295658 ]
0.193355
3
[ "The invention relates to a hub and a wheel, in particular for bicycles, and a bicycle equipped with these. ", "The invention may be used for both front wheels and rear wheels where as a rule one or more sprockets may be disposed.", "\nIn the field of amateurs and in particular in professional cycling, the stress tolerance, weight and ease of maintenance of components are a decisive factor since the users value high-quality, lightweight, and easily maintained components. ", "Users furthermore desire that in the case that one part of a component is defective, it should not be necessary to replace an entire component, but that in the scope of regular maintenance or if a defect occurs, particular parts can be replaced separately.", "\nAs a rule a bicycle hub consists of a hub body rotatably mounted around a hub axle comprising a hub sleeve and two hub flanges integrally formed thereon, which are provided with holes to receive the spokes which connect the hub with the rim. ", "In the interior of the hub sleeve, at least two bearings are provided to rotatably support the hub body relative to the hub axle. ", "The exterior bearing bushing is most often formed in the hub sleeve while the inner bearing ring or interior bearing bushing is formed on the hub axle. ", "It is also conceivable that a separate outer bearing ring is in connection with the hub sleeve while a separate inner bearing ring is in connection with the hub axle. ", "In such a known hub the hub flanges are strained through the spoke tension forces acting on the hub flanges and directed radially outwardly. ", "The strain, which is dependent on the load, concurrently influences the bearing play such that changes in the spoke tension cause the operating conditions of the bearing to change. ", "This interrelationship may lead to a reduced operating strength of the hub.", "\nIt is another drawback of this known hub that in the case that the hub flange breaks e.g. due to overload, the entire hub must be replaced. ", "One possibility of solving this problem is offered by a hub consisting of multiple parts.", "\nDE 94 03 506 U1 discloses a multipart hub for a bicycle where the spoke-carrying flanges are placed in a center piece and a particular link geometry is used, in particular a polygon profile. ", "In the interior of the spoke-carrying flanges the bearings to support the hub body relative to the hub axle are provided. ", "In this hub the radial load on the spokes also causes a strain on the hub flanges and thus a strain on the bearing seats which may adversely affect the durability of the bearings.", "\nU.S. Pat. ", "No. ", "5,829,844 discloses a hub for a bicycle where separate hub flanges are provided at the hub body to receive the spokes. ", "The hub flanges are placed on the hub body over the hub axle ends with a kind of inner toothing at the hub flanges interacting with a kind of outer toothing at the hub body to achieve that the hub flanges are non-rotatably accommodated at the hub body. ", "Washers and separate screws are then used to secure the hub flanges by way of the laterally applied pressure.", "\nThe drawback of this hub known in the prior art is that the washers and the large screws for fastening the hub flanges to the hub body provide additional weight. ", "Furthermore, manufacturing the hub requires extensive work due to the required outer profile at the hub body.", "\nEP 0 853 007 B1 discloses a flanged bicycle hub where the hub flanges for receiving the spokes are not formed integrally with the hub sleeve but are provided as separate parts. ", "In this hub the hub flanges are pushed onto provided portions of the hub body for mounting until the hub flanges snugly fit at corresponding steps on the hub body. ", "By screwing on fastening caps the hub flanges are axially clamped, thus being secured against slipping off.", "\nThis hub known from the prior art allows to remove the fastening caps by unscrewing and thus to replace the hub flanges of the hub so as to allow replacement of e.g. defective hub flanges. ", "In this hub the bearings between the hub body and the hub axle are not under load from the radial spoke tension since the hub flanges are provided separately.", "\nIt is a drawback of this hub though that for one, the hub body requires a considerable radial thickness to allow the axial hub flange stops to be formed thereat. ", "It is another drawback that large, axially screwed-on fastening caps are required for securing the hub flanges, which increases the error susceptibility and also the total weight of the hub. ", "It is another drawback that toothings are provided on the inner periphery of the hub flange and on the outer periphery of the hub body which require extensive manufacturing steps, thus increasing the price.", "\nIn view of the indicated prior art it is the object of the present invention to provide a hub and a wheel in particular for bicycles wherein a modular structure allows replacement of individual parts. ", "Another aspect of the object is to provide a lightweight hub." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0005637113354168832, 0.0006641411455348134, 0.0005223809275776148, 0.0006393279181793332, 0.0007531773298978806, 0.0005889272433705628, 0.0006991525879129767, 0.0006767216837033629, 0.000711798551492393, 0.0006473921239376068, 0.000564830843359232, 0.0008772834553383291, 0.0006035955157130957, 0.0006555573199875653, 0.0006018987623974681, 0.0009093774133361876, 0.0010884626535698771, 0.0013785817427560687, 0.0006577388849109411, 0.0009352315682917833, 0.0015548050869256258, 0.0011983538279309869, 0.0005656515713781118, 0.0006959341117180884, 0.0007292156224139035, 0.0018688410054892302, 0.0010406565852463245, 0.0006470272201113403, 0.000835073587950319, 0.002016172045841813, 0.0009681516676209867, 0.0006016630213707685, 0.0005973786464892328 ]
0.00085
33
[ "Write about a recent Bahamian song. ", "Summarize briefly what the song is about. ", "Then asses and analyze the song, explicating its meaning for someone who does not understand it. ", "You can write about any images, figures or other techniques the song uses to con\n\nExtracts from this document...\n\nIntroduction\n\nEdricca Knowles English 119 5 September 2011 First Cultural Component Write about a recent Bahamian song. ", "Summarize briefly what the song is about. ", "Then asses and analyze the song, explicating its meaning for someone who does not understand it. ", "You can write about any images, figures or other techniques the song uses to convey meaning to an audience. ", "Bahamians have expressed their talents and manifested a new meaning to the word \"culture\" through their infectious music and exuberant melodies. ", "After being astonished by this beguiling sound, one will be able to appreciate Bahmian tradition, heritage, past and lifestyle. ", "They have adapted the ability to bring their own experience into the music. ", "They have captured not only the Bahamian people, but visitors that walk our soil. ", "Some remarkable cultural icons include, Ronnie Butler, Davis \"Gino-D\" Eugene, Stevie S, Elon Moxey and K.B. \"Stop the world and let me off\" sung by Ezra Hepburn, can be described as a balled of an inconsolable man who has been struck with grief because of an unrequited love. ...", "read more.", "\n\nMiddle\n\nThis song displays a clear theme which is unrequited love or despondency. ", "This theme helps to convey the true meaning and it can also be related to the society of today. ", "Sometimes people become so entwined in love or what they think is love and they lose themselves. ", "They forget how it is to be independent. ", "They become selfless and solely committed to that one person. ", "They allow themselves to become weak. ", "In this song, this man has lost all sense of belonging. ", "It has affected him to point at which he no longer wants to live on planet earth. ", "He has experienced a hurt of none other. ", "No one can feel what he feels. ", "The only cure would be for his lost love to accept him back. ", "This song has many figurative languages. ", "For example, the metaphor, \"My dream world tumbled to the ground.\" ", "This sentence explains how what he once cherished and held close to his heart is now gone. ...", "read more.", "\n\nConclusion\n\nWe can look at this phrase like a glass window; you can fix it if it's broken, but you can still see the crack in the reflection. ", "His heart was torn inside out and nothing can repair it. ", "The damage is too deep. ", "This song also has a rhyming pattern. ", "For example, \"Stop all this burning up inside I know her love for me has died.\" ", "This is very effective because its gives the audience a better way to understand the true meaning. ", "It is also entertaining and can attract many different reading groups. ", "The rhyming of each verse is critical to understanding the theme of heartbreak. ", "In conclusion, we can see how Bahamian music have changed the viewpoint of many people and impacted their lives, giving them an open-minded look on issues that face our society. ", "This song shows us that when you lose a companion, you lose yourself. ", "In my analysis of this song, I discovered techniques such as figurative language, repetition, diction, theme and irony that help to convey the true meaning of the song. ...", "read more.", "\n\nRelated GCSE Writing to Inform, Explain and Describe essays\n\nJem kissed me. ", "It was the best thing that could have happened. ", "I had had a really nice day and that just made it even better. ", "I just kept wishing that he wasn't Joss's brother. ", "Then he asked me to spend the night with him.", "\n\nHowever she kept denying the obvious. ", "Amani refused to accept the fact that she most likely was pregnant. ", "The thought of carrying Jarpreet's child made her feel sick. ", "Amani showered and stayed in her room. ", "The lengha and jewellery were still in their boxes.", "\n\nThe anonymous detainee began bowing down on the ground praying to his God. ", "I presumed now that he was a member of the Holy Smokes or the Panthers, I also realised I had to kill him. \"", "The NW bandits order you to Execute this foe.\"", "\n\n''What about your mom?'' ", "Mom hardly speaks, since he died, once she shouted why just the word I said when he was murdered. ", "Too many questions, I sometimes could feel the pain she is going through and one day I hope I would be able to take the pain away.", "\n\nShe then asked about me. ''", "What about you?'' ", "Born in Gaborone Botswana No brothers or sisters, my parents are diplomats. ", "``Lucky you have both of your parents alive'', `'not quite because, my mom died two years ago.'' ", "``I thought you said your parents are diplomats'' ``You don't get it, I\n\n\"Yeah what does it mean?\" ", "repeated Johny now thoroughly enjoying this tirade with his older sibling. ", "It means..., and this time it was Martha's turn to burst into tears. ", "She ran out and didn't stop running until she reached the safety of her own room." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005846894928254187, 0.0005699869361706078, 0.13501712679862976, 0.0005716683808714151, 0.0005699869361706078, 0.13501712679862976, 0.0006194146699272096, 0.0005338808405213058, 0.0005637761205434799, 0.0005512749194167554, 0.0006610667915083468, 0.0025615065824240446, 0.0007033827132545412, 0.001000354764983058, 0.0005213964614085853, 0.016435230150818825, 0.0007316748378798366, 0.0013236172962933779, 0.07736624032258987, 0.0023168979678303003, 0.001717118895612657, 0.004134107381105423, 0.002685044426470995, 0.004810056183487177, 0.0006064143381081522, 0.0005821230006404221, 0.0008163463207893074, 0.0007033827132545412, 0.000695961934980005, 0.0013279381673783064, 0.00919191725552082, 0.0007397097069770098, 0.022864827886223793, 0.0005538236000575125, 0.000584276975132525, 0.0005428424919955432, 0.000525137409567833, 0.1060517206788063, 0.0005457864026539028, 0.0007033827132545412, 0.0010942238150164485, 0.0005906716105528176, 0.0006135929725132883, 0.001722809043712914, 0.004641808103770018, 0.0008662731270305812, 0.0012986152432858944, 0.08815184235572815, 0.001390396268106997, 0.001644855015911162, 0.00526809087023139, 0.24377140402793884, 0.06418357044458389, 0.2541563808917999, 0.014580571092665195, 0.0011224572081118822, 0.0006611852440983057, 0.0009698715875856578, 0.0008202048484236002, 0.19272395968437195, 0.003299819538369775, 0.0018570281099528074, 0.005275162402540445, 0.013267830945551395 ]
0.02254
64
[ "VFD Sports Marketing Fight Of The Week: Kawajiri vs. Gomi\n\nNovember 14, 2014\n\nIt’s September 25, 2005 at Ariake Coliseum in Tokyo, Japan. ", "The event is Pride Bushido 9 and Takanori Gomi is staring across the Pride ring at Tatsuya Kawajiri in a quarterfinal battle of the #1 and #2 ranked lightweights in the world. ", "Keep in mind that this event was a Pride tournament, so the winner of this fight had to fight again that evening.", "\n\nThese two Japanese gladiators put on a battle for the ages, with Gomi taking the victory via rear naked choke at 7:42 in the first round. ", "The unanimous response following this fight was that it was the fight of the year. ", "You can view the epic battle below:\n\nGomi and Kawajiri became household names in the international MMA world following this bout, rather than just local Japanese heroes. ", "They really put Japanese MMA and lightweight fighting on the map. ", "And even more significantly, Takanori Gomi went on to have one of those special careers as one of the greatest lightweight fighters in the history of MMA. ", "Not too shabby!", "\n\nVFD Marketing is a full-service sports marketing agency that specializes in driving brand awareness through digital marketing and activations through sports marketing, entertainment and modeling. ", "A leader in the industry, VFD is able to set and achieve its clients’ goals through leveraging relationships with athletes, entertainers and models as well as increasing visibility through web services and media production. ", "Follow VFD Marketing on Facebook, Instagram and Twitter, for updates and the latest information." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006622907822020352, 0.0007926010875962675, 0.001125548966228962, 0.025658825412392616, 0.0008292773854918778, 0.0005555530078709126, 0.00405534915626049, 0.0012426410103216767, 0.0050431122072041035, 0.0007126221898943186, 0.0005760679487138987, 0.0005664476775564253 ]
0.003485
12
[ "//*****************************************************************************\n//\n//! ", "@file hci_drv_apollo3.c\n//!", "\n//! ", "@brief HCI driver interface.", "\n//\n//*****************************************************************************\n\n//*****************************************************************************\n//\n// Copyright (c) 2020, Ambiq Micro\n// All rights reserved.", "\n//\n// Redistribution and use in source and binary forms, with or without\n// modification, are permitted provided that the following conditions are met:\n//\n// 1. ", "Redistributions of source code must retain the above copyright notice,\n// this list of conditions and the following disclaimer.", "\n//\n// 2. ", "Redistributions in binary form must reproduce the above copyright\n// notice, this list of conditions and the following disclaimer in the\n// documentation and/or other materials provided with the distribution.", "\n//\n// 3. ", "Neither the name of the copyright holder nor the names of its\n// contributors may be used to endorse or promote products derived from this\n// software without specific prior written permission.", "\n//\n// Third party software included in this distribution is subject to the\n// additional license terms as defined in the /docs/licenses directory.", "\n//\n// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\"\n// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\n// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\n// ARE DISCLAIMED. ", "IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE\n// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR\n// CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF\n// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\n// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN\n// CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)\n// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE\n// POSSIBILITY OF SUCH DAMAGE.", "\n//\n// This is part of revision 2.4.2 of the AmbiqSuite Development Package.", "\n//\n//*****************************************************************************\n// SPDX-License-Identifier: BSD-3-Clause\n#if USE_AMBIQ_DRIVER\n\n#include <stdint.h>\n#include <stdbool.h>\n\n#include \"wsf_types.h\"\n#include \"wsf_timer.h\"\n#include \"bstream.h\"\n#include \"wsf_msg.h\"\n#include \"wsf_cs.h\"\n#include \"hci_core.h\"\n#include \"dm_api.h\"\n#include \"am_mcu_apollo.h\"\n#include \"am_util.h\"\n#include \"hci_drv_apollo3.h\"\n\n#include <string.h>\n#include \"stdio.h\"\n\nextern void CordioHCITransportDriver_on_data_received(uint8_t *data, uint16_t len);\n\n//*****************************************************************************\n//\n// Use the interrupt-driven HCI driver?", "\n//\n//*****************************************************************************\n#define USE_NONBLOCKING_HCI 1\n#define SKIP_FALLING_EDGES 0\n\n//*****************************************************************************\n//\n// Enable the heartbeat command?", "\n//\n// Setting this to 1 will cause the MCU to send occasional HCI packets to the\n// BLE core if there hasn't been any activity for a while. ", "This can help catch\n// communication issues that might otherwise go unnoticed.", "\n//\n//*****************************************************************************\n#define ENABLE_BLE_HEARTBEAT 1\n\n//*****************************************************************************\n//\n// Configurable buffer sizes.", "\n//\n//*****************************************************************************\n#define NUM_HCI_WRITE_BUFFERS 8\n#define HCI_DRV_MAX_TX_PACKET 256\n#define HCI_DRV_MAX_RX_PACKET 256\n\n//*****************************************************************************\n//\n// Configurable error-detection thresholds.", "\n//\n//*****************************************************************************\n#define HEARTBEAT_TIMEOUT_MS (10000) //milli-seconds\n#define HCI_DRV_MAX_IRQ_TIMEOUT 2000\n#define HCI_DRV_MAX_XTAL_RETRIES 10\n#define HCI_DRV_MAX_TX_RETRIES 10000\n#define HCI_DRV_MAX_HCI_TRANSACTIONS 10000\n#define HCI_DRV_MAX_READ_PACKET 4 // max read in a row at a time\n\n//*****************************************************************************\n//\n// Structure for holding outgoing HCI packets.", "\n//\n//*****************************************************************************\ntypedef struct\n{\n uint32_t ui32Length;\n uint32_t pui32Data[HCI_DRV_MAX_TX_PACKET / 4];\n}\nhci_drv_write_t;\n\n//*****************************************************************************\n//\n// Heartbeat implementation functions.", "\n//\n//*****************************************************************************\n#if ENABLE_BLE_HEARTBEAT\n\n#define BLE_HEARTBEAT_START() \\\n do { WsfTimerStartMs(&g_HeartBeatTimer, HEARTBEAT_TIMEOUT_MS); } while (0)\n\n#define BLE_HEARTBEAT_STOP() \\\n do { WsfTimerStop(&g_HeartBeatTimer); } while (0)\n\n#define BLE_HEARTBEAT_RESTART() \\\n do \\\n { \\\n WsfTimerStop(&g_HeartBeatTimer); \\\n WsfTimerStartMs(&g_HeartBeatTimer, HEARTBEAT_TIMEOUT_MS); \\\n } while (0)\n\n#else\n\n#define BLE_HEARTBEAT_START()\n#define BLE_HEARTBEAT_STOP()\n#define BLE_HEARTBEAT_RESTART()\n\n#endif\n\n//*****************************************************************************\n//\n// Global variables.", "\n//\n//*****************************************************************************\n\n// BLE module handle\nvoid *BLE;\n\n//fixme: set the BLE MAC address to a special value\nuint8_t g_BLEMacAddress[6] = {0x01,0x02,0x03,0x04,0x05,0x06};\n\n// Global handle used to send BLE events about the Hci driver layer.", "\nwsfHandlerId_t g_HciDrvHandleID = 0;\nwsfTimer_t g_HeartBeatTimer;\nwsfTimer_t g_WakeTimer;\n\n// Buffers for HCI write data.", "\nhci_drv_write_t g_psWriteBuffers[NUM_HCI_WRITE_BUFFERS];\nam_hal_queue_t g_sWriteQueue;\n\n// Buffers for HCI read data.", "\nuint32_t g_pui32ReadBuffer[HCI_DRV_MAX_RX_PACKET / 4];\nuint8_t *g_pui8ReadBuffer = (uint8_t *) g_pui32ReadBuffer;\nvolatile bool bReadBufferInUse = false;\n\nuint32_t g_ui32NumBytes = 0;\nuint32_t g_consumed_bytes = 0;\n\n// Counters for tracking read data.", "\nvolatile uint32_t g_ui32InterruptsSeen = 0;\n\nvoid HciDrvEmptyWriteQueue(void);\n//*****************************************************************************\n//\n// Forward declarations for HCI callbacks.", "\n//\n//*****************************************************************************\n#if USE_NONBLOCKING_HCI\nvoid hciDrvWriteCallback(uint8_t *pui8Data, uint32_t ui32Length, void *pvContext);\nvoid hciDrvReadCallback(uint8_t *pui8Data, uint32_t ui32Length, void *pvContext);\n#endif // USE_NONBLOCKING_HCI\n\n//*****************************************************************************\n//\n// Events for the HCI driver interface.", "\n//\n//*****************************************************************************\n#define BLE_TRANSFER_NEEDED_EVENT 0x01\n#define BLE_HEARTBEAT_EVENT 0x02\n#define BLE_SET_WAKEUP 0x03\n\n//*****************************************************************************\n//\n// Error-handling wrapper macro.", "\n//\n//*****************************************************************************\n#define ERROR_CHECK_VOID(status) \\\n { \\\n uint32_t ui32ErrChkStatus; \\\n if (0 !", "= (ui32ErrChkStatus = (status))) \\\n { \\\n am_util_debug_printf(\"ERROR_CHECK_VOID \"#status \"\\n\"); \\\n error_check(ui32ErrChkStatus); \\\n return; \\\n } \\\n }\n\n#define ERROR_RETURN(status, retval) \\\n if ((status)) \\\n { \\\n error_check(status); \\\n return (retval); \\\n }\n\n#define ERROR_RECOVER(status) \\\n if ((status)) \\\n { \\\n am_hal_debug_gpio_toggle(BLE_DEBUG_TRACE_10); \\\n error_check(status); \\\n HciDrvRadioShutdown(); \\\n HciDrvRadioBoot(0); \\\n HciDrvEmptyWriteQueue(); \\\n DmDevReset(); \\\n return; \\\n }\n\n//*****************************************************************************\n//\n// Debug section.", "\n//\n//*****************************************************************************\n#if 0\n#define CRITICAL_PRINT(...) \\\n do \\\n { \\\n AM_CRITICAL_BEGIN; \\\n am_util_debug_printf(__VA_ARGS__); \\\n AM_CRITICAL_END; \\\n } while (0)\n#else\n#if 0\n#define CRITICAL_PRINT(...) printf(__VA_ARGS__);\n#endif\n#define CRITICAL_PRINT(...)\n#endif\n\n#define ENABLE_IRQ_PIN 0\n\n#define TASK_LEVEL_DELAYS 0\n\n\n//*****************************************************************************\n//\n// Function pointer for redirecting errors\n//\n//*****************************************************************************\nhci_drv_error_handler_t g_hciDrvErrorHandler = 0;\nstatic uint32_t g_ui32FailingStatus = 0;\n\n//*****************************************************************************\n//\n// By default, errors will be printed. ", "If there is an error handler defined,\n// they will be sent there intead.", "\n//\n//*****************************************************************************\nstatic void\nerror_check(uint32_t ui32Status)\n{\n //\n // Don't do anything unless there's an error.", "\n //\n if (ui32Status)\n {\n //\n // Set the global error status. ", "If there's an error handler function,\n // call it. ", "Otherwise, just print the error status and wait.", "\n //\n g_ui32FailingStatus = ui32Status;\n\n if (g_hciDrvErrorHandler)\n {\n g_hciDrvErrorHandler(g_ui32FailingStatus);\n }\n else\n {\n CRITICAL_PRINT(\"Error detected: 0x%08x\\n\", g_ui32FailingStatus);\n CRITICAL_PRINT(\"BSTATUS: 0x%08x\\n\", BLEIF->BSTATUS);\n }\n }\n}\n\n//*****************************************************************************\n//\n// Other useful macros.", "\n//\n//*****************************************************************************\n\n#define BLE_IRQ_CHECK() (BLEIF->BSTATUS_b.", "BLEIRQ)\n\n// Ellisys HCI SPI tapping support\n\n// #define ELLISYS_HCI_LOG_SUPPORT 1\n\n//*****************************************************************************\n//\n// Boot the radio.", "\n//\n//*****************************************************************************\nvoid\nHciDrvRadioBoot(bool bColdBoot)\n{\n uint32_t ui32NumXtalRetries = 0;\n\n\n g_ui32NumBytes = 0;\n g_consumed_bytes = 0;\n#if !", "defined(AM_DEBUG_BLE_TIMING) && defined(ELLISYS_HCI_LOG_SUPPORT)\n am_hal_gpio_pincfg_t pincfg = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0};\n pincfg.uFuncSel = 6;\n am_hal_gpio_pinconfig(30, pincfg);\n am_hal_gpio_pinconfig(31, pincfg);\n am_hal_gpio_pinconfig(32, pincfg);\n pincfg.uFuncSel = 4;\n am_hal_gpio_pinconfig(33, pincfg);\n pincfg.uFuncSel = 7;\n am_hal_gpio_pinconfig(35, pincfg);\n#endif\n\n#ifdef AM_DEBUG_BLE_TIMING\n //\n // Enable debug pins.", "\n //\n // 30.6 - SCLK\n // 31.6 - MISO\n // 32.6 - MOSI\n // 33.4 - CSN\n // 35.7 - SPI_STATUS\n //\n am_hal_gpio_pincfg_t pincfg = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0};\n pincfg.uFuncSel = 6;\n am_hal_gpio_pinconfig(30, pincfg);\n am_hal_gpio_pinconfig(31, pincfg);\n am_hal_gpio_pinconfig(32, pincfg);\n pincfg.uFuncSel = 4;\n am_hal_gpio_pinconfig(33, pincfg);\n pincfg.uFuncSel = 7;\n am_hal_gpio_pinconfig(35, pincfg);\n pincfg.uFuncSel = 1;\n#if ENABLE_IRQ_PIN\n am_hal_gpio_pinconfig(41, pincfg);\n am_hal_debug_gpio_pinconfig(BLE_DEBUG_TRACE_08);\n#endif\n\n am_hal_gpio_pinconfig(11, g_AM_HAL_GPIO_OUTPUT);\n\n#endif // AM_DEBUG_BLE_TIMING\n\n //\n // This pin is also used to generate BLE interrupts in the current\n // implementation.", "\n //\n // 41.1 - BLE IRQ\n //\n //am_hal_gpio_pin_config(41, AM_HAL_GPIO_FUNC(1));\n\n\n //\n // Configure and enable the BLE interface.", "\n //\n uint32_t ui32Status = AM_HAL_STATUS_FAIL;\n while (ui32Status !", "= AM_HAL_STATUS_SUCCESS)\n {\n ERROR_CHECK_VOID(am_hal_ble_initialize(0, &BLE));\n ERROR_CHECK_VOID(am_hal_ble_power_control(BLE, AM_HAL_BLE_POWER_ACTIVE));\n\n am_hal_ble_config_t sBleConfig =\n {\n // Configure the HCI interface clock for 6 MHz\n .ui32SpiClkCfg = AM_HAL_BLE_HCI_CLK_DIV8,\n\n // Set HCI read and write thresholds to 32 bytes each.", "\n .ui32ReadThreshold = 32,\n .ui32WriteThreshold = 32,\n\n // The MCU will supply the clock to the BLE core.", "\n .ui32BleClockConfig = AM_HAL_BLE_CORE_MCU_CLK,\n#if 0\n // Default settings for expected BLE clock drift (measured in PPM).", "\n .ui32ClockDrift = 0,\n .ui32SleepClockDrift = 50,\n\n // Default setting - AGC Enabled\n .bAgcEnabled = true,\n\n // Default setting - Sleep Algo enabled\n .bSleepEnabled = true,\n#endif\n // Apply the default patches when am_hal_ble_boot() is called.", "\n .bUseDefaultPatches = true,\n };\n\n ERROR_CHECK_VOID(am_hal_ble_config(BLE, &sBleConfig));\n //\n // Delay 1s for 32768Hz clock stability. ", "This isn't required unless this is\n // our first run immediately after a power-up.", "\n //\n if ( bColdBoot )\n {\n am_util_delay_ms(1000);\n }\n //\n // Attempt to boot the radio.", "\n //\n ui32Status = am_hal_ble_boot(BLE);\n\n //\n // Check our status.", "\n //\n if (ui32Status == AM_HAL_STATUS_SUCCESS)\n {\n //\n // If the radio is running, we can exit this loop.", "\n //\n break;\n }\n else if (ui32Status == AM_HAL_BLE_32K_CLOCK_UNSTABLE)\n {\n //\n // If the radio is running, but the clock looks bad, we can try to\n // restart.", "\n //\n ERROR_CHECK_VOID(am_hal_ble_power_control(BLE, AM_HAL_BLE_POWER_OFF));\n ERROR_CHECK_VOID(am_hal_ble_deinitialize(BLE));\n\n //\n // We won't restart forever. ", "After we hit the maximum number of\n // retries, we'll just return with failure.", "\n //\n if (ui32NumXtalRetries++ < HCI_DRV_MAX_XTAL_RETRIES)\n {\n am_util_delay_ms(1000);\n }\n else\n {\n return;\n }\n }\n else\n {\n ERROR_CHECK_VOID(am_hal_ble_power_control(BLE, AM_HAL_BLE_POWER_OFF));\n ERROR_CHECK_VOID(am_hal_ble_deinitialize(BLE));\n //\n // If the radio failed for some reason other than 32K Clock\n // instability, we should just report the failure and return.", "\n //\n error_check(ui32Status);\n return;\n }\n }\n\n //\n // Set the BLE TX Output power to 0dBm.", "\n //\n am_hal_ble_tx_power_set(BLE, 0x8);\n\n //\n // Enable interrupts for the BLE module.", "\n //\n#if USE_NONBLOCKING_HCI\n am_hal_ble_int_clear(BLE, (AM_HAL_BLE_INT_CMDCMP |\n AM_HAL_BLE_INT_DCMP |\n AM_HAL_BLE_INT_BLECIRQ |\n AM_HAL_BLE_INT_BLECSSTAT));\n\n am_hal_ble_int_enable(BLE, (AM_HAL_BLE_INT_CMDCMP |\n AM_HAL_BLE_INT_DCMP |\n AM_HAL_BLE_INT_BLECIRQ |\n AM_HAL_BLE_INT_BLECSSTAT));\n\n#if SKIP_FALLING_EDGES\n#else\n if (APOLLO3_GE_B0)\n {\n am_hal_ble_int_clear(BLE, (AM_HAL_BLE_INT_BLECIRQN |\n AM_HAL_BLE_INT_BLECSSTATN));\n\n am_hal_ble_int_enable(BLE, (AM_HAL_BLE_INT_BLECIRQN |\n AM_HAL_BLE_INT_BLECSSTATN));\n }\n#endif\n\n#else\n\n am_hal_ble_int_clear(BLE, (AM_HAL_BLE_INT_CMDCMP |\n AM_HAL_BLE_INT_DCMP |\n AM_HAL_BLE_INT_BLECIRQ));\n\n am_hal_ble_int_enable(BLE, (AM_HAL_BLE_INT_CMDCMP |\n AM_HAL_BLE_INT_DCMP |\n AM_HAL_BLE_INT_BLECIRQ));\n#endif\n\n CRITICAL_PRINT(\"INTEN: %d\\n\", BLEIF->INTEN_b.", "BLECSSTAT);\n CRITICAL_PRINT(\"INTENREG: %d\\n\", BLEIF->INTEN);\n\n NVIC_EnableIRQ(BLE_IRQn);\n\n //\n // Initialize a queue to help us keep track of HCI write buffers.", "\n //\n am_hal_queue_from_array(&g_sWriteQueue, g_psWriteBuffers);\n\n //WsfSetEvent(g_HciDrvHandleID, BLE_HEARTBEAT_EVENT);\n //\n // Reset the RX interrupt counter.", "\n //\n g_ui32InterruptsSeen = 0;\n\n return;\n}\n\n//*****************************************************************************\n//\n// Shut down the BLE core.", "\n//\n//*****************************************************************************\nvoid\nHciDrvRadioShutdown(void)\n{\n BLE_HEARTBEAT_STOP();\n\n NVIC_DisableIRQ(BLE_IRQn);\n\n ERROR_CHECK_VOID(am_hal_ble_power_control(BLE, AM_HAL_BLE_POWER_OFF));\n\n while ( PWRCTRL->DEVPWREN_b.", "PWRBLEL )\n {\n }\n\n ERROR_CHECK_VOID(am_hal_ble_deinitialize(BLE));\n\n g_ui32NumBytes = 0;\n g_consumed_bytes = 0;\n}\n\n#if USE_NONBLOCKING_HCI\n//*****************************************************************************\n//\n// Short Description.", "\n//\n//*****************************************************************************\nstatic void\nupdate_wake(void)\n{\n AM_CRITICAL_BEGIN;\n\n //\n // We want to set WAKE if there's something in the write queue, but not if\n // SPISTATUS or IRQ is high.", "\n //\n if ( !", "am_hal_queue_empty(&g_sWriteQueue) &&\n (BLEIFn(0)->BSTATUS_b.", "SPISTATUS == 0) &&\n (BLE_IRQ_CHECK() == false))\n {\n am_hal_ble_wakeup_set(BLE, 1);\n\n //\n // If we've set wakeup, but IRQ came up at the same time, we should\n // just lower WAKE again.", "\n //\n if (BLE_IRQ_CHECK() == true)\n {\n am_hal_ble_wakeup_set(BLE, 0);\n }\n }\n\n AM_CRITICAL_END;\n}\n#endif\n\n//*****************************************************************************\n//\n// Function used by the BLE stack to send HCI messages to the BLE controller.", "\n//\n// Internally, the Cordio BLE stack will allocate memory for an HCI message,\n//\n//*****************************************************************************\nuint16_t\nap3_hciDrvWrite(uint8_t type, uint16_t len, uint8_t *pData)\n{\n uint8_t *pui8Wptr;\n hci_drv_write_t *psWriteBuffer;\n\n\n //\n // Check to see if we still have buffer space.", "\n //\n if (am_hal_queue_full(&g_sWriteQueue))\n {\n CRITICAL_PRINT(\"ERROR: Ran out of HCI transmit queue slots.\\n\");\n ERROR_RETURN(HCI_DRV_TRANSMIT_QUEUE_FULL, len);\n }\n\n if (len > (HCI_DRV_MAX_TX_PACKET-1)) // comparison compensates for the type byte at index 0.", "\n {\n CRITICAL_PRINT(\"ERROR: Trying to send an HCI packet larger than the hci driver buffer size (needs %d bytes of space).\\n\",\n len);\n\n ERROR_RETURN(HCI_DRV_TX_PACKET_TOO_LARGE, len);\n }\n\n //\n // Get a pointer to the next item in the queue.", "\n //\n psWriteBuffer = am_hal_queue_next_slot(&g_sWriteQueue);\n\n //\n // Set all of the fields in the hci write structure.", "\n //\n psWriteBuffer->ui32Length = len + 1;\n\n pui8Wptr = (uint8_t *) psWriteBuffer->pui32Data;\n\n *pui8Wptr++ = type;\n\n for (uint32_t i = 0; i < len; i++)\n {\n pui8Wptr[i] = pData[i];\n }\n\n //\n // Advance the queue.", "\n //\n am_hal_queue_item_add(&g_sWriteQueue, 0, 1);\n\n#if USE_NONBLOCKING_HCI\n //\n // Wake up the BLE controller.", "\n //\n CRITICAL_PRINT(\"INFO: HCI write requested.\\n\");\n\n update_wake();\n\n#else\n //\n // Send an event to the BLE transfer handler function.", "\n //\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n#endif\n\n#ifdef AM_CUSTOM_BDADDR\n if (type == HCI_CMD_TYPE)\n {\n uint16_t opcode;\n BYTES_TO_UINT16(opcode, pData);\n\n if (HCI_OPCODE_RESET == opcode)\n {\n\n extern uint8_t g_BLEMacAddress[6];\n am_hal_mcuctrl_device_t sDevice;\n am_hal_mcuctrl_info_get(AM_HAL_MCUCTRL_INFO_DEVICEID, &sDevice);\n g_BLEMacAddress[0] = sDevice.ui32ChipID0;\n g_BLEMacAddress[1] = sDevice.ui32ChipID0 >> 8;\n g_BLEMacAddress[2] = sDevice.ui32ChipID0 >> 16;\n\n HciVendorSpecificCmd(0xFC32, 6, g_BLEMacAddress);\n }\n }\n#endif\n\n return len;\n}\n\n//*****************************************************************************\n//\n// Save the handler ID of the HciDrvHandler so we can send it events through\n// the WSF task system.", "\n//\n// Note: These two lines need to be added to the exactle initialization\n// function at the beginning of all Cordio applications:\n//\n// handlerId = WsfOsSetNextHandler(HciDrvHandler);\n// HciDrvHandler(handlerId);\n//\n//*****************************************************************************\nvoid\nHciDrvHandlerInit(wsfHandlerId_t handlerId)\n{\n g_HciDrvHandleID = handlerId;\n\n g_HeartBeatTimer.handlerId = handlerId;\n g_HeartBeatTimer.msg.event = BLE_HEARTBEAT_EVENT;\n\n g_WakeTimer.handlerId = handlerId;\n g_WakeTimer.msg.event = BLE_SET_WAKEUP;\n}\n\n//*****************************************************************************\n//\n// Simple interrupt handler to call\n//\n// Note: These two lines need to be added to the exactle initialization\n// function at the beginning of all Cordio applications:\n//\n// handlerId = WsfOsSetNextHandler(HciDrvHandler);\n// HciDrvHandler(handlerId);\n//\n//*****************************************************************************\nvoid\nHciDrvIntService(void)\n{\n#if AM_DEBUG_BLE_TIMING\n am_hal_gpio_state_write(11, AM_HAL_GPIO_OUTPUT_SET);\n#endif\n\n //\n // Read and clear the interrupt status.", "\n //\n uint32_t ui32Status = am_hal_ble_int_status(BLE, true);\n am_hal_ble_int_clear(BLE, ui32Status);\n\n#if USE_NONBLOCKING_HCI\n //\n // Handle any DMA or Command Complete interrupts.", "\n //\n am_hal_ble_int_service(BLE, ui32Status);\n\n //\n // If this was a BLEIRQ interrupt, attempt to start a read operation. ", "If it\n // was a STATUS interrupt, start a write operation.", "\n //\n if (ui32Status & AM_HAL_BLE_INT_BLECIRQ)\n {\n // CRITICAL_PRINT(\"INFO: IRQ INTERRUPT\\n\");\n\n //\n // Lower WAKE\n //\n //WsfTimerStop(&g_WakeTimer);\n // CRITICAL_PRINT(\"IRQ Drop\\n\");\n am_hal_ble_wakeup_set(BLE, 0);\n\n //\n // Prepare to read a message.", "\n //\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n }\n else if (ui32Status & AM_HAL_BLE_INT_BLECSSTAT)\n {\n // CRITICAL_PRINT(\"INFO: STATUS INTERRUPT\\n\");\n\n //\n // Check the queue and send the first message we have.", "\n //\n if ( !", "am_hal_queue_empty(&g_sWriteQueue) )\n {\n uint32_t ui32WriteStatus = 0;\n\n hci_drv_write_t *psWriteBuffer = am_hal_queue_peek(&g_sWriteQueue);\n\n ui32WriteStatus =\n am_hal_ble_nonblocking_hci_write(BLE,\n AM_HAL_BLE_RAW,\n psWriteBuffer->pui32Data,\n psWriteBuffer->ui32Length,\n hciDrvWriteCallback,\n 0);\n\n //\n // If it succeeded, we can pop the queue.", "\n //\n if (ui32WriteStatus == AM_HAL_STATUS_SUCCESS)\n {\n BLE_HEARTBEAT_RESTART();\n // CRITICAL_PRINT(\"INFO: HCI write sent.\\n\");\n }\n else\n {\n // CRITICAL_PRINT(\"INFO: HCI write failed: %d\\n\", ui32WriteStatus);\n }\n }\n }\n\n#else\n //\n // Advance an event counter to make sure we're keeping track of edges\n // correctly.", "\n //\n g_ui32InterruptsSeen++;\n\n //\n // Send an event to get processed in the HCI handler.", "\n //\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n#endif\n\n#if AM_DEBUG_BLE_TIMING\n am_hal_gpio_state_write(11, AM_HAL_GPIO_OUTPUT_CLEAR);\n#endif\n}\n\n#if USE_NONBLOCKING_HCI\n\n//*****************************************************************************\n//\n// This function determines what to do when a write operation completes.", "\n//\n//*****************************************************************************\nvoid\nhciDrvWriteCallback(uint8_t *pui8Data, uint32_t ui32Length, void *pvContext)\n{\n CRITICAL_PRINT(\"INFO: HCI physical write complete.\\n\");\n\n am_hal_queue_item_get(&g_sWriteQueue, 0, 1);\n\n#if TASK_LEVEL_DELAYS\n\n // Set a WSF timer to update wake later.", "\n WsfTimerStartMs(&g_WakeTimer, 30);\n\n#else // TASK_LEVEL_DELAYS\n\n while ( BLEIFn(0)->BSTATUS_b.", "SPISTATUS )\n {\n am_util_delay_us(5);\n }\n\n //\n // Check the write queue, and possibly set wake again.", "\n //\n if ( !", "am_hal_queue_empty(&g_sWriteQueue) )\n {\n //\n // In this case, we need to delay before setting wake. ", "Instead of\n // delaying here, we'll post an event to do it later.", "\n //\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n }\n\n#endif // TASK_LEVEL_DELAYS\n}\n\n//*****************************************************************************\n//\n// This function determines what to do when a read operation completes.", "\n//\n//*****************************************************************************\nvoid\nhciDrvReadCallback(uint8_t *pui8Data, uint32_t ui32Length, void *pvContext)\n{\n //\n // Set a \"transfer needed\" event.", "\n //\n // CRITICAL_PRINT(\"INFO: HCI physical read complete.\\n\");\n g_ui32NumBytes = ui32Length;\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n\n#if TASK_LEVEL_DELAYS\n\n // Set a WSF timer to update wake later.", "\n WsfTimerStartMs(&g_WakeTimer, 30);\n\n#else // TASK_LEVEL_DELAYS\n\n while ( BLE_IRQ_CHECK() )\n {\n am_util_delay_us(5);\n }\n\n //\n // Check the write queue, and possibly set wake.", "\n //\n if ( !", "am_hal_queue_empty(&g_sWriteQueue) )\n {\n am_hal_ble_wakeup_set(BLE, 1);\n }\n\n#endif // TASK_LEVEL_DELAYS\n}\n\n//*****************************************************************************\n//\n// Event handler for HCI-related events.", "\n//\n// This handler can perform HCI reads or writes, and keeps the actions in the\n// correct order.", "\n//\n//*****************************************************************************\nvoid\nHciDrvHandler(wsfEventMask_t event, wsfMsgHdr_t *pMsg)\n{\n uint32_t ui32ErrorStatus;\n \n //\n // If this handler was called in response to a heartbeat event, then it's\n // time to run a benign HCI command. ", "Normally, the BLE controller should\n // handle this command without issue. ", "If it doesn't acknowledge the\n // command, we will eventually get an HCI command timeout error, which will\n // alert us to the fact that the BLE core has become unresponsive in\n // general.", "\n //\n if (pMsg->event == BLE_HEARTBEAT_EVENT)\n {\n HciReadLocalVerInfoCmd();\n BLE_HEARTBEAT_START();\n return;\n }\n\n if (pMsg->event == BLE_SET_WAKEUP)\n {\n //\n // Attempt to set WAKE again.", "\n //\n update_wake();\n return;\n }\n\n //\n // Check to see if we read any bytes over the HCI interface that we haven't\n // already sent to the BLE stack.", "\n //\n if (g_ui32NumBytes > g_consumed_bytes)\n {\n CRITICAL_PRINT(\"INFO: HCI data transferred to stack.\\n\");\n //\n // If we have any bytes saved, we should send them to the BLE stack\n // now.", "\n //\n CordioHCITransportDriver_on_data_received(g_pui8ReadBuffer + g_consumed_bytes,\n g_ui32NumBytes - g_consumed_bytes);\n g_consumed_bytes = g_ui32NumBytes;\n //g_consumed_bytes += hciTrSerialRxIncoming(g_pui8ReadBuffer + g_consumed_bytes,\n // g_ui32NumBytes - g_consumed_bytes);\n\n //\n // If the stack doesn't accept all of the bytes we had, we will need to\n // keep the event set and come back later. ", "Otherwise, we can just reset\n // our variables and exit the loop.", "\n //\n if (g_consumed_bytes !", "= g_ui32NumBytes)\n {\n CRITICAL_PRINT(\"INFO: HCI data split up.\\n\");\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n return;\n }\n else\n {\n CRITICAL_PRINT(\"INFO: HCI RX packet complete.\\n\");\n g_ui32NumBytes = 0;\n g_consumed_bytes = 0;\n bReadBufferInUse = false;\n }\n }\n\n if ( BLE_IRQ_CHECK() )\n {\n if (bReadBufferInUse == true)\n {\n CRITICAL_PRINT(\"Read buffer already in use.\\n\");\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n return;\n }\n\n //\n // If the stack has used up all of the saved data we've accumulated so\n // far, we should check to see if we need to read any *new* data.", "\n //\n CRITICAL_PRINT(\"INFO: HCI Read started.\\n\");\n bReadBufferInUse = true;\n ui32ErrorStatus = am_hal_ble_nonblocking_hci_read(BLE,\n g_pui32ReadBuffer,\n hciDrvReadCallback,\n 0);\n\n BLE_HEARTBEAT_RESTART();\n\n if (g_ui32NumBytes > HCI_DRV_MAX_RX_PACKET)\n {\n CRITICAL_PRINT(\"ERROR: Trying to receive an HCI packet \"\n \"larger than the hci driver buffer size \"\n \"(needs %d bytes of space).\\n\",\n g_ui32NumBytes);\n\n ERROR_CHECK_VOID(HCI_DRV_RX_PACKET_TOO_LARGE);\n }\n\n if (ui32ErrorStatus !", "= AM_HAL_STATUS_SUCCESS)\n {\n //\n // If the read didn't succeed for some physical reason, we need\n // to know. ", "We shouldn't get failures here. ", "We checked the IRQ\n // signal before calling the read function, and this driver\n // only contains a single call to the blocking read function,\n // so there shouldn't be any physical reason for the read to\n // fail.", "\n //\n CRITICAL_PRINT(\"HCI READ failed with status %d. \"\n \"Try recording with a logic analyzer \"\n \"to catch the error.\\n\",\n ui32ErrorStatus);\n\n ERROR_RECOVER(ui32ErrorStatus);\n }\n }\n}\n#else\n//*****************************************************************************\n//\n// Event handler for HCI-related events.", "\n//\n// This handler can perform HCI reads or writes, and keeps the actions in the\n// correct order.", "\n//\n//*****************************************************************************\nvoid\nHciDrvHandler(wsfEventMask_t event, wsfMsgHdr_t *pMsg)\n{\n uint32_t ui32ErrorStatus, ui32TxRetries = 0;\n uint32_t ui32NumHciTransactions = 0;\n uint32_t read_hci_packet_count = 0;\n\n //\n // If this handler was called in response to a heartbeat event, then it's\n // time to run a benign HCI command. ", "Normally, the BLE controller should\n // handle this command without issue. ", "If it doesn't acknowledge the\n // command, we will eventually get an HCI command timeout error, which will\n // alert us to the fact that the BLE core has become unresponsive in\n // general.", "\n //\n if (pMsg->event == BLE_HEARTBEAT_EVENT)\n {\n HciReadLocalVerInfoCmd();\n BLE_HEARTBEAT_START();\n return;\n }\n\n //\n // Check to see if we read any bytes over the HCI interface that we haven't\n // already sent to the BLE stack.", "\n //\n if (g_ui32NumBytes > g_consumed_bytes)\n {\n //\n // If we have any bytes saved, we should send them to the BLE stack\n // now.", "\n //\n CordioHCITransportDriver_on_data_received(g_pui8ReadBuffer + g_consumed_bytes,\n g_ui32NumBytes - g_consumed_bytes);\n g_consumed_bytes = g_ui32NumBytes;\n // g_consumed_bytes += hciTrSerialRxIncoming(g_pui8ReadBuffer + g_consumed_bytes,\n // g_ui32NumBytes - g_consumed_bytes);\n\n //\n // If the stack doesn't accept all of the bytes we had,\n //\n if (g_consumed_bytes !", "= g_ui32NumBytes)\n {\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n return;\n }\n else\n {\n g_ui32NumBytes = 0;\n g_consumed_bytes = 0;\n }\n }\n\n am_hal_debug_gpio_set(BLE_DEBUG_TRACE_01);\n\n //\n // Loop indefinitely, checking to see if there are still tranfsers we need\n // to complete.", "\n //\n while (ui32NumHciTransactions++ < HCI_DRV_MAX_HCI_TRANSACTIONS)\n {\n //\n // Figure out what kind of transfer the BLE core will accept.", "\n //\n if ( BLE_IRQ_CHECK() )\n {\n uint32_t ui32OldInterruptsSeen = g_ui32InterruptsSeen;\n\n am_hal_debug_gpio_set(BLE_DEBUG_TRACE_02);\n\n BLE_HEARTBEAT_RESTART();\n\n //\n // Is the BLE core asking for a read? ", "If so, do that now.", "\n //\n g_ui32NumBytes = 0;\n ui32ErrorStatus = am_hal_ble_blocking_hci_read(BLE, (uint32_t*)g_pui32ReadBuffer, &g_ui32NumBytes);\n\n if (g_ui32NumBytes > HCI_DRV_MAX_RX_PACKET)\n {\n CRITICAL_PRINT(\"ERROR: Trying to receive an HCI packet larger than the hci driver buffer size (needs %d bytes of space).\",", "\n g_ui32NumBytes);\n\n ERROR_CHECK_VOID(HCI_DRV_RX_PACKET_TOO_LARGE);\n }\n\n if ( ui32ErrorStatus == AM_HAL_STATUS_SUCCESS)\n {\n\n //\n // If the read succeeded, we need to wait for the IRQ signal to\n // go back down. ", "If we don't we might inadvertently try to read\n // the same packet twice.", "\n //\n uint32_t ui32IRQRetries;\n for (ui32IRQRetries = 0; ui32IRQRetries < HCI_DRV_MAX_IRQ_TIMEOUT; ui32IRQRetries++)\n {\n if (BLE_IRQ_CHECK() == 0 || g_ui32InterruptsSeen !", "= ui32OldInterruptsSeen)\n {\n break;\n }\n\n am_util_delay_us(1);\n }\n\n //\n // Pass the data along to the stack. ", "The stack should be able\n // to read as much data as we send it. ", " If it can't, we need to\n // know that.", "\n //\n\n CordioHCITransportDriver_on_data_received(g_pui8ReadBuffer, g_ui32NumBytes);\n g_consumed_bytes = g_ui32NumBytes;\n\t\t\t\t// g_consumed_bytes = hciTrSerialRxIncoming(g_pui8ReadBuffer, g_ui32NumBytes);\n if (g_consumed_bytes !", "= g_ui32NumBytes)\n {\n\n // need to come back again\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n // take a break now\n\n // worst case disable BLE_IRQ\n break;\n }\n\n g_ui32NumBytes = 0;\n g_consumed_bytes = 0;\n\n read_hci_packet_count++;\n }\n else\n {\n //\n // If the read didn't succeed for some physical reason, we need\n // to know. ", "We shouldn't get failures here. ", "We checked the IRQ\n // signal before calling the read function, and this driver\n // only contains a single call to the blocking read function,\n // so there shouldn't be any physical reason for the read to\n // fail.", "\n //\n CRITICAL_PRINT(\"HCI READ failed with status %d. Try recording with a logic analyzer to catch the error.\\n\",\n ui32ErrorStatus);\n\n ERROR_RECOVER(ui32ErrorStatus);\n }\n\n am_hal_debug_gpio_clear(BLE_DEBUG_TRACE_02);\n\n if (read_hci_packet_count >= HCI_DRV_MAX_READ_PACKET)\n {\n // It looks like there's time that we won't get interrupt even though\n // there's packet waiting for host to grab.", "\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n\n break;\n }\n\n }\n else\n {\n //\n // If we don't have anything to read, we can start checking to see\n // if we have things to write.", "\n //\n if (am_hal_queue_empty(&g_sWriteQueue))\n {\n //\n // If not, we're done!", "\n //\n break;\n }\n else\n {\n //\n // If we do have something to write, just pop a single item\n // from the queue and send it.", "\n //\n am_hal_debug_gpio_set(BLE_DEBUG_TRACE_07);\n hci_drv_write_t *psWriteBuffer = am_hal_queue_peek(&g_sWriteQueue);\n\n ui32ErrorStatus = am_hal_ble_blocking_hci_write(BLE,\n AM_HAL_BLE_RAW,\n psWriteBuffer->pui32Data,\n psWriteBuffer->ui32Length);\n\n //\n // If we managed to actually send a packet, we can go ahead and\n // advance the queue.", "\n //\n if (ui32ErrorStatus == AM_HAL_STATUS_SUCCESS)\n {\n //\n // Restart the heartbeat timer.", "\n //\n BLE_HEARTBEAT_RESTART();\n\n am_hal_queue_item_get(&g_sWriteQueue, 0, 1);\n\n ui32TxRetries = 0;\n // Resetting the cumulative count\n ui32NumHciTransactions = 0;\n }\n else\n {\n //\n // If we fail too many times in a row, we should throw an\n // error to avoid a lock-up.", "\n //\n ui32TxRetries++;\n\n if (ui32TxRetries > HCI_DRV_MAX_TX_RETRIES)\n {\n // we need to come back again later.", "\n WsfSetEvent(g_HciDrvHandleID, BLE_TRANSFER_NEEDED_EVENT);\n break;\n }\n }\n\n }\n }\n }\n\n if (ui32NumHciTransactions == HCI_DRV_MAX_HCI_TRANSACTIONS)\n {\n CRITICAL_PRINT(\"ERROR: Maximum number of successive HCI transactions exceeded.\\n\");\n ERROR_RECOVER(HCI_DRV_TOO_MANY_PACKETS);\n }\n\n am_hal_debug_gpio_clear(BLE_DEBUG_TRACE_01);\n}\n#endif\n\n//*****************************************************************************\n//\n// Register an error handler for the HCI driver.", "\n//\n//*****************************************************************************\nvoid\nHciDrvErrorHandlerSet(hci_drv_error_handler_t pfnErrorHandler)\n{\n g_hciDrvErrorHandler = pfnErrorHandler;\n}\n\n/*************************************************************************************************/\n/*!", "\n * \\fn HciVsA3_SetRfPowerLevelEx\n *\n * \\brief Vendor specific command for settting Radio transmit power level\n * for Nationz.", "\n *\n * \\param txPowerlevel valid range from 0 to 15 in decimal.", "\n *\n * \\return true when success, otherwise false\n */\n/*************************************************************************************************/\nbool_t\nHciVsA3_SetRfPowerLevelEx(txPowerLevel_t txPowerlevel)\n{\n switch (txPowerlevel) {\n\n case TX_POWER_LEVEL_MINUS_10P0_dBm:\n am_hal_ble_tx_power_set(BLE,0x04);\n return true;\n break;\n case TX_POWER_LEVEL_0P0_dBm:\n am_hal_ble_tx_power_set(BLE,0x08);\n return true;\n break;\n case TX_POWER_LEVEL_PLUS_3P0_dBm:\n am_hal_ble_tx_power_set(BLE,0x0F);\n return true;\n break;\n default:\n return false;\n break;\n }\n}\n\n/*************************************************************************************************/\n/*!", "\n * \\fn HciDrvBleSleepSet\n *\n * \\brief Set BLE sleep enable/disable for the BLE core.", "\n *\n * \\param enable 'true' set sleep enable, 'false' set sleep disable\n *\n * \\return none\n */\n/*************************************************************************************************/\nvoid\nHciDrvBleSleepSet(bool enable)\n{\n am_hal_ble_sleep_set(BLE, enable);\n}\n\n//*****************************************************************************\n//\n// Clear the HCI write queue\n//\n//*****************************************************************************\nvoid\nHciDrvEmptyWriteQueue(void)\n{\n am_hal_queue_from_array(&g_sWriteQueue, g_psWriteBuffers);\n}\n\n#endif\n" ]
{ "pile_set_name": "Github" }
[ 0.7898184657096863, 0.0015657346230000257, 0.008963900618255138, 0.0006606772658415139, 0.0364517979323864, 0.0006111454567871988, 0.0005977590917609632, 0.0014022699324414134, 0.0005818584468215704, 0.0014208853244781494, 0.0006705927080474794, 0.0006203103112056851, 0.0005943372379988432, 0.0007786905043758452, 0.0007602053810842335, 0.018140463158488274, 0.03760397434234619, 0.0006704505067318678, 0.0005806548288092017, 0.06855370104312897, 0.05452986806631088, 0.003183344379067421, 0.01926688849925995, 0.01603645086288452, 0.006214153487235308, 0.0022558148484677076, 0.001093024155125022, 0.009458686225116253, 0.012205694802105427, 0.008936277590692043, 0.08299174904823303, 0.15819422900676727, 0.018433958292007446, 0.2226719707250595, 0.0007141988608054817, 0.05427847057580948, 0.0008174505201168358, 0.0008166556362994015, 0.0007580322562716901, 0.011345223523676395, 0.14624248445034027, 0.029665272682905197, 0.08889131993055344, 0.015939094126224518, 0.038863614201545715, 0.0012328886659815907, 0.004677455872297287, 0.0008462551049888134, 0.0007343447068706155, 0.0007965476834215224, 0.003503834828734398, 0.0010964411776512861, 0.0007581424433737993, 0.0026559894904494286, 0.0008364568348042667, 0.0006841876893304288, 0.0025662051048129797, 0.001039656694047153, 0.01156063936650753, 0.0011644790647551417, 0.001173535012640059, 0.0008019605884328485, 0.0017984965816140175, 0.000809360935818404, 0.000902067928109318, 0.5872285962104797, 0.01108760479837656, 0.017711834982037544, 0.02625436708331108, 0.0016999332001432776, 0.0013504003873094916, 0.0019241808913648129, 0.020474201068282127, 0.0041463952511549, 0.0007474924786947668, 0.00103742943610996, 0.0008045534486882389, 0.006631682626903057, 0.003612668253481388, 0.0008015629136934876, 0.006406744010746479, 0.005728706251829863, 0.0011531178606674075, 0.0013671746710315347, 0.0023752294946461916, 0.0010254981461912394, 0.000913672149181366, 0.0016999332001432776, 0.010943272151052952, 0.0008527758182026446, 0.0009393065120093524, 0.010637741535902023, 0.006081870291382074, 0.001010615611448884, 0.0008922087145037949, 0.0016999332001432776, 0.0006634191377088428, 0.0006061366875655949, 0.0039185103960335255, 0.014717664569616318, 0.0008365006651729345, 0.0008476165821775794, 0.0016999332001432776, 0.013393169268965721, 0.000695898022968322, 0.006141520105302334, 0.0007249908521771431, 0.0006810292252339423, 0.0012399577535688877, 0.0007572788745164871, 0.0008067556191235781, 0.0013039675541222095, 0.0006414280505850911, 0.002709166146814823, 0.0009756887448020279, 0.0011307988315820694, 0.0005823877290822566, 0.0011313181603327394, 0.0007627916638739407, 0.009789652191102505, 0.000695898022968322, 0.005003032274544239, 0.0007249908521771431, 0.0006810292252339423, 0.0006956453435122967, 0.000989840948022902, 0.002984092803671956, 0.0011961192358285189, 0.0006619768682867289, 0.0009448896162211895, 0.0011847318382933736, 0.0013458725297823548, 0.0009331332403235137, 0.0005705628427676857, 0.002511866157874465, 0.0008793326560407877, 0.0006112252594903111, 0.0006366276065818965, 0.0036654339637607336, 0.0013127557467669249, 0.0011313181603327394, 0.0007627916638739407, 0.0009340863907709718, 0.0006966982618905604, 0.001027729013003409, 0.001740977168083191, 0.0010631942423060536, 0.0007551353191956878, 0.0026380533818155527, 0.0008551181526854634, 0.005457524675875902, 0.19451837241649628, 0.001726983580738306, 0.0007692702929489315, 0.03602125123143196, 0.012633208185434341, 0.14638765156269073 ]
0.020751
157
[ "Q:\n\nLaravel sqlite3 Eloquent searching database table for specific keyword\n\nHow would I go about searching my database using a keyword that was inputted by the user, and then displaying the most relevant results on another page?", "\nThe code I supplied down below just gives my a blank page, I first assumed this was simply because I had nothing in my database but when I checked there was an input with that keyword.", "\nMy search function:\npublic function searchUsers()\n{\n $searchWord = Input::get('searchBox');\n\n return View::make('user.search')->with('users', User::where('fullname', 'LIKE', '%'. ", "$searchWord .'%'));\n}\n\nThe user inputs the word in this blade form:\n{{ Form::open(array('url' => secure_url('user/searchUsers'), 'class'=>'form-group has-feedback')) }}\n<h1 style=\"font-size:55px; text-align:center;\">Search for Friendship!</h1>\n<br>\n{{ Form::text('searchBox', $value = null, array('placeholder' => 'Search', 'class'=> 'form-control input-lg','autofocus' => 'autofocus')) }}\n{{ Form::close() }}\n\nHow I display my results:\n@foreach ($users as $user)\n <div id=\"commentPanel\"class=\"panel panel-default\">\n <div class=\"panel-heading\">{{ $user->fullname }}</div>\n <div class=\"panel-body\">\n <p id=\"commentP\">{{ $user->email }}</p>\n </div>\n</div>\n\nA:\n\nWell you are not returning the users from database, you just set where condition to the Eloquent object which simply returns a query object. ", "Change your return statement to be like this:\nreturn View::make('user.search')\n ->with(\n 'users',\n User::where('fullname', 'LIKE', '%'. ", "$searchWord .'%')->get()\n );\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006523236515931785, 0.0005472468328662217, 0.0007685328018851578, 0.0008194958209060133, 0.0007587025756947696, 0.0014927178854122758 ]
0.00084
6
[ "Comorbidity of substance abuse and other psychiatric disorders in acute general psychiatric admissions: a study from Lebanon.", "\nThis is the first published study from an Arab Near Eastern country to examine the comorbidity of substance abuse with other psychiatric disorders. ", "All inpatients with substance abuse/dependence (present or past) admitted to the psychiatry unit at St. George Hospital (Lebanon) between 1979 and 1992 (N = 222) constituted the study sample. ", "Of these, 64.9% were found to have comorbid psychiatric disorders with specific relations between individual substances and psychiatric diagnoses identified such as cocaine and bipolar disorder (42.1%), and cannabis and schizophrenia (44.8%). ", "Patients with no axis I disorder were predominantly heroin users, most of them having antisocial personality disorder. ", "Polydrug abuse was found among 44.9% of patients, and most of the benzodiazepine abusers belonged to this category. ", "The pattern of comorbidity of psychiatric and substance use disorders in this Near East inpatient population compares well with findings from the Western hemisphere: cultural factors (including war) do not seem to have much of an effect on the different forms of dual diagnoses. ", "This adds weight to the already existing literature on the need for careful psychiatric assessment in the treatment of substance abuse." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0009000584832392633, 0.0010226001031696796, 0.0006704025436192751, 0.0011138549307361245, 0.05604425445199013, 0.001399031956680119, 0.0006388506735675037, 0.0007748344796709716 ]
0.00782
8
[ "1. ", "Field of the Invention\nThis invention relates generally to transducers for inducing vibrational signals in an elastic medium, and more particularly, but not by way of limitation, it relates to an improved construction for a baseplate and housing assembly for a transducer especially suitable for generating relatively high frequency seismic waves in the earth.", "\n2. ", "Description of the Prior Art\nA conventional seismic transducer of the prior art is illustrated in U.S. Pat. ", "No. ", "3,745,885 to Fair et al., ", "assigned to the assignee of the present invention. ", "The Fair et al. ", "device includes a baseplate, a reaction mass, and a double-rod-end piston disposed in a cylindrical bore of the reaction mass. ", "The lower rod end is attached to the baseplate and the upper rod end is attached to an upper frame member that is also connected to the baseplate. ", "Seismic transducers such as that shown in the apparatus of Fair et al. ", "are generally designed for operation within the range of about 2-80 cycles per second. ", "The present invention provides a housing and baseplate structure suitable for operation in a relatively higher frequency range, up to and exceeding approximately 250 cycles per second." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0009391900966875255, 0.0005411188467405736, 0.001185585861094296, 0.0007354894769378006, 0.0013785817427560687, 0.000671745918225497, 0.0006458954303525388, 0.0006821078713983297, 0.0006247849087230861, 0.0007247352041304111, 0.0008026115247048438, 0.0007088457350619137, 0.0005600033327937126 ]
0.000785
13
[ "Byline editor Peter Jukes has said he “won’t be intimidated” by a legal letter sent on behalf of Daily Mail editor Paul Dacre and two of his colleagues at Associated Newspapers.", "\n\nThe letter was issued to the website (which publishes crowd-funded journalism) by solicitors Reynolds Porter Chamberlain acting on behalf of Dacre, editor emeritus Peter Wright and head of editorial legal services Liz Hartley.", "\n\nIt demands a full retraction of “defamatory allegations” made in three news stories published online by Byline earlier this month that centre on payments by Associated Newspapers to disgraced private investigator Steve Whittamore.", "\n\nShould Google and Facebook be forced to pay publishers for content? ", "Yes, governments should intervene\n\nNo, governments should stay out of it View Results\n\nLoading ... Loading ...\n\nWhittamore was convicted in April 2005 of obtaining and disclosing information under the Data Protection Act, for which he received a conditional discharge.", "\n\nIt was later found that he supplied information, much of which was illegally obtained, to at least 305 journalists. ", "He worked for most national newspapers, but the Daily Mail and Mail on Sunday were among his biggest clients.", "\n\nDacre banned the use of all external search agencies by journalists on the Mail titles in 2007.", "\n\nThe Byline articles centre on the extent to which Mail executives knew Whittamore was breaking the law and on evidence given to the 2012 Leveson Inquiry.", "\n\nThe letter, which has been published by Byline, said: “The articles are inaccurate and highly defamatory of our clients.", "\n\n“In short, they allege that our clients deliberately suppressed evidence from the Leveson Inquiry in order to mislead the Inquiry about the real extent of Associated Newspapers Limited’s dealings with the investigator Steve Whittamore.", "\n\n“To have acted in this way would have been a contempt of the Inquiry and in the case of Ms Hartley would have amounted to serious professional misconduct.", "\n\n“The truth is that each of our clients co-operated with the Inquiry and acted with integrity. ", "None of our three clients suppressed evidence or misled the Inquiry.", "\n\n“It is extremely important to our clients that these defamatory allegations, which have already been republished by third parties, are immediately removed from your website and that the record is set straight.”", "\n\nLawyers acting for Associated Newspapers demanded the allegations be removed within 48 hours and a full retraction with individual apologies “published prominently on the top of the homepage of Byline’s website, Facebook page and Twitter feed for at least seven days”.", "\n\nThey added: “Our clients are passionately committed to press freedom and the principles underpinning the importance of preserving an unfettered and independent news media and we emphasise again that they fully respect your right to write about these matters.", "\n\n“Notwithstanding this, they cannot reasonably allow false and seriously defamatory statements about them to remain online.”", "\n\nByline has launched a campaign to raise a further £15,000 to continue its investigation into the “Whittamore files” with editor Peter Jukes telling Press Gazette there were a number of articles still to be published.", "\n\nHe said: “I stand by the accuracy of our story and the public interest of it. ", "We find it quite extraordinary that a newspaper should choose to go this route rather than demanding specific corrections or clarifications. ", "Being small we don’t have much to lose and we won’t be intimidated.", "\n\n“As a journalist, when someone doesn’t want you to look at something, it’s a great indicator to look closer.”", "\n\nByline said it gave Associated Newspapers 24 hours to respond to the allegations made in its first two “blagging scandal” stories, published on 3 and 4 March, before publishing its statement in a third story on 7 March.", "\n\nJohn Cleese, who has 5.5 million followers on Twitter, retweeted first two articles, while actor and press reform campaigner Hugh Grant and Guardian journalist Nick Davies retweeted the first.", "\n\nByline said it had not sought corrections, or referred the matter to Byline’s regulator Impress, despite a request to do so.", "\n\n“Instead they have demanded we remove these articles, apologise, or face damages,” the agency has said.", "\n\nByline said it was publishing the legal exchange, including a response from its own legal team, because it believed the matter was “in the public interest”.", "\n\nIn their reply to the legal letter, solicitors for Byline said: “Our client will not ‘publish a full retraction of the allegations complained of and an apology to each of [your] clients in words to be agreed with [you] in advance to be published prominently on the top of the home page of Byline’s website…’.", "\n\n“We also note now and for future reference your demand for a degree of prominence and publication which is much greater than usually afforded by Associated Newspapers Limited to those who are defamed in its publications.”", "\n\nOn its crowd-funding page raising money to continue its investigation, the agency said: “Every penny you donate (including processing fees) will go to fight these libel threats and fund our Investigations Team to fearlessly pursue wrongdoing.”", "\n\nAt the time of writing, Byline had raised more than £10,500 of its £15,000 target.", "\n\nPicture: Reuters" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0007244442240335047, 0.0006132658454589546, 0.0007271711365319788, 0.0008837617933750153, 0.0006516249268315732, 0.0006570422556251287, 0.0008173130918294191, 0.0007644580909982324, 0.0006217971676960588, 0.0007085185497999191, 0.0007255112868733704, 0.0020164779853075743, 0.0006287079304456711, 0.0007760359439998865, 0.0005698625463992357, 0.0007653870852664113, 0.0005705620278604329, 0.0007246037130244076, 0.0007630729814991355, 0.0006040141452103853, 0.0005602190503850579, 0.002243258524686098, 0.000589789473451674, 0.0007477934123016894, 0.0007041908684186637, 0.0006051830132491887, 0.0011529838666319847, 0.0005907529266551137, 0.0006015973631292582, 0.0005796228069812059, 0.0007819925667718053, 0.0006480442825704813, 0.0006439301650971174 ]
0.000781
33
[ "Programmable logic devices such as Field Programmable Gate Arrays (“FPGA”) and Complex Programmable Logic Devices (“CPLD”) are widely used because of their inherent speed, size, power, and flexibility advantages. ", "However, an aspect of the inherent flexibility of programmable logic is that there is a corresponding built-in hardware complexity associated with programmable logic. ", "Even though not every type of gate or interconnection is needed for any given design, a complete set of configurable logic must be provided in a configurable logic device so that a programmable logic device can be programmed to carry out any arbitrary function. ", "Accordingly, in a particular digital logic design, much of the available circuitry in a CPLD or FPGA can go unused.", "\nMany programmable logic designs employ the logical functions of counters and/or shift registers to accomplish various functions. ", "Counters can be used for several purposes, including as clock dividers, as scaling elements, for timing, and to provide time-windowing functions. ", "In one estimate, more than 50% of all designs incorporate at least one counter. ", "Shift registers are also commonly used, and have various uses including, for example, FIFO's for serial communication.", "\nIn order to build, for example, a counter or shift register (“function unit”) in programmable logic, users of programmable logic have heretofore needed to create such a function unit using programmable logic elements, such as general purpose product terms and macrocells or logic blocks that could, ideally, be used for other aspects of the digital design. ", "Accordingly, while function units can be implemented in programmable logic, when they are so implemented, much of the underlying programmable hardware is consumed by the function units, leaving reduced programmable logic for the remainder of the design, or otherwise requiring undesirably large amounts of programmable logic. ", "Programmable logic elements would ideally be used for custom aspects of a particular design, rather than for commonly recurring function units. ", "Accordingly, there is a need for programmable logic devices that provide configurable function units, such as counters and shift registers, without necessitating the use of conventional programmable logic resources to implement the configurable function units." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0005970539059489965, 0.0006016091210767627, 0.0006459570140577853, 0.0006503050099126995, 0.0006410249625332654, 0.0006278606015257537, 0.0005800994113087654, 0.0006264977273531258, 0.0006255547632463276, 0.0006027673371136189, 0.0005625852500088513, 0.000625274027697742 ]
0.000616
12
[ "A weblog of thoughtful conservative commentary on politics, culture and other signposts along the Road to Kishon\n\nWednesday, April 25, 2007\n\nRosie's Machine - To this observer, today's announcement that Rosie O'Donnell will no longer befoul the set of \"The View\" with her repugnant presence came as most welcome news. ", "Both Ms. O'Donnell and the show's eminence grise (quite literally) Barbara Walters attempted to put a positive spin on the news - describing it as an inability to \"come to a contractual agreement.\" ", "But it is hard to believe that the suits in ABC Daytime would be unable to throw enough money and/or perks to keep her around if they so desired, particularly as she has evidently had a positive impact on ratings during her mercifully brief tenure. ", "According to ABC, the show's ratings during the February sweeps were up 15 percent in key female demographics over February 2006.", "\n\nBut Ms. O'Donnell's presence was a doubled-edged sword. ", "In as much as she boosted viewership, she created quite a distraction for Ms. Walters and her co-hosts, Joy Behar and the beleaguered Elisabeth Hasselbeck. ", "When not sparring with Donald Trump or butting heads with Bill O'Reilly, O'Donnell spent her time promulgating nonsense and nuttiness on everything from 9/11 conspiracies to the captured British sailors being a pretext for war with Iran to comparing \"radical Christianity\" to Islamofascism. (", "Many thanks to the good people at the Media Research Center for providing a fairly comprehensive dossier on O'Donnell's rantings from 1999 to the present.)", "\n\nBut beyond her frequent and incomprehensible rantings about the supposed evils of Bush and Co., Rosie's favorite pastime on the show was verbally abusing Ms. Hasselbeck. ", "While Hasselbeck does her level best to deflect Ms. O'Donnell's fury, it is an obvious mismatch. ", "To be sure, Hasselbeck serves as naught but a well-paid straw man for Rosie to knock down. ", "And it is apparent to this observer that such has been the case by design; it is no secret that besides speaking at the 2004 Republican National Convention, Ms. Hasselbeck's conservative credentials are paper thin. (", "Perhaps if Ms. Hasselbeck spent some time talking with Prime Minister John Howard when she was a contestant on \"Survivor:The Australian Outback\", she might be on firmer ground when dealing with O'Donnell.)", "\n\nOf course the real culprit in creating such a situation is Barbara Walters herself. ", "Indeed, if Ms. Walters wished, she could arrange to have a more formidable opponent for Rosie to tangle with. ", "It is entirely because Walters - much like her peers in the MSM - desires for conservatives to look like ill-informed blatherers that Hasselbeck has a gig on the show at all. ", "Imagine if Rosie had to tangle with the likes of Laura Ingraham, Michelle Malkin, Debbie Schlussel or Ann Coulter on a daily basis. (", "And that's just the the \"B\" team; the varsity squad would include Sens. ", "Libby Dole and Kay Bailey Hutchison along with Mary Matalin, Linda Chavez, Labor Secretary Elaine Chao and of course Secretary of State Condoleezza Rice.)", "\n\nIf we are lucky, we will not be subject to Ms. Walters' conspiracy of rigging the show's liberal vs. conservative \"Fight Club.\" ", "As for Rosie, the conspiracy that she should concern herself with is the one in which she is most intimately involved. ", "In the opinion of this scribbler, O'Donnell is an integral part of an elaborate Republican conspiracy to make liberals appear to be irretrievably deranged, and thus unfit to be trusted with responsibility for the security of the U.S. To be certain, her inane statements, along with those from moveon.org, International A.N.S.W.E.R., Code Pink, Harry Reid and Nancy Pelosi will appear in Republican campaign videos every day from now until November 4, 2008.", "\n\nNo comments:\n\nModern liberalism, for most liberals, is not a consciously understood set of rational beliefs, but a bundle of unexamined prejudices and conjoined sentiments. ", "The basic ideas and beliefs seem more satisfactory when they are not made explicit, when they merely lurk rather obscurely in the background, coloring the rhetoric and adding a certain emotive glow. ", "James Burnham, Suicide of the West" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006577991298399866, 0.0006726091960445046, 0.0006659671780653298, 0.0006689764559268951, 0.0012234586756676435, 0.0010130018927156925, 0.024866072461009026, 0.000523766502737999, 0.011242101900279522, 0.0013852338306605816, 0.03975948691368103, 0.0006080669118091464, 0.0005644256016239524, 0.001574055291712284, 0.0007728375494480133, 0.015489577315747738, 0.0007296357653103769, 0.000735484529286623, 0.000595569668803364, 0.0014691688120365143, 0.0007240601116791368, 0.0020610657520592213, 0.0011907530715689063, 0.0005763356457464397, 0.011927557177841663 ]
0.004868
25
[ "Protein targets modulated by SIRT3 are being explored using proteomic approaches. ", "Characterization of the role of deacetylation of these targets will then be interrogated, in a target function specific manner. ", "We have recently identified a novel mitochondrial deacetylase and the targets of this enzyme and its role in counterregulating sirtuin function is being explored. ", "We are now expanding our studies in this arena to explore the role of these nutrient sensing programs on mitochondrial quality control (mitophagy) and in the mitochondrial role in activating inflammatory pathways. ", "In light of recent findings we have expanded this project into the clinical arena and are exploring the role of fasting and feeding in the modulation of the circulating inflammasome." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0.000576284306589514, 0.0006148471729829907, 0.0005733146099373698, 0.0005488147144205868, 0.0006193984299898148 ]
0.000587
5
[ "Keeping things clean and sanitized is on everyone's mind right now. ", "Of course, there's a lot of talk about face masks, which are vital, but what about all the other ways that you can transmit germs? ", "These days, the one item that everyone is constantly touching with their hands and holds close to their face is their cell phone.", "\n\nRead Article" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.00207226793281734, 0.0018829350592568517, 0.00436116848140955, 0.0006810143822804093 ]
0.002249
4
[ "According to IMDb and their CV, The Witcher has finally found its composers in Sonya Belousova and Giona Ostinelli, who are listed for all eight episodes of the first season.", "\n\nThere’s been much speculation over the last two years about possible composers, from Bear McCreary (Black Sails) to Percival and Marcin Przybyłowicz (The Witcher 3: Wild Hunt). ", "Follows and social media activity surrounding Netflix and upcoming projects fed that speculation, spurring fans on as they wondered what sound The Witcher would have; a more slavic sound a la CD Projekt Red’s distinctly Polish original score or something else entirely. ", "With this news, we finally have a hint at what that sound will be.", "\n\nSonya Belousova\n\nThe first of the composers we’ll be looking at is Sonya Belousova, a recipient of the Russian Ministry of Culture Award and a recent collaborator of Lin-Manuel Miranda’s (noted figure of obsession for showrunner Lauren S. Hissrich) alongside her composing partner, Giona Ostinelli.", "\n\nIn addition to scoring film and television with Ostinelli — which we’ll dig into later — Belousova composes classical arrangements of popular songs and themes for her YouTube channel, PlayerPianoVideos. ", "Below are a few examples of her talent and what fans can expect to see from the talented pianist come season one of The Witcher.", "\n\nAccording to her official Instagram, Sonya has been busy recording in London’s NorthSevenStudios, the same studio where Joey Batey (Jaskier) recently shared that he was recording music for season one of The Witcher. ", "While she doesn’t name the series in question, she does mention the instruments she’s been recording with, which include “lutes, mandolins, renaissance guitars, theorbos and producing vocals.”", "\n\nHer Instagram post also received a succinct reply from The Witcher writer Declan de Barra, “Fuck yeah!!!” ", "NorthSevenStudios further confirmed that recording for The Witcher was taking place through their Twitter, saying “The Witcher is at North Seven today – @SonyaBelousova in control! #", "netflix #TheWitcherNetflix Lute, theorbo and guitars.”", "\n\nGiona Ostinelli\n\nThe other half of this composing duo is Giona Ostinelli, who has a long list of composer credits according to IMDb: The Mist, Reprisal, and with Belousova, The Romanoffs and Sacred Lies. ", "Below are examples of his solo work for The Mist and Darling. ", "His compositions evoke a sound that serves as a nice contrast to Belousova’s more classic, upbeat compositions.", "\n\nTheir work together\n\nAs a composing team, Belousova and Ostinelli have worked together on Sacred Lies, The Romanoffs, Lying and Stealing, and Millennials: The Musical. ", "Below is a piece from the original soundtrack for Sacred Lies, showing a bit of what they each bring in style (Belousova’s classical background and Ostinelli’s more brooding sound), and below that is an interview digging into their process in approaching their work on Amazon’s The Romanoffs.", "\n\nWe can’t wait to see their work on The Witcher, and hopefully find out more about their approach to this complex property, which has influences ranging from Arthurian legend to Slavic history and lore.", "\n\nUpdate\n\nComposer Holly Amber Church (The Devil’s Dolls) seems to have been in contention for the job Sonya Belousova and Gionna Ostinelli landed, as the agents here at Redanian Intelligence have uncovered a Witchery selection of demo music on a page hosted by the Bohemian Group Composers.", "\n\nTracks like “In The Moonlight” and “Dangerous Surroundings” immediately bring to mind the sound favored by CD Projekt Red’s The Witcher video game series. ", "Still, this leaves us with yet more questions. ", "Were these demo tracks just for an audition of sorts or has Holly Amber Church been hired to compose music for Netflix’s The Witcher? ", "We’ll try to find that out. ", "Stay tuned.", "\n\nLike this: Like Loading..." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006849796627648175, 0.0005950777558609843, 0.000634204363450408, 0.0005725899827666581, 0.0005700241890735924, 0.0007202815031632781, 0.0008914609206840396, 0.0006770880427211523, 0.0005630057421512902, 0.9639903903007507, 0.0007844723295420408, 0.0010384910274297, 0.001380097004584968, 0.0005674728308804333, 0.000624128442723304, 0.0007628796738572419, 0.0005585970939137042, 0.0006085861823521554, 0.0007469590636901557, 0.0008223212789744139, 0.0006274654879234731, 0.0007484910893253982, 0.0006199004128575325, 0.0006882200250402093, 0.000974163063801825 ]
0.039258
25
[ "Organization and assembly of metal-thiolate clusters in epithelium-specific metallothionein-4.", "\nMammalian metallothionein-4 (MT-4) was found to be specifically expressed in stratified squamous epithelia where it plays an essential but poorly defined role in regulating zinc or copper metabolism. ", "Here we report on the organization, stability, and the pathway of metal-thiolate cluster assembly in MT-4 reconstituted with Cd(2+) and Co(2+) ions. ", "Both the (113)Cd NMR studies of (113)Cd(7)MT-4 and the spectroscopic characterization of Co(7)MT-4 showed that, similar to the classical MT-1 and MT-2 proteins, metal ions are organized in two independent Cd(4)Cys(11) and Cd(3)Cys(9) clusters with each metal ion tetrahedrally coordinated by terminal and bridging cysteine ligands. ", "Moreover, we have demonstrated that the cluster formation in Cd(7)MT-4 is cooperative and sequential, with the Cd(4)Cys(11) cluster being formed first, and that a distinct single-metal nucleation intermediate Cd(1)MT-4 is required in the cluster formation process. ", "Conversely, the absorption and circular dichroism features of metal-thiolate clusters in Cd(7)MT-4 indicate that marked differences in the cluster geometry exist when compared with those in Cd(7)MT-1/2. ", "The biological implication of our studies as to the role of MT-4 in zinc metabolism of stratified epithelia is discussed." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0007050886633805931, 0.0005881228717043996, 0.0005347150145098567, 0.0006070836680009961, 0.0005531462957151234, 0.0006377553218044341, 0.0005542083526961505 ]
0.000597
7
[ "Q:\n\nWhy do I get so many errors building my Android project with Ant?", "\n\nNow that I sort of know my way around the SDK/API, I've switched from Eclipse back to my favorite text editor, which means I have to use ant to build my project, however:\nIt seems every other time I compile the project, a lot of drawables get corrupted, resources lose their ids (resulting in NPEs in the code), or classes throw \"Verify Errors\".", "\nThe only way to fix this is by removing the bin and gen folders, and recompiling, which is obviously annoying.", "\nIs there any way to avoid this?", "\nbtw, I'm using ant 1.7.1, java version \"1.6.0_20\"\n\nA:\n\nIt seems every other time I compile\n the project, a lot of drawables get\n corrupted, resources lose their ids\n (resulting in NPEs in the code), or\n classes throw \"Verify Errors\".", "\n\nResources \"lose their IDs\" is relatively common, when you change something about the roster of resources (add one, remove one, etc.). ", "You might consider adding an Ant target that does a clean before your debug/install.", "\nI have never seen classes randomly throw \"Verify Errors\". ", "That occurs when compiled classes try referring to missing stuff, so you might get this when you first try to use a third-party JAR, for example. ", "The only reason I can figure it might occur for you is if you are frequently refactoring your code or something. ", "But I have developed a metric buttload of code using Ant and have never encountered this for any of my own code.", "\nThe Ant scripts and associated binaries could use a little work in terms of detecting changes, which is the root of both of these problems.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.005723798181861639, 0.0008542759460397065, 0.0026216916739940643, 0.0007727823103778064, 0.0008902140543796122, 0.0008037591469474137, 0.000914631993509829, 0.0008357362821698189, 0.0006234004977159202, 0.0007853107526898384, 0.0008789463900029659, 0.000665451108943671, 0.001995444530621171 ]
0.001413
13
[ "Applications of physical and occupational therapy in chronic pain syndrome.", "\nThis article will describe how to approach the prescription of physical therapy for 'chronic pain syndrome'. ", "Initial sections will describe script writing for physical and occupational therapies, and review types of exercise and physical therapeutics. ", "Exercise regimens that the literature supports for patients with chronically painful syndromes will also be discussed. ", "The author emphasizes that the practitioner cannot write a therapy script for 'chronic pain syndrome.' ", "Instead, the practitioner should understand that physical and occupational therapy can remedy impairments of flexibility, strength and endurance and the patient should be examined to identify these impairments. ", "When the practitioner has identified poor flexibility or contracture, weakness or loss of strength, or poor endurance in the patient with chronic pain, the practitioner can then write a physical therapy or occupational therapy script with goals to improve these impairments. ", "It is not necessary for the practitioner to be familiar with the nuances of exercise application; it is only necessary for the practitioner to identify contracture, weakness and poor endurance, and to direct the therapist's attention to these deficits via a therapy script. ", "The practitioner should include precautions on a script to a therapist. ", "These precautions are based on the patient's concurrent medical and surgical diagnoses. ", "Lastly, the literature describing therapeutic interventions in patients with chronic pain syndromes is poor because the painful conditions are poorly characterized and the therapeutic interventions are poorly described; however, where specific exercise programs for specific diagnoses were identified, the exercise regimens are discussed." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006993618444539607, 0.000638277328107506, 0.0005599238211289048, 0.0006888312636874616, 0.0007758591673336923, 0.0005530524649657309, 0.000975541421212256, 0.0006817195098847151, 0.0006326401489786804, 0.0006418885313905776, 0.0006073646363802254 ]
0.000678
11
[ "John Bonham (Getty Images / Redferns / Dick Barnatt)\n\nJohn \"Bonzo\" Bonham is considered by many the greatest drummer in rock history.", "\n\nTo commemorate his passing 30 years ago today, we present 30 intriguing facts about his short life.", "\n\n1. ", "John Henry Bonham was born in Worcestershire, England on 31 May1948.", "\n\n2. ", "He began teaching himself drums at age 5, making a primitive drum kit out of empty coffee containers, pots and pans, and other assorted kitchenware. ", "He got his first real snare drum at age 10, and his first full kit at 15.", "\n\n3. ", "His early influences included big band jazz drummers like Gene Krupa, Joe Morello and Buddy Rich.", "\n\n4. ", "By 16 he was playing in his first semi-professional band. ", "While they were recording a demo, the sound engineer told Bonham that he played too loud and was unrecordable. ", "Bonham later sent him a gold record with a snarky note saying, \"Thanks for your advice.\"", "\n\n5. ", "A middle school principal once wrote on Bonham's report card, \"He'll either be a dustman or a millionaire.\"", "\n\n6. ", "At 17 Bonham married Pat Phillips. ", "A year later in 1966, they had their first child, Jason Bonham.", "\n\n7. ", "Money for the young family was extremely tight and they lived in a small, government-subsidized apartment. ", "Nonetheless, Bonham would often pretend to go work in a factory while instead heading to a music store, where he performed drum demonstrations for a nominal fee.", "\n\n8. ", "He first played with Robert Plant in a group called The Crawling King Snakes; the band took their name from a John Lee Hooker song.", "\n\n9. ", "Other bands he played in included the Blue Star Trio, Gerry Levene & the Avengers, Terry Webb and the Spiders, The Nicky James Movement, The Senators, and Band of Joy. ", "Oh, and also Led Zeppelin.", "\n\n10. ", "When Page and Plant began to form Led Zeppelin after the demise of the Yardbirds, other drummers they considered included Ginger Baker, Clem Cattini, Aynsley Dunbar and B.J. Wilson.", "\n\n11. ", "Bonham was at the time also considering offers from Joe Cocker and Chris Farlowe. ", "Robert Plant and manager Peter Grant besieged the reluctant Bonham with dozens of telegrams sent to his favorite pub, until he finally agreed to join.", "\n\n12. ", "Led Zeppelin played their first live gig at the Mayfair Ballroom, in New Castle Upon Tyne, on 4 October 1968.", "\n\n13. ", "In November, they signed with Atlantic Records and scored an unprecedented $200,000 advance.", "\n\n14. ", "With his first check from Led Zeppelin, Bonham bought a Jaguar.", "\n\n15. ", "Led Zeppelin embarked on the first American tour only after the Jeff Beck Group cancelled theirs and Peter Grant convinced promoters to take Zeppelin instead.", "\n\n16. ", "The band made its American debut in Denver, Colorado, on 26 December 1968.", "\n\n17. ", "They opened for acts like Vanilla Fudge, Iron Butterfly, and Country Joe and the Fish.", "\n\n18. ", "Vanilla Fudge's drummer, Carmine Appice, befriended Bonham and introduced him to double bass drum kits incorporating larger, 26-inch Ludwig bass drums (then only used in marching bands), which enabled Bonham to increase his volume onstage.", "\n\n19. ", "The band's first album, Led Zeppelin, was recorded in only 36 hours. ", "Released in early 1969 to generally poor reviews, it would nonetheless remain on the Billboard charts for 73 weeks and to date has reached sales in excess of 8 million in the United States alone.", "\n\n20. ", "Their second album, the imaginatively titled Led Zeppelin II, also released in 1969, has sold over 12 million copies and is widely considered as one of the most groundbreaking and influential albums of all time.", "\n\n21. ", "This album featured the instrumental track \"Moby Dick.\" ", "When performing it live, Bonham would solo anywhere from 6 minutes to half an hour, sometimes tossing his sticks to the audience and beating on his drums with his hands.", "\n\n22. ", "Led Zeppelin IV, released in 1971, sold 37 million copies worldwide. ", "It features a song you might have heard called \"Stairway to Heaven.\"", "\n\n23. ", "Led Zeppelin's excesses on tour were legendary. ", "Bonham once drove a motorcycle – a gift for his 25th birthday – through the halls of the Continental Hyatt House Hotel in Los Angeles, where the band had rented out multiple floors for their entourage (both Keith Moon and Keith Richards reportedly dropped TVs out the windows of the same hotel, which acquired the nickname \"The Riot House\").", "\n\n24. ", "Bonham suffered from stage fright and would often have panic attacks before the band took the stage.", "\n\n25. ", "In 1972 Bonham bought a 100-acre farm in England's Midlands called Old Hyde. ", "His father and younger brother helped restore it to a working Hereford cattle ranch and he would enter his calves in livestock competitions. ", "In a bid to keep his home and work life separate, he didn't even keep a drum kit on the property.", "\n\n26. ", "Bonham's second child, daughter Zoe, was born in July 1975.", "\n\n27. ", "In 1976 he appeared in the film Son of Dracula, along with Ringo Star, Keith Moon and Harry Nilsson. ", "The rock 'n' roll vampire movie was poorly received and remains unavailable on either VHS or DVD.", "\n\n28. ", "Bonham died at the age of 32 after asphyxiating on his own vomit following a drinking binge on 25 September 1980. ", "Rather than carry on with a new drummer, Led Zeppelin disbanded.", "\n\n29. ", "The band did play a one-off, 2007 reunion show, with Jason Bonham taking his father's seat behind the drum kit. ", "Reunion tour rumors have arisen every year since.", "\n\n30. ", "Some quotes about Bonham and his legacy:" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.001029455685056746, 0.0006398987607099116, 0.0009391900966875255, 0.0008185756742022932, 0.001185585861094296, 0.0012669964926317334, 0.0009024539031088352, 0.00117425003554672, 0.0007270322530530393, 0.0012900278670713305, 0.001233394956216216, 0.0007322681485675275, 0.0005825264961458743, 0.0013671480119228363, 0.001143168075941503, 0.001202064217068255, 0.0009533078409731388, 0.0009233913151547313, 0.0013101339573040605, 0.0009237164631485939, 0.0007518675411120057, 0.0014581186696887016, 0.0009048940846696496, 0.00135024543851614, 0.0007388089434243739, 0.0008029122254811227, 0.0011672148248180747, 0.0007490779971703887, 0.0011401979718357325, 0.001849295455031097, 0.0006271288730204105, 0.0011807649862021208, 0.0007579781231470406, 0.0011604013852775097, 0.0006429560016840696, 0.0013701459392905235, 0.0006549337413161993, 0.0013238334795460105, 0.0006701780948787928, 0.0011094417423009872, 0.0005957360262982547, 0.001153186080045998, 0.0015263590030372143, 0.0012020498979836702, 0.0006680797087028623, 0.0012845105957239866, 0.0006536925211548805, 0.0008471680921502411, 0.0012712616007775068, 0.0006388214533217251, 0.001112641766667366, 0.23542074859142303, 0.0011509604519233108, 0.0012386090820655227, 0.0007179555832408369, 0.0005877426592633128, 0.0011174104874953628, 0.001399431610479951, 0.0007212331402115524, 0.0012042307062074542, 0.004866636823862791, 0.001151100150309503, 0.0007350168307311833, 0.0006065423367545009, 0.0011301020858809352, 0.001064466661773622, 0.0007605713326483965, 0.0010378165170550346, 0.0007954717148095369, 0.000866809394210577, 0.0010886960662901402, 0.17793111503124237, 0.0008678800659254193, 0.0011345044476911426, 0.0007679437985643744, 0.000573116063605994, 0.001320813549682498, 0.0006283484981395304 ]
0.006315
78
[ "/*\nCopyright The Kubernetes Authors.", "\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.", "\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.", "\nSee the License for the specific language governing permissions and\nlimitations under the License.", "\n*/\n\n// Code generated by protoc-gen-gogo. ", "DO NOT EDIT.", "\n// source: k8s.io/kubernetes/vendor/k8s.io/api/rbac/v1/generated.proto\n\npackage v1\n\nimport (\n\tfmt \"fmt\"\n\n\tio \"io\"\n\n\tproto \"github.com/gogo/protobuf/proto\"\n\tv1 \"k8s.io/apimachinery/pkg/apis/meta/v1\"\n\n\tmath \"math\"\n\tmath_bits \"math/bits\"\n\treflect \"reflect\"\n\tstrings \"strings\"\n)\n\n// Reference imports to suppress errors if they are not otherwise used.", "\nvar _ = proto.", "Marshal\nvar _ = fmt.", "Errorf\nvar _ = math.", "Inf\n\n// This is a compile-time assertion to ensure that this generated file\n// is compatible with the proto package it is being compiled against.", "\n// A compilation error at this line likely means your copy of the\n// proto package needs to be updated.", "\nconst _ = proto.", "GoGoProtoPackageIsVersion3 // please upgrade the proto package\n\nfunc (m *AggregationRule) Reset() { *m = AggregationRule{} }\nfunc (*AggregationRule) ProtoMessage() {}\nfunc (*AggregationRule) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{0}\n}\nfunc (m *AggregationRule) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *AggregationRule) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *AggregationRule) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_AggregationRule.", "Merge(m, src)\n}\nfunc (m *AggregationRule) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *AggregationRule) XXX_DiscardUnknown() {\n\txxx_messageInfo_AggregationRule.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_AggregationRule proto.", "InternalMessageInfo\n\nfunc (m *ClusterRole) Reset() { *m = ClusterRole{} }\nfunc (*ClusterRole) ProtoMessage() {}\nfunc (*ClusterRole) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{1}\n}\nfunc (m *ClusterRole) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *ClusterRole) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *ClusterRole) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_ClusterRole.", "Merge(m, src)\n}\nfunc (m *ClusterRole) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *ClusterRole) XXX_DiscardUnknown() {\n\txxx_messageInfo_ClusterRole.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_ClusterRole proto.", "InternalMessageInfo\n\nfunc (m *ClusterRoleBinding) Reset() { *m = ClusterRoleBinding{} }\nfunc (*ClusterRoleBinding) ProtoMessage() {}\nfunc (*ClusterRoleBinding) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{2}\n}\nfunc (m *ClusterRoleBinding) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *ClusterRoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *ClusterRoleBinding) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_ClusterRoleBinding.", "Merge(m, src)\n}\nfunc (m *ClusterRoleBinding) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *ClusterRoleBinding) XXX_DiscardUnknown() {\n\txxx_messageInfo_ClusterRoleBinding.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_ClusterRoleBinding proto.", "InternalMessageInfo\n\nfunc (m *ClusterRoleBindingList) Reset() { *m = ClusterRoleBindingList{} }\nfunc (*ClusterRoleBindingList) ProtoMessage() {}\nfunc (*ClusterRoleBindingList) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{3}\n}\nfunc (m *ClusterRoleBindingList) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *ClusterRoleBindingList) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *ClusterRoleBindingList) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_ClusterRoleBindingList.", "Merge(m, src)\n}\nfunc (m *ClusterRoleBindingList) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *ClusterRoleBindingList) XXX_DiscardUnknown() {\n\txxx_messageInfo_ClusterRoleBindingList.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_ClusterRoleBindingList proto.", "InternalMessageInfo\n\nfunc (m *ClusterRoleList) Reset() { *m = ClusterRoleList{} }\nfunc (*ClusterRoleList) ProtoMessage() {}\nfunc (*ClusterRoleList) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{4}\n}\nfunc (m *ClusterRoleList) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *ClusterRoleList) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *ClusterRoleList) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_ClusterRoleList.", "Merge(m, src)\n}\nfunc (m *ClusterRoleList) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *ClusterRoleList) XXX_DiscardUnknown() {\n\txxx_messageInfo_ClusterRoleList.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_ClusterRoleList proto.", "InternalMessageInfo\n\nfunc (m *PolicyRule) Reset() { *m = PolicyRule{} }\nfunc (*PolicyRule) ProtoMessage() {}\nfunc (*PolicyRule) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{5}\n}\nfunc (m *PolicyRule) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *PolicyRule) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *PolicyRule) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_PolicyRule.", "Merge(m, src)\n}\nfunc (m *PolicyRule) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *PolicyRule) XXX_DiscardUnknown() {\n\txxx_messageInfo_PolicyRule.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_PolicyRule proto.", "InternalMessageInfo\n\nfunc (m *Role) Reset() { *m = Role{} }\nfunc (*Role) ProtoMessage() {}\nfunc (*Role) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{6}\n}\nfunc (m *Role) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *Role) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *Role) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_Role.", "Merge(m, src)\n}\nfunc (m *Role) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *Role) XXX_DiscardUnknown() {\n\txxx_messageInfo_Role.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_Role proto.", "InternalMessageInfo\n\nfunc (m *RoleBinding) Reset() { *m = RoleBinding{} }\nfunc (*RoleBinding) ProtoMessage() {}\nfunc (*RoleBinding) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{7}\n}\nfunc (m *RoleBinding) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *RoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *RoleBinding) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_RoleBinding.", "Merge(m, src)\n}\nfunc (m *RoleBinding) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *RoleBinding) XXX_DiscardUnknown() {\n\txxx_messageInfo_RoleBinding.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_RoleBinding proto.", "InternalMessageInfo\n\nfunc (m *RoleBindingList) Reset() { *m = RoleBindingList{} }\nfunc (*RoleBindingList) ProtoMessage() {}\nfunc (*RoleBindingList) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{8}\n}\nfunc (m *RoleBindingList) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *RoleBindingList) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *RoleBindingList) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_RoleBindingList.", "Merge(m, src)\n}\nfunc (m *RoleBindingList) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *RoleBindingList) XXX_DiscardUnknown() {\n\txxx_messageInfo_RoleBindingList.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_RoleBindingList proto.", "InternalMessageInfo\n\nfunc (m *RoleList) Reset() { *m = RoleList{} }\nfunc (*RoleList) ProtoMessage() {}\nfunc (*RoleList) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{9}\n}\nfunc (m *RoleList) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *RoleList) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *RoleList) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_RoleList.", "Merge(m, src)\n}\nfunc (m *RoleList) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *RoleList) XXX_DiscardUnknown() {\n\txxx_messageInfo_RoleList.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_RoleList proto.", "InternalMessageInfo\n\nfunc (m *RoleRef) Reset() { *m = RoleRef{} }\nfunc (*RoleRef) ProtoMessage() {}\nfunc (*RoleRef) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{10}\n}\nfunc (m *RoleRef) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *RoleRef) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *RoleRef) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_RoleRef.", "Merge(m, src)\n}\nfunc (m *RoleRef) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *RoleRef) XXX_DiscardUnknown() {\n\txxx_messageInfo_RoleRef.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_RoleRef proto.", "InternalMessageInfo\n\nfunc (m *Subject) Reset() { *m = Subject{} }\nfunc (*Subject) ProtoMessage() {}\nfunc (*Subject) Descriptor() ([]byte, []int) {\n\treturn fileDescriptor_979ffd7b30c07419, []int{11}\n}\nfunc (m *Subject) XXX_Unmarshal(b []byte) error {\n\treturn m.Unmarshal(b)\n}\nfunc (m *Subject) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {\n\tb = b[:cap(b)]\n\tn, err := m.MarshalToSizedBuffer(b)\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn b[:n], nil\n}\nfunc (m *Subject) XXX_Merge(src proto.", "Message) {\n\txxx_messageInfo_Subject.", "Merge(m, src)\n}\nfunc (m *Subject) XXX_Size() int {\n\treturn m.Size()\n}\nfunc (m *Subject) XXX_DiscardUnknown() {\n\txxx_messageInfo_Subject.", "DiscardUnknown(m)\n}\n\nvar xxx_messageInfo_Subject proto.", "InternalMessageInfo\n\nfunc init() {\n\tproto.", "RegisterType((*AggregationRule)(nil), \"k8s.io.api.rbac.v1.AggregationRule\")\n\tproto.", "RegisterType((*ClusterRole)(nil), \"k8s.io.api.rbac.v1.ClusterRole\")\n\tproto.", "RegisterType((*ClusterRoleBinding)(nil), \"k8s.io.api.rbac.v1.ClusterRoleBinding\")\n\tproto.", "RegisterType((*ClusterRoleBindingList)(nil), \"k8s.io.api.rbac.v1.ClusterRoleBindingList\")\n\tproto.", "RegisterType((*ClusterRoleList)(nil), \"k8s.io.api.rbac.v1.ClusterRoleList\")\n\tproto.", "RegisterType((*PolicyRule)(nil), \"k8s.io.api.rbac.v1.PolicyRule\")\n\tproto.", "RegisterType((*Role)(nil), \"k8s.io.api.rbac.v1.Role\")\n\tproto.", "RegisterType((*RoleBinding)(nil), \"k8s.io.api.rbac.v1.RoleBinding\")\n\tproto.", "RegisterType((*RoleBindingList)(nil), \"k8s.io.api.rbac.v1.RoleBindingList\")\n\tproto.", "RegisterType((*RoleList)(nil), \"k8s.io.api.rbac.v1.RoleList\")\n\tproto.", "RegisterType((*RoleRef)(nil), \"k8s.io.api.rbac.v1.RoleRef\")\n\tproto.", "RegisterType((*Subject)(nil), \"k8s.io.api.rbac.v1.Subject\")\n}\n\nfunc init() {\n\tproto.", "RegisterFile(\"k8s.io/kubernetes/vendor/k8s.io/api/rbac/v1/generated.proto\", fileDescriptor_979ffd7b30c07419)\n}\n\nvar fileDescriptor_979ffd7b30c07419 = []byte{\n\t// 807 bytes of a gzipped FileDescriptorProto\n\t0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xe4, 0x55, 0xcf, 0x6f, 0xe3, 0x44,\n\t0x14, 0xce, 0xa4, 0x89, 0x1a, 0x4f, 0x88, 0x42, 0x87, 0x0a, 0x59, 0x05, 0x39, 0x95, 0x91, 0x50,\n\t0x25, 0xc0, 0x26, 0x05, 0x01, 0x12, 0xea, 0xa1, 0x2e, 0x02, 0x55, 0x2d, 0xa5, 0x9a, 0x0a, 0x0e,\n\t0x88, 0x03, 0x63, 0x67, 0xea, 0x0e, 0xf1, 0x2f, 0xcd, 0xd8, 0x91, 0x2a, 0x2e, 0x08, 0x89, 0x03,\n\t0xb7, 0x3d, 0xee, 0xfe, 0x05, 0x7b, 0xd9, 0x3d, 0xee, 0x5f, 0xb0, 0x97, 0x1e, 0x7b, 0xec, 0x29,\n\t0xda, 0x7a, 0xff, 0x90, 0x5d, 0xf9, 0x57, 0x9c, 0x1f, 0xee, 0x36, 0xa7, 0x48, 0xab, 0x3d, 0xb5,\n\t0xf3, 0xde, 0xf7, 0xbe, 0xf7, 0xcd, 0xe7, 0x79, 0x2f, 0xf0, 0xfb, 0xe1, 0x77, 0x42, 0x63, 0xbe,\n\t0x3e, 0x8c, 0x4c, 0xca, 0x3d, 0x1a, 0x52, 0xa1, 0x8f, 0xa8, 0x37, 0xf0, 0xb9, 0x9e, 0x27, 0x48,\n\t0xc0, 0x74, 0x6e, 0x12, 0x4b, 0x1f, 0xf5, 0x75, 0x9b, 0x7a, 0x94, 0x93, 0x90, 0x0e, 0xb4, 0x80,\n\t0xfb, 0xa1, 0x8f, 0x50, 0x86, 0xd1, 0x48, 0xc0, 0xb4, 0x04, 0xa3, 0x8d, 0xfa, 0x5b, 0x5f, 0xd8,\n\t0x2c, 0xbc, 0x88, 0x4c, 0xcd, 0xf2, 0x5d, 0xdd, 0xf6, 0x6d, 0x5f, 0x4f, 0xa1, 0x66, 0x74, 0x9e,\n\t0x9e, 0xd2, 0x43, 0xfa, 0x5f, 0x46, 0xb1, 0xf5, 0x75, 0xd9, 0xc6, 0x25, 0xd6, 0x05, 0xf3, 0x28,\n\t0xbf, 0xd4, 0x83, 0xa1, 0x9d, 0x04, 0x84, 0xee, 0xd2, 0x90, 0x54, 0x34, 0xde, 0xd2, 0xef, 0xaa,\n\t0xe2, 0x91, 0x17, 0x32, 0x97, 0x2e, 0x14, 0x7c, 0x73, 0x5f, 0x81, 0xb0, 0x2e, 0xa8, 0x4b, 0xe6,\n\t0xeb, 0xd4, 0x47, 0x00, 0x76, 0xf7, 0x6d, 0x9b, 0x53, 0x9b, 0x84, 0xcc, 0xf7, 0x70, 0xe4, 0x50,\n\t0xf4, 0x1f, 0x80, 0x9b, 0x96, 0x13, 0x89, 0x90, 0x72, 0xec, 0x3b, 0xf4, 0x8c, 0x3a, 0xd4, 0x0a,\n\t0x7d, 0x2e, 0x64, 0xb0, 0xbd, 0xb6, 0xd3, 0xde, 0xfd, 0x4a, 0x2b, 0x5d, 0x99, 0xf4, 0xd2, 0x82,\n\t0xa1, 0x9d, 0x04, 0x84, 0x96, 0x5c, 0x49, 0x1b, 0xf5, 0xb5, 0x63, 0x62, 0x52, 0xa7, 0xa8, 0x35,\n\t0x3e, 0xbe, 0x1a, 0xf7, 0x6a, 0xf1, 0xb8, 0xb7, 0x79, 0x50, 0x41, 0x8c, 0x2b, 0xdb, 0xa9, 0x0f,\n\t0xeb, 0xb0, 0x3d, 0x05, 0x47, 0x7f, 0xc2, 0x56, 0x42, 0x3e, 0x20, 0x21, 0x91, 0xc1, 0x36, 0xd8,\n\t0x69, 0xef, 0x7e, 0xb9, 0x9c, 0x94, 0x5f, 0xcc, 0xbf, 0xa8, 0x15, 0xfe, 0x4c, 0x43, 0x62, 0xa0,\n\t0x5c, 0x07, 0x2c, 0x63, 0x78, 0xc2, 0x8a, 0x0e, 0x60, 0x93, 0x47, 0x0e, 0x15, 0x72, 0x3d, 0xbd,\n\t0xa9, 0xa2, 0x2d, 0x7e, 0x7f, 0xed, 0xd4, 0x77, 0x98, 0x75, 0x99, 0x18, 0x65, 0x74, 0x72, 0xb2,\n\t0x66, 0x72, 0x12, 0x38, 0xab, 0x45, 0x26, 0xec, 0x92, 0x59, 0x47, 0xe5, 0xb5, 0x54, 0xed, 0x27,\n\t0x55, 0x74, 0x73, 0xe6, 0x1b, 0x1f, 0xc4, 0xe3, 0xde, 0xfc, 0x17, 0xc1, 0xf3, 0x84, 0xea, 0xff,\n\t0x75, 0x88, 0xa6, 0xac, 0x31, 0x98, 0x37, 0x60, 0x9e, 0xbd, 0x02, 0x87, 0x0e, 0x61, 0x4b, 0x44,\n\t0x69, 0xa2, 0x30, 0xe9, 0xa3, 0xaa, 0x5b, 0x9d, 0x65, 0x18, 0xe3, 0xfd, 0x9c, 0xac, 0x95, 0x07,\n\t0x04, 0x9e, 0x94, 0xa3, 0x1f, 0xe1, 0x3a, 0xf7, 0x1d, 0x8a, 0xe9, 0x79, 0xee, 0x4f, 0x25, 0x13,\n\t0xce, 0x20, 0x46, 0x37, 0x67, 0x5a, 0xcf, 0x03, 0xb8, 0x28, 0x56, 0x9f, 0x03, 0xf8, 0xe1, 0xa2,\n\t0x17, 0xc7, 0x4c, 0x84, 0xe8, 0x8f, 0x05, 0x3f, 0xb4, 0x25, 0x1f, 0x2f, 0x13, 0x99, 0x1b, 0x93,\n\t0x0b, 0x14, 0x91, 0x29, 0x2f, 0x8e, 0x60, 0x93, 0x85, 0xd4, 0x2d, 0x8c, 0xf8, 0xb4, 0x4a, 0xfe,\n\t0xa2, 0xb0, 0xf2, 0xd5, 0x1c, 0x26, 0xc5, 0x38, 0xe3, 0x50, 0x9f, 0x01, 0xd8, 0x9d, 0x02, 0xaf,\n\t0x40, 0xfe, 0x0f, 0xb3, 0xf2, 0x7b, 0xf7, 0xc9, 0xaf, 0xd6, 0xfd, 0x0a, 0x40, 0x58, 0x8e, 0x04,\n\t0xea, 0xc1, 0xe6, 0x88, 0x72, 0x33, 0xdb, 0x15, 0x92, 0x21, 0x25, 0xf8, 0xdf, 0x92, 0x00, 0xce,\n\t0xe2, 0xe8, 0x33, 0x28, 0x91, 0x80, 0xfd, 0xc4, 0xfd, 0x28, 0xc8, 0x3a, 0x4b, 0x46, 0x27, 0x1e,\n\t0xf7, 0xa4, 0xfd, 0xd3, 0xc3, 0x2c, 0x88, 0xcb, 0x7c, 0x02, 0xe6, 0x54, 0xf8, 0x11, 0xb7, 0xa8,\n\t0x90, 0xd7, 0x4a, 0x30, 0x2e, 0x82, 0xb8, 0xcc, 0xa3, 0x6f, 0x61, 0xa7, 0x38, 0x9c, 0x10, 0x97,\n\t0x0a, 0xb9, 0x91, 0x16, 0x6c, 0xc4, 0xe3, 0x5e, 0x07, 0x4f, 0x27, 0xf0, 0x2c, 0x0e, 0xed, 0xc1,\n\t0xae, 0xe7, 0x7b, 0x05, 0xe4, 0x57, 0x7c, 0x2c, 0xe4, 0x66, 0x5a, 0x9a, 0xce, 0xe2, 0xc9, 0x6c,\n\t0x0a, 0xcf, 0x63, 0xd5, 0xa7, 0x00, 0x36, 0xde, 0xa2, 0xfd, 0xa4, 0xfe, 0x5b, 0x87, 0xed, 0x77,\n\t0x7e, 0x69, 0x24, 0xe3, 0xb6, 0xda, 0x6d, 0xb1, 0xcc, 0xb8, 0xdd, 0xbf, 0x26, 0x1e, 0x03, 0xd8,\n\t0x5a, 0xd1, 0x7e, 0xd8, 0x9b, 0x15, 0x2c, 0xdf, 0x29, 0xb8, 0x5a, 0xe9, 0xdf, 0xb0, 0x70, 0x1d,\n\t0x7d, 0x0e, 0x5b, 0xc5, 0x4c, 0xa7, 0x3a, 0xa5, 0xb2, 0x6f, 0x31, 0xf6, 0x78, 0x82, 0x40, 0xdb,\n\t0xb0, 0x31, 0x64, 0xde, 0x40, 0xae, 0xa7, 0xc8, 0xf7, 0x72, 0x64, 0xe3, 0x88, 0x79, 0x03, 0x9c,\n\t0x66, 0x12, 0x84, 0x47, 0xdc, 0xec, 0x67, 0x75, 0x0a, 0x91, 0x4c, 0x33, 0x4e, 0x33, 0xea, 0x13,\n\t0x00, 0xd7, 0xf3, 0xd7, 0x33, 0xe1, 0x03, 0x77, 0xf2, 0x4d, 0xeb, 0xab, 0x2f, 0xa3, 0xef, 0xcd,\n\t0xdd, 0x91, 0x0e, 0xa5, 0xe4, 0xaf, 0x08, 0x88, 0x45, 0xe5, 0x46, 0x0a, 0xdb, 0xc8, 0x61, 0xd2,\n\t0x49, 0x91, 0xc0, 0x25, 0xc6, 0xd8, 0xb9, 0xba, 0x55, 0x6a, 0xd7, 0xb7, 0x4a, 0xed, 0xe6, 0x56,\n\t0xa9, 0xfd, 0x13, 0x2b, 0xe0, 0x2a, 0x56, 0xc0, 0x75, 0xac, 0x80, 0x9b, 0x58, 0x01, 0x2f, 0x62,\n\t0x05, 0x3c, 0x78, 0xa9, 0xd4, 0x7e, 0xaf, 0x8f, 0xfa, 0xaf, 0x03, 0x00, 0x00, 0xff, 0xff, 0x24,\n\t0xa1, 0x47, 0x98, 0xcf, 0x0a, 0x00, 0x00,\n}\n\nfunc (m *AggregationRule) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *AggregationRule) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *AggregationRule) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\tif len(m.", "ClusterRoleSelectors) > 0 {\n\t\tfor iNdEx := len(m.", "ClusterRoleSelectors) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.ClusterRoleSelectors[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0xa\n\t\t}\n\t}\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *ClusterRole) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *ClusterRole) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *ClusterRole) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\tif m.AggregationRule !", "= nil {\n\t\t{\n\t\t\tsize, err := m.AggregationRule.", "MarshalToSizedBuffer(dAtA[:i])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t\ti -= size\n\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t}\n\t\ti--\n\t\tdAtA[i] = 0x1a\n\t}\n\tif len(m.", "Rules) > 0 {\n\t\tfor iNdEx := len(m.", "Rules) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.Rules[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\t{\n\t\tsize, err := m.ObjectMeta.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *ClusterRoleBinding) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *ClusterRoleBinding) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *ClusterRoleBinding) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\t{\n\t\tsize, err := m.RoleRef.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0x1a\n\tif len(m.", "Subjects) > 0 {\n\t\tfor iNdEx := len(m.", "Subjects) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.Subjects[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\t{\n\t\tsize, err := m.ObjectMeta.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *ClusterRoleBindingList) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *ClusterRoleBindingList) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *ClusterRoleBindingList) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\tif len(m.", "Items) > 0 {\n\t\tfor iNdEx := len(m.", "Items) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.Items[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\t{\n\t\tsize, err := m.ListMeta.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *ClusterRoleList) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *ClusterRoleList) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *ClusterRoleList) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\tif len(m.", "Items) > 0 {\n\t\tfor iNdEx := len(m.", "Items) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.Items[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\t{\n\t\tsize, err := m.ListMeta.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *PolicyRule) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *PolicyRule) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *PolicyRule) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\tif len(m.", "NonResourceURLs) > 0 {\n\t\tfor iNdEx := len(m.", "NonResourceURLs) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\ti -= len(m.", "NonResourceURLs[iNdEx])\n\t\t\tcopy(dAtA[i:], m.NonResourceURLs[iNdEx])\n\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "NonResourceURLs[iNdEx])))\n\t\t\ti--\n\t\t\tdAtA[i] = 0x2a\n\t\t}\n\t}\n\tif len(m.", "ResourceNames) > 0 {\n\t\tfor iNdEx := len(m.", "ResourceNames) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\ti -= len(m.", "ResourceNames[iNdEx])\n\t\t\tcopy(dAtA[i:], m.ResourceNames[iNdEx])\n\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "ResourceNames[iNdEx])))\n\t\t\ti--\n\t\t\tdAtA[i] = 0x22\n\t\t}\n\t}\n\tif len(m.", "Resources) > 0 {\n\t\tfor iNdEx := len(m.", "Resources) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\ti -= len(m.", "Resources[iNdEx])\n\t\t\tcopy(dAtA[i:], m.Resources[iNdEx])\n\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "Resources[iNdEx])))\n\t\t\ti--\n\t\t\tdAtA[i] = 0x1a\n\t\t}\n\t}\n\tif len(m.", "APIGroups) > 0 {\n\t\tfor iNdEx := len(m.", "APIGroups) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\ti -= len(m.", "APIGroups[iNdEx])\n\t\t\tcopy(dAtA[i:], m.APIGroups[iNdEx])\n\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "APIGroups[iNdEx])))\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\tif len(m.", "Verbs) > 0 {\n\t\tfor iNdEx := len(m.", "Verbs) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\ti -= len(m.", "Verbs[iNdEx])\n\t\t\tcopy(dAtA[i:], m.Verbs[iNdEx])\n\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "Verbs[iNdEx])))\n\t\t\ti--\n\t\t\tdAtA[i] = 0xa\n\t\t}\n\t}\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *Role) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *Role) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *Role) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\tif len(m.", "Rules) > 0 {\n\t\tfor iNdEx := len(m.", "Rules) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.Rules[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\t{\n\t\tsize, err := m.ObjectMeta.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *RoleBinding) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *RoleBinding) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *RoleBinding) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\t{\n\t\tsize, err := m.RoleRef.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0x1a\n\tif len(m.", "Subjects) > 0 {\n\t\tfor iNdEx := len(m.", "Subjects) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.Subjects[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\t{\n\t\tsize, err := m.ObjectMeta.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *RoleBindingList) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *RoleBindingList) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *RoleBindingList) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\tif len(m.", "Items) > 0 {\n\t\tfor iNdEx := len(m.", "Items) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.Items[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\t{\n\t\tsize, err := m.ListMeta.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *RoleList) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *RoleList) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *RoleList) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\tif len(m.", "Items) > 0 {\n\t\tfor iNdEx := len(m.", "Items) - 1; iNdEx >= 0; iNdEx-- {\n\t\t\t{\n\t\t\t\tsize, err := m.Items[iNdEx].MarshalToSizedBuffer(dAtA[:i])\n\t\t\t\tif err !", "= nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ti -= size\n\t\t\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t\t\t}\n\t\t\ti--\n\t\t\tdAtA[i] = 0x12\n\t\t}\n\t}\n\t{\n\t\tsize, err := m.ListMeta.", "MarshalToSizedBuffer(dAtA[:i])\n\t\tif err !", "= nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti -= size\n\t\ti = encodeVarintGenerated(dAtA, i, uint64(size))\n\t}\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *RoleRef) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *RoleRef) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *RoleRef) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\ti -= len(m.", "Name)\n\tcopy(dAtA[i:], m.Name)\n\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "Name)))\n\ti--\n\tdAtA[i] = 0x1a\n\ti -= len(m.", "Kind)\n\tcopy(dAtA[i:], m.Kind)\n\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "Kind)))\n\ti--\n\tdAtA[i] = 0x12\n\ti -= len(m.", "APIGroup)\n\tcopy(dAtA[i:], m.APIGroup)\n\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "APIGroup)))\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc (m *Subject) Marshal() (dAtA []byte, err error) {\n\tsize := m.Size()\n\tdAtA = make([]byte, size)\n\tn, err := m.MarshalToSizedBuffer(dAtA[:size])\n\tif err !", "= nil {\n\t\treturn nil, err\n\t}\n\treturn dAtA[:n], nil\n}\n\nfunc (m *Subject) MarshalTo(dAtA []byte) (int, error) {\n\tsize := m.Size()\n\treturn m.MarshalToSizedBuffer(dAtA[:size])\n}\n\nfunc (m *Subject) MarshalToSizedBuffer(dAtA []byte) (int, error) {\n\ti := len(dAtA)\n\t_ = i\n\tvar l int\n\t_ = l\n\ti -= len(m.", "Namespace)\n\tcopy(dAtA[i:], m.Namespace)\n\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "Namespace)))\n\ti--\n\tdAtA[i] = 0x22\n\ti -= len(m.", "Name)\n\tcopy(dAtA[i:], m.Name)\n\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "Name)))\n\ti--\n\tdAtA[i] = 0x1a\n\ti -= len(m.", "APIGroup)\n\tcopy(dAtA[i:], m.APIGroup)\n\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "APIGroup)))\n\ti--\n\tdAtA[i] = 0x12\n\ti -= len(m.", "Kind)\n\tcopy(dAtA[i:], m.Kind)\n\ti = encodeVarintGenerated(dAtA, i, uint64(len(m.", "Kind)))\n\ti--\n\tdAtA[i] = 0xa\n\treturn len(dAtA) - i, nil\n}\n\nfunc encodeVarintGenerated(dAtA []byte, offset int, v uint64) int {\n\toffset -= sovGenerated(v)\n\tbase := offset\n\tfor v >= 1<<7 {\n\t\tdAtA[offset] = uint8(v&0x7f | 0x80)\n\t\tv >>= 7\n\t\toffset++\n\t}\n\tdAtA[offset] = uint8(v)\n\treturn base\n}\nfunc (m *AggregationRule) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tif len(m.", "ClusterRoleSelectors) > 0 {\n\t\tfor _, e := range m.ClusterRoleSelectors {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\treturn n\n}\n\nfunc (m *ClusterRole) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = m.ObjectMeta.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\tif len(m.", "Rules) > 0 {\n\t\tfor _, e := range m.Rules {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\tif m.AggregationRule !", "= nil {\n\t\tl = m.AggregationRule.", "Size()\n\t\tn += 1 + l + sovGenerated(uint64(l))\n\t}\n\treturn n\n}\n\nfunc (m *ClusterRoleBinding) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = m.ObjectMeta.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\tif len(m.", "Subjects) > 0 {\n\t\tfor _, e := range m.Subjects {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\tl = m.RoleRef.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\treturn n\n}\n\nfunc (m *ClusterRoleBindingList) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = m.ListMeta.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\tif len(m.", "Items) > 0 {\n\t\tfor _, e := range m.Items {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\treturn n\n}\n\nfunc (m *ClusterRoleList) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = m.ListMeta.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\tif len(m.", "Items) > 0 {\n\t\tfor _, e := range m.Items {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\treturn n\n}\n\nfunc (m *PolicyRule) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tif len(m.", "Verbs) > 0 {\n\t\tfor _, s := range m.Verbs {\n\t\t\tl = len(s)\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\tif len(m.", "APIGroups) > 0 {\n\t\tfor _, s := range m.APIGroups {\n\t\t\tl = len(s)\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\tif len(m.", "Resources) > 0 {\n\t\tfor _, s := range m.Resources {\n\t\t\tl = len(s)\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\tif len(m.", "ResourceNames) > 0 {\n\t\tfor _, s := range m.ResourceNames {\n\t\t\tl = len(s)\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\tif len(m.", "NonResourceURLs) > 0 {\n\t\tfor _, s := range m.NonResourceURLs {\n\t\t\tl = len(s)\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\treturn n\n}\n\nfunc (m *Role) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = m.ObjectMeta.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\tif len(m.", "Rules) > 0 {\n\t\tfor _, e := range m.Rules {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\treturn n\n}\n\nfunc (m *RoleBinding) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = m.ObjectMeta.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\tif len(m.", "Subjects) > 0 {\n\t\tfor _, e := range m.Subjects {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\tl = m.RoleRef.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\treturn n\n}\n\nfunc (m *RoleBindingList) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = m.ListMeta.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\tif len(m.", "Items) > 0 {\n\t\tfor _, e := range m.Items {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\treturn n\n}\n\nfunc (m *RoleList) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = m.ListMeta.", "Size()\n\tn += 1 + l + sovGenerated(uint64(l))\n\tif len(m.", "Items) > 0 {\n\t\tfor _, e := range m.Items {\n\t\t\tl = e.Size()\n\t\t\tn += 1 + l + sovGenerated(uint64(l))\n\t\t}\n\t}\n\treturn n\n}\n\nfunc (m *RoleRef) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = len(m.", "APIGroup)\n\tn += 1 + l + sovGenerated(uint64(l))\n\tl = len(m.", "Kind)\n\tn += 1 + l + sovGenerated(uint64(l))\n\tl = len(m.", "Name)\n\tn += 1 + l + sovGenerated(uint64(l))\n\treturn n\n}\n\nfunc (m *Subject) Size() (n int) {\n\tif m == nil {\n\t\treturn 0\n\t}\n\tvar l int\n\t_ = l\n\tl = len(m.", "Kind)\n\tn += 1 + l + sovGenerated(uint64(l))\n\tl = len(m.", "APIGroup)\n\tn += 1 + l + sovGenerated(uint64(l))\n\tl = len(m.", "Name)\n\tn += 1 + l + sovGenerated(uint64(l))\n\tl = len(m.", "Namespace)\n\tn += 1 + l + sovGenerated(uint64(l))\n\treturn n\n}\n\nfunc sovGenerated(x uint64) (n int) {\n\treturn (math_bits.", "Len64(x|1) + 6) / 7\n}\nfunc sozGenerated(x uint64) (n int) {\n\treturn sovGenerated(uint64((x << 1) ^ uint64((int64(x) >> 63))))\n}\nfunc (this *AggregationRule) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForClusterRoleSelectors := \"[]LabelSelector{\"\n\tfor _, f := range this.", "ClusterRoleSelectors {\n\t\trepeatedStringForClusterRoleSelectors += fmt.", "Sprintf(\"%v\", f) + \",\"\n\t}\n\trepeatedStringForClusterRoleSelectors += \"}\"\n\ts := strings.", "Join([]string{`&AggregationRule{`,\n\t\t`ClusterRoleSelectors:` + repeatedStringForClusterRoleSelectors + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *ClusterRole) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForRules := \"[]PolicyRule{\"\n\tfor _, f := range this.", "Rules {\n\t\trepeatedStringForRules += strings.", "Replace(strings.", "Replace(f.", "String(), \"PolicyRule\", \"PolicyRule\", 1), `&`, ``, 1) + \",\"\n\t}\n\trepeatedStringForRules += \"}\"\n\ts := strings.", "Join([]string{`&ClusterRole{`,\n\t\t`ObjectMeta:` + strings.", "Replace(strings.", "Replace(fmt.", "Sprintf(\"%v\", this.", "ObjectMeta), \"ObjectMeta\", \"v1.ObjectMeta\", 1), `&`, ``, 1) + `,`,\n\t\t`Rules:` + repeatedStringForRules + `,`,\n\t\t`AggregationRule:` + strings.", "Replace(this.", "AggregationRule.", "String(), \"AggregationRule\", \"AggregationRule\", 1) + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *ClusterRoleBinding) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForSubjects := \"[]Subject{\"\n\tfor _, f := range this.", "Subjects {\n\t\trepeatedStringForSubjects += strings.", "Replace(strings.", "Replace(f.", "String(), \"Subject\", \"Subject\", 1), `&`, ``, 1) + \",\"\n\t}\n\trepeatedStringForSubjects += \"}\"\n\ts := strings.", "Join([]string{`&ClusterRoleBinding{`,\n\t\t`ObjectMeta:` + strings.", "Replace(strings.", "Replace(fmt.", "Sprintf(\"%v\", this.", "ObjectMeta), \"ObjectMeta\", \"v1.ObjectMeta\", 1), `&`, ``, 1) + `,`,\n\t\t`Subjects:` + repeatedStringForSubjects + `,`,\n\t\t`RoleRef:` + strings.", "Replace(strings.", "Replace(this.", "RoleRef.", "String(), \"RoleRef\", \"RoleRef\", 1), `&`, ``, 1) + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *ClusterRoleBindingList) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForItems := \"[]ClusterRoleBinding{\"\n\tfor _, f := range this.", "Items {\n\t\trepeatedStringForItems += strings.", "Replace(strings.", "Replace(f.", "String(), \"ClusterRoleBinding\", \"ClusterRoleBinding\", 1), `&`, ``, 1) + \",\"\n\t}\n\trepeatedStringForItems += \"}\"\n\ts := strings.", "Join([]string{`&ClusterRoleBindingList{`,\n\t\t`ListMeta:` + strings.", "Replace(strings.", "Replace(fmt.", "Sprintf(\"%v\", this.", "ListMeta), \"ListMeta\", \"v1.ListMeta\", 1), `&`, ``, 1) + `,`,\n\t\t`Items:` + repeatedStringForItems + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *ClusterRoleList) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForItems := \"[]ClusterRole{\"\n\tfor _, f := range this.", "Items {\n\t\trepeatedStringForItems += strings.", "Replace(strings.", "Replace(f.", "String(), \"ClusterRole\", \"ClusterRole\", 1), `&`, ``, 1) + \",\"\n\t}\n\trepeatedStringForItems += \"}\"\n\ts := strings.", "Join([]string{`&ClusterRoleList{`,\n\t\t`ListMeta:` + strings.", "Replace(strings.", "Replace(fmt.", "Sprintf(\"%v\", this.", "ListMeta), \"ListMeta\", \"v1.ListMeta\", 1), `&`, ``, 1) + `,`,\n\t\t`Items:` + repeatedStringForItems + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *PolicyRule) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\ts := strings.", "Join([]string{`&PolicyRule{`,\n\t\t`Verbs:` + fmt.", "Sprintf(\"%v\", this.", "Verbs) + `,`,\n\t\t`APIGroups:` + fmt.", "Sprintf(\"%v\", this.", "APIGroups) + `,`,\n\t\t`Resources:` + fmt.", "Sprintf(\"%v\", this.", "Resources) + `,`,\n\t\t`ResourceNames:` + fmt.", "Sprintf(\"%v\", this.", "ResourceNames) + `,`,\n\t\t`NonResourceURLs:` + fmt.", "Sprintf(\"%v\", this.", "NonResourceURLs) + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *Role) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForRules := \"[]PolicyRule{\"\n\tfor _, f := range this.", "Rules {\n\t\trepeatedStringForRules += strings.", "Replace(strings.", "Replace(f.", "String(), \"PolicyRule\", \"PolicyRule\", 1), `&`, ``, 1) + \",\"\n\t}\n\trepeatedStringForRules += \"}\"\n\ts := strings.", "Join([]string{`&Role{`,\n\t\t`ObjectMeta:` + strings.", "Replace(strings.", "Replace(fmt.", "Sprintf(\"%v\", this.", "ObjectMeta), \"ObjectMeta\", \"v1.ObjectMeta\", 1), `&`, ``, 1) + `,`,\n\t\t`Rules:` + repeatedStringForRules + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *RoleBinding) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForSubjects := \"[]Subject{\"\n\tfor _, f := range this.", "Subjects {\n\t\trepeatedStringForSubjects += strings.", "Replace(strings.", "Replace(f.", "String(), \"Subject\", \"Subject\", 1), `&`, ``, 1) + \",\"\n\t}\n\trepeatedStringForSubjects += \"}\"\n\ts := strings.", "Join([]string{`&RoleBinding{`,\n\t\t`ObjectMeta:` + strings.", "Replace(strings.", "Replace(fmt.", "Sprintf(\"%v\", this.", "ObjectMeta), \"ObjectMeta\", \"v1.ObjectMeta\", 1), `&`, ``, 1) + `,`,\n\t\t`Subjects:` + repeatedStringForSubjects + `,`,\n\t\t`RoleRef:` + strings.", "Replace(strings.", "Replace(this.", "RoleRef.", "String(), \"RoleRef\", \"RoleRef\", 1), `&`, ``, 1) + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *RoleBindingList) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForItems := \"[]RoleBinding{\"\n\tfor _, f := range this.", "Items {\n\t\trepeatedStringForItems += strings.", "Replace(strings.", "Replace(f.", "String(), \"RoleBinding\", \"RoleBinding\", 1), `&`, ``, 1) + \",\"\n\t}\n\trepeatedStringForItems += \"}\"\n\ts := strings.", "Join([]string{`&RoleBindingList{`,\n\t\t`ListMeta:` + strings.", "Replace(strings.", "Replace(fmt.", "Sprintf(\"%v\", this.", "ListMeta), \"ListMeta\", \"v1.ListMeta\", 1), `&`, ``, 1) + `,`,\n\t\t`Items:` + repeatedStringForItems + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *RoleList) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\trepeatedStringForItems := \"[]Role{\"\n\tfor _, f := range this.", "Items {\n\t\trepeatedStringForItems += strings.", "Replace(strings.", "Replace(f.", "String(), \"Role\", \"Role\", 1), `&`, ``, 1) + \",\"\n\t}\n\trepeatedStringForItems += \"}\"\n\ts := strings.", "Join([]string{`&RoleList{`,\n\t\t`ListMeta:` + strings.", "Replace(strings.", "Replace(fmt.", "Sprintf(\"%v\", this.", "ListMeta), \"ListMeta\", \"v1.ListMeta\", 1), `&`, ``, 1) + `,`,\n\t\t`Items:` + repeatedStringForItems + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *RoleRef) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\ts := strings.", "Join([]string{`&RoleRef{`,\n\t\t`APIGroup:` + fmt.", "Sprintf(\"%v\", this.", "APIGroup) + `,`,\n\t\t`Kind:` + fmt.", "Sprintf(\"%v\", this.", "Kind) + `,`,\n\t\t`Name:` + fmt.", "Sprintf(\"%v\", this.", "Name) + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc (this *Subject) String() string {\n\tif this == nil {\n\t\treturn \"nil\"\n\t}\n\ts := strings.", "Join([]string{`&Subject{`,\n\t\t`Kind:` + fmt.", "Sprintf(\"%v\", this.", "Kind) + `,`,\n\t\t`APIGroup:` + fmt.", "Sprintf(\"%v\", this.", "APIGroup) + `,`,\n\t\t`Name:` + fmt.", "Sprintf(\"%v\", this.", "Name) + `,`,\n\t\t`Namespace:` + fmt.", "Sprintf(\"%v\", this.", "Namespace) + `,`,\n\t\t`}`,\n\t}, \"\")\n\treturn s\n}\nfunc valueToStringGenerated(v interface{}) string {\n\trv := reflect.", "ValueOf(v)\n\tif rv.", "IsNil() {\n\t\treturn \"nil\"\n\t}\n\tpv := reflect.", "Indirect(rv).Interface()\n\treturn fmt.", "Sprintf(\"*%v\", pv)\n}\nfunc (m *AggregationRule) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: AggregationRule: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: AggregationRule: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ClusterRoleSelectors\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.ClusterRoleSelectors = append(m.", "ClusterRoleSelectors, v1.LabelSelector{})\n\t\t\tif err := m.ClusterRoleSelectors[len(m.", "ClusterRoleSelectors)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *ClusterRole) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: ClusterRole: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: ClusterRole: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ObjectMeta\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.ObjectMeta.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Rules\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Rules = append(m.", "Rules, PolicyRule{})\n\t\t\tif err := m.Rules[len(m.", "Rules)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 3:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field AggregationRule\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif m.AggregationRule == nil {\n\t\t\t\tm.AggregationRule = &AggregationRule{}\n\t\t\t}\n\t\t\tif err := m.AggregationRule.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *ClusterRoleBinding) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: ClusterRoleBinding: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: ClusterRoleBinding: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ObjectMeta\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.ObjectMeta.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Subjects\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Subjects = append(m.", "Subjects, Subject{})\n\t\t\tif err := m.Subjects[len(m.", "Subjects)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 3:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field RoleRef\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.RoleRef.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *ClusterRoleBindingList) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: ClusterRoleBindingList: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: ClusterRoleBindingList: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ListMeta\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.ListMeta.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Items\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Items = append(m.", "Items, ClusterRoleBinding{})\n\t\t\tif err := m.Items[len(m.", "Items)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *ClusterRoleList) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: ClusterRoleList: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: ClusterRoleList: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ListMeta\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.ListMeta.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Items\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Items = append(m.", "Items, ClusterRole{})\n\t\t\tif err := m.Items[len(m.", "Items)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *PolicyRule) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: PolicyRule: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: PolicyRule: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Verbs\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Verbs = append(m.", "Verbs, string(dAtA[iNdEx:postIndex]))\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field APIGroups\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.APIGroups = append(m.", "APIGroups, string(dAtA[iNdEx:postIndex]))\n\t\t\tiNdEx = postIndex\n\t\tcase 3:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Resources\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Resources = append(m.", "Resources, string(dAtA[iNdEx:postIndex]))\n\t\t\tiNdEx = postIndex\n\t\tcase 4:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ResourceNames\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.ResourceNames = append(m.", "ResourceNames, string(dAtA[iNdEx:postIndex]))\n\t\t\tiNdEx = postIndex\n\t\tcase 5:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field NonResourceURLs\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.NonResourceURLs = append(m.", "NonResourceURLs, string(dAtA[iNdEx:postIndex]))\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *Role) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: Role: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: Role: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ObjectMeta\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.ObjectMeta.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Rules\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Rules = append(m.", "Rules, PolicyRule{})\n\t\t\tif err := m.Rules[len(m.", "Rules)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *RoleBinding) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: RoleBinding: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: RoleBinding: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ObjectMeta\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.ObjectMeta.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Subjects\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Subjects = append(m.", "Subjects, Subject{})\n\t\t\tif err := m.Subjects[len(m.", "Subjects)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 3:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field RoleRef\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.RoleRef.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *RoleBindingList) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: RoleBindingList: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: RoleBindingList: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ListMeta\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.ListMeta.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Items\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Items = append(m.", "Items, RoleBinding{})\n\t\t\tif err := m.Items[len(m.", "Items)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *RoleList) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: RoleList: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: RoleList: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field ListMeta\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif err := m.ListMeta.", "Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Items\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Items = append(m.", "Items, Role{})\n\t\t\tif err := m.Items[len(m.", "Items)-1].Unmarshal(dAtA[iNdEx:postIndex]); err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *RoleRef) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: RoleRef: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: RoleRef: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field APIGroup\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.APIGroup = string(dAtA[iNdEx:postIndex])\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Kind\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Kind = string(dAtA[iNdEx:postIndex])\n\t\t\tiNdEx = postIndex\n\t\tcase 3:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Name\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Name = string(dAtA[iNdEx:postIndex])\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc (m *Subject) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.", "Errorf(\"proto: Subject: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.", "Errorf(\"proto: Subject: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Kind\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Kind = string(dAtA[iNdEx:postIndex])\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field APIGroup\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.APIGroup = string(dAtA[iNdEx:postIndex])\n\t\t\tiNdEx = postIndex\n\t\tcase 3:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Name\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Name = string(dAtA[iNdEx:postIndex])\n\t\t\tiNdEx = postIndex\n\t\tcase 4:\n\t\t\tif wireType !", "= 2 {\n\t\t\t\treturn fmt.", "Errorf(\"proto: wrong wireType = %d for field Namespace\", wireType)\n\t\t\t}\n\t\t\tvar stringLen uint64\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tstringLen |= uint64(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tintStringLen := int(stringLen)\n\t\t\tif intStringLen < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tpostIndex := iNdEx + intStringLen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.Namespace = string(dAtA[iNdEx:postIndex])\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipGenerated(dAtA[iNdEx:])\n\t\t\tif err !", "= nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif skippy < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.", "ErrUnexpectedEOF\n\t}\n\treturn nil\n}\nfunc skipGenerated(dAtA []byte) (n int, err error) {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tdepth := 0\n\tfor iNdEx < l {\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn 0, ErrIntOverflowGenerated\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn 0, io.", "ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= (uint64(b) & 0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\twireType := int(wire & 0x7)\n\t\tswitch wireType {\n\t\tcase 0:\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn 0, ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn 0, io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tiNdEx++\n\t\t\t\tif dAtA[iNdEx-1] < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\tcase 1:\n\t\t\tiNdEx += 8\n\t\tcase 2:\n\t\t\tvar length int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn 0, ErrIntOverflowGenerated\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn 0, io.", "ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tlength |= (int(b) & 0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif length < 0 {\n\t\t\t\treturn 0, ErrInvalidLengthGenerated\n\t\t\t}\n\t\t\tiNdEx += length\n\t\tcase 3:\n\t\t\tdepth++\n\t\tcase 4:\n\t\t\tif depth == 0 {\n\t\t\t\treturn 0, ErrUnexpectedEndOfGroupGenerated\n\t\t\t}\n\t\t\tdepth--\n\t\tcase 5:\n\t\t\tiNdEx += 4\n\t\tdefault:\n\t\t\treturn 0, fmt.", "Errorf(\"proto: illegal wireType %d\", wireType)\n\t\t}\n\t\tif iNdEx < 0 {\n\t\t\treturn 0, ErrInvalidLengthGenerated\n\t\t}\n\t\tif depth == 0 {\n\t\t\treturn iNdEx, nil\n\t\t}\n\t}\n\treturn 0, io.", "ErrUnexpectedEOF\n}\n\nvar (\n\tErrInvalidLengthGenerated = fmt.", "Errorf(\"proto: negative length found during unmarshaling\")\n\tErrIntOverflowGenerated = fmt.", "Errorf(\"proto: integer overflow\")\n\tErrUnexpectedEndOfGroupGenerated = fmt.", "Errorf(\"proto: unexpected end of group\")\n)\n" ]
{ "pile_set_name": "Github" }
[ 0.0008907412993721664, 0.0005655200802721083, 0.0005397882778197527, 0.0005530848284251988, 0.0007063008961267769, 0.00201672175899148, 0.0007253166986629367, 0.0008830290753394365, 0.0008131062495522201, 0.0010231672786176205, 0.0007121028611436486, 0.0006078027072362602, 0.0008336559985764325, 0.0014783447841182351, 0.0028854648116976023, 0.0008450464811176062, 0.001156491693109274, 0.0012241736985743046, 0.004591785836964846, 0.0014966689050197601, 0.0007599297096021473, 0.0010223345598205924, 0.0010333266109228134, 0.004009346943348646, 0.002183568198233843, 0.0008774941088631749, 0.0011690190294757485, 0.001397102721966803, 0.00296228239312768, 0.001739179715514183, 0.0008189225336536765, 0.0010092759039252996, 0.0010738876881077886, 0.003910816740244627, 0.0014102135319262743, 0.0007977517088875175, 0.0010174772469326854, 0.0009954979177564383, 0.004851697478443384, 0.0025630262680351734, 0.0008760876953601837, 0.0012754532508552074, 0.001106521813198924, 0.002085698302835226, 0.0011868366273120046, 0.0007647419115528464, 0.001018789131194353, 0.0009054210968315601, 0.004153757821768522, 0.0014353154692798853, 0.0007914233137853444, 0.0011137849651277065, 0.0010709280613809824, 0.004106690641492605, 0.0012575590517371893, 0.000774657994043082, 0.0010933881858363748, 0.0009574776631779969, 0.0018065450713038445, 0.0011763849761337042, 0.0007571656024083495, 0.0010021042544394732, 0.0009138040477409959, 0.003614617045968771, 0.0016224379651248455, 0.000797408982180059, 0.0011402283562347293, 0.0009758775122463703, 0.0036603803746402264, 0.0014966719318181276, 0.0007911609136499465, 0.001121645444072783, 0.0010572794126346707, 0.0010514560854062438, 0.0006224669050425291, 0.0006176846800372005, 0.0006678950740024447, 0.0006484746118076146, 0.0006380933918990195, 0.0006545456126332283, 0.0006158254109323025, 0.0006252060411497951, 0.0006241544033400714, 0.0006126395892351866, 0.0006245375843718648, 0.0007540125516243279, 0.013594300486147404, 0.0024955535773187876, 0.0008629176300019026, 0.0008354572346433997, 0.002122635953128338, 0.00289525231346488, 0.0009411805658601224, 0.0011071987682953477, 0.0033758487552404404, 0.0008656942518427968, 0.0008890526951290667, 0.0015571275725960732, 0.0011071987682953477, 0.0021136668510735035, 0.0016024726210162044, 0.0011071987682953477, 0.002784640761092305, 0.0007902725483290851, 0.0008493148488923907, 0.0015571275725960732, 0.0011071987682953477, 0.0022562623489648104, 0.001982187619432807, 0.0008390069124288857, 0.0008997009135782719, 0.001442133099772036, 0.0011071987682953477, 0.002026122761890292, 0.0020517136435955763, 0.0008390069124288857, 0.0008997009135782719, 0.001442133099772036, 0.0011071987682953477, 0.002615497214719653, 0.002632562769576907, 0.001262705191038549, 0.0016006594523787498, 0.0008083158754743636, 0.00115503731649369, 0.0008771573193371296, 0.0009522389154881239, 0.0008111216593533754, 0.0009554196149110794, 0.0007888621767051518, 0.0008481574477627873, 0.0007064163219183683, 0.0008732632268220186, 0.0009714076295495033, 0.0010517792543396354, 0.0007841038750484586, 0.0009192098514176905, 0.0008075470686890185, 0.0008828174322843552, 0.000662541133351624, 0.0009446091717109084, 0.001898180809803307, 0.0008656942518427968, 0.0008890526951290667, 0.0015571275725960732, 0.0011071987682953477, 0.0022584027610719204, 0.001708504045382142, 0.0011071987682953477, 0.002784640761092305, 0.0007902725483290851, 0.0008493148488923907, 0.0015571275725960732, 0.0011071987682953477, 0.002014473546296358, 0.001965109258890152, 0.0008390069124288857, 0.0008997009135782719, 0.001442133099772036, 0.0011071987682953477, 0.0016386143397539854, 0.0016916886670514941, 0.0008390069124288857, 0.0008997009135782719, 0.001442133099772036, 0.0011071987682953477, 0.0023070713505148888, 0.0022106689866632223, 0.0007672350038774312, 0.0007694887463003397, 0.0008137344848364592, 0.0008081982959993184, 0.0008495041984133422, 0.00104718457441777, 0.002297094324603677, 0.0008363209781236947, 0.0007401620387099683, 0.0007672350038774312, 0.0007694887463003397, 0.0008495041984133422, 0.0007655693916603923, 0.0008137344848364592, 0.0016374633414670825, 0.0017213082173839211, 0.0015677664196118712, 0.0014455229975283146, 0.001039251685142517, 0.003049529157578945, 0.0015677664196118712, 0.0008764283847995102, 0.002821642439812422, 0.0015677664196118712, 0.0019233523635193706, 0.0015677664196118712, 0.0032301133032888174, 0.0011602903250604868, 0.0028267924208194017, 0.0012798882089555264, 0.0024275535251945257, 0.005624528042972088, 0.0015677664196118712, 0.0017695869319140911, 0.0015677664196118712, 0.0008764283847995102, 0.0024564177729189396, 0.0015677664196118712, 0.0015579307219013572, 0.0015677664196118712, 0.0029952828772366047, 0.0010391338728368282, 0.0024789823219180107, 0.0046832868829369545, 0.0024789823219180107, 0.0010391338728368282, 0.0012578627793118358, 0.0012538597220554948, 0.0019193142652511597, 0.0010240634437650442, 0.0015820800326764584, 0.0012415532255545259, 0.0009199388441629708, 0.0009200053755193949, 0.0011460328241810203, 0.0010043306974694133, 0.0007535739568993449, 0.0009200053755193949, 0.0008591138175688684, 0.0008296283194795251, 0.0007816755096428096, 0.000902080035302788, 0.0010103046661242843, 0.0013068346306681633, 0.0009888710919767618, 0.0009200053755193949, 0.0011460328241810203, 0.0011223518522456288, 0.0008406902197748423, 0.0009200053755193949, 0.0008591138175688684, 0.0008296283194795251, 0.0008142567821778357, 0.0009200053755193949, 0.000902080035302788, 0.0010492150904610753, 0.0011800251668319106, 0.0009544324711896479, 0.0009200053755193949, 0.0011460328241810203, 0.0009521414176560938, 0.0008085361332632601, 0.0009200053755193949, 0.0008591138175688684, 0.0008296283194795251, 0.0011359270429238677, 0.0009544324711896479, 0.0009200053755193949, 0.0011460328241810203, 0.0008919061510823667, 0.0007820923929102719, 0.0009200053755193949, 0.0008591138175688684, 0.0008296283194795251, 0.0013863509520888329, 0.0007236417150124907, 0.0008296283194795251, 0.0007240907289087772, 0.0008296283194795251, 0.0007291165529750288, 0.0008296283194795251, 0.0007186513976193964, 0.0008296283194795251, 0.0008070424664765596, 0.0008296283194795251, 0.0018494873074814677, 0.0009199388441629708, 0.0009200053755193949, 0.0011460328241810203, 0.0010043306974694133, 0.0007241084240376949, 0.0009200053755193949, 0.0008591138175688684, 0.0008296283194795251, 0.0011827119160443544, 0.0009888710919767618, 0.0009200053755193949, 0.0011460328241810203, 0.0011223518522456288, 0.0007604379788972437, 0.0009200053755193949, 0.0008591138175688684, 0.0008296283194795251, 0.0008142567821778357, 0.0009200053755193949, 0.000902080035302788, 0.0010492150904610753, 0.0010995357297360897, 0.0009544324711896479, 0.0009200053755193949, 0.0011460328241810203, 0.0009706993587315083, 0.000739390728995204, 0.0009200053755193949, 0.0008591138175688684, 0.0008296283194795251, 0.0010964302346110344, 0.0009544324711896479, 0.0009200053755193949, 0.0011460328241810203, 0.0009289945010095835, 0.000716006092261523, 0.0009200053755193949, 0.0008591138175688684, 0.0008296283194795251, 0.00126735121011734, 0.0007442274945788085, 0.0008296283194795251, 0.0008020224631763995, 0.0008296283194795251, 0.0008045550202950835, 0.0008296283194795251, 0.0015075146220624447, 0.0007755894330330193, 0.0008296283194795251, 0.0007998896180652082, 0.0008296283194795251, 0.0007736750412732363, 0.0008296283194795251, 0.0007427261443808675, 0.0008296283194795251, 0.0012534352717921138, 0.0017122853314504027, 0.0007279477431438863, 0.0006589737604372203, 0.0012659650528803468, 0.0014562030555680394, 0.0008435537456534803, 0.0009906995110213757, 0.0010284524178132415, 0.001058640074916184, 0.004315843340009451, 0.0009841832797974348, 0.0009173658327199519, 0.0007493564626201987, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.0019141327356919646, 0.0014562030555680394, 0.0008078757673501968, 0.0009536748402751982, 0.0010284524178132415, 0.0012992449337616563, 0.004315843340009451, 0.0014584735035896301, 0.0008318836335092783, 0.0013064250815659761, 0.0010284524178132415, 0.0012047849595546722, 0.004315843340009451, 0.001159207196906209, 0.0012136041186749935, 0.0009327128063887358, 0.0012933840043842793, 0.0010284524178132415, 0.0012885984033346176, 0.004315843340009451, 0.001436122227460146, 0.0008318836335092783, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.0018736012279987335, 0.0014562030555680394, 0.0008428117143921554, 0.0010565750999376178, 0.0010284524178132415, 0.0012992449337616563, 0.004315843340009451, 0.0014584735035896301, 0.0008318836335092783, 0.0013064250815659761, 0.0010284524178132415, 0.0011608082568272948, 0.004315843340009451, 0.0011504144640639424, 0.0009628100669942796, 0.0009079362498596311, 0.0012933840043842793, 0.0010284524178132415, 0.0011617345735430717, 0.004315843340009451, 0.001110466313548386, 0.0008318836335092783, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.0014960271073505282, 0.0014562030555680394, 0.0008169813081622124, 0.0009517944999970496, 0.0010284524178132415, 0.00126189598813653, 0.004315843340009451, 0.0012442589504644275, 0.0008318836335092783, 0.0013064250815659761, 0.0010284524178132415, 0.001199987716972828, 0.004315843340009451, 0.0012539116432890296, 0.001191330491565168, 0.0009090894018299878, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.00247832085005939, 0.0014562030555680394, 0.0007672635256312788, 0.0009290480520576239, 0.0010284524178132415, 0.00126189598813653, 0.004315843340009451, 0.0012442589504644275, 0.0008318836335092783, 0.0013064250815659761, 0.0010284524178132415, 0.001199987716972828, 0.004315843340009451, 0.0012539116432890296, 0.0009694558684714139, 0.0009090894018299878, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.0022196790669113398, 0.0014562030555680394, 0.0008705087238922715, 0.0010055112652480602, 0.0010284524178132415, 0.0009493495454080403, 0.005612082313746214, 0.0011118948459625244, 0.0007611985201947391, 0.0010284524178132415, 0.0011075785150751472, 0.005612082313746214, 0.0011982312425971031, 0.0008081182604655623, 0.0010284524178132415, 0.0009548399830237031, 0.005612082313746214, 0.0010878454195335507, 0.0007561168167740107, 0.0010284524178132415, 0.0011105334851890802, 0.005612082313746214, 0.00112510088365525, 0.0007817276637069881, 0.0010284524178132415, 0.0012086177011951804, 0.005612082313746214, 0.0017514602513983846, 0.0014838975621387362, 0.00476194778457284, 0.0014226387720555067, 0.0016741984291002154, 0.0014562030555680394, 0.000885069603100419, 0.0009222812368534505, 0.0010284524178132415, 0.0012992449337616563, 0.004315843340009451, 0.0014584735035896301, 0.0008318836335092783, 0.0013064250815659761, 0.0010284524178132415, 0.0012047849595546722, 0.004315843340009451, 0.001159207196906209, 0.0012136041186749935, 0.0009327128063887358, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.001991675468161702, 0.0014562030555680394, 0.0008134910021908581, 0.0009162002243101597, 0.0010284524178132415, 0.0012992449337616563, 0.004315843340009451, 0.0014584735035896301, 0.0008318836335092783, 0.0013064250815659761, 0.0010284524178132415, 0.0011608082568272948, 0.004315843340009451, 0.0011504144640639424, 0.0009628100669942796, 0.0009079362498596311, 0.0012933840043842793, 0.0010284524178132415, 0.0011617345735430717, 0.004315843340009451, 0.001110466313548386, 0.0008318836335092783, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.0022374577820301056, 0.0014562030555680394, 0.0007895635208114982, 0.0008944660075940192, 0.0010284524178132415, 0.00126189598813653, 0.004315843340009451, 0.0012442589504644275, 0.0008318836335092783, 0.0013064250815659761, 0.0010284524178132415, 0.001199987716972828, 0.004315843340009451, 0.0012539116432890296, 0.0010509719140827656, 0.0009090894018299878, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.0015292292227968574, 0.0014562030555680394, 0.0008410496520809829, 0.0008956575184129179, 0.0010284524178132415, 0.00126189598813653, 0.004315843340009451, 0.0012442589504644275, 0.0008318836335092783, 0.0013064250815659761, 0.0010284524178132415, 0.001199987716972828, 0.004315843340009451, 0.0012539116432890296, 0.0009282835526391864, 0.0009090894018299878, 0.0020531690679490566, 0.00476194778457284, 0.0014226387720555067, 0.0019678184762597084, 0.0014562030555680394, 0.0007889301632530987, 0.0009201531065627933, 0.0010284524178132415, 0.001173849101178348, 0.005612082313746214, 0.0009234643657691777, 0.0010284524178132415, 0.0009884240571409464, 0.005612082313746214, 0.0010562334209680557, 0.0010284524178132415, 0.0009561116457916796, 0.005612082313746214, 0.0013188236625865102, 0.00476194778457284, 0.0014226387720555067, 0.0018057026900351048, 0.0014562030555680394, 0.0009834662778303027, 0.0010286855977028608, 0.0010284524178132415, 0.0009884240571409464, 0.005612082313746214, 0.0010643545538187027, 0.0010284524178132415, 0.001173849101178348, 0.005612082313746214, 0.0009174375445581973, 0.0010284524178132415, 0.0009561116457916796, 0.005612082313746214, 0.0009498748695477843, 0.0010284524178132415, 0.0011155200190842152, 0.005612082313746214, 0.0011930202599614859, 0.00476194778457284, 0.0014226387720555067, 0.0014375061728060246, 0.0012990556424483657, 0.0015579047612845898, 0.0018476336263120174, 0.0014800956705585122, 0.0013086081016808748, 0.0007480572094209492, 0.0007114944164641201, 0.0006217414629645646 ]
0.00152
596
[ "SALT LAKE CITY — A man overdosed on prescription drugs that were returned to him upon his release from jail, then died in a holding cell after he was re-arrested a few hours later, a lawsuit against Davis County says." ]
{ "pile_set_name": "Pile-CC" }
[ 0.002726287581026554 ]
0.002726
1
[ "The Mumbai Fire Brigade which has been inspecting highrise buildings in the city for fire safety norms, will expand its fire inspection cell by including more fire officers. ", "Of the 1,857 buildings inspected so far, only 237 have fully complied with fire safety norms, according to information from the fire brigade.", "\n\n\"While we have issued notices to over 1,000 buildings for not following fire safety norms, there are still over 5,000 more highrise buildings to inspect. ", "We have a cell of 70 officers and will be adding more officers,\" said Chief Fire Officer (CFO), Suhas Joshi.", "\n\nThe fire brigade is in the process of taking legal action against four buildings in Tardeo, Andheri (west and east) and Bhandup for flouting fire safety rules. ", "Of the 52 hospitals inspected in the city, 17 have been issued notices. ", "Only five were found to fully comply with regulations.", "\n\nThe fire brigade also said that the major cause for fire in the city was short circuit from faulty electrical appliances. ", "A whopping 3,131 fires have been caused due to short circuits. ", "Careless disposal of inflammable material is the second biggest cause. ", "Since March 2012, the brigade received 1,478 emergency fire calls from the island city, and 1,822 from the suburbs.", "\n\nTo cut response time, the fire brigade will set up on priority five more fire stations at Priyadarshini Park, Kanjurmarg, Thakur Village in Kandivali (east), Kanderpada in Dahisar, and Ghatkopar (east).", "\n\nAt present, there are 15 fire stations in the city, 12 in the western suburbs, and six in the eastern suburbs. \"", "We are planning 26 more fire stations but right now we are looking to set up five on priority,\" said deputy chief fire officer P Rahangdale.", "\n\nIn an effort to fully utilize its fire safety budget, the brigade is also acquiring sophisticated rescue equipment such as a hydraulic platforms that will reach 90 metres high, a radio trunking communication system and cardiac ambulances. ", "For beach safety, the brigade said it will be acquiring watercraft and RIV vehicles to patrol the seaside.", "\n\nTERMS OF USE: The views expressed in comments published on indianexpress.com are those of the comment writer's alone. ", "They do not represent the views or opinions of The Indian Express Group or its staff. ", "Comments are automatically posted live; however, indianexpress.com reserves the right to take it down at any time. ", "We also reserve the right not to publish comments that are abusive, obscene, inflammatory, derogatory or defamatory." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005968920304439962, 0.0005937296082265675, 0.000578861974645406, 0.000728426210116595, 0.0009474190301261842, 0.0006385137676261365, 0.0007049441919662058, 0.0007676778477616608, 0.05560564994812012, 0.003954214509576559, 0.0006408710614778101, 0.0008582534501329064, 0.0006532465922646224, 0.0006616690661758184, 0.0006233773310668766, 0.000594834447838366, 0.0005469796014949679, 0.0006537570152431726, 0.0005784050445072353, 0.009510067291557789 ]
0.004022
20
[ "When Americans cast their 2016 presidential ballots, the collective emotion could be summarized as: “How did we get this dismal choice?” ", "Not since 1956 had there been such profound dissatisfaction with how candidates were nominated for president. ", "The problem was not only the unpopularity of Donald Trump and Hillary Clinton, but also widespread accusations of unfairness that accompanied the nomination fights in both parties. ", "Bernie Sanders was incensed about “closed” Democrats-only primaries that disenfranchised some of his supporters, while Trump yelled “rigged” whenever something did not go his way, such as the decision by Colorado Republicans to eliminate a nonbinding candidate preference poll to accompany the state’s caucuses.", "\n\nNow amid the pyrotechnics of Trump’s presidency, the 2016 primary season seems as long ago as the Punic Wars. ", "The arguments over the nomination process that once animated Sanders supporters and never-Trump Republicans are now lost in the mists of history. ", "The next time most voters will think about the system for nominating presidents is in 2020 when once again some candidate or another will be claiming that the game is rigged.", "\n\nBut 2020 will be far too late. ", "The time to rethink the presidential nominating system is now, when it’s too early to calculate how jiggering with matters like the primary calendar would affect specific candidates. ", "The Democratic Party’s Unity Commission - an internal reform effort approved at the 2016 convention to appease Sanders’s backers - will soon begin work on a series of recommendations for rules changes due at the end of the year. ", "Meanwhile, California is already threatening to move up its 2020 primary for both parties to a privileged position right after Iowa and New Hampshire.", "\n\nThe issue here is not whom the parties will select, but rather how such candidates should be chosen. ", "As a political columnist who has covered the last 10 presidential campaigns, I have been wondering if we could find better and fairer ways to nominate presidential candidates for decades. ", "And by now, I am far more interested in what might be attainable in 2020 or 2024 than I am in devising an ideal system that never moves beyond armchair theory. ", "With that goal in mind, here are four recommendations for picking future presidential nominees that reflect some of the complaints that candidates and voters in both parties have raised in recent years. (", "A longer version of these proposals is in a new report I wrote for the Brennan Center for Justice, “The Chosen One: Thoughts on a Better, Fairer, and Smarter Way to Choose Presidential Nominees.”)", "\n\n1. ", "Eliminate caucuses and the clustering of primaries on “Super Tuesdays”\n\nMost debates over the calendar used to nominate presidents begin and end with the privileged position of Iowa caucuses and the New Hampshire primary. ", "I strongly believe in the principle that small states should go first, because it represents the only way that a little-known contender (like Sanders at the beginning of 2016 or Rick Santorum in 2012) can get a fair shake. ", "But it is impossible to logically defend low-turnout caucuses like Iowa’s, which disenfranchise voters who work nights or have child-care problems. ", "The simple solution would be to turn the Iowa caucuses into a primary and have it come right after New Hampshire. ", "Or, if necessary, schedule Iowa and New Hampshire for the same day.", "\n\nAs a reporter who celebrated New Year’s Eve 2007-2008 in Des Moines, I have a fervent belief that sanity argues for beginning the primaries in early February rather than January. ", "There should also be a protected position in February for South Carolina (65 percent of voters in its 2016 Democratic primary were nonwhite) and a Western state with a large Latino population.", "\n\nSign up for The Point Go inside New York politics. ", "By clicking Sign up, you agree to our privacy policy.", "\n\nIdeally, there would be only one or two contests per week, which would give voters a chance to reflect on the results from the prior primaries and the natural winnowing of the field. ", "In 2016, for example, nine states held presidential primaries in both parties on March 1. ", "The more primaries that are held on a single day, the harder it becomes for the voters to make a reflective decision. ", "Primaries are inherently confusing to voters, because all the candidates are in the same party and often agree on many policies. ", "That is why a sane pace is important, so voters are not excessively influenced by a fleeting news development or the aftereffects of some rehearsed debate line. ", "Extreme clustering rewards candidates with vast resources, since they can afford to advertise heavily in multiple states at the same time. ", "This was the disadvantage that both Santorum and Newt Gingrich faced against Mitt Romney in 2012.", "\n\nEvery inducement at the disposal of the parties (especially bonus delegates and permission to hold winner-take-all contests) should be employed to space out the primaries in a reasonable fashion from February until late May or early June. ", "Up to now, parties only have tried to penalize states that vie with Iowa, New Hampshire and South Carolina early on the calendar.", "\n\n2. ", "Change how delegates are awarded\n\nDemocrats have a phobia against winner-take-all primaries that dates to mostly forgotten floor fights at the 1968 convention and fears in 1972 that George Wallace could win the nomination. ", "As a result, the party boasts an almost religious devotion to selecting convention delegates by proportional representation by congressional districts. ", "Without the same tempestuous history (before 2016), the Republicans lack similar inhibitions about winner-take-all primaries.", "\n\nOne of the oddities of the current system is that both parties favor electing delegates by congressional districts rather than statewide. ", "Democrats mandate this approach, with 75 percent of pledged delegates elected by district; Republicans have backed into it by leaving decisions on how to allocate delegates to individual states.", "\n\nAs a matter of principle, awarding delegates by congressional district runs counter to the way we actually elect presidents. ", "In the electoral college, 48 out of 50 states allocate electors on a statewide winner-take-all basis.", "\n\nThe system also is indefensible on practical grounds. ", "In last year’s April 19 New York Republican primary, for example, three delegates were awarded to the winner of each of the state’s 27 congressional districts. ", "What that meant is that 1,223 GOP voters in New York’s heavily Democratic 15th District (the Bronx) selected three delegates - as did the 76,126 Republicans who cast ballots in the 27th District (the Buffalo and Rochester suburbs). ", "While Trump swept all of New York (aside from his home borough of Manhattan, which went narrowly for John Kasich), it is hard to justify the GOP giving such delegate weight to landslide Democratic districts.", "\n\nConvention delegates should be allocated statewide in all cases. ", "To prevent splintering of the vote, implement a 15 percent statewide threshold to win delegates, which is analogous to current Democratic rules. ", "Similarly, it is difficult to justify Democrats’ traditional resistance to winner-take-all primaries. ", "Deployed late enough in the political season, winner-take-all-contests can give voters a meaningful chance to say, “wait a second,” as the party may be rushing to anoint a badly flawed nominee. ", "As both Sanders in 2016 and Clinton in 2008 learned, it is near impossible for a trailing Democrat to catch up because of the party’s extreme form of proportional representation.", "\n\n3. ", "Have GOP superdelegates and a “conscience clause”\n\nUnelected and unpledged superdelegates, which Democrats created before the 1984 convention, are probably the most unpopular aspect of the presidential nomination system. ", "But these superdelegates are also the major reason Democrats would never have nominated as disruptive a presidential candidate as Donald Trump.", "\n\nThe logic behind the invention of superdelegates was simple and persuasive - elected and party officials deserve a seat at the table. ", "Perhaps Democrats have been too generous in making all 447 members of the Democratic National Committee automatic delegates, along with Democratic governors and members of Congress. ", "But from the beginning, superdelegates have been roughly 15 percent of the total delegates at a Democratic convention.", "\n\nSuperdelegates should be understood as an “in emergency break glass” mechanism. ", "Their votes will rarely be decisive (superdelegates have always been reluctant to intervene in races with two acceptable candidates, like 2008 with Barack Obama and Clinton), but when they are, they could save the party from disaster. ", "Which is why the Republicans should adopt their own version of superdelegates to protect the party from future hostile takeovers. ", "With Trump in 2016 viciously ridiculing his fellow Republicans and jettisoning party orthodoxy on issues like free trade, it is an open question whether enough GOP officeholders and party officials would have had the moxie to stand up to him if the party had superdelegates. (", "Lacking an ironclad means to stop him, they largely went along with him last year.) ", "But every major Republican on the ballot in 2016 should have had a chance to cast a convention vote on the choice of a tempestuous outsider as the party’s nominee.", "\n\nDemocrats have another praiseworthy rule that might have also stopped Republicans from nominating Trump. ", "In response to Ted Kennedy’s 1980 protest about “robot delegates” forever bound to the unpopular Jimmy Carter, Democrats added a “conscience clause” to the rules. ", "That is, a delegate is bound to vote for the candidate to whom they are pledged unless in “good conscience” he or she can no longer do so. ", "Had, say, the “Access Hollywood” tape been revealed before the GOP convention, Republicans could have had the option of employing the “good conscience” escape clause.", "\n\n4. ", "National parties should control the debates\n\nNo element of the 2016 primary campaign was more blatantly unfair than the debates, especially on the GOP side. ", "Republican debates were organized by the cable networks to hype Trump for ratings and deliberately marginalized senior senators like Lindsey Graham and prior victors of the Iowa caucuses such as Santorum and Mike Huckabee. ", "The audiences at many of these GOP debates more resembled a pro-wrestling crowd than voters choosing a nominee for president.", "\n\nThere is no ideal number of primary debates. ", "But there should be enough so that a front-runner like Clinton in 2016 cannot sit on a lead - and yet not so many (the Republicans held 27 in 2012) that preparation seriously interferes with actual campaigning.", "\n\nGiven the record ratings of the Republican primary debates last year and the keen interest on the Democratic side, the national parties are in a position to demand that any network sponsoring a debate has to meet certain conditions. ", "The major error made by Republican National Committee Chairman Reince Priebus in 2015 was passively ceding to the networks the right to winnow the GOP field to create more dramatic television. ", "The result was an overhyped circus atmosphere that directly contributed to the nomination of a former reality-show host who repudiated many traditional GOP positions.", "\n\nNever again should networks be allowed, especially before anyone votes, to exile candidates with serious political credentials to a “kiddie table.” ", "If there are too many candidates for a single debate, the party should divide them into two groups by lot and hold back-to-back events.", "\n\nWhenever anyone discusses the system by which we nominate presidential candidates, it is usually to propose an unworkable system like a national primary, which would rule out all candidates except the already famous and remove any chance of an underdog candidate like Carter in 1976 to ever break through. ", "What is needed is not a far-reaching overhaul of a nomination system that in the past 40 years has given the nation successful presidents like Ronald Reagan, Bill Clinton and Obama. ", "Instead, all we need are adjustments by the parties predicated on fairness and giving primary voters sufficient time for deliberation.", "\n\nIn a democracy, there is no way of guaranteeing outcomes. ", "So possibly in some future year, the nation will again be saddled with two presidential nominees as unpopular as Donald Trump and Hillary Clinton. ", "But the persuasive case for reforming the presidential nomination system in both parties is that it will lessen the odds that Americans will ever again have to vote for president with gritted teeth.", "\n\nShapiro is a fellow at the Brennan Center for Justice at NYU School of Law, a columnist for Roll Call and a lecturer in political science at Yale University." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006288873846642673, 0.0005937160458415747, 0.0009255488985218108, 0.0032519656233489513, 0.0015496520791202784, 0.003179822349920869, 0.0007217914098873734, 0.0010832000989466906, 0.0007423193310387433, 0.0006421981961466372, 0.0005987818003632128, 0.0006958339945413172, 0.0005547894397750497, 0.0005898412200622261, 0.0005533830844797194, 0.0005341643700376153, 0.0009391900966875255, 0.0007006069645285606, 0.0005288550164550543, 0.0024745373521000147, 0.0006332587799988687, 0.0006016010884195566, 0.0006488903309218585, 0.0020502773113548756, 0.0008099962724372745, 0.0005289745749905705, 0.0005502050626091659, 0.000541293469723314, 0.0005852901958860457, 0.0005935155204497278, 0.0006171944551169872, 0.0006558769382536411, 0.0019647071603685617, 0.0006072407704778016, 0.0006381019484251738, 0.001185585861094296, 0.012085050344467163, 0.0006295932689681649, 0.0007636447553522885, 0.0007693574880249798, 0.0006827706238254905, 0.0005665338248945773, 0.000808605516795069, 0.0006610331474803388, 0.0006474500987678766, 0.0007416203734464943, 0.000781624112278223, 0.0005613230168819427, 0.0006979326717555523, 0.0010892966529354453, 0.0007474586018361151, 0.0007017175666987896, 0.00117425003554672, 0.006472612265497446, 0.001271886401809752, 0.0006499422597698867, 0.0006936559802852571, 0.0006121201440691948, 0.0006207005935721099, 0.000611496448982507, 0.0050574615597724915, 0.0020770085975527763, 0.000717038637958467, 0.0007783848559483886, 0.0016517507610842586, 0.0014272837433964014, 0.0007960476796142757, 0.0012771951733157039, 0.0012900278670713305, 0.0008112557698041201, 0.0009034480899572372, 0.0006373852957040071, 0.0006237592315301299, 0.0008174345712177455, 0.0005685886135324836, 0.0008493750938214362, 0.0006833262159489095, 0.0010714419186115265, 0.0006963457562960684, 0.0006377936224453151, 0.0006217634072527289, 0.0005827888962812722, 0.0006896128761582077, 0.0011474179336801171, 0.0009309066808782518, 0.0007078203489072621 ]
0.001137
86
[ "Stormfront (website)\n\nStormfront is a white nationalist, white supremacist, antisemitic, Holocaust denialist, and neo-Nazi Internet forum, and the Web's first major racial hate site. ", "In addition to its promotion of Holocaust denial, Stormfront has increasingly become active in the propagation of Islamophobia.", "\n\nStormfront began as an online bulletin board system in the early 1990s before being established as a website in 1996 by former Ku Klux Klan leader and white supremacist Don Black. ", "It received national attention in the United States in 2000 after being featured as the subject of a documentary, Hate.com. ", "Stormfront has been the subject of controversy after being removed from French, German, and Italian Google indexes, for targeting an online Fox News poll on racial segregation, and for having political candidates as members. ", "Its prominence has grown since the 1990s, attracting attention from watchdog organizations that oppose racism and antisemitism.", "\n\nIn August 2017, Stormfront was taken offline for just over a month when its registrar seized its domain name due to complaints that it promoted hatred and that some of its members were linked to murder. ", "The Lawyers' Committee for Civil Rights Under Law claimed credit for the action after advocating for Stormfront's web host, Network Solutions, to enforce its Terms of Service agreement which prohibits users from using its services to incite violence.", "\n\nHistory\n\nEarly history\nStormfront began in 1990 as an online bulletin board for white nationalist David Duke's campaign for United States senator for Louisiana. ", "The name \"Stormfront\" was chosen for its connotations of a political or military front (such as the German Nazi stormtroopers, the Sturmabteilung or SA) and an analogy with weather fronts that invokes the idea of a tumultuous storm ending in cleansing. ", "The Stormfront.org website was founded in 1996 by Don Black, a former grand wizard of the Ku Klux Klan in the 1970s and a member of the National Socialist White People's Party. ", "Black first received computer training while he was imprisoned for his role in an abortive 1981 attempt to overthrow the government of Dominica.", "\n\nAlthough Stormfront became the first website associated with white supremacy, its founding as a private cyberspace medium for white supremacy was based on the earlier online bulletin board system Liberty Net. ", "Liberty Net was implemented in 1984 by Klan grand dragon Louis Beam and protected by four password-protected computers that took the FBI two years to decrypt. ", "Liberty Net's code-accessed message board contained personal ads along with recruitment material and information about the white power movement. ", "Liberty Net's success as a computer platform led to Stormfront's establishment and later conversion into a website.", "\n\nUntil this point, attempts at using the Internet as opposed to bulletin boards for the white pride movement had limited success, but Stormfront developed a following with the growth of the Internet during the 1990s. ", "By 1999, nearly 2,000 websites associated with white supremacy existed, with the recruitment power of reaching millions across the United States.", "\n\nNational attention\nThe website has received considerable attention in the United States, given that, as of 2009, it had over 120,000 active members.", "\n\nThe 2000 CBS/HBO TV documentary special Hate.com focused on the rise of hate groups online and included input from Don Black, the founder of Stormfront. ", "Narrated by Morris Dees of the Southern Poverty Law Center (SPLC), it featured interviews with Black and his son Derek as well as interviews with other white nationalist groups and organizations. ", "Black had participated in the hope that the broadcast would show some sympathy towards the white nationalist movement, but Hate.com focused exclusively on the group's tactics and not its grievances.", "\n\nControversies\nIn 2002, Google complied with French and German legislation forbidding links to websites which host white supremacist, Holocaust-denying or historical revisionist material by removing Stormfront.org from their French and German indexes.", "\n\nStormfront returned to the news in May 2003, when Fox News Channel host Bill O'Reilly reported on a racially segregated prom being held in Georgia and posted a poll on his website asking his viewers if they would send their own children to one. ", "The next night, O'Reilly announced that he could not report the results of the poll as it appeared Stormfront had urged its members to vote in the poll, thus skewing the numbers.", "\n\nDoug Hanks, a candidate for the city council of Charlotte, North Carolina, withdrew his nomination in August 2005 after it was revealed that he had posted on Stormfront. ", "Hanks had posted more than 4,000 comments over three years, including one in which he described black people as \"rabid beasts\". ", "Hanks said his postings were designed to gain the trust of Stormfront users to help him write a novel: \"I did what I thought I needed to do to establish myself as a credible white nationalist.\"", "\n\nIn 2012, Italian police blocked the website and arrested four people for inciting racial hatred. ", "The measure was taken after the publication of a blacklist of \"prominent Jews and people who support Jews and immigrants\" on the Italian section of the website. ", "The list included possible targets of violent attacks, including gypsy camps. ", "The subsequent year, in November 2013, Italian police raided the homes of 35 Stormfront posters. ", "One man who was arrested in Mantua had two loaded weapons, a hand grenade casing, and a flag with a swastika in his possession.", "\n\nAccording to a 2014 two-year study by the Southern Poverty Law Center (SPLC)'s Intelligence Report, registered Stormfront users have been disproportionately responsible for some of the most lethal hate crimes and mass killings since the site was put up in 1995. ", "In the five years leading up to 2014, Stormfront members murdered nearly 100 people. ", "Of these, 77 were massacred by one Stormfront user, Anders Behring Breivik, a Norwegian terrorist who perpetrated the 2011 Norway attacks.", "\n\nPublic profile and later history\n\nIn a 2001 USA Today article, journalist Tara McKelvey called Stormfront \"the most visited white supremacist site on the Net.\" ", "The number of registered users on the site rose from 5,000 in January 2002 to 52,566 in June 2005, by which year it was the 338th largest Internet forum, receiving more than 1,500 hits each weekday and ranking in the top one percent of Internet sites in terms of use. ", "By June 2008, the site was attracting more than 40,000 unique users each day. ", "Operating the site from its West Palm Beach, Florida headquarters is Black's full-time job, and he was assisted by his son and 40 moderators. ", "The public profile of the site attracted attention from groups such as the Simon Wiesenthal Center and the Anti-Defamation League (ADL). ", "The ADL describes Stormfront as having \"served as a veritable supermarket of online hate, stocking its shelves with many forms of anti-Semitism and racism\".", "\n\nIn 2006, the Southern Poverty Law Center (SPLC) reported a discussion on Stormfront in which white nationalists were encouraged to join the United States military to learn the skills necessary for winning a race war. ", "The 2008 United States presidential candidacy of African-American Democrat Barack Obama was a cause of significant concern for some Stormfront members: the site received 2,000 new members the day after Obama was elected as President, and went offline temporarily due to the increase in visitors. ", "Stormfront posters saw Obama as representing a new multicultural era in the United States replacing \"white rule\", and feared that he would support illegal immigration and affirmative action and that he would help make white people a minority group.", "\n\nDuring the 2008 primary campaigns, The New York Times mistakenly reported that Stormfront had donated $500 to Republican presidential hopeful Ron Paul; in fact, it was site owner Don Black who had contributed the money to Paul. ", "Following an April 2009 shooting, Richard Poplawski, a poster on the site, was charged with ambushing and killing three Pittsburgh Police officers and attempting to kill nine others.", "\n\nDuring the 2016 election season, site founder Don Black said that the site was experiencing huge spikes in traffic corresponding to controversial statements by Donald Trump, who is popular among white supremacists. ", "In response, Black upgraded the site's servers.", "\n\nBlack's son Derek, who was a long-time participant in the site, has disavowed the beliefs held by his father and family and the Stormfront site, according to an article in The Washington Post. ", "Through his years in college, Derek Black came to feel that white nationalism is not supportable.", "\n\nIn August 2017, Stormfront's domain name was seized by its registrar for \"displaying bigotry, discrimination or hatred.\" ", "Earlier the same month, white supremacist news and commentary website The Daily Stormer had been removed from the public Internet for its involvement in the Unite the Right rally.", "\n\nThe site came back online on September 29, 2017. ", "As of October 2017, services to keep the site online were provided by Tucows, Network Solutions, and Cloudflare.", "\n\nContent\n\nStormfront is a white nationalist, white supremacist and neo-Nazi website known as a hate site.", "\n\nIt is a site on which Nazi mysticism and the personality cult of Adolf Hitler are sustained and Nazi iconography is used and accepted. ", "The Stormfront.org website is organized primarily as a discussion forum with multiple thematic sub-fora including \"News\", \"Ideology and Philosophy\" (\"Foundations for White Nationalism\"), \"Culture and Customs\", \"Theology\", \"Quotations\", \"Revisionism\", \"Science, Technology and Race\" (\"Genetics, eugenics, racial science and related subjects\"), \"Privacy\", \"Self-Defense, Martial Arts, and Preparedness\", \"Homemaking\", \"Education and Homeschooling\", \"Youth\", and \"Music and Entertainment\". ", "There are boards for different geographic regions, and a section open to unregistered guests, who are elsewhere unable to post, and even then, only under heavy moderation.", "\n\nServices\n\nStormfront.org hosts files from and links to a number of white nationalist and white racist websites, an online dating service (for \"heterosexual White Gentiles only\"), and electronic mailing lists that allows the white nationalist community to discuss issues of interest. ", "It features a selection of current news reports, an archive of past stories, live streaming of The Political Cesspool radio show, and a merchandise store featuring literature and music. ", "Stormfront has reportedly published stories aimed at children.", "\n\nA 2001 study of recruitment by extremist groups on the Internet noted that Stormfront at that time came close to offering most of the standard services offered by web portals, including an internal search engine, web hosting, and categorized links, and lacking only an Internet search engine and the provision of free email for its members (though a limited email service was available at the price of $30 a month).", "\n\nDesign\nProminently featured on the homepage is a Celtic cross surrounded by the words \"white pride, world wide.\" ", "A mission statement praises courage and freedom. ", "Stormfront states it discourages racial slurs, and prohibits violent threats and descriptions of anything illegal. ", "Others state that blatant hate and calls for violence are only kept off the opening page.", "\n\nThe site uses the Fraktur font, which was the favored font of the Nazi Party when it emerged in the early 1920s. ", "Official Nazi documents and letterheads employed the font, and the cover of Hitler's Mein Kampf used a hand-drawn version of it.", "\n\nPurpose and appeal\nDon Black has long worked to increase the mainstream appeal of white supremacism. ", "Black established Stormfront to heighten awareness of perceived anti-white discrimination and government actions detrimental to white people, and to create a virtual community of white extremists. ", "Black owns the site's servers, so he is not dependent upon website hosting providers.", "\n\nBlack's organization inculcated enough white pride to make \"its worldwide aspirations meaningful and socially significant\". ", "Stormfront keeps the rhetoric in its forums muted, discourages racial slurs, and prohibits violent threats and descriptions of anything illegal. ", "Site moderator Jamie Kelso was reportedly \"the motivating force behind real community-building among Stormfront members\" due to his energy and enthusiasm in organizing offline events. ", "Black's positioning the site as a community with the explicit purpose of \"defending the white race\" helped sustain the community, as it attracts white people who define themselves in opposition to ethnic minorities, particularly Jews.", "\n\nStormfront established MartinLutherKing.org to discredit Martin Luther King, Jr. In a 2001 study of white nationalist groups including Stormfront, academics Beverly Ray and George E. Marsh II commented: \"Like the Nazis before them, they rely upon a blend of science, ignorance, and mythology to prop up their arguments\".", "\n\nIdeology\nStormfront presents itself as being engaged in a struggle for unity, identifying culture, speech and free association as its core concerns, though members of Stormfront are especially passionate about racial purity. ", "It promotes a lone wolf mentality, which links it to white nationalist theorist Louis Beam's influential work on leaderless resistance and offers a sympathetic assessment of Benjamin Nathaniel Smith, a white supremacist who committed suicide after a racially motivated killing spree in July 1999. ", "Violet Jones notes that Stormfront credits its mission to \"the founding myth of an America created, built, and ideologically grounded by the descendants of white Europeans.\" ", "Don Black has specifically compared his views to those of the Founding Fathers, whom he asserts \"did not believe that an integrated black and white society was possible in America.\" ", "Asked in 2008 by an interviewer for the Italian newspaper la Repubblica whether Stormfront was a 21st-century version of the Ku Klux Klan without the iconography, Black responded affirmatively, though he noted that he would never say so to an American journalist. ", "In addition to its promotion of antisemitism and Holocaust denial, Stormfront has increasingly become active in the propagation of Islamophobia.", "\n\nSee also\n\n List of white nationalist organizations\n List of Internet forums\n\nReferences\n\nCategory:Alt-right\nCategory:Antisemitism in the United States\nCategory:Anti-Muslim sentiment\nCategory:Holocaust denial in the United States\nCategory:Holocaust denying websites\nCategory:Internet properties established in 1995\nCategory:Islamophobic publications\nCategory:Islamophobia in the United States\nCategory:Neo-Nazism in the United States\nCategory:Neo-Nazi websites\nCategory:Opposition to Islam in the United States\nCategory:Organizations that oppose LGBT rights\nCategory:Political Internet forums\nCategory:Racism in the United States" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.5402738451957703, 0.002944664331153035, 0.0019611769821494818, 0.002265801653265953, 0.001020520692691207, 0.0015376543160527945, 0.0014031997416168451, 0.0006706307176500559, 0.0006533231353387237, 0.0007458914769813418, 0.0018970094388350844, 0.0007932126754894853, 0.0007094955653883517, 0.0006986203952692449, 0.0006451682420447469, 0.0007109020370990038, 0.0006294966442510486, 0.0006671558367088437, 0.0005554796662181616, 0.0009707622812129557, 0.0008995128446258605, 0.003984521143138409, 0.0014542179415002465, 0.0012900008587166667, 0.000916343298740685, 0.0006970243412069976, 0.08739329874515533, 0.0011665840866044164, 0.056048519909381866, 0.029523765668272972, 0.00730501813814044, 0.0010990608716383576, 0.0017315205186605453, 0.0008755340240895748, 0.006801330950111151, 0.009727929718792439, 0.0011695559369400144, 0.0007138521177694201, 0.000613080570474267, 0.0007340319571085274, 0.0009711133898235857, 0.038472965359687805, 0.0011313672875985503, 0.0006000120774842799, 0.018877793103456497, 0.0006404027226381004, 0.01045707892626524, 0.0014090032782405615, 0.027785271406173706, 0.0006935307173989713, 0.0026586989406496286, 0.023397225886583328, 0.001272766850888729, 0.0006331012700684369, 0.0006621778593398631, 0.5655405521392822, 0.028254644945263863, 0.0006816942477598786, 0.0005794355529360473, 0.010022632777690887, 0.000614517368376255, 0.00221719010733068, 0.000656592776067555, 0.0006025772308930755, 0.0005144544411450624, 0.014913171529769897, 0.02034950442612171, 0.0010983793763443828, 0.001803704653866589, 0.0033933145459741354, 0.15582647919654846, 0.0014003169490024447, 0.014688008464872837, 0.00922541692852974, 0.0006025421898812056, 0.040122419595718384, 0.006476738024502993, 0.0007303411257453263, 0.0035883188247680664, 0.0006941139581613243, 0.0016472653951495886, 0.0006551725091412663, 0.004932072479277849, 0.002722605597227812 ]
0.02143
84
[ "Q:\n\nHow to get integral type from a template type array\n\nIm trying to write a scoped pointer class which calls delete once it is destroyed. ", "I realized that i would need to check whether my pointer is pointing to an array or not, so i could call the right delete.", "\nTaking inspiration from std::unique_ptr i used type_traits to check if the template argument, which holds the type pointer, is an array or not:\ntemplate <typename type, bool _Dx = std::is_array<type>::value>\n class scoped_ptr {\n private:\n type* m_ptr;\n //...\n };\n\ntemplate <typename type>\n class scoped_ptr<type, true> {};\n\nBut if my template argument type is \"int[]\" the codes invalidates because i cant have an \"int[]* m_ptr\"\nHow can i solve this problem? ", "How can i pass int[] argument and have \"int* m_ptr\"\n\nA:\n\nWhat you want is std::remove_extent. ", " If you give it an array it gives you the element type, otherwise it just gives you the type you gave it. ", " That would look like\ntemplate <typename type, bool _Dx = std::is_array<type>::value>\nclass scoped_ptr {\nprivate:\n std::remove_extent_t<type>* m_ptr;\n//...\n};\n\nAlso note that _Dx is an illegal name. ", " All names that start with an underscore and are followed with a capital letter are reserved for the implementation.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0014146623434498906, 0.0014769334811717272, 0.0009808293543756008, 0.014081113040447235, 0.0006424886523745954, 0.0019773845560848713, 0.000583506771363318, 0.001995444530621171 ]
0.002894
8
[ ".", "\n\nWHERE TO BUY?", "\n\nCOUPON CODE\n\nWELCOME\n\nCOMMERCIAL\n\n.", "\n\nPRIMARY RAW DOYOU SOY MILK FACIAL CREAM\n\n.", "\n\nPACKAGING\n\n.", "\n\nHOW TO USE\n\n.", "\n\nINGREDIENTS\n\nWhat a massive list OMG!", "\n\n.", "\n\nSCENT AND TEXTURE\n\n.", "\n\nFINAL THOUGHTS\n\nnote: this was sent to me for review purposes. ", "this post contains affiliate links.", "\n\n\n\n\n\nIn today's blogpost I'm going to review a facial cream of the brand Primary Raw. ", "To be honest it's my first time trying anything of this brand, so I was really curious how it would be. ", "I was sold by the gorgeous packaging already haha. ", "I've been trying this facial cream for 3 weeks. ", "If you want to know my thoughts about the cream, keep on reading!Memebox has sent me this for review, but you can normally get it on their website memebox.com , sold for $40.- without the candle kit. ", "Unfortunately it's currently out of stock, so you got to keep on checking to see if it's in stock again.", "Feel free to use codeto get 15% off on your first purchase.", "Primary Raw Seoul, a natural cosmetics brand promoting use of ‘primary’ and ‘raw’ ingredients straight from nature, has launched its first Do You Cream (‘Do You’ means ‘Soy Milk’ in Korean). ", "It's enriched with soy bean extracts, soy milk ferments, rice water, galactomyces and other grain extracts. ", "This Soy Milk Facial Cream is deeply hydrating, gentle in formula and brightens up uneven, dull complexion for a clearer and healthier glow. ", "It's stated that it's suitable for all skin types. ", "Memebox has also send me the candle kit, where you can DIY the soy candle. ", "I'm really loving the candle holder!I'm loving the pretty packaging of the product. ", "There is Korean as well as English descriptions on it. ", "The jar is pretty heavy since it's made of glass, don't think it's useful to travel with it, but it's awesome that you can re-use the jar when you're done with this product. ", "The emptied bottle can be utilized as a candle holder, candy jar or for decorative and practical use.", "Use the pretty spatula that you see below and put a bit of product on your finger. ", "Apply evenly over clean face. ", "I usually just use this as the last step of my skincare routine, since the cream is slightly thick compared to my other skincare products. ", "Gently pat it in until it's fully absorbed.", "Oryza Sativa (Rice) Bran Water, Butylene Glycol, Dimethicone, Niacinamide, Cetearyl Olivate, Glycerin, Dipropylene glycol, Glycereth-26, Caprylic/Capric Triglyceride, Triticum Vulgare (Wheat) Germ Oil, Cetyl Alcohol, Cyclopentasiloxane, Cyclohexasiloxane, Lactobacillus/Soymilk Ferment Filtrate, Sodium Hyaluronate, Snail Secretion Filtrate, Glycine Soja (Soybean) Seed Extract, Beta-Glucan, Morus Alba Bark Extract, Copper Tripeptide-1, Cetearyl Alcohol, Glyceryl Stearate SE, Algae Extract, Piper Methysticum Leaf/Root/Stem Extract, Camellia Sinensis Leaf Extract, Chamomila Recutita (Matricaria) Flower/Leaf Extract, Ginkgo Biloba Leaf Extract, Acrylates/C10-30 Alkyl Acrylate Crosspolymer, Butyrospermum Parkii, Arginine, Aloe Barbadensis Leaf Juice, Caprylyl Glycol, Ethylhexylglycerin, Tropolone, Lactobacillus/Aspergillus/Prunus Mume Extract Ferment Filtrate, Lactobacillus/Portulaca Oleracea Ferment Extract, Lactobacillus/Panax Ginseng Root Ferment Filtrate, Lactobacillus/Punica Granatum Fruit Ferment Extract, Lactobacillus/Soybean Ferment Extract, Natto Gum, Angelica Gigas Root Extract, Phellinus Linteus Extract, Allantoin, Panthenol, Glycyrrhiza Glabra (Licorice) Extract, Mannan, Acetyl Hexapeptide-8, Tocopheryl Acetate, Camellia Sinensis Leaf Extract, Avena Sativa (Oat) Meal Extract, Lysolecithin, Soy Isoflavone, Sodium Polyacrylate, Pyrus Cydonia (Quince) Seed Extract, Disodium EDTA, Ceramide 3, Ubiquinone, Caramel, Citrus Aurantium Bergamia (Bergamot) Peel Oil, Citrus Limon (Lemon) Peel Oil, Cananga Odorata Flower Oil, Juniperus Oxycedrus Fruit Oil, Salvia Officinalis (Sage) Oil, Geranium Maculatum Oil.", "The scent is pleasant, it smells a bit like a milky soap. ", "This scent fades away when it's on the face. ", "The consistency of the cream is a bit in between light and medium. ", "It leaves a fresh feeling when you apply it. ", "It's a tiny bit sticky, but this sticky feeling will go away when the product is fully absorbed. ", "Unfortunately, it won't absorb at once, so you got to wait for a few minutes or so until it's fully absorbed.", "I'm really amazed by the pretty packaging and it's great that you can re-use the jar for other purposes. ", "On the packaging it's stated that it's suitable for all skin types. ", "I personally would recommend this product to people with dry, combination dry to normal skin. ", "It makes your skin look oily over time, so I wouldn't recommend this to people with an oily skintype. ", "Once you apply it, you will notice a healthy glow that this product gives you - a lovely brightening effect.", "Since it takes some time to absorb (which is a bit too long for me in the morning, since i'm always in a hurry), I usually use this during the night time only. ", "I like how it feels on my face, it feels fresh, keeps my skin moist, brightens and the scent of the cream smells lovely. ", "This product just does what it says :)." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0021375224459916353, 0.0016015154542401433, 0.0007404911448247731, 0.0018225011881440878, 0.0007847000379115343, 0.0007931337459012866, 0.06814688444137573, 0.0021375224459916353, 0.0006284305709414184, 0.0005403303075581789, 0.0006739355158060789, 0.0007118809735402465, 0.0005504993605427444, 0.0014814416645094752, 0.0013710681814700365, 0.0007517600315622985, 0.0007010397384874523, 0.000886299239937216, 0.0008651549578644335, 0.0006234049797058105, 0.0008887173607945442, 0.0005600423319265246, 0.0008507593302056193, 0.0005650308448821306, 0.000565466471016407, 0.0006079487502574921, 0.0005784351378679276, 0.057847343385219574, 0.007128971628844738, 0.0006491058738902211, 0.0006486071506515145, 0.0012525569181889296, 0.0012602402130141854, 0.001062076655216515, 0.0006243093521334231, 0.0005515274242497981, 0.0006602561334148049, 0.0005832620663568377, 0.000535935047082603, 0.0005336025496944785, 0.0007588565349578857, 0.01856478489935398, 0.0005750834825448692, 0.0005898302188143134, 0.0006833284860476851, 0.0007112963940016925 ]
0.004082
46
[ "Q:\n\nTrying to access JSON Object using key\n\nThis is my code that stores JSON in a var:\nvar analysed Data = {\n \"Wednesday\": {\n \"OTHERS\": {\n \"count\": 1,\n \"response Time\": 234\n },\n \"URGENT\": {\n \"count\": 15,\n \"response Time\": 68\n },\n \"NORMAL\": {\n \"count\": 10,\n \"response Time\": 120\n }\n },\n \"Thursday\": {\n \"OTHERS\": {\n \"count\": 1,\n \"response Time\": 234\n },\n \"URGENT\": {\n \"count\": 15,\n \"responseTime\": 68\n },\n \"NORMAL\": {\n \"count\": 10,\n \"responseTime\": 120\n }\n },\n \"Tuesday\": {\n \"OTHERS\": {\n \"count\": 1,\n \"response Time\": 5\n },\n \"URGENT\": {\n \"count\": 15,\n \"response Time\": 68\n },\n \"NORMAL\": {\n \"count\": 10,\n \"response Time\": 120\n }\n }\n}\n\nQuestion:\nPlease suggest me ways to access them using the key. ", "I need to get the response time for each keyword like normal. ", "This is urgent, for your information. ", "\nI am supposed achieve this usingjQuery and add the response time to get the avg.", "\n\nA:\n\nIf you have json object in JavaScript you can access to keys and values:\n$.each(myObject, function (key, val) {\n\n // See key and value:\n alert(key + ': ' + val.URGENT.count);\n\n // See keys for each object:\n $.each(Object.keys(val), function (key, val) {\n alert(key + ': ' + val);\n });\n});\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007587770815007389, 0.0006747928564436734, 0.0005854718619957566, 0.0010866217780858278, 0.0008148669730871916 ]
0.000784
5
[ "Children with type 1 diabetes (T1D) might not consume a healthy diet. ", "A healthy diet is associated with reduced risk of cardiovascular disease (CVD) in adults, but there is no data evaluating the association between diet composition and early markers of CVD in T1D children. ", "We aimed to investigate the macro/micronutrient intakes of T1D children and the relationship with vascular function.", "\n\nThe Australian Child and Adolescent Eating Survey (ACAES--version1.2) Food Frequency questionnaire\\[[@B1]\\] was administered to 77 T1D children (aged 14±2.3 years, 37 males, BMI z-score 0. ", "±0.6) participating in an RCT\\[[@B2]\\], obtaining in-depth macro/micronutrient intake. ", "Vascular function was measured by Flow Mediated Dilatation (FMD) and Glyceryl Trinitrate Mediated Dilatation (GTN). ", "Pearson's correlation and multivariate regression analysis determined dietary predictors of vascular function.", "\n\nChildren had diabetes duration 5.7±3.9 years, median HbA1c 8.7(range: 6.3-14)% and insulin dose 0.8±0.2 units/kg/day. ", "37 children used CSII.", "\n\nT1D children had daily energy intake 10762.3 ±2487.68kJ, protein 113.3±27.68g, fat 88.16±88.16g, carbohydrate 318.60±75.97g, fibre 31.41±8.89g and sodium 3069.91±766.43mg. ", "Better (higher) FMD independently correlated with a higher daily fibre intake (r^2^ =0.25, Coefficient 0.20, p=0.04). ", "Higher daily total fat intake independently correlated with worse (lower) GTN (other GTN associations in Table [1](#T1){ref-type=\"table\"}). ", "Daily sodium intake exceeded recommendations of 1500mg, this was not significantly related to FMD/GTN.", "\n\n###### \n\nIndependent predictors of GTN\n\n R^2^=0.41 \n ----------------- ------------- ---------\n Coefficient p-value\n \n Total fats -0.06 0.02\n \n Vessel diameter -68.15 0.00\n \n Diastolic BP 0.23 0.04\n \n Pump use 3.35 0.01\n \n T1D Duration -1.26 0.04\n\nHigher fibre and lower total fat intake, is associated with better vascular function in T1D children. ", "This is the first evidence that diet composition may reduce the risk of CVD in children with T1D in addition to improving diabetes control.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0024631533306092024, 0.001256562420167029, 0.0006639104685746133, 0.001512753195129335, 0.0006691100425086915, 0.00074511778075248, 0.0005980714340694249, 0.0009443958988413215, 0.0011891836766153574, 0.008127676323056221, 0.0005721475463360548, 0.0024945142213255167, 0.0005728143150918186, 0.002101028338074684, 0.0010322442976757884, 0.001995444530621171 ]
0.001684
16
[ "Q:\n\n@PostConstruct & Checked exceptions\n\nIn the @PostConstruct doc it says about the annotated methods: \n\"The method MUST NOT throw a checked exception.\"", "\nHow would one deal with e.g. an IOException which can be thrown in such a method? ", "Just wrap it in a RuntimeException and let the user worry about the faulty initial state of the object?", "\nOr is @PostConstruct the wrong place to validate and initialize objects which got their dependencies injected?", "\n\nA:\n\nYes, wrap it in a runtime exception. ", "Preferebly something more concrete like IllegalStateException.", "\nNote that if the init method fails, normally the application won't start.", "\n\nA:\n\nGenerally, if you want or expect application start-up failure when one of your beans throws an exception you can use Lombok's @SneakyThrows.", "\nIt is incredibly useful and succinct when used correctly:\n@SneakyThrows\n@PostConstruct\npublic void init() {\n // I usually throw a checked exception\n}\n\nThere's a recent write-up discussing its pros and cons here: Prefer Lombok’s @SneakyThrows to rethrowing checked exceptions as RuntimeExceptions\nEnjoy!", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.000728761893697083, 0.0009334392379969358, 0.0010878427419811487, 0.0008355136378668249, 0.0006494598928838968, 0.004459972959011793, 0.0007319688447751105, 0.004639460705220699, 0.0014134214725345373, 0.001995444530621171 ]
0.001748
10
[ "Introduction\n============\n\nNeuroelectronic interfaces, also commonly referred to as neural or brain-computer interfaces, enable the transfer of information between the nervous system and an external device ([@B30]; [@B88]; [@B2]). ", "Generally, these devices take the form of electrodes to record or modulate neuronal activity through transducing cellular activity into actionable information (recording) or delivering current into tissue (stimulation) ([@B13]; [@B24]). ", "Neural interfaces are currently applied in both investigative and clinical contexts, from answering basic neuroscience questions about behavior, information encoding, and mechanisms of injury, to cochlear implants to restore hearing loss, deep brain stimulation to treat Parkinson's disease, and the direct control of prosthetic limbs or other peripheral devices ([@B69]; [@B2]).", "\n\nA fundamental design objective for implantable neural interfaces is the maintenance of long-term function *in vivo* ([@B24]; [@B29]; [@B2]). ", "This article focuses on interfaces for the brain, wherein the dynamic, aqueous environment presents a host of significant obstacles that have, to date, limited the chronic performance of neural interfaces ([@B29]; [@B18]). ", "The most prevalent of these obstacles may be collectively summarized as a multimodal, sustained foreign body response (FBR) to the implant, which degrades the efficacy of the interface over time ([@B54]; [@B82]). ", "The FBR has motivated a vast body of research focused on developing electrodes and implant strategies that either address specific elements of the FBR or limit its effects on device performance, with distinct approaches offering discrete improvements. ", "Here we provide a brief overview of the FBR and its implications for neural interface design before exploring strategies for biologically active interfaces, which use biologically-derived and/or biologically-inspired materials to promote greater host-implant integration and more consistent long-term electrode performance.", "\n\nThe Foreign Body Response\n=========================\n\nThe FBR is a neuroinflammatory reaction to the disruption of healthy tissue and continued presence of a foreign body in the brain ([Figure 1](#F1){ref-type=\"fig\"}) ([@B54]; [@B29]). ", "It begins at implantation, which itself causes physical trauma as the electrode(s) displaces and damages vasculature and the blood--brain barrier (BBB), cells, and extracellular matrix (ECM) on its path to the intended target ([@B72]). ", "Subsequently, blood-borne macrophages and other foreign plasma components enter the area, while local microglia and astrocytes begin to transition from resting to active/phagocytic phenotypes as part of the brain's normal response to injury ([@B54]; [@B29]). ", "Microglia have been observed responding as quickly as 30 min post-delivery, extending processes toward the implant and transitioning to an active phenotype over the course of a few hours ([@B51]; [@B45]). ", "Activated microglia and macrophages release a battery of pro-inflammatory chemokines, cytokines, and other factors into the damaged area (e.g., tumor necrosis factor, interleukin-1, nitric oxide); while these factors are associated with remodeling tissue and degrading foreign materials following injury, they also cause neurodegeneration ([@B51]; [@B29]).", "\n\n![", "The FBR to Neural Interfaces. ", "Neural interfaces disrupt local tissue triggering an acute immune response wherein local immune cells (microglia, astrocytes) migrate to the injury site and begin secreting pro-inflammatory factors (e.g., cytokines, nitric oxide, free radicals). ", "Astrocytes begin forming a glial scar around the implant over the course of a few weeks, increasing tissue impedance, while disruption of the BBB allows blood-borne macrophages to infiltrate the area. ", "Prolonged inflammation leads to neuronal degeneration and may corrode the implant (\"X\" over active sites), further limiting electrode function. ", "Note that although the microelectrode depicted represents a silicon shank (i.e., Michigan-style electrode), the concept applies similarly to other microelectrode types, such as the Blackrock Utah array.](fnins-13-00269-g001){#F1}\n\nIn the weeks following implantation, a fibrous envelope of reactive astrocytes, connective tissue and ECM, commonly referred to as the glial scar, gradually forms around the device, insulating the foreign body from the surrounding brain tissue ([@B29]; [@B74]). ", "This glial scar has been a hallmark of neural interfaces in the brain, with experimental strategies often using the extent or thickness of the scar as a measurement for the effectiveness of mitigating the FBR ([@B74]). ", "Growth-inhibiting molecules, such as chondroitin sulfate proteoglycans, also populate the glial scar, further reducing the potential for neuronal growth and recovery in the implant site ([@B91]). ", "The presence of the implant in the brain generally causes a sustained inflammatory response, with both astrocytes and microglia remaining in the area in a pro-inflammatory state in an attempt to eliminate the foreign body ([@B54]; [@B29]; [@B87]). ", "The continued release of neurotoxic factors from the active microglia/astrocytes is detrimental to local neurons, with many studies reporting a decrease in the neuronal density surrounding the implant ([@B54]).", "\n\nTo date, the mechanisms of the FBR are still not completely understood. ", "As such, the relationship between various elements of the FBR and failure modes of chronically-implanted neuroelectronic interfaces is still an area of active study ([@B54]; [@B86]; [@B38]; [@B58]; [@B87]). ", "What is known is that the introduction of any such interface to the CNS induces multi-phase tissue remodeling that results in glial scarring, prolonged BBB disruption, and the persistent presence of pro-inflammatory elements that collectively form an adverse microenvironment for neural interfacing ([Figure 1](#F1){ref-type=\"fig\"}). ", "This microenvironment poses several active challenges to both the device and the neurons of interest ([@B25]; [@B53]; [@B87]). ", "The biostability of the former is continually challenged by reactive oxygen species, which corrode active electrode sites and gradually degrade insulating layers and device interconnects ([@B25]; [@B53]; [@B87]). ", "Other failure modes, such as mechanical failure and micromotion-induced shear as the brain shifts, may further drive inflammation in a positive feedback manner ([@B54]; [@B38]). ", "As noted above, local astrocytes around the implant eventually form the glial scar, which physically separates the device from the neurons of interest and increases the electrical impedance of local tissue. ", "Moreover, the continued presence of reactive immune cells, cytokines, and other inflammatory factors at recording/stimulation sites induce neuronal death and/or prevent the restoration of healthy neural tissue ([@B49]; [@B86]; [@B18]; [@B70]). ", "Disruption of the BBB has also been implicated as a significant link between the FBR and the decline in interface performance over chronic periods, with \"leakiness\" of the BBB allowing peripheral immune cells to enter the brain parenchyma and accumulate in the lesion to exacerbate neurotoxic effects at longer timepoints ([@B60]; [@B87]; [@B9]).", "\n\nThe Challenge of Biological Compliance\n======================================\n\nThe complex and multi-faceted challenge of designing long-acting neural interfaces has engendered an ongoing, cross-disciplinary mission to improve their biological compliance, defined as their ability to induce favorable -- or at least not disrupt -- cell- and tissue-level interactions. ", "These strategies span mechanical design, materials science (across nano to macro scales), immunology, neurobiology, electrical engineering, and tissue engineering, among others; a subset of the milestones in the field are summarized below and are referenced in more in-depth analyses ([@B64]; [@B15]; [@B38]; [@B58]).", "\n\nElectrode Material Properties and Geometry\n==========================================\n\nIt has been shown that reducing electrode size minimizes the trauma of insertion and can reduce the severity of the glial scar in chronic implants ([@B75]; [@B39]). ", "Similarly, electrodes with open-faced geometries (e.g., lattices, meshes) minimize the total surface area of the interface, while permitting diffusion throughout the area, with rodent models showing reduced microglial reactivity and higher neuronal density out to at least 1 month ([@B66]; [@B72]). ", "Further, the lattice topography has been shown to influence not only the extent but the distribution of scarring around the implant, potentially leveraging it to improve contact with brain tissue ([@B62],[@B63]). ", "One such mesh electrode comprised of flexible nanowire transistors assembled in a flexible, lightweight sheet was able to record both single units and field potentials in mice for several months; histological assays showed both a lack of glial proliferation and neuronal attrition surrounding the implant for at least 1 year, suggesting that the unique geometry leaves the host tissue relatively unperturbed ([@B35]). ", "Notably, this mesh leverages conductive ink and computer-controlled stereotactic injection to enable connection to standard electrophysiological equipment and reproducible targeting of brain regions, respectively ([@B35]).", "\n\nIn addition to geometric changes, reducing the stiffness of the implant minimizes the mechanical discrepancy between the device and host tissue; the use of polymers or \"mechanically adaptive\" materials which are stiff enough for insertion but soften upon implantation has demonstrated significant reductions in long-term neuroinflammation, immune cell activation, and neurodegeneration ([@B27]; [@B37]; [@B52]; [@B73]; [@B46]). ", "Materials science approaches to biological compliance include the patterning of nanoscale topography to better integrate with features of local tissue, increasing the effective surface area of the implant, and development of electrodes with new materials such as carbon nanotubes, which have demonstrated favorable electrochemical properties and reduced immunoreactivity compared to traditional probes ([@B85]; [@B59]; [@B33]; [@B84]; [@B36]; [@B61]). ", "Manipulating the surface chemistry of implanted materials may also improve biological compliance; certain hydrophilic or negatively-charged functional groups such as -COOH may reduce glial scarring, depending on their affinity for protein binding or cell membranes ([@B12]; [@B89]). ", "Increasing the surface permeability of implant coatings to serve as \"diffusion sinks\" for pro-inflammatory molecules has also reduced immunoreactivity around the electrode ([@B71]).", "\n\nBioactive Electrodes\n====================\n\nImproving biological compliance can be described as minimizing the degree of discrepancy between the self (host tissue) and not-self (foreign implants). ", "In this context, the more closely a given interface approximates properties of biological tissue (\"self\"), the higher the chances of chronic stability and integration with the tissue of interest. ", "This principle motivates the development of bioactive neural interfaces, which attempt to improve biological compliance through the elicitation, suppression, or otherwise modulation of specific biological phenomena. ", "Broadly, this class of interfaces is designed to incorporate, mimic, or draw inspiration from pre-existing, biologically-derived materials; candidate materials are selected for their effects on cellular or physiological processes (e.g., attenuation of the immune response, promotion of neuron attachment, and growth) ([@B70]). ", "These strategies are designed to improve the prospects of long-term function while reducing the complications from the presence of a foreign body. ", "Bioactive interfaces may be visualized as a spectrum ranging from completely inorganic, non-biological devices to living engineered constructs ([Figure 2](#F2){ref-type=\"fig\"}). ", "They may incorporate proteins or drugs that downregulate specific mechanisms of immunoreactivity (e.g., microglial activation), inflammation (e.g., cytokine release, glial scar formation), promote neuronal attachment or neurite outgrowth, recruit endogenous neuroprotective mechanisms, or present *de novo* cells or tissue to replace lost neurons and supporting architecture ([@B67]; [@B91]; [@B55]; [@B15]; [@B80]). ", "Most current bioactive interfaces take the form of traditional inorganic electrode materials (e.g., platinum, tungsten, silicon) surrounded by coatings that contain or are comprised of biomolecules as described below ([@B4]; [@B79]). ", "These biomaterial coatings are generally several orders of magnitude softer than the enclosed material to provide better mechanical parity with the brain; common coatings include silk, polyimide, and parylene, and various hydrogels or synthetic polymers ([@B92]; [@B22]; [@B11]; [@B7]; [@B48]).", "\n\n![", "The spectrum of bioactive neuroelectronic interfaces. ", "Non-organic electrodes may be coated with soft biomaterials of hydrogels for better mechanical parity, which may in turn be functionalized with various biological molecules (e.g., soluble factors, ECM proteins) to transiently reduce inflammatory phenomena or provide support for neuronal growth and attachment. ", "The incorporation of living cells may further provide sustained trophic support and a more biofidelic interface, while engineered tissue (i.e., with an organized structure, as an electrode coating or a self-contained implant) may be the closest representation of \"self\" attainable with respect to native tissue.](fnins-13-00269-g002){#F2}\n\nAnti-inflammatory agents such as the steroid dexamethasone or α-MSH have been incorporated into electrode coatings to limit the production of inflammatory cytokines and other glial by-products; these approaches generally result in reduced glial scarring around neural implants in animal models, although they are limited by the release and eventual depletion of the agent in use ([@B90]; [@B1]; [@B42]; [@B4]; [@B10]). ", "Other biological molecules associated with neuronal attachment, structural support, or migration (e.g., laminin, L1, collagen), may be entrapped or immobilized through covalent bonding to both natural and synthetic polymer coatings to present a more attractive surface for neurons; a common strategy is the doping of conductive polymers (of which the most prevalent for neural interfacing are PEDOT and polypyrrole) with biomolecules to improve their biocompatibility ([@B23]; [@B5], [@B6]; [@B8]; [@B11]; [@B26]; [@B7]; [@B72]; [@B20]). ", "A wealth of *in vitro* studies have demonstrated neural cell survival and process outgrowth on substrates functionalized with growth factors (i.e., NGF, NT3, BDNF) and ECM proteins (laminin, collagen); *in vivo*, histological analyses of these bioactive coatings reveal attenuation of the glial response 4--8 weeks post-implant, with some studies reporting higher local neuronal survival compared to uncoated electrodes ([@B31]; [@B23]; [@B81]; [@B6]; [@B47]; [@B11]; [@B18]; [@B48]; [@B72]; [@B44]; [@B68]; [@B70]; [@B83]). ", "However, while bioactive materials provide greater biocompatibility to these devices, ongoing challenges for these strategies include limited duration of effect as biomolecules diffuse away from the implant (with no mechanism for replenishment), are removed by local microglia or competitive binding, or undergo undesired modification (e.g., pH-driven conformational changes), which collectively result in poor translation of results from *in vitro* assays to *in vivo* implants ([@B4]; [@B44]). ", "Further, the benefits borne out by histological studies vary -- e.g., diminished glial scarring with no evidence of improved neuronal survival -- and have largely not yet been tied to improved functional outcomes ([@B32]; [@B4]; [@B38]; [@B50]). ", "Validating the clinical potential of these bioactive implants requires meeting the benchmarks set by current interfaces in both non-human primates and humans. ", "For instance, despite well-known limitations in their long-term biostability, inorganic electrodes such as the Blackrock microelectrode array provide the clinical performance foundation and have been the source of significant milestones in neuroprosthesis research ([@B34]; [@B43]; [@B19]). ", "As such, these existing devices set the standard by which bioactive interfaces will be evaluated as they evolve from a growing body of promising results *in vitro*, to improved performance and reproducibility in model systems *in vivo*, and, potentially, in clinical applications.", "\n\nElectrodes Decorated With Living Cells or Tissue\n================================================\n\nThere are clear, data-driven benefits to engineering neural interfaces as bioactive devices. ", "Increasing similarities between the implant and tissue create further opportunities for greater neuronal contact, reduced chronic inflammation, and more stable long-term function. ", "However, bioactive interfaces to date are introduced to the brain with fixed quantities of biomolecules, which may become depleted or removed due to natural biological processes. ", "Toward this end, new research efforts have begun to explore whether living cells may act as active elements of a neuroelectronic interface, potentially matching the dynamic nature of brain tissue ([@B15]; [@B70]). ", "Cell-based interfaces may leverage the self-driven machinery of living cells to actively produce neuroprotective factors while presenting a material that mimics the \"self\" enough to downregulate chronic inflammation, although these potential advantages must be developed and validated *in vivo*. ", "One such study coated microelectrodes with a fibrin hydrogel containing primary astrocytes and neurons; although the fibrin was resorbed within one week following implant in rat cortex, astrocyte reactivity was diminished out to at least 30 days post-implant compared to bare electrodes ([@B16]). ", "Further, the inclusion of a cell layer did not significantly affect recordings from the electrodes themselves, although effects on the survival of host neurons were not reported ([@B16]). ", "Other studies have trapped live neurons within conductive polymers; although residual monomers have proven cytotoxic and negatively impacted cell survival beyond a few days, the polymerized network may serve as a three-dimensional, electrically functional scaffold ([@B56]). ", "A similar approach polymerized *in vivo* the conductive polymer PEDOT within the brain, resulting in a network of conductive filaments surrounding neurons and tracking white matter ([@B57]). ", "Although the network was electrochemically validated as a functional electrode, further work is required to determine effects on cellular viability, network behavior, and whether the distribution of the polymer can be controlled for precise stimulation or recording. [", "@B21] demonstrated a multi-layer biohybrid interface consisting of platinum electrodes, conductive polymer-hydrogel blend, and PC12 cells within a biodegradable hydrogel layer; cells survived out to 12 days *in vitro* and extended neuritic processes upon the addition of NGF. ", "Potential future development would interrogate whether such embedded neural cells are capable of synaptogenesis, forming a functional neuronal layer around the electrode ([@B21]; [@B4]).", "\n\nIn addition to dissociated or embedded cells, the combination of living tissue and neuroelectronics may further leverage the functional benefits of the ECM surrounding the neurons, including the presence of signaling molecules, structural support, tissue-level organization, and the dynamic remodeling of the matrix to facilitate growth or stabilize neuronal networks ([@B15]). ", "Further, the introduction of support cells (e.g., glia) in pro-regenerative states may provide sufficient cues to prevent or ameliorate the neurodegenerative outcomes present in the chronic inflammatory response ([@B4]). ", "The first such interface, a \"neurotrophic electrode,\" was reported by Dr. Philip Kennedy in a 1989 paper, where a glass pipette electrode was seeded with a piece of sciatic nerve and implanted into rat and later monkey cortex ([@B40]; [@B41]). ", "Neurites grew into the tip, while the extent of growth correlated with tip diameter; recordings from these early living, biohybrid devices lasted over a year ([@B41]). ", "Notably, a solution of NGF in the same pipette had the opposite effect, with a cystic cavity forming around the implant; these results suggest that the benefits of soluble factors may be further improved with the innate, dynamic regulation present in the nerve explant and/or host tissue ([@B40]). ", "Thus, leveraging robust and multi-faceted biological mechanisms from living tissue may enhance electrode performance in the brain. ", "However, as a relatively new evolution in the neuroengineering field, the advantages of cell- and tissue-seeded electrodes are still largely under active exploration in *in vitro* assays and rodent models ([@B38]; [@B70]). ", "As with bioactive material-based interfaces, translating these presumed advantages into better interface performance and functional outcomes requires further validation.", "\n\nMicro-Tissue Engineered \"Living Electrodes\"\n===========================================\n\nA recent potential neuroelectronic interface strategy developed by our research group involves the engineering of self-contained, functional neural tissue preformed *in vitro* that may be applied toward a myriad of regenerative and neuroprosthetic functions. ", "These micro-tissue engineered neural networks (micro-TENNs) consist of microscopic hydrogel cylinders (micro-columns) with ECM optimized for axonal growth within the central lumen ([@B78]; [@B3]; [@B65]). ", "Spherical aggregates of primary neurons placed at the micro-column terminals extend neurites through the ECM lumen over time, forming a three-dimensional network of aligned axonal tracts spanning one (unidirectional) or two (bidirectional) neuronal populations ([Figure 3](#F3){ref-type=\"fig\"}). ", "Following network formation, these constructs may be precisely implanted in the brain to enable synaptic integration with target regions. ", "Micro-TENNs were originally developed to replace long axonal brain pathways that are often compromised or lost due to traumatic brain injury or neurodegenerative disease, with an anatomically-inspired distribution of discrete cell body aggregates and axon tracts designed to recreate the segregation of gray and white matter in the mammalian brain ([@B14]; [@B78], [@B76]).", "\n\n![", "Micro-TENNs as living, 3D constructs. **(", "A)** Neurons are isolated to form spheroid aggregates that are placed within hydrogel microcolumns filled with ECM. ", "Micro-TENNs are then grown *in vitro*. ", "Either 1 aggregate or 2 aggregates to form either unidirectional or bidirectional micro-TENNs, respectively. **(", "B)** Left: phase microscopy images of a 1.5 mm bidirectional micro-TENN at 1, 3, 4, and 7 days *in vitro* (DIV). ", "Right: confocal reconstructions of the same micro-TENN stained to identify axons (Tuj-1; red), cell soma/dendrites (MAP-2; green), and cell nuclei (Hoechst; blue). ", "Scale bars: 100 μm. **(", "C)** Phase microscopy images of a 9 mm bidirectional micro-TENN at 1, 3, and 7 DIV. ", "The bottom image is a confocal reconstruction of this micro-TENN with the same labeling as in **(B)**. ", "Scale bars: 500 μm. ", "Adapted with permission of IOP Publishing from [@B17].](fnins-13-00269-g003){#F3}\n\nAs engineered micro-tissue, micro-TENNs are unique in that their design enables a high level of control over their mechanical, material, and biological properties, while their structure mimics the natural network-level architecture of the brain. ", "The hydrogel micro-column provides a structure to coax the neuronal and axonal growth into the desired architecture, and may be made from a range of biomaterials with varying porosity, stiffness, degradation kinetics, or similar properties as needed. ", "The ECM in the lumen is tailored to support neuronal growth and maturation, and may be modified to contain additional structural proteins and/or chemotactic cues for axonal support and guidance.", "\n\nAfter the desired growth and maturation are achieved, the micro-column allows for manipulation of the preformed neural network as a single unit and serves as a protective encasement to chaperone microinjection into the brain. ", "Within the context of the FBR, the micro-column and luminal ECM also protect the neurons and axonal tracts against the potentially inflammatory post-injection microenvironment. ", "The smallest micro-TENNs to date are only ∼320 μm in diameter, permitting minimally-invasive delivery to the brain; simultaneously, they may be made to different lengths (from 100s of microns to centimeter-scale constructs) to span large deficits or tap into deeper brain structures ([@B76]; [@B3]).", "\n\nIn addition, the scalable bio-fabrication process is amenable to isolating precise neuronal subtypes to maintain control of the effects of micro-TENN synaptic inputs on host circuitry. ", "To date, micro-TENNs have been fabricated using cerebral cortical neurons (e.g., mixed glutamatergic and GABAergic), dorsal root ganglia neurons (e.g., sensory), ventral mesencephalic neurons (e.g., dopaminergic), and medial ganglionic eminence neurons (e.g., GABAergic), amongst other neuronal subtypes, from a range of species including rodent, porcine, and human sources. ", "Moreover, the process of engineering neuronal aggregates creates the opportunity for viral transduction based on neuronal phenotype and protein expression profiles. ", "For example, functionalization of the micro-TENNs with optogenetic actuators (e.g., channelrhodopsin) and optical reporters such as GCaMP allow for light-driven control and monitoring of the constructs for *in vitro* or *in vivo* applications ([@B76]; [@B3]). ", "Thus, axon-based living electrodes provide an ability for natural, synaptic-based excitation, inhibition, and/or modulation of host circuitry under optical control.", "\n\nIndeed, within the context of neuroelectronic interfaces, micro-TENNs may serve as a living information relay (or \"living electrode\") between deep targets in the brain and an apparatus on the brain surface ([Figure 4](#F4){ref-type=\"fig\"}). ", "In this paradigm, these living electrodes may be stereotactically microinjected such that the deep axon tracts may form synapses with targeted areas of the brain while the neuronal cell bodies remain at the brain surface, allowing for signal propagation along the internal axonal tracts either from the brain surface to the host tissue or vice versa ([@B65]). ", "An appropriate electrical (e.g., micro-ECOG) or optical (e.g., LED array) apparatus may then be mounted on or directly above the brain surface, providing computer-controlled modulation or monitoring of the neural targets through stimulation or recording of the dorsal micro-TENN aggregate, respectively.", "\n\n![", "Micro-TENNs applied to neural interface as living electrodes. ", "Living electrodes (right) may provide engineered axonal tracts in a controlled 3D cytoarchitecture to relay signals to/from the brain. ", "Designing constructs to synapse with specific neuronal subtypes (blue neurons) may offer higher specificity than conventional electrodes (middle), which stimulate/record from a 3D volume (red), or than optical stimulation methods (left), wherein the introduction of virus to target neurons (yellow) may spread to non-target regions (e.g., yellow neurons across multiple cortical layers). ", "Reprinted with permission of John Wiley and Sons from [@B65].](fnins-13-00269-g004){#F4}\n\nOne significant advantage of this approach is that the non-organic stimulation or recording device is isolated to the brain surface or outside the skull entirely, while only the living electrode (comprised solely of soft biomaterials, ECM, and neurons) penetrates the parenchyma ([@B65]). ", "Moreover, the creation of optogenetically-active constructs *in vitro* prior to *in vivo* delivery obviates the need to inject viral components directly into the brain (as is the case with conventional optogenetic approaches). ", "Overall, the presentation of exclusively biocompatible materials may curtail the chronic inflammatory response experienced by non-organic implants, while the hydrogel micro-column protecting the axons may be tuned to degrade at an optimal rate such that the axons are gradually introduced to the microenvironment as the tissue recovers. ", "Additionally, as an alternative to microinjection, living electrodes may be encased in a secondary biomaterial sheath that is stiff enough to penetrate the brain and softens when hydrated, eliminating the need for needle delivery and further minimizing the severity of the tissue disruption upon initial delivery ([@B28]). ", "Functional studies *in vitro* have shown that these constructs are capable of signal propagation through both electrical and optical stimulation, while implants in a rat model have survived out to at least 1 month with evidence of synaptogenesis and confirmation of transplant activity via intravital calcium imaging ([@B3]; [@B77]). ", "Finally, control over the neuronal subtype and protein expression prior to implant as described above may provide the opportunity for precise neuromodulation or therapeutic intervention, such as a computer-controlled \"living DBS\" electrode made using dopaminergic neurons for controlled dopamine replacement/inputs into the striatum for treatment of Parkinson's disease ([Figure 5](#F5){ref-type=\"fig\"}). ", "Similarly, computer-controlled inhibitory living electrodes may be applied to seizure foci in cases of intractable epilepsy, where detection of early epileptiform activity triggers release of copious GABA to extinguish activity in hyperexcitable circuitry ([Figure 5](#F5){ref-type=\"fig\"}).", "\n\n![", "Tissue-engineered living electrodes may be tailored to various applications for neuromodulation. **(", "A)** Dopaminergic constructs may provide \"living deep brain stimulation\" for Parkinson's disease through restoration of dopaminergic inputs to the striatum. **(", "B)** Living electrodes with GABAergic neurons may inhibit epileptic brain activity. **(", "C)** Glutamatergic constructs could serve as a means to relay sensory feedback, e.g., from prosthetic limbs. ", "Adapted with permission of John Wiley and Sons from [@B65].](fnins-13-00269-g005){#F5}\n\nWhile this living electrode strategy is promising and addresses a number of major challenges in the field, there are a several non-trivial challenges to translation that underscore the increased complexity of engineering a biohybrid interface for reproducible function. ", "For instance, as the living electrode concept is based on synapse formation between the implant and brain, the effective stimulation/recording density is dictated primarily by the extent and specificity of synaptogenesis. ", "As such, one significant translational challenge is control over the degree and targeting of synaptogenesis upon implantation. ", "Constructs may be seeded with neurons that preferentially synapse with specific subtypes for more targeted interfacing, although the proportion of desired to aberrant connections is an ongoing area of investigation. ", "Further, migration of living electrode neurons from the construct over time has been observed in early-stage implants, potentially necessitating a mesh or similar barrier to prevent neuronal migration away from the target stimulation/recording site at the brain surface. ", "In the case of bidirectional living electrodes for recording, activity from host neurons must be conveyed across at least two synapses, making them potentially useful for recording local fields but likely hindering the ability to isolate single neurons from the output activity at the brain surface. ", "Computer models of living electrodes may provide predictions of synaptogenesis and signal propagation to better inform design choices and interpret neuronal activity ([@B17]). ", "Clinical bio-fabrication will also be a significant challenge for translation, including starting biomass, quality assurance, and safety monitoring. ", "Here, the use of autologous, stem cell derived neurons would mitigate the need for immune suppression, although personalized living electrodes would be more expensive to build and more challenging to validate than allogeneic living electrodes from a standardized neuronal source. ", "Finally, the input/output behavior of the living electrode under external control must be characterized to (1) compare the living electrode behavior to current clinical benchmarks for neuronal interfacing, and (2) determine the best method of external control at the brain surface. ", "The choice of electrical (e.g., μECOG) or optical interfacing (e.g., LED array) will also likely need further optimization depending on the target application.", "\n\nSummary\n=======\n\nDespite decades of significant effort, to date there is no single ideal neuroelectronic interface for long-term applications. ", "While the definition of an ideal set of properties for a given interface is determined by the intended application, the clinical viability of these technologies is largely determined by their ability to function stably and predictably over long-term periods, which may, for several applications, span the course of the user's life. ", "Current interfaces are limited by the multi-phasic FBR, a series of prolonged inflammatory processes that lead to neuronal attrition at the implant site and inhibit the chronic utility of recording or stimulation electrodes. ", "Years of natural selection have provided a vast library of mechanisms for directing neuronal growth, migration, and immunoreactivity; a common design feature of bioactive interfaces is the recruitment or partial recreation of these systems to influence local biological activity for better integration. ", "Currently, bioactive interfaces largely use a combination of minimally invasive, soft material coatings, soluble factors and other biomolecules to limit the implant footprint, curb inflammation, and promote neuronal survival, although sustaining this bioactivity over long periods of time remains a significant design challenge. ", "As such, it is necessary that the next generation of implantable, bioactive interfaces maintain a microenvironment that enables chronically stable performance, potentially through the introduction of living cells or tissue to further minimize the disparity between the implant and host brain. ", "Ultimately, fully biological interfaces, such as living electrodes, may allow for a seamless integration with the host circuitry for controlled neuromodulation, feedback, and, ideally, functional restoration.", "\n\nAuthor Contributions\n====================\n\nDKC outlined, edited drafts, and finalized the manuscript. ", "DA performed the literature search, wrote the initial draft, made revisions, and prepared all of the figures. ", "JW and MS made additions and edits to the manuscript.", "\n\nConflict of Interest Statement\n==============================\n\nDC is a scientific co-founder of INNERVACE, LLC, and Axonova Medical, LLC, which are University of Pennsylvania spin-out companies focused on translation of advanced regenerative therapies to treat nervous system disorders. ", "The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.", "\n\n**Funding.** ", "Financial support was provided by the National Institutes of Health \\[BRAIN Initiative U01-NS094340 (DKC) & T32-NS091006 (DA)\\], the National Science Foundation \\[Graduate Research Fellowship DGE-1321851 (DA)\\], and the Department of Veterans Affairs \\[Merit Review I01-BX003748 (DKC)\\]. ", "Any opinion, findings, and conclusions or recommendations expressed in this material are those of the authors(s) and do not necessarily reflect the views of the National Institutes of Health, National Science Foundation, or Department of Veterans Affairs.", "\n\nThe authors thank James P. Harris, Laura A. Struzyna, Wisberty J. Gordian-Velez, H. Isaac Chen, and Reuben H. Kraft for technical contributions.", "\n\n[^1]: Edited by: Jeffrey R. Capadona, Case Western Reserve University, United States\n\n[^2]: Reviewed by: Stuart Cogan, The University of Texas at Dallas, United States; Andrew J. Shoffstall, Case Western Reserve University, United States\n\n[^3]: This article was submitted to Neuroprosthetics, a section of the journal Frontiers in Neuroscience\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0008119998383335769, 0.0006298813968896866, 0.0006878232816234231, 0.0005822142702527344, 0.0005765367532148957, 0.000543296686373651, 0.000589550647418946, 0.0005224214983172715, 0.003297746879979968, 0.0018186146626248956, 0.001466649118810892, 0.0005938491085544229, 0.0013912413269281387, 0.0019055769080296159, 0.0011513825738802552, 0.0007762134773656726, 0.001846153987571597, 0.0010415883734822273, 0.0007258601253852248, 0.000873419689014554, 0.0007019496406428516, 0.000871176365762949, 0.0007612597546540201, 0.0006235395558178425, 0.000685745500959456, 0.0006448611966334283, 0.0006069407681934536, 0.0006627943948842585, 0.000680549128446728, 0.0007415394647978246, 0.0008201559539884329, 0.0007796104182489216, 0.0007649018079973757, 0.0005595828988589346, 0.001009844709187746, 0.0006236753542907536, 0.0007802664185874164, 0.0005814082687720656, 0.0006523379706777632, 0.0006629475392401218, 0.0005781247746199369, 0.0008326445240527391, 0.0006319642998278141, 0.0008331711869686842, 0.0005598405841737986, 0.0006121740443632007, 0.0005651256651617587, 0.0005648741498589516, 0.0005359557690098882, 0.0008270835387520492, 0.0005831311573274434, 0.0007125937263481319, 0.0019055769080296159, 0.0010105728870257735, 0.0005924662691541016, 0.0007125091506168246, 0.000719384232070297, 0.000659740122500807, 0.0006311493343673646, 0.0008173247333616018, 0.0005898344679735601, 0.000594989862293005, 0.00053848244715482, 0.0023481526877731085, 0.0005773673765361309, 0.0006290435558184981, 0.0006603168440051377, 0.0006373825599439442, 0.000782590068411082, 0.0005744663067162037, 0.0006285737035796046, 0.0008206696365959942, 0.0005202011088840663, 0.0006634516175836325, 0.0005660477327182889, 0.0006256608758121729, 0.0007029296248219907, 0.0019027367234230042, 0.0007377792499028146, 0.0006843797164037824, 0.0007076011970639229, 0.0006330765900202096, 0.0005269944667816162, 0.0008926032460294664, 0.008225801400840282, 0.00236147316172719, 0.000671745918225497, 0.0009386323508806527, 0.0019055769080296159, 0.0009794865036383271, 0.0018573594279587269, 0.004110383801162243, 0.0007386188954114914, 0.000601882697083056, 0.0006938096485100687, 0.0006208334234543145, 0.0007345077465288341, 0.0011480575194582343, 0.0006440173019655049, 0.0006297067156992853, 0.0005414534243755043, 0.0016682945424690843, 0.0006442192243412137, 0.0006115701980888844, 0.0008601274457760155, 0.0006622080691158772, 0.0007572322501800954, 0.0006268752622418106, 0.0006472718087024987, 0.0006310915341600776, 0.0006801707786507905, 0.0008719760808162391, 0.000646304280962795, 0.0019055769080296159, 0.0006186193786561489, 0.0006573052378371358, 0.00069582206197083, 0.0007119441288523376, 0.0007817046134732664, 0.000629640999250114, 0.0007044103113003075, 0.000581362284719944, 0.000736850721295923, 0.0006604845984838903, 0.0019055769080296159, 0.0006869143689982593, 0.0024432449135929346, 0.0013847616501152515, 0.0012102903565391898, 0.0005884208949282765, 0.0006106825894676149, 0.0006681860540993512, 0.0006746983272023499, 0.0006828974583186209, 0.0006913408869877458, 0.000557263323571533, 0.0005419785738922656, 0.0006283314432948828, 0.0006133733550086617, 0.0005428734584711492, 0.0008650832460261881, 0.0005410464364103973, 0.0009019472636282444, 0.0005839120130985975, 0.0005764515371993184, 0.0007115334155969322, 0.000605944893322885, 0.0006533453124575317, 0.0005990609060972929, 0.0006203582161106169, 0.0009741890826262534, 0.0005770455463789403, 0.0007677400135435164, 0.0006494496483355761, 0.0005795106408186257, 0.0005897583323530853, 0.0006352596683427691 ]
0.000896
157
[ "Signals that regulate astroglial gene expression: induction of GFAP mRNA following seizures or injury is blocked by protein synthesis inhibitors.", "\nPrevious studies have revealed that a single electroconvulsive seizure (ECS) strongly induces glial fibrillary acidic protein (GFAP) expression in astrocytes in the hippocampal dentate gyrus. ", "The signals that trigger this induction are not known, but circumstantial evidence suggests the hypothesis that GFAP expression may be induced as a result of the induction of growth factor expression by dentate granule cells that also occurs as a result of the ECS and other types of seizures. ", "The present study tests one prediction of this hypothesis by evaluating whether increases in GFAP mRNA levels after ECS are blocked by inhibiting protein synthesis at various times after the ECS. ", "We report that the upregulation of GFAP expression following ECS is blocked by protein synthesis inhibitors given 5 min before or up to 12 h after a single ECS. ", "This temporal gradient suggests an intermediate step involving the increased expression of a protein growth factor." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.000720238545909524, 0.005672739818692207, 0.0009522352484054863, 0.0005960586131550372, 0.0006770164472982287, 0.0005566923646256328 ]
0.001529
6
[ "X:1\nT:The Cup of Tea -- Reel\nR:reel\nB:Ryan's Mammoth Collection\nZ:Contributed by Ray Davies, ray:davies99.freeserve.co.uk\nM:C|\nL:1/8\nK:D\nv.e.", "A(3AAA g2.f.g|eAAc BGG2|.e.", "A(3AAA g2.f.g|afge dgfg|\\\n.e.", "A(3AAA g2.f.g|eAAc BGG2|.e.", "A(3AAA g2.f.g|afge d2(cd)||\\\n:eaag efgf|eaag edcd|eaag efgb|afge d2(cd)|\\\neaag efgf|eaag edcd|eaag efgb|afge dgfg:|\n" ]
{ "pile_set_name": "Github" }
[ 0.0009123333729803562, 0.007537507917732, 0.03439370170235634, 0.007537507917732, 0.0064276703633368015 ]
0.011362
5
[ "package provisioners\n\nimport (\n\t\"github.com/hashicorp/terraform/configs/configschema\"\n\t\"github.com/hashicorp/terraform/tfdiags\"\n\t\"github.com/zclconf/go-cty/cty\"\n)\n\n// Interface is the set of methods required for a resource provisioner plugin.", "\ntype Interface interface {\n\t// GetSchema returns the schema for the provisioner configuration.", "\n\tGetSchema() GetSchemaResponse\n\n\t// ValidateProvisionerConfig allows the provisioner to validate the\n\t// configuration values.", "\n\tValidateProvisionerConfig(ValidateProvisionerConfigRequest) ValidateProvisionerConfigResponse\n\n\t// ProvisionResource runs the provisioner with provided configuration.", "\n\t// ProvisionResource blocks until the execution is complete.", "\n\t// If the returned diagnostics contain any errors, the resource will be\n\t// left in a tainted state.", "\n\tProvisionResource(ProvisionResourceRequest) ProvisionResourceResponse\n\n\t// Stop is called to interrupt the provisioner.", "\n\t//\n\t// Stop should not block waiting for in-flight actions to complete. ", "It\n\t// should take any action it wants and return immediately acknowledging it\n\t// has received the stop request. ", "Terraform will not make any further API\n\t// calls to the provisioner after Stop is called.", "\n\t//\n\t// The error returned, if non-nil, is assumed to mean that signaling the\n\t// stop somehow failed and that the user should expect potentially waiting\n\t// a longer period of time.", "\n\tStop() error\n\n\t// Close shuts down the plugin process if applicable.", "\n\tClose() error\n}\n\ntype GetSchemaResponse struct {\n\t// Provisioner contains the schema for this provisioner.", "\n\tProvisioner *configschema.", "Block\n\n\t// Diagnostics contains any warnings or errors from the method call.", "\n\tDiagnostics tfdiags.", "Diagnostics\n}\n\n// UIOutput provides the Output method for resource provisioner\n// plugins to write any output to the UI.", "\n//\n// Provisioners may call the Output method multiple times while Apply is in\n// progress. ", "It is invalid to call Output after Apply returns.", "\ntype UIOutput interface {\n\tOutput(string)\n}\n\ntype ValidateProvisionerConfigRequest struct {\n\t// Config is the complete configuration to be used for the provisioner.", "\n\tConfig cty.", "Value\n}\n\ntype ValidateProvisionerConfigResponse struct {\n\t// Diagnostics contains any warnings or errors from the method call.", "\n\tDiagnostics tfdiags.", "Diagnostics\n}\n\ntype ProvisionResourceRequest struct {\n\t// Config is the complete provisioner configuration.", "\n\tConfig cty.", "Value\n\n\t// Connection contains any information required to access the resource\n\t// instance.", "\n\tConnection cty.", "Value\n\n\t// UIOutput is used to return output during the Apply operation.", "\n\tUIOutput UIOutput\n}\n\ntype ProvisionResourceResponse struct {\n\t// Diagnostics contains any warnings or errors from the method call.", "\n\tDiagnostics tfdiags.", "Diagnostics\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0007425860385410488, 0.0006571229896508157, 0.0017668380169197917, 0.0009013072121888399, 0.001148768002167344, 0.0023466083221137524, 0.001704028807580471, 0.000954768096562475, 0.0006066871574148536, 0.0007216607918962836, 0.0006612177239730954, 0.008464711718261242, 0.006889908108860254, 0.0063694193959236145, 0.0011665935162454844, 0.0029309261590242386, 0.0008358521154150367, 0.0007310417131520808, 0.0009249630384147167, 0.0011811564909294248, 0.011544679291546345, 0.0011721948394551873, 0.0029309261590242386, 0.000963246391620487, 0.011544679291546345, 0.0006248784484341741, 0.0007243396248668432, 0.0007569289882667363, 0.0010019165929406881, 0.0029309261590242386, 0.0008568958146497607 ]
0.002476
31
[ "Q:\n\nРазличие между .addEventListener и .onresize\n\nВ чем различия .addEventListener(\"resize\",function(){}) и .onresize = function(){}?", "\n\nA:\n\naddEventListener позволяет добавлять несколько обработчиков на одно действие. ", "Удобно, если вы используете сторонние библиотеки и не можете быть уверены, что более никто кроме вас не установил свой обработчик.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007910738349892199, 0.0012914311373606324, 0.0018626987002789974, 0.001995444530621171 ]
0.001485
4
[ "What is a HugelKultur?", "\n\nHave extra twigs, dead trees, leaves and other compost AND you want an incredibly efficient and self-sustaining way to garden? ", "You should try a centuries old method of creating HugelKultur. ", "Very simply put, you build a long shallow trench, add some logs, top with twigs, leaves and other compost, then cover with soil. ", "You plant right on top of the HugelKultur and you have a long-lasting, self fertilizing, self aerating, self watering raised garden bed.", "\n\nThe process of using HugelKultur has been used in Germany and Central Europe for centuries, and is based on a very simple premise that you are emulating the natural way that plant life decays on the forest floor and re-enters the eco system, but with a little engineering added by man.", "\n\nHugelKultur are becoming increasingly popular in urban environments where gardening can be difficult, and are incredibly useful if you have a cabin and want to make the most out of the resources around you without having to tend to your garden every day. ", "Moreover, it doesn’t have to specifically be used for traditional gardening such as vegetables or flowering plants, it can be used for mushrooms, wildlife feeding, or just for improving the quality of the land that you own.", "\n\nAdvantages for having a HugelKultur on a rustic property:\n\nIt creates a very fertile growing area\n\nThe size and shape can be used to improve and modify drainage\n\nProvides a practical use for excess twigs and fallen trees\n\nKeeps moisture from leaving around the HugelKultur\n\nCreates a garden that requires no harmful external fertilization\n\nMaking a Basic HugelKultur\n\nYou don’t have to be a gardening expert to make your first HugelKultur, you just need to know the basics. ", "Here are some tips on making your first one:\n\nFind a location that will get the sun that is needed for what you plan on planting. ", "The HugelKultur doesn’t change the sunshine needs for whatever you plant.", "\n\nYour trench should be about 1 foot deep, but there is no exact perfect depth. ", "Consider the size of logs that you will be putting in the trench and just try to make the logs get back to ground level after you lay them in there. ", "A starter HugelKultur is around 1 food deep by 3 foot wide, by 6 feet long, but there is no rule on this. ", "You can make it as long as you want, and the width is flexible as well.", "\n\nFill the trench with logs. ", "You can have these cut up or lay them down length wise. ", "Avoid cedar or walnut trees.", "\n\nAdd some branches above this layer, and top with smaller twigs, leaves, and other compostable materials. ", "Water as you go. ", "Cover this with dirt (you can use the dirt from the trench you just dug). ", "The goal height is about 3 feet, but if you generally keep the height and width close to equal, you have lots of flexibility.", "\n\nIf you can plant them in fall in a cooler environment, the HugelKultur can do its thing, and by Spring your mound will be ready for seeds or transplanting right on the mound.", "\n\nT\n\nRustic Living uses for HugelKultur\n\nHugelKultur’s are most often used for traditional gardening, as they are very practical and popular with people concerned about eco-friendly sustainability. ", "However, they are wonderful if you have a lot of property. ", "In fact, they might be the perfect answer to many rustic property owners. ", "Consider:\n\nCan be used as a method to improve land quality by utilizing resources you already own and often find problematic (fallen trees and twigs). ", "You can build long HugelKultur’s throughout your land that can mature over time, creating fertile land for the future.", "\n\nExcellent tool for self-sustaining wildlife food sources. ", "After you build your HugelKultur where you want to feed deer or other wildlife you can seed and forget it for the season. ", "The mound will do the rest of the work. ", "Also, by creating a long feeding source, you keep deer from feeding too close to each other, helping to prevent disease that can be spread by overly focused feeding methods.", "\n\nGreat for wildflower areas. ", "Build your HugelKultur in the fall, seed with wildflower mix, black eyed susans, etc., ", "and enjoy all throughout the next year.", "\n\nWith a little extra study on growing mushrooms, can be used to grow wild mushrooms. (", "one of ours sprouts a generous portion of Morels every year)\n\nHugelKultur Video\n\n\n\n\n\nRelated" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.049758534878492355, 0.0011357496259734035, 0.013734367676079273, 0.0018615127773955464, 0.005283899139612913, 0.0006438688142225146, 0.0008012242033146322, 0.0006699206423945725, 0.0008356506004929543, 0.0006996541633270681, 0.0026120140682905912, 0.0055347345769405365, 0.001121282810345292, 0.0008336635655723512, 0.0005659838207066059, 0.021149776875972748, 0.0009878657292574644, 0.0011309421388432384, 0.0006512492545880377, 0.0018727952847257257, 0.002816708292812109, 0.0007168920710682869, 0.0009344508871436119, 0.0006099999300204217, 0.0009568859240971506, 0.0008644759654998779, 0.0005578750278800726, 0.005907007493078709, 0.000554885424207896, 0.031010378152132034, 0.0010979134822264314, 0.0010286616161465645, 0.0006549078389070928, 0.013092621229588985, 0.0006267632124945521, 0.0006072989199310541, 0.002271730685606599 ]
0.004762
37
[ "Introduction {#s1}\n============\n\nBasophils (BA) and mast cells (MC) are effector cells of allergic and other inflammatory reactions [@pone.0029925-Valent1]--[@pone.0029925-Metcalfe1]. ", "These cells produce a number of biologically active mediator substances and express receptors for immunoglobulin E (IgE) [@pone.0029925-Valent1]--[@pone.0029925-Kawakami1]. ", "In response to IgE-receptor cross-linking or other stimuli, BA and MC release proinflammatory mediators and thereby contribute to the clinical symptoms in allergic patients [@pone.0029925-Kinet1]--[@pone.0029925-Marone1]. ", "The capacity of BA and MC to respond to an IgE-dependent trigger (allergen), also termed releasability, depends on genetic factors, signal transduction molecules, the maturation stage of cells, and the presence of triggering cytokines [@pone.0029925-Kepley1]--[@pone.0029925-Greenhawt1] The severity of an allergic reaction depends on additional factors, including the type of allergen, local organ-specific factors, and the numbers of BA and MC involved in the reaction [@pone.0029925-Valenta1]--[@pone.0029925-Valent2]. ", "Increased numbers of BA and/or MC are seen in chronic inflammatory disorders, chronic infections, and in certain hematologic disorders [@pone.0029925-Metcalfe1], [@pone.0029925-Escribano1]--[@pone.0029925-Valent3]. ", "In systemic mastocytosis (SM), MC numbers are highly elevated in various organs [@pone.0029925-Metcalfe1], [@pone.0029925-Escribano1]--[@pone.0029925-Valent3]. ", "In these patients, anaphylactic reactions may be life-threatening and may occur even in the absence of specific (detectable) IgE [@pone.0029925-Escribano1]--[@pone.0029925-Valent3].", "\n\nActivation of BA and MC through the IgE receptor is associated with an increase in (activation-linked) cell surface antigens such as CD63, and with activation of downstream signaling pathways [@pone.0029925-Kinet1]--[@pone.0029925-Kawakami1], [@pone.0029925-Valent4]--[@pone.0029925-Rivera1]. ", "Major IgE receptor downstream pathways include the MEK/ERK pathway and the phosphoinositide 3-kinase (PI3-kinase)/Akt pathway [@pone.0029925-Kinet1]--[@pone.0029925-Kawakami1], [@pone.0029925-Siraganian1], [@pone.0029925-Rivera1]. ", "Especially the latter pathway has been implicated in the process of degranulation and mediator secretion [@pone.0029925-Kinet1]--[@pone.0029925-Kawakami1], [@pone.0029925-Siraganian1], [@pone.0029925-Rivera1]. ", "In addition, the PI3-kinase is a regulator of growth and survival of MC [@pone.0029925-Serve1]--[@pone.0029925-Fukao1]. ", "More recently, the PI3-kinase has also been identified as a major signaling molecule responsible for KIT-dependent differentiation and growth of neoplastic MC harboring oncogenic *KIT* mutants [@pone.0029925-Shivakrupa1], [@pone.0029925-Harir1]. ", "Therefore, PI3-kinase as well as PI3-kinase-downstream signaling molecules such as the mammalian target of rapamycin (mTOR) are considered to represent potential targets of therapy in diseases associated with BA/MC activation or abnormal MC growth [@pone.0029925-Tedeschi1]--[@pone.0029925-Kuehn1]. ", "However, most inhibitory compounds that have been developed in the past cannot be applied in patients because of their unfavorable pharmacological properties and toxicity.", "\n\nNVP-BEZ235 is a novel orally-bioavailable PI3-kinase inhibitor that has been described to exert growth-inhibitory effects on breast cancer, prostate cancer, and myeloma cell lines [@pone.0029925-Maira1]--[@pone.0029925-Baumann1]. ", "NVP-BEZ235 inhibits the activtion of all isoforms of the PI3-kinase as well as mTOR [@pone.0029925-Maira1]. ", "Currently, NVP-BEZ235 is undergoing evaluation in preclinical studies and clinical trials in cancer patients.", "\n\nIn the current study, we examined the effects of NVP-BEZ235 on the growth of normal and neoplastic BA and MC, and on IgE receptor-dependent activation. ", "The results of our studies show that NVP-BEZ235 is a potent inhibitor of growth and activation of human BA and MC. ", "Growth inhibitory effects of the drug were seen not only in normal cells, but also in oncogene-transformed neoplastic BA and MC. ", "These results suggest that NVP-BEZ235 may be an interesting targeted drug for disorders associated with abnormal growth or activation of BA or MC.", "\n\nResults {#s2}\n=======\n\nNVP-BEZ235 inhibits the proliferation of neoplastic BA and MC {#s2a}\n-------------------------------------------------------------\n\nAs determined by ^3^H-thymidine uptake, NVP-BEZ235 was found to inhibit spontaneous proliferation of KU812 cells, HMC-1.1 cells, and HMC-1.2 cells in a dose-dependent manner ([Figure 1A](#pone-0029925-g001){ref-type=\"fig\"}). ", "Interestingly, IC~50~ values obtained in HMC-1.1 cells (0.025 µM) were slightly higher when compared to IC~50~ values obtained in HMC-1.2 cells (0.005 µM) ([Figure 1A](#pone-0029925-g001){ref-type=\"fig\"}). ", "An unexpected observation was that the mTOR inhibitor RAD001 (everolimus) produced clear growth inhibition in HMC-1.2 cells at low concentrations (IC~50~\\<0.001 µM), whereas no effects were seen in HMC-1.1 cells or KU812 cells ([Figure 1B](#pone-0029925-g001){ref-type=\"fig\"}), suggesting that mTOR may play a particular role in KIT D816V-dependent proliferation. ", "This assumption was confirmed by the fact that wortmannin did not inhibit the proliferation in HMC-1.2 cells over the dose-range tested (0.001--1 µM), whereas LY294002 (known to block mTOR activity at high concentrations) was found to counteract proliferation of HMC-1.2 cells between 5 and 20 µM ([Figure S1](#pone.0029925.s001){ref-type=\"supplementary-material\"}). ", "We were also able to show that NVP-BEZ235 dose-dependently induces growth arrest in primary neoplastic cells obtained from patients with KIT D816V+ SM ([Table 1](#pone-0029925-t001){ref-type=\"table\"}, [Figure 1C](#pone-0029925-g001){ref-type=\"fig\"}). ", "In normal/reactive bone marrow cells (n = 2 donors), no substantial effects of NVP-BEZ235 were seen ([Table 1](#pone-0029925-t001){ref-type=\"table\"}).", "\n\n![", "Effects of NVP-BEZ235 on proliferation in HMC-1 cells and KU812 cells.\\\nA,B: HMC-1.1 cells (left panels), HMC-1.2 cells (middle panels), and KU812 cells (right panels) were cultured in control medium (Co), control medium with DMSO 1∶1,000 (DMSO Co), or with increasing concentrations (0.001 µM--1 µM) of NVP-BEZ235 (A) or RAD001 (B) at 37°C for 48 hours. ", "Thereafter, ^3^H-thymidine uptake was measured. ", "Results show the percentage of ^3^H-thymidine uptake compared to control (Co) and represent the mean±S.D. of three independent experiments in each cell line. ", "Asterisk (\\*): p\\<0.05. ", "C: Bone marrow MNC from six patients with SM were incubated in control medium (Co) or in various concentrations of NVP-BEZ235 (as indicated) at 37°C for 48 hours. ", "Then, ^3^H-thymidine uptake was measured. ", "Results show the percentage of ^3^H-thymidine uptake compared to Co and represent the mean±S.D. of six donors. ", "Asterisk (\\*): p\\<0.05.](pone.0029925.g001){#pone-0029925-g001}\n\n10.1371/journal.pone.0029925.t001\n\n###### Effects of NVP-BEZ235 on proliferation of normal and neoplastic cells.[\\*](#nt101){ref-type=\"table-fn\"}\n\n![](", "pone.0029925.t001){#pone-0029925-t001-1}\n\n Age Serum Tryptase NVP-BEZ235\n --------------------------------------------- ----- ------ ------ ---------------- ------ ------------\n BM MNC ISM f 69 16.8 \\+ 0.1\n BM MNC ISM m 82 30.7 \\+ 0.1\n BM MNC ISM f 44 14.0 \\+ 0.1--0.5\n BM MNC ISM f 39 11.5 \\+ 0.1\n BM MNC SSM f 56 133.0 \\+ 0.1\n BM MNC ISM m 66 65.4 \\+ 0.1\n BM MNC[\\*\\*\\*](#nt103){ref-type=\"table-fn\"} NHL -- -- n.d. ", " n.d. ", " \\>1\n BM MNC[\\*\\*\\*](#nt103){ref-type=\"table-fn\"} NHL -- -- n.d. ", " n.d. ", " \\>1\n HMC-1.1 MCL n.a. ", " n.a. ", " n.a. ", " − 0.025\n HMC-1.2 MCL n.a. ", " n.a. ", " n.a. ", " \\+ 0.005\n KU812 CML n.a. ", " n.a. ", " n.a. ", " − 0.01\n\n\\*Proliferation was determined by measurement of ^3^H-thymidine uptake as described in the text.", "\n\n\\*\\*Diagnoses were established according to published criteria (12,13).", "\n\n\\*\\*\\*Normal/reactive BM cells were obtained from patients with NHL without BM involvement.", "\n\nAbbreviations: f, female; m, male; yrs, years; BM, bone marrow; MNC, mononuclear cells; ISM, indolent systemic mastocytosis; SSM, smoldering systemic mastocytosis; NHL, Non Hodgkin\\'s Lymphoma; MCL, mast cell leukemia; CML, chronic myeloid leukemia; n.d., ", "not determined; n.a., ", "not applicable.", "\n\nWe next examined the effects of NVP-BEZ235 and RAD001 on cell cycle distribution in HMC-1 cells and KU812 cells. ", "As expected, NVP-BEZ235 produced a G1 cell cycle arrest in all three cell lines ([Figure S2](#pone.0029925.s002){ref-type=\"supplementary-material\"}). ", "RAD001 was also found to induce a G1 cell cycle arrest, but the effect was less pronounced compared to the effect of NVP-BEZ235 ([Figure S2](#pone.0029925.s002){ref-type=\"supplementary-material\"}). ", "We also examined the effects of LY294002 and wortmannin on cell cycle distribution in HMC-1 cells and KU812 cells. ", "In these experiments, we found that only LY294002, but not wortmannin produces a clear G1 cell cycle arrest in HMC-1 cells and KU812 cells at relatively high concentrations ([Figure S2](#pone.0029925.s002){ref-type=\"supplementary-material\"}).", "\n\nNVP-BEZ235 induces apoptosis in neoplastic BA and MC {#s2b}\n----------------------------------------------------\n\nTo investigate the mechanism of drug-induced growth inhibition, we examined NVP-BEZ235-exposed cells for signs of apoptosis. ", "In these experiments, NVP-BEZ235 was found to induce a dose-dependent increase in apoptotic cells in all three cell lines examined ([Figure 2A](#pone-0029925-g002){ref-type=\"fig\"}). ", "An unexpected observation was that apoptosis-inducing effects of NVP-BEZ235 were stronger in HMC-1.1 cells compared to HMC-1.2 cells ([Figure 2A](#pone-0029925-g002){ref-type=\"fig\"}). ", "These data suggest that KIT D816V may induce resistance against the apoptosis-inducing effects of NVP-BEZ235, whereas proliferation-inhibitory effects of the drug are not altered by the KIT mutant. ", "We also examined the effects of RAD001 on survival of HMC-1 cells and KU812 cells. ", "However, the drug concentrations required to produce apoptosis were relatively high, and even at the highest concentrations applied (5 and 10 µM), only a small subset of cells were found to be apoptotic ([Figure 2B](#pone-0029925-g002){ref-type=\"fig\"}). ", "As a next step, we examined apoptosis-inducing effects of NVP-BEZ235 and RAD001 on KU812 and HMC-1 cells by AnnexinV/propidium iodide (PI) staining ([Figure 2C](#pone-0029925-g002){ref-type=\"fig\"}), caspase staining ([Figure 2D](#pone-0029925-g002){ref-type=\"fig\"}), and in a Tunel assay ([Figure 2E](#pone-0029925-g002){ref-type=\"fig\"}). ", "In all three assays, NVP-BEZ235 was found to induce apoptosis in the three cell lines tested ([Figure 2C--2E](#pone-0029925-g002){ref-type=\"fig\"}). ", "As expected, the effects of NVP-BEZ235 on apoptosis-induction were stronger in HMC-1.1 cells compared to HMC-1.2 ([Figure 2C--2E](#pone-0029925-g002){ref-type=\"fig\"}). ", "RAD001 also showed some effects in these experiments. ", "However, the effects of RAD001 were far less pronounced compared to the effects seen with NVP-BEZ235 ([Figure 2C--2E](#pone-0029925-g002){ref-type=\"fig\"}). ", "In control experiments, NVP-BEZ235 showed no substantial effects on cell viability or the percentage of apoptotic cells (\\<5% apoptotic cells) in cord blood-derived cultured human MC (data not shown).", "\n\n![", "Effects of NVP-BEZ235 on survival of HMC-1 cells and KU812 cells.\\\nA,B: HMC-1.1 cells (left panels), HMC-1.2 cells (middle panels), and KU812 cells (right panels) were cultured in control medium (Co), LY294002 (20 µM), or increasing concentrations (0.001 µM--10 µM) of NVP-BEZ235 (A) or RAD001 (B) at 37°C for 48 hours. ", "Then, the numbers (percentage) of apoptotic cells was counted on Giemsa-stained cytospin slides. ", "Results represent the mean±S.D. of three independent experiments. ", "Asterisk (\\*) indicates p\\<0.05. ", "C: HMC-1.1 cells (upper panels), HMC-1.2 cells (middle panels) and KU812 cells (lower panels) were incubated in control medium (Co) (left panels) or in medium containing NVP-BEZ235, 1 µM (middle panels) or RAD001, 1 µM (right panel) for 48 hours. ", "After incubation, cells were examined for combined AnnexinV/PI staining by flow cytometry. ", "D: HMC-1.1 (left panel), HMC-1.2 (middle panel), and KU812 cells (right panel) were incubated in control medium (Co) or in various concentrations of NVP-BEZ235 or RAD001 as indicated (37°C, 48 hours). ", "Then, the percentage of active caspase 3-positive cells was determined by flow cytometry. ", "Results represent the mean±S.D. of three independent experiments. ", "Asterisk (\\*) indicates p\\<0.05. ", "E: HMC-1.1 cells (upper panels), HMC-1.2 cells (middle panels) and KU812 cells (lower panels) were incubated in control medium (Co) or in medium containing NVP-BEZ235 (1 or 10 µM) or RAD001 (1 or 10 µM) (as indicated) at 37°C for 48 hours. ", "Thereafter, cells were harvested and subjected to Tunel assay and examined by fluorescence microscopy.](pone.0029925.g002){#pone-0029925-g002}\n\nNVP-BEZ235 exerts inhibitory effects on *in vivo* growth of HMC-1.2 cells in a xenotransplantation model {#s2c}\n--------------------------------------------------------------------------------------------------------\n\nTo confirm the inhibitory effects of NVP-BEZ235 on growth of HMC-1 cells, we examined the drug in a xenotransplant model using HMC-1.2 cells and NMR1-Foxn1^nu^ mice. ", "In these mice, HMC-1 cells formed tumor nodules after subcutaneous injection within 1--2 weeks. ", "Administration of NVP-BEZ235 (40 mg/kg, *per os* daily from day 5) resulted in a profound inhibition of tumor formation in all mice examined ([Figure 3A](#pone-0029925-g003){ref-type=\"fig\"}). ", "By contrast, no inhibitory effects of RAD001 on *in vivo* growth of HMC-1 cells in nude mice could be substantiated ([Figure 3B](#pone-0029925-g003){ref-type=\"fig\"}). ", "All in all, these data suggest that NVP-BEZ235 exerts anti-neoplastic effects on growth of malignant MC *in vivo*.", "\n\n![", "Effect of NVP-BEZ235 on *in vivo* growth of HMC-1.2 cells.\\\nFemale NMRI-Foxn1^nu^ mice were inoculated with HMC-1.2 cells and were randomized into a treatment group (drug gavaging) and a control group. ", "A: The treatment group (7 mice) received 40 mg/kg NVP-BEZ235 dissolved in NMP and PEG300 *per os* every day, and the control group (6 mice) received NMP and PEG300 alone for 22 days. ", "B: The treatment group (5 mice) received 5 mg/kg RAD001 dissolved in distilled water *per os*, and the control group (5 mice) received sodium chloride *per os* for 19 days. ", "Tumor size is shown in the vertical axis and is expressed in mm^3^. Results represent the mean±S.D. in each group. ", "Asterisk (\\*) indicates p\\<0.05 compared to the control group.](pone.0029925.g003){#pone-0029925-g003}\n\nNVP-BEZ235 inhibits cytokine-dependent differentiation of human BA and MC {#s2d}\n-------------------------------------------------------------------------\n\nA generally accepted hypothesis is, that cytokine-dependent growth of normal myeloid cells is dependent on PI3-kinase activity [@pone.0029925-Serve1]--[@pone.0029925-Shivakrupa1]. ", "We therefore asked whether NVP-BEZ235 would also inhibit cytokine-dependent differentiation of normal BA and MC from their immature cord blood-derived progenitors. ", "In these experiments, NVP-BEZ235 was found to suppress IL-3-dependent differentiation of BA as well as SCF-dependent differentiation of MC in a dose-dependent manner ([Figure 4](#pone-0029925-g004){ref-type=\"fig\"}). ", "In particular, whereas, NVP-BEZ235 exerted only mild effects on the total number of cultured cells, a significant inhibitory effect on cytokine-dependent development of BA and MC was seen. ", "IC~50~ values obtained for NVP-BEZ235 in these experiments were by far lower (\\<0.1 µM) compared to IC~50~ values obtained in cell activation experiments.", "\n\n![", "Effects of NVP-BEZ235 on cytokine-dependent differentiation of human BA and MC.\\\nA: Isolated cord blood MNC (0.5×10^6^/ml) were cultured in 6-well plates (Costar, Cambridge, MA) in RPMI medium containing 10% FCS and IL-3 (100 ng/ml) with or without NVP-BEZ235 (0.001--0.1 µM) at 37°C for two weeks. ", "Thereafter, the total cell numbers per well (left panel), the total numbers of BA per well determined from total cell counts and differential counts obtained in Giemsa-stained slides (middle panel), and the total cellular histamine levels per well assessed by radioimmunoassay (right panel), were determined. ", "B: Cord blood MNC were cultured in RPMI medium containing 10% FCS, SCF (100 ng/ml), and IL-6 (100 ng/ml), with or without NVP-BEZ235 (0.001--0.01 µM) at 37°C for four weeks. ", "Thereafter, the total cell numbers per well (left panel), the total numbers of MC per well determined from total cell counts and differential counts (middle panel), and the total cellular histamine levels per well (right panel), were determined. ", "Results represent the mean±S.D of three independent experiments. ", "Asterix (\\*): p\\<0.05.](pone.0029925.g004){#pone-0029925-g004}\n\nEffects of NVP-BEZ235 on expression of phosphorylated signaling molecules in neoplastic BA (KU812) and MC (HMC-1) {#s2e}\n-----------------------------------------------------------------------------------------------------------------\n\nTo confirm that NVP-BEZ235 exerts effects on HMC-1 cells and KU812 cells through specific signal transduction molecules, we performed flow cytometry experiments using antibodies against phosphorylated Akt (pAkt, S473), pS6, and pSTAT5. ", "We found that NVP-BEZ235 substantially downregulated activation of Akt and S6 in HMC-1.1 cells, and less effectively in HMC-1.2 and KU812 cells ([Figure 5A](#pone-0029925-g005){ref-type=\"fig\"}). ", "As expected, RAD001 was found to counteract expression of pS6 in HMC-1 cells and KU812 cells, but did not inhibit pAkt (S473) ([Figure 5A](#pone-0029925-g005){ref-type=\"fig\"}). ", "Interestingly, NVP-BEZ235 and RAD001 slightly decreased the expression of pSTAT5 in HMC-1.1 cells and HMC-1.2 cells ([Figure 5A](#pone-0029925-g005){ref-type=\"fig\"}). ", "By contrast, no effect of NVP-BEZ235 on pSTAT5 expression in KU812 cells was seen. ", "Data obtained by flow cytometry were confirmed by Western blot experiments ([Figure 5B and 5C](#pone-0029925-g005){ref-type=\"fig\"}). ", "Again, NVP-BEZ235 was found to downregulate expression of pAkt (S473), pSTAT5, and pS6 in HMC-1.1 cells and HMC-1.2 cells, and expression of pAkt and pS6 in KU812 cells ([Figure 5B and 5C](#pone-0029925-g005){ref-type=\"fig\"}). ", "Similar to our flow cytometry data, NVP-BEZ235 did not downregulate activation of pSTAT5 in KU812 cells. ", "As determined by densitometry, RAD001 was found to slightly upregulate expression of pAkt ([Figure 5C](#pone-0029925-g005){ref-type=\"fig\"}). ", "NVP-BEZ235 and RAD001 were found to downregulate expression of pp70S6K and p4EBP-1 in HMC-1 cells and KU812 cells ([Figure 6](#pone-0029925-g006){ref-type=\"fig\"}). ", "However, whereas NVP-BEZ235 was found to exert strong inhibitory effects on pAkt, pp70S6K, and p4EBP-1, RAD001, which is a selective mTORC1 blocker, was found to strongly inhibit expression of pp70S6K and p4EBP-1 ([Figure 6](#pone-0029925-g006){ref-type=\"fig\"}), but did not inhibit expression of pAkt ([Figure 5](#pone-0029925-g005){ref-type=\"fig\"}). ", "Finally, we explored whether NVP-BEZ235 or RAD001 would interfere with pERK expression in HMC-1 cells or KU812 cells. ", "However, under the experimental conditions applied, neither NVP-BEZ235 nor RAD001 were found to counteract phosphorylation of ERK in HMC-1 cells and KU812 cells ([Figure S3](#pone.0029925.s003){ref-type=\"supplementary-material\"}).", "\n\n![", "Effects of NVP-BEZ235 on expression of pAkt, pS6, and pSTAT5 in HMC-1 cells and KU812 cells.\\\nA: HMC-1.1 cells (upper panel), HMC-1.2 cells (middle panel), and KU812 cells (lower panel) were incubated with control medium (Co) or medium containing NVP-BEZ235 (1 or 10 µM) or RAD001 (1 or 10 µM) at 37°C for 4 hours. ", "Thereafter, cells were permeabilized and stained with antibodies against pAkt (S473), pS6, or pSTAT5 as described in the text. ", "Expression of phosphorylated (p) signaling molecules in HMC-1 cells and KU812 cells were determined by flow cytometry. ", "Results show the staining index (mean fluorescence intensity values corrected for the isotype) and represent the mean±S.D. from three independent experiments. ", "B: HMC-1.1 cells (upper panel), HMC-1.2 cells (middle panel), and KU812 cells (lower panel) were cultured in the absence or presence of NVP-BEZ235 (1 µM) RAD001 (1 µM) at 37°C for 4 hours. ", "Thereafter, cells were lysed and Western blotting was performed using antibodies against pAkt (S473), Akt, pSTAT5, STAT5, pS6 and β-Actin. ", "C: Western blot results were quantified by densitometry in HMC-1.1 cells (upper panel), HMC-1.2 cells (middle panel), and KU812 cells (lower panel). ", "Results represent the mean±S.D. from three independent experiments.](pone.0029925.g005){#pone-0029925-g005}\n\n![", "Effects of NVP-BEZ235 on expression of p4EBP-1 and pp70S6K in HMC-1 cells and KU812 cells.\\\nHMC-1.1 cells (left panel), HMC-1.2 cells (middle panel), and KU812 cells (right panel) were cultured in the absence or presence of NVP-BEZ235 (1 µM) or RAD001 (1 µM) at 37°C for 4 hours. ", "Thereafter, cells were lysed, and Western blotting was performed using antibodies against p4EBP-1, pp70S6K, and β-Actin.](pone.0029925.g006){#pone-0029925-g006}\n\nNVP-BEZ235 inhibits IgE-dependent mediator release in human MC {#s2f}\n--------------------------------------------------------------\n\nNVP-BEZ235 was found to counteract IgE-dependent release of histamine in cultured cord blood progenitor-derived MC as well as in mature human lung MC ([Figure 7A](#pone-0029925-g007){ref-type=\"fig\"}). ", "The effects of NVP-BEZ235 on histamine release were mild, but dose-dependent and seen at all concentrations of anti-IgE applied ([Figure 7B](#pone-0029925-g007){ref-type=\"fig\"}). ", "In addition, NVP-BEZ235 was also found to inhibit the IgE-dependent release of β-hexosaminidase in MC ([Figure 7C](#pone-0029925-g007){ref-type=\"fig\"}). ", "However, compared to BA, higher concentrations of NVP-BEZ235 (1--10 µM) were required to block mediator secretion in MC. ", "RAD001 showed no effects on mediator release in MC (not shown).", "\n\n![", "Effects of NVP-BEZ235 on mediator secretion in human MC.\\\nA: IgE-preloaded cultured cord blood-derived MC (left panel) and IgE-preloaded lung MC (right panel) were incubated in control medium, various concentrations of NVP-BEZ235 (as indicated), LY294002 (20 µM), or wortmannin (1 µM) (30 minutes, 37°C). ", "Then, cells were challenged with anti-IgE (10 µg/ml) at 37°C for 30 minutes. ", "After incubation, histamine release was determined. ", "Results show the percentage of released histamine and represent the mean±S.D. of four (cultured MC, left panel) or five independent experiments (5 lung MC samples, right panel). ", "Asterisk (\\*): p\\<0.05. ", "B: Cultured MC were incubated in the presence of control medium (indicated by black bars) or medium containing NVP-BEZ235, 10 µM (open bars) for 30 minutes at 37°C. ", "Then, cells were incubated with various concentrations of anti-IgE as indicated. ", "After incubation, supernatants and lysates were harvested and examined for histamine content. ", "Histamine release was calculated as percent of total histamine. ", "Results show the percent of released histamine and are expressed as mean±S.D. of three independent experiments. ", "Asterisk (\\*): p\\<0.05. ", "C: MC preloaded with NIP(5)-BSA-specific IgE were cultured in control medium (Co) or in various concentrations of NVP-BEZ235 (0.001--10 µM) for 30 minutes at 37°C. ", "Thereafter, cells were washed and incubated with NIP(5)-BSA (100 ng/ml) for 90 minutes (37°C). ", "Then, cell-free supernatants were collected and β-hexosaminidase release was measured. ", "Results are expressed in percent of response induced by anti-IgE without NVP-BEZ235 and represent the mean±S.D of three independent experiments. ", "Asterisk (\\*) indicates p\\<0.05.](pone.0029925.g007){#pone-0029925-g007}\n\nNVP-BEZ235 inhibits IgE-dependent histamine release in human BA {#s2g}\n---------------------------------------------------------------\n\nAt 1 µM and 10 µM, NVP-BEZ235 was found to inhibit anti-IgE-induced release of histamine from normal BA in all donors (n = 5) examined ([Figure 8A](#pone-0029925-g008){ref-type=\"fig\"}). ", "The effects of NVP-BEZ235 were dose-dependent with IC~50~ values ranging between 0.5 and 1 µM. NVP-BEZ235 was also found to counteract allergen-induced histamine secretion in BA obtained from allergic patients ([Figure 8B](#pone-0029925-g008){ref-type=\"fig\"}). ", "Again the effects of NVP-BEZ235 on allergen-induced histamine release in BA were dose-dependent. ", "To define whether the effects of NVP-BEZ235 on histamine release were mediated through mTOR, we applied the mTOR-specific drug RAD001. ", "However, in contrast to NVP-BEZ235, RAD001 showed no significant effects on IgE-mediated histamine release (not shown). ", "NVP-BEZ235 failed to inhibit the A23187-induced or C5a-induced release of histamine in human BA ([Figure 8C](#pone-0029925-g008){ref-type=\"fig\"}). ", "These data suggest that NVP-BEZ235 blocks IgE-mediated histamine release through inhibition of PI3-kinase activity in human BA, a conclusion that was supported by the observation that wortmannin and LY294002 also blocked IgE-dependent histamine release in normal BA ([Figure 8A and 8B](#pone-0029925-g008){ref-type=\"fig\"}). ", "The effects of wortmannin and LY294002 on histamine release in normal BA were dose-dependent ([Figure S4](#pone.0029925.s004){ref-type=\"supplementary-material\"}).", "\n\n![", "Effects of NVP-BEZ235 on IgE-mediated histamine release in human BA.\\\nBA obtained from healthy donors (A) or patients allergic to Bet v 1 (B) were preincubated with control medium (Medium Co), various concentrations of NVP-BEZ235 (as indicated), LY294002 (20 µM), or wortmannin (1 µM) at 37°C for 30 minutes. ", "Then, cells were exposed to anti-IgE (1 µg/ml; healthy controls) or recombinant allergen (0.1 µg/ml of Bet v 1; allergic patients) at 37°C for 30 minutes. ", "After centrifugation, histamine concentrations were determined in supernatants and cell-lysates by RIA. ", "Histamine release is expressed as percentage of total histamine. ", "Results represent the mean±S.D. from five donors. ", "Asterisk (\\*) indicates p\\<0.05. ", "C: BA obtained from one healthy donor were incubated in control medium (♦-♦) or medium containing NVP-BEZ235, 10 µM (▪-▪) for 30 minutes at 37°C. ", "Then, cells were incubated with various concentrations (as indicated) of anti-IgE (left panel), Ca-ionophore A23187 (middle panel), or recombinant C5a (right panel) for another 30 minutes (37°C). ", "After incubation, supernatants and lysates were harvested and examined for their histamine content. ", "Histamine release was calculated as percent of total histamine. ", "Data are expressed as mean±S.D. of triplicates.](pone.0029925.g008){#pone-0029925-g008}\n\nNVP-BEZ235 inhibits the IgE-dependent upregulation of activation-linked cell surface antigens on BA and MC {#s2h}\n----------------------------------------------------------------------------------------------------------\n\nIgE receptor-dependent activation of BA and MC is accompanied by an increased expression of activation-linked cell surface antigens [@pone.0029925-Valent4]--[@pone.0029925-deWeck1], [@pone.0029925-Hauswirth1]. ", "In the present study, we found that NVP-BEZ235 inhibits anti-IgE-induced upregulation of CD63 and CD203c on BA in a dose-dependent manner (IC~50~: 5--10 µM) ([Figure 9A](#pone-0029925-g009){ref-type=\"fig\"}). ", "Wortmannin and LY294002 were also found to inhibit anti-IgE-induced upregulation of CD63 and CD203c ([Figure 9A](#pone-0029925-g009){ref-type=\"fig\"}; [Figure S5A](#pone.0029925.s005){ref-type=\"supplementary-material\"}). ", "In cultured human MC and primary lung MC, NVP-BEZ235 was found to inhibit the IgE-dependent upregulation of CD63, whereas no substantial effects on IgE-dependent upregulation of CD203c were seen ([Figure 9B](#pone-0029925-g009){ref-type=\"fig\"}). ", "To study the mechanism of anti-IgE-induced upregulation of CD63 and CD203c, we performed cell surface and cytoplasmic staining experiments with IgE receptor cross-linked BA and MC. ", "In these experiments, we found that IgE receptor cross-linking is followed by a rapid increase in surface expression of CD63 and CD203c on BA, whereas the intracellular levels of CD63 and CD203c slightly decreased ([Figure 9C](#pone-0029925-g009){ref-type=\"fig\"}, left panel). ", "In lung MC, the same phenomenon was observed for CD63. ", "Both the anti-IgE-induced upregulation of CD63 on the surface, and the decrease in cytoplasmic CD63 were reverted by NVP-BEZ235 ([Figure 9C](#pone-0029925-g009){ref-type=\"fig\"}, right panel). ", "In a next step, we examined the effects of NVP-BEZ235 on expression of CD63 and CD203c on KU812 and HMC-1 cells. ", "We found that NVP-BEZ235 downregulated the expression of CD63 in KU812 cells in a dose-dependent manner ([Figure S5B](#pone.0029925.s005){ref-type=\"supplementary-material\"}). ", "By contrast, no effects of NVP-BEZ235 on expression of CD63 in HMC-1 cells were found, and we were also unable to demonstrate substantial effects of NVP-BEZ235 on expression of CD203c on KU812 or HMC-1 cells (not shown). ", "Similarly, the mTOR inhibitor RAD001 and the other PI3-kinase blockers applied (LY294002, wortmannin) did not inhibit the expression of CD63 or CD203c on KU812 cells or HMC-1 cells. ", "These data suggest that expression of CD63 and CD203c on neoplastic BA and MC is not dependent on PI3-kinase activation.", "\n\n![", "Effects of NVP-BEZ235 on expression of activation-linked cell surface antigens on BA and MC.\\\nA: BA in whole blood samples were preincubated in control medium (Medium Co) or in medium containing various concentrations of NVP-BEZ235 (0.001--10 µM), LY294002 (20 µM), or wortmannin (1 µM) at 37°C for 15 minutes. ", "Then, cells were exposed to anti-IgE antibody E-124.2.8 (1 µg/ml) for another 15 minutes (37°C). ", "Thereafter, cells were stained with mAb directed against CD63 (left panel) or CD203c (right panel), and analyzed by multicolor flow cytometry as described in the text. ", "BA were defined as CD203c-positive cells in all samples. ", "Anti-IgE-induced upregulation of CD antigens was calculated from mean fluorescence intensities (MFIs) obtained with stimulated (MFIstim) and unstimulated (MFIcontrol) cells and was expressed as SI (MFIstim∶MFIcontrol). ", "Results show SI values and represent the mean±S.D. from five normal donors (the same as shown in [Figure 1A](#pone-0029925-g001){ref-type=\"fig\"}). ", "Asterisk (\\*) indicates p\\<0.05. ", "B: IgE-preloaded cultured MC (left panel) or IgE-preloaded lung MC (right panel) were incubated in control medium (Co) or in various concentrations of NVP-BEZ235 (as indicated) at 37°C for 40 minutes. ", "Then, cells were incubated with anti-IgE antibody E-124.2.8 (10 µg/ml) for 30 minutes (37°C). ", "After incubation, expression of CD63 (♦-♦) and CD203c (□-□) on MC was analyzed by flow cytometry. ", "Results show the percent-inhibition of anti-IgE-induced upregulation of CD63 or CD203c on MC, and represent the mean±S.D. from three (cultured MC) or five (lung MC) independent experiments. ", "Asterisk (\\*): p\\<0.05. ", "C: Ficoll-isolated BA (left panel) and lung MC (right panel) were preincubated in control medium (Co) or with 10 µM NVP-BEZ235 at 37°C for 15 minutes. ", "Then, cells were exposed to control medium or anti-IgE antibody E-124.2.8 (1 µg/ml) for another 15 minutes (37°C). ", "Thereafter, cells were stained with mAb directed against CD63 or CD203c and analyzed by flow cytometry using a multicolor surface staining protocol and a cytoplasmic staining protocol. ", "Results show SI values of surface CD63 (white bars), cytoplasmic CD63 (black bars), surface CD203c (light grey bars) and cytoplasmic CD203c (dark grey bars) and represent the mean±S.D. from three independent experiments.](pone.0029925.g009){#pone-0029925-g009}\n\nDiscussion {#s3}\n==========\n\nGrowth, survival, and IgE-dependent activation of BA and MC are regulated by a complex network of signal transduction cascades and molecules, including various protein kinases [@pone.0029925-Metcalfe1]--[@pone.0029925-Nadler1], [@pone.0029925-Timokhina1]--[@pone.0029925-Harir1]. ", "These signaling molecules are considered to represent potential therapeutic targets in allergic patients as well as in patients with MC proliferative disorders where abnormal MC growth and activation represent major clinical problems [@pone.0029925-Harir1]--[@pone.0029925-Kuehn1], [@pone.0029925-Valent5]. ", "Recent data suggest that the PI3-kinase is a key regulator of growth and activation of human BA and MC [@pone.0029925-Serve1]--[@pone.0029925-Harir1]. ", "We here show that the PI3-kinase/mTOR-targeting drug NVP-BEZ235 exerts major growth-inhibitory effects on neoplastic BA and MC, and inhibits IgE-dependent mediator secretion.", "\n\nInitially, NVP-BEZ235 was developed as a dual inhibitor of PI3-kinase and mTOR [@pone.0029925-Maira1]. ", "In the present study, we were able to confirm the PI3-kinase-blocking and mTOR-targeting activity of the drug. ", "In particular, as assessed by Western blotting and flow cytometry, NVP-BEZ235 was found to downregulate the expression of pAkt (S473) and pS6 in HMC-1 cells, whereas the mTOR-targeting drug RAD001 only blocked pS6 activity. ", "However, depending on the cell type and function analyzed (growth or activation), PI3-kinase and mTOR may play a quite different role. ", "In fact, BA- and MC-activation could only be downregulated by PI3-kinase inhibitors but not by the mTOR blocker RAD001. ", "On the other hand, mTOR seems to play a particular role in neoplastic growth of MC carrying the KIT mutant D816V.\n\nInterestingly, RAD001 did not mimic most of the effects of NVP-BEZ235 on mediator secretion in BA or MC, and where effects of RAD001 were seen, they were less pronounced or neglectible compared to effects seen with NVP-BEZ235. ", "These data suggest that the inhibitory effects of NVP-BEZ235 on BA and MC are primarily mediated via PI3-kinase inhibition rather than mTOR inhibition, and that other PI3-kinase-downstream signaling molecules may be involved in the effects of NVP-BEZ235 on activation of BA and MC. ", "The identity of these downstream molecules remains at present unknown. ", "Another explanation would be that RAD001 is a selective mTORC1 inhibitor that is known to even activate Akt in a negative feed-back loop. ", "Accordingly, we found that RAD001 slightly upregulates pAkt expression in HMC-1 cells. ", "An alternative explanation for the differential effects of RAD001 and NVP-BEZ235 would be that NVP-BEZ235 acts on BA and MC via PI3-kinase/mTOR-independent targets. ", "Indeed, in KU812 cells, NVP-BEZ235 showed only slight effects on PI3-kinase phosphorylation, although the drug exerted strong growth-inhibitory effects. ", "On the other hand, the target spectrum of NVP-BEZ235 has been well-defined and no other major kinase targets have been identified so far [@pone.0029925-Maira1]. ", "Finally, most effects of NVP-BEZ235 on normal BA were copied by the PI3-kinase inhibitors wortmannin and LY294002. ", "An interesting exception and observation was that LY294002 did not inhibit IgE-dependent histamine release in BA in allergic patients, suggesting that BA in allergic patients may be resistant against release-inhibitory effects of this agent.", "\n\nAn unexpected result was that NVP-BEZ235 not only downregulates expression of pAkt (S473) and pS6 in HMC-1 cells, but also expression of pSTAT5. ", "This is of particular interest for several reasons. ", "First, STAT5 has been implicated as a major regulator of growth, survival, and activation of MC [@pone.0029925-Harir1], [@pone.0029925-Shelburne1]--[@pone.0029925-Baumgartner1]. ", "Second, it has been described that in neoplastic MC, STAT5 forms a signaling complex with PI3-kinase that can be triggered/activated by oncogenic KIT mutants [@pone.0029925-Harir1]. ", "Based upon these observations, it is tempting to speculate that NVP-BEZ235 acts inhibitory on this PI3-kinase/STAT5 signaling complex in KIT D816V+ neoplastic MC. ", "The possibility that NVP-BEZ235 directly binds to STAT5 seems rather unlikely.", "\n\nAlthough NVP-BEZ235 was found to inhibit both the proliferation and activation of human BA and MC in this study, some interesting differences concerning drug actions were observed. ", "The most apparent and probably relevant difference was the higher IC~50~ values required to block cell activation and mediator secretion compared to doses required for growth-inhibition. ", "The biochemical basis of this difference remains unknown. ", "Possible explanations would be different targets involved in the reactions or the different time of incubation used to treat cells. ", "Clinically, the lower IC~50~ values would argue for the use of NVP-BEZ235 to counteract growth of neoplastic BA or MC rather than to block BA- or MC-activation in allergic disorders.", "\n\nWe were also able to confirm the major growth-inhibitory effects of NVP-BEZ235 on neoplastic MC in a xenotransplant mouse model using HMC-1.2 cells. ", "Again NVP-BEZ235 was found to block the growth of HMC-1.2 in this model, whereas RAD001 showed no substantial effects. ", "This discrepancy may be due to the lower dose of RAD001 applied (5 mg/kg/day) compared to the dose of NVP-BEZ235 (40 mg/kg/day). ", "However, we were unable to increase the dose of RAD001 because of its known toxicity. ", "The strong inhibitory effects of NVP-BEZ235 on *in vivo* growth of HMC-1 cells may be of clinical significance.", "\n\nAn interesting observation was that NVP-BEZ235 produces differential effects on survival in HMC-1.1 cells lacking KIT D816V and HMC-1.2 cells expressing KIT D816V. In particular, although at high concentrations, the drug produced massive apoptosis in HMC-1.1 cells (\\>90% apoptotic cells), only a small subset of HMC-1.2 cells underwent apoptosis regardless of the drug concentrations applied. ", "This was an unexpected outcome as the effects of NVP-BEZ235 on proliferation of the two HMC-1 subclones were comparable. ", "One possible explanation for these results would be that the *KIT* mutation D816V confers specific resistance against apoptosis-inducing effects of NVP-BEZ235. ", "In this regard it is noteworthy that this mutant also causes resistance against established KIT kinase inhibitors including imatinib [@pone.0029925-Gleixner1], [@pone.0029925-Akin1]. ", "An alternative explanation would be that the effects of NVP-BEZ235 on growth of HMC-1.2 cells were primarily mediated through inhibition of the cell cycle-regulator mTOR rather than PI3-kinase inhibition. ", "This assumption would be supported by the observation that the mTOR blocker RAD001 produced marked growth inhibition in HMC-1.2 cells expressing KIT D816V, but not in HMC-1.1 cells lacking KIT D816V, which confirmed previous data obtained with the mTOR-blocker rapamycin [@pone.0029925-GabillotCarr1], [@pone.0029925-Kim1]. ", "Moreover, the PI3-kinase blocker LY294002 only produced growth inhibitory effects in HMC-1.2 cells when applied at high concentrations known to block mTOR activity, whereas no effects were seen with wortmannin. ", "All in all, these data suggest that KIT D816V-driven proliferation of neoplastic MC may be particularly sensitive against mTOR-targeting drugs.", "\n\nSince mTOR is a major regulator of cell cycle progression we were also interested to learn whether NVP-BEZ235 would interfere with cell cycle progression in HMC-1 cells and KU812 cells. ", "Indeed, NVP-BEZ235 was found to induce a G1 cell cycle arrest in HMC-1.1, HMC-1.2, and KU812 cells. ", "RAD001 also induced a G1 cell cycle arrest although the effect of RAD001 was less pronounced compared to NVP-BEZ235. ", "Finally, LY294002 also produced a G1 cell cycle arrest in these cells at high concentrations, whereas wortmannin showed no effects. ", "These results were somehow unexpected as RAD001 and LY294002 did not produce growth inhibition in HMC-1.1 cells, and RAD001 also failed to inhibit the proliferation of KU812 cells, whereas NVP-BEZ235 exerted effects on growth in all cell lines. ", "This discrepancy may be explained by the fact that not only mTOR but also other (PI3-kinase-downstream) cell cycle regulators play a role in the proliferation of these cells. ", "Alternatively, HMC-1.1 cells are resistant against RAD001, LY294002, and wortmannin independent of mTOR and PI3-kinase-activity.", "\n\nSeveral cell surface molecules are typically upregulated on BA and MC after cross-linking of IgE receptors [@pone.0029925-Valent4]--[@pone.0029925-deWeck1], [@pone.0029925-Hauswirth2]. ", "In addition, these activation-linked surface antigens are often overexpressed on neoplastic MC when compared to normal cells [@pone.0029925-Valent2], [@pone.0029925-Valent3], [@pone.0029925-Hauswirth2]. ", "We asked whether NVP-BEZ235 would interfere with IgE-mediated expression of CD63 and CD203c on BA and MC. ", "In these experiments, we found that NVP-BEZ235 inhibits the IgE-dependent upregulation of CD203c on BA and IgE-dependent upregulation of CD63 on MC. ", "By contrast, no drug effect on IgE-dependent expression of CD63 on BA or IgE-mediated expression of CD203c on MC was seen. ", "These observations suggest that NVP-BEZ235 may be insufficient to block all relevant pathways in activated BA or MC. ", "Alternatively, expression of CD63 in BA and of CD203c on MC is regulated by PI3-kinase-independent mechanisms. ", "In this regard it is noteworthy, that NVP-BEZ235 did not counteract expression of CD63 or CD203c on HMC-1 cells, and in KU812 cells only a slight effect on CD63 expression was seen.", "\n\nBased on the intriguing effects of NVP-BEZ235 on growth (survival) and activation of BA and MC, one could speculate on clinical applications and possible indications in future trials. ", "Likewise, in advanced SM, patients suffer not only from the aggressive and sometimes devastating infiltration of MC, but also from mediator-related symptoms [@pone.0029925-Peavy1]--[@pone.0029925-Valent2]. ", "For these patients, a drug that would block both MC growth and MC activation would be of interest. ", "Our *in vitro* data and data obtained in a mouse xenotransplant model would be in favor of such a new treatment concept. ", "However, so far no clinical studies using NVP-BEZ235 in allergic patients or patients with mastocytosis have been conducted. ", "In summary, our data show that NVP-BEZ235 inhibits growth and activation of human BA and MC. ", "Further preclinical studies are required to confirm this drug effect and to explore whether the drug is a candidate to be tested in patients with MC disorders or MC/BA activation.", "\n\nMaterials and Methods {#s4}\n=====================\n\nEthics Statement {#s4a}\n----------------\n\nAll studies were approved by the institutional review board of the Medical University of Vienna and conducted in accordance with the declaration of Helsinki. ", "Written informed consent was obtained from patients or mothers (cord blood) in each case.", "\n\nAnimal studies were approved by the ethics committee of the Medical University of Vienna (3544/115-10/08), and carried out in accordance with guidelines for animal care and protection and protocols approved by the Austrian law and the ethics committee of the Medical University of Vienna (GZ 66.009/0322-II/10b/2008).", "\n\nReagents {#s4b}\n--------\n\nNVP-BEZ235 [@pone.0029925-Maira1] and RAD001 (everolimus) were kindly provided by Novartis Pharma AG, Basel, Switzerland. ", "Stock solutions of drugs were prepared by dissolving in dimethylsulfoxide (DMSO) (Merck, Darmstadt, Germany). ", "Histamine release buffer (HRB), anti-IgE antibody E-124.2.8, and a histamine radioimmunoassay (RIA) were purchased from Immunotech (Marseille, France). ", "RPMI 1640 medium, Iscove\\'s modified Dulbecco\\'s medium (IMDM), and fetal calf serum (FCS) were from PAA laboratories (Pasching, Austria), Ca-ionophore A23187 and recombinant C5a from Sigma Aldrich (St. Louis, MO), LY294002 and wortmannin from Calbiochem (San Diego, CA), and L-glutamine from Gibco Life Technologies (Gaithersburg, MD). ", "Recombinant human (rh) interleukin (IL)-3, IL-4, IL-6, and stem cell factor (SCF) were from Novartis Pharma AG. ", "NIP(5)-BSA was purchased from Biosearch Technologies (Novato, CA), a human NIP-specific IgE (clone Jw8.1) from AbD Serotec (Düsseldorf, Germany), collagenase type II from Worthington (Lakewood, NJ), Stem Span serum-free medium (SFM) from Stem Cell Technologies (CellSystems, St Katharinen, Germany), and the CD133 Microbead Kit from Miltenyi Biotec (Bergisch Gladbach, Germany). ", "The FITC-labeled CD63 antibody CLB-gran12 and PE-labeled CD203c antibody 97A6 were purchased from Beckman Coulter (Fullerton, CA), the unlabeled monoclonal antibody (mAb) CLB-gran12 from Sanquin Reagents (Amsterdam, Netherlands), and a PE-labeled and unlabeled CD203c mAb (NP4D6) from Biolegend (San Diego, CA).", "\n\nIsolation and culture of blood BA and MC {#s4c}\n----------------------------------------\n\nPrimary BA were obtained from the peripheral blood of 5 healthy donors and 5 patients allergic to the birch pollen allergen Bet v 1. ", "For surface staining experiments, BA were examined in heparinized whole blood samples. ", "For histamine release experiments, BA were enriched by dextran sedimentation [@pone.0029925-Valent6]. ", "MC-cultures were generated using CD133+ cord blood progenitors as reported [@pone.0029925-Mirkina1]. ", "In brief, CD133+ progenitors were isolated from cord blood mononuclear cells (MNC) using magnetic microbeads and the QuadroMACS magnetic separator (Miltenyi Biotec). ", "The purity of isolated CD133+ cells was \\>97%. ", "Isolated cells (0.5×10^6^/ml) were cultured in 6-well plates (Costar, Cambridge, MA) in SFM with SCF (100 ng/ml), IL-6 (100 ng/ml), and IL-3 (30 ng/ml) for 2 weeks, and thereafter in SCF and IL-6 without IL-3. ", "After 4 weeks, RPMI 1640 medium containing 10% FCS was used instead of SFM. ", "Cytokines were replaced weekly. ", "After 7 weeks, 70--80% of cells were MC as evidenced by Wright-Giemsa staining. ", "Human lung MC were enriched from surgical specimens of 5 patients with bronchiogenic carcinoma as described [@pone.0029925-Butterfield1]. ", "In brief, tissue was placed in Tyrode\\'s buffer, cut into small pieces, and washed extensively in Tyrode\\'s buffer. ", "Then, tissue fragments were incubated in collagenase type II at 37°C for 60 minutes. ", "Isolated cells were examined for viability and percentage of MC by Giemsa staining. ", "Lung MC were kept in culture in RPMI 1640 medium and 10% FCS at 37°C for 2--5 days before used. ", "In 5 patients with SM, bone marrow MNC were isolated using Ficoll.", "\n\nCulture of KU812 cells and HMC-1 cells {#s4d}\n--------------------------------------\n\nThe human BA cell line KU812 was kindly provided by Dr. K. Kishi (Kumamoto University, Kumamoto, Japan). ", "KU812 cells were cultured in RPMI1640 medium with 10% FCS (37°C, 5% CO~2~). ", "The human MC leukemia cell line HMC-1 [@pone.0029925-Valent7] was kindly provided by Dr. J. H. Butterfield (Mayo Clinic, Rochester, MN). ", "Two subclones of HMC-1 were used: HMC-1.1 harboring the *KIT* mutation V560G, and HMC-1.2 harboring *KIT* V560G and *KIT* D816V [@pone.0029925-Gleixner1]. ", "HMC-1 cells were grown in IMDM plus 10% FCS (37°C, 5% CO~2~).", "\n\nMeasurement of ^3^H-thymidine uptake {#s4e}\n------------------------------------\n\nHMC-1 cells, KU812 cells, and primary bone marrow derived cells obtained from 6 patients with SM (indolent SM, n = 5, smoldering SM, n = 1) were incubated in control medium or various concentrations of NVP-BEZ235 (0.001--5 µM) at 37°C for 48 hours. ", "Cell lines were also incubated with RAD001 (0.001--1 µM) for 48 hours. ", "Thereafter, 0.5 µCi ^3^H-thymidine was added (37°C, 16 hours). ", "Cells were harvested on filter membranes (Packard Bioscience, Meriden, CT) in a Filtermate 196 harvester (Packard Bioscience). ", "Filters were air-dried, and the bound radioactivity was counted in a β-counter (Top-Count NXT, Packard Bioscience). ", "All experiments were performed in triplicates.", "\n\nEvaluation of apoptosis by morphology and Tunel assay {#s4f}\n-----------------------------------------------------\n\nThe effects of NVP-BEZ235 and RAD001 on apoptosis in KU812 cells and HMC-1 cells were analyzed by morphologic examination (light microscopy) and a Tunel (in situ [T]{.ul}erminal transferase-mediated d[U]{.ul}TP-fluorescence [N]{.ul}ick [E]{.ul}nd-[L]{.ul}abeling) assay using the 'In situ cell death detection kit-fluorescein' (Roche Diagnostics, Mannheim, Germany) [@pone.0029925-Hadzijusufovic1]. ", "For morphologic examination, cells were incubated with NVP-BEZ235 (0.001--10 µM) and RAD001 (0.001--10 µM), LY294002 (20 µM), or control medium at 37°C for 48 hours. ", "The percentage of apoptotic cells was quantified on Wright-Giemsa-stained cytospin slides. ", "In Tunel assay experiments, cells were incubated with NVP-BEZ235 (1 or 10 µM), RAD001 (1 or 10 µM), or control medium at 37°C for 24 hours. ", "The Tunel assay was performed as reported [@pone.0029925-Hadzijusufovic1]. ", "Cells were analyzed on an Olympus AX-1 fluorescence microscope equipped with 100×/1.35 UPlan-Apo objective lense (Olympus). ", "Figure acquisition was performed using Olympus DP11 camera and Adobe Photoshop CS2 software version 9.0 (Adobe Systems, San Jose, CA). ", "Magnification, ×400.", "\n\nApplication of NVP-BEZ235 in a xenotransplantation model {#s4g}\n--------------------------------------------------------\n\nFemale NMRI-Foxn1^nu^ mice (4--5 week old) were purchased from Charles River Laboratories (Sulzfeld, Germany). ", "Mice were housed in barrier facilities with a 12 hour-light/dark cycles. ", "In each mouse, 3×10^7^ HMC-1.2 cells were inoculated subcutaneously in the right and left flank. ", "Five days after inoculation, mice were divided into two groups, a control group (n = 6 or n = 5) and a treatment group (n = 7 or n = 5). ", "In the treatment group, mice received 40 mg/kg NVP-BEZ235 dissolved in 200 µl N-methyl-2-pyrrolidone (NMP) and polyethylene glycol 300 (PEG300; Sigma-Aldrich) or 5 mg/kg RAD001 dissolved in 200 µl distilled water *per os* (gavaging) daily for up to 22 days. ", "In the control group, mice received NMP and PEG300 alone or sodium chloride (water control). ", "Tumor size was inspected daily and was measured (in mm^3^) by caliper using the formula: a^2^ \\* b/2 (a: length of tumor; b: tumor width). ", "On day 22, mice were sacrificed by euthanization. ", "Tumors were collected and dispersed by collagenase digestion [@pone.0029925-Valent7], [@pone.0029925-Hadzijusufovic1]. ", "In each case, xenotransplant tumor-derived cells were found to exhibit morphologic and phenotypic properties of HMC-1 cells (not shown).", "\n\nBA differentiation assay and MC differentiation assay {#s4h}\n-----------------------------------------------------\n\nCD133+ cord blood progenitor cells were isolated from MNC using magnetic beads as reported [@pone.0029925-Mirkina1]. ", "Isolated progenitors were cultured in control medium or in the presence of either IL-3 (100 ng/ml) (BA differentiation assay) or SCF (100 ng/ml) plus IL-6 (100 ng/ml) (MC differentiation assay) at 37°C for 14 days (BA) or 28 days (MC) as reported [@pone.0029925-Valent8], [@pone.0029925-Valent9] Thereafter, cultures were harvested and examined for total cell counts, percentage of BA or MC by Giemsa-staining, and absolute numbers of BA and MC per well. ", "For further objective quantification of BA- and MC differentiation, equal suspension volumes of day-14-samples (BA) or day-28-samples (MC) were examined for total cellular histamine-content by RIA as reported [@pone.0029925-Valent8], [@pone.0029925-Valent9].", "\n\nStaining with mAb and flow cytometry {#s4i}\n------------------------------------\n\nTo examine drug effects on expression of CD63 and CD203c, flow cytometry was performed. ", "BA were incubated with NVP-BEZ235 (0.001--10 µM), RAD001 (0.001--10 µM), LY294002 (0.01--30 µM), wortmannin (0.0001--1 µM), or control medium for 15 minutes (37°C). ", "Then, BA were washed, incubated with anti-IgE mAb E-124.2.8 (1 µg/ml) at 37°C for 15 minutes, washed, then were subjected to erythrocyte lysis, and then analyzed by multicolor flow cytometry using mAb against CD63 and CD203c as described [@pone.0029925-Hauswirth1], [@pone.0029925-Krauth1], [@pone.0029925-Kneidinger1]. ", "Anti-IgE-induced upregulation of CD63 and CD203c was calculated from mean fluorescence intensities (MFI) obtained with stimulated (MFIstim) and unstimulated (MFIcontrol) cells, and expressed as stimulation index (SI = MFIstim∶MFIcontrol) [@pone.0029925-Hauswirth1], [@pone.0029925-Krauth1], [@pone.0029925-Kneidinger1]. ", "Cultured IgE-loaded MC were incubated with NVP-BEZ235 (0.001--10 µM), RAD001 (0.001--10 µM), or control medium for 40 minutes (37°C). ", "Thereafter, MC were challenged with NIP(5)-BSA (100 ng/ml) in phenolred-free medium plus 0.1% BSA for 90 minutes (37°C). ", "Expression of CD63 and CD203c was analyzed as reported [@pone.0029925-Hauswirth1], [@pone.0029925-Krauth1], [@pone.0029925-Kneidinger1]. ", "KU812 and HMC-1 cells were incubated with NVP-BEZ235 (0.001--10 µM), RAD001 (0.001--10 µM), LY294002 (20 µM), wortmannin (1 µM), or control medium for 24 or 48 hours, before being stained with mAb against CD63 or CD203c. ", "Expression of cell surface antigens was analyzed on a FACSScan (Becton Dickinson Biosciences, San Jose, CA). ", "All staining reactions were controlled by isotype-matched antibodies. ", "For staining of cytoplasmic molecules, KU812 and HMC-1 cells were permeabilized by methanol (−20°C, 15 minutes) and then incubated with mAb against phosphorylated Akt (pAkt, S473) (M89-61), pS6 (N7-548), pSTAT5 (clone 47), or activated caspase 3 (C92-605) (all from Becton Dickinson Biosciences) for 30 minutes. ", "Then, cells were washed and analyzed on a FACSCalibur (Becton Dickinson Biosciences). ", "In a separate set of experiments, blood BA and lung MC were stained with mAb against CD63 and CD203c by two different staining protocols, one protocol for detection of surface expression of CD63 and CD203c (see above), and one for detection of cytoplasmic (intracellular) CD63 and CD203c. ", "For detection of intracellular CD63 and CD203c, intact cells were first incubated with unlabeled mAb against CD63 and CD203c for 15 minutes at 4°C (to block surface antigens), washed, and then permeabilized with methanol. ", "Thereafter, cells were stained with fluorochrome-conjugated antibodies against CD63 and CD203c (30 minutes at RT). ", "Apoptosis was measured in drug-exposed cells by combined AnnexinV/PI staining as reported [@pone.0029925-Gleixner1]. ", "For cell cycle studies, drug-exposed cells were resuspended in 500 µL permeabilization buffer (0.1% Na-acetate and 0.1% Triton X-100). ", "Then 40 µl PI were added, and cell cycle distribution analyzed on a FACSCalibur.", "\n\nWestern blot analysis {#s4j}\n---------------------\n\nPrior to Western blotting, HMC-1 cells and KU812 cells (each 10^6^ cells/ml) were incubated with control medium, NVP-BEZ235 (1 µM) or RAD001 (1 µM) at 37°C for 4 hours. ", "Then, Western blotting was performed as described [@pone.0029925-Gleixner1] using a polyclonal antibody against pAkt (S473) (Santa Cruz, Santa Cruz, CA), a mAb against pAkt (193H12), a polyclonal antibody against Akt (Cell Signaling, Danvers, MA), a mAb against pSTAT5 (clone 47), a mAb against total STAT5 (clone 89), a mAb against pS6 (N7-548) (all from Becton Dickinson Biosciences), and a polyclonal rabbit antibody against β-Actin (Sigma-Aldrich, St. Louis, MO). ", "Additional Western Blot experiments were performed using polyclonal antibodies against pERK (Thr202/Tyr204), total ERK, p4EBP1 (Ser65) and pp70S6K (Thr389). ", "All antibodies were from Cell Signaling. ", "Antibody reactivity was made visible by sheep anti-mouse IgG or donkey anti-rabbit IgG and Lumingen PS-3 detection reagent (GE Healthcare).", "\n\nEvaluation of β-hexosaminidase release from cultured MC {#s4k}\n-------------------------------------------------------\n\nAfter incubation with NIP(5)-BSA-specific IgE (Jw8, 10 µg/ml) and IL-4 (25 ng/ml) overnight, MC were incubated with NVP-BEZ235 (0.001--10 µM), RAD001 (0.001--10 µM), or control medium for 30 minutes (37°C). ", "Then, cells were washed and challenged with NIP(5)-BSA (100 ng/ml) for 90 minutes (37°C). ", "Thereafter, cell-free supernatants were collected and β-hexosaminidase release determined as reported [@pone.0029925-Mirkina1].", "\n\nHistamine release experiments {#s4l}\n-----------------------------\n\nBefore activated, MC were incubated with human IgE (Jw8, 10 µg/ml) and IL-4 (25 ng/ml) overnight (37°C) to induce IgE-receptor expression [@pone.0029925-Mirkina1]. ", "Dextran-enriched blood BA (1×10^6^/ml) and IgE-loaded MC (1×10^5^/ml) were incubated in control medium, NVP-BEZ235 (0.001--10 µM), RAD001 (0.001--10 µM), LY294002 (0.01--30 µM), or wortmannin (0.0001--1 µM), at 37°C for 30 minutes. ", "Thereafter, cells were exposed to anti-IgE antibody E-124.2.8 (BA: 1 µg/ml; MC: 10 µg/ml) in HRB or control buffer (HRB) at 37°C for 30 minutes. ", "BA from allergic patients were incubated with recombinant Bet v 1 (0.1 µg/ml) (Biomay Vienna, Austria) [@pone.0029925-Breiteneder1] or control buffer (HRB) for 30 minutes. ", "In select experiments, BA were challenged with Ca-ionophore A23187 (0.001--10 µg/ml) or C5a (0.01--100 nM) as reported [@pone.0029925-Freder1]. ", "In another set of experiments, BA or MC were incubated with control medium or NVP-BEZ235 (10 µM) for 30 minutes, and then were exposed to various concentrations of anti-IgE (0.001--10 µg/ml) for 30 minutes. ", "After incubation, cells were centrifuged at 4°C. ", "Cell-free supernatants and suspensions were then recovered, and samples (supernatants and cell lysates) examined for histamine content by RIA. ", "Histamine release was calculated as percentage of released histamine compared to total (cellular+extracellular) histamine. ", "All experiments were performed in triplicates.", "\n\nStatistical analysis {#s4m}\n--------------------\n\nTo determine the level of significance in drug inhibition experiments, standard statistical tests including the Student\\'s t test, were applied. ", "A p value of less than 0.05 was considered to indicate statistical significance.", "\n\nSupporting Information {#s5}\n======================\n\n###### \n\n**Effects of LY294002 and wortmannin on proliferation of HMC-1 cells and KU812 cells.** ", "HMC-1.1 cells (left panels), HMC-1.2 cells (middle panels), and KU812 cells (right panels) were cultured in control medium (Co), control medium with DMSO control (DMSO Co), or with increasing concentrations of LY294002 (0.1 µM--20 µM) or wortmannin (0.001--1 µM) at 37°C for 48 hours. ", "Thereafter, ^3^H-thymidine uptake was measured. ", "Results show the percentage of ^3^H-thymidine uptake compared to control (Co) and represent the mean±S.D. of three independent experiments in each cell line. ", "Asterisk (\\*): p\\<0.05.", "\n\n(TIF)\n\n###### \n\nClick here for additional data file.", "\n\n###### \n\n**Effects of NVP-BEZ235, RAD001, LY294002 and wortmannin on cell cycle analysis of HMC-1 cells and KU812 cells.** ", "Cell cycle distribution in HMC-1.1 cells (upper panel), HMC-1.2 cells (middle panel) and KU812 cells (lower panel) after exposure to control medium (Co) or various concentrations of NVP-BEZ235 and RAD001 (left panels) as well as LY294002 and wortmannin (right panels) as indicated, at 37°C for 48 hours. ", "Cell cycle distribution was analyzed by flow cytometry as described in the text.", "\n\n(TIF)\n\n###### \n\nClick here for additional data file.", "\n\n###### \n\n**Effects of NVP-BEZ235 and RAD001 on expression of pERK in HMC-1 cells and KU812 cell.** ", "KU812 cells (left panel), HMC-1.2 cells (middle panel), and HMC-1.1 cells (right panel) were cultured in the absence or presence of NVP-BEZ235 (1 µM) and RAD001 (1 µM) at 37°C for 4 hours. ", "Thereafter, cells were lysed and Western blotting was performed using antibodies against pERK and total ERK as described in the text.", "\n\n(TIF)\n\n###### \n\nClick here for additional data file.", "\n\n###### \n\n**Effects of LY294002 and wortmannin on IgE-mediated histamine release in human BA.** ", "BA obtained from healthy donors (n = 3) were preincubated with control medium (Medium Co) or various concentrations of LY294002 (left panel) and wortmannin (right panel) as indicated at 37°C for 30 minutes. ", "Afterwards, cells were exposed to anti-IgE (1 µg/ml) at 37°C for 30 minutes. ", "After centrifugation, histamine concentrations were determined in supernatants and cell-lysates by radioimmunoassay. ", "Histamine release is expressed as percentage of total histamine. ", "Results represent the mean±S.D. from three donors. ", "Asterisk (\\*) indicates p\\<0.05.", "\n\n(TIF)\n\n###### \n\nClick here for additional data file.", "\n\n###### \n\n**Effects of LY294002 and wortmannin on expression of activation-linked cell surface antigens on human BA and on expression of CD63 on KU812 cells.** (", "A): BA in whole blood samples were preincubated in control medium (Medium Co) or in medium containing various concentrations of LY294002 (0.01--30 µM; upper panels) or wortmannin (0.0001--1 µM; lower panels) at 37°C for 15 minutes. ", "Then, cells were exposed to anti-IgE antibody E-124.2.8 (1 µg/ml) for another 15 minutes (37°C). ", "Thereafter, cells were stained with monoclonal antibodies directed against CD63 (left panels) or CD203c (right panels), and analyzed by multicolor flow cytometry as described in the text. ", "Basophils were defined as CD203c-positive cells in all samples. ", "Anti-IgE-induced upregulation of CD antigens was calculated from mean fluorescence intensities (MFIs) obtained with stimulated (MFIstim) and unstimulated (MFIcontrol) cells and was expressed as stimulation index (SI = MFIstim∶MFIcontrol). ", "Results show SI values and represent the mean±S.D. from three donors. ", "Asterisk (\\*) indicates p\\<0.05 compared to Medium control. (", "B): KU812 cells were cultured in control medium (Co), LY294002 (20 µM), wortmannin (1 µM), or NVP-BEZ235 (0.001--10 µM) at 37°C for 24 hours (black bars) or 48 hours (open bars). ", "After incubation, cells were stained with anti-CD63 antibody and analyzed by flow cytometry. ", "Results show staining index (MFI corrected for the isotype control) and are expressed as mean±S.D of three independent experiments. ", "Asterisk (\\*) indicates p\\<0.05.", "\n\n(TIF)\n\n###### \n\nClick here for additional data file.", "\n\nWe would like to thank Miriam Klauser for skillful technical assistance.", "\n\n**Competing Interests:**The authors have read the journal\\'s policy and have the following conflicts: Dr. Valent received a research grant from Novartis. ", "The authors declare no other conflict of interest. ", "This does not alter the authors\\' adherence to all the PLoS ONE policies on sharing data and materials.", "\n\n**Funding:**This study was supported by grants P21173-B13 and by SFB F46 of the Austrian Science Fund (FWF) and by the Christian Doppler Research Association, Vienna, Austria. ", "The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.", "\n\n[^1]: Conceived and designed the experiments: KB PV. ", "Performed the experiments: KB HH IM EH BP SS VG. ", "Analyzed the data: KB PV. ", "Contributed reagents/materials/analysis tools: GH MM KH WK VW KM RV TF. ", "Wrote the paper: KB PV. ", "Contributed logistic and budget support: PV.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0033871440682560205, 0.0008795768953859806, 0.0007764557958580554, 0.0006777439848519862, 0.0008768138359300792, 0.008499018847942352, 0.0007074383902363479, 0.0008079239050857723, 0.000778100045863539, 0.0007888151449151337, 0.0034104734659194946, 0.0006181658245623112, 0.0006870951037853956, 0.0006067661452107131, 0.0011935607763007283, 0.0007230599294416606, 0.0005857233772985637, 0.0006416631513275206, 0.0006086667999625206, 0.0007716465042904019, 0.000747035606764257, 0.000768860976677388, 0.0005805519176647067, 0.0005894427304156125, 0.000616182922385633, 0.0006477793795056641, 0.0006014826940372586, 0.0019055769080296159, 0.0006683044484816492, 0.0006327092414721847, 0.0005578543059527874, 0.0013482986250892282, 0.0006097255391068757, 0.0006623583030886948, 0.0005670989048667252, 0.0015791895566508174, 0.012143462896347046, 0.0009879152057692409, 0.0019350170623511076, 0.0009879152057692409, 0.00446286192163825, 0.0010900705819949508, 0.0010900705819949508, 0.0013335637049749494, 0.0010900705819949508, 0.0010900705819949508, 0.0050378222949802876, 0.0010900705819949508, 0.0010900705819949508, 0.0006092431140132248, 0.00075757154263556, 0.0011460192035883665, 0.024285266175866127, 0.0006326543516479433, 0.0007006947416812181, 0.0005897844093851745, 0.0005978921544738114, 0.0006651185685768723, 0.0005869382293894887, 0.0005747500108554959, 0.0007037886534817517, 0.0006337599479593337, 0.000584252760745585, 0.0006601322093047202, 0.0006321335677057505, 0.0006076654535718262, 0.0006414949893951416, 0.0005982660804875195, 0.0005922635900788009, 0.0006333541823551059, 0.0006349911564029753, 0.000701541022863239, 0.0019055769080296159, 0.0006652887677773833, 0.0006619863561354578, 0.0005764859379269183, 0.0010960130020976067, 0.0006430289358831942, 0.0005913368659093976, 0.0005943901487626135, 0.0006649268325418234, 0.0005764859379269183, 0.0010960130020976067, 0.0006473560351878405, 0.0009372212807647884, 0.0008465861901640892, 0.000612087722402066, 0.0006902904715389013, 0.0007874138536863029, 0.0019055769080296159, 0.0007726181065663695, 0.0006161362980492413, 0.0006917751743458211, 0.0005720777553506196, 0.001115876017138362, 0.0006821520510129631, 0.0006286321440711617, 0.0006907391943968832, 0.0006109013920649886, 0.0019055769080296159, 0.0006579480250366032, 0.0005974395899102092, 0.000838578911498189, 0.000621151237282902, 0.0005708524840883911, 0.0018521352903917432, 0.000649604422505945, 0.0006214248132891953, 0.0006188564002513885, 0.0007209073519334197, 0.0005804517422802746, 0.0006895582773722708, 0.0007021584315225482, 0.0006400232086889446, 0.0006820226553827524, 0.0009557314915582538, 0.0007965307449921966, 0.0006241486989893019, 0.0019055769080296159, 0.0007029189146123827, 0.0006784144788980484, 0.000647681881673634, 0.0005477204103954136, 0.0006150561384856701, 0.0007307612686417997, 0.0007115520420484245, 0.0006700736121274531, 0.0007100515649653971, 0.0009495069971308112, 0.0006241704686544836, 0.000618844642303884, 0.0007939772331155837, 0.0006526687648147345, 0.0019055769080296159, 0.0006891878438182175, 0.00082292256411165, 0.0006367098540067673, 0.0005633503897115588, 0.0013482986250892282, 0.000696228351444006, 0.0025473732966929674, 0.0007582753896713257, 0.0007860384648665786, 0.0006139424513094127, 0.0013482986250892282, 0.0006251434679143131, 0.0006885916809551418, 0.0006394046940840781, 0.000619597383774817, 0.0010766093619167805, 0.0006767784361727536, 0.0008519437978975475, 0.000614320335444063, 0.0007610758766531944, 0.000743556534871459, 0.0007049559499137104, 0.0006193352746777236, 0.0019055769080296159, 0.0007481726934202015, 0.0008708186214789748, 0.0007660040282644331, 0.0008469913154840469, 0.0005706786760129035, 0.0010960130020976067, 0.0005794788594357669, 0.0006437101401388645, 0.0007458551554009318, 0.0007860384648665786, 0.0010036381427198648, 0.0006264965049922466, 0.0007266596076078713, 0.0006547390366904438, 0.0006761610857211053, 0.0005778972990810871, 0.0006394677329808474, 0.0006692155729979277, 0.000639898469671607, 0.0006473708199337125, 0.0007359433802776039, 0.0007747107883915305, 0.0007050567655824125, 0.0019055769080296159, 0.0007010714616626501, 0.0010509593412280083, 0.0006119856843724847, 0.0007199328392744064, 0.0008667110814712942, 0.0005722424248233438, 0.0010960130020976067, 0.000608430418651551, 0.0007384847849607468, 0.0006050956435501575, 0.0006481999298557639, 0.0013482986250892282, 0.0006094948621466756, 0.0007428790559060872, 0.000725718098692596, 0.0006732145557180047, 0.0006660503568127751, 0.0006398402620106936, 0.0008746251696720719, 0.0006672159070149064, 0.0005435538478195667, 0.0007474725134670734, 0.0005451454198919237, 0.0008846038253977895, 0.0006996298325248063, 0.0006530527025461197, 0.0005805992404930294, 0.0009984447387978435, 0.0007965530385263264, 0.0006687064887955785, 0.000741895753890276, 0.0005960981361567974, 0.0007162371766753495, 0.0006202328368090093, 0.0007882132777012885, 0.0005548869958147407, 0.0006637584301643074, 0.0006251715240068734, 0.000633598305284977, 0.0006256766500882804, 0.0005814265459775925, 0.0005851812311448157, 0.0005892891203984618, 0.00056521559599787, 0.0006984489737078547, 0.000609573267865926, 0.0006943269399926066, 0.0007817380828782916, 0.0006309132440946996, 0.0005636640125885606, 0.0006389618501998484, 0.0006108871893957257, 0.0005988677148707211, 0.0006701004458591342, 0.0005967381875962019, 0.000658037606626749, 0.0008442525286227465, 0.0007054603775031865, 0.0006033024401403964, 0.0007662493153475225, 0.0008538739639334381, 0.0007318735588341951, 0.0006639115163125098, 0.0006652032025158405, 0.0008117666002362967, 0.0006477019633166492, 0.0008106812019832432, 0.000680512806866318, 0.0008191023371182382, 0.0008330818964168429, 0.0006703208200633526, 0.0006453564274124801, 0.000642848142888397, 0.0005224847118370235, 0.001093005994334817, 0.0006174839218147099, 0.0005859003285877407, 0.009395860135555267, 0.0006312774494290352, 0.0005929811741225421, 0.0006334646022878587, 0.0012614177539944649, 0.0005437385989353061, 0.0006622971268370748, 0.000574004661757499, 0.0007006243686191738, 0.0007001234334893525, 0.0007982269744388759, 0.0006055996054783463, 0.0006665514665655792, 0.0014337110333144665, 0.0007720852154307067, 0.0006315055070444942, 0.0006659837672486901, 0.0007235899684019387, 0.0007020821212790906, 0.0006200262578204274, 0.0006741638062521815, 0.0009320350363850594, 0.0006863856688141823, 0.0008636329439468682, 0.0016462180064991117, 0.0006111544789746404, 0.0005808139685541391, 0.0006859573186375201, 0.0006872247322462499, 0.000628011126536876, 0.000638439494650811, 0.0005652958643622696, 0.000834817357826978, 0.000659979647025466, 0.0006697250646539032, 0.0006383451982401311, 0.0005775889148935676, 0.0006104893400333822, 0.0006252331659197807, 0.0006075727287679911, 0.0007600279059261084, 0.0007002715719863772, 0.0006487156497314572, 0.0006088791415095329, 0.000870579679030925, 0.0005997307016514242, 0.0005834669573232532, 0.0007297010743059218, 0.0007258781115524471, 0.0006100208265706897, 0.0006167801911942661, 0.001076902262866497, 0.0007051024585962296, 0.0005893323686905205, 0.000620971608441323, 0.0024072667583823204, 0.0006758138770237565, 0.0006585819646716118, 0.0009898414136841893, 0.0006483450997620821, 0.0005934663349762559, 0.0006994334980845451, 0.0007142859394662082, 0.005564246792346239, 0.0009709547739475965, 0.0006996721494942904, 0.0008200329029932618, 0.0007321868324652314, 0.0009735502535477281, 0.0005783254164271057, 0.0006003354792483151, 0.0006845890311524272, 0.0007152488105930388, 0.000696061528287828, 0.0008659426239319146, 0.0006807554746046662, 0.000611520663369447, 0.0006584411021322012, 0.000662950100377202, 0.0007128531578928232, 0.0008268321398645639, 0.0010593958431854844, 0.0008474127389490604, 0.008147774264216423, 0.0006496935966424644, 0.0007496150210499763, 0.000591763062402606, 0.000718930852599442, 0.0007932148873806, 0.0007913546869531274, 0.0006695789052173495, 0.0005916015361435711, 0.0007971518207341433, 0.000696913106366992, 0.0006543909548781812, 0.0006765604484826326, 0.0006075727287679911, 0.0006150862900540233, 0.0005863010883331299, 0.0007633843342773616, 0.000663578393869102, 0.0006327092414721847, 0.0005578543059527874, 0.0013482986250892282, 0.0007260722341015935, 0.0007961682858876884, 0.0005873260088264942, 0.0005484729772433639, 0.0007260722341015935, 0.0033611259423196316, 0.0006384021253325045, 0.003672543680295348, 0.0007260722341015935, 0.0014245082857087255, 0.0005662749754264951, 0.0012017275439575315, 0.0009326009312644601, 0.0008469913154840469, 0.0005662806215696037, 0.0010960130020976067, 0.0007260722341015935, 0.0009557623998261988, 0.0007111798040568829, 0.0010509593412280083, 0.0005804708343930542, 0.0008958055404946208, 0.0008078418904915452, 0.0005534128285944462, 0.0006994231371209025, 0.0006605528760701418, 0.0007402118062600493, 0.0005391128943301737, 0.0010960130020976067, 0.0007260722341015935, 0.0005325043457560241, 0.0005720711778849363, 0.0006216946640051901, 0.0006994634750299156, 0.0006111267721280456, 0.0006049359799362719, 0.0005846780841238797, 0.0052781784906983376, 0.0005895683425478637, 0.0009361820411868393, 0.000591041287407279, 0.0006252871244214475, 0.001995444530621171 ]
0.000984
406
[ "Q:\n\nXNA value of Apply3D positions\n\nI'm currently working on 3d positional audio in my 3d XNA game (using SoundEffectInstance), however I'm having troubles finding the correct values of the position of the emitter and listers.", "\nI started out setting the position of my listener to the camera position(it's a first person game), and the position of the various emitters to the position of the object that was emitting the sound. ", "Doing this muted the sound completely, compared to before I used the Apply3D method.", "\nI did some experimenting with the values, and figured after I made the values of the positions much much smaller, I started hearing the sound. ", "My map size has values from 0 to 5000 in the x/z plane (only moving between 0 and ~500 on y axis), so the distance between the listener and emitter will generally be high (when comparing to the values I needed to hear anything at all which was between 0 and 1). ", "\nIs there any way to control what \"close\" and \"far away\" is for the soundEffectInstance? ", "Or am I supposed to normalize the distance values? ", "I read trough several guides on 3D sound, but I have not seen anything related to normalizing or control of the distance values. ", "\n\nA:\n\nAfter some more testing, I found that simply dividing the position values with a factor (arround 500 seems right for me) provides a good result. ", "I dont know if this is the way It's supposed to be done, but it seems to be working fine.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.000578532402869314, 0.0006123237544670701, 0.0006053861579857767, 0.0005344681558199227, 0.0006021207664161921, 0.0006772500346414745, 0.0007046261453069746, 0.0005389954894781113, 0.0005447739968076348, 0.0006975133437663317, 0.001995444530621171 ]
0.000736
11
[ "SeaDream Cruise Line\n\nSeaDream Yacht Club is an innovative, new yachting company that operates the twin, ultra-luxury mega yachts SeaDream I and SeaDream II. ", "When they were originally introduced they soon became the prototypes of the casual and intimate yachting experience. ", "SeaDream Yacht Club has built upon this legacy and today the two sleek and rakish SeaDream yachts are highly acclaimed by discerning travelers seeking a unique seagoing experience and by travel industry observers everywhere. ", "SeaDream Yacht Club was founded in September of 2001 by Norwegian entrepreneur Atle Brynestad who founded Seabourn Cruise Line and Larry Pimentel, who was President of Seabourn under Brynestad and later President and CEO of the merged companies Cunard-Seabourn. ", "Pimentel is Chairman and Chief Executive Officer of SeaDream and a co-owner. ", "As Sea Dream's Chairman says \"We are not a cruise line. ", "We are a yacht company and we provide a yachting experience.\" ", "Yachting features an open and unstructured ambience that provides guests the ability to fulfill their own dreams – call them \"seadreams\" if you will – at their own pace and in their own style. ", "We like to express this as \"No clocks, no crowds, no lines, no stress.\" ", "The key word for the SeaDream yachting experience is \"unstructured. ", "It's all about personal choice. ", "Think of it as a free form holiday in which guests fall into a \"seadream\" and believe that they are aboard their own yacht. ", "That's why we say SeaDream is a yacht company; not a cruise line.", "\n\nSeaDream's Fleetclick on a ship to see reviews...\n\nRecent SeaDream Reviews\n\nThis was my first SeaDream cruise and sadly, my last. ", "Many problems with ship, especially the staterooms. ", "The lack of balcony or windows that open, being the deal breaker for us. ", "The food and... read more\n\nRevamped Seabourn/Cunard Sea Goddess 2.", "\nCompany publicity cites cruise experience improved. ", "Sailed many times on Goddess\nand you are assured this is truly inferior. ", "The ships have been nicely... read more\n\n46 users found this review helpful.", "\n\nAsk questions and get advice from other cruisers on our popular discussion board," ]
{ "pile_set_name": "Pile-CC" }
[ 0.000878751277923584, 0.0005667544319294393, 0.0006515826680697501, 0.00068286107853055, 0.0008153913076967001, 0.0008009283919818699, 0.0005183666944503784, 0.0009804387809708714, 0.000680198660120368, 0.0007356029818765819, 0.000783233146648854, 0.0010366322239860892, 0.0009483714238740504, 0.0008541505667380989, 0.0007872959831729531, 0.000899096776265651, 0.0007627799641340971, 0.000568406016100198, 0.0015446101315319538, 0.0005943309515714645, 0.0006291631725616753 ]
0.000796
21
[ "Introduction {#s1}\n============\n\nWhether by microbial mutation, movement across borders, or man-made biological release, a new health threat is inevitable, unpredictable and potentially devastating. ", "For the first time, the world now has a clear picture of how prepared countries are for this potentially catastrophic event. ", "When the international evaluation team left Haiti in July 2019, one hundred countries had completed a Joint External Evaluation (JEE) of health emergency readiness. ", "The JEE is a voluntary, externally validated assessment of 19 technical areas required to prevent, detect and respond to health emergencies. ", "This milestone, in addition to the ongoing uncontrolled Ebola epidemic in the Democratic Republic of Congo, makes this an opportune time to take stock of both the status of the world's preparedness and of what needs to be done to make the world safer.", "\n\nWhen the JEE process began in 2016, many doubted that countries would be willing to openly share information, or that the evaluations would be consistent. ", "Fortunately, these concerns were unfounded: countries---including nearly every country in Africa---were eager to participate and openly shared detailed information on their strengths and weaknesses. ", "International teams, using standard measures, created a consistent rating system.[@R1] The results are in. ", "JEEs have documented that, despite the certainty that the world will face another epidemic challenge at least as great as recent outbreaks of severe acute respiratory syndrome, H1N1 influenza, Middle East respiratory syndrome, Ebola and Zika, most countries remain woefully underprepared to manage large-scale epidemic disease threats.", "\n\nThe first 100 JEEs lead to three overarching conclusions. ", "First, no country is fully prepared to manage disease epidemics ([figure 1](#F1){ref-type=\"fig\"}).[@R2] Second, the number of preparedness gaps, and the resulting to-do list of actions to take to fill them, is overwhelming: more than 7000 priority tasks await action. ", "Third, JEEs have diagnosed preparedness gaps well, but few of these gaps have been filled. ", "To make the world safer, global institutions, partner countries and organisations, and countries themselves must follow the assessments with urgent action to step up readiness to prevent, detect and respond to disease outbreaks by addressing financing, prioritisation and management.", "\n\n![", "Average Joint External Evaluation (JEE) scores by country. ", "Map of JEE average scores (on a scale from 1--5) among WHO Member States that completed and published the JEE through 23 August 2019.](bmjgh-2019-001885f01){#F1}\n\nFinancing {#s2}\n=========\n\nDisease outbreaks are both lethal and costly. ", "During 1997--2009, economic losses from six major outbreaks averaged \\$6.7 billion per year, and the cost of the 2014--2016 Ebola epidemic alone is estimated at \\$53 billion.[@R3] Preparedness can prevent many outbreak-related costs, with estimated incremental worldwide expenditure of \\$4.5 billion per year needed to upgrade public health systems in low and middle-income countries, strengthen global institutions' abilities to prevent and respond to emergencies, and invest in research and development of new vaccines, diagnostics and countermeasures for epidemic and pandemic-prone diseases.[@R4]\n\nUnfortunately, preparedness, although more effective and less costly than response,[@R5] rarely ranks high on political agendas. ", "Competing priorities for finite national budgets, along with the invisible outcome of successful preparedness, have resulted in little funding, despite an estimated 25%--88% annual return on investment.[@R6] Vulnerable lower income countries have bigger gaps and greater need for external financing. ", "Of the 24 least-prepared countries,[@R2] 20 (83%) are sufficiently low income to be eligible for International Development Association (IDA18) from the World Bank.[@R7] In these countries, there are limited resources and competing demands, with the result that public health is often a low priority.[@R8] The World Bank has recently dedicated additional support for health security in these settings through specific IDA projects such as the Regional Disease Surveillance Systems Enhancement project.[@R8] Regional development banks can develop similar credit or grant programmes to build public health capacity in countries and protect regions from the economic shocks of large-scale outbreaks, as the Asian Development Bank has done.[@R9]\n\nPrioritisation {#s3}\n==============\n\nStepping up preparedness is difficult, and requires that many incremental activities be done to achieve meaningful change. ", "This is nearly impossible without prioritisation, and countries need coherent guidance and practical tools to identify where to begin. ", "To reduce epidemic risk, countries must ensure prioritisation of core capacities of laboratory, surveillance, workforce and emergency response operations, as well as critical enabling areas including emergency preparedness, risk communications, and national legislation, policy and financing. ", "Countries can use information collected from JEEs, annual self-evaluations of preparedness, risk assessments and evaluations of real and simulated events to identify specific vulnerabilities and urgent actions to take next. ", "Recently, the WHO and partners developed a library of key sequential activities necessary for countries to move from one preparedness level to the next.[@R10] By combining practical technical guidance with improved prioritisation, countries can move more rapidly from assessment to improvement.", "\n\nManagement {#s4}\n==========\n\nPreparedness activities are implemented by the government, often supported by donors, bilateral and non-governmental organisations. ", "Donors and governments often prefer tangible and highly visible support, such as building Emergency Operations Centers, without means to support ongoing operational costs and human resource requirements. ", "By focusing on specific key activities informed by preparedness assessments, partners can help build the basic systems necessary to find, stop and prevent disease outbreaks. ", "Unless partners also support management, human resources and strengthening of administrative systems, many countries are unlikely to efficiently and effectively implement plans. ", "Strengthening management, improving technical expertise and advocating for increased long-term domestic financing should be a part of every engagement. ", "Leadership and management skills are essential to planning and implementation, but their development is often eclipsed by a focus on more 'technical' skills. ", "Management within health systems is particularly important in low-income settings, where efficient use of limited resources is critical to accomplish health goals.[@R11] Those charged with leading preparedness activities need effective tools and skills to plan, implement and report on complex multisector National Action Plans for Health Security (NAPHS) across all 19 technical areas. ", "On average, it has taken 420 days for countries to conduct a JEE and then release a finalised NAPHS, which is not yet linked to resource mobilisation. ", "Cumbersome and lengthy planning processes not effectively linked to resource mobilisation have hindered implementation of gap-filling activities.", "\n\nTo develop expertise in preparedness, the routine evaluation of detection and response performance in real or simulated events should be common practice. ", "Use of after-action reviews,[@R14] and, where necessary, robust simulation exercises, as well as monitoring the timeliness of outbreak detection, response and control[@R15] enables countries to strengthen systems for an unusual or larger event. ", "These reviews can also help identify bottlenecks to effective response, such as inadequate community engagement and geographic or demographic groups that distrust government action which may require concerted, long-term efforts to address.", "\n\nAt the onset of the West Africa Ebola epidemic in 2014, most countries did not have Public Health Emergency Operations Centers (PHEOC). ", "Since then, more than 20 such centres have been established in Africa, with substantial support from regional and international partners. ", "Unfortunately, many of these structures are not fully functional and lack key components, including information management systems and full-time, trained staff. ", "Many PHEOCs are used primarily as spaces to conduct large meetings, with a high threshold for activation leading to underutilisation. ", "Emergency response capacity, including emergency operations centres, will be most effective if used regularly for a broad spectrum of events, ranging from everyday 'watch' activities including disease surveillance, resource management and functional exercising, to response, including incident management and coordination of response to outbreaks and other health hazards.", "\n\nConclusion {#s5}\n==========\n\nHealth cannot be protected by Ministries of Health alone.[@R16] Many sectors need to be involved in order to increase and sustain investment,[@R17] build long-term capacity and implement policies affecting health in the food, security and animal sectors. ", "In many countries, the JEE was the first opportunity for these sectors to work together. ", "This group should continue to collaborate in order to prioritise which gaps to fill first, begin implementation, increase domestic financing and monitor progress. ", "High-level support (eg, from presidential or prime minister offices) is essential for countries to take action. ", "Engagement by journalists and civil society can convey that increased health security is essential.[@R18] This support can help counter the pattern of a temporary surge of activity followed by waning interest, as typically seen after a major outbreak.", "\n\nFor the first time in history, the world has an in-depth understanding of how prepared most countries are to deal with epidemic diseases and of what must be done to improve preparedness. ", "To save lives, funded, prioritised, well-planned actions must be implemented at scale as soon as possible, supported by a network of partners working together to support countries to step up their capacities to prevent, detect and respond to public health threats and make the world safer.", "\n\n**Handling editor:** Seye Abimbola\n\n**Contributors:** All authors of this paper made substantial contributions to the conception or design of the work, or the acquisition, analysis, or interpretation of data for the work; drafted the work or revised it critically for important intellectual content; made final approval of the version to be published; and agree to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.", "\n\n**Funding:** The authors have not declared a specific grant for this research from any funding agency in the public, commercial or not-for-profit sectors.", "\n\n**Competing interests:** None declared.", "\n\n**Patient consent for publication:** Not required.", "\n\n**Provenance and peer review:** Not commissioned; externally peer reviewed.", "\n\n**Data availability statement:** Data are available in a public, open access repository at [https://preventepidemics.org](https://preventepidemics.org/)\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.001025158679112792, 0.0005987336044199765, 0.0005307917599566281, 0.0006425318424589932, 0.0006312055047601461, 0.0004927031695842743, 0.0005398407229222357, 0.0005568123306147754, 0.0008465019636787474, 0.0009499345324002206, 0.0006237089401111007, 0.0006368606118485332, 0.0005527306930162013, 0.0019055769080296159, 0.0005705840303562582, 0.0008028658339753747, 0.0006744071142747998, 0.000555959006305784, 0.0006150901317596436, 0.0005439874366857111, 0.0005806562257930636, 0.0005934680229984224, 0.0005210837116464972, 0.0006284518167376518, 0.0005464256391860545, 0.0005658147274516523, 0.0005314237787388265, 0.000539174594450742, 0.000574110250454396, 0.0005750957643613219, 0.0006061681197024882, 0.0013380119344219565, 0.0005420800880528986, 0.0005466502043418586, 0.0006080110324546695, 0.000557281426154077, 0.0005286791129037738, 0.0006261019734665751, 0.0006327846203930676, 0.0005537681863643229, 0.00063271977705881, 0.0005433523328974843, 0.0005343377706594765, 0.0005261459737084806, 0.0005226212088018656, 0.0006803416181355715, 0.0006876325933262706, 0.0005608238279819489, 0.0005850063753314316, 0.000624893291387707, 0.0006080513121560216, 0.0005964479059912264, 0.000565562688279897 ]
0.000645
53
[ "My goal here is to educate readers about the state of US economy, our markets and our little slice of heaven here in the North Country. ", "Maybe, just maybe, I'll even entertain you a bit.", "\n\nWednesday, October 21, 2009\n\nAmerica's Economic Life Cycle\n\nEvery second grader can tell you what a life cycle looks like. ", "Well, there's a pretty good analysis of economic life cycles that goes something like this....\n\nCourtesy of 18th century Scottish historian Alexander Fraser Tytler:\n\n\"The average life span of the world's greatest civilizations has been 200 years\" progressing from \"bondage (British Rule) to spiritual faith (18th Century)... to great courage (Boston 1775)... to liberty (Viva La Revolucion) ... to abundance (early 20th century) ... to selfishness (1980s-2000)... to complacency (2003-2008)... to apathy (today) ... to dependence (???) ", "and ... back into bondage!\"", "\n\nMy only disagreement with Mr. Tytler would be that I don't foresee the US falling back into bondage, but I suppose you could argue that the massive amount of debt our government owes is a form of bondage. ", "We'll see how this plays out, but history isn't on our side.", "\n\n***********************************************************************I haven't touched on oil in awhile, but it's going to be an issue soon, if the current trends continue. ", "Oil has soared from $30 to $80 in six months. ", "Regular unleaded is likely to cross $3 again locally before Thanksgiving if the current trends continue. ", "It's not a big move from $2.75 to $3.00 but psychologically, $3.09/gallon will be a tougher pill to swallow heading into the holidays.", "\n\n4 comments:\n\nThe Hermit\nsaid...\n\nBondage, he he. ", "Better learn Mandrin Chinese. ", "They hold massive US treasury holdings(our debt)They tried to buy some US ports, but were premature in their timing.", "They are buying the US, thank you WalMart. ", "Next inline is Islamic terrorists in the US, demanding their rights. ", "don't forget the illegal aliens and their rights.", "We had our 200 years, then some.", "The giant sleeps.", "\n\nDonovan said: Who cares about debt? ", "I don't. ", "I say let's keep running it up and then go bankrupt. ", "What is so bad about the endgame.. Who is owed the money? ", "The banks, GREAT F@$^^ EM. ", "Can't wait for the whole thing to implode and the banks die. ", "Thanks Jesus.", "\n\nLinks\n\nBlogCatalog\n\nSubscribe To\n\nAbout Me\n\nI grew up in La Fargeville before attending college in Manhattan and ultimately working on Wall Street for about 10 yrs. ", "I left NYC/NJ in 2003 and relocated my family to the beautiful waterfront of Clayton, NY. ", "I spend my days caring for my 2 daughters and dabbling in the markets." ]
{ "pile_set_name": "Pile-CC" }
[ 0.000581302447244525, 0.0006157276802696288, 0.0026173386722803116, 0.000843676330987364, 0.20724327862262726, 0.0010986343258991838, 0.0007757687708362937, 0.12757788598537445, 0.0006334060453809798, 0.0012807246530428529, 0.0009102736948989332, 0.014510894194245338, 0.0013776755658909678, 0.0006531361141242087, 0.0014172615483403206, 0.055915821343660355, 0.004203381482511759, 0.0008020756067708135, 0.021590741351246834, 0.005817021708935499, 0.0010433766292408109, 0.0356990322470665, 0.0010944000678136945, 0.05429094284772873, 0.4405635595321655, 0.001511131995357573, 0.0009474235703237355, 0.0006563934730365872, 0.003962202463299036 ]
0.034146
29
[ "An Evening With Jedidiah Kaine\n\nThursday, February 15, 2018 - 7:00pm\n\nThe Field is proud to present an acoustic concert with Jedidiah Kaine, a unique singer/songwriter and local Peekskillian. ", "J. Kaine has traveled the United States and beyond, \"absorbing the influence of the best of what the 20th century has to offer\", and is fresh off a recent tour down under (Australia, New Zealand and S.E. Asia.)", "\n\nUsing his his world travels and life experiences, J. Kaine uses a familiar yet unique sound to present his ideas on philosophical quandaries, mental health and the state of the world. ", "He describes his influences as Stevie Wonder, Rodrigo Amarante, Pink Floyd and Billie Holiday. ", "Currently based in the Hudson Valley, Kaine is happy to be back playing on his home turf, re-energizing for the journey ahead." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006151499110274017, 0.0005600313888862729, 0.0007570004090666771, 0.0006515842396765947, 0.0006432915688492358 ]
0.000645
5
[ "Hang on, we are updating this project for you. ", "This page will automatically refresh in 5 seconds." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0010243591386824846, 0.000612037256360054 ]
0.000818
2
[ "Public consultation on HPV vaccines guidance opens\n\nPublic consultation-1 Apr 2019\n\nThis guidance covers the following areas in relation to HPV vaccination: efficacy of the nine-valent HPV vaccine, HPV vaccination in people living with HIV and HPV vaccination in males and the cost-effectiveness of extending the HPV vaccination programme to include males.", "\n\nImpact of infectious diseases on population health using incidence-based disability-adjusted life years (DALYs): Results from the burden of communicable diseases in Europe study, European Union and European economic countries, 2009 to 2013\n\nExpert opinion on the introduction of the meningococcal B (4CMenB) vaccine in the EU/EEA\n\nExpert opinion-6 Dec 2017\n\nThis expert opinion is intended to support national decision-making by summarising the considerations and concerns of some EU/EEA countries when they discussed whether to introduce the 4CMenB vaccine into their national immunisation programmes.", "\n\nExpert opinion on rotavirus vaccination in infancy\n\nExpert opinion-7 Sep 2017\n\nECDC has published an Expert Opinion on rotavirus vaccination in infancy. ", "The paper provides EU/EEA Member States with relevant scientific information on burden of rotavirus disease, vaccine effectiveness and safety, and cost-effectiveness studies to support the decision-making process on the possible introduction of routine vaccination of children against rotavirus gastroenteritis." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007628916064277291, 0.0005966048338450491, 0.0008013738552108407, 0.0007921570213511586 ]
0.000738
4
[ "Bracing of the lower limb is widely employed in orthopaedics, sports medicine and physiotherapy. ", "Many well known methods and techniques are used.", "\nThe construction of the brace naturally tends to be related to the intended function. ", "Thus, when it is required to simply provide a degree of support to the musculature of the thigh, seamless elastic fabric sleeves of the type made by surgical hosiers are often used.", "\nHowever, in the technique of cast bracing for fractures, much more structural integrity is needed in the brace. ", "This technique was pioneered by Professor Augusto Sarmiento in the nineteen-sixties and seventies. ", "Hinges were developed to make an articulation between a lower or tibial cast member and an upper or femoral cast member. ", "For many years, only Plaster of Paris was readily available for making cast members. ", "These tended to be heavy and had a long period of setting-to-weight-bearing. ", "Plaster of Paris is also radio-opaque which precludes monitoring of the fracture with the brace in situ.", "\nSo-called new casting materials of two main types were introduced in the late seventies and early eighties. ", "Both resin-impregnated bandages and low-temperature thermoplastic sheets overcame the disadvantages of Plaster of Paris and its derivatives but these materials did not bond very effectively with the headplates used in the early hinge designs.", "\nBy the end of the seventies, several designs of hinge for the ankle in metal and in plastic had been introduced. ", "These included types referred to as heel cups and sold by the United States Manufacturing Company of Pasadena, Calif. and Camp International of various addresses including Winchester, England.", "\nAt least one hinge for the hip was on sale in Europe--the Hynabrace Hinge made by Messrs Blatchford's of Basingstoke, England and sold by Messrs Smith and Nephew of Hull, England. ", "This device was indicated for proximal third femoral fractures.", "\nIn response to a perceived need for cast bracing hinges which would mate well with new casting materials, one of the present inventors (D.E.Y.) and D. H. Boyes developed a new kind of hinge headplate. ", "This is described in published U.K. patent application GR No. ", "2130488, published European application EPN No. ", "0 109 847, U.S. Pat. ", "Nos. ", "4,467,792 and 4,559,935.", "\nThe present authors have gone on to develop a novel ankle hinge and a novel hip hinge disclosed in U.K. application No. ", "8501613 and in U.S. application Ser No. ", "734,050. ", "More recently, they have disclosed a new type of hinge mechanism for knee hinges in U.K. application No. ", "8510,028 and in U.S. application Ser. ", "No. ", "853,962, now abandoned.", "\nHinges designed for use in cast bracing have never been restricted solely to that application and it has been a frequent practice for orthotists and orthopaedic technicians to build them into orthoses, with or without casting material. ", "An example we have encountered is the construction of hip orthoses used in Legg-Calve-Perthes disease where cast brace knee hinges have been modified and used.", "\nHinges of this general type have also been used in orthoses for supporting and bracing ligament injuries. ", "A good example of this is a hinge according to Lerman, described in U.S. Pat. ", "Nos. ", "4,337,764 and 4,372,298 and sold by Zinco Industries of Montrose Calif. This hinge is sold by itself for cast bracing and for surgical knee ligament repairs which are clear orthopaedic indications. ", "However, this hinge is also built into a knee control orthosis which has indications ranging from minor knee instabilities to the protection of repaired ligaments in closely monitored rehabilitation programmes.", "\nThe latter type of indication derives mainly from sports medicine which has increased in importance in recent years as more and more people in western civilisations take part in widely varying sports.", "\nThere is little doubt that the increasing number of knee ligament injuries in particular, which are now being seen in general orthopaedic clinics, derive substantially from the fact that older and less fit people are jogging, skiing, playing soccer, rugby, American football and other games, often at a competitive level.", "\nIn the United States, bracing of joints, especially the knee, is well developed. ", "The Lenox-Hill derotation brace, introduced in the sixties, was almost certainly the first to achieve widespread use. ", "This device is well reviewed in an article by James A. Nicholas, M.D. entitled \"Bracing the Anterior Cruciate Ligament Deficient Knee Using the Lenox Hill Derotation Brace\" which appeared in Clinical Orthopaedics and Related Research Number 172, January-February 1983, Pages 137 to 142.", "\nWe have surveyed the field of sports medical bracing in the U.S.A. and Europe and have identified 18 different types which are important by virtue of widespread use or because they embody some feature specific to themselves. ", "All were of U.S. manufacture, few bore any indication that any of their features were patented or the subject of pending applications. ", "A number of other types and makes were found but they did not appear to contribute any extra features to the art.", "\nBraces can generally be compared via a series of common elements such as hinge mechanisms, hinge arms, means of terminating hinge arms, wraps, securing means and accessories." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0012509473599493504, 0.0005540050333365798, 0.000573469849769026, 0.0008025304996408522, 0.0005720780463889241, 0.0006131057161837816, 0.0009606970124877989, 0.0006331510958261788, 0.0006305552669800818, 0.0006394644733518362, 0.0006109442329034209, 0.000729910796508193, 0.0007670061313547194, 0.0006188600091263652, 0.0009306666906923056, 0.0010134851327165961, 0.0006779287359677255, 0.0006322746048681438, 0.000658107572235167, 0.0007970895385369658, 0.0008322071516886353, 0.0008327512769028544, 0.0006612769211642444, 0.0006657365593127906, 0.0007884338265284896, 0.0005956693203188479, 0.0006434905808418989, 0.0013785817427560687, 0.0008426008862443268, 0.0007579102530144155, 0.0007087771664373577, 0.0006009314092807472, 0.0006723508704453707, 0.0008322071516886353, 0.0007492729346267879, 0.0008152079535648227, 0.0005419475492089987, 0.0008564415038563311, 0.0005548991612158716, 0.0006945790955796838, 0.0006082985200919211, 0.0005214655539020896, 0.0006716090138070285, 0.0005842004320584238, 0.0005798315978609025 ]
0.000726
45
[ "Q:\n\nWhere should I upload the built file of a github branch?", "\n\nI have a github project and while I'm developing I want to provide all builds I make to my users. ", "For this I not only tag/snapshot the branch but I also want to provide the already compiled version of my program but I haven't found a good place to upload it to.", "\nI have seen that some people upload those to a special branch but somehow that seems a bit weird to me because that wouldn't be a real branch in the original sense.", "\nIs it bad style to do this or am I just too picky? ", "Can someone propose an alternate way/website that fits my needs and is possibly closely connected to github?", "\n\nA:\n\nGitHub has releases that you can associate to tags (see \"Creating Releases\"): \n\nno need for a special branch\ntag your code\nupload the corresponding binary to the release associated to that tag\n\nSee more on \"About Releases\"\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0008309170952998102, 0.000751545827370137, 0.0005603997851721942, 0.0005487054004333913, 0.0016868141246959567, 0.0008361265645362437, 0.0006574747385457158 ]
0.000839
7
[ "Q:\n\nComo retornar todos os campos de uma linha \"Mysql\" pelo \"id\" da linha?", "\n\nDada uma tabela \"Mysql\", onde existem 3 campos: ID - Nome - Sobrenome \nComo deve ser a consulta de modo que apenas informando o ID, ela retorna todos os campos da linha ?", "\nNota: coloquei apenas 3 campos para exemplo, mas a consulta deve servir para uma linha que possui inúmeros campos.", "\n\nA:\n\nBaseado no comentário, para exibir as colunas no html de forma dinâmica pode usar a função array_keys() que retorna os nomes das chaves e com elas fazer um segundo foreach para exibir os valores.", "\n$registros =[\n ['id' => 1, 'nome' => 'alberto'],\n ['id' => 2, 'nome' => 'beto'],\n ['id' => 3, 'nome' => 'carlos'],\n\n];\n\nforeach($registros as $item){\n $campos = array_keys($item);\n foreach($campos as $valor){\n echo $item[$valor] .'<br>';\n }\n}\n\nUm exemplo mais proxixo da realidade seria o código abaixo, ele pode ser abstraido para função.", "\n$query = mysql_query(\"select * from paineladm_usuarios\") or die(mysql_error());\n\necho '<table border=\"1\">';\nwhile($row = mysql_fetch_assoc($query)){\n $campos = array_keys($row);\n echo '<tr>';\n foreach($campos as $campo){\n echo '<td>'. ", "$row[$campo] .'</td>';\n }\n echo '</tr>';\n}\necho '</table>';\n\nA:\n\nPrimeiro faz a conexão iniciando um Objeto Mysqli\n$mysqli = new mysqli(\"example.com\", \"user\", \"password\", \"database\");\nif ($mysqli->connect_errno) {\n echo \"Failed to connect to MySQL: \" . ", "$mysqli->connect_error;\n}\n\nCria o select\n$res = $mysqli->query(\"SELECT * From tabela where ID = 'Coloca o ID aqui'\");\n\nDá a fetchiada para poder mostrar no HTML\n$row = $res->fetch_assoc();\n\nE echa tudo na moralzinha\n foreach($row as $echada_na_moral) {\n echo $echada_na_moral['id'];\n echo $echada_na_moral['nome'];\n echo $echada_na_moral['Sobrenome'];\n}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.07891054451465607, 0.008240644820034504, 0.006851901765912771, 0.014108975417912006, 0.0012061219895258546, 0.0398135781288147, 0.0018866460304707289, 0.002085331128910184 ]
0.019138
8
[ "Archives\n\nFOLLOW THIS ADVICE TO EXTEND THE LIFESPAN OF YOUR DIPPING TAPE With the Petro-Chemical industry being so competitive and involving such high costs, it is essential to ensure that fuel measurement is kept accurate, as expenses due to fuel leakage or theft cannot be allowed to go undetected and cannot be afforded. ", "One way to make sure your measurements are as accurate as possible is to handle your dipping equipment in the correct manner, so as to prevent any damage that could lead to faulty readings. ", "You can determine whether or not you are handling your dipping tape correctly by […]" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006424564635381103, 0.0007335214759223163, 0.0009161958005279303 ]
0.000764
3
[ "Philodromops\n\nPhilodromops is a monotypic genus of Brazilian running crab spiders containing the single species, Philodromops coccineus. ", "It was first described by Cândido Firmino de Mello-Leitão in 1943, and is only found in Brazil.", "\n\nSee also\n List of Philodromidae species\n\nReferences\n\nCategory:Monotypic Araneomorphae genera\nCategory:Philodromidae\nCategory:Spiders described in 1943\nCategory:Spiders of Brazil\nCategory:Taxa named by Cândido Firmino de Mello-Leitão" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0020058383233845234, 0.0006259188521653414, 0.0007403659401461482 ]
0.001124
3
[ "Mind from genes and neurons: a neurobiological model of Freudian psychology.", "\nA hypothetical neurobiological model of Freud's architecture of the mind is presented in an attempt to unify concepts and data derived from molecular biology (e.g., genomic imprinting), systems neuroscience (e.g., neuroanatomochemical circuitries), evolutionary psychology (e.g., human mating strategies), and Freudian psychology. ", "The model posits that events related to genomic imprinting can be regulated in a tissue-specific manner over the course of neural development such that imprinting along the matriline would favor the development of corticostriatal structures whereas imprinting along the patriline would favor the development of limbic-subcortical structures. ", "A neuropsychological analysis of the brain requirements for successful mating presumably would put an evolutionary premium on the corticostriatal system (matrilineal) in men and limbic-subcortical systems (patrilineal) in women. ", "Additionally, the model emphasizes that the ego and the super-ego of Freudian psychology are dependent on corticostriatal mechanisms (matriline-related), while the id is dependent on brainstem processes (patriline-related). ", "It is hoped that the model herein presented has heuristic value for a rapprochement of psychoanalysis and neurobiology." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0015459682326763868, 0.000681757228448987, 0.0006136429728940129, 0.0014535957016050816, 0.0015290959272533655, 0.0040922206826508045 ]
0.001653
6
[ "Iejigawa Dam\n\nis a dam in Takaoka, Kōchi Prefecture, Japan.", "\n\nCategory:Dams in Kōchi Prefecture" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0010456120362505317, 0.00059890077682212 ]
0.000822
2
[ "Q:\n\njQuery multuple linked sliders?", "\n\nI'm trying to find an example of multiple linked sliders similar to estately's\nmortgage calculator (can be found on the right bottom of that page).", "\nI've found this example but the sliders aren't linked.", "\nDoes anyone have a good example i can use?", "\n\nA:\n\nI think you don't need a tutorial :D It's pretty easy.", "\nEverytime a slider get moved, you update the other sliders.", "\nUse the slide or change event and update the other sliders.", "\nFor example:\n$( \"#slider1\" ).bind( \"slide\", function(event, ui) {\n $(\"#slider2\").slider({ value: 45 });\n $(\"#slider3\").slider({ value: 30 });\n});\n\nJust add a slide event for each slider and there you go\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0008024807902984321, 0.0007111361483111978, 0.0006057826685719192, 0.0006629349663853645, 0.0006067687063477933, 0.0008601114386692643, 0.000703344470821321, 0.0007713531376793981 ]
0.000715
8
[ "The development of a structured schedule for collecting ICF-CY-based information on disability in school and preschool children: an action research from Italy.", "\nThe aim of this study was to present the development of an instrument to collect disability information in school settings, based on the International Classification of Functioning, Disability and Health, Children and Youth version (ICF-CY): the ICF-PEI Schedule (ICF-CY-based schedule for Individualized Education Plan). ", "Through an action-research process, a group of 14 teachers participated in the definition of a comprehensive list of ICF-CY categories, which were then used in a pilot test: categories relevant in at least 30% of the cases were retained. ", "Teachers also reported the most relevant difficulties they had in using the ICF-CY questionnaires: these were discussed in plenary. ", "On the basis of a pilot test and teachers' difficulties, a set of structured, easy to use and feasible questions for the school context were developed. ", "A total of 118 ICF-CY categories were included in the preliminary list and 67 were retained. ", "The most relevant difficulties in using ICF-CY questionnaires were as follows: obtaining reliable information on bodily impairments; using capacity in activities and participation; using qualifiers in 'borderline situations'; and identifying systems and policies as barriers or facilitators. ", "The ICF-PEI Schedule is composed of 62 items, with a simplified rating scale. ", "Teachers are asked to rate performance, which is directly observed, and to address which environmental factors impact it; thus, environmental factor rating is simplified. ", "The ICF-PEI Schedule was drafted as a feasible instrument for school settings to collect and exploit functioning and disability data. ", "Teachers can fruitfully employ it to assist in the definition of educational objectives and verify them longitudinally." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006699755904264748, 0.0006414240342564881, 0.0005650577368214726, 0.0005699260509572923, 0.0005237432196736336, 0.000622391642536968, 0.0005994304665364325, 0.0005920988041907549, 0.0006290522287599742, 0.0006133520510047674, 0.0005470921751111746 ]
0.000598
11
[ "\n260 N.W.2d 53 (1977)\nLarry O. KURTENBACH, Appellant,\nv.\nRichard TeKIPPE, Appellee.", "\nNo. ", "59409.", "\nSupreme Court of Iowa.", "\nNovember 23, 1977.", "\n*54 Dennis G. Larson and Paul D. Strand, of Strand, Anderson & Raduenz, Decorah, for appellant.", "\nJames E. O'Donohoe, of O'Donohoe, O'Connor & O'Donohoe, New Hampton, for appellee.", "\nHeard by MOORE, C. J., and RAWLINGS, REES, UHLENHOPP and McCORMICK, JJ.", "\nMcCORMICK, Justice.", "\nThis is a legal malpractice action which was tried to the court. ", "The trial court entered judgment dismissing the petition on the ground plaintiff Larry O. Kurtenbach failed to prove an attorney-client relationship existed with respect to the transaction upon which he sought to predicate defendant Richard TeKippe's liability. ", "Kurtenbach contends the evidence established an attorney-client relationship as a matter of law and alleges other errors. ", "We affirm the trial court.", "\nOur review of a law action tried to the court is governed by well established principles. ", "The trial court's findings of fact have the effect of a special verdict. ", "Baker v. Beal, 225 N.W.2d 106, 109 (Iowa 1975). ", "When the trial court denies recovery because of a party's failure to carry his burden on an issue, we will not interfere unless we find the party carried his burden as a matter of law. ", "The evidence in the party's favor must be so overwhelming that no other reasonable inference could be drawn. ", "On review we examine the evidence in the light most favorable to the judgment. ", "Roland A. Wilson v. Forty-O-Four Grand *55 Corp., 246 N.W.2d 922, 925 (Iowa 1976). ", "However, we are not bound by trial court determinations of law or precluded from inquiry into whether the trial court applied erroneous rules of law which materially affected its decision. ", "In re Estate of Northup, 230 N.W.2d 918, 921 (Iowa 1975).", "\nKurtenbach was a New Hampton entrepreneur who held an Iowa securities sales license. ", "TeKippe was a New Hampton lawyer who had been a high school classmate of Kurtenbach. ", "They both officed in a building owned by Kurtenbach. ", "Commencing in 1970 Kurtenbach employed TeKippe whenever he desired legal work to be done. ", "TeKippe maintained a detailed ledger and charged Kurtenbach for the time he spent on each individual matter. ", "TeKippe was not on retainer, and the parties did not have an express employment contract. ", "TeKippe performed legal work for Kurtenbach only upon request.", "\nIn July 1971 Kurtenbach asked TeKippe to form two \"corporate shells\", one to be a manufacturer of fiberglass silos and the other to handle silo assembly, sales and service. ", "Kurtenbach was sole incorporator. ", "TeKippe drafted articles and obtained certificates of incorporation. ", "Approximately one month later he prepared stock certificates showing Kurtenbach owned 900 common shares and Charles Haberly 100 common shares in each corporation.", "\nIn March 1972 Kurtenbach told TeKippe he wished to activate the two corporations. ", "He gave TeKippe the stock certificates and said he and Haberly were rearranging their interests so that new certificates would have to be prepared later. ", "TeKippe prepared minutes, by-laws, and an \"after-the-fact\" subscription agreement to reflect corporate history. ", "He delivered these documents to Kurtenbach.", "\nIn April 1972 Kurtenbach held meetings with prospective investors in the two corporations. ", "At his request TeKippe prepared an agreement by which attendees promised not to disclose financial data revealed in the meetings. ", "Kurtenbach obtained investments of approximately $50,000.", "\nThen in August 1972 Kurtenbach went to TeKippe's office, acquired blank stubs and certificates from TeKippe's wife, who was working as secretary in the law office, and used his corporate accountant's secretary in another office to fill out the certificates to reflect the new ownership interests. ", "As a result, Kurtenbach owned 650 common shares, Haberly owned 80, and the investors owned the remaining 270 in each corporation.", "\nNo report of sale of stock was made to the commissioner of insurance as required by § 502.5(15), The Code, 1971. ", "Subsequently the corporations became financially troubled. ", "Several investors sued Kurtenbach and eventually obtained judgments against him on a theory of rescission because of his failure to report the stock sales. ", "See § 502.23, The Code, 1971.", "\nThe present action was brought by Kurtenbach against TeKippe in an effort to recover losses resulting from the investor lawsuits which Kurtenbach alleged were incurred because of TeKippe's negligent failure to advise him of his obligation to report the sales.", "\nKurtenbach testified TeKippe knew of the stock sales, advised him regarding the mechanics of issuance of new certificates, and was directed to prepare the certificates to reflect the new ownership. ", "A list of the new investors and the amounts of their investments was later found in one of the corporate files kept in TeKippe's office. ", "Kurtenbach testified he gave it to TeKippe within two days of the sales. ", "He also testified he obtained the blank certificates and had them filled in at his accountant's office because TeKippe failed to prepare them when he needed them.", "\nTeKippe denied being advised or giving advice regarding the stock sales. ", "His ledger showed he made no charge for such services although it noted delivery of the certificates. ", "He said Kurtenbach did not tell him he planned to sell to outside investors and had told him the April meetings were with potential silo buyers. ", "He testified Kurtenbach had access to his office and the corporate files, and he did not know the investor list was placed in one of the files. ", "TeKippe denied being asked to prepare the *56 new certificates. ", "He said he first learned of the sales in March 1973 when the investors asked for their money back.", "\nEach party offered other evidence to support his testimony. ", "In deciding the controverted issue whether an attorney-client relationship existed between them with respect to the stock sales, the trial court found TeKippe's evidence was credible and Kurtenbach's was not. ", "The court held Kurtenbach failed to establish the requisite attorney-client relationship and entered judgment dismissing Kurtenbach's petition. ", "This appeal followed.", "\nKurtenbach acknowledges the prerogative of the trial court to decide the credibility of witnesses. ", "His principal contention on appeal is that he established the attorney-client relationship as a matter of law even under the version of the evidence accepted by the trial court. ", "This contention raises questions about principles governing the existence and scope of an attorney-client relationship as well as about application of these principles to the facts as found by the court. ", "The other contention which we must address is that the trial court erred in rejecting the testimony of a rebuttal witness based in part upon observation of the witness at a pretrial conference.", "\nI. Proof of the attorney-client relationship. ", "A lawyer has a duty to his client to exercise ordinary care in handling the client's work. ", "Baker v. Beal, 225 N.W.2d 106, 112 (Iowa 1975). ", "Although we have not previously had occasion to say so, we believe this obligates a lawyer to use the knowledge, skill, and ability ordinarily possessed and exercised by members of the legal profession in similar circumstances. ", "See Cook, Flanagan & Berst v. Clausing, 73 Wash.2d 393, 438 P.2d 865 (1968); cf. ", "Speed v. State, 240 N.W.2d 901, 907-908 (Iowa 1976).", "\nHowever, for this duty to arise it is necessary that an attorney-client relationship exist. ", "This is the threshold requirement for a legal malpractice action. ", "Eckert v. Schaal, 251 Cal.", "App.2d 1, 58 Cal.", "Rptr. ", "817 (1967), overruled on other grounds, Neel v. Magana, Olney, Levy, Cathcart & Gelfand, 6 Cal.3d 176, 98 Cal.", "Rptr. ", "837, 491 P.2d 421 (1971); Ronnigen v. Hertogs, 294 Minn. 7, 199 N.W.2d 420 (1972). ", "It is this relationship which the trial court found did not exist but which Kurtenbach asserts was established as a matter of law.", "\nAn attorney-client relationship ordinarily rests on contract, but it is not necessary that the contract be express or that a retainer be requested or paid. ", "The contract may be implied from conduct of the parties. ", "Healy v. Gray, 184 Iowa 111, 168 N.W. 222 (1918). ", "The relationship is created when (1) a person seeks advice or assistance from an attorney, (2) the advice or assistance sought pertains to matters within the attorney's professional competence, and (3) the attorney expressly or impliedly agrees to give or actually gives the desired advice or assistance. ", "Anderson v. Lundt, 200 Iowa 1265, 206 N.W. 657 (1925). ", "In appropriate cases the third element may be established by proof of detrimental reliance, when the person seeking legal services reasonably relies on the attorney to provide them and the attorney, aware of such reliance, does nothing to negate it. ", "Kukla v. Perry, 361 Mich. 311, 105 N.W.2d 176 (1960); Rice v. Forestier, 415 S.W.2d 711 (Tex.", "Civ. ", "App.1967).", "\nIn a legal malpractice action it is not sufficient merely to prove an attorney-client relationship existed with respect to some matters. ", "It is necessary to establish that the relationship existed with respect to the act or omission upon which the malpractice claim is based. ", "Brandlin v. Belcher, 67 Cal.", "App.3d 997, 134 Cal.", "Rptr. ", "1 (1977); Henzel v. Fink, 340 So.2d 1262 (Fla. App.1976); Shropshire v. Freeman, 510 S.W.2d 405 (Tex.", "Civ.", "App.1974); Hansen v. Wightman, 14 Wash.App. ", "78, 538 P.2d 1238 (1975).", "\nIn determining the scope of the attorney's duty, courts must give effect to the fiduciary role of the attorney and the heavy responsibility this imposes on him to represent and protect the client's interests with respect to the subject matter of the employment. ", "Healy v. Gray, supra; Jamison v. Weaver, 81 Iowa 212, 46 N.W. 996 (1890). ", "However, the attorney's duty to represent and protect his client does not *57 extend beyond reasonable bounds. ", "Specifically, when a question arises as in the present case about the extent of a lawyer's duty to investigate or inquire about a client's transaction, the following principles are applicable:\nUnder certain circumstances it may be the duty of the lawyer to investigate the facts applicable to a transaction and report the results to the client. * * * ", "If the attorney should have inquired concerning the facts and did not, the client cannot be said to have been negligent in failing to disclose said facts. * * * ", "However, an attorney need not inquire into matters that do not pertain to the discharge of duties that he has undertaken. * * * ", "Likewise, an attorney need not make inquiry where the responsibility of the matter is assumed by the client. ", "Hansen v. Wightman, 14 Wash. App. ", "78, 86, 538 P.2d 1238, 1245 (1975).", "\nWhen reasonable minds could differ as to whether the evidence establishes an attorney-client relationship with respect to an act or omission upon which a malpractice claim is based, the issue must be resolved by the trier of fact. ", "The facts found by the trial court in the present case are analogous to those in cases in which the requisite attorney-client relationship was held not to exist. ", "See Shropshire v. Freeman, 510 S.W.2d 405 (Tex.", "Civ.", "App.1974), and Brandlin v. Belcher, 67 Cal.", "App.3d 997, 134 Cal.", "Rptr. ", "1 (1977).", "\nEven though Kurtenbach employed TeKippe to do the legal work in setting up the corporations, the trial court found he intentionally kept TeKippe in the dark regarding the subsequent public stock sales. ", "When he desired legal assistance he asked for it; he asked for none here. ", "Moreover, because of his experience and training as a securities salesman he thought he did not need legal help in handling the sales. ", "We do not believe the contrary and additional evidence relied on by Kurtenbach is so strong that the trial court was compelled as a matter of law to find TeKippe had a duty to advise Kurtenbach of his statutory obligation to report them. ", "The court could reasonably find, as it did, that the stock sales did not pertain to the discharge of duties TeKippe had undertaken and that he had no duty to investigate or inquire when responsibility for the transaction was assumed by Kurtenbach.", "\nThe trial court did not err in failing to hold the attorney-client relationship was established as a matter of law.", "\nII. ", "The trial court's out-of-court observation. ", "In rejecting the rebuttal testimony of E. Ralph Walker, a Des Moines attorney who represented some of the investors in Kurtenbach's corporations, the trial court contrasted Walker's demeanor while testifying with his demeanor at a pretrial conference in the case. ", "In assigning this conduct of the court as a ground for reversal, Kurtenbach relies on the principle which we have frequently applied in jury cases that a litigant is entitled to have his case determined solely upon evidence presented in open court. ", "See Kalianov v. Darland, 252 N.W.2d 732, 737 (Iowa 1977). ", "We have said the same principle binds trial judges sitting as triers of fact. ", "Miller v. Miller, 202 N.W.2d 105, 109 (Iowa 1972).", "\nWhile we do not believe the trial judge should have considered Walker's out-of-court demeanor, we hold reversible error did not result here. ", "The court gave a second reason for rejecting Walker's testimony, its lack of materiality because it did not relate to whether an attorney-client relationship existed between Kurtenbach and TeKippe. ", "Walker testified about alleged admissions made to him by TeKippe concerning his unfamiliarity with the statutory securities sales reporting requirement. ", "We agree this testimony was not material to the issue on which the case was decided. ", "On that basis we hold the trial court's consideration of Walker's out-of-court demeanor does not require reversal.", "\nAlthough we have not discussed every argument advanced by Kurtenbach, we have considered them all and find no reversible error.", "\nAFFIRMED.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0007493472076021135, 0.0013785817427560687, 0.0012245557736605406, 0.0008045395952649415, 0.0007768813520669937, 0.0006231869338080287, 0.0007632646593265235, 0.0006767623126506805, 0.0007497203187085688, 0.0013964741956442595, 0.0007631570333614945, 0.0007322946330532432, 0.0005877073854207993, 0.0005716218147426844, 0.0006842208676971495, 0.0007229610928334296, 0.0006516140419989824, 0.0007327529601752758, 0.0005195935373194516, 0.0008555055828765035, 0.0006301199900917709, 0.0006679838988929987, 0.0006857919506728649, 0.0007881862693466246, 0.000698722607921809, 0.0006317725637927651, 0.0006075470009818673, 0.0009100126917473972, 0.0007311085937544703, 0.0006411954527720809, 0.006300405133515596, 0.0006113671115599573, 0.0006556588341481984, 0.0006728384178131819, 0.0006581841153092682, 0.0005988391931168735, 0.0005922816344536841, 0.000568926683627069, 0.0006243207026273012, 0.0006320414249785244, 0.0006505914498120546, 0.000708077393937856, 0.0006392663926817477, 0.0006301341927610338, 0.001101036206819117, 0.0006718397489748895, 0.0018339368980377913, 0.0005824504769407213, 0.0005759512423537672, 0.0005967780016362667, 0.0006725216517224908, 0.0006972947739996016, 0.0006001961883157492, 0.0006550183170475066, 0.0006283646216616035, 0.0006958976737223566, 0.0005485090077854693, 0.0006292825564742088, 0.0007046278333291411, 0.0007651712512597442, 0.0007603074773214757, 0.0006360408733598888, 0.000611348485108465, 0.000577558355871588, 0.0005991811049170792, 0.0006327613373287022, 0.0008365389658138156, 0.0007219458930194378, 0.0005839003715664148, 0.000667785934638232, 0.0006940722232684493, 0.0005774036981165409, 0.002288591582328081, 0.0010649438481777906, 0.0009001382859423757, 0.0012920480221509933, 0.0008054026402533054, 0.0012920480221509933, 0.0007821692270226777, 0.0006501903408206999, 0.0006306430441327393, 0.000548731826711446, 0.0007133213803172112, 0.0005846736021339893, 0.000727642560377717, 0.0006015658145770431, 0.0008652601391077042, 0.0010461080819368362, 0.0007097721681930125, 0.0008782034856267273, 0.000644518353510648, 0.0008733842987567186, 0.0008092062780633569, 0.0012920480221509933, 0.0007191374897956848, 0.0010461080819368362, 0.0007766877533867955, 0.0007125862175598741, 0.0006529372185468674, 0.0007644711877219379, 0.0008227371145039797, 0.0005775008467026055, 0.0008454060880467296, 0.0007062790682539344, 0.0006470892112702131, 0.000865248148329556, 0.0007272615330293775, 0.0005841430393047631, 0.0006152015412226319, 0.0006161680212244391, 0.0010461080819368362, 0.0007327197818085551, 0.0008092062780633569, 0.0012920480221509933, 0.0006476892158389091, 0.0006988222012296319, 0.0005803524982184172, 0.0005829722504131496, 0.0006586149102076888, 0.0006065871566534042, 0.000720811600331217, 0.0011519683757796884, 0.0006142573547549546, 0.0006411899230442941, 0.0007093089516274631, 0.0006253100582398474, 0.0006002196460030973, 0.0007472787983715534, 0.0006322736735455692, 0.000667141517624259, 0.0006295854691416025, 0.0005574692040681839, 0.0006334048812277615, 0.0005670475657097995, 0.0007905580569058657, 0.001995444530621171 ]
0.000801
136
[ "Smooth muscle membrane vesicle orientation: a study on intactness and sidedness of rat myometrium plasma membrane vesicles.", "\nPlasma membrane vesicles of rat myometrium were prepared in media containing 240 mM sucrose. ", "The vesicles were exposed to isotonic, hypertonic, and hypotonic sucrose concentrations, fixed, sectioned, and studied using the electron microscope. ", "The vesicles fixed in isotonic media were circular in appearance. ", "Vesicles fixed in hypertonic media were distorted and showed a reduced volume to surface ratio consistent with the hypothesis that greater than 80% of the vesicles were osmotically active to sucrose. ", "Cationized ferritin binding studies and Ca binding and release studies were also consistent with this finding. ", "Exposure to hypotonic media also yielded membranes with distorted profiles indicating that they had been ruptured. [", "3H]Sucrose trapping experiments revealed that the vesicles had an internal volume of 1.20-1.44 mL/g protein. ", "Hypotonic shock treatment reduced this intravesicular volume to 0.20-0.28 mL/g protein. ", "The hypotonic shock treatment also led to enhanced galactose oxidase catalyzed Na3B3H4 labelling of the membranes and to increased K+-activated ouabain-sensitive p-nitrophenyl phosphatase activity. ", "The enhancement was the same (55 +/- 10%) in the various membrane preparations for both the parameters. ", "The data are interpreted to conclude that the rat myometrium plasma membrane vesicles consisted of 20% broken vesicles and equal proportions of intact vesicles of inside-out and rightside-out orientations." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0014012508327141404, 0.0023612238001078367, 0.0006521698087453842, 0.0006232962477952242, 0.0007286081672646105, 0.0006544417701661587, 0.0006910045631229877, 0.0007235372322611511, 0.0010272396029904485, 0.0019539392087608576, 0.0005513035575859249, 0.0016586431302130222 ]
0.001086
12
[ "I use the Computer Graphics Laboratory (CGL) in my research regarding protein structure. ", "I am pursuing numerous projects that make use of both the computational power and visualization capability of the CGL. ", "One project is to create an unsupervised BCM-based neural network to find principal patterns relating amino acid sequence to phi-psi bond angles. ", "These patterns, when constrained by a limited number of hidden nodes in the model, represent \"secondary structures\" ranked by predictability rather than based on bond-angle sequences. ", "A second project is to relate folded proteins to mathematical knots. ", "Rather than simply using the folded structure, I will use an association matrix generated from van der Waals contacts and hydrogen-bond contacts between residues to generate a cyclic non-directed graph, from which a knot can be generated. ", "These knots are embedded in 3-space, and can be visualized using the CGL computers. ", "The goal eventually is to classify these knots using the standard knot invariants (the Alexander polynomial, for example). ", "A third project is to study signal averaged electrocardiograms (SAECG) and conventional 12-lead electrocardiograms. ", "SAECGs are studied in both frequency and time space, but only Fourier transforms are used in the interconversion. ", "I would apply wavelet decomposition to SAECGs, which being limited signals are perfect subjects. ", "12-lead EKGs, representing repeating oscillations in a 12-dimensional space, can be viewed in projections on the plane that are different from the canonical. ", "These projections may assist in finding subtle features that mark congenital heart disease that are hard to pick up in conventional 12-lead studies." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0.0005824407562613487, 0.000553059799131006, 0.0005863234400749207, 0.0005630959058180451, 0.0005440773675218225, 0.0006031629745848477, 0.0005941856652498245, 0.0005597386625595391, 0.0006223826203495264, 0.0006123657803982496, 0.0006370051414705813, 0.0007124144467525184, 0.0005553298396989703 ]
0.000594
13
[ "Q:\n\nUse conda environment in Jupyter Notebook\n\nI am running Anaconda on windows 10 and using Jupyter Notebook for my Machine Learning projects.", "\nI recently became aware of virtual environments in conda.", "\nI created a virtual environment in conda using following command\nconda create -n test1\n\nactivated the environment\nactivate test1\n\ninstalled environment in ipykernel (not sure correct terminology is used)\npython -m ipykernel install --user --name test1\n\nnow the environment test1 is visible in jupyter notebook but when i start it I am getting kernel starting... please wait message.", "\nhere are some snippets.", "\n\nalso in jupyter prompt (again not sure about the terms) i am getting following error\n[I 21:08:24.924 NotebookApp] Creating new notebook in /MachineLearning/ImageProcessing\n[I 21:08:29.550 NotebookApp] Kernel started: ec56795d-df5b-48d5-8f95-473ab1253407\nTraceback (most recent call last):\n File \"C:\\Users\\shesh\\AppData\\Local\\Programs\\Python\\Python38\\lib\\runpy.py\", line 192, in _run_module_as_main\n return _run_code(code, main_globals, None,\n File \"C:\\Users\\shesh\\AppData\\Local\\Programs\\Python\\Python38\\lib\\runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\ipykernel_launcher.py\", line 16, in <module>\n app.launch_new_instance()\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\traitlets\\config\\application.py\", line 663, in launch_instance\n app.initialize(argv)\n File \"<C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\decorator.py:decorator-gen-125>\", line 2, in initialize\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\traitlets\\config\\application.py\", line 87, in catch_config_error\n return method(app, *args, **kwargs)\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\ipykernel\\kernelapp.py\", line 527, in initialize\n self.init_sockets()\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\ipykernel\\kernelapp.py\", line 287, in init_sockets\n self.init_iopub(context)\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\ipykernel\\kernelapp.py\", line 295, in init_iopub\n self.iopub_thread = IOPubThread(self.iopub_socket, pipe=True)\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\ipykernel\\iostream.py\", line 68, in __init__\n self._setup_pipe_in()\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\ipykernel\\iostream.py\", line 141, in _setup_pipe_in\n self._pipe_in = ZMQStream(pipe_in, self.io_loop)\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\zmq\\eventloop\\zmqstream.py\", line 127, in __init__\n self._init_io_state()\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\zmq\\eventloop\\zmqstream.py\", line 546, in _init_io_state\n self.io_loop.add_handler(self.socket, self._handle_events, self.io_loop.", "READ)\n File \"C:\\Users\\shesh\\AppData\\Roaming\\Python\\Python38\\site-packages\\tornado\\platform\\asyncio.py\", line 99, in add_handler\n self.asyncio_loop.add_reader(fd, self._handle_events, fd, IOLoop.", "READ)\n File \"C:\\Users\\shesh\\AppData\\Local\\Programs\\Python\\Python38\\lib\\asyncio\\events.py\", line 501, in add_reader\n raise NotImplementedError\nNotImplementedError\n[W 21:09:29.591 NotebookApp] Timeout waiting for kernel_info reply from ec56795d-df5b-48d5-8f95-473ab1253407\n[I 21:10:29.197 NotebookApp] Saving file at /MachineLearning/ImageProcessing/Untitled.ipynb\n\nAll I want to do is use newly created environment in jupyter notebook.", "\n\nA:\n\nPlease try the following steps:\nsource activate test1\nconda install ipykernel\nipython kernel install --name test1 --user \n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0009540851460769773, 0.0005691840196959674, 0.0006724025006406009, 0.361011266708374, 0.009595208801329136, 0.004561241716146469, 0.006896045058965683, 0.0008149748318828642 ]
0.048134
8
[ "Bridging the Green Gap: Metal-Organic Framework Heteromultilayers Assembled from Porphyrinic Linkers Identified by Using Computational Screening.", "\nIn organic photovoltaics, porphyrins (PPs) are among the most promising compounds owing to their large absorption cross-section, wide spectral range, and stability. ", "Nevertheless, a precise adjustment of absorption band positions to reach a full coverage of the so-called green gap has not been achieved yet. ", "We demonstrate that a tuning of the PP Q- and Soret bands can be carried out by using a computational approach for which substitution patterns are optimized in silico. ", "The most promising candidate structures were then synthesized. ", "The experimental UV/Vis data for the solvated compounds were in excellent agreement with the theoretical predictions. ", "By attaching further functionalities, which allow the use of PP chromophores as linkers for the assembly of metal-organic frameworks (MOFs), we were able to exploit packing effects resulting in pronounced redshifts, which allowed further optimization of the photophysical properties of PP assemblies. ", "Finally, we use a layer-by-layer method to assemble the PP linkers into surface-mounted MOFs (SURMOFs), thus obtaining high optical quality, homogeneous and crystalline multilayer films. ", "Experimental results are in full accord with the calculations, demonstrating the huge potential of computational screening methods in tailoring MOF and SURMOF photophysical properties." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0005843053804710507, 0.0005749762640334666, 0.0005570569774135947, 0.0005797627964057028, 0.0005628517828881741, 0.0005349153652787209, 0.0006340022082440555, 0.000635182426776737, 0.0005518260877579451 ]
0.000579
9
[ "Eames Radio by Charles and Ray Eames reissued by Vitra\n\nNot technically a reissue, as the Eames Radio by Charles and Ray Eames never actually made it into production.", "\n\nBut thanks to Vitra, the radio is now available, but only in limited numbers. ", "Details of that later. ", "But for now, let’s look at the design itself and how it never came to market back in 1946.", "\n\nEames Radio by Charles and Ray Eames reissued by Vitra\n\nYes, that was the date of design, at a time when Charles and Ray Eames had developed a method for moulding plywood. ", "That knowledge resulted in a range of new products, including radio cabinets. ", "Around 200,000 radios were made with Eames cabinets.", "\n\nEames Radio by Charles and Ray Eames reissued by Vitra\n\nBut not this one. ", "The shape of this particular was rejected due to its ‘compact shape and austere, more technical look’. ", "Basically it wasn’t in tune with tastes of there day.", "\n\nHowever, prototypes were produced and images were sent to ‘Interiors’ magazine, which is why we know if its existence.", "\n\nEames Radio by Charles and Ray Eames reissued by Vitra\n\nSeveral decades later and Vitra has finally brought the Eames Radio into production. ", "It has a walnut cabinet and black front, but the inner workings have been updated, adding a touch of practicality to the vintage design.", "\n\nEames Radio by Charles and Ray Eames reissued by Vitra\n\nJust 999 of the radios are being produced and if you want one, you probably need to move fast. ", "Saying that, it isn’t cheap. ", "This is an Eames reissue after all. ", "The radios are priced at £849 and available from Vitra right now." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006722083198837936, 0.0005796622717753053, 0.0005970405763946474, 0.0005309719126671553, 0.0006521452451124787, 0.000603045744355768, 0.0006186721730045974, 0.0006717473152093589, 0.0006626073736697435, 0.0007305680774152279, 0.0005671408143825829, 0.000628475216217339, 0.0007125390111468732, 0.0006201802752912045, 0.0013049663975834846, 0.0010658908868208528, 0.0005522602004930377 ]
0.000692
17
[ "Standoff in a working-class neighbourhood descends into violence, breaking an uneasy peace that had lasted several days.", "\n\nHong Kong police have fired tear gas and baton-charged protesters who retaliated with a barrage of stones, bottles and bamboo poles as a standoff in a working-class neighbourhood descended into violence, breaking an uneasy peace that had lasted several days.", "\n\nThousands of demonstrators, many wearing hard hats and gas masks, on Saturday marched through the industrial Kwun Tong area, where they were blocked by dozens of riot police with shields and batons outside a police station.", "\n\nFrontline protesters – known as the “Braves” – pulled together a barricade of traffic barriers and bamboo construction poles. ", "As the afternoon wore on, some fired stones from slingshots, prompting a charge from police, wielding batons and pepper spray.", "\n\nTears gas swept across the road as protesters retreated, leaving a trail of broken bottles and at least one small fire in their wake as pro-democracy protests entered their 12th week on Saturday.", "\n\nSeveral of the black-clad protesters were detained as officers swept through.", "\n\nFour metro stations were shut down around Kwun Tong, a densely populated area on the east of the Kowloon peninsula, but thousands packed the streets anyway, most carrying umbrellas against the sun despite hazy skies in the former British colony\n\nHong Kong’s police force has become the target of the protesters’ ire for its perceived heavy-handed response to the months of demonstrations.", "\n\nAntipathy has soared towards the police, who have used baton charges, rubber bullets and tear gas against hardcore protesters, but are also accused of beating peaceful demonstrators.", "\n\nTear gas outside Ngau Tau Kok police station – I saw at least two people being arrested when the police advanced pic.twitter.com/2W6rQTD5bh — Aaron Mc Nicholas (@aaronMCN) August 24, 2019\n\n“What’s been happening is that police have slowly been clearing the streets following a large peaceful protest,” Al Jazeera correspondent Adrian Brown said from the streets of Hong Kong.", "\n\nProtesters were allowed on the streets between 1pm and 4pm, but when they did not leave after 4pm, the police moved in.", "\n\n190824054446952\n\n“It’s a reminder that after 12 consecutive weeks of protests that the streets of Hong Kong in some places still resemble a bit of a battleground,” said Brown.", "\n\nSaturday’s protest focused mainly on the installation of a large number of CCTV cameras in the city, with residents fearing their privacy might be at risk.", "\n\nIn mainland China, facial recognition technology has allowed the government to follow the whereabouts of citizens.", "\n\nAlthough Saturday’s protest was not as large as last week’s, when 1.7 million people took part, Brown said it was a solid reminder that the movement had not run out of steam.", "\n\nEarlier during the day, protesters once again tried to interfere with the operations at the Hong Kong airport, but their attempts to disrupt the passengers’ commute to the airport failed.", "\n\nThe demonstrations, which have occasionally shut the airport and businesses, still have broad support, despite some violent clashes between police and protesters, said Brown.", "\n\nOn Friday night, thousands of protesters chanted slogans and formed human chains around the city in a peaceful protest dubbed the “Hong Kong Way”.", "\n\nOrganisers said 135,000 people took part in the demonstration, inspired by the one in 1989 when an estimated two million people joined arms across three Baltic states in a protest against the then-Soviet rule that became known as the “Baltic Way” or “Baltic Chain”.", "\n\nFriday’s protest, which included people shining lights on sidewalks and atop Kowloon’s Lion Rock mountain, followed warnings from Beijing and city leader Carrie Lam to stop the demonstrations and restore order.", "\n\n190823155017412\n\nEarlier this week, Lam announced that her office would “start immediately a platform for dialogue with people from all walks of life”, while promising to conduct an investigation into alleged police abuse.", "\n\nAccording to Brown, those conversations have started, but it is doubtful that they will lead to concrete results.", "\n\n“On the other side of Hong Kong, Carrie Lam has been meeting with 20 people she selected to start what she called a platform of dialogue, a way for her to build reconciliation,” Brown said.", "\n\nBut, Brown added, none of those people were closely linked to the protesters that were on the streets on Saturday.", "\n\nThe Hong Kong protests began in June following the introduction of a controversial extradition bill that would allow for citizens of and visitors to Hong Kong to be extradited to mainland China.", "\n\nAlthough the bill has since been shelved, protests against the Hong Kong government and increased Chinese influence have continued for months.", "\n\nDemonstrators say they are fighting the erosion of the “one country, two systems” arrangement that enshrines a high degree of autonomy for Hong Kong since it was handed back from British to Chinese rule in 1997." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0010900030611082911, 0.02481134980916977, 0.0018143524648621678, 0.0034223836846649647, 0.0022932637948542833, 0.0010743988677859306, 0.007505365181714296, 0.001464887405745685, 0.0013955235481262207, 0.0018205425003543496, 0.0008942981366999447, 0.0007711903308518231, 0.0006332822958938777, 0.0005235400749370456, 0.0007071777945384383, 0.0008013563347049057, 0.0009496133425273001, 0.0011051237815991044, 0.0005964379524812102, 0.0009682314703240991, 0.000631262082606554, 0.0005526927416212857, 0.0005703798378817737, 0.0007032231660559773, 0.0006967650260776281, 0.0007108336430974305, 0.0008077602833509445 ]
0.002197
27
[ "/*\nCopyright 2017 The Kubernetes Authors.", "\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.", "\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.", "\nSee the License for the specific language governing permissions and\nlimitations under the License.", "\n*/\n\npackage v1\n\nimport (\n\tmetav1 \"k8s.io/apimachinery/pkg/apis/meta/v1\"\n\t\"k8s.io/apimachinery/pkg/runtime\"\n\t\"k8s.io/apimachinery/pkg/runtime/schema\"\n)\n\n// GroupName is the group name use in this package\nconst GroupName = \"networking.k8s.io\"\n\n// SchemeGroupVersion is group version used to register these objects\nvar SchemeGroupVersion = schema.", "GroupVersion{Group: GroupName, Version: \"v1\"}\n\n// Resource takes an unqualified resource and returns a Group qualified GroupResource\nfunc Resource(resource string) schema.", "GroupResource {\n\treturn SchemeGroupVersion.", "WithResource(resource).GroupResource()\n}\n\nvar (\n\t// TODO: move SchemeBuilder with zz_generated.deepcopy.go to k8s.io/api.", "\n\t// localSchemeBuilder and AddToScheme will stay in k8s.io/kubernetes.", "\n\tSchemeBuilder = runtime.", "NewSchemeBuilder(addKnownTypes)\n\tlocalSchemeBuilder = &SchemeBuilder\n\tAddToScheme = localSchemeBuilder.", "AddToScheme\n)\n\n// Adds the list of known types to the given scheme.", "\nfunc addKnownTypes(scheme *runtime.", "Scheme) error {\n\tscheme.", "AddKnownTypes(SchemeGroupVersion,\n\t\t&NetworkPolicy{},\n\t\t&NetworkPolicyList{},\n\t)\n\n\tmetav1.AddToGroupVersion(scheme, SchemeGroupVersion)\n\treturn nil\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0008050845353864133, 0.0005655200802721083, 0.0005397882778197527, 0.0005530848284251988, 0.0007873054128140211, 0.000722979661077261, 0.0011892664479091763, 0.001108246622607112, 0.0026066331192851067, 0.0007975434418767691, 0.0007893001893535256, 0.0006632088916376233, 0.001125530106946826, 0.0014506549341604114, 0.002000673208385706 ]
0.001047
15
[ "The 37-year-old actress, who shaved her head to play the role of Furiosa in the latest installment of Miller's post-apocalyptic saga Mad Max: Fury Road, joins the company of actresses like Natalie Portman, Demi Moore and Cate Blanchett who also shaved their heads for respective movie roles.", "\n\nTheron's personal hairdresser, Leslie Fremar, spoke out about the actress' new look: \"Charlize takes her trade very seriously. ", "She's not afraid to put herself out there and transform into the character she’s playing. ", "And let's be honest, she's so beautiful.\"" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0021922520827502012, 0.0007127390126697719, 0.0010566229466348886, 0.0013855926226824522 ]
0.001337
4
[ "822 F.2d 57\n*Prophetv.", "Lynaugh\n86-2623\nUnited States Court of Appeals,Fifth Circuit.", "\n6/16/87\n\n1\nS.D.Tex.", "\n\nAFFIRMED\n\n2\n---------------\n\n\n\n* Fed.", "R.App.", "P. 34(a); 5th Cir.", "R. 34.2.", "\n\n\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0009783994173631072, 0.0008842615643516183, 0.0008078341488726437, 0.0009385102894157171, 0.0009975661523640156, 0.0008306369418278337, 0.0009902417659759521, 0.001995444530621171 ]
0.001053
8
[ "Obesity in older adults is associated with an increased prevalence and incidence of pain.", "\nCross-sectional studies suggest an association between BMI and pain. ", "This prospective study investigated the associations of measured BMI and waist circumference with prevalent and incident pain in older adults. ", "The study included participants of the Longitudinal Aging Study Amsterdam, aged 55-85 years at baseline (1992-1993). ", "Pain was assessed using a subscale of the Nottingham Health Profile at baseline (N = 2,000), after 3 years (N = 1,478) and 6 years (N = 1,271) of follow-up. ", "The overall prevalence of pain was 32.7% at baseline and increased significantly with higher quartiles of BMI or waist circumference. ", "After adjustment for age, education, depression, smoking, physical activity, and chronic diseases, multiple logistic regression analyses showed odds ratios (ORs (95% confidence interval)) for prevalent pain of 2.16 (1.32-3.54) in men and 1.93 (1.26-2.95) in women comparing the highest with the lowest quartile of BMI. ", "Of the participants without pain at baseline, those in the highest quartile of BMI had a twofold increased odds for incident pain after 3 years of follow-up. ", "After 6 years of follow-up, ORs for incident pain were 2.34 (1.17-4.72) in men and 2.78 (1.36-5.70) in women. ", "Additional adjustment for weight change did not change these associations. ", "Similar results were found for the associations between waist circumference and pain. ", "Exploring the reversed causal relation, analyses showed no significant associations between prevalent pain and weight gain. ", "In conclusion, the prevalence of pain is higher among obese older men and women compared to their normal-weight peers. ", "Furthermore, obese older adults are at increased odds to develop pain." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0032236056867986917, 0.0010703355073928833, 0.0009569177636876702, 0.0005519255064427853, 0.00066520762629807, 0.001055160304531455, 0.0008532171486876905, 0.0007600768003612757, 0.0010329295182600617, 0.0005750174168497324, 0.0020980751141905785, 0.0006614855956286192, 0.060420531779527664, 0.41862747073173523 ]
0.035182
14
[ "German Chancellor Angela Merkel declared that multiculturalism has \"utterly failed,\" adding that it was an illusion to think Germans and foreign workers could \"live happily side by side.\" ", "The failure of multiculturalism is also seen in Denmark, Sweden, the United Kingdom, France, Belgium and other European countries. ", "Immigrants coming from Africa and the Middle East refuse to assimilate and instead seek to import the failed cultures they fled.", "\n\nLeftist diversity advocates and multiculturalists are right to argue that people of all races, religions and cultures should be equal in the eyes of the law. ", "But their argument borders on idiocy when they argue that one set of cultural values cannot be judged superior to another and that to do so is Eurocentrism.", "\n\nThat's unbridled nonsense. ", "Ask a diversity/multiculturalism advocate: Is forcible female genital mutilation, as practiced in nearly 30 sub-Saharan African and Middle Eastern countries, a morally equivalent cultural value? ", "Slavery is practiced in northern Sudan. ", "In most of the Middle East, there are numerous limits placed on women, such as prohibitions on driving, employment and education. ", "Under Islamic law, in some countries, female adulterers face death by stoning, and thieves are punished by having their hand severed. ", "In some African and Middle Eastern countries, homosexuality is a crime, in some cases punishable by death. ", "Are all these cultural values morally equivalent to those of the West?", "\n\nThe vital achievement of the West was the concept of individual rights, which saw its birth with the Magna Carta in 1215. ", "The idea emerged that individuals have certain inalienable rights. ", "Individuals do not exist to serve government; governments exist to protect their rights. ", "But it was not until the 19th century that ideas of liberty received broad recognition. ", "In the West, it was mostly through the works of British philosophers, such as John Locke, David Hume, Adam Smith and John Stuart Mill.", "\n\nPersonal liberty implies toleration of differences among people, whether those differences are racial, sexual, ideological or political. ", "Liberty also implies a willingness to permit others who disagree with you to go their separate ways. ", "This is not the vision of the new immigrants. ", "In some parts of Britain, Christians are threatened with violence for merely handing out Bibles. ", "Trying to convert Muslims to Christianity is seen as a hate crime. ", "Women are accosted by Muslim men for \"improper\" dress. ", "Many women are sexually assaulted. ", "In many European countries, \"no-go zones\" — where civil authorities will not enter — in which Shariah is practiced have been established. ", "According to the Express, \"London, Paris, Stockholm and Berlin are among the major European cities that feature on a bombshell list of 900 lawless zones with large immigrant populations.\"", "\n\nBoth in Europe and in the U.S., multiculturalism is a leftist elitist vision with its roots in academia. ", "The intellectual elite, courts and government agencies push an agenda that is anything but a defense of individual rights, freedom from conformity and a live-and-let-live philosophy. ", "Instead, multiculturalism/diversity is an agenda for all kinds of conformity — conformity in ideas, actions and speech. ", "It calls for re-education programs where diversity managers indoctrinate students, faculty members, employees, managers and executives on what's politically correct thinking. ", "Part of that lesson is nonjudgmentalism, where one is taught that one lifestyle is just as worthy as another and all cultures and their values are morally equivalent.", "\n\nWestern values are superior to all others. ", "But one need not be a Westerner to hold Western values. ", "A person can be Chinese, Japanese, Jewish, African or Arab and hold Western values. ", "By the way, it is no accident that Western values of reason and individual rights have produced unprecedented health, life expectancy, wealth and comfort for the ordinary person. ", "There's an indisputable positive relationship between liberty and standards of living. ", "There is also indisputable evidence that we in the West are unwilling to defend ourselves from barbarians. ", "Just look at our response to the recent Orlando massacre, in which we've focused our energies on guns rather than on terrorists.", "\n\nWalter E. Williams is a professor of economics at George Mason University. ", "To find out more about Walter E. Williams and read features by other Creators Syndicate writers and cartoonists, visit the Creators Syndicate webpage at www.creators.com.", "\n\nCOPYRIGHT 2016 CREATORS.COM" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0009149854304268956, 0.0007389512029476464, 0.0020234922412782907, 0.0009366499143652618, 0.10618166625499725, 0.1709110289812088, 0.01658334583044052, 0.003548829583451152, 0.001330064027570188, 0.5826557874679565, 0.36863428354263306, 0.0008790251449681818, 0.0006222602096386254, 0.0007198196253739297, 0.0009377951500937343, 0.0006511472165584564, 0.0005914808716624975, 0.0012482455931603909, 0.0006291619502007961, 0.0008055653306655586, 0.018012050539255142, 0.10096864402294159, 0.5314133167266846, 0.9407926797866821, 0.0006608419353142381, 0.0006290699820965528, 0.0006569758406840265, 0.0008158723940141499, 0.0006571824778802693, 0.0005947567988187075, 0.0012263748794794083, 0.0008580265566706657, 0.0012148786336183548, 0.0015043097082525492, 0.0006448811618611217, 0.0005830400623381138, 0.001868002349510789, 0.0014547609025612473, 0.0009671130683273077, 0.0005739196203649044, 0.0007391208782792091 ]
0.06996
41
[ "/*================================================================================\r\n code generated by: java2cpp\r\n author: Zoran Angelov, mailto://baldzar@gmail.com\r\n class: android.widget.", "Spinner\r\n================================================================================*/\r\n\r\n\r\n#ifndef J2CPP_INCLUDE_IMPLEMENTATION\r\n\r\n#ifndef J2CPP_ANDROID_WIDGET_SPINNER_HPP_DECL\r\n#define J2CPP_ANDROID_WIDGET_SPINNER_HPP_DECL\r\n\r\n\r\nnamespace j2cpp { namespace android { namespace widget { class AdapterView; } } }\r\nnamespace j2cpp { namespace android { namespace widget { class AbsSpinner; } } }\r\nnamespace j2cpp { namespace android { namespace widget { namespace AdapterView_ { class OnItemClickListener; } } } }\r\nnamespace j2cpp { namespace android { namespace content { class DialogInterface; } } }\r\nnamespace j2cpp { namespace android { namespace content { namespace DialogInterface_ { class OnClickListener; } } } }\r\nnamespace j2cpp { namespace android { namespace content { class Context; } } }\r\nnamespace j2cpp { namespace android { namespace util { class AttributeSet; } } }\r\nnamespace j2cpp { namespace android { namespace view { class View; } } }\r\nnamespace j2cpp { namespace android { namespace view { class ViewGroup; } } }\r\nnamespace j2cpp { namespace android { namespace view { class ViewManager; } } }\r\nnamespace j2cpp { namespace android { namespace view { namespace accessibility { class AccessibilityEventSource; } } } }\r\nnamespace j2cpp { namespace android { namespace view { class ViewParent; } } }\r\nnamespace j2cpp { namespace android { namespace graphics { namespace drawable { namespace Drawable_ { class Callback; } } } } }\r\nnamespace j2cpp { namespace java { namespace lang { class CharSequence; } } }\r\nnamespace j2cpp { namespace java { namespace lang { class Object; } } }\r\n\r\n\r\n#include <android/content/Context.hpp>\r\n#include <android/content/DialogInterface.hpp>\r\n#include <android/graphics/drawable/Drawable.hpp>\r\n#include <android/util/AttributeSet.hpp>\r\n#include <android/view/View.hpp>\r\n#include <android/view/ViewGroup.hpp>\r\n#include <android/view/ViewManager.hpp>\r\n#include <android/view/ViewParent.hpp>\r\n#include <android/view/accessibility/AccessibilityEventSource.hpp>\r\n#include <android/widget/AbsSpinner.hpp>\r\n#include <android/widget/AdapterView.hpp>\r\n#include <java/lang/CharSequence.hpp>\r\n#include <java/lang/Object.hpp>\r\n\r\n\r\nnamespace j2cpp {\r\n\r\nnamespace android { namespace widget {\r\n\r\n\tclass Spinner;\r\n\tclass Spinner\r\n\t\t: public object<Spinner>\r\n\t{\r\n\tpublic:\r\n\r\n\t\tJ2CPP_DECLARE_CLASS\r\n\r\n\t\tJ2CPP_DECLARE_METHOD(0)\r\n\t\tJ2CPP_DECLARE_METHOD(1)\r\n\t\tJ2CPP_DECLARE_METHOD(2)\r\n\t\tJ2CPP_DECLARE_METHOD(3)\r\n\t\tJ2CPP_DECLARE_METHOD(4)\r\n\t\tJ2CPP_DECLARE_METHOD(5)\r\n\t\tJ2CPP_DECLARE_METHOD(6)\r\n\t\tJ2CPP_DECLARE_METHOD(7)\r\n\t\tJ2CPP_DECLARE_METHOD(8)\r\n\t\tJ2CPP_DECLARE_METHOD(9)\r\n\t\tJ2CPP_DECLARE_METHOD(10)\r\n\t\tJ2CPP_DECLARE_METHOD(11)\r\n\r\n\t\texplicit Spinner(jobject jobj)\r\n\t\t: object<Spinner>(jobj)\r\n\t\t{\r\n\t\t}\r\n\r\n\t\toperator local_ref<android::widget::AdapterView>() const;\r\n\t\toperator local_ref<android::widget::AbsSpinner>() const;\r\n\t\toperator local_ref<android::content::DialogInterface_::OnClickListener>() const;\r\n\t\toperator local_ref<android::view::View>() const;\r\n\t\toperator local_ref<android::view::ViewGroup>() const;\r\n\t\toperator local_ref<android::view::ViewManager>() const;\r\n\t\toperator local_ref<android::view::accessibility::AccessibilityEventSource>() const;\r\n\t\toperator local_ref<android::view::ViewParent>() const;\r\n\t\toperator local_ref<android::graphics::drawable::Drawable_::Callback>() const;\r\n\t\toperator local_ref<java::lang::Object>() const;\r\n\r\n\r\n\t\tSpinner(local_ref< android::content::Context > const&);\r\n\t\tSpinner(local_ref< android::content::Context > const&, local_ref< android::util::AttributeSet > const&);\r\n\t\tSpinner(local_ref< android::content::Context > const&, local_ref< android::util::AttributeSet > const&, jint);\r\n\t\tjint getBaseline();\r\n\t\tvoid setOnItemClickListener(local_ref< android::widget::AdapterView_::OnItemClickListener > const&);\r\n\t\tjboolean performClick();\r\n\t\tvoid onClick(local_ref< android::content::DialogInterface > const&, jint);\r\n\t\tvoid setPrompt(local_ref< java::lang::CharSequence > const&);\r\n\t\tvoid setPromptId(jint);\r\n\t\tlocal_ref< java::lang::CharSequence > getPrompt();\r\n\t}; //class Spinner\r\n\r\n} //namespace widget\r\n} //namespace android\r\n\r\n} //namespace j2cpp\r\n\r\n#endif //J2CPP_ANDROID_WIDGET_SPINNER_HPP_DECL\r\n\r\n#else //J2CPP_INCLUDE_IMPLEMENTATION\r\n\r\n#ifndef J2CPP_ANDROID_WIDGET_SPINNER_HPP_IMPL\r\n#define J2CPP_ANDROID_WIDGET_SPINNER_HPP_IMPL\r\n\r\nnamespace j2cpp {\r\n\r\n\r\n\r\nandroid::widget::Spinner::operator local_ref<android::widget::AdapterView>() const\r\n{\r\n\treturn local_ref<android::widget::AdapterView>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<android::widget::AbsSpinner>() const\r\n{\r\n\treturn local_ref<android::widget::AbsSpinner>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<android::content::DialogInterface_::OnClickListener>() const\r\n{\r\n\treturn local_ref<android::content::DialogInterface_::OnClickListener>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<android::view::View>() const\r\n{\r\n\treturn local_ref<android::view::View>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<android::view::ViewGroup>() const\r\n{\r\n\treturn local_ref<android::view::ViewGroup>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<android::view::ViewManager>() const\r\n{\r\n\treturn local_ref<android::view::ViewManager>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<android::view::accessibility::AccessibilityEventSource>() const\r\n{\r\n\treturn local_ref<android::view::accessibility::AccessibilityEventSource>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<android::view::ViewParent>() const\r\n{\r\n\treturn local_ref<android::view::ViewParent>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<android::graphics::drawable::Drawable_::Callback>() const\r\n{\r\n\treturn local_ref<android::graphics::drawable::Drawable_::Callback>(get_jobject());\r\n}\r\n\r\nandroid::widget::Spinner::operator local_ref<java::lang::Object>() const\r\n{\r\n\treturn local_ref<java::lang::Object>(get_jobject());\r\n}\r\n\r\n\r\nandroid::widget::Spinner::Spinner(local_ref< android::content::Context > const &a0)\r\n: object<android::widget::Spinner>(\r\n\tcall_new_object<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(0),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(0)\r\n\t>(a0)\r\n)\r\n{\r\n}\r\n\r\n\r\n\r\nandroid::widget::Spinner::Spinner(local_ref< android::content::Context > const &a0, local_ref< android::util::AttributeSet > const &a1)\r\n: object<android::widget::Spinner>(\r\n\tcall_new_object<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(1),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(1)\r\n\t>(a0, a1)\r\n)\r\n{\r\n}\r\n\r\n\r\n\r\nandroid::widget::Spinner::Spinner(local_ref< android::content::Context > const &a0, local_ref< android::util::AttributeSet > const &a1, jint a2)\r\n: object<android::widget::Spinner>(\r\n\tcall_new_object<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(2),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(2)\r\n\t>(a0, a1, a2)\r\n)\r\n{\r\n}\r\n\r\n\r\njint android::widget::Spinner::getBaseline()\r\n{\r\n\treturn call_method<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(3),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(3), \r\n\t\tjint\r\n\t>(get_jobject());\r\n}\r\n\r\n\r\nvoid android::widget::Spinner::setOnItemClickListener(local_ref< android::widget::AdapterView_::OnItemClickListener > const &a0)\r\n{\r\n\treturn call_method<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(5),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(5), \r\n\t\tvoid\r\n\t>(get_jobject(), a0);\r\n}\r\n\r\n\r\njboolean android::widget::Spinner::performClick()\r\n{\r\n\treturn call_method<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(7),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(7), \r\n\t\tjboolean\r\n\t>(get_jobject());\r\n}\r\n\r\nvoid android::widget::Spinner::onClick(local_ref< android::content::DialogInterface > const &a0, jint a1)\r\n{\r\n\treturn call_method<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(8),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(8), \r\n\t\tvoid\r\n\t>(get_jobject(), a0, a1);\r\n}\r\n\r\nvoid android::widget::Spinner::setPrompt(local_ref< java::lang::CharSequence > const &a0)\r\n{\r\n\treturn call_method<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(9),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(9), \r\n\t\tvoid\r\n\t>(get_jobject(), a0);\r\n}\r\n\r\nvoid android::widget::Spinner::setPromptId(jint a0)\r\n{\r\n\treturn call_method<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(10),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(10), \r\n\t\tvoid\r\n\t>(get_jobject(), a0);\r\n}\r\n\r\nlocal_ref< java::lang::CharSequence > android::widget::Spinner::getPrompt()\r\n{\r\n\treturn call_method<\r\n\t\tandroid::widget::Spinner::J2CPP_CLASS_NAME,\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_NAME(11),\r\n\t\tandroid::widget::Spinner::J2CPP_METHOD_SIGNATURE(11), \r\n\t\tlocal_ref< java::lang::CharSequence >\r\n\t>(get_jobject());\r\n}\r\n\r\n\r\nJ2CPP_DEFINE_CLASS(android::widget::Spinner,\"android/widget/Spinner\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,0,\"<init>\",\"(Landroid/content/Context;)V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,1,\"<init>\",\"(Landroid/content/Context;Landroid/util/AttributeSet;)V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,2,\"<init>\",\"(Landroid/content/Context;Landroid/util/AttributeSet;I)V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,3,\"getBaseline\",\"()I\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,4,\"onDetachedFromWindow\",\"()V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,5,\"setOnItemClickListener\",\"(Landroid/widget/AdapterView$OnItemClickListener;)V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,6,\"onLayout\",\"(ZIIII)V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,7,\"performClick\",\"()Z\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,8,\"onClick\",\"(Landroid/content/DialogInterface;I)V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,9,\"setPrompt\",\"(Ljava/lang/CharSequence;)V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,10,\"setPromptId\",\"(I)V\")\r\nJ2CPP_DEFINE_METHOD(android::widget::Spinner,11,\"getPrompt\",\"()Ljava/lang/CharSequence;\")\r\n\r\n} //namespace j2cpp\r\n\r\n#endif //J2CPP_ANDROID_WIDGET_SPINNER_HPP_IMPL\r\n\r\n#endif //J2CPP_INCLUDE_IMPLEMENTATION\r\n" ]
{ "pile_set_name": "Github" }
[ 0.0019858379382640123, 0.007175468374043703 ]
0.004581
2
[ "-----------------------------------------------------------------------------\n--\n-- GHCi's :ctags and :etags commands\n--\n-- (c) The GHC Team 2005-2007\n--\n-----------------------------------------------------------------------------\n\n{-# OPTIONS_GHC -fno-warn-name-shadowing #-}\nmodule Eta.", "REPL.UI.Tags (\n createCTagsWithLineNumbersCmd,\n createCTagsWithRegExesCmd,\n createETagsFileCmd\n) where\n\nimport Eta.", "Utils.", "Exception\nimport Eta.", "Main.", "GHC as GHC\nimport Eta.", "REPL.UI.Monad\nimport Eta.", "Utils.", "Outputable\n\n-- ToDo: figure out whether we need these, and put something appropriate\n-- into the GHC API instead\nimport Eta.", "BasicTypes.", "Name (nameOccName)\nimport Eta.", "BasicTypes.", "OccName (pprOccName)\nimport Eta.", "BasicTypes.", "ConLike\nimport Eta.", "Utils.", "MonadUtils\n\nimport Data.", "Function\nimport Data.", "Maybe\nimport Data.", "Ord\nimport Eta.", "Main.", "DriverPhases\nimport Eta.", "Utils.", "Panic\nimport Data.", "List\nimport Control.", "Monad\nimport System.", "Directory\nimport System.", "IO\nimport System.", "IO.Error\n\n-----------------------------------------------------------------------------\n-- create tags file for currently loaded modules.", "\n\ncreateCTagsWithLineNumbersCmd, createCTagsWithRegExesCmd,\n createETagsFileCmd :: String -> GHCi ()\n\ncreateCTagsWithLineNumbersCmd \"\" =\n ghciCreateTagsFile CTagsWithLineNumbers \"tags\"\ncreateCTagsWithLineNumbersCmd file =\n ghciCreateTagsFile CTagsWithLineNumbers file\n\ncreateCTagsWithRegExesCmd \"\" =\n ghciCreateTagsFile CTagsWithRegExes \"tags\"\ncreateCTagsWithRegExesCmd file =\n ghciCreateTagsFile CTagsWithRegExes file\n\ncreateETagsFileCmd \"\" = ghciCreateTagsFile ETags \"TAGS\"\ncreateETagsFileCmd file = ghciCreateTagsFile ETags file\n\ndata TagsKind = ETags | CTagsWithLineNumbers | CTagsWithRegExes\n\nghciCreateTagsFile :: TagsKind -> FilePath -> GHCi ()\nghciCreateTagsFile kind file = do\n createTagsFile kind file\n\n-- ToDo:\n-- - remove restriction that all modules must be interpreted\n-- (problem: we don't know source locations for entities unless\n-- we compiled the module.", "\n--\n-- - extract createTagsFile so it can be used from the command-line\n-- (probably need to fix first problem before this is useful).", "\n--\ncreateTagsFile :: TagsKind -> FilePath -> GHCi ()\ncreateTagsFile tagskind tagsFile = do\n graph <- GHC.getModuleGraph\n mtags <- mapM listModuleTags (map GHC.ms_mod $ GHC.mgModSummaries graph)\n either_res <- liftIO $ collateAndWriteTags tagskind tagsFile $ concat mtags\n case either_res of\n Left e -> liftIO $ hPutStrLn stderr $ ioeGetErrorString e\n Right _ -> return ()\n\n\nlistModuleTags :: GHC.Module -> GHCi [TagInfo]\nlistModuleTags m = do\n is_interpreted <- GHC.moduleIsInterpreted m\n -- should we just skip these?", "\n when (not is_interpreted) $\n let mName = GHC.moduleNameString (GHC.moduleName m) in\n throwGhcException (CmdLineError (\"module '\" ++ mName ++ \"' is not interpreted\"))\n mbModInfo <- GHC.getModuleInfo m\n case mbModInfo of\n Nothing -> return []\n Just mInfo -> do\n dflags <- getDynFlags\n mb_print_unqual <- GHC.mkPrintUnqualifiedForModule mInfo\n let unqual = fromMaybe GHC.alwaysQualify mb_print_unqual\n let names = fromMaybe [] $GHC.modInfoTopLevelScope mInfo\n let localNames = filter ((m==) . ", "nameModule) names\n mbTyThings <- mapM GHC.lookupName localNames\n return $! [ ", "tagInfo dflags unqual exported kind name realLoc\n | tyThing <- catMaybes mbTyThings\n , let name = getName tyThing\n , let exported = GHC.modInfoIsExportedName mInfo name\n , let kind = tyThing2TagKind tyThing\n , let loc = srcSpanStart (nameSrcSpan name)\n , RealSrcLoc realLoc <- [loc]\n ]\n\n where\n tyThing2TagKind (AnId _) = 'v'\n tyThing2TagKind (AConLike RealDataCon{}) = 'd'\n tyThing2TagKind (AConLike PatSynCon{}) = 'p'\n tyThing2TagKind (ATyCon _) = 't'\n tyThing2TagKind (ACoAxiom _) = 'x'\n\n\ndata TagInfo = TagInfo\n { tagExported :: Bool -- is tag exported\n , tagKind :: Char -- tag kind\n , tagName :: String -- tag name\n , tagFile :: String -- file name\n , tagLine :: Int -- line number\n , tagCol :: Int -- column number\n , tagSrcInfo :: Maybe (String,Integer) -- source code line and char offset\n }\n\n\n-- get tag info, for later translation into Vim or Emacs style\ntagInfo :: DynFlags -> PrintUnqualified -> Bool -> Char -> Name -> RealSrcLoc\n -> TagInfo\ntagInfo dflags unqual exported kind name loc\n = TagInfo exported kind\n (showSDocForUser dflags unqual $ pprOccName (nameOccName name))\n (showSDocForUser dflags unqual $ ftext (srcLocFile loc))\n (srcLocLine loc) (srcLocCol loc) Nothing\n\n-- throw an exception when someone tries to overwrite existing source file (fix for #10989)\nwriteTagsSafely :: FilePath -> String -> IO ()\nwriteTagsSafely file str = do\n dfe <- doesFileExist file\n if dfe && isSourceFilename file\n then throwGhcException (CmdLineError (file ++ \" is existing source file. \" ", "++\n \"Please specify another file name to store tags data\"))\n else writeFile file str\n\ncollateAndWriteTags :: TagsKind -> FilePath -> [TagInfo] -> IO (Either IOError ())\n-- ctags style with the Ex expression being just the line number, Vim et al\ncollateAndWriteTags CTagsWithLineNumbers file tagInfos = do\n let tags = unlines $ sort $ map showCTag tagInfos\n tryIO (writeTagsSafely file tags)\n\n-- ctags style with the Ex expression being a regex searching the line, Vim et al\ncollateAndWriteTags CTagsWithRegExes file tagInfos = do -- ctags style, Vim et al\n tagInfoGroups <- makeTagGroupsWithSrcInfo tagInfos\n let tags = unlines $ sort $ map showCTag $concat tagInfoGroups\n tryIO (writeTagsSafely file tags)\n\ncollateAndWriteTags ETags file tagInfos = do -- etags style, Emacs/XEmacs\n tagInfoGroups <- makeTagGroupsWithSrcInfo $filter tagExported tagInfos\n let tagGroups = map processGroup tagInfoGroups\n tryIO (writeTagsSafely file $ concat tagGroups)\n\n where\n processGroup [] = throwGhcException (CmdLineError \"empty tag file group??\")", "\n processGroup group@(tagInfo:_) =\n let tags = unlines $ map showETag group in\n \"\\x0c\\n\" ++ tagFile tagInfo ++ \",\" ++ show (length tags) ++ \"\\n\" ++ tags\n\n\nmakeTagGroupsWithSrcInfo :: [TagInfo] -> IO [[TagInfo]]\nmakeTagGroupsWithSrcInfo tagInfos = do\n let groups = groupBy ((==) `on` tagFile) $ sortBy (comparing tagFile) tagInfos\n mapM addTagSrcInfo groups\n\n where\n addTagSrcInfo [] = throwGhcException (CmdLineError \"empty tag file group??\")", "\n addTagSrcInfo group@(tagInfo:_) = do\n file <- readFile $tagFile tagInfo\n let sortedGroup = sortBy (comparing tagLine) group\n return $ perFile sortedGroup 1 0 $ lines file\n\n perFile allTags@(tag:tags) cnt pos allLs@(l:ls)\n | tagLine tag > cnt =\n perFile allTags (cnt+1) (pos+fromIntegral(length l)) ls\n | tagLine tag == cnt =\n tag{ tagSrcInfo = Just(l,pos) } : perFile tags cnt pos allLs\n perFile _ _ _ _ = []\n\n\n-- ctags format, for Vim et al\nshowCTag :: TagInfo -> String\nshowCTag ti =\n tagName ti ++ \"\\t\" ++ tagFile ti ++ \"\\t\" ++ tagCmd ++ \";\\\"\\t\" ++\n tagKind ti : ( if tagExported ti then \"\" else \"\\tfile:\" )\n\n where\n tagCmd =\n case tagSrcInfo ti of\n Nothing -> show $tagLine ti\n Just (srcLine,_) -> \"/^\"++ foldr escapeSlashes [] srcLine ++\"$/\"\n\n where\n escapeSlashes '/' r = '\\\\' : '/' : r\n escapeSlashes '\\\\' r = '\\\\' : '\\\\' : r\n escapeSlashes c r = c : r\n\n\n-- etags format, for Emacs/XEmacs\nshowETag :: TagInfo -> String\nshowETag TagInfo{ tagName = tag, tagLine = lineNo, tagCol = colNo,\n tagSrcInfo = Just (srcLine,charPos) }\n = take (colNo - 1) srcLine ++ tag\n ++ \"\\x7f\" ++ tag\n ++ \"\\x01\" ++ show lineNo\n ++ \",\" ++ show charPos\nshowETag _ = throwGhcException (CmdLineError \"missing source file info in showETag\")\n" ]
{ "pile_set_name": "Github" }
[ 0.00127993815112859, 0.0007365948404185474, 0.0009621682111173868, 0.0006767109734937549, 0.0008945554727688432, 0.0007262566359713674, 0.0008164903265424073, 0.0009621682111173868, 0.0006108551751822233, 0.000695869151968509, 0.0006534022395499051, 0.000695869151968509, 0.0008551974897272885, 0.000695869151968509, 0.0007484176312573254, 0.0009621682111173868, 0.0007173714111559093, 0.0007126449490897357, 0.0006354949437081814, 0.0007271479698829353, 0.0008945554727688432, 0.0009100041352212429, 0.0009621682111173868, 0.0009311935282312334, 0.0007574654300697148, 0.0006524281343445182, 0.0006740457029081881, 0.0007197671802714467, 0.0013301533181220293, 0.001941222813911736, 0.0006995618459768593, 0.0072290292009711266, 0.010627252981066704, 0.0013462994247674942, 0.005410183221101761, 0.0018950783414766192, 0.0028469921089708805, 0.007331296801567078 ]
0.001656
38
[ "return {\r\n\tinclude = function()\r\n\t\tincludedirs { \"../vendor/msgpack-c/src\", \"../vendor/msgpack-c/include/\", \"deplibs/include/msgpack-c/\" }\r\n\tend,\r\n\r\n\trun = function()\r\n\t\ttargetname \"msgpack-c\"\r\n\t\tlanguage \"C++\"\r\n\t\tkind \"StaticLib\"\r\n\r\n\t\tfiles\r\n\t\t{\r\n\t\t\t\"../vendor/msgpack-c/include/**.hpp\",\r\n\t\t\t\"../vendor/msgpack-c/src/*.c\" \r\n\t\t}\r\n\tend\r\n}" ]
{ "pile_set_name": "Github" }
[ 0.0009492338285781443 ]
0.000949
1
[ "In many industrial and commercial buildings, the electrical wiring is often exposed and therefore subject to potential damage. ", "To reduce the chances of inadvertent damage to these electrical wires, a flexible metal cladding is typically applied to these electrical wires. ", "The cladding usually takes the form of a spirally-wrapped metal housing which is flexible and which has corrugations on the outer surface.", "\nIn use, the metal cladding provides significant protection against damage to the electrical wires therein. ", "However, the metal clad cable, while solving one problem, introduces two additional factors which must be dealt with. ", "First, it is important to ground the metal clad cable to avoid short circuits and electrical accidents. ", "In addition, the cable is somewhat heavy and therefore needs a strong and durable connector at its end where the internal electrical wires are actually coupled to an electrical junction box.", "\nMany attempts have been made in the past to provide connectors for metal clad cable that are also capable of grounding the cable; however, they have numerous disadvantages. ", "For one thing, many of these prior devices cannot be reused once the metal clad cable is coupled thereto and thus additional costs are involved to provide additional connectors or internal parts. ", "Second, many of the prior devices cannot be easily reused or disconnected from the metal clad cable. ", "Finally, many of these prior metal clad connectors are complex to make, assemble, use and reuse.", "\nExamples of these prior connectors are disclosed in the following U.S. Pat. ", "Nos.: ", "2,816,949 to Curtiss; 3,567,843 to Collins et al; 4,022,966 to Gajajiva; 4,046,451 to Juds et al; 4,273,405 to Law; 4,490,576 to Bolante et al; 4,515,991 to Hutchison; 4,549,037 to Bawa et al; 4,549,755 to Kot et al; and 4,692,562 to Nattel.", "\nThus, there is a continuing need to provide improved metal clad cable connectors." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0007285490864887834, 0.000774789834395051, 0.0006702032405883074, 0.000623613887000829, 0.0006084684282541275, 0.000721325573977083, 0.0006068308721296489, 0.0006163647049106658, 0.0006609672564081848, 0.0006195796886458993, 0.0006487212376669049, 0.0007569094304926693, 0.0006932594114914536, 0.0010688768234103918, 0.0006112406263127923 ]
0.000694
15
[ "Browsing: Indian Election Updates\n\nLok Sabha Election 2019 Updates: Both the SP and BSP might contest for the 37 seats . ", "They will leave 2 seats for RLD and Congress. ", "The other seats will be left for other smaller parties. ", "However, resolutions must be meet before this great announcement. ", "Congress will be left out of the alliance because they…\n\nDuring the previous elections in 2008 and 2013; the vote share gained by the Congress and BJP was almost similar. ", "Congress garnered around forty percent of the total votes cast in Chhattisgarh Assembly Elections In 2008; during the 2013 elections, they maintained their share of total votes cast though they increased it by a narrow…\n\nK Chandrasekhar Rao is planning to hold early elections in Telangana. ", "According to a report, 119 seats are to be filled up through this election. ", "However, this election was due on May 2019, but K Chandrasekhar Rao is thinking ahead of it. ", "He is head of TRS party and has been thinking and seeking advice…\n\nBharatiya Janata Party, with its dominance, is making way into Telangana as the 2019 elections are edging closer. ", "BJP, which was in alliance with the TDP is daring to go solo and garner more seats, almost double of what they had in the current government. ", "BJP’s President, Amit Shah who assumed the helm of BJP…\n\nThe 2014 elections were a cakewalk for the BJP government. ", "The Modi Charm as was it called worked throughout the nation which was tired of the Congress government’s inability to make decisions, lack of decent governing, and the innumerable scams that came. ", "However, it seems like it would not last long and the 2019 Elections…" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005777713959105313, 0.0006848853663541377, 0.0005995415849611163, 0.0005659352755174041, 0.000625276705250144, 0.0006142514757812023, 0.0006266165291890502, 0.0006701438687741756, 0.0006424867897294462, 0.0007254410884343088, 0.001001473399810493, 0.012980767525732517, 0.0006851840298622847 ]
0.001615
13
[ "Q:\n\nHoney-glazed gammon (ham) - What to serve with it?", "\n\nI've got down a pretty good honey/whiskey glazed gammon but previously I've always used it cold in sandwhiches or on meat platters.", "\nThis evening, however, I am planning on serving the joint hot as part of a main meal.", "\nI'm out of inspiration regarding what sides to serve with it. ", " I was going to go with a selection of steamed vegetables but would these also need a sauce/gravy?", "\nSo, in short, what would work well with hot gammon with a sweet glaze?", "\nI know we don't like questions that solicit opinion so I'll add that I need some proven pairings with reasons why the different flavours, sweetness, acidity etc of the ingredients work.", "\n\nA:\n\nIn Ireland boiled or glazed ham is a staple. ", " Traditionally it's had with cut up cabbage (ideally you would cook the cabbage in the same water the ham was boiled in as this gives it lovely flavour) but you could just cut it up and pan fry it with a little butter. ", " Normally it would be served with boiled floury potatoes. ", " Traditionally (in Ireland) you wouldn't have a sauce with it but a parsely sauce (as stated in the other reply would be lovely) or simply serve with some strong mustard or a brown sharp sauce such as HP. ", " \nYou could also shred the ham and serve it with noodles in a hot broth with some shredded cabbage and other vegetables.", "\nThe ham is going to be centre of attention - salty, rich with a sweetness. ", " The cabbage and potato are happy bedfellows as the cabbage cuts through the saltyness/sweetness. ", " You don't want strong flavours competing with the ham and neither cabbage or potato will.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006394909578375518, 0.003067823825404048, 0.000625593529548496, 0.0005315131857059896, 0.0009549609967507422, 0.0006956632132641971, 0.0006533321575261652, 0.0007327169878408313, 0.0009566365042701364, 0.0005803541280329227, 0.0006998111493885517, 0.007641660049557686, 0.0006951452814973891, 0.0009819166734814644, 0.0014638241846114397, 0.001995444530621171 ]
0.001432
16
[ "Andrographolide and kalmegh (Andrographis paniculata) extract: effect on intestinal brush-border membrane-bound hydrolases.", "\nOral (p.o.) ", "administration of a single dose of kalmegh leaf extract (KE; 0.5 g/kg and 1.0 g/kg) or andrographolide (A; 5 mg/kg and 10 mg/kg) to adult male albino rats (100-120 g) produced a dose-related and time-dependent characteristic activation of brush-border membrane-bound hydrolases, viz. ", "lactase, maltase and sucrase in three regions of small intestine (viz. ", "duodenum, jejunum and ileum). ", "The maximum stimulation of these disaccharidases was obtained at 6 hr of either KE or A administration. ", "Further, it was also noted that the extent of activation of the disaccharidases with KE or A, both at higher and lower doses, followed the order: (a) Maltase greater than sucrase greater than lactase in duodenum and (b) Maltase greater than lactase greater than sucrase in jejunum and ileum. ", "Long term administration (for 7, 15 and 30 consecutive days) of either KE (500 p.o.) ", "or A (5 mg/kg/day; p.o.) ", "stimulated lactase, maltase and sucrase in all parts of the small intestine. ", "Maximum stimulation of lactase and maltase was noted after 30 consecutive days of treatment while sucrase exhibited maximum activation after 15 consecutive of treatment with either KE or A. These results suggest that both KE and A accelerate intestinal digestion and absorption of carbohydrate by activating these intestinal disaccharidases." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.000651820853818208, 0.0006890137447044253, 0.0008854504558257759, 0.001101376605220139, 0.0021981073077768087, 0.0005851544556207955, 0.0010858363239094615, 0.0006055979174561799, 0.0006578047759830952, 0.0013955786125734448, 0.0007887370302341878 ]
0.000968
11
[ "KVERT reported that seismic activity at Shiveluch was above background levels during 20-27 March. ", "Based on interpretations of seismic data, ash plumes likely rose to an altitude of 6 km (19,700 ft) a.s.l. ", "According to observers, fumaroles were active during 23-26 March and explosions produced ash plumes that rose to an altitude of 8 km (26,200 ft) a.s.l. ", "on 24 March. ", "Analysis of satellite imagery revealed a daily thermal anomaly on the lava dome and an ash plume that drifted 40 km S on 25 March. ", "The Level of Concern Color Code remained at Orange.", "\n\nBased on information from KEMSD, the Tokyo VAAC reported that eruptions during 27-28 March produced plumes that rose to altitudes of 4.3-5.5 km (14,000-18,000 ft) a.s.l." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006068678922019899, 0.0006094931741245091, 0.0007717288099229336, 0.0006760890246368945, 0.000593404343817383, 0.0005664816708303988, 0.0006285039125941694 ]
0.000636
7
[ "Q:\n\nDetect Disconnect plugin from javascript\n\nA disconnect plugin in chrome is blocking social network widgets. ", "And it's good. ", "But it makes the page look odd for the visitor. ", "Is there a way one could detect a failed social network plugin loading in javascript so it would be possible to hide the block altogether? ", "\n\nA:\n\nYou can try something like this:\ndependencyAvailabilityCheckInterval = setInterval(doDependenciesExist, 500);\n\nfunction doDependenciesExist()\n{\n if(typeof FB !", "== 'undefined')\n return;\n\n alert(\"Looks like Facebook ist blocked!\");", "\n // do rearranging or hiding of content\n}\n\nYou could extend/replace typeof(FB) by any other js library you might need for your website or service.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0009593834984116256, 0.0005970479687675834, 0.0006311857141554356, 0.0008123754523694515, 0.002495360095053911, 0.0008449421729892492, 0.0007978326757438481, 0.001995444530621171 ]
0.001142
8
[ "While it is still too early to know where Tropical Storm Maria and Tropical Storm Nate will be heading for sure, initial forecasts keep both systems away from U.S. soil. ", "Both became named storms today (Maria at 11am EDT, Nate at 5pm EDT), and both will be fairly interesting to track in the coming days.", "\n\nTS Maria is expected to stay on the weaker side as it tracks from the central Atlantic up through the Bahamas. ", "The latest model guidance indicates that Maria should recurve before it can make a U.S. landfall. ", "The upper-level pattern does not favor a U.S. landfall at this time.", "\n\nTS Nate, currently in the Bay of Campeche, is forecast to drift northward into the western Gulf of Mexico before it turns westward and makes a landfall in northern Mexico. ", "Despite growing model consensus on this solution, Nate will be highly sensitive to subtle changes in the steering winds, which means a U.S. landfall is not out of the question (though it seems unlikely at this point).", "\n\nNow that we’re getting within a reasonable amount of forecast accuracy, I figured it’s time to make a post about Irene and my chasing prospects.", "\n\nThe models have been consistently trending east with Irene for the past couple of days, but the most recent runs have inched back west as the synoptic setup out west is getting worked out (which will be the kicker that causes Irene to recurve). ", "Observational model biases indicate that the kicker trough will verify more slowly than what is currently modeled, which would allow Irene to work further west. ", "Right now it’s progged to go through (or just east of) the Outer Banks of North Carolina before making landfall on Long Island and the Northeast. ", "Any more of a westward push would send Irene into the Morehead City, NC area or the Delmarva Peninsula, which will be the two areas that Jason (The Weather Warrior) and I will be targeting. ", "Obviously it will have to come down to a decision of choosing just one of these locations, as timing and road closures would make it very difficult, if not impossible to reposition from one area to the other in time.", "\n\nThe decision to go will have to be made tomorrow, as departure time will likely be early Friday. ", "I have discussed the possibility of Irene coming back west, but there is still a good possibility that it could go further east and miss the Mid-Atlantic or even the Northeast, so the next 24 hours of development will be extremely important in zeroing-in on Irene’s track. ", "Right now I’m slightly above 50% GO for chasing.", "\n\nAs it stands, Irene is a Category 3 Hurricane and is expected to intensify a bit more while in/near the Bahamas, with gradual weakening as it nears the East Coast.", "\n\nNow that even the Euro Op. ", "is on board with developing a tropical system tracking towards the Southeast coastline, I decided that it’s time to do a write-up about it.", "\n\nThe American models have been fairly consistent with bringing a tropical system into the Southeast, having shown the tropical system for over a dozen consecutive runs. ", "More and more of the European ensemble members, along with the operational, are starting to pick up on it as well. ", "The spread for landfall has been anywhere from Alabama to the Carolinas, but the general timing and region has been fairly consistent. ", "The European models have been more reluctant to develop this system, but the latest run does show better development just off the East Coast. ", "Despite model agreement, this will have to be watched with great scrutiny as it is still a ways out and could change drastically at any time.", "\n\nThe key thing to take away from the models at this range is that the overall pattern is becoming more favorable for a U.S. landfall, regardless of if/when a tropical system develops. ", "The NHC has just labeled this potential system as an invest, so we will have more eyes and models tracking it very soon.", "\n\nHurricane Otto continues to churn in the Atlantic despite his humble beginnings as a subtropical depression when he formed just north of Puerto Rico two days ago. ", "Otto is currently moving northeast as it picks up steam and jets towards Europe. ", "The Azores may be at risk for hurricane force winds from Otto, but the current forecast is north of the islands, so the Azores should be able to avoid the worst of it.", "\n\nSo Otto will just be another storm that’s rather unexciting for the U.S., taking name #15 as we look towards the Caribbean for a possible Paula in the near future. ", "The season’s rapidly winding down for us, and it looks like we’ll have to wait for next year to try get an East Coast landfalling system.", "\n\nThis post might have to be updated if the NHC decides to upgrade Tropical Depression Sixteen to Tropical Storm Nicole later today.", "\n\nMassive rains are in store for the East Coast tomorrow through Friday as T.D. 16 organizes just south of Cuba and heads towards the U.S. This storm is likely to be sub-tropical when it impacts areas from the Carolinas northward as it interacts with a stationary front just off the East Coast, but it could still pack tropical storm force winds as it progresses up the East Coast. ", "One thing to expect with this system is heavy rain, on the order or 2-5+ inches, to cut a path up the interior East Coast along the eastern slopes of the Appalachians. ", "Impressive wind shear associated with the right-front quadrant of this system will bring the risk of strong to severe winds and isolated tornadoes to the East Coast, but limited thermal instability caused by cold air damming will limit the severe potential with this system.", "\n\nThe significant rain totals will be mostly the result of large-scale forcing along a preexisting boundary when the tropical/sub-tropical system interacts with the stationary front within an atmosphere primed with moisture as P-WAT values are forecast to be in the 2-2.5″ range. ", "Widespread flooding will be a big concern with this event, as the short-term drought conditions will cause the soil to struggle to absorb the rainfall. ", "The past few day’s rain will help alleviate this effect, but not to a great extent.", "\n\nI will be missing most of this event, as I have travel plans which has me driving north Thursday morning. *", "UPDATE: It looks like it will progress a bit faster than I anticipated… I’ll be driving through it almost the entire way.* ", "Hopefully Jason will be able to cover the event and keep you all informed. ", "Stay safe, and be sure to go over your flood preparedness and stay tuned!" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006333154742605984, 0.0005356112960726023, 0.0005792808951810002, 0.0006083660409785807, 0.0006159202312119305, 0.0006206192774698138, 0.0005439555388875306, 0.0005379322683438659, 0.0005573759553954005, 0.0005624715704470873, 0.0008687020163051784, 0.000651405774988234, 0.0005382620729506016, 0.0006333173369057477, 0.0005482395645231009, 0.0008034234051592648, 0.0007330271182581782, 0.0031286845915019512, 0.0005777466576546431, 0.0005630191881209612, 0.0005584325408563018, 0.0005545668536797166, 0.0005555302486754954, 0.0005212386604398489, 0.0005645237397402525, 0.0005262778722681105, 0.0006961958133615553, 0.0005703641218133271, 0.0006357769016176462, 0.0006032593664713204, 0.0007682289578951895, 0.0006112846895121038, 0.0007397029548883438, 0.0006495690904557705, 0.0007103707175701857, 0.0006055528647266328, 0.0006018367712385952, 0.0005629247752949595, 0.0006030313670635223, 0.0005719068576581776, 0.0007231564377434552, 0.0006679896032437682 ]
0.000677
42
[ "Had a few dates this weekend Saved the pits to plant in the backyard\n\n18,086 shares" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.000958055374212563 ]
0.000958
1
[ "INTRODUCTION\n============\n\nCerebral revascularization has been useful in treatment of cerebral hemodynamic failure, in skull base surgery, and in complex aneurysm surgery. ", "In addition, the beneficial effects of cerebral revascularization in treatment of acute stroke have been reported in recent years.[@B3][@B8] Accordingly, there is an increasing demand for microvascular anastomosis training, which is considered a basic training technique of microsurgery in the neurosurgical department. ", "A variety of materials and methods are used in microvascular anastomosis training, and some studies have reported on the advantages and disadvantages of each material.[@B1][@B2][@B4] Skill in performing the microvascular suture technique can only be acquired through daily practice.[@B14] Therefore, the training model must be feasible in daily life and as similar to real-life surgery conditions as possible. ", "In reality, it is not easy for neurosurgeons to invest more than one hour per day in microvascular training. ", "In addition, microvascular anastomosis training requires a great deal of preparation, including the preparation of instruments, microscopes, sutures, and blood vessels.", "\n\nThe aim of this study is to introduce a microvascular training model based on use of materials that are easily accessible from the daily surroundings.", "\n\nMATERIALS AND METHODS\n=====================\n\nThe microinstruments used in this study included two microforceps (jeweler\\'s forceps No.3), one microneedle holder, one pair of microscissors, and one pair of Iris scissors ([Fig. ", "1](#F1){ref-type=\"fig\"}). ", "All other necessary materials were obtained from the hospital. ", "A desktop medical school laboratory microscope was used for the anastomosis training. ", "The microscope had fixed magnification (10 × and 30 ×) and was easily available from the school or the hospital ([Fig. ", "2](#F2){ref-type=\"fig\"}). ", "For this study, the 10 × magnification was mainly used.", "\n\nIn this study, the materials used for performance of anastomosis were the blood vessels of chicken wings. ", "Chicken wings were easily purchased from an online market; whole chicken wings were needed for this study, however, they were difficult to obtain from offline markets in Korea. ", "The wings were from eight- to ten-week-old chickens weighing between 1.3 and 1.4 kg. ", "Twelve to 13 chicken wings were purchased at the same time and kept in a freezer. ", "Three of the frozen chicken wings were thawed together to be used at the same time. ", "Once extracted, the blood vessels were kept in a refrigerator. ", "The authors were able to practice three times with these blood vessels.", "\n\nFirst, we practiced daily with gauze using 10-0 nylon suture. ", "After approximately three months of training with gauze, training with the blood vessels extracted from chicken wings was started. ", "A long segment of blood vessel from the proximal brachial artery to the distal radial artery was used for the training. ", "The blood vessels were extracted from the proximal shoulder joint to the distal wrist joint. ", "The extraction was initiated from the inside of the elbow joint where the radial artery is clearly visible and continued toward the proximal and distal parts ([Fig. ", "3](#F3){ref-type=\"fig\"}). ", "The proximal end of the brachial artery was considered as the superficial temporal artery (STA) and the radial artery was considered as the cortical branch of the middle cerebral artery (MCA) ([Fig. ", "4](#F4){ref-type=\"fig\"}).", "\n\nEnd-to-side anastomosis was practiced first, followed by end-to-end anastomosis using appropriate segments. ", "Saline was injected to check the patency of the anastomosis sites, and the vessels were incised to check for the presence of any intima damage ([Fig. ", "5](#F5){ref-type=\"fig\"}).", "\n\nRESULTS\n=======\n\nThe instruments used in this study were simple and easy to use; therefore, the time required for preparation of the materials and dissection of the chicken wings was only approximately five to ten minutes. ", "The practice was stopped in order to attend to an emergency situation, if any, and the practice was resumed afterward. ", "However, it was found that the interruption did not have a significant effect on the training, and practicing more than three times per week was feasible.", "\n\nThe characteristics of 20 chicken wings, which were purchased in three batches, were analyzed. ", "The average diameter of the brachial artery was larger than that of the radial artery. ", "The length from the brachial artery to the radial artery was 8 - 10 cm. ", "The average diameter of the brachial artery was 1.3 mm ± 0.2 mm and that of the radial artery was 1.0 mm ± 0.2 mm ([Fig. ", "6](#F6){ref-type=\"fig\"}). ", "With the long segment of blood vessel, considering that the vessel becomes finer as it progresses from the proximal part to the distal part, the end of the proximal brachial artery was anastomosed to the side of the radial artery for practice of end-to-side anastomosis. ", "Careful dissection of the periadventitial tissue was required before anastomosis. ", "One blood vessel was used several times.", "\n\nDISCUSSION\n==========\n\nPreparation of animal models and simulation models for microvascular training is difficult for young neurosurgeons. ", "Inoue et al.[@B7] recommended microvascular training using gauze and a desk-type microscope, which minimized the preparation time to almost \\\"zero\\\" and allowed surgeons to spend their limited time on their actual practice. ", "Young neurosurgeons are thought to need to practice of approximately 10,000 stitches before actually performing an STA-to-MCA anastomosis.[@B7] However, Lascar et al.[@B12] reported that there was no significant statistical difference in patency rates between the expert group and the beginner group after practicing 50 times. ", "Therefore, it was estimated that beginners would need to practice approximately 2000 stitches using gauze for three months before starting training with blood vessels of chicken wings. ", "At our institution, at least three months of gauze training was required and then artificial vessels were used. ", "Chicken wing arteries have very similar consistency to that of the STA and MCA; therefore they are very practical and useful for simulation of real operation conditions. ", "Nevertheless, more and more practice leads to good results.", "\n\nAnother issue was the surgical microscope. ", "Surgical microscopes are available in operation rooms in most hospitals. ", "However, because chicken wings or other live animals are considered to be pathogen bearing, they are not permitted in operation rooms. ", "Training with a surgical microscope would have been ideal; however, it was not feasible to obtain one because of the high cost. ", "Hence, a medical school laboratory microscope (with fixed magnification) was used in this study, and no problems were reported with regard to its use in the training with either gauze or chicken wing arteries.", "\n\nMany materials, such as synthetic materials, chicken neck, chicken wing, pig leg, placenta and cadaver vessels, can be used for microvascular training.[@B11] Chicken wing arteries have been proven as suitable materials for microvascular anastomosis training because they are cheap, easy to purchase, convenient to manage, do not require a specific facility nor anesthesia use (like maintaining living animals do), and are similar to human vessels.[@B2][@B4][@B5][@B6][@B10][@B14] In addition, use of this model can reduce the numbers of live animals used in experiments by 80 - 100%.[@B15] The average size of the cortical branch of the MCA is known to be 1.0 mm (range, 0.6 - 1.4 mm), which is similar to the size of the radial artery of chicken wings.[@B9] The structure of a chicken wing resembles that of a human arm. ", "According to Levinsohn et al.", ",[@B13] the blood vessels in a chicken wing stretch down to the brachial artery lying parallel to the humerus and are divided into the radial artery and the ulnar artery at the middle of the humerus and stretch further down to the end of the wings. ", "Among these, the brachial artery, radial artery and ulnar artery are considered to be the most appropriate for training, although dissection of the ulnar artery takes a long time. ", "In our study, a long segment of blood vessel from the proximal brachial artery to the distal radial artery was used for training. ", "As long as the anatomy of a chicken wing is well understood, vascular dissection in a chicken wing can be completed within approximately five minutes.", "\n\nThe diameters of the brachial and radial arteries of domestically distributed chicken wings were found to be relatively similar to the average diameters of the human brachial artery (1.2 mm) and radial artery (1.0 mm); therefore, they were judged to be suitable for use in training. ", "In addition, the diameter of the cortical branch of the MCA in patients with moyamoya disease is often \\< 1 mm. ", "With the use of a long segment of blood vessel, considering that the vessel becomes finer as it progresses from the proximal part to the distal part, the above anastomosis methods were devised and performed. ", "The anastomosis methods practiced in this study were similar to those of STA-to-MCA anastomosis. ", "In addition, one blood vessel could be used several times.", "\n\nBetween chicken wing blood vessels and human blood vessels, it was found that more meticulous suturing was required for the blood vessels of chicken wings because there was more suture leakage.[@B14] Chicken wings require more extensive dissection of the periadventitial tissue layers than intracranial vessels. ", "However, this also provides essential training in dissection and prepares the STA for anastomosis.[@B1] On completion of anastomosis, infusion of saline was administered in order to check patency and the vessels were incised to check for the presence of any intima damage.[@B10][@B14]\n\nThis report has some differences from previous reports. ", "First, a long segment of blood vessel from the proximal brachial artery to the distal radial artery was used for training. ", "Second, the authors took advantage of the difference in blood vessel diameters. ", "Third, the equipment used is introduced in detail. ", "Therefore, on the basis of this article, even without other information, readers could start microvascular anastomosis training.", "\n\nCONCLUSION\n==========\n\nA desktop microscope, simple and inexpensive microinstruments, and a long segment of chicken blood vessel are sufficient for repeated microvascular training. ", "The practice of anastomosing the brachial artery to the radial artery is useful and provides very similar conditions to those of STA-to-MCA anastomosis surgery.", "\n\n![", "The microinstruments used in this study include two microforceps (jeweler\\'s forceps No.3), one microneedle holder, one pair of microscissors and one pair of Iris scissors.](jcen-15-20-g001){#F1}\n\n![", "A desktop medical school laboratory microscope with fixed magnification is used for the anastomosis training because it is easily available from the school or the hospital. ", "The magnifications of the microscope are 10× and 30×. The 10× magnification is primarily used.](jcen-15-20-g002){#F2}\n\n![", "Blood vessels were extracted from the proximal brachial artery to the distal radial artery. ", "The dissection was initiated from the inside of the elbow joint where the radial artery is clearly visible and continued toward the proximal and distal parts.\\\nRed: brachial artery of a chicken wing, blue: radial artery of a chicken wing, STA: superficial temporal artery, M4: middle cerebral artery cortical branch.](jcen-15-20-g003){#F3}\n\n![", "The proximal end of the brachial artery was considered to be the superficial temporal artery and the radial artery the cortical branch of the middle cerebral artery.\\\nRed: brachial artery of a chicken wing, blue: radial artery of a chicken wing, STA: superficial temporal artery, M4: middle cerebral artery cortical branch.](jcen-15-20-g004){#F4}\n\n![", "End-to-side anastomosis is practiced first, followed by end-to-end anastomosis training using appropriate segments.](jcen-15-20-g005){#F5}\n\n![", "The average diameter of the brachial artery is 1.3 mm ± 0.2 mm and that of the radial artery is 1.0 mm ± 0.2 mm.](jcen-15-20-g006){#F6}\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0015628791879862547, 0.0006496657151728868, 0.0005827500717714429, 0.002540373941883445, 0.0005988209159113467, 0.0005486225127242506, 0.0007171892211772501, 0.0006432358059100807, 0.00065519631607458, 0.0007230623159557581, 0.0006287136347964406, 0.0006530862883664668, 0.0006350447656586766, 0.0015550850657746196, 0.0005930374609306455, 0.0009912900859490037, 0.0007027320680208504, 0.0006396228563971817, 0.0009617290925234556, 0.00789891742169857, 0.0006687154527753592, 0.0007227922906167805, 0.0008811622974462807, 0.0023748022504150867, 0.0005752106662839651, 0.0006580912740901113, 0.0007694275118410587, 0.000658141216263175, 0.0024347652215510607, 0.00118458631914109, 0.0006606885581277311, 0.0006016755942255259, 0.0005694314022548497, 0.0005625095800496638, 0.000606004090514034, 0.000907689391169697, 0.0008332112920470536, 0.0007523334352299571, 0.0006535632419399917, 0.0009402278228662908, 0.0017366805113852024, 0.0013578287325799465, 0.003674751613289118, 0.0006211367435753345, 0.0011931407498195767, 0.0006594398873858154, 0.0005662714829668403, 0.000648265762720257, 0.000547890376765281, 0.0007195778889581561, 0.0006255892803892493, 0.0006967782974243164, 0.0005905860452912748, 0.0010469964472576976, 0.0007445676601491868, 0.0007072212756611407, 0.0014098172541707754, 0.0006413873634301126, 0.0006491050007753074, 0.0006239938084036112, 0.000603421765845269, 0.0006389934569597244, 0.0008618502761237323, 0.0008800933137536049, 0.0013005684595555067, 0.000950526213273406, 0.0008684086496941745, 0.0008086505113169551, 0.0006421369034796953, 0.0005573983071371913, 0.0012009077472612262, 0.0010730266803875566, 0.001395108993165195, 0.0019055769080296159, 0.0006561720510944724, 0.0006847068434581161, 0.0007144932169467211, 0.002857536543160677, 0.0008686387445777655, 0.0012956575956195593, 0.005423865746706724, 0.0007921906653791666 ]
0.001085
82
[ "Just earlier this year, the official title for the anticipated Wreck-It Ralph sequel was announced at CinemaCon, and it basically tells us what the movie is about. ", "Ralph Breaks the Internet: Wreck-It Ralph 2 will follow the titular not-so-bad video game bad guy (voiced by John C. Reilly) as he escapes the arcade and finds himself on the web.", "\n\nNow the D23 Expo has provided us with a bunch of new details about the Walt Disney Animation sequel, and you won’t believe just how much this sequel is going to expand the world of Wreck-It Ralph. ", "When the video game bad guy ends up stuck in the internet with his pint-sized, candy-haired friend Vanellope von Schweetz, they discover a place where fandoms converge, including Star Wars, Marvel, and Disney princesses. ", "Read More »\n\nSad news came yesterday when we heard that legendary comedian Don Rickleshad passed away. ", "In recent years, Rickles had become known as the voice of Mr. Potato Head in pretty much every piece of Toy Story multimedia. ", "But his true legacy lies in stand-up comedy as one of the most gifted insult comics to ever take the stage. ", "Rickles was so good that audiences were never really sure if he was only joking, often turned off by his brash sense of humor, which kept him from becoming a huge star of film and TV.", "\n\nDon Rickles once had a short-lived NBC program that only lasted a season, but that didn’t stop AARP Studios from giving him his own show called Dinner with Don, where he sat down for a meal with some of today’s biggest names in film and television. ", "In honor of the late comedian, AARP wanted to showcase the charm and endless wit of Don Rickles by teasing the TV series.", "\n\nWe didn’t get a new movie from director Judd Apatow this year, and part of the reason for that is because he’s producing a new TV series for HBO as another one is wrapping up. ", "Girls will begin its final season in February, but Judd Apatow will stay comfy at HBO with a new comedy series starring stand-up comedian Pete Holmes.", "\n\nCrashing follows Pete Holmes playing a version of himself from years ago. ", "The HBO series follows Holmes as an up and coming, naive stand-up comedian in New York City whose seemingly happy life is uprooted when he finds his wife cheating on him. ", "As he tries to get some stage time and recover from his destroyed marriage, he couch surfs across New York City, staying with his various comedian friends played by Holmes’ real-life comedian friends who you’ll definitely recognize in a new trailer for the show.", "\n\nDying Laughing is a new documentary that feels like it should have been called I’m Dying Up Here, because it features one-on-one interviews with stand-up comedians like Jerry Seinfeld, Kevin Hart, Amy Schumer, Cedric The Entertainer, Russell Peters, the late Garry Shandling and more, all talking about their worst experiences on stage. ", "These are the times when the bombed, died, crashed and all the other words which describe the worst thing that can happen to a comedian on stage: not getting laughs.", "\n\nFebruary will bring a new HBO comedy series to air from comedian Pete Holmes, fresh off his recent stand-up comedy special on the cable network. ", "Inspired by his own trials and tribulations in life as an up-and-coming comic who married young only to end up divorced, Crashing follows a comedian not unlike Holmes himself as couch surfs around New York City, staying with friends and trying to figure out just what the hell to do with his life.", "\n\nNow a new Crashing trailer has debuted, showing off more of Pete’s comedy struggles, trying to hand out flyers to shows, having odd gaps in his knowledge of pop culture while making obscure references to things like Will Smith rap albums and coming to terms with the fact that he’s actually homeless.", "\n\nColin Trevorrow’s The Book Of Henry is a movie I’ve been curious about for some time. ", "It’s an interesting choice to helm this small film after directing one of the biggest box office successes of all time. ", "But the truth is, we don’t really know much about The Book of Henry. ", "All we’ve been told is that its a drama about a single mother raising a child genius. ", "What is the Jurassic World director cooking up at Focus Features? ", "Hit the jump to see The Book of Henry poster, which gives us a first look at the plans.", "Read More »\n\nIt may only be June, but it’s going to take some damn good comedy to top the fits of laughter brought upon by Popstar: Never Stop Never Stopping. ", "After The Lonely Island trio (Andy Samberg, Akiva Shaffer and Jorma Taccone) made a splash with their digital shorts on Saturday Night Live, it’s amazing it took them this long to put together a mockumentary following the rise and fall of a faux musician in the real world music industry. ", "But for as long as it took, the hilarity delivered by Popstar makes it well worth the wait.", "\n\nSadly, last week brought news that iconic comedian Garry Shandling had passed away suddenly at 66 years old. ", "The longtime stand-up comedian and creator/star of The Larry Sanders Show has influenced some of the top comedians working today, and he counts among his friends some of the best in the business.", "\n\nAs a way of saying goodbye, over three dozen of them gathered as Shandling’s house for one last game of pick-up basketball on the comedian’s home court, something he was very fond of doing while he was alive and well. ", "See a photo of everyone gathered for the honorary Garry Shandling basketball game after the jump. ", "Read More »\n\nHere’s the first trailer for I Smile Back, which features Sarah Silverman in a highly-praised dramatic performance as a woman dealing with overwhelming depression. ", "The film was on our list of fall movies to look out for; written by Amy Koppelman and Paige Dylan and directed by Adam Salky, the film premiered at Sundance earlier this year and will play the Toronto International Film Festival before going into release in October. ", "Check out the I Smile Back trailer after the jump. ", "Read More »\n\nFor a musical group that exists as a parody of other musical groups, The Lonely Island has achieved some legitimate success. ", "Their next accomplishment will be Top Secret Untitled Lonely Island Movie, a feature produced by Judd Apatow.", "\n\nAll three Lonely Island members (that’s Jorma Taccone, Akiva Schaffer, and Andy Samberg) are starring. ", "Two-thirds of them (Taccone and Schaffer) are directing. ", "As production gets underway, some new details and a funny teaser poster have emerged. ", "Get the latest updates on the Top Secret Untitled Lonely Island Movie after the jump.", "\n\nUpdate:Sarah Silverman is joining the Lonely Island gang for their movie. ", "More details on her casting after the jump. ", "Read More »" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005805126274935901, 0.00875795166939497, 0.0006313830381259322, 0.043673738837242126, 0.0008592215017415583, 0.0030432785861194134, 0.0032646600157022476, 0.0009426156175322831, 0.0007390600512735546, 0.0005741567583754659, 0.0006968373782001436, 0.0017138989642262459, 0.0016754221869632602, 0.010923033580183983, 0.000976755516603589, 0.0012890170328319073, 0.07043089717626572, 0.0007918718038126826, 0.018651802092790604, 0.001463274471461773, 0.0006553892744705081, 0.0006459757569245994, 0.0007176874205470085, 0.0012007200857624412, 0.0006311294273473322, 0.0007433907012455165, 0.14253918826580048, 0.000612173811532557, 0.001177366473712027, 0.0010814458364620805, 0.0006595106096938252, 0.0011205679038539529, 0.0005927594029344618, 0.0010404359782114625, 0.0006658707861788571, 0.0011973247164860368, 0.0006396750104613602, 0.0007147779688239098, 0.0007171657052822411, 0.0007628010935150087, 0.0005382859380915761, 0.0007194781792350113, 0.0006340910331346095, 0.0005467585870064795, 0.0007952656014822423 ]
0.007401
45
[ "Rectangular Wood Table\n\nNice Rectangular Wood Table Rectangular Library Wood Table\n\nA lovely enhancing idea is normally something you will want on your property, this also Rectangular Wood Table graphic collection gives anyone a lot of shots for the fairly your home type. ", "You can adopt the sun and rain that will exhibited as a result of Rectangular Wood Table photo collection for making the absolute right place to calm down. ", "The type this Rectangular Wood Table image stock displayed provides an unusually pleasant atmosphere. ", "So it s possible to take pleasure in the splendor associated with any kind of nearby of an property inspired as a result of Rectangular Wood Table photo gallery any time. ", "There is a multitude of items that one could take from Rectangular Wood Table snapshot stock to enhance your house. ", "Additionally become a stylish for your own personel house if you learn this approach outstanding Rectangular Wood Table photograph stock effectively. ", "To generate a especially personalized check, it is possible to intermix your own personal options and the options because of Rectangular Wood Table pic gallery. ", "It is possible to accomplish the planning of your home impressed by way of Rectangular Wood Table pic gallery along with a lot of DIY fittings or simply using your preferred merchandise to create a toasty surroundings.", "\n\nrectangular\n\nAs adjective\n\nshaped like a rectangle\n\nhaving the base or section in the form of a rectangle:a rectangular pyramid\n\nhaving one or more right angles\n\nforming a right angle\n\nwood\n\nAs noun\n\nthe hard, fibrous substance composing most of the stem and branches of a tree or shrub, and lying beneath the bark; the xylem\n\nthe trunks or main stems of trees as suitable for architectural and other purposes; timber or lumber\n\nfirewood\n\nthe cask, barrel, or keg, as distinguished from the bottle:aged in the wood\n\nwoodblock (def )\n\nMusic\n\na woodwind instrument\n\nthe section of a band or orchestra composed of woodwinds\n\nOften, woods\n\n(used with a singular or plural verb) a large and thick collection of growing trees; a grove or forest:They picnicked in the woods\n\nGolf\n\na club with a wooden head, as a driver, brassie, spoon, or baffy for hitting long shots\n\nCompare iron (def )\n\nAs adjective\n\nmade of wood; wooden\n\nused to store, work, or carry wood:a wood chisel\n\ndwelling or growing in woods:wood bird\n\nAs verb (used with object)\n\nto cover or plant with trees\n\nto supply with wood; get supplies of wood for\n\nAs verb (used without object)\n\nto take in or get supplies of wood (often followed by up):to wood up before the approach of winter\n\nAs Idioms\n\nhave the wood on, Australian Slang\n\nto have an advantage over or have information that can be used against\n\nknock on wood, (used when knocking on something wooden to assure continued good luck):The car's still in good shape, knock on wood\n\nAlso, especially British, touch wood\n\nout of the woods, out of a dangerous, perplexing, or difficult situation; secure; safe\n\nno longer in precarious health or critical condition; out of danger and recovering\n\ntable\n\nAs noun\n\nan article of furniture consisting of a flat, slablike top supported on one or more legs or other supports:a kitchen table; an operating table; a pool table\n\nsuch a piece of furniture specifically used for serving food to those seated at it\n\nthe food placed on a table to be eaten:She sets a good table\n\na group of persons at a table, as for a meal, game, or business transaction\n\na gaming table\n\na flat or plane surface; a level area\n\na tableland or plateau\n\na concise list or guide:The table of contents in the front of the book includes chapter names and page numbers\n\nan arrangement of words, numbers, or signs, or combinations of them, as in parallel columns, to exhibit a set of facts or relations in a definite, compact, and comprehensive form; a synopsis or scheme\n\n(initial capital letter) Astronomy\n\nthe constellation Mensa\n\na flat and relatively thin piece of wood, stone, metal, or other hard substance, especially one artificially shaped for a particular purpose\n\nArchitecture\n\na course or band, especially of masonry, having a distinctive form or position\n\na distinctively treated surface on a wall\n\na smooth, flat board or slab on which inscriptions may be put\n\ntables\n\nthe tablets on which certain collections of laws were anciently inscribed: the tables of the Decalogue\n\nthe laws themselves\n\nAnatomy\n\nthe inner or outer hard layer or any of the flat bones of the skull\n\nMusic\n\na sounding board\n\nJewelry\n\nthe upper horizontal surface of a faceted gem\n\na gem with such a surface\n\nAs verb (used with object), tabled, tabling\n\nto place (a card, money, etc\n\n) on a table\n\nto enter in or form into a table or list\n\nParliamentary Procedure\n\nChiefly U\n\nS\n\nto lay aside (a proposal, resolution, etc\n\n) for future discussion, usually with a view to postponing or shelving the matter indefinitely\n\nBritish\n\nto present (a proposal, resolution, etc\n\n) for discussion\n\nAs adjective\n\nof, relating to, or for use on a table:a table lamp\n\nsuitable for serving at a table or for eating or drinking:table grapes\n\nAs Idioms\n\non the table, Parliamentary Procedure\n\nU\n\nS\n\npostponed\n\nBritish\n\nsubmitted for consideration\n\nturn the tables, to cause a reversal of an existing situation, especially with regard to gaining the upper hand over a competitor, rival, antagonist, etc\n\n:Fortune turned the tables and we won\n\nWe turned the tables on them and undersold them by percent\n\nunder the table, drunk\n\nas a bribe; secretly: She gave money under the table to get the apartment\n\nwait (on) table, to work as a waiter or waitress:He worked his way through college by waiting table\n\nDelightful Rectangular Wood Table M Lunch Table\n\nRectangular Wood Table FB 5955 1 RECTANGULAR WOOD COFFEE TABLE\n\nThis particular Rectangular Wood Table graphic gallery are going to be handy that you can help your house be as a luxurious and heart warming set. ", "Find out the following Rectangular Wood Table picture gallery to obtain more ideas for upgrading your personal dreary property. ", "You can look at cutting edge things that can be obtained from Rectangular Wood Table photo gallery to remain placed to your home. ", "They are willing to beautify your property which has a very stylish and additionally lovely way so you can get dwelling using a wonderful appear like Rectangular Wood Table photograph gallery indicates. ", "A lot of these High Definition shots which unfortunately included as a result of Rectangular Wood Table snapshot gallery definitely will mollycoddle everyone by using great variations indicates. ", "There is a chance you are allowed to acquire just about all images with Rectangular Wood Table graphic stock to increase your reference on the subject of house redesigning. ", "Thanks a ton for visiting Rectangular Wood Table picture collection." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006405755411833525, 0.0005887903389520943, 0.0005667096120305359, 0.0005929701728746295, 0.0006201769574545324, 0.00104532518889755, 0.0006750430329702795, 0.0006640215869992971, 0.0008045683498494327, 0.0038660457357764244, 0.0005669876118190587, 0.0009464857866987586, 0.0005893166526220739, 0.0005653080297634006, 0.0006014156388118863 ]
0.000889
15
[ "<?", "xml version=\"1.0\" encoding=\"UTF-8\"?", ">\n<!", "DOCTYPE html SYSTEM \"about:legacy-compat\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\" xmlns:pu=\"http://schema.phpunit.de/coverage/1.0\" lang=\"en\">\n <head>\n <title>phpDox - Test Method</title>\n <link rel=\"stylesheet\" type=\"text/css\" href=\"../../css/style.css\" media=\"screen\"/>\n <meta http-equiv=\"content-type\" content=\"text/html; charset=utf-8\"/>\n </head>\n <body>\n <nav class=\"topnav\">\n <ul>\n <li>\n <div class=\"logo\"><span>/**</span>phpDox</div>\n </li>\n <li class=\"separator\">\n <a href=\"../../index.xhtml\">Overview</a>\n </li>\n <li class=\"separator\">\n <a href=\"../../namespaces.xhtml\">Namespaces</a>\n </li>\n <li>\n <a href=\"../../classes.xhtml\">Classes</a>\n </li>\n <li class=\"separator\">\n <a href=\"../../source/index.xhtml\">Source</a>\n </li>\n </ul>\n </nav>\n <div id=\"mainstage\">\n <div class=\"box\">\n <ul class=\"breadcrumb\">\n <li>\n <a href=\"../../index.xhtml\">Overview</a>\n </li>\n <li class=\"separator\">\n <a href=\"../../classes.xhtml\">Classes</a>\n </li>\n <li class=\"separator\">\n <a href=\"../../classes.xhtml#\"/>\n </li>\n <li class=\"separator\">\n <a title=\"FireGento_Logger_Model_Observer\" href=\"../../classes/FireGento_Logger_Model_Observer.xhtml\">FireGento_Logger_Model_Observer</a>\n </li>\n <li class=\"separator\">getFilesOlderThan</li>\n </ul>\n </div>\n <nav class=\"box\">\n <ul>\n <li>\n <a href=\"#introduction\">Introduction</a>\n </li>\n <li>\n <a href=\"#synopsis\">Synopsis</a>\n </li>\n <li>\n <a href=\"#parameter\">Parameter</a>\n </li>\n <li>\n <a href=\"#return\">Return</a>\n </li>\n <li>\n <a href=\"../../source/app/code/community/FireGento/Logger/Model/Observer.php.xhtml#line84\">Source</a>\n </li>\n </ul>\n </nav>\n <section>\n <h1><small>FireGento_Logger_Model_Observer::</small>getFilesOlderThan</h1>\n <h4>Get all files which are older than X days and containing a pattern.</h4>\n <p/>\n <ul/>\n <h2 id=\"signature\">Signature</h2>\n <div class=\"styled synopsis\">\n <code>public function getFilesOlderThan(int\n $days,\n string\n $dir,\n string\n $filename )\n </code>\n </div>\n <h2 id=\"parameterlist\">Parameters</h2>\n <dl class=\"styled\">\n <dt><code>$days</code>\n —\n int</dt>\n <dd>Days</dd>\n <dt><code>$dir</code>\n —\n string</dt>\n <dd>Directory</dd>\n <dt><code>$filename</code>\n —\n string</dt>\n <dd>Filename</dd>\n </dl>\n <h2 id=\"return\">Returns</h2>\n <dl class=\"styled\">\n <dt>array</dt>\n <dd/>\n </dl>\n </section>\n </div>\n <footer>\n <span/>\n </footer>\n </body>\n</html>\n" ]
{ "pile_set_name": "Github" }
[ 0.0010000212350860238, 0.0006190649583004415, 0.006172851659357548, 0.0015499892178922892 ]
0.002335
4
[ "\r\n\r\n\r\n\r\n\r\n\r\n\r\nBecker v. State\r\n\r\n\r\n\r\n\r\n\r\n\r\nCOURT OF APPEALS\nEIGHTH DISTRICT OF TEXAS\nEL PASO, TEXAS\n\n)\nMICHELLE ESPARZA MORALES MILLER, )                No. ", "08-05-00347-CR\n)\n                                    Appellant,                        )                              Appeal from\n)\nv.                                                                          )                  210th District Court\n)\nTHE STATE OF TEXAS,                                   )                  of El Paso County, Texas\n)\n                                    Appellee.", "                          )                  (TC# 20040D03294)\n\nMEMORANDUM OPINION\n\n            Michelle Esparza Morales Miller appeals her conviction of solicitation to commit capital\r\nmurder. ", " Appellant waived her right to a jury trial and entered a negotiated plea of guilty. ", " The trial\r\ncourt found Appellant guilty but deferred adjudicating guilty and placed her on community\r\nsupervision for ten years. ", " The State subsequently filed a motion to adjudicate based on allegations\r\nthat Appellant committed several new criminal offenses, including theft, burglary of a vehicle,\r\naggravated assault, and murder. ", " The trial court found that Appellant had violated the terms and\r\nconditions of community supervision as alleged in the motion to adjudicate, and the court entered\r\nan adjudication of guilt and assessed punishment at imprisonment for a term of sixty years. ", " We\r\naffirm.", "\n            Appellant’s court-appointed counsel has filed a brief in which she has concluded that the\r\nappeal is wholly frivolous and without merit. ", " The brief meets the requirements of Anders v.\r\nCalifornia, 386 U.S. 738, 87 S.Ct. ", "1396, 18 L.Ed.2d 493, reh. ", "denied, 388 U.S. 924, 87 S.Ct. ", "2094,\r\n18 L.Ed.2d 1377 (1967), by presenting a professional evaluation of the record demonstrating why,\r\nin effect, there are no arguable grounds to be advanced. ", " See High v. State, 573 S.W.2d 807\r\n(Tex.", "Crim.", "App. ", "1978); Currie v. State, 516 S.W.2d 684 (Tex.", "Crim.", "App. ", "1974); Jackson v. State,\r\n485 S.W.2d 553 (Tex.", "Crim.", "App. ", "1972); Gainous v. State, 436 S.W.2d 137 (Tex.", "Crim.", "App. ", "1969). ", "\r\nA copy of counsel’s brief has been delivered to Appellant, and Appellant has been advised of her\r\nright to examine the appellate record and file a pro se brief. ", " No pro se brief has been filed.", "\n            We have carefully reviewed the record and counsel’s brief, and agree that the appeal is\r\nwholly frivolous and without merit. ", " Further, we find nothing in the record that might arguably\r\nsupport the appeal. ", " The judgment is affirmed.", "\n\nAugust 17, 2006                                                          \n                                                                                    ANN CRAWFORD McCLURE, Justice\n\nBefore Barajas, C.J., McClure, and Chew, JJ.", "\n\n(Do Not Publish)\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.00075581856071949, 0.0007374408887699246, 0.0018845874583348632, 0.0012116439174860716, 0.0007573871407657862, 0.0018782824045047164, 0.0008165805484168231, 0.000588792550843209, 0.0006759919924661517, 0.000732933811377734, 0.0010052410652861, 0.0008738075266592205, 0.0006147490348666906, 0.0006913145771250129, 0.0018367550801485777, 0.000847632298246026, 0.0007607511361129582, 0.0018367550801485777, 0.000847632298246026, 0.0007665253942832351, 0.0018367550801485777, 0.000847632298246026, 0.000753248343244195, 0.0018367550801485777, 0.000847632298246026, 0.0007738611893728375, 0.0005534603260457516, 0.0006996931042522192, 0.0005551091744564474, 0.0005911404732614756, 0.0005981962895020843, 0.000784151314292103, 0.0007073931046761572 ]
0.000955
33
[ "Today, the UK government published its long-awaited Clean Growth Strategy, setting out how it hopes to meet the nation’s legally binding climate goals. ", "The strategy covers the fourth and fifth carbon budgets, spanning 2023-2027 and 2028-2032, by when the UK must cut its greenhouse gas emissions to 57% below 1990 levels." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005466509610414505, 0.0005881458637304604 ]
0.000567
2
[ "Edison K. Miyawaki - What to Read on Love, Not Sex...\n\nWhy study Freud? ", "Harvard Medical School’s Edison K. Miyawaki, author of What to Read on Love, not Sex: Freud, Fiction, and the Articulation of Truth in Modern Psychological Science employs Freud’s affection for stories culled from our collective cultural past to explain modern psychology. ", "The result is a book that literary critic Harold Bloom describes as “a heartening and moving reconsideration of Freud’s legacy.”", "\n\nA Kansas City resident, Miyawaki is an assistant professor of neurology at Harvard Medical School and an attending neurologist at Brigham and Women’s Hospital in Boston." ]
{ "pile_set_name": "Pile-CC" }
[ 0.008466856554150581, 0.0009910663357004523, 0.0007309079519473016, 0.0009263499523513019 ]
0.002779
4
[ "I slightly modified this recipe and made 1.5 oz donuts and .5 oz doughnut holes. ", "Calories etc are per donut hole. ", "Multiply x 3 for a doughnut. ", "They are baking now...I will give a report when I try them\n\nThis is a comfort food...kids will like it. ", "It would also be easy to substitute lean hamburger for the Bocca burger. ", "Also, the serving size is large so it is very filling. ", "I was so surprized that I did not want more pasta in it. ", "This was just perfect!" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0028896054718643427, 0.07434384524822235, 0.0007342817261815071, 0.0007826642249710858, 0.0010214652866125107, 0.0006352018681354821, 0.0007164918351918459, 0.0016180828679352999 ]
0.010343
8
[ "All of the people say happy birthday on facebook wall no idea how to actually respond to all of them\n\n125 shares" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0007565300911664963 ]
0.000757
1
[ "/* sinelon\n *\n * By: Mark Kriegsman\n *\n * Modified by: Andrew Tuline\n *\n * Date: February 2015\n *\n * This uses the built in beat in FastLED to move a dot back and forth. ", "In this case, it uses two beats added together for more randomness.", "\n *\n */\n\n\n#include \"FastLED.h\" // FastLED library. ", "Preferably the latest copy of FastLED 2.1.", "\n\n#if FASTLED_VERSION < 3001000\n#error \"Requires FastLED 3.1 or later; check github for latest code.\"", "\n#endif \n\n// Fixed definitions cannot change on the fly.", "\n#define LED_DT 12 // Data pin to connect to the strip.", "\n#define LED_CK 11 // Clock pin for WS2801 or APA102.", "\n#define COLOR_ORDER BGR // It's GRB for WS2812 and BGR for APA102.", "\n#define LED_TYPE APA102 // Using APA102, WS2812, WS2801. ", "Don't forget to modify LEDS.addLeds to suit.", "\n#define NUM_LEDS 60 // Number of LED's.", "\n\n// Global variables can be changed on the fly.", "\nuint8_t max_bright = 128; // Overall brightness definition. ", "It can be changed on the fly.", "\n\nstruct CRGB leds[NUM_LEDS]; // Initialize our LED array.", "\n\nCRGBPalette16 currentPalette;\nCRGBPalette16 targetPalette;\nTBlendType currentBlending; // NOBLEND or LINEARBLEND\n\n\n// Define variables used by the sequences.", "\nuint8_t thisbeat = 23; // Beats per minute for first part of dot.", "\nuint8_t thatbeat = 28; // Combined the above with this one.", "\nuint8_t thisfade = 32; // How quickly does it fade? ", "Lower = slower fade rate.", "\nuint8_t thissat = 255; // The saturation, where 255 = brilliant colours.", "\nuint8_t thisbri = 255; // Brightness of a sequence.", "\nint myhue = 0;\n\nint thisdelay = 50;\n\n\n\nvoid setup() {\n \n Serial.begin(115200); // Initialize serial port for debugging.", "\n delay(1000); // Soft startup to ease the flow of electrons.", "\n\n// LEDS.addLeds<LED_TYPE, LED_DT, COLOR_ORDER>(leds, NUM_LEDS); // Use this for WS2812B\n LEDS.addLeds<LED_TYPE, LED_DT, LED_CK, COLOR_ORDER>(leds, NUM_LEDS); // Use this for WS2801 or APA102\n\n currentBlending = LINEARBLEND;\n \n FastLED.setBrightness(max_bright);\n FastLED.setMaxPowerInVoltsAndMilliamps(5, 500); // FastLED Power management set at 5V, 500mA.\n \n} // setup()\n\n\n\nvoid loop () {\n\n EVERY_N_MILLISECONDS(100) {\n uint8_t maxChanges = 24; \n nblendPaletteTowardPalette(currentPalette, targetPalette, maxChanges); // AWESOME palette blending capability.", "\n }\n\n EVERY_N_SECONDS(5) { // Change the target palette to a random one every 5 seconds.", "\n static uint8_t baseC = random8(); // You can use this as a baseline colour if you want similar hues in the next line.", "\n targetPalette = CRGBPalette16(CHSV(random8(), 255, random8(128,255)), CHSV(random8(), 255, random8(128,255)), CHSV(random8(), 192, random8(128,255)), CHSV(random8(), 255, random8(128,255)));\n }\n\n EVERY_N_MILLISECONDS(thisdelay) { // FastLED based non-blocking delay to update/display the sequence.", "\n sinelon(); // Call our sequence.", "\n }\n\n FastLED.show();\n\n} // loop()\n\n\n\nvoid sinelon() { // a colored dot sweeping back and forth, with fading trails\n \n fadeToBlackBy( leds, NUM_LEDS, thisfade);\n int pos1 = beatsin16(thisbeat,0,NUM_LEDS);\n int pos2 = beatsin16(thatbeat,0,NUM_LEDS);\n\n leds[(pos1+pos2)/2] += ColorFromPalette(currentPalette, myhue++, thisbri, currentBlending);\n\n} // sinelon()\n\n\n\n" ]
{ "pile_set_name": "Github" }
[ 0.0014542823191732168, 0.0006253682076931, 0.000734671950340271, 0.0006319688400253654, 0.0007074471213854849, 0.000703945872373879, 0.0007994114421308041, 0.14498315751552582, 0.0006996574811637402, 0.0006379979313351214, 0.002844815142452717, 0.0006703409599140286, 0.0005857317009940743, 0.0007045096135698259, 0.0005957522080279887, 0.0008575434912927449, 0.0007281922735273838, 0.001034854562021792, 0.0008345958776772022, 0.002142637502402067, 0.0006867405609227717, 0.0007085661054588854, 0.0007988711004145443, 0.0008742181234993041, 0.000574604026041925, 0.0007935396279208362, 0.0008006750722415745, 0.0006488532526418567, 0.000790960737504065, 0.0008152968366630375, 0.0009861515136435628 ]
0.005531
31
[ "Tag: Weihnachten\n\nThere are a few similarities between American traditions, at the least, and German traditions for Christmas. ", "However, even though in both the United States and in Germany Christmas is a commercial season, the season looks a bit different in Germany!", "\n\nWhen I grew up (in the US), we had a glass pickle ornament on our Christmas tree, and we were told it was because of an old German tradition. ", "As my family could easily trace their ancestry back only a generation or two from Germany, they took it to be fact.", "\n\nUnfortunately, while these glass ornaments are often made in Germany (as are many glass ornaments for Christmas), the pickle ornament has never been a tradition in Germany by natives.", "\n\nThe Christmas tree, however, is!", "\n\nWhile evergreen plants have been used to represent life eternal in human imagination for centuries, the tradition of the Christmas tree (Tannenbaum) has been carried over from Germany to other parts of Europe and also the Americas. ", "It is said that during the Christianization of the Germanic tribes, St Boniface used the connection between renewal and everlasting life to dedicate the fir tree (Tannenbaum) to the Christ Child, which eventually displaced the oak tree which had been sacred to Odin. ", "However, we can trace the use of the Tannenbaum – raising it in rooms and decorating it – to around the 1550s due to looking at carols from the time.", "\n\nChristmas markets\n\nGermany has other major traditions for Christmas too, though, that sometimes we do not see as easily in the United States. ", "The tradition of the Christmas market (Weihnachtmarkt; also known by other names) in Germany stemmed from winter markets to help people get through the cold winter months, and nowadays any town of moderate size in Germany will boast at least one of these markets. ", "In the United States we only see these markets in larger cities, especially the cities that have a large German-American population; I do see them in other cities in Europe however, such as in Guildford, in England. ", "These markets generally start when Advent starts (though some start as early as late November!) ", "and run for about three to four weeks. ", "You can buy food at these markets, too – everything from currywurst to cookies to cider. ", "These markets can be found in other places across Europe, but the market in Dresden has the strongest claim for being the oldest Christmas market (1434) as far as we can tell!", "\n\nThe Christmas season\n\nAs stated, this means Christmas has a lot of commercialism to it, but instead of going to big stores, it has a bit more local flavor in Germany. ", "Christmas itself is its own season, with German traditions incorporating Advent (the four weeks before Christmas Day) as well as “the twelve days of Christmas” between December 25th and January 6th – that is, between Christmas Day and Epiphany, the day in which the three wise men are supposed to come from the east to visit the newly born Christ child (as per the gospel of Luke in Christian scripture). ", "While the gift-giving date has changed over the years from the festival of St Nicholas himself (December 6-7) to Epiphany (January 6th) to the more common Christmas Eve (Germans don’t tend to open presents on Christmas Day!), ", "the idea of Christmas as an anticipated, joyous season to combat the dreary, cold days of winter has a long history in Germany.", "\n\nWhat’s your favorite part of Christmas – or do you not celebrate Christmas at all? ", "Let us know!" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007051248685456812, 0.0005979257985018194, 0.0010993860196322203, 0.0006325331632979214, 0.00074179214425385, 0.0010710892966017127, 0.0005846775020472705, 0.0008479945827275515, 0.0005451997276395559, 0.000584398687351495, 0.0007174217607825994, 0.0005241894978098571, 0.00062415940919891, 0.0007293378585018218, 0.001178892096504569, 0.0006314583006314933, 0.0005515331868082285, 0.0007232718635350466, 0.0007540718070231378, 0.0011280059115961194, 0.0016440103063359857, 0.0017236055573448539 ]
0.000834
22
[ "\\pgfplotsset{\n myplot/.style = {\n width = 12cm, height = 8cm,\n samples = 75,\n ticks = none,\n ymin = -0.25,\n }\n}%\n\n\\begin{tikzpicture}[>=stealth,\n every node/.style ={rounded corners},\n declare function ={\n normalpdf(\\x,\\mu,\\sigma)=\n (2*3.1415*\\sigma^2)^(-0.5)*exp(-(\\x-\\mu)^2/(2*\\sigma^2));\n },\n mynode/.style = {fill opacity = 0.75, text opacity = 1, minimum height = 1.25em}]\n\n \\begin{axis}[myplot, smooth]\n\n \\def\\zValue{1.282}\n \\addplot[domain = \\zValue:4, draw = none, fill = magenta, opacity = 0.75] {normalpdf(x, 0, 1)} \\closedcycle;\n \\addplot[domain = -4:\\zValue, draw = none, fill = gray!30, opacity = 0.75] {normalpdf(x, 0, 1)} \\closedcycle;\n \\addplot[smooth, thick, domain = -4:4, color = gray] {normalpdf(x, 0, 1)};\n \\path[draw, o->] (axis cs: 1.7, 0.03) to[out = 90, in = 180] (axis cs: 3, 0.2) node[right] {$\\alpha$};\n \\node at (axis cs: -0.25, 0.1) {$1 - \\alpha$};\n \\node[below right, align=left] at (axis description cs: 0.01, 0.97) {Unilateral {\\`a} direita\\\\ $H_0: \\theta > \\theta_0$};\n\n \\begin{scope}[yshift = -0.2em]\n \\draw [decorate, decoration = {brace, amplitude = 5pt}]\n (axis cs: \\zValue, 0) -- (axis cs: -4, 0)\n node [mynode, midway, yshift = -1.25em, fill = gray!30]\n {\\scriptsize Regi{\\~a}o de n{\\~a}o rejei{\\c c}{\\~a}o de $H_0$};\n \\draw [decorate, decoration = {brace, amplitude = 5pt}]\n (axis cs: 4, 0) -- (axis cs: \\zValue, 0)\n node[mynode, midway, yshift = -1.25em, fill = magenta] (a1) {\\scriptsize Regi{\\~a}o de rejei{\\c c}{\\~a}o de $H_0$};\n \\end{scope}\n\n \\end{axis}\n\n\\end{tikzpicture}%------------------------------------------------------" ]
{ "pile_set_name": "Github" }
[ 0.006219102535396814 ]
0.006219
1
[ " RECOMMENDED FOR FULL-TEXT PUBLICATION\n Pursuant to Sixth Circuit I.O.P. 32.1(b)\n File Name: 15a0169p.06\n\n UNITED STATES COURT OF APPEALS\n FOR THE SIXTH CIRCUIT\n _________________\n\n\n UNITED STATES OF AMERICA, ┐\n Plaintiff-Appellee, │\n │\n │ No. ", "14-5615\n v. │\n >\n │\n JAMES PAUL LOWE, │\n Defendant-Appellant. ", " │\n ┘\n Appeal from the United States District Court\n for the Eastern District of Tennessee of Chattanooga\n No. ", "1:13-cr-00029—Harry S. Mattice, Jr., District Judge.", "\n Argued: April 23, 2015\n Decided and Filed: July 28, 2015\n\n Before: SILER, COOK, and STRANCH, Circuit Judges.", "\n\n _________________\n\n COUNSEL\n\nARGUED: Christopher T. Varner, EVANS HARRISON HACKETT PLLC, Chattanooga,\nTennessee, for Appellant. ", "Terra L. Bay, UNITED STATES ATTORNEYʼS OFFICE,\nChattanooga, Tennessee, for Appellee. ", "ON BRIEF: Christopher T. Varner, EVANS\nHARRISON HACKETT PLLC, Chattanooga, Tennessee, for Appellant. ", "Terra L. Bay, UNITED\nSTATES ATTORNEYʼS OFFICE, Chattanooga, Tennessee, for Appellee.", "\n\n _________________\n\n OPINION\n _________________\n\n COOK, Circuit Judge. ", "James Paul Lowe appeals his conviction for knowingly receiving,\ndistributing, and possessing child pornography in violation of 18 U.S.C. § 2252(a). ", "He concedes\n\n\n\n\n 1\n\fNo. ", "14-5615 United States v. Lowe Page 2\n\nthat a laptop computer found in his home contained hundreds of image and video files depicting\nchild pornography but maintains that no rational juror could find beyond a reasonable doubt that\nhe knew about those files or placed them there. ", "We agree and REVERSE Lowe’s conviction.", "\n\n I.\n\n Between March and August 2011, a user downloaded child pornography to a laptop\nfound in the home James Lowe shared with his wife, Stacy Lowe. ", "The Lowes lived at 2204\nRobin Street in Athens, Tennessee. ", "Michael Lowe, a minor relative described by one witness as\nJames Lowe’s “adopted child,” lived with James and Stacy at some point during 2011 but moved\nout before agents searched the home in August.", "\n\n Four government witnesses testified at Lowe’s trial. ", "Bradley County Sheriff’s Office\nDetective J.P. Allman recounted learning in early 2011 that someone was using a particular\nInternet Protocol (IP) address to share child pornography. ", "On May 23, he searched for that IP\naddress and discovered a computer sharing files with names consistent with child pornography\nover a peer-to-peer network. ", " He downloaded one video and two still images of child\npornography from the computer’s shared folder.", "\n\n Detective Allman subpoenaed AT&T for information about the account associated with\nthe IP address. ", "AT&T’s records listed James Lowe as the account holder, 2204 Robin Street as\nthe billing address, and Lowe.Stacy@yahoo.com as the email address associated with the\naccount. ", "Detective Allman conducted surveillance and determined that, as of August 2011,\nJames and Stacy Lowe were the sole residents of 2204 Robin Street.", "\n\n Detective Allman and other officers executed a search warrant on August 8. ", "Stacy was\nhome during the search but James was not. ", "Law enforcement officers seized three computers: a\nDell Inspiron laptop with the username “Stacy” found in the bedroom, an HP Pavilion laptop\nwith the username “Jamie” found in the office, and a desktop that was also located in the office.", "\nDetective Allman testified that his role during the search was “speaking with Ms. Lowe.” (", "R. 75,\nAllman Test., ", "Day 1 Trial Tr. ", "at 32.) ", "He later told the jury that he learned that the laptop found\nin the office belonged to James Lowe. ", "Agents also found a form on the desk in the office that\n\fNo. ", "14-5615 United States v. Lowe Page 3\n\nlisted James’s name, social security number, date of birth, and the email address\njamedog111@excite.com.", "\n\n FBI Special Agent Stephen McFall told the jury that he examined the three hard drives\nand discovered that only the HP Pavilion laptop contained child pornography. ", "Agent McFall\nfound 639 image files and 176 video files depicting child pornography on the device.", "\n\n A user named the HP Pavilion laptop “Jamie-PC” and created a single user account,\n“Jamie.” ", "The laptop’s settings did not require users to enter a password to access the “Jamie”\naccount or any of the laptop’s files and programs. ", "And while the Lowes password-protected\ntheir residence’s wireless-internet account, the laptop automatically connected to the internet\nthrough a stored wireless password.", "\n\n The laptop’s desktop screen included the following shortcuts, icons, and files: the\ncomputer’s recycling bin, an internet browser, iTunes, Shareaza (a peer-to-peer file-sharing\nprogram), a media player, a folder labeled Microsoft Office Programs, a PDF file labeled “2011-\n_Auhto…,” four Microsoft Excel spreadsheets labeled “Copy of Service Aut…,” an MP3 music\nfile, and what appeared to be a computer game. ", "Agent McFall told the jury that the spreadsheets\n“looked like they were authorization agreements for business.” (", "R. 75, McFall Test., ", "Day 1 Trial\nTr. ", "at 107.)", "\n\n Agent McFall testified at length about the Shareaza peer-to-peer file-sharing program\nused to download child pornography to the HP Pavilion laptop.1 Someone installed the program\non February 24, 2011. ", "Because no one overrode the program’s default username setting, the\nShareaza account adopted the laptop’s username, “Jamie.” ", "But someone altered the default for\nthe program’s chat-feature username and instead entered “JA.”", "\n\n Shareaza was not password-protected, and it automatically started running in the\nbackground whenever someone switched the computer on. ", "But users had to open the program to\nsearch for files and initiate downloads.", "\n\n\n\n\n 1\n Shareaza was also installed on the desktop computer.", "\n\fNo. ", "14-5615 United States v. Lowe Page 4\n\n The Shareaza home screen—which any user would see upon opening the program—\nshowed that someone searched for terms consistent with child pornography such as “young\nmama” and “PTHC” (which stands for “pre-teen hard core”), and non-pornographic terms such\nas “Oceans 11,” “Ellie Goulding,” and “Tron.” ", "The list of downloads on the home screen\nincluded files named “PTHC Pedoland Frifam Heidi,” “11 yo sleeping kid,” and “new girl img-\n0063-r10.”", "\n\n Files were stored in an “incomplete” folder within Shareaza until they finished\ndownloading, at which point they would appear in the laptop’s “downloads” folder. ", "Agent\nMcFall testified that files could “take a very long time to download” and that downloading time\ndepended on factors such as the internet connection’s speed. (", "R. 75, McFall Test., ", "Day 1 Trial\nTr. ", "at 103.)", "\n\n Most of the laptop’s images and videos depicting child pornography were stored in\nShareaza libraries. ", "Agent McFall also found evidence of images, some of which had been\ndeleted, elsewhere on the laptop’s hard drive. ", "For instance, the recycling bin contained a video\ntitled “Lolita PTHC 2011 3yo Ariel part 1.” ", "Agent McFall found references to the three files\nDetective Allman downloaded on May 23 through a text-string search, but someone deleted the\nactual files before agents seized the computer. ", "He never specified whether the “downloads”\nfolder contained child-pornography files.", "\n\n Agent McFall admitted that he could not pinpoint when someone searched for or initiated\ndownloads of child pornography. ", "But forensic analysis revealed the date and time on which\npartial or completed downloads appeared on the laptop’s hard drive. ", " Microsoft Windows\nregistry data revealed that a user opened files depicting child pornography as recently as\nAugust 4.", "\n\n Agent McFall also testified about the laptop’s internet-usage history as recorded through\n“cookies.” ", "On numerous occasions between March and August, downloads completed within\nminutes of someone accessing a web-based email service or one of several retail, banking,\nappliance-repair, and travel websites. ", "Agent McFall identified one date—March 10—on which a\nuser appeared to log in to Yahoo!", "’s email service. ", "When the government’s attorney asked if he\nrecalled “what the log-in was,” he replied, “For the Yahoo mail, I don’t remember exactly. ", "I\n\fNo. ", "14-5615 United States v. Lowe Page 5\n\nthink Jamie or jame dog was part of the, part of the e-mail address.” (", "R. 76, McFall Test., ", "Day 2\nTrial Tr. ", "at 173.) ", "In general, however, Agent McFall attributed no special significance to the\nlaptop’s browsing history.", "\n\n Agent McFall also told jurors that a user opened an “East Tennessee Appliance Services”\ninvoice listing 2204 Robin Street as the business address about forty minutes before a child-\npornography video finished downloading on March 3. ", "No witness testified about what James\nand Stacy Lowe did for a living or whether the other two computers also contained business\ndocuments.", "\n\n Lowe moved for a judgment of acquittal at the close of the government’s case and rested\nwithout putting on his own evidence. ", " The court denied his motion but expressed some\nmisgivings about the government’s proof:\n\n I have to say, in this case, it has been particularly difficult, even though it’s my\n job to do so, to discern where that line [between speculation and reasonable\n inference] is and where what might be a reasonable inference that can be drawn\n from the record evidence becomes nothing more than an invitation for the jury to\n speculate as to what the evidence may be or what it may show.", "\n\n(R. 77, Day 3 Trial Tr. ", "at 222–23.) ", "After the jury found Lowe guilty on all three counts, the\ndistrict court denied his post-trial motion for a judgment of acquittal. ", "It sentenced Lowe to\n150 months’ imprisonment, varying significantly below the guidelines range of 210 to 240\nmonths. ", "Lowe timely appealed.", "\n\n II.", "\n\n We review de novo the district court’s judgment denying Lowe’s motion for acquittal.", "\nUnited States v. Blanchard, 618 F.3d 562, 574 (6th Cir. ", "2010). ", " In considering Lowe’s\nsufficiency-of-the-evidence challenge, we “view[] the evidence in the light most favorable to the\nprosecution” and must affirm if “any rational trier of fact could have found the essential elements\nof the crime beyond a reasonable doubt.” ", "United States v. Washington, 715 F.3d 975, 979 (6th\nCir. ", "2013) (quoting Jackson v. Virginia, 443 U.S. 307, 319 (1979)) (internal quotation marks\nomitted). “", "Circumstantial evidence alone is sufficient to sustain a conviction and such evidence\nneed not remove every reasonable hypothesis except that of guilt.” ", "United States v. Algee,\n\fNo. ", "14-5615 United States v. Lowe Page 6\n\n599 F.3d 506, 512 (6th Cir. ", "2010) (quoting United States v. Kelley, 461 F.3d 817, 825 (6th Cir.", "\n2006)) (internal quotation marks omitted); see also United States v. Garcia, 758 F.3d 714, 718–\n19 (6th Cir. ", "2014) (affirming a firearm-possession conviction where “circumstantial evidence\nand a chain of inferences” would permit a jury to conclude that the defendant actually possessed\nthe weapon). “", "A convicted defendant bears ‘a very heavy burden’ to show that the government’s\nevidence was insufficient.” ", "United States v. Tragas, 727 F.3d 610, 617 (6th Cir. ", "2013) (quoting\nUnited States v. Kernell, 667 F.3d 746, 756 (6th Cir. ", "2012)).", "\n\n III.", "\n\n Notwithstanding Lowe’s heavy burden, we agree with his argument that no rational juror\ncould find him guilty beyond a reasonable doubt based on the evidence presented at trial. ", "A\njuror could reasonably infer that James owned and occasionally used the laptop from (1) the\ndevice’s sole username, “Jamie,” a common diminutive of James; (2) Detective Allman’s\ntestimony that the laptop “belonged to” James; and (3) Agent McFall’s testimony about the\nMarch 10 visits to the Yahoo! ", "email log-in page. ", "But, without improperly stacking inferences,\nno juror could infer from such limited evidence of ownership and use that James knowingly\ndownloaded, possessed, and distributed the child pornography found on the laptop.", "\n\n James shared his home with two other people, both of whom could access the HP\nPavilion laptop’s “Jamie” account and Shareaza file-sharing program without entering\npasswords. ", "We need not decide if Detective Allman’s testimony that Michael Lowe moved out\nin “early 2011” and Agent McFall’s testimony that someone at 2204 Robin Street used the laptop\nto view images as late as August 4 permitted the jury to conclude that someone other than\nMichael placed images on the computer. ", "Even if a juror reasonably could rule out Michael’s\nresponsibility for at least some of the images, the remaining evidence provided no basis to\ndetermine whether James or Stacy (or both) knowingly possessed child pornography. ", "Compare\nUnited States v. Moreland, 665 F.3d 137, 143–52 (5th Cir. ", "2011) (reversing conviction in light of\nevidence that three people used the defendant’s user account and the absence of evidence\nspecifically linking the defendant to the images), with United States v. Koch, 625 F.3d 470, 478–\n79 (8th Cir. ", "2010) (sustaining conviction where the defendant lived alone and the username of\nthe computer seized from his bedroom matched his first name).", "\n\fNo. ", "14-5615 United States v. Lowe Page 7\n\n Importantly, the government presented no evidence from which a juror could infer that\nStacy did not use the laptop over the five-month period. ", "First, although a juror reasonably could\ninfer that Stacy used the “Stacy” laptop from evidence that she was home alone during the search\nand that agents found that laptop powered on, the juror could not draw the additional inference\nthat Stacy did not use the “Jamie” laptop. ", "Second, no juror reasonably could conclude that\nJames and not Stacy used the HP Pavilion laptop to save business records, open an invoice\nlisting 2204 Robin Street as the return address, and access banking, retail, travel, and appliance-\nrepair websites on dates when partial or complete child-pornography files appeared on the hard\ndrive. ", "The government presented no evidence of what James and Stacy did for a living, whether\nthey worked inside or outside of the home, their interests and hobbies, or where they banked.", "\nFurther, Agent McFall attributed no special significance to the pattern of internet activity during\nthe period in question. ", "Although a juror might infer from visits to appliance-repair and banking\nwebsites that an adult primarily used the computer, she could only speculate about whether the\nadult was James or Stacy Lowe. ", "See Moreland, 665 F.3d at 145–46 (reversing conviction where\na forensic expert admitted that the computer’s internet-usage patterns did not show who visited\nthe websites in question).", "\n\n In sum, the evidence presented here fell well short of what we have found sufficient to\nconvict in other cases involving multiple possible users of a single device. ", "In United States v.\nOufnac, 449 F. App’x 472 (6th Cir. ", "2011), for instance, “ample other evidence” linked the\ndefendant to images found on a shared device. ", "Id. at 476. ", "Although the computer in question\nhad three user accounts, pornographic images appeared only in Oufnac’s personal “My\nDocuments” folder within his password-protected account. ", "Id. at 473, 476–77. ", "Oufnac’s former\ngirlfriend testified about finding child pornography on his computer on several previous\noccasions. ", "When she confronted him, he said the images were “none of her business” but\nadmitted that they aroused him, and, on one occasion, he agreed to destroy a compact disc on\nwhich she found “files and files and files and files” of child pornography. ", "Id. at 473, 476.", "\nOufnac also admitted to law enforcement that he recently viewed child pornography, although he\nlater claimed that the images were “fake.” ", "Id. at 474, 476.", "\n\fNo. ", "14-5615 United States v. Lowe Page 8\n\n Similarly, in United States v. Mellies, 329 F. App’x 592 (6th Cir. ", "2009), we sustained a\ndefendant’s conviction for possessing child pornography found on a laptop and compact discs in\nhis home office, notwithstanding evidence that his wife and stepson occasionally used the laptop.", "\nId. at 595, 607–08. ", "The images were primarily stored in password-protected files and folders.", "\nId. at 607. ", "Mellies was “associated with” all but two of the hundreds of documents and\nthousands of emails stored on the laptop, and he was the only member of the household whose\nfingerprints appeared on compact discs containing child pornography. ", "Id. at 595. ", "Further, a\ndetective testified that Mellies told arresting officers: “I’m not a part of some sort of a ring” and\n“[T]his is something that doesn’t have anything to do with anybody else at all.” ", "Id. at 594.", "\n\n Of course, Oufnac and Mellies do not establish a minimum threshold for proving\nknowing possession of child pornography with circumstantial evidence. ", "They do, however,\nidentify the types of evidence on which a jury reasonably may rely to convict an individual of\npossessing child pornography found on a shared device. ", "The jury heard no such evidence in\nLowe’s case, despite the fact that the non-password-protected laptop containing pornographic\nimages was found in a common area of a home shared by three individuals.", "\n\n IV.", "\n\n Along with the lack of proof concerning who downloaded the images in the first instance,\nthe evidence did not permit a juror to conclude that James knew the HP Pavilion laptop\ncontained child-pornography files and permitted them to remain on the computer. ", "Most of the\nimages and videos depicting child pornography were stored in Shareaza libraries. ", "Without more\ninformation about James’s computer use, no juror reasonably could infer that he opened\nShareaza during the five-month period in question. ", "Further, the evidence did not suggest that\nsomeone using the laptop for innocent purposes would know about ongoing child-pornography\ndownloads if he or she did not open Shareaza.", "\n\n With respect to images stored outside of Shareaza, the evidence showed that, at most,\nimages and videos temporarily appeared in the computer’s “downloads” folder and recycling bin.", "\nAlthough a juror might be able to infer that a defendant knows about pornography stored in her\npersonal files, especially if the files contain recently opened or created documents, he could not\ndraw the same conclusion about pornography that automatically appears in the “downloads”\n\fNo. ", "14-5615 United States v. Lowe Page 9\n\nfolder or that a user moved to the recycling bin. ", "Compare Oufnac, 449 F. App’x at 476–77\n(explaining that a reasonable juror could conclude that a defendant either saved ninety-six\nimages and videos to his personal “My Documents” folder within his password-protected\naccount or “at least knew of and permitted their continued existence”), with Moreland, 665 F.3d\nat 144–45, 152 (noting the lack of a “circumstantial indicium that established that [the defendant]\nknew of the images or had the ability to access them” when images were found primarily in the\nhard drive’s “unallocated slack spaces”).", "\n\n In sum, no juror could conclude beyond a reasonable doubt from the evidence presented\nat trial that James Lowe knowingly received, possessed, and distributed the images and videos\ndepicting child pornography found on the HP Pavilion laptop seized from his home.", "\n\n V.\n\n We REVERSE James Lowe’s conviction and REMAND for further proceedings\nconsistent with this opinion.", "\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0006701087113469839, 0.000647963082883507, 0.0007766615017317235, 0.0007663950673304498, 0.0006083197076804936, 0.000696705945301801, 0.0006023957976140082, 0.0005783449742011726, 0.0006023957976140082, 0.0013245877344161272, 0.0052098543383181095, 0.0006284829578362405, 0.0010816610883921385, 0.0005776084726676345, 0.004639475606381893, 0.0008873711340129375, 0.0006670455331914127, 0.0006020011496730149, 0.007320521865040064, 0.0016584447585046291, 0.015294801443815231, 0.0006941933534108102, 0.0006069682422094047, 0.0006427832413464785, 0.0008040338288992643, 0.0007554649491794407, 0.0008021516259759665, 0.000659188546705991, 0.0007344332407228649, 0.0007362867472693324, 0.0007161341491155326, 0.0006199946510605514, 0.0009369096951559186, 0.0006206387770362198, 0.0017432956956326962, 0.0037012342363595963, 0.0006276188651099801, 0.0006753274938091636, 0.0007658427348360419, 0.0006945556378923357, 0.0006060606683604419, 0.0007397547597065568, 0.0007362867472693324, 0.0007177861989475787, 0.000975782226305455, 0.0007699816487729549, 0.0007304222090169787, 0.0009026224142871797, 0.0006111515685915947, 0.0006734372582286596, 0.0013785817427560687, 0.013712113723158836, 0.027402421459555626, 0.0007470384589396417, 0.000614919001236558, 0.0007397547597065568, 0.0007362867472693324, 0.0007277018157765269, 0.010452333837747574, 0.0008533098734915257, 0.0005875808419659734, 0.0007349558873102069, 0.010984200984239578, 0.003551086178049445, 0.0006389572517946362, 0.003989751450717449, 0.0006361684645526111, 0.0005692463601008058, 0.0008567116456106305, 0.0007150889141485095, 0.000632226059678942, 0.001246255706064403, 0.000985111459158361, 0.000743082317057997, 0.0007389818783849478, 0.0007232894422486424, 0.0006223648670129478, 0.009794234298169613, 0.0005945722805336118, 0.0010174937779083848, 0.0006818835972808301, 0.0006350828916765749, 0.0007176679209806025, 0.0011735069565474987, 0.0008232326945289969, 0.0006744926213286817, 0.0011519683757796884, 0.0008004881674423814, 0.00094917684327811, 0.0007440905901603401, 0.0006246081320568919, 0.0010888775577768683, 0.0006106636137701571, 0.0008399487705901265, 0.0010310423094779253, 0.0008378244237974286, 0.0007184062269516289, 0.0006598950712941587, 0.0006053286488167942, 0.0007520936196669936, 0.000977679155766964, 0.0007445066003128886, 0.0008285613148473203, 0.0012429648777469993, 0.0007633145432919264, 0.0008800304494798183, 0.0006427538464777172, 0.002368698362261057, 0.0007047776016406715, 0.0006189175182953477, 0.0018302369862794876, 0.0007402311312034726, 0.0006458262214437127, 0.0006056562415324152, 0.0013785817427560687, 0.0006626538815908134, 0.0006959642632864416, 0.0009175048908218741, 0.00057554105296731, 0.0005948460893705487, 0.0007244224543683231, 0.0006123415660113096, 0.0006574891158379614, 0.0009047462954185903, 0.0005719002801924944, 0.0016575149493291974, 0.001345293945632875, 0.0012654919410124421, 0.012994092889130116, 0.014770898036658764, 0.0017871377058327198, 0.007740784902125597, 0.002021514344960451, 0.0013785817427560687, 0.0008412070455960929, 0.0009195585153065622, 0.0017558009130880237, 0.0006794202490709722, 0.0037196457851678133, 0.007992208935320377, 0.004776389338076115, 0.0012147935340180993, 0.011395142413675785, 0.0026141193229705095, 0.0016992164310067892, 0.0009192838333547115, 0.0013316390104591846, 0.0010941806249320507, 0.014268112368881702, 0.0007154232589527965, 0.0014673902187496424, 0.0005879594828002155, 0.0011669908417388797, 0.0006384474108926952, 0.0006429495988413692, 0.0010663820430636406, 0.0006558669847436249, 0.001995444530621171 ]
0.001998
158
[ "An Energy Alternative: Free Energy\n\nThere has been much debate about what is often called “free” energy—energy that can supposedly, with the right technology, be drawn straight out of the atmosphere, and in very abundant supply. ", "The debates are about whether the stuff actually exists or not, what it would actually cost were it to be harnessed, and if it does exist is it truly as abundant and efficient as it’s being made out to be by proponents of research and development into this potential alternative energy source.", "\n\nWhen one hears the phrase “free energy device”, one might be hearing about one of several different concepts. ", "This might mean a device for collecting and transmitting energy from some source that orthodox science does not recognize; a device which collects energy at absolutely no cost; or an example of the legendary perpetual motion machine. ", "Needless to say, a perpetual motion machine—a machine which drives itself, forever, once turned on, therefore needing no energy input ever again and never running out of energy—is impossible. ", "However, it is not so simple to say that a new technology for harnessing the energy “floating” in the atmosphere is impossible. ", "New technologies replace old ones all the time with abilities that had just been “impossible”. ", "Harnessing the power of the atom for providing huge amounts of energy was “impossible” until the 1940s. ", "Flying human beings were an “impossible” thing until the turn of the 20th century and the Wright Brothers’ flight.", "\n\nThe biggest claim of the proponents of “free” energy is that enormous amounts of energy can be drawn from the Zero Point Field. ", "This is a quantum mechanical state of matter for a defined system which is attained when the system is at the lowest possible energy state that it can be in. ", "This is called the “ground state” of the system. ", "Zero Point Energy (ZPE) is sometimes referred to as “residual” energy and it was first proposed to be usable as an alternative form of energy way back in 1913 by Otto Stern and Albert Einstein. ", "It is also referred to as “vacuum energy” in studies of quantum mechanics, and it is supposed to represent the energy of totally empty space. ", "This energy field within the vacuum has been likened to the froth at the base of a waterfall by one of the principal researchers into and proponents of Hal Puthof. ", "Puthof also explains, the term ‘zero-point’ simply means that if the universe were cooled down to absolute zero where all thermal agitation effects would be frozen out, this energy would still remain. ", "What is not as well known, however, even among practicing physicists, are all the implications that derive from this known aspect o quantum physics. ", "However, there are a group of physicists—myself and colleagues at several research labs and universities—who are examining the details, we ask such questions as whether it might be possible to ‘mine’ this reservoir of energy for use as an alternative energy source, or whether this background energy field might be responsible for inertia and gravity. ", "These questions are of interest because it is known that this energy can be manipulated, and therefore there is the possibility that the control of this energy, and possibly inertia and gravity, might yield to engineering solutions. ", "Some progress has been made in a subcategory of this field (cavity quantum electrodynamics) with regard to controlling the emission rates of excited atoms and molecules, of interest in laser research and elsewhere." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005533450748771429, 0.0006170639535412192, 0.0005060485564172268, 0.0006385092274285853, 0.001039851806126535, 0.000647258828394115, 0.0009198055486194789, 0.00068778166314587, 0.00133889343123883, 0.0007826702785678208, 0.0006994018331170082, 0.0006425713072530925, 0.0006108955712988973, 0.0007020192570053041, 0.000780576141551137, 0.0006839184206910431, 0.000598989543505013, 0.0005248724482953548, 0.0005416441708803177, 0.0005925464211031795 ]
0.000705
20
[ "If I understand this correctly I can select either reciever setting based on how they sound to my ear, or can I harm my center running it large? ", "I have it set small and sounds great, just wanted to check before I tried large. ", "Thanks for the help.", "\n\nSet all speakers to small, with a receiver crossover of 80hz. ", "Turn the crossover knob on the 350 all the way clockwise to the highest setting to get it out of the way for receiver management. ", "This setting is the norm for most people, and also THX recomendation. ", "If your receiver will allow for different crossovers for each speaker, the crossover setting may differ from speaker to speaker. ", "The only speaker you MIGHT try large on, would be the 80's with LFE+Main on the receiver. ", "However, I would still use small. ", "A lot depends on your room size also.", "\n\nI don't think you are likely to hurt the VP150 running it in Large but you are probably going to miss out on some low frequency content on the center channel. ", "If you set the center to \"small\" then any LF on the center channel will be routed to the subwoofer.", "\n\nThere isn't normally a lot of LF content on the center channel but every so often there seems to be quite a bit.", "\n\nI would stay with \"small\" personally. ", "The VP150 is not designed to reproduce all frequencies, just to do a great job down to where the subwoofer takes over." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006651525036431849, 0.0005358175840228796, 0.0005450028111226857, 0.0009524381021037698, 0.0006331392796710134, 0.0006393577787093818, 0.0005318245966918766, 0.000708439911250025, 0.0006490313680842519, 0.0007239911356009543, 0.000844527268782258, 0.0011740296613425016, 0.0006051348755136132, 0.0007314221002161503, 0.0008496652590110898 ]
0.000719
15
[ "Q:\n\nFrom an included file, how can I get the filename of the file doing the including?", "\n\nApologies for the poorly worded question title - no idea how to put it better!", "\nIn the following code, when I execute ruby bar.rb, how can I make it output bar.rb, rather than foo.rb?", "\nIn foo.rb:\nmodule Foo\n def filename\n __FILE__\n end\nend\n\nIn bar.rb:\nrequire_relative 'foo'\ninclude Foo\n\nputs filename # outputs 'foo.rb'\n\nThis is for a library function that, each time some code is executed, records the location (and git ref) of that code.", "\n\nA:\n\nYour question stimulated me to crack open the Ruby interpreter source and see how __FILE__ actually works. ", "The answer is pretty interesting: it's implemented right inside the parser. ", "The lexer has a special token type for __FILE__. ", "When the parser sees that token, it converts it to a string constant, which contains the name of the file the parser is working on.", "\nFrom line 14948 of ext/ripper/ripper.c:\ncase keyword__FILE__:\nreturn NEW_STR(rb_external_str_new_with_enc(ruby_sourcefile, strlen(ruby_sourcefile),\n rb_filesystem_encoding()));\n\nI think this should make it clear that trying to make __FILE__ return the name of the including file is completely impossible, unless you hack the Ruby interpreter source, or write your own preprocessor which transforms __FILE__ to something else before passing the Ruby source to the interpreter!", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007000927580520511, 0.0007097952184267342, 0.0008153853705152869, 0.001130257616750896, 0.0008716770680621266, 0.0006172138964757323, 0.0006943510961718857, 0.0007562616374343634, 0.0007983589894138277, 0.001995444530621171 ]
0.000909
10
[ "Introduction {#s1}\n============\n\nPatients with COPD show great variation in symptoms, limitations and quality of life, which often hampers good medical care. ", "This calls for a multifaceted response, including different elements of care (eg, smoking cessation, physiotherapeutic reactivation, self-management, optimal medication adherence), delivered by various healthcare providers. ", "In the last decade, the concept of integrated disease management (IDM) was introduced to improve quality and efficiency of care and to reduce healthcare costs. ", "Earlier systematic reviews evaluating the effectiveness of IDM in patients with COPD precluded conclusive evidence, as they presented either limited pooled data, did not take into account differences in study design, or are currently out of date. ", "Therefore, the objective of this Cochrane systematic review was to evaluate the effectiveness of IDM COPD programmes on the most relevant patient-reported outcomes: quality of life, exercise tolerance and exacerbation-related outcomes.", "\n\nMethods {#s2}\n=======\n\nFull details of the methods are reported in the original Cochrane publication.[@R1] Briefly, we included randomised controlled trials (RCTs) published between 1990 and 2012, in which IDM was compared to a control intervention. ", "IDM programmes had to consist of multidisciplinary (≥2 healthcare providers) and multitreatment (≥2 components) interventions with duration of at least 3 months until 12 months of follow-up. ", "Primary outcome measures were (health-related) quality of life, exercise tolerance and exacerbation related outcomes. ", "We identified citations using the highly sensitive Cochrane collaboration search strategy in all possible databases. ", "Two reviewers independently searched, assessed and extracted relevant data of all RCTs. ", "Results were pooled by applying random-effects modelling, using the mean change from baseline to end point for each group for continuous data; and the proportion of participants with each event for dichotomous data. ", "We pooled data reported at 3 months for meta-analysis, as our predetermined inclusion criteria postulated a programme of at least 3 months duration (to ensure sufficient impact). ", "If data at 3 months were unavailable, we analysed the data most closely measured after this time point. ", "We performed subgroup analyses on type of healthcare setting (primary care vs secondary care), type of control group (usual care vs monodisciplinary treatment) and type of dominant component of the IDM programme (exercise vs self-management studies).", "\n\nResults {#s3}\n=======\n\nIncluded studies {#s3a}\n----------------\n\nOur search identified 6700 titles and abstracts, resulting in 4776 references after removal of duplicates. ", "A total of 26 studies fulfilled the inclusion criteria, involving 2997 patients from 11 different countries. ", "Overall, studies were of moderate to good quality. ", "In all, 68% of the study participants were men, mean age 68 years, with mean forced expiratory volume in 1 s (FEV~1~) of 44% of predicted (range for study mean 28--66). ", "The interventions were conducted in all types of healthcare settings: primary care (8 studies), secondary care (12 studies), tertiary care (1 study) and a combination of primary and secondary care (5 studies). ", "The IDM programmes involved on average 3 (range 2--7) healthcare providers and 4 (range 2--8) components of care.", "\n\nMain effects of the intervention {#s3b}\n--------------------------------\n\nThe main results with a follow-up of 3--12 months are summarised in [table 1](#THORAXJNL2013204974TB1){ref-type=\"table\"}. ", "The St George Respiratory Questionnaire (SGRQ) was assessed in 13 studies (n=1425). ", "Pooled data showed a mean difference (MD) of −3.71 in favour of IDM (95% CI −5.83 to −1.59, p\\<0.001), with a considerable amount of heterogeneity. ", "After sensitivity analyses correcting for differences in study quality the direction or significance of the effect did not change. ", "Pooled data on four studies (n=160) using the chronic respiratory questionnaire (CRQ) demonstrated a clinically relevant and statistically significant result on all domains in favour of the IDM group: dyspnoea (MD 1.02; 95% CI 0.67 to 1.36, p\\<0.0001), fatigue (MD 0.82; 95% CI 0.46 to 1.17, p\\<0.0001), emotion (MD 0.61; 95% CI 0.26 to 0.95, p\\<0.0005) and mastery (MD 0.75; 95% CI 0.38 to 1.12, p\\<0.0001). ", "These results were homogeneous. ", "We pooled data of 14 studies (n=817) using the 6-min walking distance (6MWD). ", "Patients treated with IDM improved their 6MWD statistically and clinically relevant by 43.86 m (95% CI 21.83 to 65.89). ", "There was considerable heterogeneity between the results of the studies. ", "Sensitivity analyses correcting for studies with inadequate allocation concealment reduced heterogeneity, and the remaining MD was 15.15 m, which was still statistically significant, however not clinically relevant. ", "Pooled data from seven studies measuring respiratory related hospital admissions until 12 months of follow-up showed a statistically significant difference in favour of IDM (OR 0.68; 95% CI 0.47 to 0.99, p=0.04). ", "On average, 20 out of 100 patients in the IDM group were admitted for respiratory related causes, compared to 27 out of 100 patients in the control group. ", "We have estimated that, for 15 patients treated with an IDM programme over 3--12 months, 1 would avoid being admitted to hospital (number needed to treat (NNT)=15 (95% CI 9 to 505)). ", "We pooled data from six studies (n=741) reporting on the number of hospitalisation days. ", "Patients treated with IDM were discharged nearly 4 days earlier from the hospital compared to controls (MD −3.78; 95% CI −5.9 to −1.7; p\\<0.001). ", "We found no statistically significant differences between groups on number of exacerbations, mean exacerbation rates, emergency department visits or differences in number of antibiotics or oral steroid courses.", "\n\n###### \n\nSummary of findings\n\n Outcomes Illustrative comparative risks\\* (95% CI) Relative effect (95% CI) No of Participants (studies) Quality of evidence (GRADE) Comments \n -------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------- ----------------------------------- ----------------------------- --------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------\n **Disease specific quality of life on the SGRQ, total score** (follow-up: 3--12 months) The mean change in the SGRQ (total score) ranged from 3.4 lower to 6.24 higher The mean SGRQ in the intervention groups was **3.71 lower** (5.83 to 1.59 lower). ", " **MD** −**3.71** (−5.83 to −1.59) 1425 (13 studies) **High**† Minimal clinically important difference (MCID)=−4 points, lower score means improvement\n **Disease specific quality of life on the CRQ dyspnoea domain** (follow-up: 3--12 months) The mean change in the CRQ (dyspnoea domain) ranged from 0 to 0.2 lower The mean CRQ dyspnoea domain in the intervention groups was **1.02 higher** (0.67 to 1.36 higher) **MD 1.02** (0.68 to 1.36) 160 (4 studies) **Moderate**‡ MCID=0.5 points. ", "Results on the other domains of the CRQ (fatigue, emotion, mastery) were also all statistically and clinically relevant.", "\n **Functional exercise capacity (6 min walking distance (6MWD))** (follow-up: 3--12 months) The mean change in the 6MWD ranged from 38 lower to 36 higher The mean functional exercise capacity in the intervention groups was **43.86 higher** (21.83 to 65.89 higher) **MD 43.86** (21.83 to 65.89) 838 (14 studies) **Moderate**§ MCID=35 m. Sensitivity analysis showed there was inconsistency in the effect. ", "After removing the low quality studies, the MD was 15.15 m (95% CI 6.37 to 23.93, p\\<0.001).", "\n **Respiratory related hospital admissions** (follow-up: 3--12 months) **27 per 100 patients** 20 per 100 patients (15 to 27) **OR 0.68** (0.47 to 0.99) 1470 (7 studies) **High** \n **Number of hospital days per patient (all causes)** (follow-up: 3--12 months) The mean change in hospital days ranged from 1.6 to 11.9 higher The mean number of hospital days per patient in the intervention groups was **3.78 lower** (5.9 to 1.67 lower) **MD** −**3.78** (−5.9 to −1.67) 741 (6 studies) **High** \n\nThis table is based on a Cochrane Review published in the *Cochrane Database of Systematic Reviews* 2013^1^ (see <http://www.thecochranelibrary.com> for information).", "\n\nDisease management compared to control for patients with COPD. ", "Patient or population = patients with COPD. ", "Settings: 8 studies in primary care, 12 studies in secondary care, 1 study in tertiary care, 5 studies each in primary and secondary care. ", "Intervention: integrated disease management. ", "Comparison: control (usual care).", "\n\nGRADE Working Group grades of evidence are as follows. ", "High quality: further research is very unlikely to change our confidence in the estimate of effect. ", "Moderate quality: further research is likely to have an important impact on our confidence in the estimate of effect and may change the estimate. ", "Low quality: further research is very likely to have an important impact on our confidence in the estimate of effect and is likely to change the estimate. ", "Very low quality: we are very uncertain about the estimate.", "\n\n\\*The basis for the assumed risk (eg, the median control group risk across studies) is provided in footnotes. ", "The corresponding risk (and its 95% CI) is based on the assumed risk in the comparison group and the relative effect of the intervention (and its 95% CI).", "\n\n†We did not downgrade due to risk of bias, as studies contributing more than 2.7% to the meta-analysis had a low risk of bias. ", "Sensitivity analysis on high-risk studies did not change the effect or significance of the effect.", "\n\n‡We downgraded by one as there was considerable risk of bias in two studies on allocation concealment and two studies did not blind the outcome assessor.", "\n\n§We downgraded by one as all included studies were of moderate to low quality. ", "If we removed studies that scored high or unclear risk of bias on allocation concealment, the effect decreased to 15 m.\n\nMD, mean difference; CRQ, chronic respiratory questionnaire; SGRQ, St George Respiratory Questionnaire.", "\n\nIn subgroup analyses, we found no differences between patients treated in primary or secondary care on quality of life or exercise tolerance. ", "Subgroup analyses comparing different types of control groups showed the MDs between IDM and controls were lower in studies using a monodisciplinary treatment as a control group, compared to studies using 'usual care' as a control group. ", "Subgroup analyses focussing on the dominant component of the IDM programme showed that studies focusing mainly on exercise training provided a statistically significant greater improvement on exercise capacity and quality of life compared to studies focusing on self-management programmes.", "\n\nDiscussion {#s4}\n==========\n\nThis systematic review provides evidence for the efficacy of IDM COPD programmes of at least 3 months duration on quality of life and exercise tolerance until 12 months of follow-up. ", "Furthermore, we demonstrated a reduction in respiratory related hospital admissions and hospital days when applying an IDM programme (NNT=15 to avoid 1 admission). ", "This is of utmost importance, as hospitalisations contribute to the highest burden and costs in patients with COPD.", "\n\nThe main strength of our review is the high applicability of evidence, as we included 26 trials from all over the world, including interventions conducted in all types of healthcare settings and with inclusion of a broad COPD population. ", "However, one should bear in mind that applicability may depend on the context of available healthcare resources. ", "Several methodological strengths minimised the risk of bias in the review, including an a priori published protocol, including the definition of IDM, together with a comprehensive search strategy and assessment by two independent authors to identify all possible studies.", "\n\nLimitations of this review include possible bias from poor reporting of data and a lack of publication of study protocols hindering investigation of so-called reporting bias. ", "To correct for this, we contacted study authors to acquire additional data and we examined whether the outcome measures reported in the methods section were reported in the results section. ", "Furthermore, we acknowledge the fact that controls substantially differs between countries and between healthcare settings. ", "Our subgroup analyses suggest that the effects on the outcome measures could be less strong if controls received one component of IDM compared to patients receiving no treatment or usual care.", "\n\nThis review includes new trials that were not included in the earlier published systematic reviews analysing IDM in patients with COPD, and we were able to perform meta-analyses on all outcomes. ", "Some studies included in this review were also evaluated in the Cochrane review addressing the effectiveness of pulmonary rehabilitation[@R2] or in the Cochrane review addressing the effectiveness of self-management.[@R3] Subgroup analyses in our review demonstrated the largest effects on exercise capacity and quality of life in studies incorporating some form of exercise training, suggesting the necessity of including an exercise component in an IDM programme. ", "This is in line with the results of those two reviews, where effects on exercise capacity and quality of life tended to be higher and clinically relevant in the pulmonary rehabilitation review, whereas in the self-management review there was no effect on exercise capacity at all and the effect on quality of life was too small to be of clinical relevance.[@R2] [@R3]\n\nWe advise authors of future trials to report a proper description of the processes of randomisation, data collection and the details of the intervention prior to the start of the study in one of the trial registers. ", "Finally, we advise authors to measure at least health-related quality of life, exercise tolerance or exacerbation related outcomes. ", "We would endorse consensus on reporting of common outcomes, such as change from baseline. ", "Long-term results on the effectiveness of IDM are still unclear, as only two studies published 2-year follow-up data, which demonstrated inconsistent results (data not shown). ", "Therefore, we recommend future trials to include long-term follow-up data.", "\n\nThis article is based on a Cochrane Review published in the *Cochrane Database of Systematic Reviews* 2013, DOI: 10.1002/14651858.CD009437 (see <http://www.thecochranelibrary.com> for information). ", "Cochrane Reviews are regularly updated as new evidence emerges and in response to feedback, and the *Cochrane Database of Systematic Reviews* should be consulted for the most recent version of the review.", "\n\nThe authors would like to thank Liz Stovold for her help with the development of the search strategy. ", "We would like to thank Emma Welsh and Julia Walters for their help with the development of the protocol and during editorial assistance and advice. ", "We acknowledge the authors of the studies in providing additional data.", "\n\n**Correction notice:** This article has been corrected since it was published Online First. ", "The author affiliations have been amended.", "\n\n**Contributors:** ALK, NHC and NS wrote the protocol. ", "All authors contributed to and approved the protocol. ", "ALK, NS and NHC selected the trials. ", "ALK and NHC extracted data and assessed risk of bias. ", "ALK was responsible for data management in Revman. ", "All authors contributed and approved to the final version of the review.", "\n\n**Competing interests:** All authors, except NS are investigators of the RECODE trial, which investigates the cost effectiveness of integrated care in primary care patients with COPD in a cluster-randomised controlled trial in primary care. ", "This trial is sponsored with a grant of ZonMW (Dutch governmental agency) and additional financial support by a Dutch healthcare insurer (Achmea). ", "MR-vM reports grants from Dutch Asthma Foundation and the public/private partnership PICASSO for COPD, for conducting the INTERCOM trial, one of the studies included in the review. ", "NHC is involved in several initiatives promoting education, developing software applications and providing e-health solutions that may be considered as potential conflict of interest.", "\n\n**Provenance and peer review:** Not commissioned; internally peer reviewed.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0010319198481738567, 0.0006143741775304079, 0.0005931208143010736, 0.0005807478446513414, 0.0005542270955629647, 0.0005694368737749755, 0.0005975264357402921, 0.0005644166958518326, 0.0005332860164344311, 0.0005468385643325746, 0.0005549901397898793, 0.0005258343880996108, 0.0005225056665949523, 0.0005364875541999936, 0.0006588255055248737, 0.0005436753272078931, 0.0005364944227039814, 0.0007138279615901411, 0.000569542171433568, 0.0005717822932638228, 0.0006006643525324762, 0.000578644685447216, 0.0006441587465815246, 0.0005328404367901385, 0.0006549562094733119, 0.0006104451022110879, 0.0005622445605695248, 0.0006120573962107301, 0.0006305639981292188, 0.0005580457509495318, 0.0005772685981355608, 0.0006284299306571484, 0.0005601650918833911, 0.0005666372017003596, 0.0006324388668872416, 0.0006563875358551741, 0.0012579526519402862, 0.0007653258508071303, 0.0005387623095884919, 0.0005897172377444804, 0.0006381971179507673, 0.0006414726376533508, 0.0006457779090851545, 0.0006997832097113132, 0.0005949793267063797, 0.0006246747798286378, 0.0005847948486916721, 0.0005476050428114831, 0.0005276695010252297, 0.000515196705237031, 0.000548425130546093, 0.0005773448501713574, 0.0006184316007420421, 0.000594747718423605, 0.0006134657887741923, 0.0005530231865122914, 0.0005977844703011215, 0.0005621451418846846, 0.0005862338002771139, 0.0005771932192146778, 0.0005941565032117069, 0.0005542123108170927, 0.0006128270761109889, 0.000549399817828089, 0.0006227802368812263, 0.0005338706541806459, 0.0005405850242823362, 0.0005664568743668497, 0.000895490578841418, 0.0005144581664353609, 0.0005264153587631881, 0.0005746670649386942, 0.0005518792313523591, 0.0005350935971364379, 0.0005413159378804266, 0.0005373063031584024, 0.0005257161101326346, 0.0005539892008528113, 0.0005298950127325952, 0.000571320066228509, 0.0005177633138373494, 0.0005391979357227683, 0.0005011945613659918, 0.000498535402584821, 0.0006149769760668278, 0.0005668856902047992, 0.0007352094980888069, 0.0005333843873813748, 0.0005929102771915495, 0.0006103537743911147, 0.0006351476768031716, 0.000541847082786262, 0.0005946579040028155, 0.0005676156142726541, 0.000522966030985117, 0.0005710138357244432, 0.0005942051648162305, 0.001995444530621171 ]
0.000609
98
[ "TRENTON — While the city is tearing itself apart, Mayor Tony Mack is asking his neighbor for help, even as his indictment was about to come down.", "\n\nMack sent a letter to Gov. Christie on Thursday, asking for a “permanent battalion of troopers from the State Police to work in tandem with the Trenton Police Department” for a period of up to six months or more.", "\n\nMack also asked for “additional public safety funding above and beyond any transitional aid allotment” to expand the police force by 60 to 75 officers, the majority of which would be assigned to the patrol bureau.", "\n\nGov. Christie was out of town Thursday and did not respond to the letter directly.", "\n\nAdvertisement\n\n“The state police have a significant presence in Trenton to bolster TPD’s efforts,” said Paul Loriquet of the state attorney general’s office. “", "We continue to evaluate whether to increase manpower in the city.”", "\n\nMack’s letter went out Thursday morning, a day after activists called for “someone credible” to approach the governor about helping the city.", "\n\n“The City of Trenton has seen a dramatic increase in crime since we were forced to downsize our police department, due to budget cuts. ", "We have taken the necessary steps to improve the efficiency of departmental operations in order to better utilize a smaller police force,” Mack’s letter reads. “", "While some of these changes have had moderate success it has become obvious that doing more with less, from a crime suppression standpoint, is not working.”", "\n\nMeanwhile, the grand jury handed up an eight-count indictment against Mack, his brother Ralphiel and Joseph A. “JoJo” Giorgianni on charges of extortion, bribery and mail and wire fraud.", "\n\nFederal officials arrested Mack Sept. 10 on charges he conspired with others to extort $119,000 from a Hudson County developer. ", "The mayor, who is free on $150,000 unsecured bail, has been under federal investigation since September 2010 and earlier this year had his home and City Hall office raided by the FBI." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007881997735239565, 0.0006098740268498659, 0.0006674159085378051, 0.0008013196638785303, 0.0006822225986979902, 0.0005317184259183705, 0.000637409626506269, 0.0007227436872199178, 0.0005671140388585627, 0.0006183119839988649, 0.0022603042889386415, 0.0012156697921454906, 0.0007196982624009252 ]
0.000832
13
[ "Design Diary\n\nMay 8: Structure Bonus Tiles\n\nOne of my greatest surprises and pleasures that has emerged from Scythe and Stonemaier Games is seeing fans create modules and expansions. ", "You have created things that are far beyond my imagination.", "\n\nWhen I was designing the modular board, by sheer coincidence a few different fans posted ideas for new structure bonus tiles. ", "I liked some of the ideas and proceeded to tweak and playtest them.", "\n\nAt first I thought I’d offer them as a separate promo, but I know it can be a bit arduous to try to track down every Scythe promo. ", "Simply including them in the modular board pack seemed like a better way to serve you.", "\n\nSo that’s what we did! ", "In addition to the game board and the 4 punchboards, there’s a 5th punchboard featuring 8 new structure bonus tiles. ", "The structure tiles are to be shuffled in with the original tiles even when you’re not using the modular board.", "\n\nBig thanks to Patrice Piron, Jeremy Ellis, and Mihir Shah for inspiring these designs! ", "Which tiles are you the most curious to try?", "\n\nMay 7: Issues Discovered and Solved During the Design Process\n\nYesterday I discussed how the Scythe modular board went from being inconceivable to a possibility. ", "However, I still discovered a number of potential issues during the design process, and today I’d like to share those problems and our solutions.", "\n\nAlso, before I begin, I should note that we’ve already made the modular board. ", "Production is complete, and it’s on the boat to the US (and other fulfillment centers).", "\n\nLake location : To ensure that a lake didn’t end up next to a home base, we could have only put lakes in the middle territory of each 7-hex tile, but that would have limited the variability and organic nature of the board. ", "So instead I designed the tiles so that if you end up with a lake next to a home base, you simply flip over the tile during setup, and the other side is guaranteed to not have a lake next to the home base.", "\n\n: To ensure that a lake didn’t end up next to a home base, we could have only put lakes in the middle territory of each 7-hex tile, but that would have limited the variability and organic nature of the board. ", "So instead I designed the tiles so that if you end up with a lake next to a home base, you simply flip over the tile during setup, and the other side is guaranteed to not have a lake next to the home base. ", "Size preference : I know there are quite a few people who use bigger versions of the Scythe board, whether it’s the board extension or the neoprene playmat. ", "So originally I discussed the possibility with our manufacturer of making a modular board the size of a standard board and another that is bigger. ", "However, the main issue we ran into is the bigger versions of the tiles don’t fit into the box (nor does the board, unless it’s broken into multiple sections). ", "For that reason, this will be the only version of the modular board.", "\n\n: I know there are quite a few people who use bigger versions of the Scythe board, whether it’s the board extension or the neoprene playmat. ", "So originally I discussed the possibility with our manufacturer of making a modular board the size of a standard board and another that is bigger. ", "However, the main issue we ran into is the bigger versions of the tiles don’t fit into the box (nor does the board, unless it’s broken into multiple sections). ", "For that reason, this will be the only version of the modular board. ", "Expansion compatibility : I wanted to make sure the modular board worked with all of the various Scythe expansions. ", "The only expansion where it’s not exactly recommended is the Rise of Fenris campaign, as a few of the episodes have specific setup rules that rely on the original board. ", "Also, thematically, if you’re playing through the campaign, the terrain and layout of Eastern Europe shouldn’t shift from one game to another. ", "There’s also a spoiler I could mention here in relation to The Rise of Fenris, but I’ll just say that the home base tiles we designed for the modular board are compatible with The Rise of Fenris.", "\n\n: I wanted to make sure the modular board worked with all of the various Scythe expansions. ", "The only expansion where it’s not exactly recommended is the Rise of Fenris campaign, as a few of the episodes have specific setup rules that rely on the original board. ", "Also, thematically, if you’re playing through the campaign, the terrain and layout of Eastern Europe shouldn’t shift from one game to another. ", "There’s also a spoiler I could mention here in relation to The Rise of Fenris, but I’ll just say that the home base tiles we designed for the modular board are compatible with The Rise of Fenris. ", "Tile stability : It was important to me that the terrain tiles, once placed on the board, remain in place throughout the game without spinning or moving. ", "I explored the possibility of magnets or a multi-layered board, but unfortunately both turned out to be cost-prohibitive. ", "The solution I decided to implement is to use ultra high-density cardboard for the tiles. ", "This greatly increases the chance that the tiles will remain perfectly flat on the board.", "\n\n: It was important to me that the terrain tiles, once placed on the board, remain in place throughout the game without spinning or moving. ", "I explored the possibility of magnets or a multi-layered board, but unfortunately both turned out to be cost-prohibitive. ", "The solution I decided to implement is to use ultra high-density cardboard for the tiles. ", "This greatly increases the chance that the tiles will remain perfectly flat on the board. ", "Player count scaling : Given that the setup for the modular board involves placing specific tiles on a special board, it gave us the opportunity to allow players NOT to place all of the tiles if they want a tighter board for fewer players. ", "However, my original design philosophy for the Scythe board–particularly for 2 players) is that it offers a flexible interface for interacting as much or as little as you’d like. ", "So with the removable tiles, I didn’t want to depart from that philosophy and impose a tighter board on couples who like having more room to roam. ", "As a result, removing tiles is an optional variant in the modular board rulebook.", "\n\n: Given that the setup for the modular board involves placing specific tiles on a special board, it gave us the opportunity to allow players NOT to place all of the tiles if they want a tighter board for fewer players. ", "However, my original design philosophy for the Scythe board–particularly for 2 players) is that it offers a flexible interface for interacting as much or as little as you’d like. ", "So with the removable tiles, I didn’t want to depart from that philosophy and impose a tighter board on couples who like having more room to roam. ", "As a result, removing tiles is an optional variant in the modular board rulebook. ", "Language and localization : There aren’t many rules necessary for the modular board–basically just 1 page of setup rules and a few clarifications. ", "The board and tiles themselves are language-independent. ", "So rather than print different rulebooks for each of the localization partners who offer Scythe, I just included 11 different languages in the rulebook. ", "That way we have a single product we can print and sell at scale, rather than 11 different versions. ", "The packaging for the board is minimal–it’s just the board, 5 punchboards, and the rulebook in shrinkwrap, with the bar code printed on the rulebook.", "\n\n: There aren’t many rules necessary for the modular board–basically just 1 page of setup rules and a few clarifications. ", "The board and tiles themselves are language-independent. ", "So rather than print different rulebooks for each of the localization partners who offer Scythe, I just included 11 different languages in the rulebook. ", "That way we have a single product we can print and sell at scale, rather than 11 different versions. ", "The packaging for the board is minimal–it’s just the board, 5 punchboards, and the rulebook in shrinkwrap, with the bar code printed on the rulebook. ", "Balance : I touched upon this a bit yesterday, but one of my biggest concerns as I designed the board was ensuring that the board’s layout didn’t determine who would win the game–each faction should have a fair chance from any location on the board. ", "I mostly addressed this through the design of the board and tiles themselves, but I also added a level of agency via a draft at the beginning of the game (after the tiles and home bases are on the board, randomly deal a player mat to each player, then have them each pick their faction, starting with the highest-numbered mat).", "\n\n: I touched upon this a bit yesterday, but one of my biggest concerns as I designed the board was ensuring that the board’s layout didn’t determine who would win the game–each faction should have a fair chance from any location on the board. ", "I mostly addressed this through the design of the board and tiles themselves, but I also added a level of agency via a draft at the beginning of the game (after the tiles and home bases are on the board, randomly deal a player mat to each player, then have them each pick their faction, starting with the highest-numbered mat). ", "Tile alignment : Working digitally, it’s hard to tell if the final diecut tiles would be seamless additions to the special board, so I tested this specifically when I received the pre-production copy. ", "Indeed, they weren’t quite as seamless as I’d hoped, so we made some adjustments, and I’m pleased with the result.", "\n\n: Working digitally, it’s hard to tell if the final diecut tiles would be seamless additions to the special board, so I tested this specifically when I received the pre-production copy. ", "Indeed, they weren’t quite as seamless as I’d hoped, so we made some adjustments, and I’m pleased with the result. ", "Automa: Automa is largely unaffected by the modular board, but for clarity, Morten added this note to the rulebook: “On the normal board, the Automa is restrained by water for the early part of the game. ", "The modular setup will not always provide that boundary between factions. ", "Choose the starting home bases carefully or you may find yourself drowning in a sea of hostile Automa units. ", "Expert players may actually wish to challenge themselves this way.”", "\n\nDid I miss anything? ", "If so, I’m happy to clarify and respond.", "\n\nMay 6: Why the Board Wasn’t Possible (Until It Was Possible)\n\nThis week I’ll be discussing the design process of the modular board and exactly how it works, culminating in a Watch It Played video on Thursday and a full rulebook reveal on Friday.", "\n\nToday I’m going to talk about why I originally thought a modular board for Scythe wasn’t possible and what changed. ", "There are 5 reasons on the Scythe FAQ about why a modular board wasn’t possible, so I’ll list each of those reasons and address them from my current perspective.", "\n\n1. ", "The rivers are biggest challenge in creating a modular board. ", "If the board were a random set of hexagonal tiles, you would have rivers that only run along a single edge between tiles, which doesn’t really serve a mechanical purpose (nor does it work aesthetically or thematically).", "\n\nThis was by far the biggest hurdle in even conceiving the possibility of a modular board. ", "If Scythe didn’t have rivers, it would be much easier. ", "But rivers are quite important in Scythe, both to give each player the security of their own little patch of land and to give players a barrier to overcome as they venture out into the world. ", "With individual hex tiles, a cohesive river structure isn’t possible, and encounters and tunnels could end up extremely unbalanced.", "\n\nBut then I played Clans of Caledonia, and I realized that I was being shortsighted in limiting myself to individual hex tiles. ", "Caledonia uses 4 double-sided tiles consisting of big groups of hexes, rivers running through each group. ", "That’s when the idea of 7-hex tiles clicked for me, and that’s what I ended up testing, balancing, and using.", "\n\nThe loss here is that the tiles removed the possibility of having a “fog of exploration” where you only discover certain parts of the board when your unit arrives there. ", "However, with the way riverwalk and other terrain-specific movement works in Scythe, this never really would have worked anyway.", "\n\n2. ", "The art simply wouldn’t be nearly as cohesive if it were made of modular tiles. ", "The Scythe board tells a story; modular hexes do not. ", "The world of Scythe isn’t modular–this is a specific world we’ve built that’s based on an alternate-history 1920s Eastern Europe, not a random one generated by the players.", "\n\nThis is still partly true, though we figured out the art portion thanks to the efforts of Jakub and Christine (our graphic designer). ", "As for the world of Scythe, the official Scythe storyline ended with The Rise of Fenris, so after consulting with Jakub, we decided it was fine to make a few products that are mechanically consistent with the game but venture beyond the core storyline (the other product being Scythe Encounters).", "\n\n3. ", "The map is one of the biggest aspects of the faction-based asymmetry in the game. ", "We’ve designed the Nordic faction’s abilities based on them starting in the north with limited access to certain resources, for example, and all factions have a mech “riverwalk” ability that correlates precisely to their homeland. ", "Same with all the other factions.", "\n\nI agree that a core part of the asymmetry of Scythe is related to your faction’s starting position (both their seating position and the territories to which they have immediate access). ", "For that reason, the original board will always remain important and relevant.", "\n\nMy biggest concern was probably each faction’s ability to riverwalk out of their starting area and not be able to riverwalk directly into another faction’s area. ", "With a randomized board, that balance becomes much more difficult to control.", "\n\nHowever, I figured it out due to a combination of careful tile design, careful board design, knowledge that a landlocked player could still build a Mine, and the addition of a draft at the beginning of the game after the faction tiles have been randomly placed on 1 of the 8 home bases on the board. ", "The result is one of my favorite aspects of the game–you’ll be seeing a new board from a new perspective every time you play.", "\n\n4. ", "The board includes three tracks and several places to put cards, which allows for better organization than if these items were floating around the table.", "\n\nI previously mentioned how Clans of Caledonia helped me think of the grouped hex tiles. ", "However, I was still stumped for a while about how Scythe would work without a board–at the very least, I would need to provide other tiles for the triumph, power, and popularity tracks. ", "Also, I was concerned about the potentially odd (and even game-breaking) layouts that could occur with interlocking tiles.", "\n\nThen I realized that just because I was using modular tiles didn’t mean I couldn’t also use a board to solve those issues. ", "Not only that, but a board could add even more variability (it’s double sided) and it makes setup and cleanup much easier than dealing with 40 individual hex tiles.", "\n\n5. ", "There’s already a lot of variability in the Scythe setup (namely, 25 different combinations of faction and player mats and tons of different objective and encounter cards).", "\n\nI’m still happy with the sheer about of variability and replayability in Scythe, even just the core game. ", "But I’ve been overjoyed to learn over the last few years that there are quite a few people who have played Scythe dozens of times. ", "This board is for you. ", "And even if you’ve only played a few times, you might still give this a try. :)", "\n\nThose are all of the reasons I thought the modular board would never be possible. ", "It took me a while to figure it out, and I appreciate your patience. ", "I look forward to hearing stories of your adventures on the new board in June (or later this summer if you wait to buy from a retailer)!", "\n\nIf you have any questions about anything I mentioned above, please ask in the comments. :)" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006573416176252067, 0.0007386614452116191, 0.0005338236223906279, 0.0005479475948959589, 0.000577480997890234, 0.0005609826184809208, 0.0015766983851790428, 0.0006878377171233296, 0.000608632864896208, 0.0005336819449439645, 0.0014831454027444124, 0.0005708266398869455, 0.000505778705701232, 0.0005575935356318951, 0.0005953358486294746, 0.0005645880592055619, 0.0006655135657638311, 0.0005761400680057704, 0.0006655135657638311, 0.0006281488458625972, 0.0005681795882992446, 0.0006460514850914478, 0.0006929766968823969, 0.0006816877285018563, 0.0005681795882992446, 0.0006460514850914478, 0.0006929766968823969, 0.0005897697992622852, 0.0006482070893980563, 0.0006233449676074088, 0.0006055929698050022, 0.0005875368369743228, 0.0006482070893980563, 0.0006233449676074088, 0.0006055929698050022, 0.000603020191192627, 0.0006248819991014898, 0.0005243109189905226, 0.0006369893089868128, 0.0005840667872689664, 0.0006248819991014898, 0.0005243109189905226, 0.0006369893089868128, 0.0006381806451827288, 0.0006288232398219407, 0.0006755907670594752, 0.000599358812905848, 0.0005960350390523672, 0.0006288232398219407, 0.0006755907670594752, 0.000599358812905848, 0.0005784527747891843, 0.0006269323057495058, 0.0006542699411511421, 0.0006470584194175899, 0.0007095020264387131, 0.0005939611583016813, 0.0006269323057495058, 0.0006542699411511421, 0.0006470584194175899, 0.0007095020264387131, 0.0005331523716449738, 0.0005432686884887516, 0.0005288535612635314, 0.0005432686884887516, 0.0005361902294680476, 0.0005670773098245263, 0.0005427167634479702, 0.0005670773098245263, 0.0005835937918163836, 0.0005720109329558909, 0.014670890755951405, 0.0005706495721824467, 0.0012438484700396657, 0.0005170917720533907, 0.0005419545341283083, 0.0006761379190720618, 0.0007653692155145109, 0.0009391900966875255, 0.0006547649390995502, 0.0006160552147775888, 0.0007010009721852839, 0.0013947775587439537, 0.0007789413793943822, 0.0005882966797798872, 0.0006593013531528413, 0.0007161364192143083, 0.0006069032242521644, 0.0007535825716331601, 0.0007213338394649327, 0.001185585861094296, 0.0006347112939693034, 0.0008520545670762658, 0.0011484463466331363, 0.0005339551134966314, 0.000664923049043864, 0.00117425003554672, 0.0007615558570250869, 0.0006010460201650858, 0.0006930804229341447, 0.0005848039872944355, 0.0005461819819174707, 0.0006711275200359523, 0.0006542138871736825, 0.0005623922334052622, 0.0006636581383645535, 0.0012900278670713305, 0.0006475679692812264, 0.0005164662143215537, 0.0005776079487986863, 0.0005620932206511497, 0.0006225318647921085, 0.0006984170759096742, 0.0013671480119228363, 0.0006109715905040503, 0.0006059148581698537, 0.0008359011262655258, 0.0058000460267066956, 0.0006739817326888442, 0.0006893243989907205, 0.0005649918457493186, 0.0005370787694118917, 0.0005313394358381629 ]
0.000831
123
[ "Differences in the persistence of spatial memory deficits induced by a chronic stressor in adolescents compared to juveniles.", "\nAdolescence is thought of as a stress-sensitive developmental period. ", "While many studies have compared adolescent responses to stress relative to that of adults, a growing body of work has examined stress responses in juveniles. ", "Here we investigated if a chronic stressor has a differential effect on spatial memory in rats depending on whether it occurs during adolescence or the juvenile period. ", "Male rats were exposed to the stress hormone corticosterone (Cort) in their drinking water, a vehicle control (2.5% ethanol), or water, for 7 days before being tested on a novel Object/Place task 6 days or 6 weeks later. ", "Exposure to Cort or ethanol at either age impaired spatial memory at the 6-day test. ", "The ethanol induced impairment was attenuated 6 weeks later. ", "However, rats given Cort during adolescence, but not the juvenile period, were still impaired. ", "Together, these results suggest that adolescence is indeed a stress-sensitive period." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0008479966782033443, 0.0006023509195074439, 0.0006385365850292146, 0.000653490365948528, 0.0030288153793662786, 0.000695010821800679, 0.0006183154764585197, 0.0009510158561170101, 0.0006424289313144982 ]
0.000964
9
[ "Hadasu Station\n\nis a railway station in Kumano, Mie Prefecture, Japan, operated by Central Japan Railway Company (JR Central). ", "The station is 153.2 rail kilometers from the terminus of the line at Kameyama Station.", "\n\nHistory\nHadasu Station opened on December 12, 1961 as a station on the Japan National Railways (JNR) Kisei Main Line. ", "The station was absorbed into the JR Central network upon the privatization of the JNR on April 1, 1987.", "\n\nLines\nCentral Japan Railway Company (JR Central)\nKisei Main Line\n\nStation layout\nHadasu Station consists of two opposed side platforms. ", "There is no station building, but only a small shelter on each platform.", "\n\nPlatforms\n\nAdjacent stations \n\n|-\n!", "colspan=5|Central Japan Railway Company (JR Central)\n\nExternal links\n JR Central timetable \n\n \n\nCategory:Railway stations opened in 1961\nCategory:Railway stations in Mie Prefecture" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0010341741144657135, 0.0006437433185055852, 0.0007355815614573658, 0.0007318363059312105, 0.0007092681480571628, 0.0006917481659911573, 0.0007530517177656293, 0.0005763538065366447 ]
0.000734
8
[ "It's easy to be swept away with excitement as a beautiful bride! ", "She'll love the gown's soft lace and ruffled bodice, inspired by fashion runways. ", "A pretty peplum and satin bow define the waist above a long, sweeping tulle skirt. ", "Details have been thoughtfully planned -- covered elastic straps, belt with pre-tied bow, covered back zip and smooth edges. ", "The finishing touches? ", "A voluminous tulle veil, bridal accessories, and of course her beaming smile. ", "Because girls love playing bride, we make sure her costume will handle as many \"weddings\" she dreams up. ", "Shown with hoop pettiskirt. ", "Polyester. ", "Here comes the bride costume for girls is imported.", "\n\n3-pc. ", "set includes:\n\ndress\n\nbelt\n\n35\" veil\n\nAccessories sold separately:\n\nsilver pearl droplet necklace & earrings\n\nbig diamond ring\n\nbeautiful bride bouquet\n\nhoop pettiskirt\n\nangel mary janes\n\nChasingfireflies\n\nIt's easy to be swept away with excitement as a beautiful bride! ", "She'll love the gown's soft lace and ruffled bodice, inspired by fashion runways. ", "A pretty peplum and satin bow define the waist above a long, sweeping tulle skirt. ", "Details have been thoughtfully planned -- covered elastic straps, belt with pre-tied bow, covered back zip and smooth edges. ", "The finishing touches? ", "A voluminous tulle veil, bridal accessories, and of course her beaming smile. ", "Because girls love playing bride, we make sure her costume will handle as many \"weddings\" she dreams up. ", "Shown with hoop pettiskirt. ", "Polyester. ", "Here comes the bride costume for girls is imported.", "\n\n3-pc. ", "set includes:\n\ndress\n\nbelt\n\n35\" veil\n\nAccessories sold separately:\n\nsilver pearl droplet necklace & earrings\n\nbig diamond ring\n\nbeautiful bride bouquet\n\nhoop pettiskirt\n\nangel mary janes\n\nChasingfireflies\n\nIt's easy to be swept away with excitement as a beautiful bride! ", "She'll love the gown's soft lace and ruffled bodice, inspired by fashion runways. ", "A pretty peplum and satin bow define the waist above a long, sweeping tulle skirt. ", "Details have been thoughtfully planned -- covered elastic straps, belt with pre-tied bow, covered back zip and smooth edges. ", "The finishing touches? ", "A voluminous tulle veil, bridal accessories, and of course her beaming smile. ", "Because girls love playing bride, we make sure her costume will handle as many \"weddings\" she dreams up. ", "Shown with hoop pettiskirt. ", "Polyester. ", "Here comes the bride costume for girls is imported.", "\n\n3-pc. ", "set includes:\n\ndress\n\nbelt\n\n35\" veil\n\nAccessories sold separately:\n\nsilver pearl droplet necklace & earrings\n\nbig diamond ring\n\nbeautiful bride bouquet\n\nhoop pettiskirt\n\nangel mary janes\n\nChasingfireflies\n\nIt's easy to be swept away with excitement as a beautiful bride! ", "She'll love the gown's soft lace and ruffled bodice, inspired by fashion runways. ", "A pretty peplum and satin bow define the waist above a long, sweeping tulle skirt. ", "Details have been thoughtfully planned -- covered elastic straps, belt with pre-tied bow, covered back zip and smooth edges. ", "The finishing touches? ", "A voluminous tulle veil, bridal accessories, and of course her beaming smile. ", "Because girls love playing bride, we make sure her costume will handle as many \"weddings\" she dreams up. ", "Shown with hoop pettiskirt. ", "Polyester. ", "Here comes the bride costume for girls is imported.", "\n\nHere comes the bride in her necklace and clip-on earrings rich with jewels. ", "Faux pearl droplets and faux diamonds make this set a beautiful choice. ", "Silver pearl droplet necklace & earrings are imported.", "\n\nChasingfireflies\n\nFor your beautiful bride, a bouquet of white flowers to carry on the big day. ", "Beautiful bride bouquet is imported.", "\n\nHere Comes The Bride Costume For Girls\n\nIt's easy to be swept away with excitement as a beautiful bride! ", "She'll love the gown's soft lace and ruffled bodice, inspired by fashion runways. ", "A pretty peplum and satin bow define the waist above a long, sweeping tulle skirt. ", "Details have been thoughtfully planned -- covered elastic straps, belt with pre-tied bow, covered back zip and smooth edges. ", "The finishing touches? ", "A voluminous tulle veil, bridal accessories, and of course her beaming smile. ", "Because girls love playing bride, we make sure her costume will handle as many \"weddings\" she dreams up. ", "Shown with hoop pettiskirt. ", "Polyester. ", "Here comes the bride costume for girls is imported.", "\n\nHow to measureItems may not be offered in all sizes above. ", "For best fit, use height measurement. ", "Since all children grow at their own pace, this is the most accurate measurement. ", "Weight should be considered when a child is above or below the average weight shown.", "\n\nChestMeasure a loop under your child's armpits, passing the tape across fullest part of chest and around shoulder blades.", "\n\nIt's easy to be swept away with excitement as a beautiful bride! ", "She'll love the gown's soft lace and ruffled bodice, inspired by fashion runways. ", "A pretty peplum and satin bow define the waist above a long, sweeping tulle skirt. ", "Details have been thoughtfully planned -- covered elastic straps, belt with pre-tied bow, covered back zip and smooth edges. ", "The finishing touches? ", "A voluminous tulle veil, bridal accessories, and of course her beaming smile. ", "Because girls love playing bride, we make sure her costume will handle as many \"weddings\" she dreams up. ", "Shown with hoop pettiskirt. ", "Polyester. ", "Here comes the bride costume for girls is imported.", "\n\nIt's easy to be swept away with excitement as a beautiful bride! ", "She'll love the gown's soft lace and ruffled bodice, inspired by fashion runways. ", "A pretty peplum and satin bow define the waist above a long, sweeping tulle skirt. ", "Details have been thoughtfully planned -- covered elastic straps, belt with pre-tied bow, covered back zip and smooth edges. ", "The finishing touches? ", "A voluminous tulle veil, bridal accessories, and of course her beaming smile. ", "Because girls love playing bride, we make sure her costume will handle as many \"weddings\" she dreams up. ", "Shown with hoop pettiskirt. ", "Polyester. ", "Here comes the bride costume for girls is imported.", "\n\nHere comes the bride in her necklace and clip-on earrings rich with jewels. ", "Faux pearl droplets and faux diamonds make this set a beautiful choice. ", "Silver pearl dropl...\n\nWARNING CHOKING HAZARD Small parts. ", "Not for children under 3 years.", "\n\nHere comes the bride in her necklace and clip-on earrings rich with jewels. ", "Faux pearl droplets and faux diamonds make this set a beautiful choice. ", "Silver pearl droplet necklace & earrings are imported.", "\n\nHere comes the bride in her necklace and clip-on earrings rich with jewels. ", "Faux pearl droplets and faux diamonds make this set a beautiful choice. ", "Silver pearl dropl...\n\nWARNING CHOKING HAZARD Small parts. ", "Not for children under 3 years.", "\n\nHere comes the bride in her necklace and clip-on earrings rich with jewels. ", "Faux pearl droplets and faux diamonds make this set a beautiful choice. ", "Silver pearl droplet necklace & earrings are imported.", "\n\nCustomer Reviews\n\n\"This costume is absolutely gorgeous! ", "The quality is excellent and held up beautifully during and extremely active night of trick-or-treating. ", "Be sure to add the hoop skirt or you won't get the nice full over the top effect (and the dress may drag the ground). ", "Fit was true to size. ", "My daughter is a taller than average very slim 7 year old and I ordered the size 8. ", "Highly recommend! \"", "\n\n\"Lovely Bride! - ", "I purchased this for my 6 year old daughter. ", "It was comfortable and easy to put on. ", "She got tired of holding the dress up to walk stairs while trick or treating. - ", "I recommend this product.\"", "\n\n\"Beautiful dress but a wrinkled nightmare - This dress is beautiful but it comes wrapped in a tightly wrapped bag. ", "Once you unwrap it, it is a wrinkled nightmare. ", "It takes hours to try and steam and even then does not look like the picture. ", "The veil was just as wrinkled. ", "It needs the hooped pet - I would not recommend this product.\"" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005911990301683545, 0.0005620985175482929, 0.0017137366812676191, 0.0005413579638116062, 0.0006518037989735603, 0.002192080020904541, 0.0009348356397822499, 0.0011399041395634413, 0.001788051682524383, 0.0013900038320571184, 0.0008602639427408576, 0.0006846311734989285, 0.0005620985175482929, 0.0017137366812676191, 0.0005413579638116062, 0.0006518037989735603, 0.002192080020904541, 0.0009348356397822499, 0.0011399041395634413, 0.001788051682524383, 0.0013900038320571184, 0.0008602639427408576, 0.0006846311734989285, 0.0005620985175482929, 0.0017137366812676191, 0.0005413579638116062, 0.0006518037989735603, 0.002192080020904541, 0.0009348356397822499, 0.0011399041395634413, 0.001788051682524383, 0.0013900038320571184, 0.0008602639427408576, 0.0006846311734989285, 0.0005620985175482929, 0.0017137366812676191, 0.0005413579638116062, 0.0006518037989735603, 0.002192080020904541, 0.0009348356397822499, 0.0011399041395634413, 0.001788051682524383, 0.0013900038320571184, 0.000986594706773758, 0.0005970849306322634, 0.0006116987788118422, 0.0006406233878806233, 0.0006780673284083605, 0.0007977790664881468, 0.0005620985175482929, 0.0017137366812676191, 0.0005413579638116062, 0.0006518037989735603, 0.002192080020904541, 0.0009348356397822499, 0.0011399041395634413, 0.001788051682524383, 0.0013900038320571184, 0.0006925294292159379, 0.0006082706968300045, 0.002972046844661236, 0.0008958585094660521, 0.0633339211344719, 0.0005911990301683545, 0.0005620985175482929, 0.0017137366812676191, 0.0005413579638116062, 0.0006518037989735603, 0.002192080020904541, 0.0009348356397822499, 0.0011399041395634413, 0.001788051682524383, 0.0013900038320571184, 0.0005911990301683545, 0.0005620985175482929, 0.0017137366812676191, 0.0005413579638116062, 0.0006518037989735603, 0.002192080020904541, 0.0009348356397822499, 0.0011399041395634413, 0.001788051682524383, 0.0013900038320571184, 0.000986594706773758, 0.0005970849306322634, 0.02049323171377182, 0.004435939714312553, 0.000986594706773758, 0.0005970849306322634, 0.0006116987788118422, 0.000986594706773758, 0.0005970849306322634, 0.02049323171377182, 0.004435939714312553, 0.000986594706773758, 0.0005970849306322634, 0.0006116987788118422, 0.000701165699865669, 0.0006162452045828104, 0.0012698668288066983, 0.0014603676972910762, 0.029688799753785133, 0.0006373904179781675, 0.0006873744423501194, 0.001326295081526041, 0.0005828030989505351, 0.011329195462167263, 0.0005502019193954766, 0.002894833916798234, 0.024716615676879883, 0.0010526833357289433, 0.00105926557444036, 0.000748964142985642 ]
0.002587
113
[ "Q:\n\nHow to use jquery to create element with conditional class on the element?", "\n\nI've got this so far:\ndays.forEach(function(day) {\n $(\"<div>\" + day.day + \"</div>\")\n .addClass(\"day\")\n .appendTo(\"#days\"); \n});\n\nI want to be able to check \nif(day.events.length > 0)\n\nthen add additional class of \"hasEvent\". ", "Any ideas?", "\n\nA:\n\nKeep track of your stuff, just like at the airport!", "\nvar elem = $(\"<div>\"+day.day+\"</div>\");\nelem.addClass(\"day\");\nif( day.events.length > 0) elem.addClass(\"hasEvent\");\nelem.appendTo(\"#days\");\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007206714362837374, 0.0007247998146340251, 0.0007957352208904922, 0.0012135908473283052, 0.0011067063314840198 ]
0.000912
5
[ "Here’s a pretty classic “Who? ", "Whom?” ", "op-ed from the Bazelon Legal Dynasty, relentlessly working to get more black males shot by other black males for three generations now.", "\n\nNew York City during the 12 year mayorship of crime-fighting billionaire Michael Bloomberg offered a spectacular success story for gun control by aggressively stopping and frisking young punks for illegal handguns. ", "Pretty soon, carrying an illegal handgun was seen by the more murderous classes as a ticket to prison, so New York City homicide rates fell much further than almost anyone had anticipated.", "\n\nOn the other hand, the Bloomberg NYPD targeting the most likely murderers had severe adverse impact on black criminals, just as it had wonderful beneficial impact on those who would have been murdered by black criminals.", "\n\nDe Blasio is vastly more liberal. ", "But he’s not a Bazelon-level fool, so he appointed Giuliani’s old police chief Bill Bratton, and has kept up trying to jail guys carrying illegal handguns.", "\n\nDe Blasio Doesn’t Get It. ", "Not Everyone Who Carries a Gun Is a Shooter. ", "A model Brooklyn program to keep young people out of jail runs afoul of the mayor and the police. ", "By Emily Bazelon\n\nMs. Bazelon, a staff writer at The New York Times Magazine, is the author of “Charged: The New Movement to Transform American Prosecution and End Mass Incarceration.” ", "July 11, 2019 Mayor Bill de Blasio took a break from his long-shot presidential campaign this week to attack a program in Brooklyn that keeps young people who’ve been convicted of having an unlicensed gun out of prison. ", "It was a strange move. ", "Brooklyn’s diversion program is doing good, not harm, the evidence shows. ", "It’s an effort the mayor could showcase on the national stage, an example of the city’s success at incubating reforms. ", "But at a news conference on Monday, Mr. de Blasio sounded anything but visionary. ", "The trouble started when the New York Police Department chief, Terence Monahan, suggested at the same gathering that the blame for a rise in shootings so far this year lay with plea deals in Brooklyn “that result in little or no jail time.” ", "It’s true that a small fraction of young people charged with illegal gun possession in Brooklyn — but not for shooting anyone or even brandishing a gun — are accepted into a yearlong program, run by the office of District Attorney Eric Gonzalez, called Youth and Communities in Partnership, or Y.C.P. Participants meet weekly with a social worker, adhere to a curfew, and must work or take classes and complete dozens of hours of community service. ", "If they graduate from the program, they are spared prison and the burden of a felony record.", "\n\nIn other words, the new program in Brooklyn gives you one Get Out of Jail Free card for carrying an illegal handgun. ", "It’s not like there’s a law against felony murder, is there?", "\n\nY.C.P. offers a narrow escape hatch from New York’s punitive gun laws, which are among the harshest in the country. ", "The state imposes a 3½-year mandatory minimum prison sentence for people who are convicted of the maximum charge for possessing a loaded gun without a license. ", "In some states, possessing a gun without a permit isn’t even a crime. ", "Other states treat the offense as a misdemeanor or make exceptions for having an unlicensed gun in one’s home. ", "But in New York, gun control has taken a form that includes mandatory prison sentences. ", "The New York Police Department has long credited “Guns = Prison,” as the slogan goes, for much of New York’s amazing crime drop. ", "And it is amazing: Crime has fallen steeply in New York over a quarter century, to a level not seen since the 1950s. ", "In 1990, there were 2,245 killings in the city. ", "In 2018, there were fewer than 300. … ", "Y.C.P. started in 1997, in partnership with some Brooklyn churches, out of a recognition that “not everyone who carries a gun is a shooter,” as Anthony Newerls, who runs a violence-prevention program in Brownsville, told me. “", "In many cases, we see the carrier is carrying the gun for someone else.”", "\n\nWhat’s so bad about handing the gun to the trigger-puller as long as you don’t pull the trigger yourself?" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.001236814889125526, 0.001251981477253139, 0.25326114892959595, 0.004576224833726883, 0.025725124403834343, 0.10501963645219803, 0.0009425302851013839, 0.4733356237411499, 0.0017397154588252306, 0.014793487265706062, 0.0025754659436643124, 0.0007516641053371131, 0.0009867572225630283, 0.0007867590175010264, 0.0006929063820280135, 0.0006254429463297129, 0.0008317236206494272, 0.0007420650217682123, 0.0007778157596476376, 0.004007770214229822, 0.01572379097342491, 0.002643910003826022, 0.004073514137417078, 0.0019006985239684582, 0.0009995967848226428, 0.0016032051062211394, 0.001044436707161367, 0.0008756904280744493, 0.0006204572273418307, 0.00185384729411453, 0.000616761390119791, 0.0006610636482946575, 0.0006511242827400565, 0.020937476307153702 ]
0.027908
34
[ "It should be perfectly obvious to anyone that there is no war between Donald Trump and CNN. ", "It may look like there is. ", "But there isn’t. ", "This is because Donald Trump and CNN share the exact same core objective: to put on a really good show.", "\n\nI say this is “perfectly obvious.” ", "That’s because it’s an undeniable fact that CNN exists to serve the interests of the Turner Broadcasting System, which in turn exists to serve the interests of Time Warner, Inc., which exists to serve the interests of the shareholders of Time Warner, Inc. And Donald Trump exists to serve the interests of Donald Trump, whose primary interest is in appearing on television a lot and being famous and powerful. ", "These two sets of interests are perfectly symbiotic, and there is no reason that there should be any serious conflict between them. ", "Donald Trump wants to be on television. ", "CNN wants people to watch television. ", "And because people watch television when Donald Trump is on it, neither CNN nor Trump has any reason to make any effort to seriously undermine the other.", "\n\nIt’s bizarre, however, that when I have mentioned to people the simple fact that Donald Trump and CNN have the same relationship as clownfish and sea anemones, I have been treated like some kind of conspiracy theorist. ", "I am, it is suggested, positing some kind of worldview in which media and political elites gather in backrooms and conspire over cigars. ", "I am being cynical, and implying that nothing is as it seems and that we’re all stupified, zombified sheeple, unaware that the powers that be are laughing behind our backs while we obsess over a spectacle manufactured for consumption.", "\n\nBut in actual fact, I’m implying nothing conspiratorial at all, and it exasperates me endlessly that the idea should be perceived this way. ", "I don’t think Sean Spicer and Wolf Blitzer meet for breakfast each morning and plot out the day’s Trump feud. ", "Rather, it’s simply that by independently pursuing their own personal/institutional objectives, they benefit one another. ", "This requires no shady collusion whatsoever. ", "After all, the clownfish and the sea anemone do not have to work things out in a smoke-filled room. ", "They don’t even particularly have to like one another. ", "They simply go about their business, and the same thing happens to be good for both parties. ", "Thinking about how relationships emerge from rational self-interest doesn’t make you Glenn Beck with his chalkboard; it’s standard economic thinking.", "\n\nI’ll give you further evidence that I’m not offering a “conspiracy”: you don’t usually see conspiracies described openly in the pages of the Hollywood Reporter. ", "And yet here we are:\n\nOn the TV front, [network president Jeff Zucker] and CNN have ridden the Trump wave as adeptly as any outlet. ", "In the critical 25-to-54 demographic, CNN’s daytime audience in January was up 51 percent year-over-year (Fox News was up 55 percent); it pulled in an extra $100 million in ad revenue (counting both TV and digital) last year compared with past election years. ", "Profit for 2016 neared $1 billion, and the short-term outlook suggests the Trump bump will lead to another $1 billion haul. “", "It’s going to turn 2017 into an even better year than we already expected to have,” says Zucker.", "\n\nHere’s the New York Daily News‘s Don Kaplan:\n\nThe feud between Donald J. Trump and CNN is like an iceberg: There’s so much more going on beneath the surface than anyone knows. ", "At first glance, it would seem completely adversarial, but it’s not… Those who know Zucker understand his ego is almost as outsized as Trump’s, and given their history, the pair shares a special bond — one that entitles Zucker to a level of access other news executives do not enjoy. ", "Zucker told New York Magazine the pair talked at least once a month during Trump’s campaign for the White House.", "\n\nAnd Politico:\n\nIn fact, the presidential campaign and the first few weeks of the Trump administration have proven to be a boon to the bottom line for CNN and its competition. ", "In many respects, Trump’s vitriol toward the media and the tough coverage of his administration reinforce themselves, driving coverage forward.", "\n\nBy all accounts, the rise of Donald Trump in American politics has been fantastically good news for CNN, which has seen an incredible ratings boost and reaped a billion dollar profit from the campaign cycle. ", "And Jeff Zucker is an old friend of Donald Trump’s, having launched Trump’s television career by commissioning The Apprentice in 2004. (", "You can find lots of photos of them hanging out together.) ", "For the head of a network with an ostensibly adversarial relationship with the new president, Zucker has seemed remarkably pleased with the direction of things: “This is the best year in the history of cable news … for everybody. ", "We’ve all benefited.” (", "The New York Times recently observed that “nibbling filet mignon in a private dining room overlooking Central Park, Jeffrey A. Zucker, the president of CNN, did not look like a man perturbed.”) ", "According to Politico, Zucker and CNN recognized early on that “Trump would be a ratings machine,” and deliberately gave him “quite a bit of coverage,” including broadcasting many of Trump’s rallies and speeches in full. ", "Faced with the fact of his own complicity in the rise of a terrifying and incompetent president, Zucker said he had no regrets, and reportedly “sleeps great at night.”", "\n\nDonald Trump and CNN’s Jeff Zucker\n\nAll of this is completely at odds with the received idea that Trump and the network are in a fight to the death, with Trump undermining journalists, ushering in a post-fact era, and posing a serious threat to the freedom of the press. ", "CNN contributors and correspondents declare that Trump poses an “existential crisis” for American journalism and poses a threat to democracy and free speech. ", "But television executives don’t seem to share that opinion. ", "During the election CBS’s Les Moonves seconded Zucker’s perspective:\n\nIt may not be good for America, but it’s damn good for CBS… For us, economically speaking, Donald’s place in the election is a good thing… The money’s rolling in, and this is fun. ", "It’s a terrible thing to say. ", "But bring it on, Donald. ", "Keep going.", "\n\nCould anyone who actually had serious grave concerns about Trump speak like this? (", "Moonves later insisted he had been joking, though since what he said was true, it’s unclear what the joke was supposed to be.) ", "Certainly anyone who thought that the future of the press was at stake, or recognized that millions of lives could potentially be destroyed through mass deportation (let alone nuclear war and climate change) you would have a hard time classifying anything about the election as “fun” or wishing Trump continued political success. ", "Yet that’s how the heads of CBS and CNN are feeling: they’re not worried. ", "They’re downright pleased. ", "For them (as opposed to everyone else), this is great. ", "It is, as Zucker put it, “a very exciting time.” ", "You don’t have to speculate especially wildly, then, in order to be skeptical of there being any real “hostility” between Trump and CNN. ", "All you have to do is listen to its chief executive’s words.", "\n\nAgain, this doesn’t necessitate believing that there is a conscious effort on CNN’s part to help Trump. ", "While overt media-political collaboration does happen (according to Cenk Uygur’s internal account of working at MSNBC, the Obama administration had significant pull with executives there and shaped the network’s tone), the real question is simply whether it’s possible for a profit-driven media to care much about serious journalism or moral values if ratings and profits lie elsewhere. ", "Financial self-interest powerfully shapes us on a subconscious level, and it’s easy to see why the optimal position for CNN at the moment is to feel like they are opposing Trump while not actually doing anything to seriously undermine him.", "\n\nAnd that’s precisely what seems to be happening. ", "Yes, there are regular spats with Sean Spicer and Kellyanne Conway. ", "These are entertaining; they even go viral! ", "But after Donald Trump’s recent speech to Congress, in which he accomplished the spectacular feat of reading from a set of prepared remarks for the first time in his political career, CNN declared him “presidential,” with even the network’s progressive commentators gushing over Trump. ", "It was somewhat bizarre to see Trump’s supposed bitter adversaries giving him totally undeserved praise for a transparently manipulative bit of agitprop. ", "But as The Atlantic‘s Derek Thompson explained, television news is a show, and shows demand narratives, and Trump steadily becoming statesmanlike is a great narrative, so there was no reason not to give Trump the story he wanted:\n\nThe fundamental bias in punditry is not toward “presidential” behavior or against “resistance.” ", "it is more simply pro-plot twist. ", "Narrative shifts are great for television, so great that it is irresistible to manufacture them in the absence of actual shifting narratives.", "\n\n(Journalistic symbiosis with Trump has a long history, by the way. ", "Ever since the New York Times compared him to Robert Redford in 1976, before writing in 1989 that The Art of the Deal made one “believe in the American Dream again,” Trump has been offering the press great stories, and the press have dutifully printed them. ", "Trump knows the ins and outs of media as well as anyone alive, and has been phenomenally successful at using the news to his advantage in order to build his celebrity and, ultimately, his power.)", "\n\nAnybody who believes that CNN’s rhetorical commitment to journalism is actually serious should read the Hollywood Reporter‘s account of Zucker’s plans for the network. ", "Serious adversarial reporting such as Jake Tapper’s has a place because Tapper successfully draws viewers. ", "But the rest of the network’s plans have barely any connection to anything resembling journalism. ", "Its future is in stand-up comics (W. Kamau Bell) and TV chefs (Anthony Bourdain—I love him, but that’s what he is.) ", "They’re paying 25 million dollars to a YouTube vlogger named Casey Neistat, a man whose specialty appears to be giddily trying out incredibly expensive goods and services on camera, and whose plans for how to use the $25 million are inscrutably vague and buzzword-laden. ", "To bolster their investigative reporting, CNN poached a team from BuzzFeed who had “broken several major stories, including Trump’s appearance in a soft-core Playboy video.” (", "A consequential scoop if there ever was one.)", "\n\nBut while the network’s preference for popularity over integrity would seem undeniable, CNN editorial VP Andrew Morse has insisted that it isn’t what it looks like: “We are decidedly not in the clickbait business… We don’t do cat videos, we don’t do waterskiing squirrels.” ", "Morse might be a little more believable if the network’s politics section didn’t literally run headlines like “Haha Guys, This Bird Looks Like Donald Trump.” (", "He might also want to check the network archives before confidently declaring that CNN is free of cat and squirrel-based news stories; in fact, CNN is the perfect place to go for a “Squirrels Eating Potato Chips” video, and in the weeks before the election they were literally running stories like “Here’s The Whole Election In Cat GIFS.”)", "\n\nThe point here is not that there is something wrong with providing access to amusing cat photos or clips of squirrels noshing on Pringles. ", "It is simply that CNN is a company, not a public service, and it can be expected to act like a company. ", "Its aim is to produce content that people will watch. ", "Sometimes the public’s taste will coincide with the public good. ", "But not too often. ", "And the rise of somebody like Donald Trump, who constitutes both a unique threat to human wellbeing and a unique opportunity for compelling television, heightens the tension between the journalistic and economic motivations of CNN. ", "And since it’s the economic dimension that directs most corporate action, especially when there are billions of dollars to be made, CNN has a lot to gain from being just antagonistic enough toward Trump to guarantee some good entertainment without being so antagonistic as to bring him down and have to return to C-SPAN levels of thrilling political discourse. ", "Thus to use Moonves’s formulation, in the Trump era, what’s “bad for America” is great for CNN.", "\n\nThe fact that CNN will never be good for humanity is not really the fault of the people who work at CNN. ", "After all, it’s hard to see how they could do anything differently. (", "Though, to their credit, they have experimented with some impressively elevated programming.) ", "Once your mandate is to get viewers, you’ve already got a pernicious conflict of interest, and the quest for viewers (or clicks) is endemic to contemporary American media. ", "So much is driven by the pursuit of eyes on the page or screen, and anyone working within that system will struggle to do things that are morally necessary but don’t really attract a viewership.", "\n\nThis is a very old criticism, but I think in many ways it is a correct one. (", "The most clichéd sentiments are also often the truest sentiments.) ", "When the production of media is motivated by profit, the temptations to sacrifice integrity are going to be great. ", "In the case of Donald Trump, these temptations will be all but irresistible. ", "An age that requires resistance therefore requires independent nonprofit media. ", "Economics still runs the world, and behind the apparent war between CNN and the Trump administration is a relationship just as agreeable as that of the clownfish and the sea anemone." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.000717968912795186, 0.0006040757289156318, 0.0007116788765415549, 0.0006501875468529761, 0.0007695340900681913, 0.0007110629230737686, 0.0006787643651477993, 0.0011787276016548276, 0.0006726784049533308, 0.0007700245478190482, 0.0011369880521669984, 0.0007313824025914073, 0.16591918468475342, 0.0006064767367206514, 0.001056905253790319, 0.0006344978464767337, 0.000679799763020128, 0.01898682862520218, 0.002473581815138459, 0.000607664289418608, 0.0009544852073304355, 0.0008555797394365072, 0.0007271188078448176, 0.0006265822448767722, 0.0006270287558436394, 0.009290396235883236, 0.0008867426658980548, 0.0010928669944405556, 0.0006638026097789407, 0.0006152024143375456, 0.0008107480243779719, 0.0005989909986965358, 0.0005948715843260288, 0.0006282212561927736, 0.0006117246812209487, 0.0007288476917892694, 0.008771472610533237, 0.0007228401373140514, 0.016434304416179657, 0.0019313774537295103, 0.0011260084575042129, 0.0006758334930054843, 0.00406444538384676, 0.003338266396895051, 0.0009468572679907084, 0.005830544978380203, 0.0006779991672374308, 0.0006613298901356757, 0.0007922291988506913, 0.0007707113400101662, 0.0007602199329994619, 0.0006312774494290352, 0.004410785157233477, 0.0007146870484575629, 0.0006790842744521797, 0.0007741484441794455, 0.0006487008067779243, 0.0006218641647137702, 0.0007283525774255395, 0.0007019596523605287, 0.0030182506889104843, 0.0006379797123372555, 0.001994146965444088, 0.0006194196757860482, 0.0006544776842929423, 0.0005639811279252172, 0.0007280437275767326, 0.0005922206910327077, 0.0007328636129386723, 0.0006045500631444156, 0.0013060326455160975, 0.0006267933640629053, 0.0007408094243146479, 0.0019034441793337464, 0.0005967338802292943, 0.0006174762966111302, 0.0012596179731190205, 0.0008197988499887288, 0.0007055215537548065, 0.0016233124770224094, 0.0006474809488281608, 0.0006229844875633717, 0.0005993399536237121, 0.0006525670760311186, 0.0008552175131626427, 0.0006885237526148558, 0.0008414784679189324, 0.0013206764124333858, 0.000611135212238878, 0.0005434934864751995, 0.0006194385350681841, 0.0007301379810087383, 0.0005974560626782477, 0.00223453133367002, 0.000590055191423744, 0.0005876676295883954, 0.0007191744516603649, 0.0010503053199499846 ]
0.003193
98
[ "Historical development and evolution of EPRI's post-closure dose assessment of potential releases to the biosphere from the proposed HLW repository at Yucca Mountain.", "\nThis paper describes the development and evolution of the Electric Power Research Institute's (EPRI) post-closure dose assessment for potential releases of radionuclides from the proposed High Level Waste repository at Yucca Mountain. ", "The starting point for this work was the 1995 publication of Technical Bases for Yucca Mountain Standards by the Commission on Geosciences, Environment and Resources of the National Research Council. ", "This report proposed the development and application of an individual risk-based standard for releases from the repository to replace the existing one, which was based on radionuclide release limits. ", "This in turn implied the development and application of methods to assess radiation doses to humans. ", "Accordingly, EPRI produced a methodology for such dose assessment as part of its Total System Performance Assessment program for the proposed Yucca Mountain repository site. ", "The methodology initially addressed releases via groundwater and then releases associated with extrusive igneous events. ", "The methodology was updated and applied over the following years to take account of regulatory developments, changes in estimates of the source term to the biosphere, peer review through international model comparison exercises, new site generic data, and new data concerning conditions at the point of compliance in Amargosa Valley. ", "The main outputs were Biosphere Dose Conversion Factors, which relate radionuclide levels in environmental media to the annual individual doses to a member of a hypothetical critical group and to the regulator-defined Reasonably Maximally Exposed Individual. ", "Most recently, consideration has been given to uncertainty in the dose estimates based on a probabilistic analysis. ", "The paper provides a perspective on the evolution of the dose assessments in response to the developments listed above." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006104500498622656, 0.0007067075348459184, 0.0006134830182418227, 0.0005857808282598853, 0.0006311138276942074, 0.0006314450292848051, 0.0006534868734888732, 0.0005242861807346344, 0.0005546081229113042, 0.0005381138762459159, 0.0005341254291124642 ]
0.000599
11