texts
sequence
meta
dict
scores
sequence
avg_score
float64
0
0.2
num_sents
int64
5
5
[ "Jorge Porcel\n\nJorge Raúl Porcel de Peralta (; September 7, 1936 – May 16, 2006), known as Jorge Porcel, was an Argentine comedy actor and television host. ", "He was nicknamed El Gordo de América (America's Fat Guy). ", "Porcel is considered, along with Alberto Olmedo, one of Argentina's greatest comic actors of the twentieth century.", "\n\nMovie career\nPorcel worked in 49 movies, starting with 1962's Disloque en Mar del Plata, and ending with Carlito's Way (1993). ", "Many of these 49 movies were collaborations with Olmedo. ", "Among the movies they did together was 1986's Rambito y Rambón: Primera Misión. (", "Little Rambo and Big Rambo: First Mission)\n\nMany of Porcel and Olmedo's movies in the 1970s and 1980s were adult-oriented comedies. ", "Conservative Argentine authorities rated these movies as PM-18 (age 18 and above), except for some movies planned for family audiences, which had \"tamer\" content. ", "These movies are considered to be the pinnacle of Argentina's sexy comedy movie genre. ", "Most of these movies were directed by Gerardo Sofovich or his brother Hugo. ", "Porcel virtually stopped appearing in these movies after the accidental death of Olmedo, which left him clinically depressed.", "\n\nFilms\n\nTelevision career\n\nPorcel had many TV hit shows as well, including Operación Ja Ja (both the 1960s original and the 1980s remake) and Polémica en el bar (Debate at the Café), where he had celebrated moments of comedy with fellow comedian Juan Carlos Altavista. ", "Most of these TV efforts were linked to the Sofovich brothers. ", "He also did Las Gatitas Y Ratones de Porcel (Little Cats & Mice of Porcel).", "\n\nAfter he retired from filming movies in Argentina, he moved to Miami, where he starred in a risqué late-night variety show named A la cama con Porcel (To Bed with Porcel) on the Telemundo network, and was given a cameo in Hollywood production Carlito's Way. ", "A La Pasta con Porcel is a restaurant in Miami Beach opened by Porcel and named after his popular television show.", "\n\nPorcel's health deteriorated with time, due to his struggles with obesity and diabetes, to the point of ending up using a wheelchair in his later years. ", "He toured during 1999 through Latin America to promote his autobiography Laughs, Applause and Tears. ", "By this time, he had also become a born again Christian.", "\n\nPorcel died in a hospital in Miami after a gallbladder surgery at the age of 69. ", "His body was flown to Argentina and buried at the Chacarita Cemetery.", "\n\nMusic \nIn 1980 he recorded a bolero record called Pure heart (Spanish: Puro Corazón (1980)) . ", "Jorge Porcel loved music and in his shows he used to sing boleros, as in Las gatitas y ratones de Porcel (Porcel's kittens and mice) (where he was frequently accompanied by piano player Mike Rivas) and at ¿Lo viste a Porcel? (", "Have you seen Porcel). ", "With his character Don Mateo he took part in a record from the show Operacióm Ja-Já (Operation Ha ha) singing along with Rolo Puente, Leo Dan's hit «Libre, solterito y sin nadie» (Free, single and with nobody).", "\n\nComics \nIn 1970's decade, for several years, Cielosur Editora published several magazines dedicated to TV characters, as Piluso, Minguito and El Gordo Porcel. ", "Las aventuras del Gordo Porcel (The adventures of Porcel the Fat Man) was the title of the one dedicated to Jorge. ", "The usual play -with drawings by Francisco Mazza- consisted of el Gordo getting in trouble and several confusions, during the time in between the feasts of food prepared by his mother, who he lived with. ", "Other frequent characters are his girlfriend and his dog Banana, who had his own comic.", "\n\nSee also\n\nArgentine humour\nList of television presenters/Argentina\n\nExternal links\n \n \n \n \n\nCategory:1936 births\nCategory:Male actors from Buenos Aires\nCategory:Argentine male film actors\nCategory:Argentine male television actors\nCategory:Argentine comedians\nCategory:Argentine evangelicals\nCategory:2006 deaths\nCategory:Burials at La Chacarita Cemetery\nCategory:20th-century comedians" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.012903225806451613, 0.034482758620689655, 0.008695652173913044, 0.007751937984496124, 0.017543859649122806, 0.012345679012345678, 0.007575757575757576, 0, 0, 0.013157894736842105, 0, 0.014814814814814815, 0.015873015873015872, 0.013333333333333334, 0.0038461538461538464, 0.008771929824561403, 0, 0.019801980198019802, 0, 0, 0.014492753623188406, 0.010416666666666666, 0.017699115044247787, 0, 0.01904761904761905, 0.018633540372670808, 0.017391304347826087, 0.00980392156862745, 0, 0.00516795865633075 ]
0.010118
5
[ "Lower Your Risk Of Postpartum Depression With These Six Steps\n\nThe experience of motherhood is both joyous and overwhelming at the same time. ", "It sets a new phase in your life. ", "Mothers look forward anxiously to the new phase. ", "You may have amazing plans and well cut out schedules in place just waiting for the baby to check in. ", "However, reality hits you once the baby is finally here. ", "All the things you read in your postnatal and antenatal blogs are all but a sad fantasy.", "\n\nYou even watched celebs pose for photos looking all dressed up with their little ones; you are just waiting to do the same and post the photos on your Instagram page. ", "The truth, however, dawns on you that even taking a simple bath is a luxury. ", "Watching TV is next to impossible, and you are also unaware of what’s happening in your world.", "\n\nYou feel completely lost, helpless and frustrated. ", "You think that your little girl or boy has turned into a terrorist. ", "This kind of feeling can lead to postpartum depression. ", "So, what are some of the things you can do to lower the risk? ", "Here’s your guide:\n\nUnderstand the triggersFor you to prevent a disease, you must understand the causes. ", "What are some of the factors that are likely to leave you exposed to extreme baby blues? ", "If for instance, you were not ready for the pregnancy, you may have mixed feelings about your baby. ", "Your motherly love for the baby may turn to hatred and even have ideas of harming the baby. ", "However, since the pregnancy is already there, you can consider going for counselling before the baby’s birth so that you can accept the situation. ", "Other triggers include;\n\nBaby’s poor health\n\nCongenital disabilities\n\nToo much trauma during childbirth\n\nPreterm baby\n\nDo not wait for the situation to get worse before seeking professional help.", "\n\nGet adequate restDuring the fourth trimester, your baby will find it difficult to understand the world. ", "She was used to an entirely different environment in the womb. ", "She was cushioned from harm by the amniotic fluid. ", "Once born, she is exposed to all manners of pollution. ", "She will find the world around her too overwhelming. ", "Therefore, her fussy moments will be too frequent and her sleep pattern will differ from yours. ", "She may find it comfortable to sleep during the day and stay awake at night. ", "For the baby, day and night are all the same. ", "Therefore, to beat the risk of postpartum depression, adapt the baby’s schedule. ", "Once she sleeps, do the same. ", "This will ensure you are not too exhausted hence reducing baby blues.", "\n\nLearn to seek helpAll mothers want to feel in charge. ", "Your wish is to be entirely in control of your schedule, family and the baby. ", "However, this may not be possible. ", "The sudden lifestyle change could expose you to depression especially if you are not able to manage the transition.", "\n\nMake it easy by seeking an extra pair of hands to help you. ", "Talk to your spouse and hire the best confinement nanny Singapore to give you the necessary support in the daily running of your home. ", "The nanny can prepare meals, take care of the baby and even give you a body massage occasionally.", "\n\nTalk about your feelingsMembers of your family may not have an idea of what you are going through. ", "To them, you are just another member of the family who brought forth a child. ", "All they see is the brighter side. ", "They have no idea you are going through a turmoil, and cannot handle the changes. ", "Talk to them about your situation; about your feeling of despair, solitude and even frustration.", "\n\nTheir assurance that you are on the right track will give you the necessary strength to carry on your duties. ", "Talking also helps in resolving any bolted feelings that may be building up within your system. ", "You can even cry, it’s positive and quite healthy. ", "All you need is a listening ear.", "\n\nConfront your fearsThere are moments when you may not want to think about your problems. ", "You feel helpless and consider pushing the problems to the back of your mind. ", "Unfortunately, they will not disappear. ", "They will always cause you more worry and fear.", "\n\nWhat are some of the things that you are afraid of about your status? ", "Are you worried that you do not have adequate resources to care for your child? ", "Are you fearful that your spouse will not always be there when you need him? ", "Some of your fears could be assumptions. ", "Face each of your problems with possible solutions. ", "There are those that may seem too complicated for you. ", "Let them be. ", "You can only do so much.", "\n\nForget perfectionNo one is perfect. ", "Not even your parents or spouse. ", "So how do you expect to be perfect? ", "You will make mistakes during your motherhood journey. ", "Your baby may even get a reaction from the food you gave her. ", "Don’t judge yourself too harshly. ", "The most important thing is to understand you are doing the best for the baby. ", "If your baby gets the flu, don’t feel too sad that you could do something about it.", "\n\nBringing forth life is divine and beautiful. ", "It is the ultimate prize of womanhood. ", "If you have the opportunity to enjoy such a gift, embrace it with love and happiness. ", "Let each milestone of your baby be full of joy, laughter, and endless gratitude. ", "In case the journey gets tough, remember you are not alone. ", "Make use of your support system and fight any signs of PPD." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0, 0.005917159763313609, 0, 0, 0, 0, 0, 0, 0.009523809523809525, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.012987012987012988, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.000395
5
[ "Van Wieren\n\nvan Wieren is a surname. ", "Notable people with the surname include:\n\nLarry van Wieren (born 1951), Dutch ice hockey player\nPete Van Wieren (1944-2014), American sportscaster\n\nCategory:Surnames of Dutch origin" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.02702702702702703, 0.016574585635359115 ]
0.021801
5
[ "\"На \"поребрике\" россиян будет судить Майдана\": судейская бригада матча Россия - Южная Корея - аргентинцы\n\nФИФА обнародовала состав судейских бригад на ближайшие матчи чемпионата мира-2014.", "\n\nМеждународная федерация футбольных ассоциаций обнародовала состав судейских бригад на ближайшие матчи чемпионата мира-2014. ", "Об этом сообщается на официальном сайте ФИФА.", "\n\nПоединок группы Н, в котором встретятся сборные России и Южной Кореи, обслужит аргентинская бригада арбитров во главе с Нестором Питаной.", "\n\nПомогать 38-летнему рефери будут Эрнан Майдана и Хуан Пабло Белатти.", "\n\nМатч сборной России против Южной Кореи состоится в бразильском городе Куяба. ", "Игра начнется 18 июня в 1:00 по киевскому времени.", "\n\nМатч сборной России против Южной Кореи состоится в бразильском городе Куяба 18 июня в 1:00 по киевскому времени.", "\n\nНапомним, 12 июня в Бразилии начался 20-й чемпионат мира по футболу. ", "Соревнование состоится в Бразилии с 12 июня по 13 июля.", "\n\nДобавьте ukranews.com в избранные источники Google Новости" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.015957446808510637, 0.007936507936507936, 0, 0.014388489208633094, 0.02857142857142857, 0.0379746835443038, 0.02, 0.03508771929824561, 0, 0.03636363636363636, 0.016666666666666666 ]
0.019359
5
[ "According to Mountain Girl, Garcia originally purchased the hat in a costume shop in San Francisco in 1966: Stars and stripes, and red white and blue were popular themes in new art during the rebellious 1960's as American youth sought to expand their civil liberties by wearing flag-themed clothing and to attract attention and to identify changing behaviors in America as freedoms [were] protected by the U.S. Constitution... [He] wore it to public appearances, concerts with the band, and in photos by well-known San Francisco photographer Gene Anthony, who documented the ‘Summer of Love’ in Haight-Ashbury.", "\n\n\n\nGarcia chose to wear the hat for the now famous shoots with Gene Anthony on the steps of the Grateful Dead communal house at 710 Asbury and with Herb Greene at the home of Gene Estribou, who recorded one of the first demos for the band. ", "Photographs from both shoots were used for the cover and liner of the Grateful Dead’s 1967 debut album The Grateful Dead, where the corresponding liner notes named Garcia as Jerry (\"Captain Trips\") Garcia. ", "The hat became synonymous with Garcia’s ‘Captain Trips’ persona. ", "Herb Greene remembers …Garcia became Captain Trips when he put it on.", "\n\n\n\nAccording to Denise Kaufman of The Ace of Cups, the nickname originally came from an episode at Ken Kesey's Acid Test at the Big Beat Club, Mountain View in Palo Alto on 18th December, 1965: At one point, I was standing out in the parking lot talking to Jerry Garcia, and this police car drove up… It was the usual: \"What's going on here?\" ", "Whatever Jerry said satisfied him because he turned to leave. ", "As he turned to walk away, Jerry kind of tipped his hat and said, \"The tips, captain.\" ", "The way he said it just knocked me out. ", "I told Kesey about this interaction and out of that Jerry got his name Captain Trips. ", "Of course, the nickname also reflected Garcia’s fondness for psychedelic drugs and his prototypical psychedelic persona, although he came to dislike the moniker himself.", "\n\n\n\nAccording to Mountain Girl, The hat was part of Jerry Garcia's personal wardrobe for several years and when he stopped wearing it, he gave it to his friend Harry Tsvi Strauch who ran a gallery on Haight Street. ", "Strauch explains …In the Summer of 1966, The Grateful Dead became our neighbors, moving into 710 Ashbury, the house two doors up from ours. ", "September 1967, an anti-War/Peace march was to come through Haight Street for a rally at Kezar Stadium. ", "My wife - Hyla Strauch - was designing a Red, White & Blue American Flag themed window display for our shop in support of the march. ", "She thought that Jerry Garcia's Capt'n Trips hat would be the ideal, iconic centerpiece for the display. ", "We brought this up to Jerry, and he gave us the hat to use in the shop window! ", "When it was time to take the display down, we offered to return the hat - Jerry Told us \"I don't want the hat...You keep it, take care of it.\"", "\n\n" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.004918032786885246, 0.016597510373443983, 0.02912621359223301, 0.015384615384615385, 0.043478260869565216, 0.01744186046511628, 0.016129032258064516, 0.011494252873563218, 0, 0.03488372093023256, 0.005917159763313609, 0.013953488372093023, 0.007142857142857143, 0, 0.007518796992481203, 0.01904761904761905, 0, 0, 0 ]
0.012791
5
[ "As the world struggles to find out more information about the San Francisco crash landing, Twitter user Steve Baker used flight tracking website FlightAware to compare yesterday's Asiana Airlines Flight 214 (AAR 214) to today's ill-fated flight.", "\n\nHere's his Tweet:\n\nLook at an enlargement of the two descent paths (the part of the graphic that looks like a solid black wall):\n\nCompare the two flight paths, and you'll notice Friday's glide slope was much smoother than today's. ", "Saturday's flight path suddenly veered downward just before the tail section of the plane hit the rocks on the shore at the end of the runway.", "\n\nThe reason for this deviation is still unknown.", "\n\nSEE ALSO: Plane Crashes While Landing at San Francisco Airport\n\nMeanwhile, an audio recording of air traffic control during the crash has surfaced:\n\nHere's the transcription, courtesy Time:\n\nFlight 214 cleared into land 28L at 18:21:12 Zulu 18:22:27: Flight 214 calls ATC 18:22:30: Tower says, “214 Heavy, Emergency Vehicles are responding” 18:22:37: Flight 214 calls again. ", "Can’t make out what is said. ", "18:23:10: Flight 214 calls again. ", "Can’t make out what is said. ", "18:23:25: ATC says, “Emergency vehicles are responding. ", "We have everyone on their way.” ", "18:27:02: Another plane calls ATC, “We see people (at our vicinity) that need immediate attention. ", "They are alive and they are walking around.”", "\n\nPics courtesy FlightAware, Steve Baker; audio file via YouTube, Anon Nymous" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.012244897959183673, 0, 0, 0, 0.005305039787798408, 0, 0, 0, 0.017857142857142856, 0, 0.010101010101010102, 0, 0.05194805194805195 ]
0.007497
5
[ "[[install-and-run]]\n== Install and run\n\nThe easiest way to get started with Elastic APM is by using our\nhttps://www.elastic.co/cloud/elasticsearch-service[hosted {es} Service] on\nElastic Cloud. ", "The {es} Service is available on AWS, GCP, and Azure,\nand automatically configures APM Server to work with {es} and {kib}.", "\n\n[float]\n=== Hosted Elasticsearch Service\n\nimage::images/apm-architecture-cloud.png[Install Elastic APM on cloud]\n\nSkip managing your own {es}, {kib}, and APM Server by using our\nhttps://www.elastic.co/cloud/elasticsearch-service[hosted {es} Service] on\nElastic Cloud.", "\n\n{ess-trial}[Try out the {es} Service for free],\nthen jump straight to <<agents>>.", "\n\n[float]\n[[before-installation]]\n=== Install and manage the stack yourself\n\nimage::images/apm-architecture-diy.png[Install Elastic APM yourself]\n\nTo install the stack yourself, first see the https://www.elastic.co/support/matrix[Elastic Support Matrix] for information about supported operating systems and product compatibility.", "\nWe recommend you use the same version of Elasticsearch, Kibana, and APM Server.", "\n\n* <<install-elasticsearch>>\n* <<install-kibana>>\n* <<apm-server>>\n* <<agents>>\n\n[float]\n[[quick-start]]\n=== Quick start with Docker\n\nIf you're interested in Elastic APM and want a quick and easy development environment to try things out,\nsee <<quick-start-overview>>.", "\n\n[[install-elasticsearch]]\n=== Step 1: Install Elasticsearch\n\n// This will move to tagged regions so we can pull the installation instructions\n// here (instead of linking out)\n\nInstall an Elasticsearch cluster, start it up, and make sure it's running.", "\n\n. ", "Verify that your system meets the\nhttps://www.elastic.co/support/matrix#matrix_jvm[minimum JVM requirements] for {es}.", "\n. {", "stack-gs}/get-started-elastic-stack.html#install-elasticsearch[Install Elasticsearch].", "\n. {", "stack-gs}/get-started-elastic-stack.html#_make_sure_elasticsearch_is_up_and_running[Make sure elasticsearch is up and running].", "\n\n[[install-kibana]]\n=== Step 2: Install Kibana\n\n// This will move to tagged regions so we can pull the installation instructions\n// here (instead of linking out)\n\nInstall Kibana, start it up, and open up the web interface:\n\n. {", "stack-gs}/get-started-elastic-stack.html#install-kibana[Install Kibana].", "\n. {", "stack-gs}/get-started-elastic-stack.html#_launch_the_kibana_web_interface[Launch the Kibana Web Interface].", "\n\n[[apm-server]]\n=== Step 3: Install APM Server\n\nInstall, set up, and run APM Server.", "\n\n. {", "apm-server-ref-v}/installing.html[Install APM Server].", "\n. {", "apm-server-ref-v}/apm-server-configuration.html[Set up APM Server]\n. {", "apm-server-ref-v}/setting-up-and-running.html[Start APM Server].", "\n\nNext, use the config file if you need to change the default configuration that APM Server uses to connect to Elasticsearch,\nor if you need to specify credentials:\n\n* {apm-server-ref-v}/configuring-howto-apm-server.html[Configuring APM Server]\n** {apm-server-ref-v}/configuration-process.html[General configuration options]\n** {apm-server-ref-v}/elasticsearch-output.html[Configure the Elasticsearch output]\n\n[[secure-api-access]]\nIf you do change the listen address from `localhost` to something that is accessible from outside of the machine,\nwe recommend setting up firewall rules to ensure that only your own systems can access the API.", "\nAlternatively,\nyou can use a {apm-server-ref-v}/securing-apm-server.html[secret token and TLS].", "\n\nIf you have APM Server running on the same host as your service,\nyou can configure it to listen on a Unix domain socket.", "\n\n[[more-information]]\nTIP: For detailed instructions on how to install and secure APM Server in your server environment,\nincluding details on how to run APM Server in a highly available environment,\nplease see the full {apm-server-ref-v}/index.html[APM Server documentation].", "\n\n[[agents]]\n=== Step 4: Install APM agents\n\n// This tagged region is reused in the Observability docs.", "\n// tag::apm-agent[]\nAgents are written in the same language as your service.", "\nMonitoring a new service requires installing the agent\nand configuring it with the address of your APM Server, a secret token (if necessary), and a service name.", "\n\n[cols=\"h,,\"]\n|=======================================================================\n|Agent\n2+|\n\n.2+|Go\n2+|The Go agent automatically instruments Gorilla and Gin, and has support for Go’s built-in net/http and database/sql drivers.", "\n|{apm-go-ref-v}/supported-tech.html[Supported technologies]\n|{apm-go-ref-v}/getting-started.html[Set up the Go Agent]\n\n.2+|Java\n2+|The Java agent automatically instruments Servlet API, Spring MVC, and Spring Boot out of the box.", "\n|{apm-java-ref-v}/supported-technologies-details.html[Supported technologies]\n|{apm-java-ref-v}/setup.html[Set up the Java Agent]\n\n.2+|.NET\n2+|The .NET agent automatically instruments ASP.NET Core applications, and .NET Framework applications.", "\n|{apm-dotnet-ref-v}/supported-technologies.html[Supported technologies]\n|{apm-dotnet-ref-v}/setup.html[Set up the .NET Agent]\n\n.2+|Node.js\n2+|The Node.js agent automatically instruments Express, hapi, Koa, and Restify out of the box.", "\n|{apm-node-ref-v}/supported-technologies.html[Supported technologies]\n|{apm-node-ref-v}/set-up.html[Set up the Node.js Agent]\n\n.2+|Python\n2+|The Python agent automatically instruments Django and Flask out of the box.", "\n|{apm-py-ref-v}/supported-technologies.html[Supported technologies]\n|{apm-py-ref-v}/set-up.html[Set up the Python Agent]\n\n.2+|Ruby\n2+|The Ruby agent automatically instruments Rails out of the box.", "\n|{apm-ruby-ref-v}/supported-technologies.html[Supported technologies]\n|{apm-ruby-ref-v}/set-up.html[Set up the Ruby Agent]\n\n.2+|RUM\n2+|Real User Monitoring (RUM) captures user interactions with clients such as web browsers.", "\n|{apm-rum-ref-v}/supported-technologies.html[Supported technologies]\n|{apm-rum-ref-v}/getting-started.html[Set up the RUM Agent]\n\n|=======================================================================\n\nTIP: Check the {apm-overview-ref-v}/agent-server-compatibility.html[Agent/Server compatibility matrix] to ensure you're using agents that are compatible with your version of Elasticsearch.", "\n\n[[choose-service-name]]\n[float]\n==== Choose a service name\n\nThe service name is used by Elastic APM to differentiate between data coming from different services.", "\n\nElastic APM includes the service name field on every document that it saves in Elasticsearch.", "\nIf you change the service name after using Elastic APM,\nyou will see the old service name and the new service name as two separate services.", "\nMake sure you choose a good service name before you get started.", "\n\nThe service name can only contain alphanumeric characters,\nspaces, underscores, and dashes (must match `^[a-zA-Z0-9 _-]+$`).", "\n\n// end::apm-agent[]\n\n[[configure-apm]]\n=== Step 5: Configure APM\n\nNow that you're up and running with Elastic APM, you may want to adjust some configuration settings.", "\nLuckily, there are many different ways to tweak and tune the Elastic ecosystem to adapt it to your needs.", "\n\n[float]\n==== Configure APM agents\n\n// This tagged region is reused in the Observability docs.", "\n// tag::configure-agents[]\nAPM agents have a number of configuration options that allow you to fine tune things like\nenvironment names, sampling rates, instrumentations, metrics, and more.", "\n\n|===\n|*Agent configuration documentation*\na|\n\n* {apm-go-ref-v}/configuration.html[Go Agent configuration]\n* {apm-java-ref-v}/configuration.html[Java Agent configuration]\n* {apm-dotnet-ref-v}/configuration.html[.NET Agent configuration]\n* {apm-node-ref}/configuring-the-agent.html[Node.js Agent configuration]\n* {apm-py-ref-v}/configuration.html[Python Agent configuration]\n* {apm-ruby-ref-v}/configuration.html[Ruby Agent configuration]\n* {apm-rum-ref-v}/configuration.html[RUM Agent configuration]\n|===\n\nA select number of configuration options can be changed directly in Kibana, without needing to redeploy the Agent.", "\nSee {apm-app-ref}/agent-configuration.html[Agent configuration in Kibana] for more information.", "\n\n[float]\n==== Configure Elastic Cloud\n\nIf you're running APM Server in Elastic cloud, you can configure your own user settings right in the Elasticsearch Service Console.", "\nAny changes are automatically appended to the `apm-server.yml` configuration file for your instance.", "\n\nFull details are available in the {cloud}/ec-manage-apm-settings.html[APM user settings] documentation.", "\n\n[float]\n==== Configure a self installation\n\nIf you've installed APM Server yourself, you can edit the `apm-server.yml` configuration file to make changes.", "\nMore information is available in {apm-server-ref-v}/configuring-howto-apm-server.html[configuring APM Server].", "\n\nDon't forget to also read about\n{apm-server-ref-v}/securing-apm-server.html[securing APM Server], and\n{apm-server-ref-v}/monitoring.html[monitoring APM Server].", "\n// end::configure-agents[]\n\n[[quick-start-overview]]\n=== Quick start development environment\n\n// This tagged region is reused in the Observability docs.", "\n// tag::dev-environment[]\nifeval::[\"{release-state}\"==\"unreleased\"]\n\nVersion {version} of APM Server has not yet been released.", "\n\nendif::[]\n\nifeval::[\"{release-state}\"!=\"unreleased\"]\n\nIf you're just looking for a quick way to try out Elastic APM, you can easily get started with Docker.", "\nJust follow the steps below.", "\n\n**Create a docker-compose.yml file**\n\nThe https://www.docker.elastic.co/[Elastic Docker registry] contains Docker images for all of the products\nin the {stack}.", "\nYou can use Docker compose to easily get the default distributions of {es}, {kib},\nand APM Server up and running in Docker.", "\n\nCreate a `docker-compose.yml` file and copy and paste in the following:\n\n[\"source\",\"yaml\",subs=\"attributes\"]\n--------------------------------------------\ninclude::./docker-compose.yml[]\n--------------------------------------------\n\n**Compose**\n\nRun `docker-compose up`.", "\nCompose will download the official docker containers and start {es}, {kib}, and APM Server.", "\n\n**Install Agents**\n\nWhen Compose finishes, navigate to http://localhost:5601/app/kibana#/home/tutorial/apm.", "\nComplete steps 4-6 to configure your application to collect and report APM data.", "\n\n**Visualize**\n\nUse the APM app at http://localhost:5601/app/apm to visualize your application performance data!", "\n\nWhen you're done, `ctrl+c` will stop all of the containers.", "\n\n**Advanced Docker usage**\n\nIf you're interested in learning more about all of the APM features available,\nor running the Elastic stack on Docker in a production environment, see the following documentation:\n\n* {apm-server-ref-v}/running-on-docker.html[Running APM Server on Docker]\n* {stack-gs}/get-started-docker.html[Running the Elastic Stack on Docker]\n\nendif::[]\n// end::dev-environment[]\n" ]
{ "pile_set_name": "Github" }
[ 0.005154639175257732, 0.01639344262295082, 0.007434944237918215, 0, 0.0030303030303030303, 0.0375, 0.0037174721189591076, 0.003968253968253968, 0, 0.00847457627118644, 0, 0, 0, 0, 0.0043859649122807015, 0, 0, 0, 0.011764705882352941, 0, 0, 0, 0, 0, 0.0062402496099844, 0.010416666666666666, 0.00819672131147541, 0.0036231884057971015, 0.009708737864077669, 0, 0.006172839506172839, 0.004273504273504274, 0.013100436681222707, 0.004098360655737705, 0.01282051282051282, 0.004608294930875576, 0, 0.004464285714285714, 0.005089058524173028, 0, 0.010526315789473684, 0, 0, 0, 0, 0, 0.010526315789473684, 0, 0, 0, 0.011695906432748537, 0, 0, 0, 0, 0, 0.013071895424836602, 0.0078125, 0.006329113924050633, 0, 0.012345679012345678, 0.016129032258064516, 0, 0.010869565217391304, 0, 0.012345679012345678, 0.008849557522123894, 0, 0.005063291139240506 ]
0.004641
5
[ "PROJECT SUMMARY Ischemic heart disease accounts for approximately 42.5% of all cardiovascular-related deaths and afflicts 720,000 individuals/year. ", "While current medical treatments have significantly decreased heart attack- associated mortality, post-ischemic myocardial tissue undergoes pathologic remodeling and scarring, subjecting patients to cardiac dysfunction and heart failure. ", "As endogenous cardiac regeneration is limited, stem cell and regenerative medicine-based approaches to cardiac repair represent promising solutions towards regaining normal heart function. ", "Bolstering interest in cardiovascular tissue engineering has given rise to the development of novel biomaterials capable of maintaining cardiac cell function within a 3D tissue-like environment, while detailed protocols have been developed to derive mature cardiomyocytes from a myriad of stem cell sources; however, the essential ability to generate a construct that recapitulates the cellular density and composition, thickness, and helicoid structure of the native heart has limited the therapeutic applicability of tissue engineered constructs thus far. ", "Utilizing photodegradable polymer-based hydrogels that enable a spatially-defined co-culture of hES-derived cardiomyocytes and endothelial cells, we propose to generate a densely-vascularized 3D cardiac construct exhibiting biomimetic helical tissue architecture. ", "To support the culture of a thick myocardial tissue and enhance mass transport of oxygen and nutrients, vessels will be photopatterned into cell-laden hydrogels containing mature cardiomyocytes to generate perfusable vasculature with similar size, shape, and structure to that of the native heart. ", "Channels will be endothelialized and perfused with fresh media using biomimetic pulsatile flow to encourage endothelial-cardiomyocyte cell interaction. ", "We aim to demonstrate that by controlling micron-scale channel architecture in a biomimetic helical arrangement with near-native heart capillary density, paracrine signaling, ECM deposition, and direct contact of endothelial cells and cardiomyocytes, we can direct cardiomyocyte orientation, enhance construct contractility, and recapitulate the native torsional tissue contraction. ", "As the proposed research will represent the first successful strategy to generate perfusable vasculature networks with 3D features on the single-micron scale, we expect that the developed methodologies will find wide applicability in the engineering of vascularized constructs beyond cardiac tissue." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0, 0, 0, 0.0017921146953405018, 0.003787878787878788, 0, 0, 0.0026109660574412533, 0.0033444816053511705 ]
0.001282
5
[ "Introduction {#Sec1}\n============\n\nSince the early 1980s, scientists have relied on nonhuman primate (NHP) models to assess whether cell-based therapies (CBTs) can be beneficial for Parkinson's disease (PD). ", "CBT strategies and NHP models of PD emerged into the scientific arena simultaneously. ", "In a way, the availability of the new NHP models fueled CBT progression towards clinical application.", "\n\nAs the main aim of CBTs for PD was and still is the replacement of neurons lost in the disease, PD animal models with neurotoxin-induced neuronal loss became an ideal platform to assess the approach. ", "CBT studies in rodent models provided invaluable information on neuronal survival, migration and integration after grafting (Kim et al. [", "@CR73]). ", "Clinical translation of CBTs requires progressive evaluation in different species and as a first-in-class and invasive brain therapy, NHP experiments are a logical next step (Capitanio and Emborg [@CR20]). ", "Compared to rodents that are inbred, NHPs are outbred. ", "Behavioral outcome measures such as fine motor skills, which are affected in PD, can be easily tested in NHPs but not in other large species, like pigs. ", "Clinically relevant behavioral outcome measures are critical to determine the efficacy of the strategy, including the selection of intracerebral grafting targets. ", "In that regard, NHPs and humans share a similar organization of the striatum, with the caudate nucleus and the putamen clearly delineated by the white matter tracts of the internal capsule. ", "In rodents, transecting white matter tracts perforate throughout the striata, without presenting a physical barrier for cell distribution (Fig.", " [1](#Fig1){ref-type=\"fig\"}).Fig.", " 1Coronal brain sections of **A** rhesus and *a* mouse brain immunostained against tyrosine hydroxylase (TH) highlighting the comparison of brain size and complexity. *", "Scale bar* 1 cm. *", "Cd* caudate, *ic* internal capsule, *Put* putamen, *ac* anterior commissure, *CPu* caudate and putamen\n\nIn this article, we aim to discuss the role of NHP models of PD in CBT development, keeping in perspective how the field of PD is evolving, analyze ongoing advances in CBTs and the issues that need to be considered to maximize the value of NHP studies for the successful clinical translation of CBTs for PD.", "\n\nParkinson's disease: then and now {#Sec2}\n=================================\n\nParkinson's disease (PD) is the 2nd most common neurodegenerative disorder affecting around 1% of the population over the age of 60 (Driver et al. [", "@CR35]). ", "When CBTs were first envisioned for actual clinical application, the conceptualization of PD suggested that it was an ideal candidate disease for brain repair. ", "Patients were diagnosed by typical motor symptoms (resting tremor, rigidity, bradykinesia, and postural instability), which were associated with the loss of dopaminergic (DAergic) nigral neurons. ", "As the symptoms responded to oral dopamine (DA) replacement therapy, it was expected that dopamine replacement with a cell source should be an efficient way to securely and locally deliver DA and, basically, cure PD. ", "In addition, the brain was viewed as an immunoprivileged, postmitotic organ.", "\n\nThe understanding of PD and the brain has evolved over time, which affects the application of CBT strategies. ", "Today, PD diagnoses still depend on the presence of typical motor symptoms, and postmortem confirmation of nigral DAergic neuron loss and the presence of intracytoplasmic neuronal inclusions termed Lewy bodies \\[LBs; (Vermilyea and Emborg [@CR153])\\]. ", "Yet, PD is now recognized as a complex neurodegenerative disorder that includes non-motor symptoms (NMS). ", "Depression, anxiety, loss of sense of smell, gastrointestinal dysfunction and cardiac dysautonomia are common PD NMS, which are associated with neurodegeneration in other areas of the central and peripheral nervous system (Chaudhuri and Odin [@CR21]; Chaudhuri et al. [", "@CR22]). ", "Interestingly, NMS precede the onset of the movement disorder by decades and are now proposed as prodromal signs of the disease (Postuma et al. [", "@CR109]). ", "Earlier PD diagnoses would increase the chances of success of neuroprotective strategies. ", "In that regard, brain immunoreactivity has been documented (Kordower et al. [", "@CR77]; Roitberg et al. [", "@CR123]; Tambur [@CR145]) and neuro-inflammation has been linked to PD neurodegeneration, suggesting that immunomodulation can be neuroprotective (Kannarkat et al. [", "@CR68]). ", "Neurogenesis has been documented in the adult brain of rodents (Altman and Das [@CR1]; Kaplan and Hinds [@CR69]; Kempermann et al. [", "@CR71]), NHPs (Gould et al. [", "@CR60]) and humans (Eriksson et al. [", "@CR46]), and directed neurogenesis has been discussed for self-brain repair (Rakic [@CR111]).", "\n\nAnother chain of events that led to findings with great implications for PD and CBTs started in 1996, when mutations in the alpha-synuclein (α-syn) gene were found in familial forms of PD (Polymeropoulos et al. [", "@CR108]). ", "Subsequent studies identified α-syn as the main component of LBs (Spillantini et al. [", "@CR137], [@CR138]). ", "Then, in 2008 LBs were reported in dopaminergic fetal grafts of PD patients that were transplanted a decade earlier, suggesting that the grafts \"caught PD\" from the host (Li et al. [", "@CR87]; Kordower et al. [", "@CR78]). ", "Since then, α-syn research has taken a center stage in PD research (Bendor et al. [", "@CR10]; Vermilyea and Emborg [@CR153]). ", "Investigations on whether α-syn has prion-like activity revitalized the Braak and Braak hypothesis that PD may start in the brainstem and propagate through the neural axis (Braak et al. [", "@CR17]; Chu and Kordower [@CR25]; Hilker et al. [", "@CR65]). ", "Studies on protein aggregation followed (Luk et al. [", "@CR89]), as well as the search for neuroprotective approaches aiming to prevent aggregation (Kalia et al. [", "@CR67]). ", "It should be noted that the cause of PD is still unclear and that the question of whether the early peripheral symptoms reflect where PD starts or less neuroplasticity is being debated (Engelender and Isacson [@CR45]).", "\n\nNHP models of PD used for CBT evaluation {#Sec3}\n========================================\n\nCommon marmoset, vervet and macaque monkeys are the most used NHP species for CBT studies. ", "To the best of our knowledge, only neurotoxin-induced NHP models of PD have been used as testing platforms for CBTs, mainly by the administration of 6-hydroxydopamine (6-OHDA) or 1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine (MPTP), although new models are emerging (Table [1](#Tab1){ref-type=\"table\"}).Table 1Comparison between NHP models of PD highlighting key features for evaluation of CBTs for DA cell replacementNHP PD modelPD motor symptomsNigrostriatal DA depletionTypical LIDsSynucleinopathyComments6-OHDAYesYesNoNot reportedUnilateral model. ", "Requires multiple intracerebral stereotaxic injections to induce a stable lesionMPTP systemicYesYesYesUpregulation of a-synBilateral model. ", "Needs to be individually titrated, and depending on dosing paradigm may require from one week to over a year to induce syndrome. ", "PD symptoms may spontaneously recoverMPTP systemic+agingYesYesYesUpregulation of α-syn, possible aggregatesSame as MPTP systemic plus animals may require more intensive care post intoxicationMPTP ICAYesYesNoNot reportedUnilateral model. ", "Requires surgical set up; Induces a stable and reproducible lesionMPTP ICA+agingYesYesNoNot reportedSame as MPTP ICA except MPTP dose needs to be 2/3 of younger animals. ", "Monkeys may require more intensive care post intoxicationAged NHPsYesYesNoTranslocation of α-synNot enough dopamine deficit to be responsive to [l]{.smallcaps}-DOPA treatmentViral vector delivery of α-synYes (Common marmosets)YesUnknownOverexpression of α-syn, aggregatesUnilateral model. ", "Requires intracerebral stereotaxic injectionsLewy body extractsNoYesUnknownOverexpression of α-syn, aggregatesUnilateral model. ", "Requires intracerebral stereotaxic injectionsα-syn TransgenicMild (Cynomolgus 1.5--2 years old)UnknownUnknownUnknownBilateral model*6-OHDA* 6 hydroxydopamine, *α-syn* alpha-synuclein, *MPTP* 1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine, *ICA* intracarotid artery, *[l]{.smallcaps}* *-DOPA* L-3,4-dihydroxyphenylalanine, *LIDs* [l]{.smallcaps}-DOPA induced dyskinesias\n\n6-OHDA (Senoh and Witkop [@CR129]) is preferentially used in common marmoset monkeys (Ungerstedt [@CR152]; Blandini et al. [", "@CR15]; Eslamboli et al. [", "@CR47]). ", "As 6-OHDA does not cross the blood--brain barrier (BBB), it is stereotaxically injected directly into the right or left striatum, medial forebrain bundle or substantia nigra, inducing unilateral motor impairments. ", "The neurotoxin is selectively taken up by catecholaminergic neurons through monoamine transporters, and induces sympathetic neuronal loss by increasing the production of reactive oxygen species (ROS), and disrupting energy metabolism and neuronal activity (Blum et al. [", "@CR16]).", "\n\nMPTP (Davis et al. [", "@CR33]; Langston et al. [", "@CR83]) is most commonly administered to macaque monkeys, although it is also used in other old and new world NHP species (Fox and Brotchie [@CR52]; Emborg [@CR39]). ", "Unlike 6-OHDA, MPTP crosses the BBB and is administered to NHPs via s.c., ", "i.m., ", "i.v. ", "or intracarotid artery (ICA) injection. ", "Severity of PD symptoms depends on route, dose and frequency of administration; dosing regimen varies between species (Emborg [@CR39]). ", "In the brain, MPTP is transformed into its toxic metabolite MPP^+^ by monoamine oxidase-B (MAO-B). ", "MPP^+^ is then selectively taken up by the DA transporter into dopaminergic neurons where it disrupts normal mitochondrial respiration by acting as a mitochondrial complex I inhibitor, leading to oxidative stress and apoptosis (Przedborski and Vila [@CR110]).", "\n\nAlthough it can be argued that neurotoxic models are missing critical components of PD, such as \"true\" LB formation (Dauer and Przedborski [@CR32]), several reasons justify their use to test CBTs as DA replacement/network restoration strategies: (1) neurotoxin-induced models present PD-like motor symptoms and dopaminergic nigrostriatal loss, (2) they are well characterized, and (3) they can be induced in a protracted period of time, which facilitates their use as testing platforms.", "\n\nWe agree with the concept that an ideal NHP model of PD should mimic the disease by replicating its etiology, which should induce the pathological mechanisms that give rise to the typical symptoms. ", "Yet, although great progress has been made towards understanding the complexity of PD and possible pathways of neurodegeneration, its cause is still unknown. ", "Neurotoxin-based models attempt to capitalize on the knowledge that exposure to environmental toxins is a PD risk factor. ", "In that regard, both neurotoxins trigger mechanisms associated with neurodegeneration in PD. ", "In addition to disrupting energy metabolism and increasing oxidative stress, dosing with 6-OHDA and MPTP induces inflammatory responses (Rodriguez-Pallares et al. [", "@CR122]; Joglar et al. [", "@CR66]; McGeer et al. [", "@CR97]). ", "MPTP dosing has also been shown to trigger an increase in α-syn expression and, in some cases, its accumulation (Halliday et al. [", "@CR64]; Kowall et al. [", "@CR81]; McCormack et al. [", "@CR95]).", "\n\nOther identified PD risk factors include aging and genetic mutations which are exploited for modeling purposes (Emborg [@CR39]). ", "Studies in aged NHPs with or without MPTP have been reported. ", "Intact aged animals present subtle PD-like symptoms (e.g.: slowness and overall decreased amount of movement) and nigrostriatal dopaminergic loss, with individual variations. ", "As the symptoms in aged monkeys do not respond to DA replacement therapies, the animals are not useful models to assess cell replacement strategies. ", "In contrast, aged animals intoxicated with MPTP present the typical motor and pathological syndrome observed after neurotoxin, plus the background aged condition associated with PD, and could be useful testing platforms, yet CBT studies in models combining aging and neurotoxins have not been reported.", "\n\nGenetic-like NHP PD models have been induced by intracerebral injection of viral vectors encoding for mutated α-syn or administration of LB extracts \\[see review (Vermilyea and Emborg [@CR153])\\]. ", "Adeno-associated viral (AAV) vector-induced nigral overexpression of human α-syn wild type and A53T has been shown to induce PD-like motor symptoms, significant nigral dopaminergic cell loss, and α-syn aggregates in common marmoset monkeys (Eslamboli et al. [", "@CR48]; Kirik et al. [", "@CR74]). ", "AAV and lentiviral vectors encoding for A53T α-syn have also been used in cynomolgus (Koprich et al. [", "@CR76]) and rhesus (Yang et al. [", "@CR163]) monkeys. ", "In both studies, A53T α-syn induced nigral cell loss and α-syn accumulation and aggregation; behavioral changes were not reported. ", "A combination of AAV-induced overexpression of Parkin and A53T α-syn was reported in cynomolgus; although the animals had decreased striatal dopaminergic markers and α-syn accumulation and phosphorylation, no motor symptoms were observed. ", "It should be noted that in vervet monkeys nigral injection of AAV expressing a short hairpin RNA (shRNA) to knock down α-syn induced a region-specific decrease in TH-positive nigral cell number and striatal innervation compared to animals that received scrambled shRNA; no behavioral changes were reported (Collier et al. [", "@CR29]). ", "Intracerebral inoculation of α-syn fibrils has been extensively used in rodents, but not yet in monkeys (e.g.: (Luk et al. [", "@CR90]; Paumier et al. [", "@CR106])). ", "Instead cadaveric LB extracts have been injected into the striatum or nigra of cynomolgus monkeys with or without previous MPTP, (Recasens et al. [", "@CR113]). ", "The extracts induced some decreases in striatal and nigral dopaminergic markers and increases in α-syn expression, yet PD motor symptoms were not detected. ", "It should be noted that with exception of the AAV α-syn studies in marmosets, all the other reports in genetic-like models were performed in a few subjects; further characterization and validation of the models are needed before they are used as testing platforms for CBTs. ", "Transgenic NHP models induced by oocyte injection of lentiviral vectors encoding for mutations of interest are emerging; transgenic rhesus monkeys overexpressing mutant A53T α-syn have been reported (Niu et al. [", "@CR104]). ", "The authors also reported some behavioral deficits after 1.5--2.5 years of age. ", "New technologies such as CRISPR/Cas9 genomic editing present an opportunity to create NHP models with PD associated mutations expressed at physiological levels that may help clarify the disease onset process, including motor and non-motor symptoms (Gaj et al. [", "@CR56]). ", "Timely evaluation of CBTs in these novel NHP models may provide clues to understand α-syn-related problems during clinical translation and define the role of CBTs in global therapies.", "\n\nCBTs for DA cell replacement: from rodents and monkeys to PD patients {#Sec4}\n=====================================================================\n\nFetal mesencephalon and autologous adrenal medullary tissues were the first sources used to demonstrate the feasibility for DA cell replacement. ", "In 1979, Bjorklund and Stenevi (Bjorklund and Stenevi [@CR12]) reported positive effects of fetal grafts in circling behavior of 6-OHDA-treated rats, and in 1981, Freed et al. (", "Freed et al. [", "@CR53]) showed adrenal graft survival in a similar model. ", "In 1984, Morihisa and colleagues (Morihisa et al. [", "@CR101]) transplanted adrenal medullary tissue and fetal mesencephalic cells into MPTP-treated parkinsonian rhesus monkeys and showed some survival of adrenal, but not fetal, cells. ", "In follow-up experiments, poor survival of transplanted adrenal tissue was reported (Morihisa et al. [", "@CR102]) yet as the PD signs ameliorated, researchers hypothesized that the intense host-derived dopaminergic sprouting in the transplanted area was responsible for the behavioral improvements. ", "Improved graft survival was observed when methods were applied to minimize the endothelial components (Schueler et al. [", "@CR128]). ", "With regard to fetal mesencephalic grafts, between 1986 and 1994, 15 NHP reports were published (Bakay et al. [", "@CR5]; Collier et al. [", "@CR26]; Redmond et al. [", "@CR115], [@CR116]; Sladek et al. [", "@CR132]; Annett et al. [", "@CR2], [@CR3]; Bankiewicz et al. [", "@CR6]; Collier et al. [", "@CR27]; Dubach et al. [", "@CR36]; Elsworth et al. [", "@CR37]; Fine et al. [", "@CR50]; Sladek et al. [", "@CR133]; Taylor et al. [", "@CR146], [@CR147]) demonstrating the feasibility of the approach, as well as different degrees of antiparkinsonian effects. ", "It should be noted that these studies were performed in a limited number of NHPs per treatment group, in most cases the area of the brain targeted was the caudate nucleus, the animals did not receive immunosuppression and the effect of antiparkinsonian medication was not evaluated (Fitzpatrick et al. [", "@CR51]).", "\n\nBoth CBT approaches were rapidly translated to humans. ", "In [@CR4], Backlund et al. ", "reported two cases of patients receiving adrenal medulla grafts resulting in mild effects, and in 1987, Madrazo and colleagues showed the first dramatic improvement of PD symptoms in two patients (Madrazo et al. [", "@CR92]). ", "Following these promising results, several similar case studies were undertaken, with different, less favorable outcomes \\[see review: (Redmond [@CR114])\\]. ", "Goetz et al. ", "reported the results of a multi-center study of 19 patients in 1989 (Goetz et al. [", "@CR57]). ", "The grafted patients showed minimal temporary antiparkinsonian effects, described as decreased mean severity of \"off\" time (time when the positive effects of pharmacological treatment wear off) as assessed by both the Activities of Daily Living subscale of the Unified Parkinson's Disease Rating Scale (UPDRS) and the Schwab and England scale. ", "Yet, the patients' antiparkinsonian medications could not be decreased and postoperative morbidity was considerable, due to the double surgery (abdominal and brain) required to harvest the adrenal medulla and then transplant the cells. ", "Postmortem results revealed poor cell survival and localized host regional neuronal sprouting, similar to the results in the NHP experiments.", "\n\nWith regard to fetal mesencephalon grafting, after multiple case reports in PD patients \\[see (Freed et al. [", "@CR54]; Redmond et al. [", "@CR117])\\] the National Institute of Health (NIH) funded two prospective, double blind, randomized control trials aiming to assess the efficacy and safety of transplanting fetal mesencephalic tissue to treat PD. ", "The Freed et al. (", "Freed et al. [", "@CR55]) trial consisted of 40 PD patients: 20 received bilateral post-commissural putaminal grafts of ventral mesencephalic fetal neurons, and 20 had a burr hole drilled into their skull as a sham procedure. ", "Immunosuppression was not administered. ", "The fetal cells were cultured for 1 week prior to transplantation. ", "The primary endpoint was patient self-reports on activities of daily living (recorded at home for 12 months). ", "The Olanow et al. ", "trial ([@CR105]) consisted of 34 PD patients: 11 received bilateral post-commissural putaminal grafts of ventral mesencephalic fetal neurons from one donor fetus, 12 from four donor fetuses, and 11 received bilateral sham procedures. ", "Oral cyclosporine (CsA) immunosuppression was administered to all patients starting 2 weeks prior to surgery and continued for 6 months after grafting. ", "The primary endpoint was the UPDRS motor subscore. ", "Both trials did not show significant differences between treatment groups, although further analysis revealed that patients younger than 60 years old or with less severe PD at baseline had improvements in their parkinsonian signs. ", "Positron Emission Tomography (PET) imaging demonstrated increased \\[^18^F\\]fluorodopa uptake in the grafted areas suggesting graft survival that was later confirmed by postmortem examinations.", "\n\nAn unexpected outcome for both trials was the occurrence of what was then named \"runaway\" dyskinesias, also known as graft-induced dyskinesias (GIDs). ", "Unlike typical PD dyskinesias that are induced by chronic long-term [l]{.smallcaps}-DOPA administration \\[see (Bezard et al. [", "@CR11])\\], these uncontrolled abnormal movements were not associated with antiparkinsonian medication and did not ameliorate with reduction or cessation of [l]{.smallcaps}-DOPA treatment. ", "GIDs were observed in a quarter of the grafted patients in the Freed et al. ", "and half the Olanow et al. ", "trials.", "\n\nSeveral issues may have contributed to the onset of GIDs. ", "As patients that received the fetal mesencephalic grafts presented focal points of increased PET signal (Ma et al. [", "@CR91]), it was proposed that the grafts produced \"hot spot\" regions in which DA was being excessively released. ", "To answer the question of whether there was an association between GIDs and focal versus widespread distribution of cell grafts in the striatum (Maries et al. [", "@CR94]), 6-OHDA-treated rats received either a focal striatal transplant of 200,000 cells, or the same number of cells across six different striatal locations. ", "The experiment showed that GIDs were only present in the focal graft recipients. ", "It also brought to light that the number of functional cells within a focal site might be of equal concern. ", "Another proposed contributing factor for GIDs was that the chronic [l]{.smallcaps}-DOPA treatment preceding the transplantation may have \"primed\" the patients to have dyskinesias. ", "In 6-OHDA-intoxicated rats, [l]{.smallcaps}-DOPA pre-treatment affected graft integration and functionality, although GIDs were present with or without [l]{.smallcaps}-DOPA pre-treatment (Steece-Collier et al. [", "@CR139]). ", "A study in 24 systemic MPTP-treated vervet monkeys (*Chlorocebus sabaeus*) assessed whether priming the animals to develop [l]{.smallcaps}-DOPA-induced dyskinesias (LIDs), and then injecting allogeneic fetal dopaminergic cells in a \"spread\" or \"hotspot\" pattern would affect the development of GIDs (Kordower et al. [", "@CR80]). ", "The investigators did not detect GIDs in any of the monkeys, regardless of cell distribution or condition. ", "Possible species differences could be at play as well as methods of cell preparation. ", "A critical limitation of this report is that the animals' MPTP-induced parkinsonism spontaneously improved overtime. ", "All the monkeys presented similar mild PD scores with no differences between grafted and control subjects. ", "Thus, the graft's antiparkinsonian efficacy or graft potential to produce true functional hotspots could not be evaluated.", "\n\nInflammation has also been proposed to promote the onset of GIDs through aberrant synapse formation between grafted neurons and host striatal medium spiny neurons \\[MSNs; (Soderstrom et al. [", "@CR135])\\]. ", "This theory was derived from the observation of GIDs in patients who did not receive immunosuppression following fetal engraftment or those that had been recently taken off an immunosuppressive regimen. ", "Interestingly, the evaluation of spine density maintenance in MSNs through administration of slow-release pellets of the calcium channel antagonist nimodipine has led to intriguing evidence about the importance of preserving MSNs for reducing LIDs and transiently reducing GIDs (Soderstrom et al. [", "@CR136]). ", "Patient and rodent studies have also highlighted that serotonergic and noradrenergic neurotransmission either by host innervation or by mixed-cell grafts may contribute to GIDs (Shin et al. [", "@CR130]). ", "As the cause of GIDs is being unraveled, new strategies aiming to prevent or decrease GIDs are being evaluated.", "\n\nAnother potential complication for CBTs was uncovered in 2008, when follow-up postmortem analysis of PD patients treated a decade earlier with fetal grafts found LB-like pathology in the grafted cells (Kordower et al. [", "@CR78]; Li et al. [", "@CR87]). ", "Although it is unclear how much the aggregates affected the functionality of the grafts, the implication that PD could be transferred to the grafted cells reverberated throughout the field (see \"[Parkinson's disease: then and now](#Sec2){ref-type=\"sec\"}\"). ", "A preliminary confirmation of α-syn being transferred into grafted cells was obtained in rats injected with adeno-associated viral vector serotype 6 encoding for human α-syn into the striatum after fetal cell engraftment (Kordower et al. [", "@CR79]).", "\n\nNew clinical trials utilizing fetal mesencephalic tissue for DA cell replacement are currently ongoing in Canada, Europe (Transeuro), South Korea and Mexico (listed in: clinical trials.gov and isrctn.com). ", "The investigators leading these trials aim to optimize the approach by taking advantage of the knowledge gained from the clinical and preclinical studies described above.", "\n\nAdditional clinical trials using CBTs for DA cell replacement in PD {#Sec5}\n===================================================================\n\nA number of alternative sources for dopaminergic neurons, including mesencephalic fetal porcine cells, cadaveric human retinal-pigmented epithelium (hRPE) and autologous sympathetic and carotid ganglia, have been investigated to avoid the surgical complication of using autologous adrenal medullary tissue and to overcome the practical and ethical limitations of using human fetal cells for large-scale clinical applications. ", "NHP preclinical studies were only performed for hRPE. ", "The DA-producing cells were attached to gel microcarriers (Spheramine®) and placed into the striatum of parkinsonian monkeys. ", "The grafts improved motor function and postmortem analysis showed cell survival and a mild inflammatory reaction (Watts et al. [", "@CR159]). ", "Controlled clinical trials for hRPE as well as all the sources listed above failed to show a significant antiparkinsonian effect (Fitzpatrick et al. [", "@CR51]).", "\n\n*Ex vivo* gene therapy for PD {#Sec6}\n=============================\n\n*Ex vivo* gene therapy originated as a method to engineer cells for delivery of therapeutic molecules (Raymon et al. [", "@CR112]). ", "The cells are typically genetically modified using viral vectors. ", "The main advantage of this method compared to direct intracerebral viral vector delivery (in vivo gene therapy) is that the transfected cells can be monitored before transplantation for the effects of viral infection and the production of a foreign protein. ", "Safety, genetically engineered, \"tricks\" have been developed to curtail unwanted side effects, such as regulatable promoters to stop gene expression and kill-switches to terminate the cells and completely stop product synthesis.", "\n\n*Ex vivo* gene therapy strategies have been developed for DA replacement and trophic factor delivery with variable results. ", "MPTP-intoxicated rhesus monkeys received autologous fibroblasts genetically engineered to produce tyrosine hydroxylase \\[the rate-limiting enzyme for DA production; e.g., (Bankiewicz et al. [", "@CR7])\\] with minimal antiparkinsonian effects. ", "Glial cell line-derived neurotrophic factor (GDNF) producing C2C12 cells were encapsulated and transplanted into MPTP-treated baboons (Kishima et al. [", "@CR75]) inducing only temporary improvements of their parkinsonian symptoms, probably due to the low survival of encapsulated cells which led to a low and variable protein production. ", "New cell sources for ex vivo gene therapy (see below) are emerging. ", "For example, human neuroprogenitor cells (hNPCs) have been shown to survive and locally produce GDNF in the brain of parkinsonian immunosuppressed rats and monkeys (Behrstock et al. [", "@CR9]; Emborg et al. [", "@CR40]). ", "Although the clinical translation for PD has not been pursued (probably due to the poor results of GDNF protein delivery trials; (Richardson et al. [", "@CR121])), a clinical trial for amyotrophic lateral sclerosis is currently ongoing (<http://www.clinicaltrials.gov>).", "\n\nStem cells as sources of cell lines {#Sec7}\n===================================\n\nBiological research breakthroughs and development of new technologies have paved the way for the identification of stem cells (SCs) as new cell sources for regenerative medicine approaches. ", "SCs are defined by their self-renewal capacity and their potential for becoming a different cell type with a specialized function. ", "These properties allow researchers to create cell lines to be repurposed for in vitro studies and transplantation.", "\n\nhNPCs are typically obtained from the germinal layer of a fetal brain. ", "Although they are not pluripotent SCs (they are already fated toward a brain cell phenotype), in vitro hNPCs can be expanded and differentiated to a DA phenotype (Sanchez-Pernaute et al. [", "@CR124]). ", "In MPTP-treated monkeys, hNPCs induced improvements of PD signs and postmortem analysis has shown their survival and migration. ", "Their cell progeny seemed to differentiate in vivo into DA-like neurons and glial phenotypes and overall have a \"homeostatic\" impact (Bjugstad et al. [", "@CR13], [@CR14]; Redmond et al. [", "@CR118]). ", "It should be noted that NPCs have been found in the adult human and NHP brains (Eriksson et al. [", "@CR46]; Gould et al. [", "@CR60]). ", "These findings, plus earlier studies in rodents, refuted the idea that the adult brain is incapable of forming new neurons (Altman and Das [@CR1]; Buzanska et al. [", "@CR19]; Kaplan and Hinds [@CR69]; Kempermann et al. [", "@CR71]). ", "The option of recruiting resident hNPCs for brain repair has tantalizing possibilities but its utility has not yet been proven (Rakic [@CR111]). ", "Interestingly, one study grafted autologous adult cortical cells (cultured for a couple of weeks) into the caudate of MPTP-intoxicated vervet monkeys. ", "Grafted cells were found 4 months post-surgery and their presence was associated with increased local levels of GDNF (Brunet et al. [", "@CR18]).", "\n\nBone marrow, umbilical cord blood and adult adipose-derived stromal tissue (Fallahi-Sichani et al. [", "@CR49]; Levy et al. [", "@CR86]; McCoy et al. [", "@CR96]) have been proposed as SC sources as they can be obtained for autologous grafts. ", "Although NHP studies with these cells have not been performed, evaluation in rodents suggests that they produce trophic factors that could be beneficial for PD. ", "Several clinical trials are currently ongoing to test the safety and efficacy after administration of mesenchymal stem cells through intravenous, intracarotid or intranasal routes (clinicaltrials.gov). ", "Intravenous infusion of adipose-derived stromal vascular fraction cells is also being investigated for safety and efficacy, as well as for benefits to the quality of daily living in PD patients.", "\n\nEmbryonic stem cells (ESCs) obtained from blastocysts are pluripotent SCs, thus they have the potential to become any cell of the body. ", "In 1995, Thomson et al. (", "Thomson et al. [", "@CR148]) reported the isolation of ESCs from rhesus monkeys. ", "Common marmoset ESCs were isolated in 1996 (Thomson et al. [", "@CR149]), followed in 1998 by human ESCs \\[hESC; (Thomson et al. [", "@CR150])\\]. ", "Differentiation of ESCs into a DA phenotype was first accomplished in mice (Lee et al. [", "@CR84]), followed a few years later in human (Perrier et al. [", "@CR107]; Yan et al. [", "@CR162]) and rhesus (Takagi et al. [", "@CR142]). ", "Since then, investigators have been looking for more efficient ways to produce mesencephalic DA neurons, as well as to solve the problems of intracerebral graft survival and other challenges identified by the fetal tissue trials. ", "The ethical dilemma of the cells' origin triggered the 2001 restriction of USA federal funding for hESC research to studies performed on authorized cell lines, limiting the chances for creating new ones. ", "The 8-year ban on federal funding for ESC research was lifted on March 9, 2009.", "\n\nParthenogenesis, somatic cell nuclear transfer and altered somatic cell nuclear transfer have been proposed as alternative sources of pluripotent SCs (Kastenberg and Odorico [@CR70]). ", "In NHPs, parthenogenesis has been used to generate an SC line from cynomolgus monkeys (cyno-1). ", "Parthenogenesis is an asexual form of reproduction; although mammalian eggs cannot fully develop, they can provide blastocysts to generate parthenogenesis-derived ESCs. ", "Using the cyno-1 cell line, investigators differentiated the cells into dopaminergic neurons (Perrier et al. [", "@CR107]). ", "These cells were successfully transplanted into 6-OHDA-treated rats and one MPTP-treated cynomolgus monkey (Sanchez-Pernaute et al. [", "@CR126]). ", "hNPCs generated from parthenogenetic hSCs (hpNPCs) have been evaluated in rats and MPTP-lesioned vervet monkeys immunosuppressed with a combination of cyclosporine, prednisone and azathioprine (Gonzalez et al. [", "@CR58], [@CR59]). ", "The investigators first demonstrated graft survival and increased DA striatal levels 3 months post-surgery in two NHPs (Gonzalez et al. [", "@CR58]). ", "Antiparkinsonian efficacy of hpNPCs was then evaluated in 18 monkeys (Gonzalez et al. [", "@CR59]). ", "The animals were matched according to disability and assigned to one of 3 treatment groups: vehicle (*n* = 6), low (*n* = 6) and high (*n* = 6) cell dosing. ", "Cells were inoculated in the caudate, putamen and substantia nigra. ", "Twelve months post-grafting, the low dose animals showed significant behavioral improvements compared to their baseline condition; however, no significant differences between vehicle and dosing groups were detected. ", "A clinical trial to assess the safety and tolerability of hpNPCs in PD is currently ongoing in Australia (clinical trials.gov). ", "Three patient groups (each to receive different cell number doses) of four patients each who have moderate to severe PD will receive between 30 and 70 million cells injected into the striatum and substantia nigra.", "\n\nThe development of induced pluripotent stem cells (iPSCs) from somatic cells (Takahashi et al. [", "@CR143], [@CR144]; Yu et al. [", "@CR164]) has further facilitated the production of additional cell lines for regenerative medicine and disease modeling purposes. ", "iPSCs represent a major advancement towards personalized medicine as cells can be generated from the prospective recipient. ", "iPSCs have been generated from macaque (Deleidi et al. [", "@CR34]; Liu et al. [", "@CR88]) and marmoset (Tomioka et al. [", "@CR151]; Wiedemann et al. [", "@CR160]; Wu et al. [", "@CR161]; Vermilyea et al. [", "@CR154]) monkeys. ", "The derivation of iPSCs has been modified in recent years using expression plasmids that do not integrate into the host DNA, which increases their safety for clinical translation.", "\n\nNHP studies assessing SC-derived DA cell replacement strategies {#Sec8}\n===============================================================\n\nOver the past decade, several NHP studies have analyzed the potential use of SCs from different sources and at different stages of differentiation for DA cell replacement (Table [2](#Tab2){ref-type=\"table\"}).Table 2Peer-reviewed publications in NHP models of PD evaluating SCs as sources for dopaminergic cell replacementReferencesHost speciesCell species; graft typeCell typeCell labelingTransplant locationModel*n*Immunosup.[l]{.smallcaps}-DOPABehavioral testPET imagingDurationTakagi et al. ([", "@CR142])Cynomolgus (*M. fascicularis*)Cynomolgus; allograftESC-derived DAergic progenitorsBrdUBilateral putamen; 3 tracts per side, each with 4 depositsMPTP i.v. (", "0.4 mg/kg; twice weekly for 7 weeks)6CsA 10 mg/kgNoneClinical rating\\[^18^F\\]DOPA14 weeksCynomolgus (*M. fascicularis*)N/ASham-operatedN/AN/AMPTP i.v. (", "0.4 mg/kg; twice weekly for 7 weeks)4CsA 10 mg/kgNoneClinical rating\\[^18^F\\]DOPA14 weeksKikuchi et al. ([", "@CR72])Cynomolgus (*M. fascicularis*)Human; xenograftiPSC-derived DAergic progenitorsNoneBilateral putamen (d28 to right, d42 to left); 6 tracts per side, each with 4 depositsMPTP i.v. (", "0.4 mg/kg; twice weekly until symptoms persisted)1FK506 0.05 mg/kgNoneClinical rating, spontaneous movements, Gross Movements, Raisin pick-up test\\[^18^F\\]DOPA, \\[^11^C\\]DTBZ, \\[^11^C\\]PE2I, \\[^18^F\\]FLT6 monthsDaadi et al. ([", "@CR31])Green monkey (*C. sabaeus*)Human; xenograftESC-derived DAergic progenitorsGFPCaudate and SNMPTP i.m. (", "2.25 mg/kg cumulative dose; administered over 5-day period)4CsA 5 mg/kg/day Prednisone 2 mg/kg tapering to 0.6 mg/kg/day Azathioprine 5 mg/kg/day reduced to 1 mg/kg/dayNoneNoneNone2 monthsKriks et al. ([", "@CR82])Rhesus (*M. mulatta*)Human; xenograftESC-derived DAergic progenitorsGFPBilateral posterior caudate, pre-commissural putamen and overlying white matter (GFP to one side, unmarked to other); 3 tracts per sideMPTP ICA (3 mg) followed by weekly i.v. ", "administration (dose n.r.)2CsA 30 mg/kg tapered to 15 mg/kgNoneNoneNone1 monthEmborg et al. ([", "@CR43])Rhesus (*M. mulatta*)Human; xenograftESC-derived DAergic progenitorsGFPUnilateral (ipsi-MPTP) rostral, medial and caudal caudate and putamen, and SN; 7 tracts totalMPTP ICA (3 mg)3CsA 40--50 mg/kgNoneNoneNone3 monthsEmborg et al. ([", "@CR42])Rhesus (*M. mulatta*)Rhesus; autograftiPSC-derived DAergic progenitorsGFPUnilateral (ipsi-MPTP) precommisural and commissural caudate, pre-commisural, commissural and postcommisural putamen, and SN; 6 tracts totalMPTP ICA (3 mg)3NoneNoneNoneNone6 monthsWakeman et al. ([", "@CR157])Green monkey (*C. sabaeus*)Human; xenograftESC-derived DAergic progenitorsGFPCaudate and SNMPTP i.m. (", "2 mg/kg cumulative dose; administered over 5-day period)2Azathioprine, CsA and prednisoloneNoneNoneNone6 weeksHallett et al. ([", "@CR63])Cynomolgus (*M. fascicul ris*)Cynomolgus; autograftiPSC-derived DAergic progenitors (Cooper et al. [", "@CR30] protocol)NoneUnilateral postcommissural putamen; 4 tracts totalMPTP i.v. (", "0.15--0.3 mg/kg) every 1--2 weeks1NoneNoneClinical rating, activity monitoring, FMS\\[^11^C\\]CFT2 yearsCynomolgus (*M. fascicularis*)Cynomolgus; autograftiPSC-derived DAergic progenitors (Sundberg et al. [", "@CR141] protocol)NoneUnilateral postcommissural putamen; 4 tracts totalMPTP i.v. (", "0.15--0.3 mg/kg) every 1--2 weeks2NoneNoneClinical rating, activity monitoring, FMS\\[^11^C\\]CFT2 yearsCynomolgus (*M. fascicularis*)Cynomolgus; allograftESC-derived DAergic progenitors (Sanchez-Pernaute et al. [", "@CR125] protocol)NoneUnilateral putamenMPTP i.v. (", "0.15--0.3 mg/kg) every 1--2 weeks3NoneNoneClinical rating, activity monitoring, FMS\\[^11^C\\]CFT1 yearCynomolgus (*M. fascicularis*)N/AN/AN/AN/AMPTP i.v. (", "0.15--0.3 mg/kg) every 1--2 weeks4NoneNoneClinical rating, activity monitoring, FMS\\[^11^C\\]CFT2 yearsWang et al. ([", "@CR158])Cynomolgus (*M. fascicularis*)Cynomolgus; autograftiPSC-derived DAergic progenitorsGFP and Feridex IVUnilateral (ipsi-MPTP) rostral, intermediate and caudal caudate and putamen, and SN; 7 tracts totalMPTP ICA (3 mg)1NoneNoneClinical ratingNone6 monthsCynomolgus (*M. fascicularis*)N/AVehicleN/AUnilateral (ipsi-MPTP) rostral, intermediate and caudal caudate and putamen, and SN; 7 tracts totalMPTP ICA (3 mg)3NoneNoneClinical ratingNone6 months*Immunosup* immunosuppression, *PET* positron emission tomography, *ESC* embryonic stem cell, *iPSC* induced pluripotent stem cell, *DAergic* dopaminergic, *BrdU* 5-Bromo-2′-deoxyuriding, *MPTP* 1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine, *L-DOPA* L-3,4-dihydroxyphenylalanine, *ipsi* ipsilateral, *i.v.* ", "intravenous, *ICA* intracarotid artery, *mg* milligram, *kg* kilogram, *CsA* Cyclosporine A, *GFP* green fluorescent protein, *n.r.* ", "not reported, *N/A* not applicable, *FMS* fine motor skills, *SN* substantia nigra, *\\[18 F\\]DOPA* 6-\\[18 F\\]fluoro-[l]{.smallcaps}-3,4-dihydroxyphenylalanineresentatio, *\\[11 C\\]DTBZ* \\[11 C\\]dihydrotetrabenazine, *\\[11 C\\]PE2I* (*E*)-*N*-(3-iodoprop-2-enyl)-2β-carbo\\[11 C\\]methoxy-3β-(4-methylphenyl)nortropane, *\\[18 F\\]FLT* 3′-deoxy-3′3\\[18 F\\]fluorothymidine\n\nTakagi et al. ", "investigated monkey ESC-derived neural progenitors capable of producing dopaminergic neurons for transplantation into an NHP model of PD (Takagi et al. [", "@CR142]). ", "ESCs from a cynomolgus monkey (*Macaca fascicularis*) were differentiated on stromal cells with the addition of FGF2 and FGF20, and labeled in vitro with BrdU for postmortem identification. ", "The ESC-derived dopaminergic progenitor cells were then transplanted into systemic MPTP-treated cynomolgus monkeys. ", "Beginning at 10 weeks post-brain surgery, the neurological parkinsonian scores of animals receiving grafts (*n* = 6) decreased significantly (*p* \\< 0.05) compared with sham controls (*n* = 4) and were associated with a significant increase in striatal \\[^18^F\\]fluorodopa uptake observed by in vivo PET. ", "Postmortem analysis at 14 weeks post-grafting verified survival of BrdU/TH colabeled neurons. ", "Neither mitosis (identified by Ki67-immunoreactivity) nor tumor formation was observed in animals that received ESC-derived neuronal transplants.", "\n\nAiming for human translation, Kriks et al. ", "differentiated floorplate-derived dopaminergic neurons from human ESCs (hESCs), labeled half of the cells with GFP and then transplanted the labeled cells into one side of the striatum, and unlabeled cells to the other, of two systemic MPTP-treated rhesus monkeys immunosuppressed by CsA administration (Kriks et al. [", "@CR82]). ", "At one-month post-transplantation, grafted cells were observed in the posterior caudate and pre-commissural putamen as well as Iba1+cells, suggesting immunoreaction by the host. ", "Daadi et al. [", "@CR31] and Wakeman et al. ", "2014 tested hESC-derived DAergic neurons expressing GFP in the caudate and nigra of MPTP-intoxicated vervet monkeys immunosuppressed with cyclosporine, prednisone and azathioprine (Daadi et al. [", "@CR31]; Wakeman et al. [", "@CR157]). ", "The 4 monkeys treated by Daadi et al. ", "showed a few TH-positive grafted cells, extending neurite outgrowth and expressing synaptic markers 2 months post-surgery; cell counts of grafts and immunological response were not reported. ", "In the Wakeman et al. ", "study, the two monkeys presented co-expression of GFP and βIII-tubulin positive cells but not TH, dopamine transporter (DAT) or other markers of midbrain floorplate differentiation 6 weeks after grafting, suggesting de-differentiation; evaluation of inflammatory markers was not reported. ", "Emborg et al. ", "also studied hESC-derived DAergic neurons; however, the brain evaluations were performed 3 months after grafting. ", "The cells were genetically engineered to express GFP and grafted in the striatum and nigra of three rhesus monkeys that received MPTP by carotid artery injection. ", "The three animals were immunosuppressed by daily oral dosing of cyclosporine that was started 48 h prior to grafting (Emborg et al. [", "@CR43]). ", "Postmortem analysis at 3 months revealed graft survival in only one of the three monkeys. ", "The graft was infiltrated with GFAP, CD68 and CD45 immunoreactive cells, suggesting ongoing immune reaction despite immunosuppression. ", "These results further demonstrated that immunological issues are a major concern for xenografts and that allogeneic or autologous transplants may render better graft survival and integration.", "\n\nGrafts of human iPSC (hiPSC)-derived dopaminergic neurons have also been attempted. ", "In 2011, Kikuchi et al. ", "reported their evaluation of grafting into one FK506 immunosuppressed MPTP-treated monkey (Kikuchi et al. [", "@CR72]). ", "The hiPSCs were differentiated into DAergic neural progenitors in feeder-free conditions but were not labeled. ", "Day 28 (d28) and d42 neurospheres were transplanted into the right and left putamen, respectively. ", "Graft size and function was evaluated at 1, 3 and 6 months by MRI and at 6 months by PET using the radioligands 6-\\[^18^F\\]fluoro-[l]{.smallcaps}-3,4-dihydroxyphenylalanine (\\[^18^F\\]DOPA), \\[^11^C\\]dihydrotetrabenazine (\\[^11^C\\]DTBZ), (*E*)-*N*-(3-iodoprop-2-enyl)-2β-carbo\\[^11^C\\]methoxy-3β-(4-methylphenyl)nortropane (\\[^11^C\\]PE2I), to assess for DA synthesis, vesicle transport, and DA reuptake, and with 3′-deoxy-3′3\\[^18^F\\]fluorothymidine (\\[^18^F\\]FLT) to visualize cell proliferation. ", "Interestingly, MRI showed increase in graft size on the side of grafted d28 neurospheres compared to d42. ", "In general, PET did not identify any meaningful graft-related uptake, with exception of increased binding of (\\[^11^C\\]PE2I) in the d42-grafted putamen, suggesting cell differentiation. ", "Neurological evaluation throughout the study showed no behavioral recovery. ", "Postmortem analysis 6 months after transplantation revealed graft survival; d42 spheres produced higher amounts of TH+cells compared with the d28 spheres, while also maintaining some progenitor populations, which explains the observed intracerebral graft growth; immunological response was not reported.", "\n\nA major advantage of iPSC technology is that patient-specific cells can be generated for grafting, which minimizes host immune reaction and avoids immunosuppression. ", "In 2013, Emborg et al. ", "reported their findings in three rhesus monkeys that received an intracarotid artery injection of MPTP, followed 6 months later with autologous iPSC-derived neuroprogenitors into the striatum and nigra, without immunosuppression \\[Fig.", " [2](#Fig2){ref-type=\"fig\"}; (Emborg et al. [", "@CR42])\\]. ", "For identification, the cells were genetically modified to express GFP. ", "Six months post-surgery, brain analysis showed abundant GFP-positive neuron-like cells, which integrated with the host brain and expressed TH. ", "Most importantly, infiltration of host immune cells observed by CD3 and CD8 reactivity was minimal while HLA-DR and GFAP were mild, similar to MPTP-induced inflammation. ", "Although neurological scores were not reported, it was mentioned that the animals' PD motor signs did not improve; the lack of recovery was probably due to low numbers of DAergic neurons grafted. ", "Shortly after, Morizane et al. ", "compared autologous and allogeneic transplantation of iPSC-derived neural cells in intact cynomolgus monkeys (Morizane et al. [", "@CR103]). ", "As expected, the allogeneic transplants elicited a marked immune response observed, with in vivo PET, as increased uptake of \\[^11^C\\]PK11195 compared to the autografts, further emphasizing the benefit of self-derived cells for translational applications.", "Fig.", " 2An example of a grafted autologous rhesus IPSC-derived dopaminergic neuron labeled with GFP (*green*) and immunostained against TH (*red*); DAPI (*blue*). *", "Scale bar* 50 μm\n\nIn 2015, Hallett et al. ", "reported that the differentiation protocols used to generate iPSC-derived DAergic neurons could be a factor for survival and functional integration of grafted cells (Hallett et al. [", "@CR63]). ", "After ten cynomolgus monkeys were rendered stably parkinsonian through systemic MPTP administration, the animals received iPSC- or ESC-derived DAergic grafts differentiated following three different protocols: (Cooper et al. [", "@CR30]) (*n* = 1), (Sundberg et al. [", "@CR141]) (*n* = 2), and a modified (Sanchez-Pernaute et al. [", "@CR125]) (*n* = 3; for ESCs); no transplanted animals (*n* = 4) were used as controls. ", "The grafts derived from the Sanchez--Pernaute differentiation protocol did not survive and were thus separately analyzed as the non-surviving transplant group, compared with the Cooper- and Sundberg-derived grafts. ", "Only the animal that received cells using the Cooper differentiation protocol presented functional recovery of daytime activity and movement analysis. ", "The animal recovered to pre-MPTP levels for global activity, and improved in fine motor skills after 2 years. ", "\\[^11^C\\]CFT PET imaging corroborated graft function with increased uptake around the transplant site. ", "The lack of functional recovery and survival of the Sundberg and Sanchez-Pernaute grafts provide evidence that DAergic differentiation patterning may be critical for functional integration.", "\n\nWang et al. ", "also assessed the feasibility of autologous iPSC-derived DAergic neuron grafts to one MPTP-treated cynomolgus monkey (Wang et al. [", "@CR158]). ", "Throughout the 6-month survival period, only between 6--8, and 22--24 weeks, the transplant monkey appeared to have an improved clinical rating compared with the control monkeys (*n* = 3). ", "Postmortem analysis in the transplanted monkey showed graft survival and TH immunoreactivity.", "\n\nAn examination of these SC-based studies highlights that, similar to the fetal tissue reports in NHPs, they were mainly feasibility/safety experiments, performed in a few animals (with exception of Takagi et al. [", "@CR142]) and focusing on assessing cell survival, cell proliferation/tumor formation and whether the grafted cells integrated and showed a DA phenotype. ", "Some antiparkinsonian effects were described. ", "Considering the ongoing improvements on SC research, this approach shows responsible use of the NHP resource and also underscores that the results should be kept in perspective with the limitations of the experimental design and outcome measures utilized.", "\n\nNigral vs. striatal targets {#Sec9}\n===========================\n\nFor DA cell replacement, the field strives to recreate and purify A9 DA nigral cells, yet in patients, the cells have been mainly transplanted in the postcommisural putamen \\[see review: (Redmond [@CR114])\\] with a few exceptions in which the fetal nigral cells were placed in the nigra and putamen \\[e.g.: (", "Mendez et al. [", "@CR99]); Fig.", " [3](#Fig3){ref-type=\"fig\"}\\]. ", "Putaminal targeting aims to provide DA in the area where needed, while nigral grafting is proposed to restore the nigrostriatal pathway, including the regulation of grafted cell activity and restoring the DA tone in the substantia nigra pars reticulata.", "Fig.", " 3Graphical depiction of a rhesus monkey brain hemisphere in intact and PD-like conditions and with striatal and nigral grafts. ", "The main area of projection of nigral dopaminergic neurons is the striatum, which is composed by the caudate nucleus and putamen. ", "In PD and PD-like conditions (e.g.: after MPTP intoxication), nigral dopaminergic neurons die; thus, striatal dopamine (DA) is decreased. ", "Grafting of DA-producing cells into the striatum is envisioned as a way to ensure DA availability in the area of projection. ", "Nigral grafts are proposed as a way to reconstruct the nigrostriatal pathway. *", "Cd* caudate, *ic* internal capsule, *Put* Putamen, *ac* anterior commissure, *cc* corpus callosum, *Ctx* cortex\n\nTheoretically, the nigral location is a most optimal method for brain repair, yet an obstacle for its application is the long distance to be covered by the axons of cells inoculated in the nigra to reach their striatal targets. ", "The successful reconstruction of the nigrostriatal pathway requires time for axonal extension, axonal guidance and ultimately recognition and synaptic connection with targets. ", "In rodents, the feasibility and advantages of the approach have been reported using fetal cells (Mendez et al. [", "@CR98]) and ESCs (Grealish et al. [", "@CR61]), observing positive behavioral effects as soon as 6 weeks post-fetal grafting and 18 weeks with ESC-derived DA cells, with the latter requiring more time to mature and integrate in the host. ", "In NHPs and humans, the nigrostriatal distance is greater, which means that the time needed after grafting to observe behavioral benefits may also increase; therefore, multisite grafting has been preferred.", "\n\nThe feasibility of grafting fetal midbrain cells in the nigra (Collier et al. [", "@CR28]) or in combination with fetal striatal grafts for axonal guidance (Sladek et al. [", "@CR134]) has been demonstrated in MPTP-treated vervet monkeys; in both studies axonal extension through the nigrostriatal pathway and some modest caudal putamen reinnervation was observed at 6 months; although follow-up studies of co-grafting fetal nigra and striatum had limited effect (Redmond et al. [", "@CR119]). ", "Localized delivery of trophic factors has been proposed as a method to stimulate and guide axonal growth. ", "Striatal GDNF overexpression via AAV2 vectors was reported to enhance the survival and outgrowth of fetal dopamine neurons implanted in the striatum (Elsworth et al. [", "@CR38]). ", "A follow-up comparison between MPTP-intoxicated monkeys treated with AAV5 GDNF in the caudate nucleus or solid fetal midbrain grafts in the caudate and putamen or a combination of AAV-GDNF and fetal grafts or buffered saline solution did not reveal greater functional improvement in the AAV-GDNF and fetal grafts monkeys during the 8 months of observation (Redmond et al. [", "@CR120]). ", "AAV2-induced overexpression of GDNF in the caudate supported outgrowth of fetal midbrain grafts maximally observed at 22 months post-grafting (Redmond et al. [", "@CR119]), as well as stimulated neurite extension and dopaminergic differentiation of hNC grafts, both placed in the nigra of MPTP monkeys (Wakeman et al. [", "@CR156]). ", "The studies suggest that reconstruction of the nigrostriatal pathway can be achieved and that research on methods aiming to promote and guide axonal growth is needed.", "\n\nThe future of CBTs and NHP studies {#Sec10}\n==================================\n\nNHP studies have paved the way for the first clinical trials using CBTs for PD. ", "Although the number of monkey experiments and/or total number of animals was a fraction compared to rodent studies, they provided key evidence that CBTs could be used to treat PD. ", "NHP experiments have facilitated the optimization of cell collection and preparation methods, cell viability, as well as identify potential brain targets. ", "Today, old approaches are being re-evaluated and optimized and new ones are being developed; some are being translated into the clinic (Barker [@CR8]). ", "NHP research can provide an even more crucial insight into CBTs, but as a limited resource, prioritization of issues to be evaluated will be critical. ", "How cells are prepared and stored affect engraftment, the methods of delivery, the choice of targets and related timelines of recovery are basic questions that still need to be solved and tested in NHPs to improve CBT outcome. ", "The response of the host to the candidate CBT encompasses a different set of topics related to efficacy, safety (e.g.: prevention of GIDs), immunomodulation and inflammatory response and propagation of α-syn. ", "Each of these issues can also benefit from careful NHP research.", "\n\nSeveral groups are invested in the development of the optimal cell for transplantation, working on generating cell lines of \"superdonors\" with immunological compatibility and improving the methods of cryoprotection to facilitate clinical application, as creating a cell line per individual to be treated would be a daunting task. ", "While the idea of testing in NHPs the same cell lines to be grafted to humans is compelling, current data presented in this review highlight the limitations of the xenograft approach with current immunosuppression paradigms. ", "Thus, a more parsimonious approach would be to produce equivalent cells derived from the same species, at least until the NHP equivalent of severe combined immune deficiency (SCID) mice becomes available (Sato et al. [", "@CR127]).", "\n\nDue to the brain volume and complexity of NHPs, questions regarding intracerebral targets and graft distribution will benefit from NHP studies and noninvasive imaging approaches. ", "For example, great strides have been made towards the development and improvement of intraoperative MRI (iMRI) methods (Mislow et al. [", "@CR100]). ", "Silvestrini et al. (", "Silvestrini et al. [", "@CR131]) used real-time iMRI (RT-iMRI) for cell transplantation into a swine and cadaveric human head as a concept for application in the human brain. ", "The platform technology utilizes a radially branched deployment strategy to access multi-directional deposit sites along a single cannula insertion tract. ", "Our group modified an RT-iMRI delivery system that has a pivot point base, a clear silica cannula and inline pressure monitoring system (Emborg et al. [", "@CR41], [@CR44]) for the in vivo delivery of DAergic progenitor cell spheres into the putamen of a rhesus monkey \\[Fig.", " [4](#Fig4){ref-type=\"fig\"}; (Vermilyea et al. [", "@CR155])\\]. ", "Malloy et al. ([", "@CR93]) used an MRI-compatible delivery system for MRI monitoring of the distribution of cells pre-labeled with a contrast agent into a baboon basal ganglia. ", "These new MRI-based imaging methods can increase the safety and accuracy of the grafting procedures and facilitate the evaluation of different targeting sites. ", "In that regard, imaging technologies, such as diffusion tensor imaging (Hall et al. [", "@CR62]), can be applied to preclinical studies to evaluate circuit reconstruction, complementary to traditional PET imaging with DA-related radioligands. ", "Application of imaging methods overtime to monitor graft integration and function would be critical to reduce the number of NHPs groups needed per experiment to understand recovery timelines.", "Fig.", " 4Real-time intraoperative MRI for intracerebral delivery of stem cells provides feedback of cannula placement and infusion site: **a** *oblique*, **b** *coronal*, **c** *sagittal* and **d** *horizontal planes*\n\nAt this time, GIDs cannot be prevented or cured; NHP safety studies on methods aiming to modulate grafted cell activity are needed. ", "Optogenetics is a technique that uses light to control cells that have been genetically modified to express light-sensitive ion channels (Lerner et al. [", "@CR85]). ", "Optogenetic approaches have been applied to control electrophysiological and neurochemical properties of grafted SC-derived DA neurons in rodent models (Chen et al. [", "@CR23]; Steinbeck et al. [", "@CR140]), yet its clinical translation is not recommended as the patients would require the intracerebral placement of a probe to locally deliver the appropriate light wavelength. ", "Compared to optogenetics, the designer receptors exclusively activated by designer drugs (DREADDs) technology use noninvasive methods to exert its effects, as it depends on designer drugs to modulate the activity of cells that are genetically modified to express the corresponding receptor. ", "DREADDs have been used to modulate human PSC-derived DA neurons (Chen et al. [", "@CR24]). ", "There has been a lot of discussion regarding CBT safety centered on defining an adequate cell number and volume for intracerebral delivery. ", "The use of DREADDs or an equivalent technology would allow more flexibility as, theoretically, cells can be further excited if behavioral recovery is not observed, or inhibited if serious GIDs occur. ", "Basically, it would provide a strategy for patient-specific graft modulation that could be monitored by a combination of clinical and PET imaging tools.", "\n\nHow can the value of the next generation of NHP studies be maximized for the successful clinical translation of CBTs for PD? ", "We propose that first and foremost, the investigators should use NHP PD models that match the question at hand (Table [1](#Tab1){ref-type=\"table\"}). ", "As we previously discussed, until now all monkey studies of CBTs for PD have been performed in neurotoxic models. ", "Many basic questions regarding feasibility, efficacy, and safety can be answered in these models. ", "Yet, the same way that only old animals can provide insight on grafting in the aging brain, studies in models of synucleinopathies are needed to assess the impact of protein aggregation in graft efficacy. ", "In that regard, the field is anxiously waiting for the validation of current genetic models and the availability of transgenic and genomic edited PD monkeys. ", "Second, a well-designed feasibility study in a few monkeys presents an opportunity to learn if an approach is worth pursuing, with the caution that improvement of PD symptoms could be due to individual variability or spontaneous recovery. ", "Demonstration of efficacy requires properly powered NHP experiments with blind group assignment and evaluation. ", "Third, the surgical method of cell delivery is critical to ensuring appropriate targets, optimized cell survival and distribution and should not be minimized. ", "Fourth, the animals should be assessed with multiple outcome measures with clinical impact to maximize the knowledge to be extracted from the study. ", "Behavioral evaluations complemented by in vivo imaging methods can facilitate postsurgical follow-up, especially for CBT studies taken several years to be completed. ", "Postmortem analysis should include unbiased cell counts and evaluation of host immunological response in order to inform about the safety, efficacy and limitations of the approach. ", "Fifth, grafted cells should be pre-labeled to facilitate identification from host cells. ", "Images of grafts should be in low and high magnification to assess the extent of cell survival and interaction with host. ", "Sixth, there are no bad results, but poorly designed experiments. ", "Publication of positive as well as negative experimental results in NHPs should be encouraged for the overall evolution of the field.", "\n\nTo conclude, NHP PD research plays a small but critical role in CBT clinical translation. ", "Ultimately, investigators should remember that whether CBTs for PD work will depend on the benefits outweighing the patients' risk and that NHPs have unique characteristics to help identify and solve these problems.", "\n\nThis research was supported by NIH grants R24 OD019803, R01NS076352, P51OD011106-53S2 (Wisconsin National Primate Research Center, University of Wisconsin-Madison), NINDS T32-Neuroscience Training Program (S.C.V.), Departments of Radiology and Medical Physics at UW-Madison, WARF Accelerator Program, and funding from the UW-Madison Vice Chancellor for Research and Graduate Education.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.009615384615384616, 0.023255813953488372, 0.019801980198019802, 0, 0.014598540145985401, 0.1111111111111111, 0.014563106796116505, 0.01818181818181818, 0.006535947712418301, 0, 0.005263157894736842, 0.006993006993006993, 0, 0.005952380952380952, 0, 0.0072992700729927005, 0.004405286343612335, 0.1111111111111111, 0, 0.00510204081632653, 0, 0, 0.008928571428571428, 0.007936507936507936, 0.009433962264150943, 0.01486988847583643, 0.1111111111111111, 0.006896551724137931, 0.1, 0, 0, 0.08, 0.024242424242424242, 0.1111111111111111, 0.045454545454545456, 0.10344827586206896, 0.02702702702702703, 0.03225806451612903, 0.004672897196261682, 0.1, 0.011627906976744186, 0.1, 0.005494505494505495, 0.04, 0.1111111111111111, 0, 0.075, 0.016042780748663103, 0.08163265306122448, 0.1111111111111111, 0, 0.009345794392523364, 0.1111111111111111, 0.009174311926605505, 0.021739130434782608, 0.009074410163339383, 0, 0, 0, 0.011764705882352941, 0, 0, 0.012170385395537525, 0.07692307692307693, 0.1111111111111111, 0, 0.003703703703703704, 0.125, 0.045454545454545456, 0.04, 0.03614457831325301, 0.04054054054054054, 0, 0.2, 0.025, 0.014705882352941176, 0.010101010101010102, 0.003861003861003861, 0.004098360655737705, 0.005, 0, 0, 0, 0.006097560975609756, 0.041666666666666664, 0.08695652173913043, 0.1111111111111111, 0, 0.08695652173913043, 0.038461538461538464, 0.125, 0.015267175572519083, 0, 0, 0, 0.006622516556291391, 0.01507537688442211, 0.003861003861003861, 0.09090909090909091, 0.1111111111111111, 0.0196078431372549, 0.06060606060606061, 0.05555555555555555, 0.007633587786259542, 0.008368200836820083, 0.009287925696594427, 0.1111111111111111, 0, 0.08333333333333333, 0.09090909090909091, 0.013605442176870748, 0.1, 0, 0.0036496350364963502, 0.0047169811320754715, 0.1, 0, 0.011494252873563218, 0.1111111111111111, 0.00546448087431694, 0, 0.011299435028248588, 0, 0.017241379310344827, 0.0392156862745098, 0.01098901098901099, 0.00980392156862745, 0.005154639175257732, 0, 0.1, 0.009009009009009009, 0.08695652173913043, 0.08333333333333333, 0.08823529411764706, 0.08333333333333333, 0.08823529411764706, 0.08695652173913043, 0.043478260869565216, 0.04, 0.047619047619047616, 0.08695652173913043, 0.08333333333333333, 0.016129032258064516, 0, 0.125, 0.017543859649122806, 0.037037037037037035, 0.004694835680751174, 0.1111111111111111, 0.012738853503184714, 0, 0, 0.1111111111111111, 0.005813953488372093, 0, 0.0070921985815602835, 0, 0.08333333333333333, 0.014150943396226415, 0.05555555555555555, 0, 0.004807692307692308, 0, 0, 0, 0, 0.004273504273504274, 0, 0, 0, 0.010416666666666666, 0, 0, 0.005319148936170213, 0.013157894736842105, 0, 0, 0, 0.017241379310344827, 0.008849557522123894, 0, 0.00625, 0, 0, 0, 0.004739336492890996, 0.1, 0.0031545741324921135, 0.1111111111111111, 0, 0, 0, 0, 0, 0.0051813471502590676, 0.08333333333333333, 0, 0, 0.1, 0.005235602094240838, 0.1, 0, 0, 0.10526315789473684, 0.1111111111111111, 0, 0, 0.125, 0.004807692307692308, 0, 0, 0.018518518518518517, 0.007936507936507936, 0, 0.1, 0, 0.125, 0.005291005291005291, 0.1, 0, 0, 0, 0, 0.005235602094240838, 0.020833333333333332, 0.013245033112582781, 0.005434782608695652, 0, 0.00546448087431694, 0.09090909090909091, 0.1111111111111111, 0, 0.017094017094017096, 0, 0, 0, 0, 0.005319148936170213, 0.1, 0.0078125, 0, 0.09090909090909091, 0.1, 0.020618556701030927, 0.045454545454545456, 0.1111111111111111, 0.018292682926829267, 0.07547169811320754, 0.1111111111111111, 0.013793103448275862, 0, 0, 0.125, 0, 0.09523809523809523, 0.045454545454545456, 0.022727272727272728, 0.006211180124223602, 0, 0, 0, 0.04, 0.0625, 0.01639344262295082, 0.016666666666666666, 0.030303030303030304, 0.08333333333333333, 0.011363636363636364, 0.03225806451612903, 0.047619047619047616, 0.05555555555555555, 0.1, 0, 0, 0, 0.016129032258064516, 0.020833333333333332, 0.005917159763313609, 0.00909090909090909, 0.1, 0.015037593984962405, 0.1, 0.009478672985781991, 0.1111111111111111, 0.0072992700729927005, 0.1111111111111111, 0.011494252873563218, 0.1111111111111111, 0, 0, 0, 0, 0, 0.01020408163265306, 0.1, 0.007692307692307693, 0, 0, 0.1, 0.02631578947368421, 0.07407407407407407, 0.1, 0.07407407407407407, 0.05555555555555555, 0, 0.007874015748031496, 0.012269938650306749, 0.006578947368421052, 0, 0.010752688172043012, 0.01327433628318584, 0.027522935779816515, 0, 0.011857707509881422, 0, 0.02092050209205021, 0.018050541516245487, 0.02727272727272727, 0.007874015748031496, 0.028037383177570093, 0.024691358024691357, 0.004901960784313725, 0.024390243902439025, 0.009478672985781991, 0.02, 0, 0, 0.015810276679841896, 0, 0.005263157894736842, 0.013071895424836602, 0.1, 0, 0.008620689655172414, 0.003278688524590164, 0.010638297872340425, 0, 0.022222222222222223, 0.012578616352201259, 0.1111111111111111, 0, 0.07142857142857142, 0.07692307692307693, 0.020512820512820513, 0.08333333333333333, 0.1, 0.02631578947368421, 0.005235602094240838, 0.045454545454545456, 0.006920415224913495, 0.07142857142857142, 0.008771929824561403, 0, 0.007518796992481203, 0.1111111111111111, 0, 0.007407407407407408, 0, 0, 0, 0.018691588785046728, 0.1111111111111111, 0.009009009009009009, 0, 0.002012072434607646, 0, 0.005376344086021506, 0, 0, 0, 0.043478260869565216, 0.00425531914893617, 0.022222222222222223, 0.09090909090909091, 0.013888888888888888, 0.013986013986013986, 0.01764705882352941, 0.00510204081632653, 0, 0, 0.1, 0.00784313725490196, 0.25, 0.012658227848101266, 0.023809523809523808, 0.01098901098901099, 0.1111111111111111, 0.008849557522123894, 0.02702702702702703, 0.03278688524590164, 0.011494252873563218, 0, 0.006622516556291391, 0, 0.009708737864077669, 0.010582010582010581, 0, 0.015267175572519083, 0.1, 0, 0.010752688172043012, 0.013953488372093023, 0.006535947712418301, 0, 0.00784313725490196, 0.0026666666666666666, 0, 0.15384615384615385, 0, 0, 0.25, 0, 0, 0.007246376811594203, 0, 0, 0.002932551319648094, 0, 0, 0.02857142857142857, 0.005025125628140704, 0.0048543689320388345, 0.012345679012345678, 0.011235955056179775, 0.006578947368421052, 0.1, 0, 0, 0.1111111111111111, 0.005361930294906166, 0.1, 0.006289308176100629, 0.02564102564102564, 0.1, 0, 0.018518518518518517, 0, 0.0064516129032258064, 0.006578947368421052, 0.006622516556291391, 0.00881057268722467, 0.004784688995215311, 0.015625, 0, 0, 0.013761467889908258, 0.1111111111111111, 0.011049723756906077, 0, 0.1, 0, 0, 0.006622516556291391, 0, 0.013157894736842105, 0.025210084033613446, 0.020833333333333332, 0.08333333333333333, 0, 0.006329113924050633, 0, 0, 0.012987012987012988, 0.005235602094240838, 0.25, 0.0029069767441860465, 0.006535947712418301, 0.1111111111111111, 0.012048192771084338, 0.07692307692307693, 0.005555555555555556, 0, 0.038461538461538464, 0.1111111111111111, 0.007142857142857143, 0, 0.006578947368421052, 0.007874015748031496, 0.006711409395973154, 0, 0, 0, 0, 0, 0.008928571428571428, 0, 0, 0.006024096385542169, 0, 0, 0, 0, 0.007518796992481203, 0.021739130434782608, 0.004651162790697674, 0.023255813953488372, 0 ]
0.029158
5
[ "ticket swap Manchester Apollo 2015\n\nHi, I bought 4 tickets for concert on the Thurs 5th Feb at Manchester Apollo. ", "Two of the tickets were Xmas presents but they were unable to go on this date. ", "Its a long shot but I am hoping to swap the 4 tickets for tickets on the Sunday 8th which is the only day we are all able to go. ", "Thanks" ]
{ "pile_set_name": "Pile-CC" }
[ 0.017543859649122806, 0.012658227848101266, 0, 0 ]
0.007551
5
[ "Q:\n\nregular expression php to parse a file\n\nI want to parse a file, and store it into an Array in PHP. ", "However, there are some rules which should the observed:\n\n(p=\"value\") should be ignored, but the \"value\" should be preserved.", "\n- should be ignored.", "\nwhitespaces should be ignored. ", "\nsplit by \\t and \\n.", "\n\nA sample string is :\nNPD4196-2a_5_0\nGeldanamycin - 0.166516 (p = 0.0068) Alamethicin - 0.158302 (p = 0.0206) 4-Hydroxytamoxifen - 0.1429 (p = 0.0183) Abietic acid - 0.133045 (p = 0.0203) Caspofungin - 0.130885 (p = 0.0432) Extract 00-303C - 0.12858 (p = 0.0356) U73122 - 0.113274 (p = 0.0482) Radicicol - 0.10213 (p = 0.0356) Calcium ionophore - 0.096183 (p = 0.0262)\n\nSo, the goal is to produce a data structure like:\nArray('NPD4196-2a_5_0' => Array(Array( 0 => 'Geldanamycin', 1 => '0.166516', 2 => '0.0068'), Array( ... ));\n\nI have this written so far ... \nwhile(($line = fgets($fp)) !", "== false){\n $args = preg_split( '/[\\t\\n (=) ]+/', $line, -1, PREG_SPLIT_NO_EMPTY );\n if(count($args)){\n print_r($args);\n print \"\\n\";\n }\n}\n\nWhat am I missing in other to accomplish my goal?", "\nThanks\n\nA:\n\nThis seems to work for one key-value pair (assuming NPD4196-2a_5_0 is the key in your example, and the second line is the value).", "\n<?", "php\n\n$fp = fopen('foo.txt', 'r');\n$regex = '/(\\w*)\\s*-\\s*([\\d\\.]+)\\s*\\(p\\s*=\\s*([\\d\\.]+)\\)/';\n$id = \"NO ID\";\n$result = Array();\n\nwhile(($line = fgets($fp)) !", "== false){\n if (!", "preg_match($regex, $line)) {\n $id = chop($line);\n } else {\n $all = Array();\n\n while (preg_match($regex, $line, $matches, PREG_OFFSET_CAPTURE)) {\n $last = end($matches);\n $line = substr($line, $last[1] + strlen($last[0]) + 1);\n\n $strings = Array();\n\n for ($i = 1; $i < 4; $i++) {\n array_push($strings, $matches[$i][0]);\n }\n\n array_push($all, $strings);\n }\n\n $result[$id] = $all;\n }\n}\n\nprint_r($result);\n?", ">\n\n(That is a slightly edited version of David B's regex.)", "\nIf the line doesn't match that long RegEx pattern, it will store the line as the ID. ", " Otherwise, it will match the RegEx, then chop off the matching part. ", " Each iteration of the inner while loop will match one entry. ", " Since I am grabbing the indices of the matches, the for loop is used to only add the strings to the result.", "\nThis prints: \nArray\n(\n [NPD4196-2a_5_0] => Array\n (\n [0] => Array\n (\n [0] => Geldanamycin\n [1] => 0.166516\n [2] => 0.0068\n )\n\n [1] => Array\n (\n [0] => Alamethicin\n [1] => 0.158302\n [2] => 0.0206\n )\n\n [2] => Array\n (\n [0] => Hydroxytamoxifen\n [1] => 0.1429\n [2] => 0.0183\n )\n...\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.019417475728155338, 0, 0, 0, 0.05, 0.0064516129032258064, 0.004366812227074236, 0, 0, 0.006369426751592357, 0, 0.0038095238095238095, 0.017241379310344827, 0.011627906976744186, 0, 0, 0, 0 ]
0.006627
5
[ "Q:\n\nhow do I check if a particular Layout is included in android from JAVA?", "\n\nI would like to do the following:\nsetContentView(R.layout.product_details_editpage);\n\nI want to check if product_details_editpage layout has another layout included in it?", "\nIf so, for the included layout components, I would like to reuse the handlers from elsewhere in the App.", "\nIf the included layout has a button such as Logout, then I dont want to re-implement that logout button handler again in th eactivity that sets calls setContentView() above.", "\nWhat is the easiest way /best way to do this?", "\n\nA:\n\nagreed with above comments.", "\naccept te discussion is closed.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.02666666666666667, 0, 0, 0.005747126436781609, 0, 0, 0, 0 ]
0.004052
5
[ "Ken Bradley: Scientists tell us that we have very little time in which to prevent the worst effects of global warming. ", "Submitted photo\n\nKen Bradley is research and policy center director at Environment Minnesota, which describes itself as a \"statewide, citizen-based environmental advocacy organization.\"", "\n\nGlobal warming is already beginning to affect life here in Minnesota, across America, and around the world. ", "The first half of 2012 was the hottest January through July on record for the lower 48 states. ", "Much of the country is suffering through prolonged drought. ", "Species are on the move. ", "Glaciers are melting while many political leaders are continuing to deny the indisputable science.", "\n\nRoughly one month after the extreme downpour that hit Duluth and other communities in Minnesota, causing $100 million in damages, Environment Minnesota Research and Policy Center released a new report that documents one more way global warming is affecting our lives — an increase in the frequency and intensity of extreme rainstorms.", "\n\nOur report, entitled \"When It Rains, It Pours,\" found that storms with heavy rain are happening 30 percent more frequently in Minnesota now than they were 65 years ago. ", "In other words, an extreme rainstorm that used to hit Minnesota once every 12 months on average now occurs every 9.2 months on average.", "\n\nScientists tell us that the trend toward heavier rainstorms is clearly linked to global warming, as warming increases evaporation and enables the air to hold more water, providing more fuel for these heavier rainstorms.", "\n\nThe implications of more frequent extreme rainstorms are serious. ", "In the 20th century, flooding caused more property damage and loss of life in the United States than any other type of natural disaster. ", "More frequent downpours will leave Minnesota even more vulnerable to dangerous flooding in years to come.", "\n\nWith more than half the United States suffering through one of the worst droughts in history, it's important to understand that bigger rainstorms happening more often does not mean more water will be available for us. ", "Scientists actually predict that as global warming intensifies, longer periods of relative dryness will mark the periods between extreme rainstorms, increasing the risk of drought. ", "This is because the same increased evaporation that leads to more water in the air also leads to drier soils.", "\n\nIn our report, we examined trends in the frequency of large rain and snow events across Minnesota and the United States, using data from weather stations nationwide and a methodology originally developed by scientists at the National Climatic Data Center and the Illinois State Water Survey.", "\n\nWe looked at daily rainfall and snowfall records from 1948 to 2011, identified the largest storms at each weather station, and analyzed when those storms occurred and how much precipitation fell with each.", "\n\nAnother key finding of our report is that the biggest rainstorms are getting bigger. ", "The amount of precipitation released by the largest annual storms in Minnesota increased by 12 percent from 1948 to 2011.", "\n\nWhile scientists predict that the trend toward more storms with extreme precipitation will only intensify as a result of global warming, there are actions we can take to minimize the danger.", "\n\nScientists tell us that we have very little time in which to prevent the worst effects of global warming — and a great deal of work to do. ", "The good news is that the pollution reductions called for by scientists are achievable, and we already have started putting some of the most important pollution-reduction strategies to work.", "\n\nAt the federal level, the Obama administration has proposed carbon-pollution and fuel-efficiency standards for new cars and trucks through 2025, as well as carbon-pollution standards for new power plants. ", "Vehicles and power plants are the two largest sources of carbon pollution, so getting these proposed standards finalized and on the books this year is critical to tackling global warming.", "\n\nWhile these are important steps, we need to do much more at the state, local and federal levels if we expect future generations not to judge us as neglectful, delinquent stewards of our nation.", "\n\nNow is the time for us to come together to solve this challenging problem and embrace solutions that will leave our planet better for generations to come." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.008403361344537815, 0.010810810810810811, 0, 0, 0, 0, 0, 0.005952380952380952, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.006825938566552901, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.001143
5
[ "1993–94 Maltese Premier League\n\nStatistics of Maltese Premier League in season 1993/1994.", "\n\nOverview\nIt was performed in 10 teams, and Hibernians F.C. won the championship.", "\n\nLeague standings\n\nReferences\nMalta - List of final tables (RSSSF)\n\nCategory:Maltese Premier League seasons\nMalta\nCategory:1993–94 in Maltese football" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0, 0.012195121951219513, 0.013245033112582781 ]
0.00848
5
[ "[Description and role of bacteriological techniques in the management of lung infections].", "\nAcute pneumonias occur in a variety of clinical settings and accurate identification of bacterial causes is extremely important. ", "No microbiological tool is either 100 % sensitive or 100 % specific, and despite investigations, aetiology remains unanswered in more than 30 % of pneumonia. ", "No sample may be necessary for patients treated as outpatients, non invasive respiratory specimens are preferred in hospitalised individuals (community or healthcare associated), while invasive specimens are used as second line for community acquired pneumonia (CAP) in intensive care, and in the first line where pneumonia occurs in immunosuppressed patients. ", "Bacterial cultures have an important place, if the sample is taken before the introduction of antibiotic therapy. ", "Some contexts may justify the use of blood cultures, testing for urinary antigens or serology. ", "PCR is already becoming available as a daily service but the short-term future probably belongs to molecular multiplex panels capable of detecting many microorganisms within hours, especially in severe CAP resuscitation and in pneumonia in the immunosuppressed. ", "High-throughput sequencing nucleotide techniques will soon revolutionize microbiological diagnosis in respiratory medicine, as in other areas of infectious diseases." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0.002770083102493075, 0, 0, 0.007633587786259542, 0 ]
0.0013
5
[ "The clinical, social and financial burden of Autism Spectrum Disorders (ASD) is staggering. ", "They are the most prevalent of the developmental disorders and their incidence is rising. ", "However, the ASD phenotype variability is large, and ASD symptoms can manifest over a range of ages and to different degrees. ", "In part for these reasons, the ASD clinical diagnosis is challenging and often is not made until 3-5 years of age. ", "Thus, there remains an unmet need for a valid and reliable endophenotype which would facilitate ASD diagnosis early in life, enable efficient study of ASD risk factors, and eventually serve as a useful biomarker to inform the development of effective therapies and assess treatment response in future clinical trials. ", "The overarching goal of this proposal is to explore te utility of transcranial magnetic stimulation (TMS) measures of brain plasticity as a novel neurophysiologic endophenotype in high- and low-functioning adults and children with ASD. ", "Our work to date demonstrates the potential utility of these measures in higher-functioning adults with ASD, and pilot data support the feasibility and safety of applying the same measures to children and lower functioning individuals in whom the value of such an endophenotype would be particularly high. ", "We thus propose to apply single-pulse TMS to evaluate the modulation in corticospinal reactivity induced by a specific repetitive TMS protocol known as theta burst stimulation (TBS). ", "The comparison of the motor responses induced by single-pulse TMS before and following TBS is a unique noninvasive measure of brain plasticity in humans, and we have found that it shows a reliable abnormality in high-functioning adult individuals with ASD. ", "Our hypothesis is that the alteration of TBS-induced modulation of TMS responses is a common neuropathophysiologic trait that is reliably linked to the ASD phenotype, and that will not be limited to high functioning adults but be also valid in children and low-functioning individuals. ", "W thus anticipate that data from the proposed studies will address an important need for a rapid, noninvasive, reliable and safe endophenotype available to patients with ASD across ages and level of function." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0.010869565217391304, 0, 0.007936507936507936, 0.008695652173913044, 0, 0.00847457627118644, 0.0032679738562091504, 0.01092896174863388, 0.007782101167315175, 0.006993006993006993, 0 ]
0.005904
5
[ "Monday, January 12, 2009\n\nThe human mind tends to default into duality. ", "We tend to divide things into categories of good or bad, right or wrong, and ultimately, us or them. ", "It’s easiest to see the faults of others, though our continued growth asks us to identify the faults within ourselves.", "\n\nThere is plenty of judgment within the Yoga community. ", "One teacher claims to be teaching the oldest and truest technique, while another lineage makes the same claim. ", "Without waging all-out war, there’s a lingering judgment that festers just beneath the surface in the western yoga world.", "\n\nInterestingly, there is little historical evidence to support these judgments. ", "The primary yogic texts, the Bhagavad Gita and the Yoga Sutras of Patanjali, scarcely mention the physical practices of Asana and Pranayama. ", "It wasn’t until much later that texts such as the Hatha Yoga Pradipika described the physical practices. ", "Even within these relatively modern texts, there’s insufficient information to assert whether a technique is right or wrong. ", "Surprisingly, the physical practices of yoga are scantily documented until recently.", "\n\nBecause Yoga (as a spiritual path) has existed for so long, and most Westerners associate yogic postures as the essence of Yoga, the assumption that the asanas have existed since time immemorial is either directly promoted, or at least not actively discouraged. ", "The teacher offering the most authentic, most ancient or truest approach to Yoga has a distinct marketplace advantage over the teacher offering the possibly-quite-old or fairly-recent interpretation of Yoga. ", "Interestingly, many of today’s most popular approaches to Yoga occupy the latter category, despite their claims to the contrary.", "\n\nWe all want to do the right thing, and to follow the path that’s most likely to work. ", "It’s human nature, and not such a bad motivation. ", "Unfortunately, these well-meaning motives can also cultivate less-than-yogic mindstates.", "\n\nIn Hatha Yoga, the greatest growth occurs in sticking with a path for a long time. ", "Whether you resonate with the flowing Ashtanga Vinyasa form, the BKS Iyengar precise alignment or the integration of breath and structure of Alignment Yoga, to mention just a few examples, find a form and stick with it. ", "Along the yogic path, steer clear of dogmatic judgment of other forms you may not be following at the time. ", "The concern over whether a form is right or wrong exercises an aspect of the mind that’s most distinctly contrary to the state of yoga. ", "If none of the forms can be described as right, then by default, all of the forms are right.", "\n\nIf you’re interested in learning more about Yoga, be sure to include the Bhagavad Gita and the Yoga Sutras of Patanjali in your studies. ", "If you’re new to the roots of Yoga, a good start is the excellent book by Michael Stone, The Inner Tradition of Yoga. ", "Within the pages of this book, the heart of Yoga unfolds. ", "Yes, the physical practice is an elegant and time-tested path to health and vitality, though Yoga is so much more than perfecting a technique.", "\n\nNo comments:\n\nWelcome to the Alignment Yoga blog, where you'll find yoga articles, videos and audio presentations by Scott Anderson, with an emphasis on how to avoid common mistakes we make doing this ancient practice with our Western bodies and minds." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0.017543859649122806, 0, 0, 0, 0, 0, 0, 0, 0.003787878787878788, 0.009615384615384616, 0, 0, 0, 0, 0.011764705882352941, 0.004545454545454545, 0, 0, 0, 0, 0.01694915254237288, 0, 0.007042253521126761, 0.003937007874015748 ]
0.002785
5
[ "use crate::relayer::block_proposal_process::BlockProposalProcess;\nuse crate::relayer::tests::helper::{build_chain, new_transaction};\nuse crate::Status;\nuse ckb_types::packed::{self, ProposalShortId};\nuse ckb_types::prelude::*;\n\n#[test]\nfn test_no_unknown() {\n let (relayer, always_success_out_point) = build_chain(5);\n let transaction = new_transaction(&relayer, 1, &always_success_out_point);\n\n let transactions = vec![transaction.clone()];\n\n // known tx\n {\n relayer.shared.state().mark_as_known_tx(transaction.hash());\n }\n let content = packed::BlockProposal::new_builder()\n .transactions(transactions.into_iter().map(|tx| tx.data()).pack())\n .build();\n\n let process = BlockProposalProcess::new(content.as_reader(), &relayer);\n assert_eq!(process.execute(), Status::ignored());\n}\n\n#[test]\nfn test_no_asked() {\n let (relayer, always_success_out_point) = build_chain(5);\n let transaction = new_transaction(&relayer, 1, &always_success_out_point);\n\n let transactions = vec![transaction.clone()];\n\n let content = packed::BlockProposal::new_builder()\n .transactions(transactions.into_iter().map(|tx| tx.data()).pack())\n .build();\n\n let process = BlockProposalProcess::new(content.as_reader(), &relayer);\n assert_eq!(process.execute(), Status::ignored());\n\n let known = relayer.shared.state().already_known_tx(&transaction.hash());\n assert_eq!(known, false);\n}\n\n#[test]\nfn test_ok() {\n let (relayer, always_success_out_point) = build_chain(5);\n let transaction = new_transaction(&relayer, 1, &always_success_out_point);\n let transactions = vec![transaction.clone()];\n let proposals: Vec<ProposalShortId> = transactions\n .iter()\n .map(|tx| tx.proposal_short_id())\n .collect();\n\n // Before asked proposals\n {\n relayer.shared.state().insert_inflight_proposals(proposals);\n }\n\n let content = packed::BlockProposal::new_builder()\n .transactions(transactions.into_iter().map(|tx| tx.data()).pack())\n .build();\n\n let process = BlockProposalProcess::new(content.as_reader(), &relayer);\n assert_eq!(process.execute(), Status::ok());\n\n let known = relayer.shared.state().already_known_tx(&transaction.hash());\n assert_eq!(known, true);\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0013111888111888112 ]
0.001311
5
[ "We currently Accept\n\nFirst Choice Health Network\n\nEBMS\n\nRegence/ Blue Cross Blue Shield\n\nIf you have inquiries about your insurance benefits or would like to schedule an appointment to be covered by your insurance company, please contact us with your information. ", "We will happily find out your benefits for you.", "\n\nPatients will be responsible for co-payments due at the time of service. ", "Please note, a deductible may apply before Alternative Care benefits are effective." ]
{ "pile_set_name": "Pile-CC" }
[ 0.007575757575757576, 0, 0, 0 ]
0.001894
5
[ "Greg Biffle has had a darned good summer, now can he carry momentum through the rest of the chase?", "\n\nGreg Biffle has been strong much of the season, particularly strong since mid-July. ", "Can he make a strong bid for the Sprint Cup championship? (", "Photo: Getty Images for NASCAR)\n\nBy Mike Mulhern mikemulhern.net\n\nFONTANA, Calif. Barely a week after sensing his title hopes doomed, Greg Biffle is suddenly looking pretty good in this championship chase. ", "Putting Biffle's Kansas win in some perspective: Remember Greg Biffle's 'winning' move at Daytona, back in February? ", "Yes, it was the right move....but foiled by NASCAR's newest green-white-checkered rules, which shook up the final miles of the season opener.", "\n\nThen began the long drought for Biffle and the rest of the Ford teams, as the stock car tour began digesting the reemergence of the Richard Childress teams and the up-and-down performances by the Rick Hendrick teams. ", "But now it's looking like this could well turn out to be quite a year for Biffle and crew chief Greg Erwin after all. ", "Things looked dim for the Ford bunch much of the season, winless until Biffle's breakthrough at Pocono in August. ", "But the way Jack Roush's guys ran at Kansas, well, something has certainly changed over on that side of the NASCAR garage. ", "So just how much did the championship chase tighten up at Kansas last weekend, with Biffle's win and Denny Hamlin's off-day? ", "Well, Biffle did put himself back in the hunt, rebounding from bad days at Loudon, N.H., and Dover, Del. \"But we've got a lot of work to do -- being 85 points out of the lead, and a four-time champion leading the points,\" Biffle concedes. ", "That's Jimmie Johnson, of course. ", "And Johnson won here in the spring, beating Kevin Harvick. ", "But this has been a very good track to Biffle too over the years. ", "And Biffle isn't the kind of guy to choke under championship pressure. ", "Heck, he could well become the first driver in NASCAR history to win all three major series titles if he can win this season's Sprint Cup crown. \"", "I certainly think being in any championship hunt gives you the mindset and discipline it takes to win a championship,\" Biffle says. \"", "This is my fourth appearance in the chase, and we went right down to the wire in 2005, and we were close in 2008, finishing third. ", "I feel I've got the experience.\" ", "Yet Johnson atop the points three races into the 10-race chase should be concern, naturally. ", "The year Johnson pulled that title-winning comeback with four straight chase wins is still hanging over this battlefield. ", "Biffle, though, senses Johnson is 'vulnerable.' \"", "They didn’t get off to a good start at Loudon...and everybody is vulnerable,\" Biffle says. \"", "They've had more races this year that were hit-and-miss than the team normally has. \"", "They're not clearly running away with this thing yet. ", "We're not going to throw in the towel. \"", "We're going to have to wait three or four more races before we get a clearer picture.\" ", "Still, California, Charlotte and Martinsville are the tracks ahead, and Johnson is renown for his performances at these three. \"", "Jimmie has won a lot at California...but maybe he doesn't come out of California with a win, or even a top five,\" Biffle says.", "\n\nAnother point to ponder: the Kyle Busch David Reutimann tangle at Kansas. ", "Busch brushed Reutimann early; Reutimann retaliated with a hard brush later, that damaged Busch's car. ", "Busch is one of the 12 title contenders; Reutimann is not. \"", "It doesn't matter if you're in the chase or out of the chase...or it's the end of the season, beginning of the season,\" Biffle says. \"", "It doesn't really matter. \"", "What you have to ask yourself is 'Is it worth it for me to wreck a guy to get him out of my way, to spin him out?'\" ", "Biffle said Busch's first brush wasn't \"just a racing deal.\" \"", "We saw Carl Edwards and Denny Hamlin get together and spin at Loudon -- that was a racing deal to me,\" Biffle said. \"", "It looked like Kyle (at Kansas) ran straight back into the back bumper of David and spun him out and wrecked him. \"", "It probably doesn't matter who you are – you're probably not going to get away with that in our sport today. \"", "I don't think being in the chase or out of the chase makes a difference. \"", "I have to ask myself 'Why did Kyle Busch spin out David Reutimann?' \"", "That would be where I would start.\"", "\n\nThe Roush men, across the board, were markedly impressive at Kansas. \"", "We've been getting better and better and better,\" Biffle says. \"", "I've talked a lot about the Chicago race (July) being the turning point.\" ", "Biffle had the best car at Chicago but blew the engine. \"", "It looked like we were on our way to winning that race, like we were at Kansas,\" Biffle said. \"", "Carl (his teammate) ended up finishing second in that race. \"", "Then we went to Indy and nearly won that race; we finished third. \"", "And then we went to Pocono and won. \"", "We went to Michigan (mid-August) and led the most laps. \"", "So really, our 1-1/2-mile and two-mile program has been super-strong ever since Chicago, and I feel the Fords are back on track. \"", "We still have a lot of work to do on our short-track program, and on our slower race tracks...Martinsville and Phoenix. ", "Phoenix has been a great race track for us, but the last couple times there we've been off a little; and at Richmond and Martinsville and some slower-in-the-center (of the turns) tracks, we haven’t been as good as our competition. \"", "But as far as the bigger tracks and the faster places, I think we're right in line with everybody else. \"", "We're going to get our fair share of wins now.\"", "\n\nStill, Biffle figures that untimely caution at Dover – while he was pitting under green – cost him 50 points. ", "And that still aggravates him: \"We ran seventh, eighth, ninth...and even ran top-three...and ended up getting caught by a caution flag and getting two laps down,\" Biffle says. \"", "If that wouldn't have happened to us, we would be 30 or 40 points out of the lead right now. \"", "So there is tremendous pressure to make every position count, not to make mistakes driving the race car and in the pits. \"", "I've lost one of these championships by 35 points (2005), and I hope I don't lose it again by 35 points, because I'll be thinking about that Dover race for a long time.\"", "\n\nPost new comment\n\nYour name:\n*\n\nE-mail: *\n\nThe content of this field is kept private and will not be shown publicly." ]
{ "pile_set_name": "Pile-CC" }
[ 0.01020408163265306, 0.011627906976744186, 0, 0.014563106796116505, 0.017094017094017096, 0.0070921985815602835, 0.0136986301369863, 0.01694915254237288, 0.017543859649122806, 0.016260162601626018, 0.016, 0.0041841004184100415, 0.029411764705882353, 0.03389830508474576, 0, 0.014084507042253521, 0.0136986301369863, 0, 0, 0, 0.010752688172043012, 0.00819672131147541, 0.02040816326530612, 0.010869565217391304, 0, 0, 0, 0, 0.015625, 0.023809523809523808, 0.02631578947368421, 0.038834951456310676, 0.03333333333333333, 0, 0, 0, 0.03225806451612903, 0.02564102564102564, 0.008695652173913044, 0, 0, 0.028985507246376812, 0, 0.013888888888888888, 0, 0, 0, 0.010526315789473684, 0.01639344262295082, 0.014925373134328358, 0, 0, 0.007692307692307693, 0.008333333333333333, 0, 0, 0, 0.008928571428571428, 0, 0, 0, 0, 0 ]
0.009535
5
[ "About Flushing Town Hall\n\nFlushing Town Hall is a historic wedding venue in Flushing, New York. ", "This building was built in 1862 and has provided the ideal event space for many years. ", "Couples looking to have a vintage and romantic wedding day have come to the right place. ", "You and your guests will have the opportunity to dance the night away in the venue's open-spaced ballrooms, making memories that will last a lifetime.", "\n\nFacilities and CapacityWith a variety of event spaces to choose from, you will have the option of deciding the perfect spot for your wedding ceremony and reception. ", "The Garden offers 2,000 square feet of outdoor space with tree-shaded lawns and perennial planters. ", "It is ideal for those looking to utilize an outdoor ceremony space for their big day. ", "The Theatre is the venue's biggest space, offering an open floor plan with room for many different seating arrangements, depending on the size and needs of your event. ", "It can accommodate up to 190 people comfortably, with a minimum of 128 people. ", "The Green Room is adjacent to the Flushing Town Hall Theatre and is a great space to hold your reception. ", "If you’re looking to have a more intimate gathering with your closest family and friends, the Gallery is an open space of beautiful art and can accommodate 100 people for a ceremony and 70 people for a reception. ", "There is also the option of renting all of the spaces for your event.", "\n\nServices OfferedFlushing Town Hall's event coordinators will make sure all of your wedding details are taken care of so you can relax and enjoy your special day. ", "The venue also has an exclusive list of vendors they can recommend to you if you are unsure which vendors you should go with, helping you finalize all of the details for your ceremony and reception. ", "From wedding cakes to flowers and decor, they are more than happy to help connect you to potential vendors. ", "The venue provides on-site staff to assist in the streamlining of your event, including front door security and facilities personnel to help you with anything you may need during the event. ", "The venue offers the following services:\n\nBeautiful venue and helpful and accommodating staff. ", "This venue was perfect for our big day!", "\n\nSent on 06/01/2017\n\nT\n\nTing · Married on 10/29/2016\n\n5.0\n\nQuality of service:\n\n5.0\n\nResponsiveness:\n\n5.0\n\nValue:\n\n5.0\n\nFlexibility:\n\n5.0\n\nProfessionalism:\n\n5.0\n\nAMAZING, BEAUTIFUL VENUE! ", "I can't say anything bad about FTH at all. ", "Everyone was so nice and accomodating. ", "Kevin and Mike were a pleasure to work with. ", "They were super quick when responding to my many numerous inquiries and we're so patient and kind. ", "Mike and his team did an amazing job with hanging up lanterns in the theater for us even when he got them pretty much almost at the last minute. ", "All of our guests were amazed by how beautiful the space was and how unique it is. ", "Definitely take advantage of all 3 areas- garden, gallery and theater. ", "It definitely gives your wedding a wow factor because each space is so beautiful and unique. ", "The gallery has different art displayed each month which made for beautiful decor. ", "It's a dream for caterers because there's so much space and very accessible. ", "HIGHLY RECOMMENDED!", "\n\nSent on 11/02/2016\n\nL\n\nLindsey · Married on 07/10/2016\n\n5.0\n\nQuality of service:\n\n5.0\n\nResponsiveness:\n\n5.0\n\nValue:\n\n5.0\n\nFlexibility:\n\n5.0\n\nProfessionalism:\n\n5.0\n\nWe could not be happier that we chose to have our wedding at Flushing Town Hall! ", "Not only is it really beautiful with tons of history, charm, and character, but everyone who works there could not have been more kind, helpful and accommodating! ", "Kevin answered endless emails from us with thoughtfulness and good humor. ", "He even stayed late one evening to talk us through everything. ", "On top of that, Amin (who's there on the day of events), is incredibly sweet and so on top of things, that we didn't have to think about anything the day of the wedding, he just made it all happen. ", "And the rest of the staff were always so thoughtful, going over and beyond the call over duty.", "\n\nFlushing Town Hall is definitely a gem! ", "We couldn't reccommend it more!" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0.01, 0, 0, 0, 0.009433962264150943, 0.004694835680751174, 0, 0, 0, 0, 0, 0, 0, 0.010582010582010581, 0.023255813953488372, 0, 0.044444444444444446, 0, 0.006896551724137931, 0, 0, 0, 0, 0, 0, 0, 0, 0.013513513513513514, 0, 0.005050505050505051, 0, 0, 0 ]
0.003365
5
[ "County health officials are concerned a patient with tuberculosis at California State University San Marcos may have exposed others.", "\n\nA person from the school is being treated for the disease, and others on campus may have been exposed between Aug. 25 and Oct. 29, the San Diego County Health and Human Services Agency (HHSA) says.", "\n\nThe HHSA is working with the university to notify those they believe are at risk. ", "The school is offering free testing the week of Nov. 17 at the CSUSM Student Health Counseling Services, located at 333 S. Twin Oaks Valley Road.", "\n\nAccording to county public health officer Wilma Wooten, most people who come in contact with TB do not contract it. ", "However, if symptoms develop, they include a persistent cough, fever, night sweats and unexplained weight loss.", "\n\nThe disease can be treated and cured with medication once identified, Wooten says.", "\n\nWhile not uncommon in San Diego, TB has been on the decline in the past few years. ", "Local cases peaked in 1993 with 469 reported, but 2012 saw only 234, while 2013 had 206.", "\n\nSo far in 2014, there have been 160 cases of TB reported in the county.", "\n\nLast month, a person at Grossmont High School contracted the disease, and another case was reported at Lincoln High School in August.", "\n\nCall the county TB Control Program at 619-692-8621 for more information about the CSUSM potential exposure." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.015151515151515152, 0.005025125628140704, 0.023809523809523808, 0.006896551724137931, 0.00847457627118644, 0, 0.011904761904761904, 0.011764705882352941, 0, 0.0136986301369863, 0.014814814814814815, 0.01834862385321101 ]
0.010824
5
[ "Saint Agnes High School (Saint Paul, Minnesota)\n\nSaint Agnes High School is a private, Roman Catholic high school in Saint Paul, Minnesota, United States. ", " It is located in the Roman Catholic Archdiocese of Saint Paul and Minneapolis, and is affiliated with the Church of St. Agnes in Saint Paul.", "\n\nBackground\nSaint Agnes School was established in 1888, and currently educates students from pre-kindergarten until 12th grade.", "\n\nAcademics\nSaint Agnes High School is fully accredited by the National Catholic Education Association.", "\n\nArts\nSaint Agnes has a long-standing choral tradition that coincides with its Catholic identity. ", " The Saint Agnes Concert Chorale performs several concerts a year and tours extensively. ", " It also participates in state competitions regularly receiving superior ratings. ", " On almost a yearly basis, singers from the school are selected to participate in the All-State Choirs.", "\n\nAthletics\nSaint Agnes is a member of the Tri-Metro conference of the Minnesota State High School League and competes in Section 4 A. Boys athletics for the school include baseball, basketball, football, golf, hockey, soccer, track & field, and wrestling. ", "Girls athletics include basketball, cheerleading, golf, hockey, soccer, softball, track and field, and volleyball. ", "The St. Agnes football team has recently switched from the MCAA (Minnesota Christian Athletic Association) back to the Tri-Metro Conference.", "\n\nMinnesota state titles\n\n Basketball 1994\n Baseball 2001, 2012\n\nSee also\n\nExternal links\n School Website\n\nCategory:Roman Catholic Archdiocese of Saint Paul and Minneapolis\nCategory:High schools in Saint Paul, Minnesota\nCategory:Catholic secondary schools in Minnesota\nCategory:Educational institutions established in 1888\nCategory:Private middle schools in Minnesota\nCategory:Private elementary schools in Minnesota" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0064516129032258064, 0.014184397163120567, 0, 0.009708737864077669, 0, 0.011235955056179775, 0, 0, 0, 0, 0.014285714285714285, 0 ]
0.004656
5
[ "Institutional Review of Mortality in 5434 Consecutive Neurosurgery Patients: Are We Improving?", "\nDespite increasing emphasis on quality improvement in neurosurgery, few studies have evaluated the impact of quality initiatives on health-assessment metrics including risk of mortality (ROM), severity of illness (SOI), case mix index (CMI), and mortality index. ", "To evaluate the impact of a multifactorial quality initiative on mortality and quality metrics on a neurosurgical service. ", "Records of 5434 consecutive neurosurgery inpatients and consults including all inpatient mortalities were prospectively collected and reviewed from July 2014 to June 2016 at major academic institution. ", "A multifactorial quality improvement intervention was implemented in July 2015. ", "UHC risk models mortality index, CMI, ROM, SOI present on admission (POA), and at hospital discharge (DC) were compared in the prior 12 mo and the 12 m after implementation. ", "For mortality cases, diagnosis-related group codes, procedure type, and etiology of mortality were collected. ", "Compared to the pre-intervention cohort (n = 2793), the postintervention cohort (n = 2641) trended to have a decreased mean-observed monthly mortality (3.08 vs 4.17) and mean-monthly mortality index (0.73 vs 0.98). ", "Additionally, the postintervention cohort had significantly higher CMI (3.14 vs 2.96, P = .02), POA-ROM (1.52 vs 1.46, P = .02), POA-SOI (1.97 vs 1.84, P = .0002), DC-ROM (1.69 vs 1.58, P = .003), and DC-SOI (2.1 vs 1.95, P < .0001). ", "Of 131 mortalities (pre-intervention: n = 70, postintervention: n = 61), the postintervention cohort had a higher proportion of moralities due to emergent and trauma admissions than elective. ", "Our study suggests that our quality initiative impacted observed mortality, improved documentation, and enhanced overall quality of care on a neurosurgical service." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.010638297872340425, 0.007575757575757576, 0, 0, 0, 0.022988505747126436, 0, 0, 0.017094017094017096, 0, 0 ]
0.0053
5
[ "The National Association for Environmental Management (NAEM) is the largest professional association for corporate environment, health and safety (EHS) and sustainability decision-makers. ", "We are dedicated to empowering our members to advance environmental stewardship, create safe and healthy workplaces, and promote global sustainability.", "\n\nThe Lake Michigan Chapter is NAEM’s local networking group for EHS and sustainability leaders in the Chicagoland area. ", "To stay current with regulatory issues, share information with peers and learn valuable professional skills, register for an upcoming event today!", "\n\nMergers & Acquisitions – Due Diligence & Integration\n\nThursday September 22, 2016\n8:00 a.m. - 1:00 p.m. (CDT)\n\nCost: Members $35, Non-Members $45, Optional Lunch $10\n\nThe NAEM Upper Midwest Chapter cordially invites you to the fall chapter meeting at General Mills. ", "This meeting will have a panel discussion on due diligence including Phase I/II, data rooms, compliance reviews, asbestos surveys and working with attorneys. ", "In addition, we will discuss best practices to address integration challenges such as culture, budgets, systems/tools, corporate standards, and sustainability.", "\n\nIs a Phase 1 enough? ", "How do you know when to stop the due diligence?", "\n\nYou have 800 documents to review in the next two weeks, how do you get it done?", "\n\nBalancing acquisition risk with desires of the business – is there a middle ground?", "\n\nWhat is the goal of due diligence vs integration?", "\n\nPost-acquisition: How do we integrate company cultures? ", "What about EHS/sustainability metrics?", "\n\nThe meeting will be followed by an optional networking lunch to allow continued discussion and networking with your peers. ", "Come to learn and more importantly share what works well for your organization!", "\n\nEach year NAEM’s annual conference convenes more than 550 attendees for a three-day showcase of the latest strategies corporate environment, health, safety and sustainability (EHS&S) leaders are using to keep employees safe, minimize their company’s environmental footprint and deliver business value through sustainability programs." ]
{ "pile_set_name": "Pile-CC" }
[ 0.010638297872340425, 0, 0.024793388429752067, 0, 0.014925373134328358, 0.006329113924050633, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0029850746268656717 ]
0.00351
5
[ "(Welcome to Let’s Get Animated!, ", "a column that spotlights the best of film animation. ", "In this edition: the best animated flying sequences.)", "\nThe best kinds of animated films sweep you away — whether in their dazzling technical craft, their boundless imagination, or their awe-inspiring execution. ", "And the best kinds of animated flying sequences achieve all three.", "\nIn honor of the release of How to Train Your Dragon: The Hidden World, the third and final film in a franchise that has given us some of... Tags: Movies, China, Superman, Disney, Features, Egypt, Animation, Peter Pan, Brad Bird, Snyder, Tim Rice, Alan Menken, Jasmine, Aladdin, Rockwell, Zack Snyder\n\nIt’s been just about a year since the relaunch of WeWork Labs, an accelerator-type program operating under the WeWork umbrella. ", "Since then, it’s grown to 37 locations in 22 cities. ", "And it’s truly international, operating in 12 countries, including Brazil, China, Germany and India.", "\nThese Labs offices are often — but not always — housed within a larger WeWork space, and, like an accelerator, they offer mentorship and programming. ", "However, WeWork doesn’t take any equity; instead, it simply makes mo... Tags: Startups, Accelerator, New York, Microsoft, New York City, Israel, Tel Aviv, Tech, Shanghai, Manhattan, WeWork, Adler, Vazquez, Barak, Soluto, Dumbo\n\nJoseph Gatt is used to playing the bad guy. ", "With his striking chrome dome, high cheekbones, and thin eyebrows, it’s no wonder that Gatt has been typecast as a villain. ", "He’s tried to kill Thor as a Frost Giant, and he’s terrorized various heroes as countless Russian mercenaries. ", "But in Dumbo, his villain Neils Skellig (the psychotic hunter and right-hand man of Michael Keaton’s ruthless circus entrepreneur V.A. Vandemere) hits a little closer to home.", "\n“I’m very anti-hunting and I’m involved in a... Tags: Movies, Interviews, La, Fantasy, Disney, Features, Darth Vader, Thor, Michael Keaton, Tim, Keaton, Medici, Dumbo, Set Visit, Action/Adventure, Disney/Pixar\n\nBefore we get into the most obvious thing about the upcoming movies for 2019 – which is, Marvel is going to make a lot of money, again – can we first look forward to some great filmmakers who’ll be doing exactly what they want to do?", "\nLike Martin Scorsese, whose Netflix-backed “The Irishman” reunites our greatest living filmmaker with old cronies Robert De Niro, Joe Pesci and Harvey Keitel, and tosses Al Pacino into the bargain. ", "It’s a mob epic that spans decades, with a lot of digital de-aging, ... Tags: Hollywood, Movies, Tim Burton, Disney, Sport, Tom Hanks, Fox, Netflix, Things To Do, Soccer, Ferrari, Ford, Elton John, Leonardo Dicaprio, Hobbs, Seth Rogen\n\n“Dumbo” takes flight in the first official trailer for Tim Burton’s live-action remake of the Disney classic. ", "This reimagining, which uses visual effects to portray the lovable elephant, sees Danny DeVito as the owner of a faltering circus. ", "He enlists a former star (Colin Farrell) and his children (Nico Parker and Finley Hobbins) to look […] Tags: News, Tim Burton, Disney, Colin Farrell, Danny DeVito, Dumbo, Nico Parker, Finley Hobbins\n\nThanks to the latest trailer for Tim Burton’s live-action remake of Dumbo, you’ll still believe a horribly depressed elephant can fly! ", "He will also be ripped away from his mother and be forced to wear clown make-up, among other cruelties.", "Read more... Tags: Science, Tim Burton, Disney, Animation, Dumbo\n\n\"You can do it, Dumbo. ", "Show them.\" ", "Disney has revealed their first full-length, official trailer for the live-action Dumbo movie, about the little elephant who can fly. ", "And you'll really believe he can fly after this! ", "What a magnificent trailer, no thanks to that music. ", "Dumbo is directed by iconic filmmaker Tim Burton, who has been working with Disney ever since Alice in Wonderland and most recently made Miss Peregrine's Home for Peculiar Children. ", "This new Disney Dumbo adventure features an... Tags: Movies, Trailer, Tim Burton, Disney, Michael Keaton, Alice, Peregrine, Dumbo, To Watch, Disney Dumbo" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0.027906976744186046, 0, 0, 0, 0.022058823529411766, 0.008064516129032258, 0.009009009009009009, 0.022857142857142857, 0.015730337078651686, 0.03015075376884422, 0.03468208092485549, 0.007633587786259542, 0.03283582089552239, 0, 0.02247191011235955, 0, 0.007462686567164179, 0, 0, 0.027472527472527472, 0.032679738562091505 ]
0.011578
5
[ "The Ghost Train\n\nLet’s start this story with the simple fact, that I am not a religious man, And I don’t truly follow any kind of religious belief. ", "But this made me start to think that something else could be out there in this world.", "\n\nThis happened when I was a young man, maybe at most 15, My one buddy who has passed away recently, Was walking with me along the coal train tracks with me, Let’s stick with his nickname, We called him Seamonkey. ", "But it was late in the evening, had recently rained and a small bit of fog had rolled into the area, and we decided, to go for a walk along the train tracks, for a bit of fun and exploration. ", "We were always the exploring type of young kids, the old mill, the trails across the bridge, and even some of the abandoned houses of the town. ", "But today, was different.", "\n\nWe both felt like something was wrong, the fog seemed thicker and almost gaseous, The smell that normal fog had the clean scent was gone, it smelled this time like rotten flesh, and blood. ", "We thought at first that the smell was coming from a possible dead deer or other animal that might have gotten hit by one of the trains that still come through the area. ", "But we couldn’t see anything near the tracks or even around them, We were starting to get a bit freaked out now cause the fog seemed to thicken a bit more. ", "When we finally heard a noise. ", "A low deep whistle, Howling through the fog and the area.", "\n\nWe froze in place, but quickly got off the actual tracks moving to stand in the gravel that the tracks were surrounded by, And moved closer to the edge of the hill side which dropped down to the river, thinking it might have been one of the coal trains that came through. ", "But soon we were proven wrong, As we watched and waited, we saw it, A single glowing red light coming towards us on the tracks. ", "We both looked at each other at this time, and Seamonkey asked me. “", "What the fuck?” ", "I replied with “I have no idea, dude!” ", "We both couldn’t even move as we watched it coming closer, only to hear that whistle blow again, This time though we both wanted to run, but we were half way through mill and the town, so we had no were to actually run.", "\n\nBy this time though, we could make it out, it was a train, but was different, It seemed the fog was coming from the train itself, And we could see that it was not on the tracks, but floating above it. ", "As we stood there horrified it slowed, and stopped near us, releasing a hiss of the fog, As we stared in fear, the door on the engine opened up, and a hand extended from it, beckoning us to come closer, We backed up now, finally finding our strength in our legs, when we heard a voice come from the conductors door. “", "Are…you lost? ", "Come in.” ", "That was when Seamonkey shouted out in fear and spoke to me again. “", "It’s not human!” ", "That was when I noticed it myself, we could finally see the Conductor, It was a man, in olden clothes, almost like from the fifties, but his face, was angular he had a small pencil like mustache, but his eyes, was what finally shook me out of my stupor, They were red and slightly glowing, and the whites of his eyes were black. ", "He spoke to us again at this time.", "\n\n“Come boys, I will take you were you belong, don’t be afraid.” ", "At this Seamonkey and I backed up, and I remembered something my Mother use to always tell me, That Train tracks were the home to the lost souls, and the Devil’s train would come for those it deemed lost. ", "As I said when I started this story, I am not religious, but I did remember the Lord’s prayer. ", "I started reciting it. ", "At which this man visibly recoiled lightly, before he chuckled softly. ", "and said one last thing. “", "Ah…Your both still of this world, No matter, It is not your time for me it seems. ", "Safe travels….My two lost souls.”", "\n\nWith that he closed the door, and the train began to move again, we watched as it passed us, looking at the windows, seeing various types of people, but they all seemed sad, and lonely, as it passed fully the fog lifted, and Seamonkey looked at me as spoke “What in the fuck was that!” ", "With a shaky breath I watched the train continue to travel away from us and I only could answer one thing. “", "That…was the Grim Reaper’s train. ", "It thought we were dead, and came for us. ", "The Devil decided we were right…But we survived.” ", "With that we both started to move faster, and soon reached the town again, and booked it to my house, where we told myMother what happened, she turned white and quickly stood up grabbing her cross and blessed us both, and told us. “", "That train will come for you both….I hope you will resist it…” Now, til this day I still see that train once a year, and hear the whistle from time to time, I know that Train is waiting for me, and when my time comes, I know I have to board it, But I warn you all, If you see this train, DON’T TAKE THE RIDE!" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.017543859649122806, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00303951367781155, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.000515
5
[ "/*\n * Copyright 2009 Red Hat, Inc.\n *\n * Red Hat licenses this file to you under the Apache License, version 2.0\n * (the \"License\"); you may not use this file except in compliance with the\n * License. ", " You may obtain a copy of the License at:\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS, WITHOUT\n * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. ", " See the\n * License for the specific language governing permissions and limitations\n * under the License.", "\n */\npackage com.codefollower.douyu.netty.handler.timeout;\n\n/**\n * A {@link TimeoutException} raised by {@link ReadTimeoutHandler} when no data\n * was read within a certain period of time.", "\n *\n * @author <a href=\"http://www.jboss.org/netty/\">The Netty Project</a>\n * @author <a href=\"http://gleamynode.net/\">Trustin Lee</a>\n * @version $Rev$, $Date$\n */\npublic class ReadTimeoutException extends TimeoutException {\n\n private static final long serialVersionUID = -4596059237992273913L;\n\n /**\n * Creates a new instance.", "\n */\n public ReadTimeoutException() {\n super();\n }\n\n /**\n * Creates a new instance.", "\n */\n public ReadTimeoutException(String message, Throwable cause) {\n super(message, cause);\n }\n\n /**\n * Creates a new instance.", "\n */\n public ReadTimeoutException(String message) {\n super(message);\n }\n\n /**\n * Creates a new instance.", "\n */\n public ReadTimeoutException(Throwable cause) {\n super(cause);\n }\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.004975124378109453, 0.012779552715654952, 0.009523809523809525, 0.010638297872340425, 0.014792899408284023, 0, 0, 0, 0 ]
0.005857
5
[ "// go run mksyscall.go -tags linux,ppc64le syscall_linux.go syscall_linux_ppc64x.go\n// Code generated by the command above; see README.md. ", "DO NOT EDIT.", "\n\n// +build linux,ppc64le\n\npackage unix\n\nimport (\n\t\"syscall\"\n\t\"unsafe\"\n)\n\nvar _ syscall.", "Errno\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc fchmodat(dirfd int, path string, mode uint32) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_FCHMODAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(mode))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc ioctl(fd int, req uint, arg uintptr) (err error) {\n\t_, _, e1 := Syscall(SYS_IOCTL, uintptr(fd), uintptr(req), uintptr(arg))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Linkat(olddirfd int, oldpath string, newdirfd int, newpath string, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(oldpath)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(newpath)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_LINKAT, uintptr(olddirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(newdirfd), uintptr(unsafe.", "Pointer(_p1)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tr0, _, e1 := Syscall6(SYS_OPENAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(flags), uintptr(mode), 0, 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc ppoll(fds *PollFd, nfds int, timeout *Timespec, sigmask *Sigset_t) (n int, err error) {\n\tr0, _, e1 := Syscall6(SYS_PPOLL, uintptr(unsafe.", "Pointer(fds)), uintptr(nfds), uintptr(unsafe.", "Pointer(timeout)), uintptr(unsafe.", "Pointer(sigmask)), 0, 0)\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Readlinkat(dirfd int, path string, buf []byte) (n int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 unsafe.", "Pointer\n\tif len(buf) > 0 {\n\t\t_p1 = unsafe.", "Pointer(&buf[0])\n\t} else {\n\t\t_p1 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_READLINKAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(_p1), uintptr(len(buf)), 0, 0)\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Symlinkat(oldpath string, newdirfd int, newpath string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(oldpath)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(newpath)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_SYMLINKAT, uintptr(unsafe.", "Pointer(_p0)), uintptr(newdirfd), uintptr(unsafe.", "Pointer(_p1)))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Unlinkat(dirfd int, path string, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_UNLINKAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(flags))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc utimensat(dirfd int, path string, times *[2]Timespec, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_UTIMENSAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(times)), uintptr(flags), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getcwd(buf []byte) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(buf) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&buf[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_GETCWD, uintptr(_p0), uintptr(len(buf)), 0)\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc wait4(pid int, wstatus *_C_int, options int, rusage *Rusage) (wpid int, err error) {\n\tr0, _, e1 := Syscall6(SYS_WAIT4, uintptr(pid), uintptr(unsafe.", "Pointer(wstatus)), uintptr(options), uintptr(unsafe.", "Pointer(rusage)), 0, 0)\n\twpid = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc KeyctlInt(cmd int, arg2 int, arg3 int, arg4 int, arg5 int) (ret int, err error) {\n\tr0, _, e1 := Syscall6(SYS_KEYCTL, uintptr(cmd), uintptr(arg2), uintptr(arg3), uintptr(arg4), uintptr(arg5), 0)\n\tret = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc KeyctlBuffer(cmd int, arg2 int, buf []byte, arg5 int) (ret int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(buf) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&buf[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_KEYCTL, uintptr(cmd), uintptr(arg2), uintptr(_p0), uintptr(len(buf)), uintptr(arg5), 0)\n\tret = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc keyctlJoin(cmd int, arg2 string) (ret int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(arg2)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tr0, _, e1 := Syscall(SYS_KEYCTL, uintptr(cmd), uintptr(unsafe.", "Pointer(_p0)), 0)\n\tret = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc keyctlSearch(cmd int, arg2 int, arg3 string, arg4 string, arg5 int) (ret int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(arg3)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(arg4)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tr0, _, e1 := Syscall6(SYS_KEYCTL, uintptr(cmd), uintptr(arg2), uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), uintptr(arg5), 0)\n\tret = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc keyctlIOV(cmd int, arg2 int, payload []Iovec, arg5 int) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(payload) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&payload[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall6(SYS_KEYCTL, uintptr(cmd), uintptr(arg2), uintptr(_p0), uintptr(len(payload)), uintptr(arg5), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc keyctlDH(cmd int, arg2 *KeyctlDHParams, buf []byte) (ret int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(buf) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&buf[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_KEYCTL, uintptr(cmd), uintptr(unsafe.", "Pointer(arg2)), uintptr(_p0), uintptr(len(buf)), 0, 0)\n\tret = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc ptrace(request int, pid int, addr uintptr, data uintptr) (err error) {\n\t_, _, e1 := Syscall6(SYS_PTRACE, uintptr(request), uintptr(pid), uintptr(addr), uintptr(data), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc reboot(magic1 uint, magic2 uint, cmd int, arg string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(arg)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_REBOOT, uintptr(magic1), uintptr(magic2), uintptr(cmd), uintptr(unsafe.", "Pointer(_p0)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc mount(source string, target string, fstype string, flags uintptr, data *byte) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(source)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(target)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p2 *byte\n\t_p2, err = BytePtrFromString(fstype)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_MOUNT, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), uintptr(unsafe.", "Pointer(_p2)), uintptr(flags), uintptr(unsafe.", "Pointer(data)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Acct(path string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_ACCT, uintptr(unsafe.", "Pointer(_p0)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc AddKey(keyType string, description string, payload []byte, ringid int) (id int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(keyType)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(description)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p2 unsafe.", "Pointer\n\tif len(payload) > 0 {\n\t\t_p2 = unsafe.", "Pointer(&payload[0])\n\t} else {\n\t\t_p2 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_ADD_KEY, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), uintptr(_p2), uintptr(len(payload)), uintptr(ringid), 0)\n\tid = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Adjtimex(buf *Timex) (state int, err error) {\n\tr0, _, e1 := Syscall(SYS_ADJTIMEX, uintptr(unsafe.", "Pointer(buf)), 0, 0)\n\tstate = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Chdir(path string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_CHDIR, uintptr(unsafe.", "Pointer(_p0)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Chroot(path string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_CHROOT, uintptr(unsafe.", "Pointer(_p0)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc ClockGetres(clockid int32, res *Timespec) (err error) {\n\t_, _, e1 := Syscall(SYS_CLOCK_GETRES, uintptr(clockid), uintptr(unsafe.", "Pointer(res)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc ClockGettime(clockid int32, time *Timespec) (err error) {\n\t_, _, e1 := Syscall(SYS_CLOCK_GETTIME, uintptr(clockid), uintptr(unsafe.", "Pointer(time)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc ClockNanosleep(clockid int32, flags int, request *Timespec, remain *Timespec) (err error) {\n\t_, _, e1 := Syscall6(SYS_CLOCK_NANOSLEEP, uintptr(clockid), uintptr(flags), uintptr(unsafe.", "Pointer(request)), uintptr(unsafe.", "Pointer(remain)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Close(fd int) (err error) {\n\t_, _, e1 := Syscall(SYS_CLOSE, uintptr(fd), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc CopyFileRange(rfd int, roff *int64, wfd int, woff *int64, len int, flags int) (n int, err error) {\n\tr0, _, e1 := Syscall6(SYS_COPY_FILE_RANGE, uintptr(rfd), uintptr(unsafe.", "Pointer(roff)), uintptr(wfd), uintptr(unsafe.", "Pointer(woff)), uintptr(len), uintptr(flags))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc DeleteModule(name string, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(name)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_DELETE_MODULE, uintptr(unsafe.", "Pointer(_p0)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Dup(oldfd int) (fd int, err error) {\n\tr0, _, e1 := Syscall(SYS_DUP, uintptr(oldfd), 0, 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Dup3(oldfd int, newfd int, flags int) (err error) {\n\t_, _, e1 := Syscall(SYS_DUP3, uintptr(oldfd), uintptr(newfd), uintptr(flags))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc EpollCreate1(flag int) (fd int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_EPOLL_CREATE1, uintptr(flag), 0, 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc EpollCtl(epfd int, op int, fd int, event *EpollEvent) (err error) {\n\t_, _, e1 := RawSyscall6(SYS_EPOLL_CTL, uintptr(epfd), uintptr(op), uintptr(fd), uintptr(unsafe.", "Pointer(event)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Eventfd(initval uint, flags int) (fd int, err error) {\n\tr0, _, e1 := Syscall(SYS_EVENTFD2, uintptr(initval), uintptr(flags), 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Exit(code int) {\n\tSyscallNoError(SYS_EXIT_GROUP, uintptr(code), 0, 0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fallocate(fd int, mode uint32, off int64, len int64) (err error) {\n\t_, _, e1 := Syscall6(SYS_FALLOCATE, uintptr(fd), uintptr(mode), uintptr(off), uintptr(len), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fchdir(fd int) (err error) {\n\t_, _, e1 := Syscall(SYS_FCHDIR, uintptr(fd), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fchmod(fd int, mode uint32) (err error) {\n\t_, _, e1 := Syscall(SYS_FCHMOD, uintptr(fd), uintptr(mode), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fchownat(dirfd int, path string, uid int, gid int, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_FCHOWNAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(uid), uintptr(gid), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc fcntl(fd int, cmd int, arg int) (val int, err error) {\n\tr0, _, e1 := Syscall(SYS_FCNTL, uintptr(fd), uintptr(cmd), uintptr(arg))\n\tval = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fdatasync(fd int) (err error) {\n\t_, _, e1 := Syscall(SYS_FDATASYNC, uintptr(fd), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fgetxattr(fd int, attr string, dest []byte) (sz int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 unsafe.", "Pointer\n\tif len(dest) > 0 {\n\t\t_p1 = unsafe.", "Pointer(&dest[0])\n\t} else {\n\t\t_p1 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_FGETXATTR, uintptr(fd), uintptr(unsafe.", "Pointer(_p0)), uintptr(_p1), uintptr(len(dest)), 0, 0)\n\tsz = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc FinitModule(fd int, params string, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(params)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_FINIT_MODULE, uintptr(fd), uintptr(unsafe.", "Pointer(_p0)), uintptr(flags))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Flistxattr(fd int, dest []byte) (sz int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(dest) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&dest[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_FLISTXATTR, uintptr(fd), uintptr(_p0), uintptr(len(dest)))\n\tsz = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Flock(fd int, how int) (err error) {\n\t_, _, e1 := Syscall(SYS_FLOCK, uintptr(fd), uintptr(how), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fremovexattr(fd int, attr string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_FREMOVEXATTR, uintptr(fd), uintptr(unsafe.", "Pointer(_p0)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fsetxattr(fd int, attr string, dest []byte, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 unsafe.", "Pointer\n\tif len(dest) > 0 {\n\t\t_p1 = unsafe.", "Pointer(&dest[0])\n\t} else {\n\t\t_p1 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall6(SYS_FSETXATTR, uintptr(fd), uintptr(unsafe.", "Pointer(_p0)), uintptr(_p1), uintptr(len(dest)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fsync(fd int) (err error) {\n\t_, _, e1 := Syscall(SYS_FSYNC, uintptr(fd), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getdents(fd int, buf []byte) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(buf) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&buf[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_GETDENTS64, uintptr(fd), uintptr(_p0), uintptr(len(buf)))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getpgid(pid int) (pgid int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_GETPGID, uintptr(pid), 0, 0)\n\tpgid = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getpid() (pid int) {\n\tr0, _ := RawSyscallNoError(SYS_GETPID, 0, 0, 0)\n\tpid = int(r0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getppid() (ppid int) {\n\tr0, _ := RawSyscallNoError(SYS_GETPPID, 0, 0, 0)\n\tppid = int(r0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getpriority(which int, who int) (prio int, err error) {\n\tr0, _, e1 := Syscall(SYS_GETPRIORITY, uintptr(which), uintptr(who), 0)\n\tprio = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getrandom(buf []byte, flags int) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(buf) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&buf[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_GETRANDOM, uintptr(_p0), uintptr(len(buf)), uintptr(flags))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getrusage(who int, rusage *Rusage) (err error) {\n\t_, _, e1 := RawSyscall(SYS_GETRUSAGE, uintptr(who), uintptr(unsafe.", "Pointer(rusage)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getsid(pid int) (sid int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_GETSID, uintptr(pid), 0, 0)\n\tsid = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Gettid() (tid int) {\n\tr0, _ := RawSyscallNoError(SYS_GETTID, 0, 0, 0)\n\ttid = int(r0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getxattr(path string, attr string, dest []byte) (sz int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p2 unsafe.", "Pointer\n\tif len(dest) > 0 {\n\t\t_p2 = unsafe.", "Pointer(&dest[0])\n\t} else {\n\t\t_p2 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_GETXATTR, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), uintptr(_p2), uintptr(len(dest)), 0, 0)\n\tsz = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc InitModule(moduleImage []byte, params string) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(moduleImage) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&moduleImage[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(params)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_INIT_MODULE, uintptr(_p0), uintptr(len(moduleImage)), uintptr(unsafe.", "Pointer(_p1)))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc InotifyAddWatch(fd int, pathname string, mask uint32) (watchdesc int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(pathname)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tr0, _, e1 := Syscall(SYS_INOTIFY_ADD_WATCH, uintptr(fd), uintptr(unsafe.", "Pointer(_p0)), uintptr(mask))\n\twatchdesc = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc InotifyInit1(flags int) (fd int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_INOTIFY_INIT1, uintptr(flags), 0, 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc InotifyRmWatch(fd int, watchdesc uint32) (success int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_INOTIFY_RM_WATCH, uintptr(fd), uintptr(watchdesc), 0)\n\tsuccess = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Kill(pid int, sig syscall.", "Signal) (err error) {\n\t_, _, e1 := RawSyscall(SYS_KILL, uintptr(pid), uintptr(sig), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Klogctl(typ int, buf []byte) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(buf) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&buf[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_SYSLOG, uintptr(typ), uintptr(_p0), uintptr(len(buf)))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Lgetxattr(path string, attr string, dest []byte) (sz int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p2 unsafe.", "Pointer\n\tif len(dest) > 0 {\n\t\t_p2 = unsafe.", "Pointer(&dest[0])\n\t} else {\n\t\t_p2 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_LGETXATTR, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), uintptr(_p2), uintptr(len(dest)), 0, 0)\n\tsz = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Listxattr(path string, dest []byte) (sz int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 unsafe.", "Pointer\n\tif len(dest) > 0 {\n\t\t_p1 = unsafe.", "Pointer(&dest[0])\n\t} else {\n\t\t_p1 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_LISTXATTR, uintptr(unsafe.", "Pointer(_p0)), uintptr(_p1), uintptr(len(dest)))\n\tsz = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Llistxattr(path string, dest []byte) (sz int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 unsafe.", "Pointer\n\tif len(dest) > 0 {\n\t\t_p1 = unsafe.", "Pointer(&dest[0])\n\t} else {\n\t\t_p1 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_LLISTXATTR, uintptr(unsafe.", "Pointer(_p0)), uintptr(_p1), uintptr(len(dest)))\n\tsz = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Lremovexattr(path string, attr string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_LREMOVEXATTR, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Lsetxattr(path string, attr string, data []byte, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p2 unsafe.", "Pointer\n\tif len(data) > 0 {\n\t\t_p2 = unsafe.", "Pointer(&data[0])\n\t} else {\n\t\t_p2 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall6(SYS_LSETXATTR, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), uintptr(_p2), uintptr(len(data)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc MemfdCreate(name string, flags int) (fd int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(name)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tr0, _, e1 := Syscall(SYS_MEMFD_CREATE, uintptr(unsafe.", "Pointer(_p0)), uintptr(flags), 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Mkdirat(dirfd int, path string, mode uint32) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_MKDIRAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(mode))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Mknodat(dirfd int, path string, mode uint32, dev int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_MKNODAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(mode), uintptr(dev), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Nanosleep(time *Timespec, leftover *Timespec) (err error) {\n\t_, _, e1 := Syscall(SYS_NANOSLEEP, uintptr(unsafe.", "Pointer(time)), uintptr(unsafe.", "Pointer(leftover)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc PerfEventOpen(attr *PerfEventAttr, pid int, cpu int, groupFd int, flags int) (fd int, err error) {\n\tr0, _, e1 := Syscall6(SYS_PERF_EVENT_OPEN, uintptr(unsafe.", "Pointer(attr)), uintptr(pid), uintptr(cpu), uintptr(groupFd), uintptr(flags), 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc PivotRoot(newroot string, putold string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(newroot)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(putold)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_PIVOT_ROOT, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc prlimit(pid int, resource int, newlimit *Rlimit, old *Rlimit) (err error) {\n\t_, _, e1 := RawSyscall6(SYS_PRLIMIT64, uintptr(pid), uintptr(resource), uintptr(unsafe.", "Pointer(newlimit)), uintptr(unsafe.", "Pointer(old)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Prctl(option int, arg2 uintptr, arg3 uintptr, arg4 uintptr, arg5 uintptr) (err error) {\n\t_, _, e1 := Syscall6(SYS_PRCTL, uintptr(option), uintptr(arg2), uintptr(arg3), uintptr(arg4), uintptr(arg5), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Pselect(nfd int, r *FdSet, w *FdSet, e *FdSet, timeout *Timespec, sigmask *Sigset_t) (n int, err error) {\n\tr0, _, e1 := Syscall6(SYS_PSELECT6, uintptr(nfd), uintptr(unsafe.", "Pointer(r)), uintptr(unsafe.", "Pointer(w)), uintptr(unsafe.", "Pointer(e)), uintptr(unsafe.", "Pointer(timeout)), uintptr(unsafe.", "Pointer(sigmask)))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc read(fd int, p []byte) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(p) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&p[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_READ, uintptr(fd), uintptr(_p0), uintptr(len(p)))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Removexattr(path string, attr string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_REMOVEXATTR, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Renameat2(olddirfd int, oldpath string, newdirfd int, newpath string, flags uint) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(oldpath)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(newpath)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_RENAMEAT2, uintptr(olddirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(newdirfd), uintptr(unsafe.", "Pointer(_p1)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc RequestKey(keyType string, description string, callback string, destRingid int) (id int, err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(keyType)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(description)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p2 *byte\n\t_p2, err = BytePtrFromString(callback)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tr0, _, e1 := Syscall6(SYS_REQUEST_KEY, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), uintptr(unsafe.", "Pointer(_p2)), uintptr(destRingid), 0, 0)\n\tid = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setdomainname(p []byte) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(p) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&p[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall(SYS_SETDOMAINNAME, uintptr(_p0), uintptr(len(p)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Sethostname(p []byte) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(p) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&p[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall(SYS_SETHOSTNAME, uintptr(_p0), uintptr(len(p)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setpgid(pid int, pgid int) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SETPGID, uintptr(pid), uintptr(pgid), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setsid() (pid int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_SETSID, 0, 0, 0)\n\tpid = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Settimeofday(tv *Timeval) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SETTIMEOFDAY, uintptr(unsafe.", "Pointer(tv)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setns(fd int, nstype int) (err error) {\n\t_, _, e1 := Syscall(SYS_SETNS, uintptr(fd), uintptr(nstype), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setpriority(which int, who int, prio int) (err error) {\n\t_, _, e1 := Syscall(SYS_SETPRIORITY, uintptr(which), uintptr(who), uintptr(prio))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setxattr(path string, attr string, data []byte, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(attr)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p2 unsafe.", "Pointer\n\tif len(data) > 0 {\n\t\t_p2 = unsafe.", "Pointer(&data[0])\n\t} else {\n\t\t_p2 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall6(SYS_SETXATTR, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(_p1)), uintptr(_p2), uintptr(len(data)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Signalfd(fd int, mask *Sigset_t, flags int) {\n\tSyscallNoError(SYS_SIGNALFD4, uintptr(fd), uintptr(unsafe.", "Pointer(mask)), uintptr(flags))\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Statx(dirfd int, path string, flags int, mask int, stat *Statx_t) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_STATX, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(flags), uintptr(mask), uintptr(unsafe.", "Pointer(stat)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Sync() {\n\tSyscallNoError(SYS_SYNC, 0, 0, 0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Syncfs(fd int) (err error) {\n\t_, _, e1 := Syscall(SYS_SYNCFS, uintptr(fd), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Sysinfo(info *Sysinfo_t) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SYSINFO, uintptr(unsafe.", "Pointer(info)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Tee(rfd int, wfd int, len int, flags int) (n int64, err error) {\n\tr0, _, e1 := Syscall6(SYS_TEE, uintptr(rfd), uintptr(wfd), uintptr(len), uintptr(flags), 0, 0)\n\tn = int64(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Tgkill(tgid int, tid int, sig syscall.", "Signal) (err error) {\n\t_, _, e1 := RawSyscall(SYS_TGKILL, uintptr(tgid), uintptr(tid), uintptr(sig))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Times(tms *Tms) (ticks uintptr, err error) {\n\tr0, _, e1 := RawSyscall(SYS_TIMES, uintptr(unsafe.", "Pointer(tms)), 0, 0)\n\tticks = uintptr(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Umask(mask int) (oldmask int) {\n\tr0, _ := RawSyscallNoError(SYS_UMASK, uintptr(mask), 0, 0)\n\toldmask = int(r0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Uname(buf *Utsname) (err error) {\n\t_, _, e1 := RawSyscall(SYS_UNAME, uintptr(unsafe.", "Pointer(buf)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Unmount(target string, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(target)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_UMOUNT2, uintptr(unsafe.", "Pointer(_p0)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Unshare(flags int) (err error) {\n\t_, _, e1 := Syscall(SYS_UNSHARE, uintptr(flags), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc write(fd int, p []byte) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(p) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&p[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall(SYS_WRITE, uintptr(fd), uintptr(_p0), uintptr(len(p)))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc exitThread(code int) (err error) {\n\t_, _, e1 := Syscall(SYS_EXIT, uintptr(code), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc readlen(fd int, p *byte, np int) (n int, err error) {\n\tr0, _, e1 := Syscall(SYS_READ, uintptr(fd), uintptr(unsafe.", "Pointer(p)), uintptr(np))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc writelen(fd int, p *byte, np int) (n int, err error) {\n\tr0, _, e1 := Syscall(SYS_WRITE, uintptr(fd), uintptr(unsafe.", "Pointer(p)), uintptr(np))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc munmap(addr uintptr, length uintptr) (err error) {\n\t_, _, e1 := Syscall(SYS_MUNMAP, uintptr(addr), uintptr(length), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Madvise(b []byte, advice int) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(b) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&b[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall(SYS_MADVISE, uintptr(_p0), uintptr(len(b)), uintptr(advice))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Mprotect(b []byte, prot int) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(b) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&b[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall(SYS_MPROTECT, uintptr(_p0), uintptr(len(b)), uintptr(prot))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Mlock(b []byte) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(b) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&b[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall(SYS_MLOCK, uintptr(_p0), uintptr(len(b)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Mlockall(flags int) (err error) {\n\t_, _, e1 := Syscall(SYS_MLOCKALL, uintptr(flags), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Msync(b []byte, flags int) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(b) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&b[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall(SYS_MSYNC, uintptr(_p0), uintptr(len(b)), uintptr(flags))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Munlock(b []byte) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(b) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&b[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall(SYS_MUNLOCK, uintptr(_p0), uintptr(len(b)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Munlockall() (err error) {\n\t_, _, e1 := Syscall(SYS_MUNLOCKALL, 0, 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc faccessat(dirfd int, path string, mode uint32) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_FACCESSAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(mode))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Dup2(oldfd int, newfd int) (err error) {\n\t_, _, e1 := Syscall(SYS_DUP2, uintptr(oldfd), uintptr(newfd), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc EpollCreate(size int) (fd int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_EPOLL_CREATE, uintptr(size), 0, 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc EpollWait(epfd int, events []EpollEvent, msec int) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(events) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&events[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_EPOLL_WAIT, uintptr(epfd), uintptr(_p0), uintptr(len(events)), uintptr(msec), 0, 0)\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fadvise(fd int, offset int64, length int64, advice int) (err error) {\n\t_, _, e1 := Syscall6(SYS_FADVISE64, uintptr(fd), uintptr(offset), uintptr(length), uintptr(advice), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fchown(fd int, uid int, gid int) (err error) {\n\t_, _, e1 := Syscall(SYS_FCHOWN, uintptr(fd), uintptr(uid), uintptr(gid))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fstat(fd int, stat *Stat_t) (err error) {\n\t_, _, e1 := Syscall(SYS_FSTAT, uintptr(fd), uintptr(unsafe.", "Pointer(stat)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fstatat(dirfd int, path string, stat *Stat_t, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_NEWFSTATAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(stat)), uintptr(flags), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Fstatfs(fd int, buf *Statfs_t) (err error) {\n\t_, _, e1 := Syscall(SYS_FSTATFS, uintptr(fd), uintptr(unsafe.", "Pointer(buf)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Ftruncate(fd int, length int64) (err error) {\n\t_, _, e1 := Syscall(SYS_FTRUNCATE, uintptr(fd), uintptr(length), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getegid() (egid int) {\n\tr0, _ := RawSyscallNoError(SYS_GETEGID, 0, 0, 0)\n\tegid = int(r0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Geteuid() (euid int) {\n\tr0, _ := RawSyscallNoError(SYS_GETEUID, 0, 0, 0)\n\teuid = int(r0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getgid() (gid int) {\n\tr0, _ := RawSyscallNoError(SYS_GETGID, 0, 0, 0)\n\tgid = int(r0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getrlimit(resource int, rlim *Rlimit) (err error) {\n\t_, _, e1 := RawSyscall(SYS_UGETRLIMIT, uintptr(resource), uintptr(unsafe.", "Pointer(rlim)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Getuid() (uid int) {\n\tr0, _ := RawSyscallNoError(SYS_GETUID, 0, 0, 0)\n\tuid = int(r0)\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc InotifyInit() (fd int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_INOTIFY_INIT, 0, 0, 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Ioperm(from int, num int, on int) (err error) {\n\t_, _, e1 := Syscall(SYS_IOPERM, uintptr(from), uintptr(num), uintptr(on))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Iopl(level int) (err error) {\n\t_, _, e1 := Syscall(SYS_IOPL, uintptr(level), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Lchown(path string, uid int, gid int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_LCHOWN, uintptr(unsafe.", "Pointer(_p0)), uintptr(uid), uintptr(gid))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Listen(s int, n int) (err error) {\n\t_, _, e1 := Syscall(SYS_LISTEN, uintptr(s), uintptr(n), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Lstat(path string, stat *Stat_t) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_LSTAT, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(stat)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Pause() (err error) {\n\t_, _, e1 := Syscall(SYS_PAUSE, 0, 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Pread(fd int, p []byte, offset int64) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(p) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&p[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_PREAD64, uintptr(fd), uintptr(_p0), uintptr(len(p)), uintptr(offset), 0, 0)\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Pwrite(fd int, p []byte, offset int64) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(p) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&p[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_PWRITE64, uintptr(fd), uintptr(_p0), uintptr(len(p)), uintptr(offset), 0, 0)\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Renameat(olddirfd int, oldpath string, newdirfd int, newpath string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(oldpath)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\tvar _p1 *byte\n\t_p1, err = BytePtrFromString(newpath)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_RENAMEAT, uintptr(olddirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(newdirfd), uintptr(unsafe.", "Pointer(_p1)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Seek(fd int, offset int64, whence int) (off int64, err error) {\n\tr0, _, e1 := Syscall(SYS_LSEEK, uintptr(fd), uintptr(offset), uintptr(whence))\n\toff = int64(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Select(nfd int, r *FdSet, w *FdSet, e *FdSet, timeout *Timeval) (n int, err error) {\n\tr0, _, e1 := Syscall6(SYS__NEWSELECT, uintptr(nfd), uintptr(unsafe.", "Pointer(r)), uintptr(unsafe.", "Pointer(w)), uintptr(unsafe.", "Pointer(e)), uintptr(unsafe.", "Pointer(timeout)), 0)\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc sendfile(outfd int, infd int, offset *int64, count int) (written int, err error) {\n\tr0, _, e1 := Syscall6(SYS_SENDFILE, uintptr(outfd), uintptr(infd), uintptr(unsafe.", "Pointer(offset)), uintptr(count), 0, 0)\n\twritten = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setfsgid(gid int) (err error) {\n\t_, _, e1 := Syscall(SYS_SETFSGID, uintptr(gid), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setfsuid(uid int) (err error) {\n\t_, _, e1 := Syscall(SYS_SETFSUID, uintptr(uid), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setregid(rgid int, egid int) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SETREGID, uintptr(rgid), uintptr(egid), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setresgid(rgid int, egid int, sgid int) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SETRESGID, uintptr(rgid), uintptr(egid), uintptr(sgid))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setresuid(ruid int, euid int, suid int) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SETRESUID, uintptr(ruid), uintptr(euid), uintptr(suid))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setrlimit(resource int, rlim *Rlimit) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SETRLIMIT, uintptr(resource), uintptr(unsafe.", "Pointer(rlim)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Setreuid(ruid int, euid int) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SETREUID, uintptr(ruid), uintptr(euid), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Shutdown(fd int, how int) (err error) {\n\t_, _, e1 := Syscall(SYS_SHUTDOWN, uintptr(fd), uintptr(how), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Splice(rfd int, roff *int64, wfd int, woff *int64, len int, flags int) (n int64, err error) {\n\tr0, _, e1 := Syscall6(SYS_SPLICE, uintptr(rfd), uintptr(unsafe.", "Pointer(roff)), uintptr(wfd), uintptr(unsafe.", "Pointer(woff)), uintptr(len), uintptr(flags))\n\tn = int64(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Stat(path string, stat *Stat_t) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_STAT, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(stat)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Statfs(path string, buf *Statfs_t) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_STATFS, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(buf)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Truncate(path string, length int64) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_TRUNCATE, uintptr(unsafe.", "Pointer(_p0)), uintptr(length), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Ustat(dev int, ubuf *Ustat_t) (err error) {\n\t_, _, e1 := Syscall(SYS_USTAT, uintptr(dev), uintptr(unsafe.", "Pointer(ubuf)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc accept(s int, rsa *RawSockaddrAny, addrlen *_Socklen) (fd int, err error) {\n\tr0, _, e1 := Syscall(SYS_ACCEPT, uintptr(s), uintptr(unsafe.", "Pointer(rsa)), uintptr(unsafe.", "Pointer(addrlen)))\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc accept4(s int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (fd int, err error) {\n\tr0, _, e1 := Syscall6(SYS_ACCEPT4, uintptr(s), uintptr(unsafe.", "Pointer(rsa)), uintptr(unsafe.", "Pointer(addrlen)), uintptr(flags), 0, 0)\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc bind(s int, addr unsafe.", "Pointer, addrlen _Socklen) (err error) {\n\t_, _, e1 := Syscall(SYS_BIND, uintptr(s), uintptr(addr), uintptr(addrlen))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc connect(s int, addr unsafe.", "Pointer, addrlen _Socklen) (err error) {\n\t_, _, e1 := Syscall(SYS_CONNECT, uintptr(s), uintptr(addr), uintptr(addrlen))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc getgroups(n int, list *_Gid_t) (nn int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_GETGROUPS, uintptr(n), uintptr(unsafe.", "Pointer(list)), 0)\n\tnn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc setgroups(n int, list *_Gid_t) (err error) {\n\t_, _, e1 := RawSyscall(SYS_SETGROUPS, uintptr(n), uintptr(unsafe.", "Pointer(list)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc getsockopt(s int, level int, name int, val unsafe.", "Pointer, vallen *_Socklen) (err error) {\n\t_, _, e1 := Syscall6(SYS_GETSOCKOPT, uintptr(s), uintptr(level), uintptr(name), uintptr(val), uintptr(unsafe.", "Pointer(vallen)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc setsockopt(s int, level int, name int, val unsafe.", "Pointer, vallen uintptr) (err error) {\n\t_, _, e1 := Syscall6(SYS_SETSOCKOPT, uintptr(s), uintptr(level), uintptr(name), uintptr(val), uintptr(vallen), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc socket(domain int, typ int, proto int) (fd int, err error) {\n\tr0, _, e1 := RawSyscall(SYS_SOCKET, uintptr(domain), uintptr(typ), uintptr(proto))\n\tfd = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc socketpair(domain int, typ int, proto int, fd *[2]int32) (err error) {\n\t_, _, e1 := RawSyscall6(SYS_SOCKETPAIR, uintptr(domain), uintptr(typ), uintptr(proto), uintptr(unsafe.", "Pointer(fd)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc getpeername(fd int, rsa *RawSockaddrAny, addrlen *_Socklen) (err error) {\n\t_, _, e1 := RawSyscall(SYS_GETPEERNAME, uintptr(fd), uintptr(unsafe.", "Pointer(rsa)), uintptr(unsafe.", "Pointer(addrlen)))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc getsockname(fd int, rsa *RawSockaddrAny, addrlen *_Socklen) (err error) {\n\t_, _, e1 := RawSyscall(SYS_GETSOCKNAME, uintptr(fd), uintptr(unsafe.", "Pointer(rsa)), uintptr(unsafe.", "Pointer(addrlen)))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc recvfrom(fd int, p []byte, flags int, from *RawSockaddrAny, fromlen *_Socklen) (n int, err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(p) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&p[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\tr0, _, e1 := Syscall6(SYS_RECVFROM, uintptr(fd), uintptr(_p0), uintptr(len(p)), uintptr(flags), uintptr(unsafe.", "Pointer(from)), uintptr(unsafe.", "Pointer(fromlen)))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc sendto(s int, buf []byte, flags int, to unsafe.", "Pointer, addrlen _Socklen) (err error) {\n\tvar _p0 unsafe.", "Pointer\n\tif len(buf) > 0 {\n\t\t_p0 = unsafe.", "Pointer(&buf[0])\n\t} else {\n\t\t_p0 = unsafe.", "Pointer(&_zero)\n\t}\n\t_, _, e1 := Syscall6(SYS_SENDTO, uintptr(s), uintptr(_p0), uintptr(len(buf)), uintptr(flags), uintptr(to), uintptr(addrlen))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc recvmsg(s int, msg *Msghdr, flags int) (n int, err error) {\n\tr0, _, e1 := Syscall(SYS_RECVMSG, uintptr(s), uintptr(unsafe.", "Pointer(msg)), uintptr(flags))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc sendmsg(s int, msg *Msghdr, flags int) (n int, err error) {\n\tr0, _, e1 := Syscall(SYS_SENDMSG, uintptr(s), uintptr(unsafe.", "Pointer(msg)), uintptr(flags))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc mmap(addr uintptr, length uintptr, prot int, flags int, fd int, offset int64) (xaddr uintptr, err error) {\n\tr0, _, e1 := Syscall6(SYS_MMAP, uintptr(addr), uintptr(length), uintptr(prot), uintptr(flags), uintptr(fd), uintptr(offset))\n\txaddr = uintptr(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc futimesat(dirfd int, path string, times *[2]Timeval) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_FUTIMESAT, uintptr(dirfd), uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(times)))\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Gettimeofday(tv *Timeval) (err error) {\n\t_, _, e1 := RawSyscall(SYS_GETTIMEOFDAY, uintptr(unsafe.", "Pointer(tv)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Time(t *Time_t) (tt Time_t, err error) {\n\tr0, _, e1 := RawSyscall(SYS_TIME, uintptr(unsafe.", "Pointer(t)), 0, 0)\n\ttt = Time_t(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc Utime(path string, buf *Utimbuf) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_UTIME, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(buf)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc utimes(path string, times *[2]Timeval) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall(SYS_UTIMES, uintptr(unsafe.", "Pointer(_p0)), uintptr(unsafe.", "Pointer(times)), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc pipe(p *[2]_C_int) (err error) {\n\t_, _, e1 := RawSyscall(SYS_PIPE, uintptr(unsafe.", "Pointer(p)), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc pipe2(p *[2]_C_int, flags int) (err error) {\n\t_, _, e1 := RawSyscall(SYS_PIPE2, uintptr(unsafe.", "Pointer(p)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc poll(fds *PollFd, nfds int, timeout int) (n int, err error) {\n\tr0, _, e1 := Syscall(SYS_POLL, uintptr(unsafe.", "Pointer(fds)), uintptr(nfds), uintptr(timeout))\n\tn = int(r0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc syncFileRange2(fd int, flags int, off int64, n int64) (err error) {\n\t_, _, e1 := Syscall6(SYS_SYNC_FILE_RANGE2, uintptr(fd), uintptr(flags), uintptr(off), uintptr(n), 0, 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n\n// THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT\n\nfunc kexecFileLoad(kernelFd int, initrdFd int, cmdlineLen int, cmdline string, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(cmdline)\n\tif err !", "= nil {\n\t\treturn\n\t}\n\t_, _, e1 := Syscall6(SYS_KEXEC_FILE_LOAD, uintptr(kernelFd), uintptr(initrdFd), uintptr(cmdlineLen), uintptr(unsafe.", "Pointer(_p0)), uintptr(flags), 0)\n\tif e1 !", "= 0 {\n\t\terr = errnoErr(e1)\n\t}\n\treturn\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.007194244604316547, 0, 0, 0.010101010101010102, 0.011627906976744186, 0.02631578947368421, 0.004098360655737705, 0.00749063670411985, 0.024096385542168676, 0.011363636363636364, 0.02040816326530612, 0.023809523809523808, 0.008032128514056224, 0.011627906976744186, 0.04054054054054054, 0, 0, 0, 0.021739130434782608, 0.004166666666666667, 0, 0, 0, 0.011235955056179775, 0.013333333333333334, 0.00816326530612245, 0.024096385542168676, 0.014084507042253521, 0.02040816326530612, 0, 0.004347826086956522, 0.011627906976744186, 0.02564102564102564, 0.00398406374501992, 0.011363636363636364, 0, 0.02127659574468085, 0, 0, 0, 0.00909090909090909, 0, 0, 0, 0.0060790273556231, 0.00975609756097561, 0, 0, 0.006369426751592357, 0.0043859649122807015, 0.012048192771084338, 0.024390243902439025, 0.0038022813688212928, 0.0125, 0.010101010101010102, 0, 0.017857142857142856, 0, 0, 0, 0, 0.0049261083743842365, 0, 0, 0, 0.01282051282051282, 0.017064846416382253, 0.0041841004184100415, 0, 0, 0.007518796992481203, 0.012195121951219513, 0.024390243902439025, 0, 0, 0, 0.043478260869565216, 0, 0.004901960784313725, 0, 0, 0.007462686567164179, 0.011494252873563218, 0, 0, 0, 0, 0, 0.010638297872340425, 0, 0.021739130434782608, 0.004878048780487805, 0, 0, 0.0048543689320388345, 0, 0, 0.004166666666666667, 0, 0.00411522633744856, 0, 0.013513513513513514, 0, 0, 0.005025125628140704, 0, 0, 0.029850746268656716, 0.004484304932735426, 0, 0.023809523809523808, 0.004464285714285714, 0.00796812749003984, 0.01639344262295082, 0.010869565217391304, 0, 0.007633587786259542, 0.00684931506849315, 0.004975124378109453, 0.004424778761061947, 0.004032258064516129, 0.011494252873563218, 0.02857142857142857, 0.003787878787878788, 0, 0.004201680672268907, 0, 0, 0, 0, 0.012987012987012988, 0.008547008547008548, 0, 0.02564102564102564, 0, 0, 0, 0.007936507936507936, 0.0091324200913242, 0.00909090909090909, 0, 0, 0.008298755186721992, 0, 0, 0, 0, 0.013157894736842105, 0.005025125628140704, 0, 0, 0, 0.008064516129032258, 0.00851063829787234, 0.011627906976744186, 0, 0, 0, 0.015873015873015872, 0, 0, 0.004329004329004329, 0.004889975550122249, 0.0125, 0, 0, 0, 0, 0, 0.012987012987012988, 0.005319148936170213, 0, 0, 0.024691358024691357, 0.008771929824561403, 0, 0.007722007722007722, 0, 0.03389830508474576, 0.008130081300813009, 0.0034482758620689655, 0.007246376811594203, 0.031578947368421054, 0, 0, 0, 0.008264462809917356, 0.00411522633744856, 0.0125, 0, 0, 0, 0, 0, 0.012987012987012988, 0.004347826086956522, 0, 0, 0, 0, 0.014084507042253521, 0.004329004329004329, 0, 0, 0, 0, 0.014084507042253521, 0.0044444444444444444, 0.0125, 0, 0, 0, 0.0040650406504065045, 0.0125, 0, 0, 0, 0, 0, 0.013157894736842105, 0.004347826086956522, 0, 0.03571428571428571, 0.008658008658008658, 0.011764705882352941, 0.02631578947368421, 0.008333333333333333, 0, 0.017241379310344827, 0.004484304932735426, 0, 0, 0, 0.038834951456310676, 0.004347826086956522, 0.012195121951219513, 0, 0, 0, 0.007246376811594203, 0, 0, 0.006230529595015576, 0, 0, 0.03571428571428571, 0, 0, 0.025, 0, 0, 0, 0.008620689655172414, 0.004464285714285714, 0.0125, 0.0136986301369863, 0, 0, 0.007380073800738007, 0.024096385542168676, 0.01098901098901099, 0.02040816326530612, 0.023809523809523808, 0.007220216606498195, 0.011494252873563218, 0.011904761904761904, 0, 0, 0, 0.03125, 0, 0, 0, 0, 0.006097560975609756, 0, 0, 0, 0.008695652173913044, 0.009389671361502348, 0.004784688995215311, 0, 0.008888888888888889, 0.011583011583011582, 0.004081632653061225, 0.0125, 0, 0, 0, 0, 0, 0.013157894736842105, 0.004608294930875576, 0.007874015748031496, 0.023809523809523808, 0.03278688524590164, 0, 0.0030581039755351682, 0, 0.03333333333333333, 0.006756756756756757, 0, 0.027522935779816515, 0.004807692307692308, 0, 0.007712082262210797, 0, 0.0045045045045045045, 0, 0.023809523809523808, 0.004784688995215311, 0, 0, 0, 0.008547008547008548, 0, 0, 0.02127659574468085, 0, 0.02127659574468085, 0.0041841004184100415, 0, 0, 0, 0, 0.005847953216374269, 0, 0, 0, 0.006329113924050633, 0, 0, 0, 0.004739336492890996, 0, 0, 0, 0.009433962264150943, 0, 0, 0, 0, 0.0051813471502590676, 0.008583690987124463, 0.011494252873563218, 0.02631578947368421, 0, 0.004132231404958678, 0, 0, 0, 0.013245033112582781, 0.010101010101010102, 0.008298755186721992, 0.004672897196261682, 0, 0.00411522633744856, 0.011235955056179775, 0, 0.021739130434782608, 0.0045662100456621, 0, 0, 0.0107095046854083, 0, 0.010282776349614395, 0.00411522633744856, 0.0049261083743842365, 0.004464285714285714, 0, 0.0196078431372549, 0.004651162790697674, 0.0045662100456621, 0, 0, 0, 0.01092896174863388, 0.0053475935828877, 0, 0, 0.013986013986013986, 0, 0, 0, 0.013888888888888888, 0.007751937984496124, 0.024096385542168676, 0.011111111111111112, 0.02040816326530612, 0, 0.0035587188612099642, 0, 0, 0.03571428571428571, 0, 0.023255813953488372, 0.007194244604316547, 0.029850746268656716, 0.004830917874396135, 0, 0.008547008547008548, 0.007751937984496124, 0.007751937984496124, 0.008438818565400843, 0, 0.004273504273504274, 0.0044444444444444444, 0, 0, 0.014492753623188406, 0.0045871559633027525, 0, 0, 0, 0.004524886877828055, 0, 0, 0, 0.0045045045045045045, 0, 0, 0, 0.037037037037037035, 0.004016064257028112, 0, 0.024390243902439025, 0.0076045627376425855, 0, 0.031746031746031744, 0.007352941176470588, 0.008, 0.007194244604316547, 0.0078125, 0.004310344827586207, 0, 0.004484304932735426, 0, 0, 0.006622516556291391, 0, 0.006172839506172839, 0.012345679012345678, 0.0035842293906810036, 0, 0.03571428571428571, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007633587786259542, 0, 0.025, 0, 0, 0, 0, 0.006535947712418301, 0, 0.038461538461538464, 0, 0.038461538461538464, 0.0106951871657754, 0.0041841004184100415, 0.011494252873563218, 0, 0, 0, 0, 0.0049261083743842365, 0, 0.0045662100456621, 0, 0, 0, 0.0044444444444444444, 0, 0, 0, 0, 0, 0, 0.025, 0, 0.014492753623188406, 0.010238907849829351, 0.0072992700729927005, 0.0072992700729927005, 0.023809523809523808, 0 ]
0.006182
5
[ "Less Than Perfect—Broken Men & Women Of The Bible\n\n7 Days\n\nAnn Spangler retells the stories of seven less-than-perfect people from the Bible to bring them to life for modern readers. ", "In this 7-day devotional, she acquaints readers with colorful cast of characters, highlighting what we can learn from broken men and women of the Bible." ]
{ "pile_set_name": "Pile-CC" }
[ 0.01092896174863388, 0 ]
0.005464
5
[ "Amanita fulva\n\nAmanita fulva, commonly called the tawny grisette, is a basidiomycete mushroom of the genus Amanita. ", "It is found frequently in deciduous and coniferous forests of Europe, and possibly North America.", "\n\nTaxonomy and naming\nAmanita fulva was first described by Jacob Christian Schäffer in 1774. ", "Historically, both the tawny grisette and the grisette (A. vaginata) were placed in the genus Amanitopsis due to their lack of a ring, unlike other Amanita species. ", "However this distinction is now seen as insufficient to warrant a separate genus. ", "Nowadays, A. fulva and similar ringless species of Amanita are placed in the section Vaginatae ss according to the classification of Bas.", "\n\nDescription\n\nThe cap is orange-brown, paler towards the margin, and darker (even very dark brown) in the center, up to 10 cm in diameter. ", "It develops an umbo when expanded, and has a strongly striated margin. ", "Its surface is smooth, slightly sticky and slippery when moist and glistens; later it may dry. ", "The gills are free, close, and broad. ", "The flesh is white to cream. ", "The stem or stipe is white and smooth or powdery, sometimes tinged with orange-brown and with very fine hairs. ", "It is slender, ringless, hollow and quite fragile, tapering towards the top; up to 15 cm tall and 1–1.5 cm in thickness. ", "The universal veil which initially encapsulates the fruiting body is torn and develops into a white, sack-like volva with characteristic rusty-brown blemishes. ", "The cap is usually free of volval remnants. ", "Infrequently, roughly polygonal pieces of the veil may remain on the surface. ", "The spores are white, 9 × 12 µm or (9.0-) 10.0 - 12.5 (-19.3) x (8.2-) 9.3 - 12.0 (-15.5) µm in size, globose; nonamyloid.", "\n\nDistribution and habitat\nAmanita fulva, distributed throughout Europe, occurs in a variety of forests. ", "It is generally found with oak (Quercus), birch (Betula), spruce (Picea), pine (Pinus), chestnut (Castanea) and alder (Alnus), with which it forms mycorrhizae. ", "It is often found with birch in Scandinavia, while collections from southern Europe are usually from forests of oak, chestnut and pine. ", "It grows in acidic soils and fruits from summer to late autumn (May to November in the UK). ", "It is a common to scarce fungus, and is very common in Britain.", "\n\nAmanita fulva is considered to be widely distributed in North America in deciduous and coniferous forests, although collections could possibly be of a different, yet undescribed species. ", "In addition, the name Amanita fulva has in the past been misapplied to other North American taxa, such as A. amerifulva and others.", "\n\nEdibility\nAmanita fulva is one of the few good edible species in the genus Amanita. ", "Though this particular species is considered edible, it must be identified with care as other members of the genus Amanita are poisonous and some are deadly. ", "For this reason, collection for consumption of A. fulva can be dangerous and is not recommended. ", "Some authors indicate the fungus is potentially toxic when raw, and is suitable for consumption only when cooked.", "\n\nSee also\n\nList of Amanita species\n\nReferences\n\nfulva\nCategory:Edible fungi\nCategory:Fungi of Europe\nCategory:Fungi of North America" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.02586206896551724, 0, 0.021505376344086023, 0.006060606060606061, 0, 0.021897810218978103, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00819672131147541, 0, 0.0125, 0, 0, 0, 0.005291005291005291, 0.007633587786259542, 0.023255813953488372, 0.006329113924050633, 0, 0, 0.022556390977443608 ]
0.005555
5
[ "Q:\n\nReversing Strings in Right To Left (BiDirectional) Languages in iTextSharp\n\nI'm using iTextSharp( C# iText port) to create pdfs from text/html. ", "Most of my text is in Hebrew, a Right-To-Left language.", "\nMy problem is that PDFs show RTL langauge in reverse, so I need to reverse my strings in a way that would only reverse the RTL text without reversing any numbers or text in English. ", "\nIt is my understanding that fribidi allows doing that on linux, but I couldn't find any solutions for this problem for Windows.", "\nI would welcome any suggestions, including an alternative to iTextSharp that would do this automatically (if one exists).", "\n\nA:\n\nTo show RTL texts by using iTextSharp correctly:\n\nYou need to set the font's encoding to BaseFont.", "IDENTITY_H\nThen you have to use container elements which support RunDirection, such as PdfPCell, ColumnText, etc. ", "and now you can set their element.", "RunDirection = PdfWriter.", "RUN_DIRECTION_RTL; \n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.006756756756756757, 0, 0, 0.0078125, 0, 0.009615384615384616, 0.02631578947368421, 0, 0, 0.047619047619047616 ]
0.009812
5
[ "Oracled\n\nWhen dealing with a lot of entities on the net, you are impressed with how web savvy they are, how they \"get it' and make it easy to download and install their products, And then there are entities like Oracle. ", "It took some weird rituals to download and install their \"InstantClient\" for Linux. ", "partially because I am on a slow connection. ", "Cached cookies for \"accepting terms\", an extra login procedure, slow downloads and login timeouts had me downloading a file, and then clearing my browser to go through the steps again and again. ", "That I could not do a wget or use other methods to get these files (CLI server only) from behind a firewall easily turned this into an exercise in frustration. ", "That there were no decent 'readme' files for installation, and poor instructions on their website (for Ubuntu/Debian)... made me really appreciate the effort most of the FOSS world does to make their stuff easy to install.", "\n\nSome notes: You might need to do an \"apt-get install libaio-dev\", and instead of screwing with environment variables and such wierdies so sqlplus and PHP's oci8 client works in Apache, Ijust copied the lib* files to /usr/lib. ", "Bad practice for supporting multiple Oracle versions but works really well.", "\nThen a 'pecl install oci8' worked beautifully.", "\n\nI needed/wanted to use the PHP Oracle Connector, although I could have kludged it up in Perl. ", "I don't know if Perl would have required the same stuff, but my assumption is \"yes\", because the Oracle libraries are closed source.", "\n\nIn this case, the organization isn't that large, and Oracle is inside of a meter makers facade of an AMI (smart meter, two way communications) system. ", "The thing that is apparantly standard to Oracle, but through me for a loop is that tables are user specific. ", "In this case (actual logins slightly munged to protect the clueless due to NDA's): If I login as: sqlplus admin/password@192.168.0.10/dbsys\nand look at the CDATA_ELEC table, I get bogus test data. ", "If I login as sqlplus acme/password@192.168.0.10/dbsys I get the real data. ", "The clue was looking at: select owner, table_name from all_tables and realizing that the table names were duplicated with different owners. ", "That within a 'listener' aka 'session id' different credentials can see different tables with the same name without another designator like database name twists my head around. ", "I get it, but it took a while to figure out. \"", "sqlplus\" is Oracle's crude command line, with poor line editing and output options compared to MySQL's or other common SQL tools.", "\n\nWhat I wish is I had learned to become an Oracle wizard. ", "It's an arcane and obfuscated discipline where mediorce wizards are paid well, and grand masters are very well rewarded within an ecosystem designed for maximum monetary compensation (for Oracle and it's accolytes) for mediocre usability without an investment in special potions and secret knowledge.", "\n\nDone right, it's probably an incredible database system/ecosystem. ", "Implemented poorly and not documented or supported in an embedded system where SQLite or MySQL is more apropos, it sucks. ", "Dealing with an insane database schema (>2000 tables) where common words are spelled multiple wrong ways with a remote Chinese DBA that didn't understand how those permissions worked either (gave us access to the wrong data views) is just a pain.", "\n\nI don't know what it takes to get a DBI connection to Oracle, but if it was between downloading software from Oracle or using supported tools from the Open Source community, I'd figure out how to get a DBI connection to it working, and then use Perl's DBI::Shell to give yourself a command line attachment.", "\n\nI don't know which organizations you're working with, but I'm always amazed at either how many levels of idiocy there are between the person talking to you and the person who can actually connect you to the database, or how uninterested in helping a customer everyone in the organization is, if the organization is large enough to be running Oracle.", "\n\nNow if only I could figure out the listener name for the production database,.. without hacking the main server, They gave me a listener name for a test system. ", "Futzed, wasted two days on something very simple." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0.00625, 0.009009009009009009, 0.008771929824561403, 0, 0, 0.010416666666666666, 0, 0.013071895424836602, 0, 0.01015228426395939, 0.013157894736842105, 0, 0, 0, 0.015503875968992248, 0, 0, 0, 0, 0.0040650406504065045, 0.00974025974025974, 0, 0, 0 ]
0.003576
5
[ "Q:\n\nRegexp grouping and replaceAll with .* ", "in Java duplicates the replacement\n\nI got a problem using Rexexp in Java. ", "The example code writes out ABC_012_suffix_suffix, I was expecting it to output ABC_012_suffix\n Pattern rexexp = Pattern.compile(\"(.*)\");", "\n Matcher matcher = rexexp.matcher(\"ABC_012\");\n String result = matcher.replaceAll(\"$1_suffix\");\n\n System.out.println(result);\n\nI understand that replaceAll replaces all matched groups, the questions is why is this regexp group (.*) ", "matching twice on my string ABC_012 in Java?", "\n\nA:\n\nPattern regexp = Pattern.compile(\".*\");", "\nMatcher matcher = regexp.matcher(\"ABC_012\");\nmatcher.matches();\nSystem.out.println(matcher.group(0));\nSystem.out.println(matcher.replaceAll(\"$0_suffix\"));\n\nSame happens here, the output is:\nABC_012\nABC_012_suffix_suffix\n\nThe reason is hidden in the replaceAll method: it tries to find all subsequences that match the pattern:\nwhile (matcher.find()) {\n System.out.printf(\"Start: %s, End: %s%n\", matcher.start(), matcher.end());\n}\n\nThis will result in: \nStart: 0, End: 7\nStart: 7, End: 7\n\nSo, to our first surprise, the matcher finds two subsequences, \"ABC_012\" and another \"\". ", "And it appends \"_suffix\" to both of them:\n\"ABC_012\" + \"_suffix\" + \"\" + \"_suffix\"\n\nA:\n\nProbably .* ", "gives you \"full match\" and then reduces match to the \"empty match\" (but still a match). ", "Try (.+) or (^.*$) instead. ", "Both work as expected. ", "\nAt regexinfo star is defined as follows:\n\n*(star) - Repeats the previous item zero or more times. ", "Greedy, so as many items as possible will be matched before trying permutations with less matches of the preceding item, up to the point where the preceding item is not matched at all.", "\n\nA:\n\nIf you just want to add \"_suffix\" to your input why don't you just do:\nString result = \"ABC_012\" + \"_suffix\";\n\n?", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.023255813953488372, 0.04054054054054054, 0, 0.004098360655737705, 0.022727272727272728, 0, 0.0017301038062283738, 0, 0, 0, 0, 0, 0.005434782608695652, 0, 0 ]
0.006519
5
[ "SAIF ZONE PLEDGES SUPPORT FOR SHERAA’S GROWING ECOSYSTEM OF ENTREPRENEURS\n\n15/02/2017\n\nHis Excellency Sheikh Khaled bin Abdulla bin Sultan Al Qasimi, Chairman of Sharjah Airport International Free Zone (SAIF ZONE), was amongst the host of dignitaries who witnessed the unveiling of the first batch of 10 teams of Sheraa (Sharjah Entrepreneurship Center) and pledged their support for its growing ecosystem of entrepreneurs. ", "At an event held at the American University of Sharjah, and in the presence of HH Dr. Sheikh Sultan bin Mohammed Al Qasimi, Supreme Council Member and\n\nRuler of Sharjah, Sheraa's shortlisted teams who have completed the inaugural accelerator program outlined the potential of their ideas that comprised a diverse mix of industries encompassing 'sharing economy', video gaming, Arabic content, handicraft, food and beverages (F&B), energy and skill development. ", "These 10 teams were shortlisted by Sheraa following stringent screening for innovativeness, commercial viability and potential impact. ", "They then underwent an intensive 4-month training and mentorship program. ", "The new startups were supported with seed funding, trade license, office-space and access to customers amongst other benefits. ", "Sheikha Bodour bint Sultan Al Qasimi, Chairperson of the Sharjah Investment and Development Authority (Shurooq), said: \"While Sharjah is celebrated for its rich history, arts and architecture, platforms like Sheraa shine a light on the Emirate as a hub for young entrepreneurial talent. ", "We are proud of the teams who entered the accelerator as students but are now graduating as confident entrepreneurs. ", "We look forward to their innovative ideas taking shape and form and positively impacting our lives.\"", "\n\nNeed Assistance?", "\n\nFollow Us on Social Media\n\nAll Rights Reserved.", "\n\nHappy Customers\n\nWe have been able to successfully develop our activities in the region and remain committed to the best interests of our customers. ", "Hence, we are truly grateful to SAIF ZONE for its continuous support and excellent services in enabling us achieve our objectives. ", "SAIF ZONE’s gesture towards Hino Motors is highly regarded!" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0047169811320754715, 0.013015184381778741, 0.007407407407407408, 0, 0, 0.006968641114982578, 0, 0, 0, 0.02040816326530612, 0, 0, 0.01694915254237288 ]
0.005344
5
[ "The functional importance of the fraction of the endoplasmic reticulum (ER) positioned closely to the plasma membrane (PM) has long been recognized, especially in phospholipids synthesis and -transfer in both metazoan cells and yeast. ", "STIM1, a recently described ER protein rapidly translocates to such PM-adjacent ER compartment upon depletion of the ER calcium stores where it activates the newly identified calcium channel, Orai1, forming the molecular basis of the so-called store-operated calcium entry (SOCE) phenomenon. ", "The importance of this calcium entry pathway is highlighted by the fact that mutations in Orai1 has been linked to severe inborn human immunodeficiencies and that this route of calcium entry is key to the calcium regulated activation of regulatory T-cells mediated by the NFAT transcription factors. ", "Studying the molecular mechanism of STIM1 translocation to the PM-adjacent ER compartment and molecular definition of this compartment could aid identification of novel molecular targets for immunosupression. [", "unreadable] We used a chemically inducible molecular bridge formation between the PM and ER membranes to highlight the plasma membrane-adjacent ER compartment to show that this is the site where STIM1 and its calcium channel partner, Orai1 form a productive interaction upon ER calcium store depletion. ", "By changing the length of the linkers connecting the plasma and ER membranes, we were able to show that Orai1 requires a larger space than STIM1 between the two membranes. ", "This finding suggests that Orai1 is part of a larger macromolecular cluster with an estimated 11-14 nm protrusion to the cytoplasm, while the cytoplasmic domain of STIM1 fits in a space calculated to be less than 6 nm. ", "We also showed that agonist-induced translocation of STIM1 is rapidly reversible and only partially affects STIM1 in the juxtanuclear ER compartment. ", "These studies are the first to detect juxtaposed areas between the ER and the plasma membrane in living cells revealing novel details of STIM1-Orai1 interactions.[unreadable] [unreadable] A select group of plasma membrane receptors activate phospholipase C enzymes to hydrolyze the plasma membrane phospholipid, phosphatidylinositol 4,5-bisphosphate (PIP2) and initiate a cytoplasmic Ca2+ increase to elicit a cellular response. ", "The maintenance of the plasma membrane PIP2 pool is essential for proper cellular signaling and is provided by phosphatidylinositol 4-kinase (PI4K) and phosphatidylinositol 4-phosphate 5-kinase (PIP5K) enzymes. ", "We have previously identified two PI4Ks (type-III&#945; and &#946;) enzymes that are required for the sustained supply of PIP2 but could not determine which of the two was more important for this process. [", "unreadable] We used a combination of approaches to address this question. ", "A large-scale screen of PI3K inhibitors revealed that one of these compounds, Pik93 showed significant potency against the PI4KIII&#946; but not the &#945; enzyme. ", "We used molecular modeling based on the solved crystal structure of the PI3K&#947; enzyme and modelled the catalytic domains of both PI4Ks either with ATP or the inhibitors, wortmannin (Wm) and Pik93. ", "These studies helped identify the structural differences that form the basis of the differential inhibitor sensitivities and allowed us to make mutations that changed the Wm sensitivity of the enzymes. ", "In parallel studies we used protein modules fused to the green fluorescent protein (GFP) to visualize the cellular PI4P and PIP2 pools in living cells and showed that the synthesis of the plasma membrane PI4P and PIP2 pools can be blocked by inhibitors of the PI4KIII&#945; but not the PI4KIII&#946; enzyme. ", "Finally, we used RNAi-mediated gene silencing to show that down-regulation of PI4KIIIa but not any of the other PI4K enzymes interfered with the supply of PI4P and PIP2 during agonist stimulation. ", "These data suggested that PI4KIII&#945; is a critical enzyme for the production of the signaling pool of plasma membrane phosphoinositides. ", "This finding is in good agreement with the conclusion of our parallel studies in zebrafish where the down-regulation of the fish ortholog of the enzyme caused developmental defects because of an impaired supply of PIP2 in the plasma membrane for PI3K signaling.[unreadable] [unreadable] Hepatocyte growth factor (HGF) is important for cell proliferation, differentiation, and related activities. ", "HGF acts through its receptor c-Met, which activates downstream signaling pathways. ", "HGF binds to c-Met at the plasma membrane, where it is generally believed that c-Met signaling is initiated. [", "unreadable] In collaboration with the Nathanson group c-Met was found to rapidly translocate to the nucleus upon stimulation with HGF. ", "Intriguingly, the calcium signals that are induced by HGF result from PI(4,5)P2 hydrolysis and inositol 1,4,5-trisphosphate (InsP3) formation within the nucleus rather than within the cytoplasm. ", "This conclusion was based on the observation that an InsP3 binding domain targeted to the nucleus was able to inhibit HGF but not vasopressin-induced Ca2+ signals, while the same domain expressed in the cytosol and excluded form the nucleus had a reverse effect, being inhibitory on vasopressin- but not HGF-induced Ca2+ signaling. ", "Therefore, while vasopressin generated InsP3 at the plasma membrane, C-Met receptor stimulation appears to bypass the cytoplasm and generates the messenger in the nucleus. ", "Translocation of c-Met to the nucleus was found dependent upon the adaptor protein Gab1 and importin 1, and formation of Ca2+ signals in turn depends upon this translocation. ", "These studies suggest a unique mechanism of Ca2+ signaling that is well suited to affect primarily nuclear processes." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0.00425531914893617, 0.0136986301369863, 0.0033333333333333335, 0.004761904761904762, 0.006600660066006601, 0.005813953488372093, 0, 0.013333333333333334, 0.002331002331002331, 0, 0, 0, 0.012195121951219513, 0.004975124378109453, 0, 0.00974025974025974, 0.015228426395939087, 0, 0.007575757575757576, 0.011904761904761904, 0.00909090909090909, 0.014814814814814815, 0.015384615384615385, 0.009036144578313253, 0.005813953488372093, 0, 0 ]
0.006292
5
[ "David Davis says negotiators have agreed to maintain reciprocal healthcare for British and EU retirees affected by Brexit\n\nThis article is more than 3 years old\n\nThis article is more than 3 years old\n\nBritish pensioners who have retired to other EU countries will continue to have their healthcare paid for by the NHS post-Brexit, after a deal in principle was agreed by negotiators in Brussels.", "\n\nIn one of the few advances made in discussions about EU citizens’ future rights, the Brexit secretary, David Davis, said there had been agreement on four key areas, including reciprocal healthcare for British and EU retirees affected by Brexit.", "\n\n\n\n“This is good news for British pensioners in the EU,” he said.", "\n\n\n\nOther areas of agreement included protection for “frontier workers”, those who live in one EU member state and work in another. ", "This would include people who live in the UK and commute to Europe, or Britons settled in one country, for example Germany, who commute to work in another, say Luxembourg.", "\n\n\n\nAlso, professional qualifications would be recognised across the bloc after Brexit, allowing lawyers, doctors, accountants, seafarers, train drivers and others who have moved to or from the UK to another EU country to work under their existing credentials.", "\n\nThere was also agreement to coordinate on social security post-Brexit. ", "However, there was still disagreement on more than half the issues discussed, including the eventual oversight of the legal rights of EU citizens.", "\n\nBritain’s cake-and-eat-it Brexit routine wears thin with Barnier Read more\n\nThe EU’s chief negotiator, Michel Barnier, hinted that Brussels was insisting that such oversight should be held by the European court of justice – a “red line” for Britain.", "\n\n\n\nIn his opening address at the press conference after the third round of talks, Barnier raised serious concerns about the Home Office’s capacity to oversee or police any deal on EU citizens’ rights given the recent debacle when it mistakenly sent letters to about 100 EU citizens, threatening deportation.", "\n\n\n\n“The UK quickly recognised that it was a mistake, but this is not the first time this has happened and it reinforced the point that [this] needs to be under the control of the ECJ, a point [on] which we disagreed today,” Barnier said.", "\n\n\n\nBritish pensioners across Europe will be relieved, however, that there has been progress on reciprocal healthcare rights.", "\n\n\n\nAccording to figures issued to a parliamentary select committee this year, Britain spends £650m reimbursing other EU countries for treating British patients. ", "Of that, about £500m goes on 190,000 registered pensioners, including 70,000 in Spain, 44,000 in Ireland, 43,000 in France and 12,000 in Cyprus.", "\n\n\n\nThe agreement will allow a British pensioner who has retired in another EU country to travel to other EU countries on holidays and use the existing European Health Insurance Card should they need medical attention.", "\n\n\n\nIt is understood Britain was pushing for this agreement to cover British tourists as well, but the EU said it was not an issue to be discussed in a deal for EU citizens.", "\n\n\n\nTwenty-seven million Ehic cards have been issued in Britain.", "\n\n\n\nDavis said EU citizens would remain “a top priority” and there had been a wide range of agreements in discussions this week.", "\n\n\n\nIt is understood Britain reiterated its commitment not to enforce the requirement that EU citizens who are “self-sufficient”, including students and stay-at-home parents, have private health insurance. ", "They will be able to be treated by the NHS.", "\n\n" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.010126582278481013, 0.02032520325203252, 0.015151515151515152, 0.007575757575757576, 0.005847953216374269, 0.007692307692307693, 0.0136986301369863, 0.00684931506849315, 0.01593625498007968, 0.012987012987012988, 0.008403361344537815, 0, 0.006172839506172839, 0, 0.013761467889908258, 0.011560693641618497, 0, 0.015625, 0.0048543689320388345, 0.023255813953488372, 0 ]
0.009515
5
[ "- Welcome back to the\nMatt and Rebecca channel,\ntoday we are doing a Epic\nRap Battle Challenge.", "\nGame Master Network!", "\n- [Agents R And S] Versus GMI!", "\n- Diss track!", "\n- Not a diss track!", "\n- It's a rap battle.", "\n- But isn't there, like, you could diss--\n- Like, if you diss--\n- No?", "\n- No, I mean, it's just a rap battle.", "\n- So this is a 24 Hour Song Challenge,\nwe got this, guys!", "\n- You guys know that we pranked the guys\nand we trapped them in a\ngiant snow globe for 24 hours.", "\nAnd one good thing did come out of this\nis they figured our Mr. X loves musicals,\nso we are going to do a musical for Mr. X.\nIt's just, he doesn't\nreally know yet, right?", "\n- No, he doesn't really know yet.", "\n- But he'll like it.", "\n- You guys, Mr. X has been trying\nto take over my channel, right?", "\n- Yeah.", "\n- And there was a YouTube Rewind.", "\nWhat if we do a Zamfam Rewind?", "\nLike the musical is\nthe Zamfam Rewind 2019?", "\n- Yes!", "\nWe can kinda document\neverything that happened.", "\n- Yeah, we just recreate songs\nbased on all of the videos that we've done\nand all of the things\nyou guys have done to us.", "\n- Mr. X is going to love that,\nbut how are gonna get away with, like,\nyou know, you guys being on stage\nand Mr. X being in the audience?", "\n- Oh, that's a good point.", "\nOkay, let's think about that.", "\nWhy don't we write here,\nand where do you want them to write, Matt?", "\n- I want you guys to go to\nthe safe house or something.", "\n- Wait, you're gonna let\nthem in our safe house?", "\n- I, there's nothing there.", "\n- I mean, yeah, we know how\nto break in, we're good.", "\n- We're gonna figure out our lyrics here,\nyou guys go to the safe house\nand then we'll meet back in\na couple hours on our roof.", "\n- Okay, wait, but this\ndoesn't seem fair, right,\n'cause we're challenging each other\nand there's three of\nyou, and only two of us.", "\n- Well, I mean, I guess,\nit's not our fault.", "\nWell, we don't have Daniel,\nhe has to send in his lyrics.", "\n- Exactly!", "\n- Oh, well, we'll come up with something.", "\n- All right, guys, so we'll\nmeet back here in two hours.", "\n- In two hours, yeah, we can\ndo that, and I have a plan--\n- With all those lyrics, you better go,\n'cause this battle is on!", "\n- Yeah!", "\n- We might have a surprise\nfor you when we return.", "\n- What does that mean?", "\nWait, how are they even\ngonna get on our roof?", "\nWe don't let 'em in.", "\nOkay, you guys, make\nsure you're subscribed\nwith notifications on,\ngive the video a thumbs up,\nand comment below who you think\nis going to win this rap battle.", "\nGame Master Network!", "\nOr GMI.", "\n- Right, let's get to the studio.", "\n- Okay.", "\n- Come on!", "\n- Okay, wait, wait, wait, wait, wait.", "\n- So, here's my idea.", "\n- I went along, yeah,\nyeah, what's your idea?", "\n- Okay, so I'm gonna call Agent C.\nBecause he loved open mic night!", "\nAgain, he was so good with lyrics.", "\nI'm gonna call him and then tell him,\nsince we don't have\nthat Uber app right now,\nI'm gonna tell him maybe he could Uber\nand pick us up, we'll take\nhim to the safe house.", "\n- Good, 'cause it's a long walk.", "\n- You think it's a good plan?", "\n- Yeah.", "\nWhy did you take off your hat?", "\n- We don't need it right\nnow, we're goin' outside.", "\n- All right, guys, this\nis gonna be super easy.", "\n- Yeah, I mean, we just\nwrote a best friends song,\nwe're good.", "\n- Yeah.", "\n- You can rap, I can rap.", "\nThere's so much we can\nsay about the GMI agents.", "\nComment below some lines\nyou think we should use\nfor this rap battle.", "\n- You know how we came up\nwith a beat for your video?", "\n- Yeah?", "\n- I have one already, too,\nthat I've been workin' on.", "\nKinda like a epic rap battle kinda feel.", "\n- That'll work, let's do it.", "\nYes.", "\nOkay.", "\n- Listen to this.", "\n- Okay.", "\n- Okay?", "\n- This is kinda hard because\nwe're supposed to be working with them.", "\nI don't wanna write bad things, right?", "\n- Oh.", "\n- Oh.", "\n- We're on the same team,\nwe're trying to stop Mr. X.\n- So we have to like kind of\nroast them in a polite way.", "\n- I know this is weird,\nbut I think we should work backwards.", "\nWhat if we like list the\nthings we like about them?", "\nAnd then we can work backwards\nand then we can always flip it.", "\n- Hey, what're you guys doing?", "\n- I'm so tall, though.", "\n- What's up?", "\nThank you for--\n- Yeah, yes.", "\n- Picking us up and\nanswering so quickly to this.", "\nYou know, you liked the open mic.", "\n- Yeah, true.", "\n- We thought this was\nanother way to bring you in\nand like, you use some of\nyour skills, you know--\n- Seatbelts, please.", "\n- Okay, yeah.", "\n- Thank you for interrupting\nour conversation.", "\nSo yeah, we just wanted\nto kinda bring you in\non this like little\nrap battle we're doing.", "\n- Yeah.", "\n- This place we're taking\nyou has awesome acoustics,\nit's great for, like, you know, writing,\nfilming videos.", "\n- Bios.", "\n- So what is this for, again?", "\n- It's like a musical number, you know?", "\nWe've been workin' a\nlittle, a couple ideas,\nthrowin' stuff against the wall.", "\n- And I know that you're like\na GMI, workin' head of GMI,\nso you might wanna battle\nwho we're battling.", "\n- Yeah, you are right, I am\nthe head of GMI right now.", "\n- That's what you go from that?", "\n- Didn't hear that.", "\n- Oh yeah, yeah, that's what I got.", "\nSo what is this place?", "\n- Oh, kind of like a sound studio.", "\n- Apartment.", "\n- Oh, your own little place?", "\n- Yeah, yeah, it's like our place.", "\n- I'm impressed, good job, you guys.", "\n- It makes it a little bit\nharder, don't you think?", "\n- Do we have things\nthat we like about them?", "\n- I mean.", "\n- You might have some stuff.", "\n- Maybe, oh, they're always on time.", "\nWhy don't you do Agent R?", "\n- Yeah, I was actually thinking about\nmaybe like doing it on Agent C.\n- Agent C?", "\n- No.", "\n- I think you should do Agent R.\n- Agent C isn't even in this battle.", "\n- He's kinda nice.", "\n- So Agent S is always on time.", "\nI think he's kind of like the leader.", "\n- We could say that.", "\nI think he actually is a good leader.", "\n- So we'll take him, and\nthen you take Agent R.\n- He just seems like he\nalways wants to take control.", "\n- Thing, that's another good thing.", "\n- Agent R's just there for the ride.", "\nWhat about Agent R, though?", "\n- When he finds something he likes,\nhe really--\n- What?", "\n- Really focuses in, so I mean, like,\nhe's very passionate.", "\n- Oh, whoa!", "\n- Okay, okay!", "\n- Are you saying what\nI think you're saying?", "\n- Yep, we're, this is good, we're good!", "\n- Our apartment's just as we left it.", "\nOur sound studio.", "\n- Oh, just how you left it?", "\nThen why did we break in?", "\n- I lost, I lost the key--\n- He lost the key,\nthat's right.", "\n- And I needed to pick the lock\nbecause I misplaced--\n- Exactly, we were looking\nfor the skeleton key,\nand we don't have it.", "\nBut now we're here!", "\n- But there's good acoustics\nhere for us to write our rap.", "\n- So what is this place?", "\n- It's our hangout.", "\n- It looks so familiar, like,\nwere you dudes collapsed with those dogs?", "\n- Um.", "\nYou guys, don't worry about it.", "\nIt's totally cool,\nwe're allowed to be here.", "\nJust, just think about that.", "\n- Yeah.", "\n- Yeah.", "\n- So are you guys ready?", "\nWe're gonna write, write these verses.", "\n- Yeah, where did we store those\npen and paper again in our,\nthe place that we own?", "\n- You guys don't know where it's at.", "\n- Yeah, we do!", "\nWhy don't you just take a seat?", "\nYou want a water or something, like?", "\n- Yeah, yeah, yeah, water would be nice.", "\n- Hey, look, water right here!", "\nWe're gonna go look for our paper.", "\n- Ain't this like Matt and Rebecca's\nsafe house where this is?", "\n- It's a safe house.", "\n- Don't worry about it, it's fine.", "\nWe're working together, remember?", "\nWe're allowed to be here.", "\n- Working together,\nwhy working together?", "\n- No, I mean, we're pretending\nlike we're working together.", "\nRemember I told you, we\ntalked about that, like,\nwe're working together,\nbut we're really not\nbecause we're trying to set them up,\nbut we're really setting--\nYou get it!", "\nOkay.", "\n- Like, about his crush?", "\nI don't know.", "\n- I mean, probably about his job.", "\nSo determined to get\nhis job back, you know,\nlike, I mean, they're working with us\nto get their job back,\nthey've gotta be passionate.", "\n- You know, when I think about it,\nhe really isn't like all about his job,\nit seems like he has\nother things on his mind.", "\n- Maybe.", "\n- That he's more passionate about.", "\nSo, comment down below if you think\nthat Agent R is passionate.", "\n- His hairstyle.", "\n- Oh, hair!", "\nHe does have good hair.", "\n- Good, nice hair.", "\n- And like he slicks\nit down, what was that?", "\n- Who still uses slick?", "\n- Okay, guys, let's stay\non the positive, okay?", "\n- Okay, okay.", "\nAgent S, he must like dogs.", "\n- Yeah.", "\n- I mean, they broke in--\n- Oh, he is always posting with your dogs.", "\nLike, two of 'em.", "\n- But it doesn't seem like\nour dogs growl at him,\nonly at Agent R.\n- Yeah.", "\n- Blackjack like kissed him on the lips!", "\nIt was like his first kiss!", "\nHe really growled at Agent R, so maybe--\n- Okay.", "\n- Okay, so we'll stay away\nfrom the dog stuff on Agent R, okay?", "\nFlesh out the positive stuff.", "\n- Yeah, yeah, yeah, I literally\ndon't have anything left.", "\nAlways on time, strong leader,\nloves dogs for Agent S.\nAnything for Agent R?", "\n- Dresses nicely.", "\n- Has he ever dressed in\nanything besides a suit?", "\nWell, he had that shirt on, okay.", "\n- I just realized, you guys,\nthey're back in the white shirts.", "\n- Oh!", "\n- Do you guys know why aren't\nthey wearing the red shirts?", "\nThey're back in the white ones.", "\nYou guys, comment if you know why.", "\nI'm kinda getting hungry.", "\n- You wanna take like a little break?", "\n- It's really hard to to find good things\nabout the agents right now.", "\n- Me so hangry!", "\n- I wanna eat and then I feel like\nwe'll be able to just go into like,\nlike the bad stuff.", "\n- Yep, just like this, here we go!", "\n- It's hard to find good\nthings about you two--\n- [Rebecca And Matt] Mess with us--\n- So we flip it.", "\n- Yes.", "\n- And we do all the bad things.", "\nThat list is much longer.", "\n- Yeah, we don't have that much.", "\n- But we gotta eat, yo!", "\n- You love my dogs and they don't wanna--\n- That's a terrible battle.", "\n- Eat you!", "\n- No, dang it!", "\n- You guys, let's eat.", "\n- It doesn't sound good!", "\n- Come back, no, we gotta\nbattle hard, you guys.", "\nAnd I'm getting hangrier\n'cause I can't find things\nthat I like about the agents!", "\n- Yeah, how're you guys,\nhow're you guys doing?", "\nI'm, like, I have this much.", "\nI don't, I don't know.", "\nI can't think of anything.", "\n- Yeah, I got--\nAlice, bo-balice, fee-fi-fo-falice, Alice!", "\n- Hey, that's not a rap.", "\nWe're just rapping right now.", "\n- We're just rapping, we're just rap,\nI feel like, are we\nsupposed to be dissing them\nif we're on the same team, like?", "\n- I don't know about same time, we need--\n- We're not--\n- What?", "\nNo--\n- No, no.", "\n- You keep asking that,\nwe keep telling you,\nit's like--\n- It's like, clear.", "\n- It's clear, right?", "\n- Deceptive.", "\n- So we're writing lyrics in a musical.", "\n- Well, we're doing this\nbecause we thought, you know,\nMr. X really would like to see this, like,\nthis rap battle, and we win,\nbecause you know he loves musicals,\nand he loves, you know, all that st--\n- Oh, a musical.", "\nMe and Mr. X, like, we\nwatched a musical last night.", "\nIt was actually pretty cool.", "\nAnd I tried Diet Coke for the first time,\nit's really good.", "\nMike, you should've been there.", "\nOh, wait.", "\nMy bad.", "\n- Okay, was that?", "\n- They know!", "\nNo, no, no, no, no, no, that's not it--\nDon't I mean?", "\n- You just try to rub\nthat in a little bit?", "\nWere you?", "\n- No.", "\n- You just tried Diet\nCoke for the first time?", "\n- Yo, and it's amazing.", "\n- I don't think we should\ncontinue this conversation!", "\n- All right, so Maddy\nshould be here pretty soon\nwith some sandwiches.", "\n- I mean, we are waiting.", "\nShe should be here any\nminute and I am hungry!", "\nAlice is hangry!", "\nAlice is--\n- Hey!", "\n- [Matt] Hey!", "\n- Oh my gosh!", "\nWait, we have no time, though.", "\n- [Matt] Oh, come on over\nhere, guys, come on, come on!", "\n- I have one for everyone.", "\n- Okay, let's eat.", "\n- This is awesome!", "\n- I have an idea, I hear me out.", "\nWhat if you go on that\nlittle Uber app of yours,\nget us a little car back\nto Matt and Rebecca's,\nthey won't know we're coming,\nthey won't know we're coming.", "\n- Our agent Uber app.", "\n- The one you have.", "\n- Temps don't get it.", "\n- Come on, man!", "\n- I thought we were trying\nto be friends here, that's\nwhy we included you.", "\n- Yeah.", "\n- I'm so sorry, being the\nnumber one agent just,\nyou know, just boggles\nmy mind a little bit.", "\n- That was a little whoo!", "\nNumber one agent just went, oh, wait, oh,\nso, if you're the number one agent,\ndid he show you the Switch?", "\n- He did, actually.", "\n- Really?", "\n- Did he show you guys the Switch?", "\n- Listen, he didn't--\n- He's going to.", "\n- Yeah, of course!", "\n- Going to?", "\n- Yeah.", "\n- He's going to show temps the Switch?", "\n- This is gonna get our jobs back, okay?", "\n- Yeah, yeah, yeah, yeah, yeah.", "\n- All right.", "\n- This is, so can do it,\nyou're here to help us do that too.", "\nYou know I wouldn't do anything--\n- Huge.", "\n- Against the GMI.", "\nSo we should go back\nto Matt and Rebecca's.", "\n- We're returning--\n- Matt and Rebecca.", "\nWe're great at breaking in.", "\n- Many?", "\n- Oh, 13, 13's Italian, right?", "\n- I thought we were seven.", "\n- What?", "\n- I don't know what the sandwich,\nthis is very complicated.", "\n- I'll eat the seven, seven.", "\n- [Matt] Yeah, there we go, okay,\nand this is mine right here.", "\n- We need seven!", "\n- Why am I always stuck in the middle?", "\nI'm literally the tallest--\n- Okay, did you put in the\naddress where we're going?", "\n- Seatbelts.", "\n- What, what address?", "\n- In the Uber app.", "\n- Oh, that's right.", "\nJust gimme the address.", "\n- Seatbelts.", "\n- Seatbelts, please.", "\n- Oh, just put it?", "\nSo now we have have to create a plan.", "\nYes, we have a plan that\nwe're gonna go and break in,\nbut like how?", "\n- We have to do it stealthily, you know.", "\n- Right, like ninja spies.", "\n- So you guys are gonna\nbreak in to somewhere\nwhere somebody's there\nalready, interesting.", "\n- Yeah, we're going to Matt and Rebecca's\n'cause we're gonna try to\nfind what their writing\nand their lyrics are, so we could like,\nsteal 'em or get inspiration\nand know how to respond.", "\n- And we can't really steal 'em\nbecause they'd known it's missing.", "\nWe need to figure out something\nwhere we can get that information, though.", "\n- I could just take a\npicture of it with my phone.", "\n- Oh, that would work.", "\n- [Agents R And S] What's new?", "\nGet it!", "\nWhat, what's new?", "\nGet it!", "\n- You guys are the most energetic temps\nI ever seen in my life.", "\n- Hey, what, okay.", "\n- Oh, oh.", "\n- If you guys get your jobs back,\nyou guys will know all about the Switch.", "\nIt's amazing, by the way.", "\n- What?", "\n- Technically, weren't the the ones\nat your audition hiring you?", "\n- You know, it's crazy,\nthat was the past, this is the future.", "\nThings just change.", "\n- Do you know what\nalso is in the future?", "\n- What, what's in the future?", "\n- Me being your boss, how 'bout that?", "\nAnyway, rap battle, sorry,\ngot lost a little bit.", "\nShh!", "\n- Ahh!", "\n- We're in!", "\nWe're in!", "\nLook at me, look my hands.", "\nOn the count--\nI said look it--\n- What?", "\n- In case you don't know,\nwe are doing a rap battle\nagainst the GMI, and--\n- Ohh, oh!", "\n- Yeah.", "\n- You guys will win.", "\nYou too, right?", "\n- Well, yeah.", "\n- [Matt] That's what I said!", "\n- Yeah, well, we were like writing\nall the the things we like about them.", "\nWe're taking a break\nreally quickly, obviously.", "\n- I like your guys' hats, by the way.", "\nFantastic.", "\n- Oh, yeah.", "\n- Wait, how much money did\nyou get from the snow globe?", "\n- I don't know, I feel like\nI got a couple hundred,\nI figured things okay--\n- What?", "\nThat's not true.", "\n- Wow!", "\nOh, oh.", "\n- There's not--\n- Blackjack?", "\nDid you sneeze, Blackjack?", "\nDid you sneeze?", "\nIt's Blackjack?", "\n- [Matt] It was a hungry sneeze!", "\n- Did you just sneeze?", "\n- Blackjack.", "\nI've never heard you sneeze doing that--\nZamfam, did you guys hear that?", "\n- [Matt] Blackjack, stop it!", "\nHey Maddy, do want a hat, yeah?", "\n- I'll join you guys.", "\n- I have some hats over at the tree.", "\nI love these things.", "\nLemme just go get a new one here.", "\nDid you see one?", "\nLet's get one manual.", "\n- I saw 'em, yeah.", "\nWe need to get back, though,\n'cause we need to win this rap battle.", "\n- All right, Maddy, do you wanna hang?", "\n- Sure.", "\n- Let's rap battle it out.", "\n- Let's do it, yes!", "\n- This is so much easier,\nto say things we don't like about the GMI!", "\n- The hard part's out of the way now.", "\n- Yeah, and we have Maddy here.", "\nWe've got four now.", "\n- If all right, I'm gonna go actually\nuse the restroom real quick.", "\nI'll be right back.", "\n- What do you have?", "\n- Okay.", "\n- You got it, oh!", "\n- Oh no, no, no.", "\nI've seen it, find it,\nthis is a fake ring.", "\nIt wasn't there, it\nwas right there, Maddy,\nwhere you were sitting.", "\nMy wedding ring, I put it there--\n- You lost your ring?", "\n- Yeah, but I don't want Matt to know,\nso I have a fake one on, look!", "\n- Oh my God.", "\n- And he hasn't noticed yet?", "\n- No, he hasn't 'cause he\ndoesn't look at it, I guess.", "\nI have no idea, but you\nguys, don't tell him.", "\nI'm gonna find it, it has\nto be in here somewhere.", "\n- I wanna ask you--\n- I haven't checked the drawers yet,\nso I'm thinking it might be in there,\nbut I was like, uh, I\njust put a temporary one\nthat I had in my room, so--\nThings we don't like.", "\n- Okay, so we're back.", "\nI'm gonna pull up the\npictures that I took,\nso we could see what they said,\nmaybe this will inspire us.", "\n- Yeah, of course.", "\n- To like, you know,\ncome up with something.", "\n- [Agent R] Gettin' into it, gettin'--\n- You got a beat, you\ngot a beat in your head.", "\n- Uh, uh, yeah.", "\n- So the first thing they were saying,\nthere's no, they said,\nAgent S is a good leader.", "\n- Okay, that's good.", "\n- All right.", "\n- Oh hey, that's actually pretty good.", "\n- I'm a pretty good leader.", "\n- Maddy, what's something you\ndon't like about the agents?", "\n- Those sunglasses.", "\nYes.", "\n- The sunglasses?", "\nWe don't have to throw shade\n'cause those glasses are cheaply made.", "\nOh!", "\n- Oh!", "\n- Wait, what did I say?", "\nGet ready to be showered in compliments\n'Cause if I know anything, I know Alice,\nand she's gonna be complimenting me.", "\n- Wait, what about Agent R?", "\nThe gas!", "\n- So bad!", "\nI don't know how you stand it--\nI don't know how you were on that date!", "\n- No milk from the cow.", "\n- Yeah!", "\nI'm still not finished,\nso don't take a bow,\nAgent R's greatest weakness\nis milk from a cow.", "\n- Oh, I, I like that!", "\n- I mean, the next one, it does,\nit says Agent R is really passionate.", "\nHow would you even rhyme that, though?", "\nAgent R is really passionate--\nThat last one is that Agent\nC has a good sense of humor.", "\n- He does, he does do that.", "\n- We know the direction they're going,\nand let's start thinking some things\nthat we think will be good, you know,\nyou wanna like drop a beat.", "\n- And then a little--\n- Okay, like, Rebecca has good hair!", "\n- Matt has cool glasses!", "\n- Oh!", "\n- Alice might be the love of my life!", "\nWhoa,\nwe're not going there, we're not--\n- Okay, not that.", "\n- Let's get our pen and paper.", "\n- I'm sorry.", "\nWait, all I'm sayin' is like,\nnow my creative juices\nare going, you know?", "\n- Yeah, me, yeah, I feel, I feel it.", "\nSo wait, this was your--\nThis was his first one that--\n- Wow, that's incredible.", "\n- He put falala, we're\ndancing in the snow?", "\n- What were you gonna write?", "\n- We're gonna have to\nfreestyle on the spot.", "\n- A little bit, yep.", "\n- If they have lyrics,\nwe've gotta like, battle it.", "\n- Yeah, yeah.", "\n- So we should just be\nready for two of 'em, right?", "\n'Cause they'll be two agents.", "\n- Yep, what can we do about Agent S?", "\n- I mean, I got fired.", "\n- And like, what does he do anyways?", "\nThe only thing I've\never seen him do is spy.", "\n- And steal.", "\nI mean, he's always stealing\nideas from your videos,\nliterally.", "\n- That's true,\nhe's like a copycat.", "\n- But it's more like\nkind of a spier, though,\nlike he just spies on us.", "\n- Agent S, you're a mess.", "\nAll you want is control.", "\nBut news to you, you'll\nnever be the lead role.", "\n- Oh!", "\n- The plan is just write a\nlot of compliments with them\nbecause, I mean, I didn't even\nhear 'em dissing us at all!", "\n- The picture, like everything\nthey wrote is super sweet.", "\n- I mean, we're the GMI, we are bad,\nbut we can like, you know,\nkill 'em with kindness.", "\n- Gotcha.", "\n- He'll like musicals,\nbut just make sure it's not all nice.", "\nWe have to throw\nsomething in there, right?", "\n- Right.", "\n- Yeah, of course.", "\n- You can't be good guys all the way.", "\n- Let's see what comes to mind.", "\n- You are so neat, you smell so sweet.", "\n- Googling rap lyrics.", "\n- Your hair is sleek,\nyou are like a manly man that's--\nI don't know,\nit's for Rebecca, it's for Rebecca.", "\n- GMI agents are now working for us.", "\nLike, there's just kinda\nlike spinnin' on it.", "\n- Okay.", "\n- Agent R seems--\n- Now, there's no way\nyou can get yo' crush.", "\n- Oh!", "\n- Agent R in the bubble,\nhe was kinda like talkin'\nto you a little bit.", "\n- What, really?", "\nI didn't that vibe.", "\n- No, I didn't get that vibe either.", "\n- I had to be like, no, you can't.", "\n- I can, I kinda see what\nyou're talkin' about,\nI saw it like a little bit, but I mean--\n- Maddy's not like that.", "\n- He's just like always\ntalking to like other people.", "\nI mean, that's why I don't really think\nhe's serious about me.", "\n- He's like a player.", "\nWell, I know Maddy is not\ninterested in Agent R.\n- Yeah, I know, at least he\ndidn't like get your number\nor anything, that would\nbe the weirdest thing.", "\n- Oh yeah.", "\n- That'd be so wrong.", "\n- He has been texting me.", "\n- [Rebecca] Wait, what?", "\n- Yeah, just like recently,\nlike the past couple days.", "\n- Like about what?", "\n- Wait, he's texting you?", "\nThat's so creepy!", "\n- Yeah, anything particular at all, or?", "\n- No, just like asking me\nwhat my plans for the holidays\nare, and asking like--\n- [Rebecca] That's so weird.", "\n- Okay, let's get back\nto writing, okay, guys.", "\n- So you look so good,\nsomething, donething, another--\n- This is going to fail.", "\nStood, should--\n- Could.", "\n- What?", "\n- Yeah.", "\nYour hair is bleached, like a skunk,\nI think that's really cool, like funk.", "\n- [Agent C] But why skunk?", "\n- Did you not see our prank\nwhen we did the skunk thing?", "\n- Don't skunks smell?", "\nSo you tell 'em that he smells,\nthat he looks like one, or--\n- Ooh, that seems a little mean!", "\n- You guys, you guys, you guys.", "\nAre you guys feeling good?", "\nI feel like I'm pretty good.", "\nSo I'm feeling, I'm feelin' confident.", "\n- Hey, that was quick.", "\n- Yeah, can we hear some?", "\n- No, I'm gonna leave it as a surprise.", "\nI'm gonna shock all of you.", "\n- Not in your character reel,\nno, I mean, you're nice to me.", "\n- Nice guys.", "\n- We're boys,\nbut I haven't really\nseen you too nice to him,\nso I was like.", "\n- Yeah, never.", "\n- Okay, is this for Agent S?", "\n- Yeah, Agent S.\nSo you lost your job and you only vlog,\nthe only way you get views\nis with Rebecca's dog!", "\n- Oh, fire!", "\n- Good job, okay!", "\n- Guys, we gotta get to\nit in like 10 minutes.", "\nWe got this!", "\n- Let's rap battle!", "\nI'm ready!", "\n- Oh!", "\n- I changed and I'm ready\nfor this rap battle!", "\n- I mean, it looks great.", "\n- It looks good.", "\n- I mean, it's festive, right?", "\n- You're dressed like a winner.", "\n- They're late, they're never late.", "\nTakin' that off of the\nthings I like of them.", "\n- There we go!", "\n- All right, I guess it's\na battle against ourselves,\nyou guys, let's go.", "\n- Okay, here we go!", "\n- Matt, there's so many things!", "\nYou never keep anything clean!", "\n- What?", "\n- No, that's, that's what you got?", "\nThat's what you're gonna\nuse for this rap battle?", "\n'Cause if that that is,\nthen I believe we've already won.", "\n- Where are your hats?", "\n- Why are you guys wearing hats?", "\n- Wait, what are you doing here?", "\n- Oh hi, oh yeah, this\nis the special surprise\nI was tellin' you about.", "\n- What, why, but he--\n- It wasn't fair, four against two.", "\n- But like, he's not even prepared!", "\n- Yeah, but he killed it\nat the open mic night!", "\n- Maddy's not even in this,\nshe's just here for moral support.", "\n- She's just like a beatboxer,\nyeah, she's a hype girl.", "\nWell, if you're here, which\nI don't think you should be--\nHold on.", "\n- Kinda rude.", "\nOh!", "\n- He woks for the GMI, like--\n- GMI!", "\n- How isn't this a conflict of interest?", "\nDid you tell him everything?", "\n- I mean, most parts.", "\n- Almost everything.", "\n- Everything about the battle--\n- Everything about this rap battle!", "\n- This battle, yes, yes!", "\n- Rap battle!", "\n- You ready?", "\n- We're ready!", "\n- All right, all right, all right.", "\nBefore we start, I gotta go take off--\n- Right now, right now?", "\n- Yeah, I gotta talk to\nMr. X about the Switch.", "\nYou know, top agent stuff.", "\n- Oh, oh.", "\n- But you guys wouldn't know!", "\n- Okay.", "\n- Okay, okay.", "\n- What?", "\n- I actually, you know,\nwe were talking earlier about the musical?", "\n- Yeah, yeah.", "\n- Yeah, of course.", "\n- What if we take a\nphoto for an invitation\nwith all of us?", "\n- Like a flyer?", "\n- Yes, a flyer.", "\n- But like digital?", "\n- If we do it before he\ngets back, he can't know!", "\n- I know, but I was thinking\nyou guys would like,\nwill just pretend like--\n- To be our clones!", "\n- Exactly!", "\n- 'Cause you're telling them that\nyou're using the clones for the musical.", "\n- Oh, exactly.", "\n- Okay.", "\n- Okay, so I'll be like RZ Twin.", "\n- Pull the smile a little bit, though.", "\n- Yeah.", "\n- Like a little more.", "\n- Yeah, like one squinty eye, though,\nlike just a little bit.", "\n- Okay, but smile, like, ahh,\nlike, bare your teeth, smile.", "\n- Maybe like tilt your head a little bit.", "\n- Yeah, that's, ooh, that's good.", "\nMaybe like the eye, just like open,\none eye is very open, though.", "\nNo, no, no, your smile, close\nyour mouth a little bit.", "\n- Yeah, a little teeth, though.", "\n- Not that much.", "\nYeah, oh.", "\n- Oh, teeth.", "\nHappy clone.", "\n- Oh, happy clone, there it is!", "\n- Okay, where's your clone face?", "\n- Okay, okay.", "\n- Just anything.", "\n- Perfect!", "\nJust be your clone!", "\nJust be yourself, it's fine, it's fine.", "\n- Okay.", "\n- Okay, just be yourself,\neveryone.", "\n- [Maddy] Got it.", "\n- Okay.", "\n- You got it?", "\nOh, all right!", "\n- Yeah!", "\n- All right!", "\nSo it looks like I'm up first!", "\nDJ, hit that beat!", "\n- Yeah!", "\n♪ It's the GMN versus the GMI ♪\n♪ I don't think I even\nreally have to try. ", "♪\n♪ You make it easy for me to look great ♪\n♪ Retiring might be your only fate ♪\n♪ It's the GM agents working for us ♪\n♪ Agent R seems like he's\nalways making a fuss ♪\n♪ We set him up on a\npicnic with his crush ♪\n♪ Couldn't get his own date without us ♪\n- Oh!", "\n- Ohh!", "\nYou know it!", "\n- That wasn't nice at all!", "\nThere was no compliments!", "\n- No.", "\n- Guys, it's a battle--\n- Felt pretty good!", "\n- Why would it be nice?", "\nIt's a battle, we're battling here.", "\n- Yeah, who said we\nwere doing compliments?", "\n- Like, I specifically asked\nif it was going to be a diss track!", "\nYou said, no, it is not a diss track!", "\n- It's a battle!", "\n- Prank!", "\n- Well, because it's the holidays,\nwe didn't wanna do that to you,\nso we're just gonna do what--\n- Okay, Agent R's up next, let's do this,\nhit the beat!", "\n- Yeah, but I, I can't freestyle!", "\nI just wrote it down--\n- It's fine, just read\nwhat's on your page.", "\n- I got this!", "\n- Okay.", "\n- Almost there, almost there.", "\n- I feel it.", "\n- I'm psyched,\nI'm psyched, I'm psyched.", "\n♪ Yo, Matt, you're some\nawesome and you look so good ♪\n♪ I 'd rather hang out with\nyou than the Red Hood ♪\n♪ You make it look easy,\nlike no big deals ♪\n♪ Your hair is always\ngiving me in the feels ♪\n♪ Alice, Alice, I don't know your name ♪\n♪ I got a tattoo of it, just the same ♪\n♪ You're the crush of my\nlife, I could never diss ♪\n♪ I can't wait 'til we have our first ♪\n♪ Kiss ♪\n- Ooh.", "\n- That didn't--\n- This is like the weirdest\nrap battle I've ever had.", "\n- I mean, this one didn't quite land!", "\n- Anyway, let's keep moving.", "\n- Yeah, whoo!", "\n- Hit the beat!", "\nWe call her AM!", "\n- [Team GMN] Go AM, go AM, go AM!", "\n- PM, PM, PM!", "\n- AM!", "\n♪ I'm still not finished,\nso don't take a bow ♪\n♪ Agent R's greatest\nweakness is milk from a cow ♪\n♪ You try too hard, but\nnever do your part ♪\n♪ Even your clean clothes\nstill smell like fart ♪\n♪ Agent S, Agent S, where are you? ", "♪\n♪ Oh yeah, you're spying\n'cause that's all you do ♪\n♪ You lost your job, you started a vlog ♪\n♪ But the only way you get\nviews is with Rebecca's dog ♪\n- Oh!", "\n- Ohh!", "\nWhoo!", "\n- [Team GMN] Oh, oh, oh, AM!", "\n- I need to correct something.", "\nThe only way we get views with the dogs?", "\nThat's not true, the last\nvideo just didn't do so well.", "\n- Why are you bringing that up?", "\n- Well, 'cause it wasn't true!", "\n- And DJ, hit that beat!", "\n- Go!", "\n- Agent S, go!", "\n- Yeah!", "\n- Don't choke!", "\n- Agent S on the track,\nAgent S on the track!", "\n♪ So you all think that I'm pretty cool ♪\n♪ I've just gotta-- ♪\n- Yeah, what?", "\n- Choke.", "\n- Choke, choke choke!", "\n- No, you got it, you got it,\nyou gotta go!", "\n- [Team GMN] Choke, choke, choke!", "\n- D'aww!", "\n- So easy, you guys, this\nrap battle is the best ever.", "\nWe're gonna win this.", "\nThis is pretty sad, actually.", "\n- But they're being mean!", "\n- I know they're being mean.", "\n- We thought they were gonna be nice!", "\nI just thought of nice things!", "\n- You know, you're still up,\nyou're pretty solid, right?", "\n- You're still up, you're solid.", "\n- Yeah, yeah, yes.", "\n- You gotta switch it.", "\n- Make it really mean!", "\n- All right, Rebecca's\nup next, hit that beat!", "\n- Choke!", "\n- Yeah, you choke!", "\n- Can't be worse than you guys!", "\n♪ I don't have to throw shade ♪\n♪ Because those glasses are cheaply made ♪\n♪ All you want is control ♪\n♪ But news to you, you'll\nnever be the lead role ♪\n♪ This is easy, never even started, ♪\n♪ Should've known better ♪\n♪ After he farted ♪\n♪ Agent S says he loves\nAlice, but it's not true ♪\n♪ Because I hear from my cousin, ♪\n♪ She's getting texts from you ♪\n- Whoa!", "\nOh!", "\n- I can explain, no,\nno, no, I can explain!", "\n- What up with that, Zamfam?", "\n- That was a burn.", "\n- It was a burn!", "\n- It was pretty good!", "\n- We still have our\nsecret weapon right here.", "\n- [Agent R] That's right!", "\n- Go Chandler!", "\n- It's Chambers!", "\n- Thank you.", "\n- Whatever.", "\n- DJ, drop that beat!", "\n- Oh.", "\n- All right.", "\n- You got it, you got it.", "\n- He's not a rapper, right?", "\n- Hit 'em where it hurts!", "\n♪ We can't be messed with,\nwe can't be botched ♪\n♪ Everyone at GMN is being watched ♪\n♪ Cloe, Veronica, Vanessa, Ro ♪\n♪ Sofie, Kurt, and there's more to go ♪\n- What?", "\n- Oh, that's, that's was good,\nthat was good, that was--\n- Wait, those are names of YouTubers.", "\nMy friends!", "\nThose are my friends that have YouTube Go.", "\n- Did you hear all those\nnames he just said?", "\n- Yeah, all of my YouTube\nfriends that have helped us,\nit's like they are the next target,\nthat's why we need to stop\nMr. X as soon as possible!", "\nI need to warn them, too!", "\nYou guys, you need to warn them--\n- Hey, hey, hey, guys.", "\n- Okay!", "\n- So we actually--\n- What was that?", "\n- We just found out who he was talking to,\nhe said he was talking to Mr. X.\nHe's going to Mr. X's office tomorrow.", "\n- Okay?", "\n- I'm thinking that we all\nneed to break in and split up\nand get as much information as possible.", "\n- Okay, so let's say you\nget us in and we split up,\nwhat do we do?", "\n- Well, I think your clones are--\n" ]
{ "pile_set_name": "YoutubeSubtitles" }
[ 0.031578947368421054, 0.047619047619047616, 0, 0, 0, 0, 0, 0, 0, 0, 0.005847953216374269, 0, 0, 0.015151515151515152, 0, 0, 0.03225806451612903, 0, 0, 0, 0, 0, 0, 0, 0.014705882352941176, 0, 0, 0, 0, 0, 0, 0, 0.017241379310344827, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.047619047619047616, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.005813953488372093, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.024390243902439025, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009009009009009009, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.008264462809917356, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.028846153846153848, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.014285714285714285, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.008, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.031746031746031744, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.013333333333333334, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009900990099009901, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.01694915254237288, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0045871559633027525, 0, 0, 0, 0.03125, 0, 0, 0, 0, 0.018518518518518517, 0, 0, 0, 0.02127659574468085, 0, 0, 0.014084507042253521, 0, 0, 0, 0, 0.07142857142857142, 0, 0, 0, 0, 0, 0, 0, 0.012738853503184714, 0.045454545454545456, 0, 0, 0, 0, 0, 0, 0, 0.009433962264150943, 0, 0, 0.02857142857142857, 0, 0, 0, 0, 0.02564102564102564, 0, 0, 0, 0, 0, 0, 0.045454545454545456, 0.025, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.05263157894736842, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.010752688172043012, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.013333333333333334, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.025, 0.011627906976744186, 0, 0, 0, 0, 0.034482758620689655, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.037037037037037035, 0, 0.0625, 0.030303030303030304, 0, 0, 0.0136986301369863, 0, 0.03125, 0, 0, 0, 0.029411764705882353, 0, 0, 0, 0, 0.05128205128205128, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.014705882352941176, 0, 0.014285714285714285, 0, 0, 0, 0, 0, 0.005208333333333333, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00847457627118644, 0, 0, 0, 0.013888888888888888, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.01694915254237288, 0, 0, 0, 0, 0, 0, 0, 0, 0.012345679012345678, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.018867924528301886, 0, 0.021739130434782608, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.013157894736842105, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.04, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009345794392523364, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.021739130434782608, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.041666666666666664, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02631578947368421, 0.003861003861003861, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.010309278350515464, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.012658227848101266, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.01282051282051282, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02127659574468085, 0, 0, 0, 0, 0, 0, 0.034482758620689655, 0, 0, 0, 0, 0, 0.06666666666666667, 0.058823529411764705, 0, 0, 0, 0, 0, 0, 0, 0, 0.024096385542168676, 0.010526315789473684, 0, 0.023255813953488372, 0, 0.013793103448275862, 0, 0, 0, 0, 0.017391304347826087, 0, 0, 0, 0 ]
0.002351
5
[ "// Code generated by go-swagger; DO NOT EDIT.", "\n\npackage models\n\n// This file was generated by the swagger tool.", "\n// Editing this file might prove futile when you re-run the swagger generate command\n\nimport (\n\tstrfmt \"github.com/go-openapi/strfmt\"\n\n\t\"github.com/go-openapi/errors\"\n\t\"github.com/go-openapi/swag\"\n\t\"github.com/go-openapi/validate\"\n)\n\n// FooDef foo def\n// swagger:model foo_def\ntype FooDef struct {\n\n\t// bar\n\t// Required: true\n\t// Min Length: 1\n\tBar *string `json:\"bar\"`\n\n\t// baz\n\t// Required: true\n\tBaz *int64 `json:\"baz\"`\n}\n\n// Validate validates this foo def\nfunc (m *FooDef) Validate(formats strfmt.", "Registry) error {\n\tvar res []error\n\n\tif err := m.validateBar(formats); err !", "= nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateBaz(formats); err !", "= nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.", "CompositeValidationError(res...)\n\t}\n\treturn nil\n}\n\nfunc (m *FooDef) validateBar(formats strfmt.", "Registry) error {\n\n\tif err := validate.", "Required(\"bar\", \"body\", m.Bar); err !", "= nil {\n\t\treturn err\n\t}\n\n\tif err := validate.", "MinLength(\"bar\", \"body\", string(*m.", "Bar), 1); err !", "= nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}\n\nfunc (m *FooDef) validateBaz(formats strfmt.", "Registry) error {\n\n\tif err := validate.", "Required(\"baz\", \"body\", m.Baz); err !", "= nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}\n\n// MarshalBinary interface implementation\nfunc (m *FooDef) MarshalBinary() ([]byte, error) {\n\tif m == nil {\n\t\treturn nil, nil\n\t}\n\treturn swag.", "WriteJSON(m)\n}\n\n// UnmarshalBinary interface implementation\nfunc (m *FooDef) UnmarshalBinary(b []byte) error {\n\tvar res FooDef\n\tif err := swag.", "ReadJSON(b, &res); err !", "= nil {\n\t\treturn err\n\t}\n\t*m = res\n\treturn nil\n}\n" ]
{ "pile_set_name": "Github" }
[ 0, 0, 0.0019880715705765406, 0, 0, 0, 0.010526315789473684, 0, 0.02702702702702703, 0, 0, 0, 0.011904761904761904, 0, 0.02702702702702703, 0.005494505494505495, 0.02097902097902098, 0.041666666666666664, 0 ]
0.007716
5
[ "@if \"%DEBUG%\" == \"\" @echo off\r\n@rem ##########################################################################\r\n@rem\r\n@rem Gradle startup script for Windows\r\n@rem\r\n@rem ##########################################################################\r\n\r\n@rem Set local scope for the variables with windows NT shell\r\nif \"%OS%\"==\"Windows_NT\" setlocal\r\n\r\n@rem Add default JVM options here. ", "You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.", "\r\nset DEFAULT_JVM_OPTS=\r\n\r\nset DIRNAME=%~dp0\r\nif \"%DIRNAME%\" == \"\" set DIRNAME=.\r\nset APP_BASE_NAME=%~n0\r\nset APP_HOME=%DIRNAME%\r\n\r\n@rem Find java.exe\r\nif defined JAVA_HOME goto findJavaFromJavaHome\r\n\r\nset JAVA_EXE=java.exe\r\n%JAVA_EXE% -version >NUL 2>&1\r\nif \"%ERRORLEVEL%\" == \"0\" goto init\r\n\r\necho.", "\r\necho ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH.", "\r\necho.", "\r\necho Please set the JAVA_HOME variable in your environment to match the\r\necho location of your Java installation.", "\r\n\r\ngoto fail\r\n\r\n:findJavaFromJavaHome\r\nset JAVA_HOME=%JAVA_HOME:\"=%\r\nset JAVA_EXE=%JAVA_HOME%/bin/java.exe\r\n\r\nif exist \"%JAVA_EXE%\" goto init\r\n\r\necho.", "\r\necho ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME%\r\necho.", "\r\necho Please set the JAVA_HOME variable in your environment to match the\r\necho location of your Java installation.", "\r\n\r\ngoto fail\r\n\r\n:init\r\n@rem Get command-line arguments, handling Windowz variants\r\n\r\nif not \"%OS%\" == \"Windows_NT\" goto win9xME_args\r\nif \"%@eval[2+2]\" == \"4\" goto 4NT_args\r\n\r\n:win9xME_args\r\n@rem Slurp the command line arguments.", "\r\nset CMD_LINE_ARGS=\r\nset _SKIP=2\r\n\r\n:win9xME_args_slurp\r\nif \"x%~1\" == \"x\" goto execute\r\n\r\nset CMD_LINE_ARGS=%*\r\ngoto execute\r\n\r\n:4NT_args\r\n@rem Get arguments from the 4NT Shell from JP Software\r\nset CMD_LINE_ARGS=%$\r\n\r\n:execute\r\n@rem Setup the command line\r\n\r\nset CLASSPATH=%APP_HOME%\\gradle\\wrapper\\gradle-wrapper.jar\r\n\r\n@rem Execute Gradle\r\n\"%JAVA_EXE%\" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% \"-Dorg.gradle.appname=%APP_BASE_NAME%\" -classpath \"%CLASSPATH%\" org.gradle.wrapper.", "GradleWrapperMain %CMD_LINE_ARGS%\r\n\r\n:end\r\n@rem End local scope for the variables with windows NT shell\r\nif \"%ERRORLEVEL%\"==\"0\" goto mainEnd\r\n\r\n:fail\r\nrem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of\r\nrem the _cmd.exe /c_ return code!", "\r\nif not \"\" == \"%GRADLE_EXIT_CONSOLE%\" exit 1\r\nexit /b 1\r\n\r\n:mainEnd\r\nif \"%OS%\"==\"Windows_NT\" endlocal\r\n\r\n:omega\r\n" ]
{ "pile_set_name": "Github" }
[ 0.028871391076115485, 0, 0.016722408026755852, 0.011764705882352941, 0, 0.02608695652173913, 0.019867549668874173, 0, 0.02608695652173913, 0.03056768558951965, 0.018556701030927835, 0.011111111111111112, 0.017391304347826087 ]
0.015925
5
[ "is the remainder when 72 is divided by 64?", "\n8\nCalculate the remainder when 446 is divided by 66.", "\n50\nCalculate the remainder when 3537 is divided by 236.", "\n233\nCalculate the remainder when 374 is divided by 44.", "\n22\nWhat is the remainder when 381 is divided by 77?", "\n73\nCalculate the remainder when 4102 is divided by 18.", "\n16\nWhat is the remainder when 271 is divided by 17?", "\n16\nCalculate the remainder when 170 is divided by 43.", "\n41\nWhat is the remainder when 1377 is divided by 458?", "\n3\nCalculate the remainder when 1098 is divided by 221.", "\n214\nCalculate the remainder when 2207 is divided by 48.", "\n47\nWhat is the remainder when 216 is divided by 76?", "\n64\nCalculate the remainder when 1581 is divided by 517.", "\n30\nWhat is the remainder when 521 is divided by 53?", "\n44\nWhat is the remainder when 1074 is divided by 106?", "\n14\nWhat is the remainder when 460 is divided by 101?", "\n56\nWhat is the remainder when 130 is divided by 23?", "\n15\nWhat is the remainder when 1018 is divided by 222?", "\n130\nWhat is the remainder when 6116 is divided by 36?", "\n32\nWhat is the remainder when 46 is divided by 14?", "\n4\nCalculate the remainder when 17 is divided by 7.", "\n3\nWhat is the remainder when 774 is divided by 38?", "\n14\nWhat is the remainder when 41 is divided by 28?", "\n13\nCalculate the remainder when 37 is divided by 31.", "\n6\nCalculate the remainder when 19 is divided by 10.", "\n9\nCalculate the remainder when 537 is divided by 357.", "\n180\nWhat is the remainder when 460 is divided by 52?", "\n44\nCalculate the remainder when 224 is divided by 49.", "\n28\nWhat is the remainder when 3030 is divided by 77?", "\n27\nWhat is the remainder when 121 is divided by 20?", "\n1\nCalculate the remainder when 55 is divided by 10.", "\n5\nWhat is the remainder when 132 is divided by 103?", "\n29\nCalculate the remainder when 87219 is divided by 178.", "\n177\nCalculate the remainder when 160 is divided by 7.", "\n6\nCalculate the remainder when 990 is divided by 71.", "\n67\nCalculate the remainder when 389 is divided by 2.", "\n1\nWhat is the remainder when 131 is divided by 38?", "\n17\nCalculate the remainder when 187 is divided by 64.", "\n59\nCalculate the remainder when 24335 is divided by 26.", "\n25\nWhat is the remainder when 768 is divided by 109?", "\n5\nCalculate the remainder when 4831 is divided by 44.", "\n35\nCalculate the remainder when 138 is divided by 18.", "\n12\nWhat is the remainder when 140 is divided by 20?", "\n0\nCalculate the remainder when 1080 is divided by 23.", "\n22\nCalculate the remainder when 5263 is divided by 195.", "\n193\nCalculate the remainder when 740 is divided by 12.", "\n8\nWhat is the remainder when 1067 is divided by 25?", "\n17\nWhat is the remainder when 238 is divided by 81?", "\n76\nCalculate the remainder when 26585 is divided by 11.", "\n9\nWhat is the remainder when 1515 is divided by 409?", "\n288\nCalculate the remainder when 179 is divided by 20.", "\n19\nCalculate the remainder when 582 is divided by 42.", "\n36\nCalculate the remainder when 8876 is divided by 222.", "\n218\nCalculate the remainder when 269 is divided by 45.", "\n44\nCalculate the remainder when 67 is divided by 40.", "\n27\nWhat is the remainder when 214 is divided by 57?", "\n43\nWhat is the remainder when 417 is divided by 84?", "\n81\nCalculate the remainder when 343 is divided by 35.", "\n28\nCalculate the remainder when 276 is divided by 34.", "\n4\nCalculate the remainder when 326 is divided by 236.", "\n90\nCalculate the remainder when 940 is divided by 28.", "\n16\nWhat is the remainder when 4678 is divided by 151?", "\n148\nWhat is the remainder when 775 is divided by 200?", "\n175\nCalculate the remainder when 1653 is divided by 7.", "\n1\nCalculate the remainder when 580 is divided by 7.", "\n6\nWhat is the remainder when 177 is divided by 61?", "\n55\nWhat is the remainder when 483 is divided by 120?", "\n3\nWhat is the remainder when 614 is divided by 6?", "\n2\nWhat is the remainder when 834 is divided by 226?", "\n156\nCalculate the remainder when 31 is divided by 19.", "\n12\nCalculate the remainder when 1324 is divided by 254.", "\n54\nWhat is the remainder when 614 is divided by 5?", "\n4\nCalculate the remainder when 19972 is divided by 235.", "\n232\nWhat is the remainder when 447 is divided by 15?", "\n12\nCalculate the remainder when 83 is divided by 10.", "\n3\nCalculate the remainder when 905 is divided by 2.", "\n1\nWhat is the remainder when 131 is divided by 56?", "\n19\nWhat is the remainder when 797 is divided by 42?", "\n41\nCalculate the remainder when 53 is divided by 14.", "\n11\nCalculate the remainder when 110 is divided by 28.", "\n26\nWhat is the remainder when 275 is divided by 23?", "\n22\nWhat is the remainder when 199 is divided by 62?", "\n13\nWhat is the remainder when 1775 is divided by 12?", "\n11\nCalculate the remainder when 1418 is divided by 49.", "\n46\nCalculate the remainder when 326 is divided by 7.", "\n4\nWhat is the remainder when 262 is divided by 19?", "\n15\nWhat is the remainder when 417 is divided by 21?", "\n18\nWhat is the remainder when 177 is divided by 39?", "\n21\nCalculate the remainder when 262 is divided by 40.", "\n22\nWhat is the remainder when 177 is divided by 45?", "\n42\nCalculate the remainder when 291 is divided by 3.", "\n0\nWhat is the remainder when 47 is divided by 26?", "\n21\nWhat is the remainder when 3124 is divided by 46?", "\n42\nWhat is the remainder when 486 is divided by 36?", "\n18\nWhat is the remainder when 215 is divided by 50?", "\n15\nCalculate the remainder when 3037 is divided by 45.", "\n22\nWhat is the remainder when 265 is divided by 14?", "\n13\nCalculate the remainder when 73 is divided by 5.", "\n3\nCalculate the remainder when 7369 is divided by 21.", "\n19\nWhat is the remainder when 1241 is divided by 15?", "\n11\nCalculate the remainder when 408 is divided by 18.", "\n12\nWhat is the remainder when 3087 is divided by 769?", "\n11\nCalculate the remainder when 4750 is divided by 99.", "\n97\nWhat is the remainder when 826 is divided by 23?", "\n21\nCalculate the remainder when 1234 is divided by 19.", "\n18\nWhat is the remainder when 135 is divided by 39?", "\n18\nCalculate the remainder when 228 is divided by 47.", "\n40\nWhat is the remainder when 71 is divided by 28?", "\n15\nCalculate the remainder when 927 is divided by 88.", "\n47\nCalculate the remainder when 1738 is divided by 5.", "\n3\nCalculate the remainder when 200 is divided by 71.", "\n58\nCalculate the remainder when 191 is divided by 16.", "\n15\nCalculate the remainder when 80 is divided by 17.", "\n12\nWhat is the remainder when 705 is divided by 102?", "\n93\nCalculate the remainder when 180 is divided by 7.", "\n5\nCalculate the remainder when 1189 is divided by 32.", "\n5\nCalculate the remainder when 44 is divided by 21.", "\n2\nCalculate the remainder when 37 is divided by 30.", "\n7\nCalculate the remainder when 264 is divided by 84.", "\n12\nCalculate the remainder when 143 is divided by 141.", "\n2\nWhat is the remainder when 721 is divided by 28?", "\n21\nCalculate the remainder when 2096 is divided by 100.", "\n96\nCalculate the remainder when 1554 is divided by 12.", "\n6\nWhat is the remainder when 2173 is divided by 198?", "\n193\nWhat is the remainder when 259 is divided by 26?", "\n25\nWhat is the remainder when 407 is divided by 12?", "\n11\nWhat is the remainder when 143 is divided by 18?", "\n17\nCalculate the remainder when 675 is divided by 238.", "\n199\nWhat is the remainder when 1571 is divided by 5?", "\n1\nCalculate the remainder when 776 is divided by 253.", "\n17\nWhat is the remainder when 83 is divided by 6?", "\n5\nCalculate the remainder when 12878 is divided by 112.", "\n110\nWhat is the remainder when 11547 is divided by 15?", "\n12\nWhat is the remainder when 19852 is divided by 55?", "\n52\nWhat is the remainder when 900 is divided by 17?", "\n16\nCalculate the remainder when 2379 is divided by 17.", "\n16\nCalculate the remainder when 5718 is divided by 104.", "\n102\nWhat is the remainder when 573 is divided by 14?", "\n13\nWhat is the remainder when 257 is divided by 71?", "\n44\nCalculate the remainder when 53 is divided by 27.", "\n26\nCalculate the remainder when 39 is divided by 20.", "\n19\nCalculate the remainder when 98 is divided by 25.", "\n23\nCalculate the remainder when 1256 is divided by 34.", "\n32\nWhat is the remainder when 489 is divided by 13?", "\n8\nWhat is the remainder when 2780 is divided by 103?", "\n102\nWhat is the remainder when 227 is divided by 95?", "\n37\nWhat is the remainder when 2558 is divided by 8?", "\n6\nCalculate the remainder when 1271 is divided by 24.", "\n23\nCalculate the remainder when 123 is divided by 15.", "\n3\nWhat is the remainder when 180 is divided by 48?", "\n36\nWhat is the remainder when 7057 is divided by 236?", "\n213\nWhat is the remainder when 45 is divided by 40?", "\n5\nCalculate the remainder when 101 is divided by 26.", "\n23\nWhat is the remainder when 177 is divided by 94?", "\n83\nCa" ]
{ "pile_set_name": "DM Mathematics" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Švehlík\n\nŠvehlík (feminine Švehlíková) is a Czech and Slovak surname. ", "Notable people with the surname include:\n Aleš Švehlík, Czech paralympic athlete\n Alois Švehlík, Czech actor\n David Švehlík, Czech actor\n Ján Švehlík, Slovak footballer\n\nCategory:Czech-language surnames\nCategory:Slovak-language surnames" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.014285714285714285, 0.00847457627118644 ]
0.01138
5
[ "Come, Let’s Check in on Melania Trump’s Native Slovenia\n\nOn the eve of this especially eventful American election, perhaps you were wondering, as we were, how Melania Trump’s native Slovenia is dealing with the possibility of the ascent of one of their own to the prestigious position of first lady of the United States.", "\n\nThe answer, based on our reporting, is a motley mix of “not well”; “why are you asking me this question?” ", "and “we have our own issues but overall, Slovenia is fine, thanks.”", "\n\nLara Kobe, a resident of capital city Ljubljana, did not feel she had enough information to have an opinion of Melania Trump. “", "But from what I’ve heard from people in different circles about this,” she added, “I can conclude that Slovenians see Melania more as a shame than as a respected person.”", "\n\n“It’s quite obvious,” said Tamara Juricic, who works in Glasgow but hails from the small Slovenian city of Lasko, “that she doesn’t have any experience, even diplomatic experience.”", "\n\nThat kind of experience, Juricic noted, might be helpful to have as first lady. ", "Juricic made clear she does not want to judge Melania Trump but said if the former model becomes first lady, she’ll need to embrace a few changes: namely, temper her tendency to stay in the background, and also tackle what Juricic called the “the plagiarism issue.” ", "She was referring to Trump’s rather liberal use of a portion of Michelle Obama’s 2008 Democratic National Convention speech without attributing it in her own address at the 2016 GOP National Convention.", "\n\nThat “was really bad. ", "It put Slovenia in a bad light,” Juricic said. (", "Are you proud of yourselves, American outlets that said Trump plagiarized because she is Eastern European?)", "\n\nAll right, so Melania Trump has stumbled. ", "But she’s still Slovenian. ", "Why is Hillary Clinton 30 percent more popular with Melania Trump’s former countrymen?", "\n\n“Because no one in Slovenia likes Donald Trump,” said Juricic. (", "Donald Trump does have at least two fans from Slovenia: his wife (presumably), and also Slovenia’s most famous philosopher, Slavoj Zizek). ", "If Melania were married to someone who reflected more positively on the country, Juricic said, Slovenia might be more supportive.", "\n\nOthers do not feel Melania Trump has reflected on the country either way. ", "When asked if global attention to or perception of Slovenia had changed over the course of this presidential election seasion, a press representative from Slovenia’s Ministry of Foreign Affairs sounded nonplussed, and said no one from America had asked him such a thing. “", "It’s hard to answer from Ljubljana,” said Rok Hren (He also suggested that we speak instead to the Slovenian Embassy in Washington — even though it was the embassy that directed us to the gentleman from the press office at Slovenia’s Ministry of Foreign Affairs.)", "\n\nWhile Slovenia, like the rest of the world, is attuned to the American elections, there are other concerns on the country’s collective mind. ", "Melania Trump said in an address last week that she considers cyberbullying to be the issue most deserving of her first lady focus (yes, yes, we know she is married to Donald Trump, but let us keep our focus on Slovenia, and not give into the distraction of irony).", "\n\nBut what, we wondered, matters to the people of Slovenia today?", "\n\nA Slovenian citizen who asked not to be identified said the key issue of the day is immigration—Slovenia, after all, is at the southernmost edge of the Schengen zone. ", "Hren, at the Ministry of Foreign Affairs, agreed Europe’s “migration crisis” is an issue for the country, but said Slovenia was also concerned with creating a “green economy.” (", "That it is — just last week the London-based Legatum Institute said Slovenia is “the best at using nature to improve the well-being of its citizens.”) ", "Hren also lauded the current government in Ljubljana on “the improvement of public finance” and said it was working to decrease “administrative obstacles” to local and foreign investment.", "\n\nJuricic also named this last point as one of the pressing problems in Slovenia, but said “political parties still live in the past, and haven’t moved past issues that happened 70 years ago … and I would say that it’s really difficult to establish long term or sustainable alternatives to major political parties.”", "\n\nOn this, America understands Slovenia all too well.", "\n\nPhoto credit: Chip Somodevilla/Getty Images" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.00625, 0, 0, 0.015503875968992248, 0, 0.01639344262295082, 0.012195121951219513, 0.011278195488721804, 0.009900990099009901, 0, 0.020833333333333332, 0.009345794392523364, 0.022727272727272728, 0, 0.011627906976744186, 0.030303030303030304, 0.014388489208633094, 0.007751937984496124, 0.013157894736842105, 0.003676470588235294, 0.011406844106463879, 0, 0.0037735849056603774, 0, 0.005917159763313609, 0.005649717514124294, 0.006622516556291391, 0, 0.0031746031746031746, 0, 0.022222222222222223 ]
0.008519
5
[ "Men's Clothing on SaleBuild your wardrobe with our men’s clothing on sale. ", "Versatile, sophisticated, and easy to wear, our classic Theory styles and seasonal updates are now available at reduced prices. ", "Whether cut from Swiss-engineered stretch nylon twill or premium Italian wool, all our men’s sale suits, shirts, pants, coats, cashmere sweaters, and more are designed to work seamlessly with the previous season’s pieces so that our customers can build complete, timeless working wardrobes. ", "Every detail in our men’s jackets on sale is considered and our commitment to design, fit, and construction ensure exceptional comfort.", "\n\nCookies Usage\n\nBy continuing your visit to this site, you accept the use of cookies or similar technologies to provide you with the best services and offers adapted to your interests, for web analytics and for a more secure experience on our website. ", "We sometimes share cookies data with third parties." ]
{ "pile_set_name": "Pile-CC" }
[ 0.013333333333333334, 0.0078125, 0, 0, 0, 0 ]
0.003524
5
[ "Endoscopic ultrasound-guided drainage of abdominal abscesses and infected necrosis.", "\nTraditionally abdominal abscesses have been treated with either surgical or radiologically guided percutaneous drainage. ", "Surgical drainage procedures may be associated with considerable morbidity and mortality, and serious complications may also arise from percutaneous drainage. ", "Endoscopic ultrasound (EUS)-guided drainage of well-demarcated abdominal abscesses, with adjunctive endoscopic debridement in the presence of solid necrotic debris, has been shown to be feasible and safe. ", "This multicenter review summarizes the current status of the EUS-guided approach, describes the available and emerging techniques, and highlights the indications, limitations, and safety issues." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0.005154639175257732 ]
0.001031
5
[ "Intravascular papillary endothelial hyperplasia (Masson's tumour) of the oral mucosa.", "\nIntravascular papillary endothelial hyperplasia (IPEH) is an unusual benign vascular lesion that is caused by an excessive proliferation of endothelial cells in blood vessels. ", "These lesions are benign and therefore have an excellent prognosis and are usually cured by simple excision. ", "Recurrences are extremely rare. ", "IPEH has been rarely described in the oral region and in this case report we will outline an uncommon presentation and discuss pathogenesis, differential diagnosis and histopathological aspects. ", "The purpose of this report is to alert clinicians to consider this unusual lesion when formulating a differential diagnosis of an enlarging blue oral mucosal lesion." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.011764705882352941, 0, 0, 0, 0, 0 ]
0.001961
5
[ "Guided by Hegel’s claim that rights are actual only with the modern state, and noting that the “abstract spirit of Kant’s cosmopolitanism” is pervasive in Carol Gould’s Globalizing Democracy and Human Rights, Schaff raises a variety of moral, political, and ontological objections to her account of rights. ", "Most controversially, he argues that if we embrace with Gould the idea that people have rights even if their political community does not grant them, we may play into the hands of imperial aggression cloaked in human rights language—as exemplified by the justificatory rhetoric of the U.S. in support of its recent interventions and its ongoing occupation of Iraq. [", "Abstract prepared by the Editors.]" ]
{ "pile_set_name": "Pile-CC" }
[ 0.016286644951140065, 0.00273224043715847, 0 ]
0.00634
5
[ "Mousa Dembele clashed with Diego Costa on Monday night\n\nMousa Dembele will accept an FA charge for violent conduct for his alleged eye gouge on Diego Costa.", "\n\nHowever, the midfielder and Tottenham are set to contest the possibility of him receiving more than a three-game ban, according to Sky sources.", "\n\nDembele was charged over an incident involving Chelsea's Costa which was missed by officials during Monday's 'Battle of the Bridge'.", "\n\nMauricio Pochettino clashes with the Chelsea bench during the fractious game on Monday night\n\nChelsea and Spurs have also been charged by the FA with three breaches of failing to control their players during the Monday Night Football encounter, which saw the home side come back from two goals down to secure a 2-2 draw and end Tottenham's chances of winning the Premier League.", "\n\nSpeaking ahead of the Super Sunday clash with Southampton, manager Mauricio Pochettino said: \"If you play with your friends, you play for honour or for beer or food, you want to win.", "\n\n\"Sometimes when you run a lot and you are under stress, you can cross the line. ", "Mousa knows if you cross the line, you need to pay, but this can happen in football. ", "We cannot justify, but we can understand.\"", "\n\nThe players confront each other at Stamford Bridge\n\nThe FA indicated earlier this week that the standard three-match suspension for violent conduct would be a 'clearly insufficient' punishment - something Sky sources understand Spurs would challenge.", "\n\nAn FA statement said: \"It is alleged the player's behaviour constituted violent conduct in circumstances where the standard punishment of three matches that would otherwise apply is clearly insufficient.", "\n\nTottenham head coach Mauricio Pochettino says he understands Mousa Dembele's actions but doesn't condone it Tottenham head coach Mauricio Pochettino says he understands Mousa Dembele's actions but doesn't condone it\n\n\"Off the ball incidents which are not seen at the time by the match officials are referred to a panel of three former elite referees.", "\n\n\"Each referee panel member will review the video footage independently of one another to determine whether they consider it a sending-off offence.", "\n\n\"For retrospective action to be taken, and an FA charge to follow, the decision of the panel must be unanimous.\"", "\n\nChelsea and Spurs have both been charged for three breaches of FA Rule E20 for failing to control their players and/or officials.", "\n\nThe FA charges come after incidents in the 45th and 87th minutes and also at the end of the game at Stamford Bridge and both clubs have until 6pm on Monday, May 9 to respond to their charge." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.019230769230769232, 0.006896551724137931, 0.007462686567164179, 0.013157894736842105, 0.005434782608695652, 0, 0.011764705882352941, 0, 0.003968253968253968, 0, 0.017045454545454544, 0, 0, 0.015267175572519083, 0 ]
0.006682
5
[ "The predictive and prognostic role of phosphatase phosphoinositol-3 (PI3) kinase (PIK3CA) mutation in HER2-positive breast cancer receiving HER2-targeted therapy: a meta-analysis.", "\nThe association between PIK3CA mutation and resistance to anti-HER2 therapy (AHT) is not precisely defined. ", "This meta-analysis intended to explore the clinical utility of PIK3CA mutation in HER2-positive breast cancer treated with AHT. ", "Literature search identified 19 eligible studies. ", "There were 1720 patients with advanced, 828 with early and 1290 patients treated in the neoadjuvant setting. ", "In metastatic breast cancer, AHT showed no differential objective response benefit between the wild type (WT) and the mutated type (MT) PIK3CA subgroups (odds ratio [OR] = 1.09; 95 % CI 0.60-2.00; P = 0.78). ", "AHT favorable affected progression-free survival (PFS) irrespective of PIK3CA mutation. ", "There was no PFS difference between WT and MT regardless of the offered therapy. ", "In early breast cancer, trastuzumab combined with the same chemotherapy conferred consistent relapse-free survival benefit in WT and MT subgroups (WT: HR = 0.59; 95 % CI 0.44-0.80; P < 0.001 vs. MT: HR = 0.42; 95 % CI 0.24-0.74; P < 0.001). ", "In the neoadjuvant setting, AHT-based therapy produced a 72 % higher pathologic complete response (pCR) rate in WT as compared with that in MT PIK3CA tumors (OR = 1.72; 95 % CI 1.29-2.13; P < 0.001). ", "In that setting, there was no disease-free or overall survival difference based on PIK3CA mutational status. ", "In this meta-analysis, AHT did not achieve differential benefit according to PIK3CA mutation in HER2-positive metastatic or early breast cancer; however, in the neoadjuvant setting, patients harboring WT PIK3CA tumors attained a higher pCR rate." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.00558659217877095, 0, 0, 0, 0, 0.009615384615384616, 0.022727272727272728, 0.012345679012345678, 0.016597510373443983, 0, 0.009174311926605505, 0 ]
0.006337
5
[ "Ennada\n\nEnnada is a genus of moths in the family Geometridae.", "\n\nSpecies\n Ennada blanchardi\n Ennada flavaria Blanchard, 1852\n Ennada pellicata (Felder & Rogenhofer 1875)\n\nReferences\n Revision of the genus Ennada Blanchard (Lepidoptera:Geometridae), 2009\n Ennada at Markku Savela's Lepidoptera and Some Other Life Forms\n Natural History Museum Lepidoptera genus database\n\nCategory:Larentiini" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0, 0.01529051987767584 ]
0.007645
5
[ "Q:\n\nChromium on Raspberry Pi B w/ Raspbian Jessie\n\nI have a Raspberry Pi 1, and I would like to install Chromium for my cloud print server. ", "The only trouble is that sudo apt-get install chromium-browser does not work. ", "Additionally, I tried a method for installing Chromium on RPI, but it was for RPI2 only. ", "I am a noob, and I was wondering whether it is possible to get Chromium on Raspbian Jessie on Raspberry Pi 1. ", "Thank you.", "\n\nA:\n\nChromium can now be downloaded and installed (with sudo apt install chromium-browser) , and now comes preinstalled on PIXEL desktop environment, but it does struggle to load pages on the small power of earlier Raspberry Pi models, however the model 4B (and to some extent the 3B+ and 3B), can load pages much faster.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.014285714285714285, 0, 0.011235955056179775, 0.01818181818181818, 0, 0.003105590062111801, 0 ]
0.006687
5
[ "This campaign included 8 bloggers, each producing a dish and a recipe video, with the intention of expanding the brand in Canada.", "\n\nTo help Vitamix with the Ascent Series launch, 12 bloggers worked together to make creative recipes to share.", "\n\nThe powerful part of these campaigns is the cross-promotion. ", "Our influencers love the support they receive from each other, so are happy to step up and help promote everyone else’s posts. ", "This means the reach is amplified, and everyone’s work has more traction." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.009009009009009009, 0, 0, 0 ]
0.001802
5
[ "Buy it... if you have some extra money to spend on a lovable,\nlightweight score for a comedy classic.", "\n\nAvoid it... if you haven't been charmed by the film or you have\nnightmares about encountering the famous walking piano in a toy store\nand hearing the catchy \"Heart and Soul\" tune on its flashing keys.", "\n\nEDITORIAL REVIEW\n\nFILMTRACKS TRAFFIC RANK: #371\n\nWRITTEN\n3/9/03, REVISED 11/9/08\n\nBUY IT\n\nFilmtracks has no record of commercial ordering options for this title. ", "However, you can search for this title at online soundtrack specialty outlets.", "\n\nShore\n\nBig: (Howard Shore) How delightful it is that a\nlovable film like Big could change so many careers. ", "It was a\nwatershed event for both actor Tom Hanks and director Penny Marshall,\nand, to an extent, it helped expand notice for a somewhat obscure\ncomposer at the time named Howard Shore. ", "Never expected to be a hit\nsuccess, Big was the kind of affable film that grew out of word\nof month until it stormed through the awards season of 1988-1989 with a\nwealth of praise spread around to the entire production team. ", "Hanks\nplays the adult incarnation of a boy who longs simply to \"be big\" and\nreceives his magically granted wish from an amusement park machine.", "\nWhile stuck in Hanks' adult body, the boy becomes successful in the toy\nindustry and even teaches a romantic interest how to regain her inner\nchild as well. ", "It was a perfect merging of the romantic comedy and\nscience fiction and fantasy genres, and Hanks' performance alone\ncontributed greatly to the $17 million production's ability to earn $115\nmillion domestically. ", "Howard Shore was still leagues away from his blast\ninto the mainstream with the Lord of the Rings films in the\n2000's and the plethora of dark thrillers that defined his earlier\ncareer in the 1990's. ", "For people who became familiar with Shore mainly\ndue his efforts in the horror and suspense genre (Silence of the\nLambs, Crash, Seven, etc), hearing Big once\nagain may surprise you. ", "Veteran film music fans had always recognized\nBig, though, as one of the more noteworthy unreleased works on CD\nof the 1980's and 1990's. ", "Shore's creative job of scoring the romance of\nthe story alongside the adaptation of outside music for the most\nmemorable scenes in the film was not lost on many who enjoyed\nBig. ", "The highlight of the film (and arguably a classic scene in\nthe history of cinema) is the \"Toy Store Walking Piano\" dance in a New\nYork store that playfully adapts Hoagy Carmichael and Frank Loesser's\nfamous \"Heart and Soul\" theme from the perspective of a child in a grown\nman's body. ", "Anyone who has ever taken piano lessons in their life\nundoubtedly remembers this infectious tune and thus its use in the film\nis extremely memorable.", "\n\nWhile \"Heart and Soul,\" which is translated into a\nfabulously swinging and accelerating, larger ensemble performance by\nShore for the \"End Titles\" of the film, steals the hearts of most\naudience members, Shore's score is a more diverse composition than you\nmight expect. ", "His task included the realistic merging of music for the\nconcepts of light romance, New York, boyhood fun, and, of course, a\ncreepy carnival. ", "The result of his efforts may not be overwhelming for\nthe listener, but Shore adequately hits every note, standing on set\nduring the shooting of the film and repeatedly rescoring scenes until\nthe desired effect was achieved. ", "The light jazz band tones, orchestral\nromance, and thematic adaptations are all well performed, though they\nnever lose sight of the genre of hopelessly optimistic comedy for which\nthey were written. ", "Thus, Big is a lightweight score with a\ntremendous heart. ", "The piano is the central element of the work,\nperforming a central theme for the boy that accomplishes two interesting\nfeats; first, the theme alternates between major and minor keys in its\nself-answering phrases (pitting boyhood against adulthood) and, second,\nstarting with a simple four-note motif and expanding it in length as the\nboy quickly learns about adult life. ", "Even as presented finally on a\ngenerous, hour-long album by Varèse Sarabande, it is difficult to\ntake Big seriously, though judging from the alternate takes,\nShore did originally have a more dramatic score in mind, including some\nchoral layers for a sense of wonderment in \"Waking Up\" and \"Visiting\nHome.\" ", "While some of the magic transfers over from the film onto the\nalbum, don't expect to be blown away by the soundtrack by itself. ", "The\nalbum is a Club release, with only 3,000 in circulation, and unless you\nare swept away by light comedy efforts (and, in this case, a desire to\nhear that walking piano in full glory), then think twice before putting\nthis album on your shelf next to your other Shore albums. ", "It's a\ncontemporary score with pleasant themes and an often playful attitude,\nbut be sure to hear the score in the film before investing in the\nhigher-priced limited album. ", "For others, though, the album was\nguaranteed to scratch another much needed score off of that CD want\nlist, and, unlike most other major modern titles in Varèse's Club\nseries, Big didn't sell out within the first six years of its\nrelease. ***", "@Amazon.com: CD or\nDownload\n\nBias Check:\n\nFor Howard Shore reviews at Filmtracks, the average editorial rating is 3.56\n(in 25 reviews)and the average viewer rating is 3.27\n(in 97,496 votes). ", "The maximum rating is 5 stars." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.006097560975609756, 0, 0.009174311926605505, 0.016129032258064516, 0, 0, 0.006329113924050633, 0.0047169811320754715, 0.01, 0.005494505494505495, 0, 0, 0.010526315789473684, 0, 0.003663003663003663, 0, 0.0044444444444444444, 0, 0, 0, 0.0032679738562091504, 0, 0.007220216606498195, 0, 0.004132231404958678, 0.010471204188481676, 0 ]
0.003506
5
[ "Pasul înapoi făcut de puterea PSD-ALDE, după ce zile la rând sute de mii de români au protestat pe străzi: Guvernul Grindeanu a adoptat și publicat o ordonanță de urgență prin care s-a abrogat întru totul mult contestata OUG 13, care, prin modificarea legislației penale, îi salva de răspunderea penală pe politicienii cu funcții publice. ", "Însă, ordonanță de abrogare poate fi respinsă de Parlament, astfel mult hulita Ordonanță 13 poate intra în vigoare.", "\n\nPotrivit expunerii de motive, OUG 13 se abrogă din cauza protestelor din stradă, “pe fondul tensiunilor create”, deoarece “există un pericol real de dezbinare a societății”, iar “tensiunile existente pot fi înlăturate prin abrogarea expresă și imediată a acelor texte care au suscitat reacții masive”.", "\n\nS-au abrogat toate modificările făcute la Codul penal care urmau a intra în vigoare vineri, iar modificările din Codul de procedură penală, care intraseră în vigoare din momentul publicării OUG 13, au fost eliminate, textele vechi reintrând în vigoare de astăzi.", "\n\nCitește și: Judecătorul Cristi Danileţ, despre abrogarea Ordonanţei 13: OUG de abrogare conţine un articol neconstituţional\n\nCitește și: Cacealma. ", "Ce ascunde pasul înapoi făcut de PSD și Liviu Dragnea | ANALIZĂ\n\nLiviu Dragnea, președintele PSD, al Camerei Deputaților și șeful real al Guvernului, a anunțat că îi propune premierului să abroge Ordonanța 13, prin care s-a modificat legislația penală în folosul politicienilor penali. ", "Motivul: nu vrea război social. ", "Minciună! ", "În realitate, Avocatul Poporului, juristul Victor Ciorbea, i-a arătat lui Dragnea greșelile de neconstituționalitate din textul redactat de oamenii ministrului Justiției Florin Iordache. ", "Așa a aflat Dragnea că nu-i poate trece ordonanța de Curtea Constituțională, cu toate că majoritatea judecătorilor sunt apropiați de PSD. ", "Dacă lasă ordonanța să parcurgă traseul judecății la CCR, adică alte cel puțin cinci zile de proteste masive în Capitală și țară, Dragnea și PSD nu au decât de pierdut. ", "Încrederea propriilor alegători, altădată captivi ai PSD, se va prăbuși. ", "Așa că Dragnea a ales o retragere strategică... citește mai departe aici...\n\nÎn privința modificărilor Codului Penal prin OUG 13, NU sunt consecințe juridice deoarece NU au fost în vigoare.", "\n\nModificările făcute în Codul de Procedură, deși au fost în vigoare câteva zile, nu au nici ele consecințe juridice pentru dosarele mai vechi deoarece în materia procedurală nu se aplică principiul legii mai favorabile. ", "Așa că denunțurile din dosarele Microsoft, spre exemplu, rămân valabile.", "\n\nDoar denunțurile făcute în cele câteva zile cât a fost în vigoare ordonanța nu sunt valabile decât pentru fapte săvârșite în urmă cu cel mult șase luni. ", "Cei care au făcut denunțuri în aceste zile pentru fapte cu o vechime mai mare de șase luni, pot să le depună din nou, mâine, și ele vor fi luate în considerarea pentru declanșarea urmăririir penale deoarece pentru Codul de Procedură Penală nu funcționează principiul legii mai favorabile.", "\n\nReamintim că prin OUG 13 era golită de conținut infracțiunea de abuz în serviciu, era dezincriminată neglijența în serviciu și favorizarea făptuitorilor, dacă favorizarea era săvârșită de cei care emit acte normative (demnitari, miniștri etc). ", "Plus că erau exonerate de pedepse și rudele, până la afini de gradul al II-lea.", "\n\nAltfel spus, politicienii de la conducerea țării nu puteau fi anchetați pentru infracțiuni de serviciu.", "\n\nMai este un proiect de lege controversat, cel al grațierii, care nu a fost adoptat prin ordonanță de urgență, ci a fost trimis ca proiect spre dezbatere în Parlament. ", "Și acest text de lege este controversat deoarece grațiază pedepse până la cinci ani închisoare de care beneficiază în special politicienii condamnați.", "\n\nCitește și: FOTO+VIDEO LIVE. ", "Aproximativ 5.000 de oameni protestează în fața Guvernului. ", "Cabinetul Grindeanu a abrogat Ordonanța 13: Abrogarea, necesară în urma ”susținerii ideilor prin manifestații publice”. ", "Contramanifestație cu 1.000 de persoane, care cer demisia președintelui, la Cotroceni\n\nStenograma. ", "În trei replici, Guvernul Grindeanu modifică politica penală, ca în totalitarism\n\nModificarea legilor penale s-a făcut în timp record, prin trei replici.", "\n\nPremierul Grindeanu : Aveți toate avizele, dle ministru?", "\n\nMinistrul Justiției: Da.", "\n\nPremierul: Dacă există obiecții? ", "Dacă nu, este adoptat!", "\n\nDe ce trebuie să demisioneze întregul Guvern Grindeanu\n\nCe a provocat ieșirea în stradă a sute de mii de români? ", "Faptul că două ordonanțe de urgențe au fost făcute în secret și urmau a fi adoptate și publicate în Monitorul Oficial tot în secret. ", "Jocurile au fost stricate de prezenta președintelui României la ședința de Guvern cu pricina, din data de 18 ianuarie 2017. ", "Ulterior, simulând consultarea publică, ministrul Justiției a discutat cu membrii Consiliului Superior al Magistraturii și cu asociațiile profesionale din Justiției, care au fost împotriva modificărilor Codului Penal si ale Codului de Procedură Penală . ", "Ministrul a simulat și o consultare publică. ", "A promis că va ține cont de obiecții și va ajusta textele actelor normative conform cu propunerile făcute.", "\n\nApoi, atât ministrul Justiției, cât și premierul Grindeanu au promis că nu vor publica forma finală a textelor fără a le face publice și a se consulta, din nou, public. ", "Nu s-au ținut de promisiune. ", "Au trimis seara textul final CSM-ului, mimând consultarea, și în aceeași seară, pe la ora 21.00, au adoptat actele normative, iar după miezul nopții le-au publicat în Monitorul Oficial. ", "Fără a aștepta avizul CSM-ului, impus de lege.", "\n\nÎn sedința de Guvern, potrivit stenogramelor făcute publice, ministrul Justiției l-a mințit pe premier, susținând că are toate avizele, adică și avizul CSM.", "\n\nDupă declanșarea scandalului public, soldat cu manifestațiile maraton în toată țara, premierul a spus că responsabilitatea este a ministrului Justiției. ", "S-a înțeles că îl va demite pe ministrul Iordache. ", "Nu a făcut-o. Firesc ar fi fost ca întregul Guvern Grindeanu să-și dea demisia.", "\n\nCine pe cine și pe ce dă vina\n\nPesediștii dau vina pe lipsa de comunicare. ", "De asemenea, se caută precedente exterioare demersului lor: PSD invocă faptul că fostul ministru al Justiției, Raluca Prună, din guvernul tehnocrat condus de Dacian Cioloș, a modificat legea penală tot prin ordonanță de urgență. ", "Iar Guvernul Grindeanu nu a făcut altceva decât să copieze precedentul.", "\n\nÎnsă, fostul ministru al Justiției, Raluca Prună a făcut modificări strict impuse de Curtea Constituțională și Directivele europene, cu avizele Consiliului Superior al Magistraturii, fără a adăuga și alte modificări, justificând, astfel, urgența emiterii actului normativ (OUG 18/2016)\n\nSpre deosebire de Raluca Prună, actualul ministru Iordache a adaugat multe alte modificări ale codurilor penale, care nu apar în decizii CCR, precum reducerea pedepsei pentru abuz în serviciu de 7 ani închisoare la 3 ani, dezincriminarea neglijenței în seviciu (din categoria infracțiunilor de serviciu), dezincriminarea favorizării faptuitorului de către politicieni, protejarea de răspunderea penală a rudelor politicienilor cu funcții, până la afinii de gradul al II-lea, impunitatea pentru emiterea actelor normative fără respectarea legii (din categoria infracțiunilor contra Justiției).", "\n\nMinciuni de genul că abuzul în serviciu este o infracțiunea stalinistă, cum susțin unii lideri PSD, au stârnit revolte deoarece această infracțiune se regăsește în convenția ONU, în legislația țărilor europene. ", "Spre exemplu, în Franța abuzul în serviciu cu consecințe juridice este pedepsit cu 10 ani închisoare și amendă de 150.000 de euro, iar abuzul fără consecințe - cu 3 ani închisoare și amendă de 75.000 de euro. ", "La noi, PSD a vrut să incrimineze abuzul in serviciu cu doar 3 ani si numai si numai dacă prejudiciul depășește 200.000 de lei ( In varianta inițială au mai pus o condiție aberantă: plângerea prealabilă, făcând imposibilă declanșarea urmăririi penale).", "\n\nChiar dacă OUG 13 a fost abrogată cu o altă ordonanță (în care Guvernul Grindeanu a strecurat și o greșeală: menținerea unui alineat declarat neconstituțional de CCR), PSD a anunțat că nu renunță la modificarea legislației penale. ", "Pentru a le legifera, PSD va încerca să repună pe rol, în Parlament, textele care modifică infracțiunile de serviciu, așa cum își doresc penalii. ", "În fond, e vorba de libertatea pesediștilor cu dosare penale care riscă o condamnare cu executare, cum este liderul Liviu Dragnea. ", "Și pentru a-i salva de pușcărie și de confiscarea averii pe penali, conducătorii PSD sunt capabili să ignore sutele de mii de români din stradă.", "\n\nCum poate puterea să impună ca lege în vigoare textele din OUG 13, care îi feresc de răspunderea penală pentru infracțiunile de serviciu și pentru cele contra Justiției\n\nParlamentarii PSD - ALDE pot repune în legislație actele normative care îi ajută pe penali să scape de răspunderea penală pentru infracțiunile de serviciu și cele contra Justiției prin două modalități. ", "Prima modalitate: Parlamentul respinge Ordonanței 14 , care abrogă ordonanța salvatoare pentru penali, astfel că lasă în vigoare textele de lege hulite de sute de mii de oameni; a doua: printr-un nou text de lege care să fie votat de Parlament." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.008849557522123894, 0.008695652173913044, 0, 0.003787878787878788, 0.020134228187919462, 0.024475524475524476, 0, 0, 0.016042780748663103, 0.014492753623188406, 0.023668639053254437, 0.0273972602739726, 0.021164021164021163, 0.013574660633484163, 0.027777777777777776, 0, 0.003472222222222222, 0.016260162601626018, 0.02531645569620253, 0, 0.005917159763313609, 0, 0, 0.016666666666666666, 0.008333333333333333, 0.010101010101010102, 0.006535947712418301, 0.017241379310344827, 0.038461538461538464, 0.02857142857142857, 0, 0.008695652173913044, 0.007518796992481203, 0.008064516129032258, 0.01968503937007874, 0, 0.009433962264150943, 0.023391812865497075, 0.034482758620689655, 0.016129032258064516, 0, 0.0189873417721519, 0.012903225806451613, 0.0196078431372549, 0.012658227848101266, 0.025974025974025976, 0.017467248908296942, 0.014084507042253521, 0.018161180476730987, 0.014084507042253521, 0.004784688995215311, 0.007936507936507936, 0.012875536480686695, 0.02054794520547945, 0.015267175572519083, 0.013888888888888888, 0.0106951871657754, 0.00819672131147541 ]
0.013146
5
[ "The present application generally relates to devices for cleaning up dirt and soil resulting from boring or digging a hole in the earth, when using an auger or other digging tool such as a clamshell digger. ", "More particularly, the present application relates to a device that may be used to collect and remove the dirt and soil displaced when boring or digging a hole for a post, such as a fence post or post for a deck.", "\nProfessional tradesmen, carpenters, and others are often called upon to build fences or decks. ", "Posts are typically positioned at intervals to support the fences or decks. ", "The bottom of the posts are positioned in holes that are bored or dug into the earth, and once the post is positioned within the hole, some of the dirt or soil may be filled in around the post or the post may be set in concrete, as examples.", "\nThe holes may be bored into the ground using a power auger. ", "Alternatively, the holes may be bored or dug using handheld tools such as a shovel, spade, hand auger or a clamshell digger, or some combination thereof. ", "Regardless of how the hole is created, the hole is formed by removing dirt and soil (or sand or gravel) from the earth, which becomes piled up around the hole. ", "During the course of boring or digging the holes and positioning posts within the holes, the dirt and soil piled around the holes may also get stepped on and tracked around the yard. ", "Eventually, after the posts are positioned within the holes, the dirt and soil piled up around the posts, and the dirt and soil tracked around the yard needs to be cleaned up and removed.", "\nThe process of cleaning and removing the dirt and soil around each post, and the dirt and soil tracked around the yard, may be a time-consuming and tedious process. ", "It may take two workers 20 to 30 minutes per post to properly clean up the area around each post. ", "The cleanup process may involve shoveling the dirt and soil piled up around the posts and moving it into a wheelbarrow or cart where it may be removed from the area. ", "The cleanup process may also entail using a shop vacuum and/or hosing down the grass to return the yard to a pristine condition. ", "A typical fence may have 30 to 50 posts. ", "Therefore, there is a significant amount of time and expense involved in cleaning up the dirt and soil removed from the holes.", "\nAs a result of the labor-intensive and time-consuming cleanup process, it would be desirable to provide a device that can be used to more easily collect and remove the dirt and soil displaced from the holes. ", "It would also be desirable to provide a tool that may be used that results in a reduction of time required to clean up the dirt and soil displaced from the holes during the hole forming process." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007751937984496124, 0, 0, 0, 0 ]
0.000431
5
[ "/*\n * Copyright © 2019 Atomist, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.", "\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.", "\n * See the License for the specific language governing permissions and\n * limitations under the License.", "\n */\n\nimport { GitProject } from \"@atomist/automation-client/lib/project/git/GitProject\";\nimport {\n RepoListenerInvocation,\n SdmListener,\n} from \"./Listener\";\n\n/**\n * Invocation for an event on a project\n */\nexport interface ProjectListenerInvocation extends RepoListenerInvocation {\n\n /**\n * The project to which this event relates. ", "It will have been cloned\n * prior to this invocation. ", "Modifications made during listener invocation will\n * not be committed back to the project (although they are acceptable if necessary, for\n * example to run particular commands against the project).", "\n * As well as working with\n * project files using the Project superinterface, we can use git-related\n * functionality fro the GitProject subinterface: For example to check\n * for previous shas.", "\n * We can also easily run shell commands against the project using its baseDir.", "\n */\n project: GitProject;\n\n}\n\nexport type ProjectListener = SdmListener<ProjectListenerInvocation>;\n" ]
{ "pile_set_name": "Github" }
[ 0.011494252873563218, 0.009523809523809525, 0.009523809523809525, 0.011527377521613832, 0, 0, 0.004761904761904762, 0, 0.018518518518518517 ]
0.007261
5
[ "\n93 Cal.", "Rptr.2d 663 (2000)\n78 Cal.", "App.4th 1368\nPMC, INC., ", "et al., ", "Plaintiffs and Appellants,\nv.\nNeil KADISHA et al., ", "Defendants and Respondents.", "\nNo. ", "B136095.", "\nCourt of Appeal, Second District, Division Five.", "\nMarch 14, 2000.", "\nAs Modified on Denial of Rehearing April 7, 2000.", "\nReview Denied June 21, 2000.[*]", "\n*664 Christensen, Miller, Fink, Jacobs, Glaser, Weil & Shapiro, Louis R. Miller and Sean Riley, Los Angeles, for Plaintiffs and Appellants.", "\nLittler Mendelson and Robert F. Millman, Douglas A. Wickham, Los Angeles, Scott M. Lidman, for Defendants and Respondents, Neil Kadisha, Benjamin Nazarian, Parviz Nazarian and Pioneer Private Equity Fund LLC.", "\n*665 TURNER, P.J.\n\nI. INTRODUCTION\nPlaintiffs, PMC, Inc. and Winkler Forming, Inc. (WFI), appeal from a summary judgment in favor of defendants Neil Kadisha, Benjamin Nazarian, Parviz Nazarian, and Pioneer Private Equity Fund LLC (Pioneer). ", "The question presented is whether, as shareholders, officers and directors of a corporation, defendants can be held personally liable for misappropriation of trade secrets, unfair competition, or interference with prospective economic advantage. ", "We hold that a corporate officer or director may be liable for an intentional tort if: (1) the officer or director purchased or invested in the corporation the principal assets of which were the result of unlawful conduct; (2) the officer or director took control of the corporation and appointed personnel to run the corporation, which was engaging in unlawful conduct; and (3) the officer or director did so with knowledge or, with respect to trade secret misappropriation, when she or he had reason to know, of the unlawful conduct. ", "We find plaintiffs have raised a triable issue of material fact as to the individual defendants' active meaningful participation in, consent to, or approval of, the tortious conduct. ", "Accordingly, we reverse the judgment.", "\n\nII. ", "STANDARD OF REVIEW\nA summary judgment motion is directed to the issues framed by the pleadings. (", "Turner v. Anheuser-Busch, Inc. (1994) 7 Cal.4th 1238, 1252, 32 Cal.", "Rptr.2d 223, 876 P.2d 1022; Ann M. v. Pacific Plaza Shopping Center (1993) 6 Cal.4th 666, 673, 25 Cal.", "Rptr.2d 137, 863 P.2d 207.) ", "A party may move for summary judgment \"if it is contended that the action has no merit or that there is no defense to the action or proceeding.\" (", "Code Civ. ", "Proc., § ", "437c, subd. (", "a).) ", "Summary judgment is granted when \"all the papers submitted show that there is no triable issue as to any material fact and that the moving party is entitled to a judgment as a matter of law.\" (", "Code Civ. ", "Proc., § ", "437c, subd. (", "c); Union Bank v. Superior Court (1995) 31 Cal.", "App.4th 573, 579, 37 Cal.", "Rptr.2d 653.) ", "A defendant proves a claim has no merit if he or she establishes one or more of the elements of the cause of action cannot be separately established. (", "Code Civ. ", "Proc., § ", "437c, subd. (", "n)(1); Ochoa v. California State University (1999) 72 Cal.", "App.4th 1300, 1304, 85 Cal.", "Rptr.2d 768.) ", "The following is a moving defendant's burden of proof: \"A defendant ... has met his or her burden of showing that a cause of action has no merit if that party has shown that one or more elements of the cause of action, even if not separately pleaded, cannot be established, or that there is a complete defense to that cause of action. ", "Once the defendant ... has met that burden, the burden shifts to the plaintiff ... to show that a triable issue of one or more material facts exists as to that cause of action or a defense thereto. ", "The plaintiff ... may not rely upon the mere allegations or denials of its pleadings to show that a triable issue of material fact exists, but, instead, shall set forth the specific facts showing that a triable issue of material fact exists as to that cause of action or a defense thereto.\" (", "Code Civ. ", "Proc., § ", "437c, subd. (", "o)(2); see Green v. Ralee Engineering Co. (1998) 19 Cal.4th 66, 72, 78 Cal.", "Rptr.2d 16, 960 P.2d 1046.) ", "We review the trial court's decision to grant the summary judgment de novo. (", "Romano v. Rockwell Internat., ", "Inc. (1996) 14 Cal.4th 479, 487, 59 Cal.", "Rptr.2d 20, 926 P.2d 1114; Bernson v. Browning-Ferris Industries (1994) 7 Cal.4th 926, 929, 30 Cal.", "Rptr.2d 440, 873 P.2d 613.)", "\n\nIII. ", "THE SUMMARY JUDGMENT MOTION\nPlaintiffs allege that Paul Winkler, a codefendant who is not a party to the present appeal, and others misappropriated corporate assets and trade secrets of WFI, their former employer, and used the misappropriated knowledge in a new competing *666 business, Paul Winkler Plastics Corporation (PWP). ", "PMC, Inc. is the majority shareholder of WFI. ", "Parviz Nazarian and Benjamin Nazarian are father and son.[1] Neil Kadisha is Parviz Nazarian's son-in-law. ", "Pioneer is the individual defendants' investment vehicle. ", "Their interests in Pioneer are as follows: Mr. Kadisha-40 percent; Benjamin Nazarian-20 percent; and Parviz Nazarian (as general partner of Union Communications Company)-40 percent.", "\nThe codefendants, Paul Winkler, Christopher Winkler, Colin Winkler,[2] Craig Snedden, James Longstreth, Dean Brown, and John Bussey, were former WFI managers who joined PWP. ", "Their positions with WFI were as follows: Paul Winkler, president; Christopher Winkler, director of sales; Colin Winkler, director of purchasing and scheduling; Mr. Snedden, vice president of sales; Mr. Longstreth, vice president of manufacturing; Mr. Brown, tooling department manager; and Mr. Bussey, responsible for management information systems and creation of computer codes and software that control machinery used in the manufacturing process. ", "The codefendants are not parties to the present appeal. ", "Both WFI and PWP are in the business of manufacturing plastic food containers.", "\nPlaintiffs also allege the codefendants had, inter alia, \"contacted major customers of WFI to solicit business based upon providing the same products [then] manufactured by WFI; taken with them WFI's confidential new and prospective customer lists, customer product specifications, and proprietary information, thereby allowing them to duplicate [WFI's] manufacturing processes; solicited key WFI employees to leave WFI's employ; and disparaged WFI to existing customers.\" ", "After the initial misappropriation and other tortious conduct had allegedly occurred, and after plaintiffs filed this lawsuit against the codefendants, the present defendants invested in and became officers and directors of PWP. ", "The individual defendants' initial $1.25 million investment in PWP through Pioneer was paid by them in proportion to their interests in Pioneer. ", "Plaintiffs demanded in writing that defendants cease and desist from the ongoing use of WFI's confidential and proprietary information. ", "Plaintiffs then amended their complaint to include the present defendants. ", "Plaintiffs alleged defendants had, with knowledge or reason to know of the codefendants' prior wrongful conduct, refused to cease using the stolen assets and participated in, financed, directed, and authorized the ongoing illegal acts. ", "Plaintiffs sought to hold defendants personally liable on causes of action for misappropriation of trade secrets, unfair competition,[3] interference with prospective economic advantage, and \"conspiracy.", "\"[4]\n*667 In their summary judgment motion, defendants asserted as a complete defense that they could not be held personally liable for their codefendants' misappropriation of WFI's trade secrets or other tortious conduct. ", "In support of their summary judgment motion, the individual defendants filed declarations stating that at no time had they authorized or directed any PWP officer or employee to engage in any wrongful or unlawful activity, including the conduct alleged in plaintiffs' third amended complaint. ", "Further, following receipt of a cease and desist demand from plaintiffs' counsel, defendants had investigated whether PWP was conducting business using any alleged trade secrets or other property of WFI. ", "Based on information provided to them, including an expert's opinion, defendants found PWP was not engaged in any continuing wrongdoing. ", "The evidence in support of the summary judgment motion was sufficient to shift the burden to plaintiffs. (", "Code Civ. ", "Proc., § ", "437c, subd. (", "o)(2); Villa v. McFerren (1995) 35 Cal.", "App.4th 733, 749-751, 41 Cal.", "Rptr.2d 719; Union Bank v. Superior Court, supra, 31 Cal. ", "App.4th at p. 593, 37 Cal.", "Rptr.2d 653.)", "\nPlaintiffs contended a triable issue of material fact remained whether defendants had themselves personally engaged in tortious conduct. ", "Plaintiffs argued defendants were subject to personal liability because of the following combined factors: defendants invested in PWP; defendants became majority shareholders, officers, and directors of PWP; defendants effectively took control of the corporation; defendants appointed personnel to run the corporation; and defendants knew or had reason to know that their codefendants had improperly acquired and were using WFI's trade secrets to compete with their former employer, had engaged in acts of unfair competition, and were interfering with WFI's prospective economic advantage.", "\nPlaintiffs presented evidence defendants knew, before they invested in PWP, that: the codefendants had at first sought to buy WFI out at a cost of $27 million and later $40 million; there was a third-party offer to purchase WFI for $58 million; PWP was not a usual start-up venture but a continuation or replication of WFI; for an investment of approximately $1.5 million defendants could own a company that would be an \"exact replicate of WFI\"; PWP was headed by the former WFI management team; the codefendants expected to be producing and selling products in a very short time, within one month; the codefendants had solicited and received $12 million in sales commitments from WFI customers; WFI had developed hundreds of molds and mold inserts worth millions of dollars; the codefendants had used WFI computer specifications to develop PWP products; these products were virtually identical to those of WFI; the codefendants had hired away key WFI personnel with the expertise and knowledge to manufacture the products; they had diverted to PWP equipment originally ordered by WFI; they were being sued by WFI in \"a fifty (50) million dollar lawsuit\" for misappropriation of trade secrets and unfair competition; and a preliminary injunction had been issued in that lawsuit.[5] Further, defendants never discussed with Paul Winkler whether he was using any WFI information at PWP.", "\nIn August 1998, Paul Winkler testified at a deposition that he had taken from WFI a computer disk containing specifications for molds and inserts. ", "All of the *668 molds and inserts were for WFI's products. ", "Further, Paul Winkler admitted he had taken a computer disk containing confidential WFI financial information. ", "A transcript of Mr. Winkler's deposition testimony was given to or was available to the defendants.", "\nIn November 1998, after conducting a due diligence investigation, defendants made an initial investment of $1.25 million in PWP in return for a 50 percent ownership interest and control of 3 of 5 seats on the board of directors. ", "Under the stock purchase agreement, the written approval of at least one of the individual defendants, who are the parties to this appeal, was required for any expenditure by PWP of $100,000 or more. ", "PWP agreed to indemnify defendants in connection with this lawsuit.", "\nThe three individual defendants were appointed directors of PWP. ", "In November 1998, Benjamin Nazarian was also named chief financial officer, secretary, and general counsel of PWP. ", "At that time, Paul Winkler served as president and chief executive officer of the corporation. ", "In January 1999, defendants appointed a longtime business associate, Ira Maroofian, president and chief executive officer of PWP. ", "In February 1999, Benjamin Nazarian was elected chairman of the board of directors. ", "In April 1999, Mr. Maroofian became the corporation's chief financial officer as well. ", "Over time, defendants' investment in PWP increased to over $3 million.", "\nIn January or February 1999, defendants received further evidence as follows: the codefendants, while still employed by WFI, had developed a plan to start a competing business producing plastic food containers; the codefendants intended to manufacture products for WFI's existing customers; the codefendants had duplicated and stored at WFI inserts used to produce all its products; the codefendants stored this material while they were still employed at WFI; these duplicated and stored inserts were intended to be used for production of PWP products; the duplication was done at the \"off-the-book\" expense of WFI's parent corporation, PMC, Inc., at a cost of hundreds of thousands of dollars; the codefendants planned to use the stolen inserts to compete with WFI; Mr. Brown, the head of WFI's tooling department, had worked at home on tooling designs (including molds, beds, and inserts) for PWP using WFI software and computer specifications; based upon the use of WFI's information, the codefendants would be ready immediately to mill and lathe inserts for the same products sold by WFI; Paul Winkler intended that once PWP had received sufficient equipment and enhanced its production capacity, it would develop its own products; the codefendants had also conceived a new technology allowing for a higher rate of production; they intended to first put this new technology to use at PWP; the codefendants had further developed at WFI a \"co-extrusion\" technology that reduced production costs; they intended to first use that technology in the new venture; with Paul Winkler's authorization, potential investors in PWP were brought in to observe WFI operations; the codefendants had contacted WFI customers and received commitments to order products from PWP; the WFI customers were told that Paul Winkler had been terminated by WFI; those customers were told \"that there would be great difficulties in filling continuing orders to WFI based upon the termination of Paul Winkler and the disruption caused thereby\"; in addition, the codefendants had scheduled overproduction of products at WFI; the overproduction was intended for those WFI customers that had committed to ordering from the new venture; the overproduction was run so WFI customer's would not experience a shortage of products while PWP got up and running; Paul Winkler had conceived and directed a strategy for the resignation of WFI managers; Paul Winkler wanted Gary Stenger, a WFI employee, to stay on at WFI to ensure the aforementioned *669 overproduction was maintained; another future PWP employee, Hector Aparicio, agreed to remain at WFI; Mr. Aparicio was to contact targeted WFI employees and send them to the PWP facility to discuss employment with the new company; Paul Winkler promised the WFI team, including Mr. Stenger and Mr. Aparicio, that PWP would pay them the same or greater salary and other \"perks\" as they were presently receiving; among the targeted WFI employees were all of the operators in its milling center; the codefendants located PWP only a few miles from the WFI plant; this was done so that WFI employees would not have any greater distance to travel to work after they joined PWP; the WFI mill operators subsequently resigned and joined PWP; when the computer-controlled milling machinery arrived at the PWP plant, the former WFI operators were able immediately to begin producing products; they were able to do so because Mr. Brown had used the stolen computer design specifications to design the inserts to produce the same products as had been manufactured at WFI; Paul Winkler had said \"they were going to take WFI's customers\"; Colin Winkler had said \"they were `out to bury' WFI\"; the codefendants had convinced Albino Hernandez, the head supply and warehouse employee at WFI, to leave the company; Mr. Hernandez was the key employee in the scheduling and shipping of WFI's products; Colin Winkler was \"very excited\" that WFI's loss of Mr. Hernandez \"would cause the scheduling and shipping of product at WFI to be thrown into confusion\"; Christopher Winkler said Mr. Hernandez's resignation from WFI \"was `going to fix them' and that it was going to be `chaotic' when he leaves.\"", "\nAfter investing in and becoming officers and directors of PWP, defendants conducted an investigation as to any ongoing use of WFI's confidential information. ", "As will be noted, defendants contend this investigation is a complete defense to the present lawsuit. ", "Defendants have made this argument both in the trial court and now on appeal. ", "Plaintiffs disputed the sufficiency of defendants' investigation. ", "Plaintiffs presented evidence Mr. Maroofian was given no specific direction on how to conduct the investigation. ", "After initiating the investigation, Benjamin Nazarian had no further contact with Mr. Maroofian about the inquiry into the use of WFI confidential information. ", "The focus of the investigation was on what was being done at the time of the inquiry, not what activities had occurred previously. ", "Neither Benjamin Nazarian, who instituted the investigation, nor Mr. Maroofian, who conducted the inquiry, ever read the deposition testimony of the former WFI management team members given in this case. ", "Mr. Maroofian never talked to Paul Winkler as part of his investigation. ", "In addition, defendant's retained expert, William McConnell, concluded that in his opinion PWP had independently designed and produced its products. ", "However, Mr. McConnell did not investigate what PWP had actually done or what sources it had used to design and produce its products. ", "Further, Mr. McConnell's declaration addressed only the alleged misappropriation of WFI's product design specifications and manufacturing processes. ", "Mr. McConnell did not investigate and expressed no opinion as to the alleged theft of confidential financial and customer information or other acts of unfair competition. ", "In February 1999, defendants were specifically notified in writing by plaintiffs' counsel that ongoing use of the allegedly misappropriated knowledge was wrongful. ", "Nevertheless, defendants continued to invest money in PWP.", "\nDefendants filed a reply in support of their summary judgment motion. ", "They presented evidence, inter alia, that prior to investing in PWP they had been assured the corporation was not engaged in any unlawful conduct.", "\nThe trial court found no basis for imposing personal liability against defendants. ", "Therefore, it granted a summary *670 judgment in their favor. ", "The parties raised evidentiary objections in the trial court. ", "However, they did not secure any rulings on those objections. ", "As a result, the objections have been waived and we treat all of the evidence as having been properly admitted. (", "Sharon P. v. Arman, Ltd. (1999) 21 Cal.4th 1181, 1186-1187, fn. ", "1, 91 Cal.", "Rptr.2d 35, 989 P.2d 121; Ann M. v. Pacific Plaza Shopping Center, supra, 6 Cal.4th at p. 670, fn. ", "1, 25 Cal. ", "Rptr.2d 137, 863 P.2d 207.)", "\n\nIV. ", "DISCUSSION\nDefendants contend they cannot be held personally liable for any misappropriation of trade secrets or other tortious conduct by the codefendants. ", "They do not specifically contend, except with respect to customer lists, that there was no misappropriation of trade secrets. ", "Nor do defendants assert that insufficient information was known to them to raise a triable issue whether they knew or had reason to know the codefendants' conduct was tortious. ", "Stated differently, they do not claim there was no indication trade secrets had or may have been misappropriated or that other improper conduct had occurred. ", "Rather, defendants contend: they cannot be held liable for alleged torts that occurred before they invested in or became directors of PWP; any continuing wrongful conduct is not a basis for imposing vicarious liability on them; they are not liable for any mere nonfeasance in response to plaintiffs' cease-and-desist demand; there is no liability for nonfeasance causing only pecuniary harm; they had no independent duty to plaintiffs; they did not personally acquire any trade secrets; they cannot be liable based on whether they should have known about the corporate tort; they cannot be said to have used or acquired trade secrets by virtue of their director status; they cannot be liable for conspiracy absent an independent duty and an underlying wrong; and reliance on their investigation was not clearly unreasonable under the circumstances. ", "For the reasons stated below, we disagree.", "\nCorporate director or officer status neither immunizes a person from personal liability for tortious conduct nor subjects him or her to vicarious liability for such acts. (", "Frances T. v. Village Green Owners Assn. (", "1986) 42 Cal.3d 490, 505, 229 Cal.", "Rptr. ", "456, 723 P.2d 573 (hereafter Frances T.); 18B Am.", "Jur.2d, Corporations, § 1877 (1985).) ", "As the Supreme Court held in United States Liab. ", "Ins. ", "Co. v. Haidinger-Hayes, Inc. (1970) 1 Cal.3d 586, 595, 83 Cal.", "Rptr. ", "418, 463 P.2d 770: \"Directors or officers of a corporation do not incur personal liability for torts of the corporation merely by reason of their official position, unless they participate in the wrong or authorize or direct that it be done. ", "They may be liable, under the rules of tort and agency, for tortious acts committed on behalf of the corporation. [", "Citations.]\" ", "As the Supreme Court explained in Frances T.: \"It is well settled that corporate directors cannot be held vicariously liable for the corporation's torts in which they do not participate. ", "Their liability, if any, stems from their own tortious conduct, not from their status as directors or officers of the enterprise. [", "Citation.] ", "`[A]n officer or director will not be liable for torts in which he does not personally participate, of which he has no knowledge, or to which he has not consented.... While the corporation itself may be liable for such acts, the individual officer or director will be immune unless he authorizes, directs, or in some meaningful sense actively participates in the wrongful conduct.' [", "Citation.] [¶] ", "Directors are jointly liable with the corporation and may be joined as defendants if they personally directed or participated in the tortious conduct. [", "Citations.] [¶] ", "Directors are liable to third persons injured by their own tortious conduct regardless of whether they acted on behalf of the corporation and regardless of whether the corporation is also liable. [", "Citations.] ", "This liability does not depend on the same grounds as `piercing *671 the corporate veil,' on account of inadequate capitalization for instance, but rather on the officer or director's personal participation or specific authorization of the tortious act. [", "Citation.]\" (", "Frances T., supra, 42 Cal.3d at pp. ", "503-504, 229 Cal. ", "Rptr. ", "456, 723 P.2d 573, orig. ", "italics, fn. ", "omitted.) ", "Shareholders are likewise not normally liable for a corporation's torts, \"but personal liability may attach to them ... when [they] specifically direct[ ] or authorize[ ] the wrongful acts.\" (", "Wyatt v. Union Mortgage Co., supra, 24 Cal.3d at p. 785, 157 Cal.", "Rptr. ", "392, 598 P.2d 45; 18B Am.", "Jur.2d, Corporations, § 1829 (1985).)", "\nA corporate director or officer's participation in tortious conduct may be shown not solely by direct action but also by knowing consent to or approval of unlawful acts. (", "Frances T., supra, 42 Cal.3d at pp. ", "503-504, 229 Cal.", "Rptr. ", "456, 723 P.2d 573; Spahn v. Guild Industries Corp. (1979) 94 Cal.", "App.3d 143, 157, fn. ", "9, 156 Cal.", "Rptr. ", "375; Murphy Tugboat v. Shipowners & Merchants Towboat Co. (N.D.Cal.1979) 467 F.Supp. ", "841, 852, affd. (", "9th Cir.1981) 658 F.2d 1256; 18B Am. ", "Jur.2d, Corporations, § 1877 (1985); 3A Fletcher Cyc. ", "of Private Corporations (perm. ", "ed. ", "rev. ", "vol. ", "1994) § 1135.) ", "As the Supreme Court held in Frances T, supra, 42 Cal.3d at pages 508-509, 229 Cal.", "Rptr. ", "456, 723 P.2d 573, \"To maintain a tort claim against a director in his or her personal capacity, a plaintiff must first show that the director specifically authorized, directed or participated in the allegedly tortious conduct [citation]; or that although they specifically knew or reasonably should have known that some hazardous condition or activity under their control could injure plaintiff, they negligently failed to take or order appropriate action to avoid the harm [citations]. ", "The plaintiff must also allege and prove that an ordinary prudent person, knowing what the director knew at that time, would not have acted similarly under the circumstances.\" (", "Italics added.) ", "In Spahn v. Guild Industries Corp., supra, 94 Cal. ", "App.3d at page 157 and footnote 9, 156 Cal.", "Rptr. ", "375, the Court of Appeal held officers and directors of a corporation were personally liable for fraud committed by a managerial employee because they knew about and allowed the tortious conduct to occur. ", "In addition, corporate directors and officers may be held personally liable, as conspirators, for violating their own duties towards persons injured by the corporation's tort. (", "The Doctors' Co. v. Superior Court, supra, 49 Cal.3d at p. 48, 260 Cal.", "Rptr. ", "183, 775 P.2d 508; Wyatt v. Union Mortgage Co., supra, 24 Cal.3d at p. 785, 157 Cal.", "Rptr. ", "392, 598 P.2d 45.)", "\nThe legal fiction of the corporation as an independent entity was never intended to insulate officers and directors from liability for their own tortious conduct. (", "Frances T, supra, 42 Cal.3d at pp. ", "507-508, 229 Cal.", "Rptr. ", "456, 723 P.2d 573; Michaelis v. Benavides (1998) 61 Cal.", "App.4th 681, 688, 71 Cal.", "Rptr.2d 776.) ", "The Supreme Court has held: \"The legal fiction of the corporation as an independent entity—and the special benefit of limited liability permitted thereby—is intended to insulate stockholders from personal liability for corporate acts and to insulate officers from liability for corporate contracts;...\" (Frances T., supra, 42 Cal.3d at pp. ", "507-508, 229 Cal.", "Rptr. ", "456, 723 P.2d 573.) ", "A corporate officer or director, like any other person, owes a duty to refrain from injuring others. ", "In the context of a negligence claim, the Supreme Court has held that, like any other person, \"directors individually owe a duty of care, independent of the corporate entity's own duty, to refrain from acting in a manner that creates an unreasonable risk of personal injury to third parties.\" (", "Frances T, supra, 42 Cal.3d at p. 505, 229 Cal.", "Rptr. ", "456, 723 P.2d 573.) ", "Stated differently, the Supreme Court held: \"Like any other citizen, corporate officers have a societal duty to refrain from acts that are unreasonably risky to third persons even when their shareholders or creditors would agree that *672 such conduct serves the institution's best interests.... `The only duty which an executive officer of a corporation owes to a third person, whether he be an employee of the corporation or a complete stranger, is the same duty to exercise due care not to injure him which any person owes to another. ", "If an injury is sustained by a third party as the result of the independent negligence of the corporate officer, or as the result of a breach of the duty which that officer, as an individual, owes to the third party, then the injured third party may have a cause of action for damages against the officer personally.' [", "Citation.]\" (", "Francis T., supra, 42 Cal.3d at p. 506, fn. ", "12, 229 Cal.", "Rptr. ", "456, 723 P.2d 573.) ", "If a corporate officer or director were not liable for his or her own tortious conduct, he or she \"could inflict injuries upon others and then escape liability behind the shield of his or her representative character, even though the corporation might be insolvent or irresponsible.\" (", "Frances T., supra, 42 Cal.3d at p. 505, 229 Cal.", "Rptr. ", "456, 723 P.2d 573.)", "\nThe California Supreme Court has held that the rule imposing liability on an officer or director for participation in or authorization of tortious conduct has its roots in agency law. (", "Frances T., supra, 42 Cal.3d at pp. ", "504-505, 229 Cal.", "Rptr. ", "456, 723 P.2d 573; Seagate Technology v. A.J. Kogyo Co. (1990) 219 Cal.", "App.3d 696, 702, 268 Cal.", "Rptr. ", "586.) ", "Directors and officers are agents of the corporate principal. (", "Frances T, supra, at p. 505, 229 Cal.", "Rptr. ", "456, 723 P.2d 573; see APSB Bancorp, v. Thornton Grant (1994) 26 Cal. ", "App.4th 926, 931, 31 Cal.", "Rptr.2d 736.) ", "And an agent is liable for her or his own acts, regardless whether the principal is also liable. (", "Frances T, supra, at p. 505, 229 Cal.", "Rptr. ", "456, 723 P.2d 573; Civ.", "Code, § 2343.) ", "Civil Code section 2343 provides: \"One who assumes to act as an agent is responsible to third persons as a principal for his acts in the course of his agency, in any of the following cases, and in no others: [¶] ... 3. ", "When his acts are wrongful in their nature.\" ", "This rule applies to officers and directors. (", "Frances T., supra, 42 Cal.3d at p. 505, 229 Cal.", "Rptr. ", "456, 723 P.2d 573; Mears v. Crocker First Nat. ", "Bank (1948) 84 Cal.", "App.2d 637, 642, 191 P.2d 501.)", "\nAll persons who are shown to have participated in an intentional tort are liable for the full amount of the damages suffered. (", "Golden v. Anderson, supra, 256 Cal.", "App.2d at pp. ", "719-720, 64 Cal. ", "Rptr. ", "404; Joanaco Projects, Inc. v. Nixon & Tierney Construction Co. (1967) 248 Cal.", "App.2d 821, 832-833, 57 Cal.", "Rptr. ", "48; McClory v. Dodge (1931) 117 Cal.", "App. ", "148, 153, 4 P.2d 223, disapproved on another point in Mary Pickford Co. v. Bayly Bros. (1939) 12 Cal.2d 501, 522, 86 P.2d 102.) ", "This rule applies to intentional torts committed by shareholders and those acting in their official capacities as officers or directors of a corporation, even though the corporation is also liable. (", "Vacco Industries, Inc. v. Van Den Berg (1992) 5 Cal. ", "App.4th 34, 53, fn. ", "20, 6 Cal.", "Rptr.2d 602 [corporate shareholders and officers personally liable for misappropriation of trade secrets]; Klein v. Oakland Raiders, Ltd. (1989) 211 Cal.", "App.3d 67, 76-79, 259 Cal. ", "Rptr. ", "149 [sole general partner could be personally liable for conspiring to violate the Sherman Act on behalf of limited partnership]; Golden v. Anderson, supra, 256 Cal.", "App.2d at pp. ", "719-720, 64 Cal.", "Rptr. ", "404 [corporate officers conspired to interfere with contractual relationship]; Joanaco Projects, Inc. v. Nixon & Tierney Construction Co., supra, 248 Cal.", "App.2d at pp. ", "832-833, 57 Cal.", "Rptr. ", "48 [corporate stockholders participated in fraud]; Price v. Hibbs (1964) 225 Cal.", "App.2d 209, 222, 37 Cal.", "Rptr. ", "270 [corporate officials conspired to induce breach of contract and to defraud]; Granoff v. Yackle (1961) 196 Cal. ", "App.2d 253, 256-257,16 Cal.", "Rptr. ", "394 [corporate officers personally liable for misappropriation of another's money or property]; McClory v. Dodge, supra, 117 Cal. ", "App. ", "at pp. ", "152-154, 4 P.2d 223 [corporate directors personally liable for misappropriation *673 of plaintiffs stock when they knew or should have known conduct was wrongful]; Vujacich v. Southern Commercial Co. (1913) 21 Cal.", "App. ", "439, 442-443, 132 P. 80 [director who knew or had reason to know of corporation's misappropriation of another's money was personally liable]; Civ. ", "Code, § 2343; 3A Fletcher Cyc. ", "of Private Corporations, supra, § 1135.)", "\nMisappropriation of trade secrets is an intentional tort. (", "Civ.", "Code, § 3426.1; Vacco Industries, Inc. v. Van Den Berg, supra, 5 Cal.", "App.4th at p. 53, 6 Cal. ", "Rptr.2d 602.) ", "It is defined in the Uniform Trade Secrets Act, Civil Code section 3426.1, subdivision (b), as follows: \"`Misappropriation' means: [¶] (1) Acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or [¶] (2) Disclosure or use of a trade secret of another without express or implied consent by a person who: [¶] (A) Used improper means to acquire knowledge of the trade secret; or [¶] (B) At the time of disclosure or use, knew or had reason to know that his or her knowledge of the trade secret was: [¶] (i) Derived from or through a person who had utilized improper means to acquire it; [¶] (ii) Acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or [¶] (iii) Derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; ....\" (Italics added.) ", "Under the Uniform Trade Secrets Act (Civ. ", "Code, § 3426 et seq.), ", "an actual or threatened misappropriation of such confidential information may be enjoined (Civ. ", "Code, § 3426.2) and a complainant may recover damages for unjust enrichment, or receive payment of a reasonable royalty (Civ.", "Code, § 3426.3).", "\nMoreover, defendants had an independent obligation under the Uniform Trade Secrets Act to refrain from a tortious invasion of plaintiffs' proprietary rights. (", "Civ.", "Code, §§ 2343, subd. ", "3, 3426 et seq.; ", "Vacco Industries, Inc. v. Van Den Berg, supra, 5 Cal.", "App.4th at p. 53 & fn. ", "20, 6 Cal.", "Rptr.2d 602.) ", "Under the plain terms of the Uniform Trade Secrets Act, defendants may be personally liable if: they used, through the corporation, WFI's trade secrets; at the time of the use of the confidential information they knew or had reason to know that knowledge of the trade secrets was derived from or through a person who had improperly acquired the knowledge, or the secrets were obtained by a person who owed a duty to plaintiffs to maintain the secrecy. (", "Ibid.) ", "Employing the confidential information in manufacturing, production, research or development, marketing goods that embody the trade secret, or soliciting customers through the use of trade secret information, all constitute use. (", "Rest.3d Unfair Competition (1995) § 40, com. ", "c.) Use of a trade secret without knowledge it was acquired by improper means does not subject a person to liability unless the person receives notice that its use of the information is wrongful. (", "Components for Research, Inc. v. Isolation Products, Inc. (1966) 241 Cal.", "App.2d 726, 729-730, 50 Cal. ", "Rptr. ", "829; Rest.3d Unfair Competition, supra, § 40, com. ", "d.)\nIn circumstances similar to those of the present case, the Supreme Court has held that a corporate officer who was aware of or ratified acts of unfair competition, who cooperated in an individual's breach of his fiduciary duties to his former corporation, and who benefited from the misconduct, was personally liable. (", "Bancroft-Whitney Co. v. Glen (1966) 64 Cal.2d 327, 353, 49 Cal.", "Rptr. ", "825, 411 P.2d 921.) ", "John T. Bender was the president of Matthew Bender & Co. Judson B. Glen was the president and a director of Bancroft-Whitney Company. ", "Both corporations were in the business of publishing law books. ", "Mr. Glen, while serving as president of Bancroft-Whitney, commenced negotiations with Mr. Bender concerning the establishment of a western division of Matthew Bender. ", "Without resigning from Bancroft-Whitney, Mr. Glen: entered into a *674 contract with Matthew Bender to become president of its new division; solicited Bancroft-Whitney executive staff and other personnel to join the new division; and disclosed Bancroft-Whitney's trade secret and confidential information to Mr. Bender. ", "The Supreme Court described the gravamen of the action against Mr. Bender and Matthew Bender as \"relat[ing] to their role in cooperating in [Mr.] Glen's breach [of his fiduciary duties to Bancroft-Whitney] for the purpose of obtaining the employment of these persons by [Matthew Bender].\" (", "Id. at p. 332, 49 Cal.", "Rptr. ", "825, 411 P.2d 921.) ", "The Supreme Court held Mr. Bender was guilty of unfair competition for having cooperated in and having reaped the benefits of Mr. Glen's breach of fiduciary duties owed to Bancroft-Whitney. (", "Ibid.) ", "The Supreme Court held: \"It is clear from the evidence ... that [Mr.] Bender was aware of or ratified [Mr.] Glen's breach of his fiduciary duties in all but a few respects, that he cooperated with [Mr.] Glen in the breach, and that he received the benefits of [Mr.] Glen's infidelity.... Under all the circumstances, [Mr.] Bender and [Matthew] Bender Co. must be held liable for their part in [Mr.] Glen's breach of his fiduciary duties. [", "Citations.] ", "They encouraged the sowing and reaped the benefit. ", "They cannot now disclaim the burden.\" (", "Id. at p. 353, 49 Cal. ", "Rptr. ", "825, 411 P.2d 921.) ", "In the present case, there is no evidence defendants encouraged the codefendants to engage in the initial wrongful conduct vis-a-vis plaintiff, their former employer. ", "However, plaintiffs' theory of liability is essentially the same as that in Bancroft-Whitney Co. Plaintiffs allege defendants were aware of and ratified and benefited from the codefendants' misconduct, and that defendants knowingly purchased a controlling interest in a corporation whose sole assets arose from tortious conduct by the codefendants.", "\nIn Vacco Industries, Inc. v. Van Den Berg, supra, 5 Cal.", "App.4th at pages 49-53, 6 Cal.", "Rptr.2d 602, the Court of Appeal held, albeit without extensive discussion, that two former employees who went into competition with their former employer were personally liable for misappropriation of trade secrets. ", "One of the defendants, Tony Van Den Berg, had misappropriated the former employer's trade secrets. ", "Another defendant, Thomas Eastlack, had embarked on the new venture with Mr. Van Den Berg. ", "They acquired all the stock of an existing corporation. ", "They were held jointly liable with their corporation for the tort committed in the corporation's name. ", "It appears Mr. Eastlack was a shareholder and corporate officer who did not participate in the initial misappropriation. ", "Mr. Eastlack's liability was apparently premised on his knowing use of misappropriated trade secrets. ", "In Components for Research, Inc. v. Isolation Products, Inc., supra, 241 Cal.", "App.2d at pages 729-730, 50 Cal. ", "Rptr. ", "829, on which plaintiffs rely, two corporate directors were notified the corporation was making unauthorized use of trade secrets. ", "However, the corporation continued to use the misappropriated information. ", "The Court of Appeal held the directors were personally liable. ", "The basis for the finding of personal liability is not clearly explained. ", "One of the directors had become a consultant for the plaintiff corporation at the same time he began assisting in the formation of the competing venture. ", "The other director had funded the new business. ", "The imposition of personal liability appears to have been based on the continued use of the misappropriated information with knowledge of the wrongdoing, either from the outset of the new venture, or upon receiving notice of the improper conduct.[6] So read, both Vacco Industries, *675 Inc. and Components for Research, Inc. are consistent with the Uniform Trade Secrets Act and the law regarding corporate official liability for intentional torts.", "\nIn the present case, plaintiffs presented sufficient evidence to raise a triable issue whether, when defendants invested in PWP, became majority shareholders, officers and directors of PWP, effectively took control of the corporation, hired personnel to run it, and continued its operations, they knew or, with respect to trade secret misappropriation, had reason to know, that their codefendants had engaged in tortious conduct harmful to WFI. ", "In a nutshell, there was evidence from which a trier of fact could reasonably infer defendants, in anticipation of enormous corporate and personal profit, knowingly invested at a bargain price in a corporation whose sole business assets consisted of stolen confidential information and processes, and subsequently controlled the entity which was engaging in unlawful conduct. ", "Further, plaintiffs presented sufficient evidence as to the scope and results of defendants' investigation to raise a triable issue whether, even if defendants did not know about the prior misconduct, they unreasonably took no action to prevent ongoing injury to WFI. ", "A reasonable trier of fact could conclude there was no real attempt to determine, and no basis upon which to conclude, that PWP had not engaged in, and was not continuing to participate in, tortious conduct.", "\nDefendants contend they could not have participated in any trade secret violation because the alleged misappropriation occurred before they invested in or became directors of PWP. ", "However, misappropriation is not limited to the initial act of improperly acquiring trade secrets; the use and continuing use of the trade secrets is also misappropriation. (", "Civ. ", "Code, § 3426.1.) ", "Hence, that the codefendants misappropriated WFI's trade secrets before defendants first invested in PWP does not absolve defendants of liability. (", "Civ.", "Code, § 3426.1; Rest.3d Unfair Competition, supra, § 40, com. ", "d.)\nDefendants argue their personal liability cannot be premised on the fact they invested in PWP, served as directors of the corporation, and refused to comply with plaintiffs' cease-and-desist demand. ", "However, plaintiffs' evidence goes beyond those facts. ", "As discussed above, it raises a reasonable inference that, and hence a triable issue whether, defendants, in pursuit of corporate and personal profit invested in PWP, took control of PWP, hired personnel to run PWC, and continued its operations, with knowledge or, with respect to trade secret misappropriation, with reason to know, that the codefendants had engaged in the alleged tortious acts and the corporation was engaged in unlawful conduct.", "\nDefendants assert they concluded, in reasonable reliance on information, reports and expert opinion, that there was no continuing misappropriation. ", "In Frances T., supra, 42 Cal.3d at page 509, 229 Cal.", "Rptr. ", "456, 723 P.2d 573, the California Supreme Court analyzed the principle of law relied upon by defendants as follows: \"Although the statutory business judgment rule defined in sections 7231 and 309 concerns only the director's fiduciary duty to the corporation, and not to outsiders, we recognize—as the Legislature did that `[t]he reference to \"ordinarily prudent person\" emphasizes the long tradition of the common law, in contrast to standards that might call for some undefined degree of expertise, like \"ordinarily prudent businessman.\"' (", "Legislative Committee com., ", "Deering's Ann. ", "Corp.Code (1977) foll. § ", "309, p. 205.) ", "We are mindful that directors sometimes must make difficult cost-benefit choices without the benefit of complete or personally verifiable information. *", "676 For this reason, even if their conduct leads directly to the tortious injury of a third party, directors are not personally liable in tort unless their action, including any claimed reliance on expert advice, was clearly unreasonable under the circumstances known to them at that time. ", "This defense of reasonable reliance is necessary to avoid holding a director personally liable when he or she reasonably follows expert advice or reasonably delegates a decision to a subordinate or subcommittee in a better position to act.\" (", "Fn. ", "omitted; Corp.Code, §§ 309, 7231.[7])\nGenerally, an officer or director who commits a tort because he or she reasonably relied on expert advice or other information cannot be held personally liable for the resulting harm. (", "Frances T., supra, 42 Cal.3d at p. 509, fn. ", "17, 229 Cal.", "Rptr. ", "456, 723 P.2d 573; Lee v. Inter-insurance Exchange (1996) 50 Cal.", "App.4th 694, 713, 57 Cal.", "Rptr.2d 798.) ", "As noted above, there was evidence defendants conducted an investigation and found no ongoing use of WFI trade secrets. ", "However, plaintiffs presented evidence sufficient to raise a triable issue whether the claimed reliance was clearly unreasonable under the circumstances known to defendants at the time. ", "Defendants could not rely on information and expert opinion if they knew misappropriation and other tortious conduct had occurred. ", "There is evidence which so indicates. ", "Further, as noted previously, plaintiffs have raised sufficient questions about the scope and results of the investigation that a reasonable trier of fact could find reliance thereon was not reasonable given all the circumstances. (", "See pp. ", "670-671 ante.) ", "A reasonable trier of fact could conclude the investigation did not go far enough under the circumstances. ", "Mr. McConnell's declaration did not establish an absence of misappropriation; it could reasonably be construed, under the circumstances, as only demonstrating the codefendants could have produced PWP's products without reliance on WFI's trade secrets. ", "Mr. McConnell expressed no opinion as to alleged misconduct beyond the theft of product designs and manufacturing processes. ", "Whether defendants acted reasonably under the circumstances of this case is a question for the trier of fact. (", "Frances T., supra, 42 Cal.3d at pp. ", "511-512, 229 Cal.", "Rptr. ", "456, 723 P.2d 573.)", "\nDefendants contend United States Liab. ", "Ins. ", "Co. v. Haidinger-Hayes, Inc., supra, 1 Cal.3d at pages 594-598, 83 Cal. ", "Rptr. ", "418, 463 P.2d 770, precludes stockholder, officer, or director liability for misappropriation of trade secrets premised on a knew or had reason to know standard. ", "We disagree. ", "Haidinger-Hayes was a negligence action. ", "It did not involve intentional misconduct. ", "It did not involve the Uniform Trade Secrets Act. ", "That act imposes liability for intentional misconduct about which a person knew or had reason to know. ", "Nothing in Haidinger-Hayes precludes shareholder, officer, or director liability for intentional torts, including misappropriation, or application to them of the *677 standard for imposition of liability set forth in the Uniform Trade Secrets Act.", "\nDefendants assert they have no liability to plaintiffs unless they personally used trade secrets. ", "Defendants claim that to impose liability on them there would have to be evidence they were down on the shop floor designing or manufacturing PWP's products, or out soliciting customers. ", "The decisional authority is to the contrary. ", "Shareholders, officers, and directors of corporations have been held personally liable for intentional torts when they knew or had reason to know about but failed to put a stop to tortious conduct. (", "McClory v. Dodge, supra, 117 Cal.", "App. ", "at pp. ", "152-154, 4 P.2d 223 [directors who knew, or by the exercise of reasonable diligence and care could and would have known, that plaintiffs stock had been converted to the use of the corporation were personally liable]; Vujacich v. Southern Commercial Co., supra, 21 Cal.", "App. ", "439, 442-443, 132 P. 80 [director who either knew or could have obtained knowledge by the exercise of ordinary diligence was personally liable for conversion of plaintiffs funds to a corporate use]; see also Mercer v. Dunscomb (1930) 110 Cal.", "App. ", "28, 37, 293 P. 836.) ", "Further, an officer's or director's knowing consent to, or approval or authorization of, wrongdoing suffices to impose personal liability. (", "Frances T., supra, 42 Cal.3d at pp. ", "508-509, 229 Cal. ", "Rptr. ", "456, 723 P.2d 573; Spahn v. Guild Industries Corp., supra, 94 Cal.", "App.3d at p. 157, fn. ", "9, 156 Cal.", "Rptr. ", "375; Murphy Tugboat v. Shipowners & Merchants Towboat Co., supra, 467 F.Supp. ", "at p. 852; 18B Am.", "Jur.2d, Corporations, § 1877; 3A Fletcher Cyc. ", "of Private Corporations, supra, § 1135.)", "\nThe argument advanced by defendants, that no potential personal officer or director liability arises absent evidence of defendants' personal use of trade secrets, was rejected by the United States District Court for the District of Colorado in Powell Products, Inc. v. Marks (D.Colo.1996) 948 F.Supp. ", "1469, 1482-1483, in similar circumstances. ", "In Marks, an employee misappropriated his former employer's confidential drawings and specifications for a machine that produced cosmetics applicators. ", "The defendants financed the employee's subsequent efforts to build an applicator machine. ", "They then formed a corporation that began selling cosmetics applicators in competition with the former employer, the plaintiff corporation. ", "There was evidence the defendants knew the employee had worked for the plaintiff and the plaintiff owned a machine the design of which was confidential. ", "Further, the defendants could not identify any reason for going into business with the employee other than he \"`had a good head on his shoulders.'\" (", "Id. at p. 1481.) ", "The defendants brought a summary judgment motion. ", "They argued they could not be held personally liable for misappropriation of trade secrets under the Uniform Trade Secrets Act because there was no evidence they had personally used the plaintiffs trade secrets. ", "The defendants asserted that at most they had participated in setting up a corporation and hiring an employee who used the plaintiffs trade secrets. ", "The district court disagreed. ", "It held a reasonable juror could find from the circumstantial evidence that the defendant directors had actively participated or wrongfully cooperated in the misappropriation of the plaintiffs trade secrets. (", "Id. at p. 1483.)", "\nSimilarly, in National Rejectors, Inc. v. Trieman (Mo.1966) 409 S.W.2d 1, 44, an individual, Fred J. Melvin, misappropriated his then employer's trade secrets. ", "Two other individuals, Rollyn C. Trieman and Albin S. Pierz, joined Mr. Melvin in incorporating the defendant corporation. ", "The defendant corporation used the plaintiff corporation's drawings and materials to produce products in competition with the plaintiff. ", "The Supreme Court of Missouri held Mr. Trieman and Mr. Pierz, who did not participate in the actual misappropriation, but who joined with other defendants in forming the defendant corporation, *678 would be liable to the plaintiff if they knew or should have known about the misappropriation.", "\nDefendants misconstrue plaintiffs' theory of liability and argue that to say a director used or acquired trade secrets by virtue of their corporate status would impose personal liability in every trade secret case involving a corporation. ", "Defendants assert that if we accept plaintiffs' analysis, then, hypothetically, a corporate director would be liable in every trade secret violations case. ", "The fact defendants have omitted from this hypothetical scenario is that the corporate director or officer must have known or had reason to know of the misappropriation and then unreasonably participated in the unlawful conduct. ", "Further omitted from defendants' theoretical situation is the fact that defendants purchased a corporation whose sole assets were purportedly corruptly acquired resources. ", "Liability imposed on a corporate shareholder, officer, or director who knows or has reason to know about tortious misappropriation under these circumstances and allows it to occur is not vicarious.", "\n\nV. DISPOSITION\nThe judgment is reversed. ", "Plaintiffs PMC, Inc. and Winkler Forming, Inc., are to recover their costs on appeal, jointly and severally, from defendants, Neil Kadisha, Benjamin Nazarian, Parviz Nazarian, and Pioneer Private Equity Fund LLC.", "\nGRIGNON, J., and ARMSTRONG, J., concur.", "\nNOTES\n[*] Mosk, J., and Baxter, J., dissented.", "\n[1] For purposes of clarity, we shall refer to the Nazarians by their first and last names.", "\n[2] To avoid confusion, we will refer to the Winklers by their first and last names.", "\n[3] The Supreme Court has recently defined \"unfair\" competition in the sense of anticompetitive practices as meaning \"conduct that threatens an incipient violation of an antitrust law, or violates the policy or spirit of one of those laws because its effects are comparable to or the same as a violation of the law, or otherwise significantly threatens or harms competition.\" (", "Cel-Tech Communications, Inc. v. Los Angeles Cellular Telephone Co. (1999) 20 Cal.4th 163, 187, 83 Cal.", "Rptr.2d 548, 973 P.2d 527, fn. ", "omitted; see South Bay Chevrolet v. General Motors Acceptance Corp. (1999) 72 Cal.", "App.4th 861, 877, fn. ", "9, 85 Cal.", "Rptr.2d 301.)", "\n[4] \"Conspiracy\" is not a cause of action per se. (", "Wyatt v. Union Mortgage Co. (1979) 24 Cal.3d 773, 786-787 & fn. ", "4, 157 Cal.", "Rptr. ", "392, 598 P.2d 45.) ", "However, the Supreme Court has held: \"Personal liability, if otherwise justified, may rest upon a `conspiracy' among the officers and directors to injure third parties through the corporation. [", "Citations.]\" (", "Wyatt v. Union Mortgage Co., supra, 24 Cal.3d at p. 785, 157 Cal.", "Rptr. ", "392, 598 P.2d 45; Doctors' Co. v. Superior Court (1989) 49 Cal.3d 39, 48, 260 Cal.", "Rptr. ", "183, 775 P.2d 508; Golden v. Anderson (1967) 256 Cal. ", "App.2d 714, 719-720, 64 Cal.", "Rptr. ", "404.)", "\n[5] The trial court issued a preliminary injunction on September 2, 1998, enjoining the codefendants from making any use, directly or indirectly, of specified WFI data and information including: computer data, drawings, or blueprints containing product specifications; tooling design specifications; product cost information; and financial information. ", "In May 1999, plaintiffs were denied further injunctive relief with respect to \"next generation production technology\" allegedly developed by the codefendants while they were WFI employees.", "\n[6] Defendants attempt to distinguish Components for Research, Inc. on the grounds the directors themselves were using the trade secrets. ", "However, the dispositive paragraph of the opinion states only that: \"[Defendants] Montali and Ross were notified in July 1962 that the corporation of which they were directors was making unauthorized use of trade secrets improperly transmitted to it by the Biancos, their fellow directors. ", "They and the corporation nonetheless continued to use these manufacturing processes. ", "Thus they, too, are liable. [", "Citation.]\" (", "Components for Research, Inc. v. Isolation Products, Inc., supra, 241 Cal.", "App.2d at pp. ", "729-730, 50 Cal. ", "Rptr. ", "829.)", "\n[7] Corporations Code section 309, subdivisions (b) and (c) provide: \"In performing the duties of a director, a director shall be entitled to rely on information, opinions, reports or statements, including financial statements and other financial data, in each case prepared or presented by any of the following: [¶] (1) One or more officers or employees of the corporation whom the director believes to be reliable and competent in the matters presented. [", "U] (2) Counsel, independent accountants or other persons as to matters which the director believes to be within such person's professional or expert competence. [¶] (", "3) A committee of the board upon which the director does not serve, as to matters within its designated authority, which committee the director believes to merit confidence, so long as, in any such case, the director acts in good faith, after reasonable inquiry when the need therefor is indicated by the circumstances and without knowledge that would cause such reliance to be unwarranted. [¶] (", "c) A person who performs the duties of a director in accordance with subdivisions (a) and (b) shall have no liability based upon any alleged failure to discharge the person's obligations as a director.\" ", "Corporations Code section 7231 provides the same protection to a corporate director.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0, 0.041666666666666664, 0, 0.0392156862745098, 0, 0, 0, 0.02040816326530612, 0, 0, 0, 0.06428571428571428, 0.03827751196172249, 0.04132231404958678, 0, 0, 0, 0, 0, 0.010309278350515464, 0.029850746268656716, 0.00980392156862745, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02127659574468085, 0, 0, 0, 0, 0, 0, 0.034482758620689655, 0, 0, 0, 0, 0, 0, 0, 0, 0.013333333333333334, 0, 0, 0.06666666666666667, 0, 0.020202020202020204, 0, 0, 0.012195121951219513, 0.043478260869565216, 0.037383177570093455, 0.017241379310344827, 0.027624309392265192, 0.05142857142857143, 0.017699115044247787, 0, 0.02564102564102564, 0.014767932489451477, 0.004366812227074236, 0.020689655172413793, 0.007352941176470588, 0, 0, 0, 0.004484304932735426, 0.003424657534246575, 0.00980392156862745, 0.0072992700729927005, 0, 0, 0, 0, 0, 0, 0.017241379310344827, 0, 0, 0, 0.006791171477079796, 0.01444043321299639, 0.013513513513513514, 0.01694915254237288, 0.018018018018018018, 0.010101010101010102, 0.004347826086956522, 0.005, 0.014925373134328358, 0.015151515151515152, 0.017391304347826087, 0.010526315789473684, 0.015384615384615385, 0.011904761904761904, 0.011494252873563218, 0.014285714285714285, 0.01788695444788934, 0.012578616352201259, 0, 0, 0, 0.008849557522123894, 0.01875, 0, 0.014705882352941176, 0.0273972602739726, 0.013422818791946308, 0.014925373134328358, 0.013422818791946308, 0.005847953216374269, 0, 0, 0, 0.00684931506849315, 0, 0, 0, 0, 0, 0.015625, 0, 0.010101010101010102, 0, 0, 0, 0, 0, 0, 0, 0.001177856301531213, 0, 0, 0.023809523809523808, 0, 0, 0.02040816326530612, 0.02631578947368421, 0.02040816326530612, 0, 0.016129032258064516, 0, 0, 0, 0, 0.0053475935828877, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.05555555555555555, 0, 0, 0, 0, 0, 0, 0.015384615384615385, 0, 0, 0.02702702702702703, 0, 0.05555555555555555, 0, 0, 0.015384615384615385, 0, 0, 0, 0.011764705882352941, 0, 0, 0.037037037037037035, 0.03225806451612903, 0, 0, 0, 0, 0.012048192771084338, 0, 0, 0, 0, 0.0196078431372549, 0, 0, 0.004878048780487805, 0, 0.028169014084507043, 0, 0.011904761904761904, 0, 0, 0, 0.02857142857142857, 0, 0, 0.017857142857142856, 0, 0, 0.008823529411764706, 0, 0, 0, 0, 0.003401360544217687, 0, 0, 0, 0.0018587360594795538, 0, 0, 0.022727272727272728, 0, 0, 0, 0, 0.020833333333333332, 0, 0, 0.005376344086021506, 0.05555555555555555, 0, 0, 0.028169014084507043, 0, 0, 0, 0, 0, 0, 0.02857142857142857, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.020833333333333332, 0, 0.02127659574468085, 0, 0, 0, 0.02857142857142857, 0.07142857142857142, 0, 0, 0.02531645569620253, 0, 0, 0.05555555555555555, 0, 0.0078125, 0, 0.03773584905660377, 0, 0, 0.013071895424836602, 0, 0, 0.006060606060606061, 0.07142857142857142, 0, 0, 0.012987012987012988, 0.07142857142857142, 0, 0, 0.012345679012345678, 0, 0, 0.008695652173913044, 0, 0, 0.015384615384615385, 0, 0, 0.004672897196261682, 0, 0, 0.03225806451612903, 0.025, 0, 0, 0.028985507246376812, 0, 0, 0.0010787486515641855, 0.047619047619047616, 0, 0.010416666666666666, 0.008, 0, 0.00625, 0, 0.047619047619047616, 0, 0.03773584905660377, 0, 0, 0, 0.004415011037527594, 0, 0, 0.022222222222222223, 0, 0.0273972602739726, 0, 0, 0.0196078431372549, 0.0030959752321981426, 0.031746031746031744, 0, 0, 0.029850746268656716, 0, 0.023952095808383235, 0.01875, 0.020689655172413793, 0, 0, 0, 0.020942408376963352, 0, 0.011389521640091117, 0, 0, 0, 0, 0, 0, 0, 0.0028735632183908046, 0.03508771929824561, 0, 0.004608294930875576, 0.010101010101010102, 0.02197802197802198, 0, 0, 0.008264462809917356, 0.00980392156862745, 0.025974025974025976, 0, 0, 0, 0, 0.015873015873015872, 0, 0, 0, 0.008908685968819599, 0.006726457399103139, 0, 0.0037313432835820895, 0.004830917874396135, 0.0055248618784530384, 0, 0, 0, 0.013513513513513514, 0, 0.016129032258064516, 0.0049261083743842365, 0, 0.006696428571428571, 0, 0.018867924528301886, 0, 0.0036900369003690036, 0.03571428571428571, 0, 0, 0, 0, 0, 0, 0, 0.004484304932735426, 0.022727272727272728, 0, 0, 0.015384615384615385, 0, 0, 0.008333333333333333, 0, 0, 0, 0, 0, 0, 0, 0.011904761904761904, 0.008, 0, 0.05555555555555555, 0, 0, 0, 0, 0, 0.013888888888888888, 0, 0, 0, 0.024390243902439025, 0, 0.02, 0, 0.008097165991902834, 0, 0.0053475935828877, 0, 0, 0.030303030303030304, 0, 0, 0.0037313432835820895, 0, 0.008264462809917356, 0, 0, 0, 0.05555555555555555, 0, 0, 0.015151515151515152, 0, 0, 0, 0.01282051282051282, 0, 0.0425531914893617, 0.025, 0.006622516556291391, 0, 0.006578947368421052, 0, 0, 0, 0, 0, 0, 0.0047169811320754715, 0, 0, 0, 0, 0.018633540372670808, 0.024390243902439025, 0, 0.010273972602739725, 0, 0, 0, 0, 0, 0, 0.02830188679245283, 0.1, 0.04081632653061224, 0, 0.011627906976744186, 0.002638522427440633, 0.019417475728155338, 0, 0.012195121951219513, 0, 0, 0, 0, 0.015625, 0, 0, 0, 0.005154639175257732, 0, 0.015384615384615385, 0, 0.012195121951219513, 0, 0.018518518518518517, 0, 0, 0, 0.0028169014084507044, 0.005319148936170213, 0.007142857142857143, 0.0034482758620689655, 0, 0, 0, 0.02702702702702703, 0.07142857142857142, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.007495
5
[ "not json\n" ]
{ "pile_set_name": "Github" }
[ 0 ]
0
5
[ "Congress's rocky path to avoiding a government shutdown became even rougher Thursday, as Speaker John Boehner said the House wouldn't accept the spending plan likely to emerge from the Senate.", "\n\nThe Ohio Republican's announcement foreshadows a set of last-minute legislative volleys between the House and Senate to fund federal agencies ahead of a deadline Monday, the final day of the fiscal year.", "\n\nThe..." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.020833333333333332, 0.00975609756097561, 0 ]
0.010196
5
[ "Q:\n\nXCode (4.6.3) invokes TiffUtil in the Copy Resources Phase\n\nDoes anyone know why Xcode (4.6.3) would start TiffUtil in the Copy Resources Phase instead of just copying PNG files to the bundle using CpResource . ", "I'm now ending up with some normal PNG icons and splash screens and a few tiffs. ", "I've checked the images, there doesn't seem to be anything wrong with them.", "\nThanks,\nDaniel Dekkers\n\nA:\n\nI ran into this last week! ", "\nThe problem was in the build settings.", "\n\nCombine High Resolution Artwork COMBINE_HIDPI_IMAGES\nCombines image files at different resolutions into one multi-page TIFF\n file that is HiDPI compliant for Mac OS X 10.7 and later. ", "Only image\n files in the same directory and with the same base name and extension\n are combined. ", "The file names must conform to the naming convention\n used in HiDPI. [", "COMBINE_HIDPI_IMAGES]\n\nIt wants to take your x.png and x@2x.png and turn it into a multi-page TIFF. ", "But since this option isn't valid for iOS, none of your images will work correctly. ", "\nSo, in the build settings, try and find \"Combine High Resolution Artwork\" and turn it off. ", "If its not in there, you can also search for the COMBINE_HIDPI_IMAGES flag and turn it off.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.009302325581395349, 0.012345679012345678, 0, 0.017857142857142856, 0, 0.005376344086021506, 0, 0, 0.02, 0, 0, 0.01098901098901099, 0 ]
0.005836
5
[ "In the region ravaged by the Carr Fire, evacuation orders have been lifted for some neighborhoods of Redding within two miles of Interstate 5.", "\n\nCalFire’s repopulation advisories, shown as blue circles on the map above, cleared residents to return Tuesday to Summit City and the Redding neighborhoods of Buckeye and River Park Highlands. ", "Added to the list on Monday evening were the communities of Shasta Lake, Happy Valley and Douglas City.", "\n\nThe agency’s Tuesday morning report said the Carr Fire had burned 110,154 acres (172 square miles) and was 27 percent contained. ", "It had destroyed 884 homes and 352 other buildings. ", "CalFire posted an interactive online map showing the status of hundreds of damaged homes in the fire zone.", "\n\nMore in California News\n\nBetween last year’s deadly wildfires and this summer’s fatal blazes, utilities and insurers with a huge stake in the aftermath have poured more than $3.2 million into California campaign donations and another $5.2 million into lobbying at the state Capitol — a big spike." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.005128205128205128, 0, 0.007633587786259542, 0, 0, 0.003355704697986577 ]
0.002302
5
[ "The CNN headline and lede boldly proclaim that horror of a school shooting at Rosemary Anderson High School in Portland, Oregon, claiming that three people were shot there.", "\n\nIt’s just too bad that the story simply isn’t true, as the text of CNN’s own report makes clear.", "\n\nThree people were shot Friday afternoon near a high school in Portland, Oregon, Lt. ", "Rich Tyler of the Portland Fire Department said. ", "The victims were breathing and conscious as they were transported from the area near Rosemary Anderson High School, according to the Portland Police Department. ", "Police said the shooting occurred off campus and that the shooters had left the scene. ", "No arrests had been reported.", "\n\n“Near.” “", "Off Campus.”", "\n\nWords still mean things, right?", "\n\nIt is very relevant that Rosemary Anderson is not a normal school campus of 1,000+ students that most of us envision when we hear the words “high school.”", "\n\nIt would perhaps help to paint a more accurate picture if CNN were honest and admitted that Rosemary Anderson HS is an “alternative” school shoved into a storefront location serving young adults that have what can charitably called “issues.” ", "Most of the student body was expelled from traditional schools, or were drop-outs. ", "There are something less than 190 students, according to the school’s web site.", "\n\nThe shooting was a total of five shots fired at teens standing in front of the building, and appears to be gang-related.", "\n\nThe story isn’t remotely what they claimed, but the reality of another gang-related shooting in a liberal paradise isn’t going to sell near the advertising that a “school shooting” would on a relatively slow news day.", "\n\nThis?", "\n\nThis is CNN." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.011627906976744186, 0.01020408163265306, 0, 0.04081632653061224, 0.012422360248447204, 0, 0, 0, 0, 0, 0.00641025641025641, 0.00819672131147541, 0, 0, 0, 0, 0, 0.07142857142857142 ]
0.00895
5
[ "Decrease of thymic hormone serum level in Cockayne syndrome.", "\nPrevious reports concerning children with Cockayne syndrome had described decreased T cell proliferative responses and renal anomalies which could be associated with immunologic disturbances. ", "Herein, the thymic function was evaluated by measuring the serum level of thymic hormone. ", "This serum level was found to be undetectable or decreased in seven cases of Cockayne syndrome. ", "Active serum concentrations varied between 0 and 1/8, whereas normal children of the same age show activity in the range between 1/16 and 1/64. ", "In contrast, T cell function, explored by phytohemagglutinin and Concavalin A responses, and mixed lymphocyte cultures was normal. ", "Whether or not this premature sign of immunological aging is primary or secondary to other manifestations of the syndrome is still difficult to assess." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.0051813471502590676, 0.011111111111111112, 0.010416666666666666, 0, 0.007633587786259542, 0 ]
0.004906
5
[ "![](", "hosplond69270-0012){#sp1 .362}\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0, 0 ]
0
5
[ "from typing import Any, List, Optional\n\nclass Tag:\n key: Any\n value: Any\n def __init__(self, key: Optional[Any] = ..., value: Optional[Any] = ...) -> None: ...\n def startElement(self, name, attrs, connection): ...\n def endElement(self, name, value, connection): ...\n def to_xml(self): ...\n def __eq__(self, other): ...\n\nclass TagSet(List[Tag]):\n def startElement(self, name, attrs, connection): ...\n def endElement(self, name, value, connection): ...\n def add_tag(self, key, value): ...\n def to_xml(self): ...\n\nclass Tags(List[TagSet]):\n def startElement(self, name, attrs, connection): ...\n def endElement(self, name, value, connection): ...\n def to_xml(self): ...\n def add_tag_set(self, tag_set): ...\n" ]
{ "pile_set_name": "Github" }
[ 0.00267379679144385 ]
0.002674
5
[ "The Voice: Interview with Audrey Karrasch of Team Usher\n\nNevada-born, alternative/pop artist Audrey Karrasch competed against Jamila Thompson in the Battle Rounds last week. ", "Though their Battle Round was montaged, we did get to see that Audrey Karrasch pulled through. ", "We spoke with her in a conference call to talk about her thoughts on being montaged and future competitions. ", "Read the interview below, and follow her on Twitter @audreykarrasch.", "\n\nWe didn’t get to see a lot of your battle. ", "Can you tell us a little bit about what happened and a little bit about why you think you were selected to go on?", "\n\nMy performance was really nerve-racking. ", "It was a really hard song choice. ", "I think that Usher was really ambitious when choosing that song. ", "It was definitely a challenge. ", "I couldn’t have been paired with someone better though. ", "Jamila has such a great attitude and she’s extremely talented and such a powerful voice. ", "But it was – that battle was such a challenge.", "\n\nI’m not upset that I was montaged. ", "The only thing I do wish was that people could have seen more of Jamila’s performance because my first episode was aired and I know that she had been montaged before in the past. ", "And she has such a great voice, so I wish that she had more time to be featured.", "\n\nIt wasn’t the best performance but I’m still happy to be here.", "\n\nHaving your battle round montaged, do you think that that hurts your chances at all moving forward?", "\n\nIt’s kind of a little bit what I said before. ", "I do wish that Jamila could have been showed more. ", "Her performance wasn’t the greatest, but that’s the risk that you take going into this competition, you’re going to have good performances and bad ones.", "\n\nI won the battle, so I’m happy to be here and there’s nothing that I would change about it. ", "I wish that – I don’t know – I have kind of mixed feelings about it right now. ", "All I can say is that I’m just grateful and thankful to be here. ", "But I do wish that people could have seen more of Jamila’s performance because she was outstanding.", "\n\nAt some point in the future, you and Josiah are going to be competing against each other. ", "How do you see that competition – especially because you’re not only on the same team, but a male and a female – does that present any special challenges?”", "\n\nI completely agree with what Josiah said. ", "And it’s not even just for team Usher, I mean even if we were to make it past these next rounds, or you know whatever, you know that we’re all competing amongst each other and we all become great friends. ", "So that really is the, I guess the hardest pill – biggest pill to swallow. ", "It’s hard, but as Josiah said, the only thing you can really do and the one thing you have control over is your own performance… so that’s the one thing you can really focus on." ]
{ "pile_set_name": "Pile-CC" }
[ 0.022988505747126436, 0.010526315789473684, 0, 0.014705882352941176, 0, 0, 0, 0, 0, 0, 0, 0.011235955056179775, 0, 0, 0.00558659217877095, 0, 0, 0, 0, 0.0196078431372549, 0, 0, 0, 0, 0.010101010101010102, 0, 0, 0, 0, 0, 0 ]
0.003057
5
[ "Mags Murray\n\nMags Murray is a former Fianna Fáil politician, who was a Councillor on Fingal County Council for the Castleknock Local Electoral Area and the former mayor of FIngal Council.", "\n\nBiography \nMurray was first elected at the 2004 elections as a member of the Progressive Democrats. ", "She was subsequently an unsuccessful candidate for the party in the 2007 Irish general election in the Dublin West. ", "As the Progressive Democrats became defunct she joined Fianna Fáil in February 2008. ", "She lost her seat in the 2019 local elections.", "\n\nIn June 2014 Murray was elected mayor of Fingal County Council due to the support of Fianna Fáil, Fine Gael, Labour and a number of Independents. ", "She served until 2015. ", "When attempting to visit her sick daughter in 2015 after the conclusion of a council meeting, her car was blocked in by anti-watercharge protesters.", "\n\nIn 2015 Murray hosted the Annual Mayor's Conference.", "\n\nShe is the current chairperson of LAMA, the Local Authority Members Association.", "\n\nReferences\n\nFurther reading\nElectoral history\nCathaoirleach blocked in by Anti-Watercharge protesters\nLAMA website\n\nCategory:Living people\nCategory:Fianna Fáil politicians\nCategory:Local councillors in Fingal\nCategory:Irish women in politics\nCategory:Year of birth missing (living people)" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0213903743315508, 0, 0, 0.011764705882352941, 0, 0.02027027027027027, 0, 0, 0.018518518518518517, 0.012195121951219513, 0 ]
0.007649
5
[ "Peshkar Productions\n\nPeshkar Productions is an intercultural theatre and multimedia art company based in the Northwest of England. ", "It engages in participatory projects and professional productions.", "\n\nHistory\n\nPeshkar was initiated in 1991, through a series of Asian Arts workshops by Oldham Metropolitan Borough Council’s (OMBC) Arts Development programme. ", "The workshops were based on Asian music, dance and drama, involving members of the local Asian community with little experience in the performing arts. ", "The success of the workshops and the enthusiasm of the participants led to the formation of Peshkar as a company with a role to promote the arts within the local Asian community by providing a forum for cultural expression. ", "\n\nBetween 1991 and 1998 the company operated as a project within the OMBC Arts and Events Unit, gaining funding from North West Arts Board and other local funding sources to run a series of participatory workshop programmes and theatre productions employing a professional creative team to work with Peshkar’s growing company of participants from the local community.", "\n\nIn 2001 Peshkar secured support from the European Regional Development Fund, which allowed it to constitute the organisation as a Company Limited by Guarantee and a Registered Charity, and develop a business plan that would build on the company’s growing reputation as a regionally significant Asian Arts organisation. ", "It secured Revenue Funding from North West Arts Board and the first full-time company director was appointed in November 2000. ", "In 2006, Jim Johnson (theatre-maker/musician) took over as CEO and Artistic Director of Peshkar. [", "1]\n\nSince then, the company have continued to make work on a multi-platform basis, expanding their remit to targeting young people from a diverse range of hard to reach backgrounds. ", " \n\nIn 2008, Sophia Rashid's 'Dance Without Movement' was reprised at the Edinburgh Fringe. ", " It was directed by Jim Johnson, produced by Bryan Savery and starring Yamina Peerzada from the Rafi Theatre Workshop of Pakistan as Zuhleikah, taking over from Poppy Jakhra from the production's original tour the previous year.", "\n\nIn 2010, following a research trip to Bangladesh, Peshkar embarked on a large-scale project entitled 'FutureDesh' which looked at issues around climate change, the impact in Bangladesh and how it related to young people in the UK. ", " The 'FutureDesh' project yielded two touring theatre pieces both directed by Jim Johnson with digital design by Tristan Brady-Jacobs and set design by Christopher Keech, with music also composed by Jim Johnson under the guise of his musical pseudonym 'Jimmy's Big Tears.'", "\n\nThe first of these productions which was co-produced with Yorkshire theatre company Red Ladder, and written by Nick Ahad, caused some controversy when Philip Davies, the Conservative MP for Shipley, wrote to the Education Minister Michael Gove complaining about the production which toured schools across the Pennine Lancs area, promoting the Climate Change agenda. ", " Despite not actually having seen the play, and without the term 'climate change' ever being discussed or referred to in the play, BBC Radio in Yorkshire hosted a debate featuring both Davies and Red Ladder's Artistic Director Rod Dixon.", "\n\nThe follow up production in the 'FutureDesh' project was Sudha Bhuchar's 'Small Fish Big Cheese' and was staged at the Unicorn Theatre in January 2012.", "\n\nPeshkar was awarded Arts Council National Portfolio status for the period 2012-2015.", "\n\nProductions\n Robot 420 (1992) written & directed by Basir Kazmi\n New Horizons (1993) by Basir Kazmi, directed by Ajay Kumar.", "\n Chappatti and Chips (1994) by Maggie Willett, directed by Harmage Singh Kalirai. ", "\n Masala Girls \n Jaago Get Real by Parv Bancil, directed by Harmage Singh Kalirai, choreographed by Shobna Gulati. ", "\n The Boat Years\n The Beautiful Violin (2002) by Adam Strickson. ", "\n The Beautifully Loose Asia Show (2002) \n Just Before the Rain (2003) directed by Iain Bloomfield. ", " \n Masala Girls: The Wedding (2004) written and directed by Perveen Hussain and Sri Sarker. ", "\n In God We Trust (play) (2005) by Avaes Mohammad. ", "\n Dance Without Movement (2007) by Sophia Rashid (revived for the Edinburgh Fringe in 2008). ", "\n Hiphoperatic(2007) by Tajinder Singh Hayer (revived in 2008).", "\n Passengers (2008) by Tajinder Singh Hayer\n Towards Tomorrow (2008) by Conor Ibrahiem, Randeep Kaur Assi, Sophia Ali and Tajinder Singh Hayer\n Siege (2008) by Tajinder Singh Hayer \n 1001 (2009) by Tajinder Singh Hayer\n \"Life In A Northern Town\" (2009) dir. ", "Jim Johnson\n \"Northern Dust\" (2010) by Farhaan Shah\n \"Nor Any Drop\" (2011) by Nick Ahad, dir. ", "Jim Johnson\n \"Small Fish - Big Cheese\" by Sudha Bhuchar, dir. ", "Jim Johnson\n\nExternal links\n\nPeshkar's official website: \n\nPeshkar's Arts Council profile: \n\nCategory:Theatre companies in the United Kingdom\nCategory:Theatre companies in England" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.007633587786259542, 0, 0.025157232704402517, 0, 0.004464285714285714, 0.008174386920980926, 0.012461059190031152, 0.007874015748031496, 0.02040816326530612, 0, 0.02197802197802198, 0.02631578947368421, 0.004291845493562232, 0.014705882352941176, 0.019021739130434784, 0.012658227848101266, 0.013071895424836602, 0.023255813953488372, 0.023809523809523808, 0.024096385542168676, 0.02608695652173913, 0.015384615384615385, 0.01, 0.010869565217391304, 0.0196078431372549, 0.021505376344086023, 0.015873015873015872, 0.031007751937984496, 0.0425531914893617, 0.04838709677419355, 0.0223463687150838 ]
0.017194
5
[ "Noorderplantsoen\n\nNoorderplantsoen is an urban public park in the city of Groningen in the Netherlands, situated slightly north of the city center. ", "Its name is Dutch for northern public garden.", "\n\nHistory\nIn 1874 the Vestingswet was passed. ", "This law allowed cities to expand outside of the city walls and fortifications. ", "Since the fortifications were no longer in use, they were transformed into a public park. ", "The earth ramparts were incorporated in the park architecture and the moats were turned into ponds. ", "The architecture is of an English garden style, characterized by meandering paths and serpentine ponds, inspired by wild nature. ", "The shape of the park still reflects the former purpose of the area: the long but narrow park curves around the old city.", "\nThe park includes an Art Nouveau bandstand and a small restaurant.", "\n\nUntil the mid-90s the Noorderplantsoen was split up by a busy road, but a referendum in 1994 decided - with a narrow majority - to close this road for motorized traffic.", "\n\nEvents\nEvery year a number of events take place in the Noorderplantsoen, of which the Noorderzon Theater Festival is well known. ", "This cultural event takes place at the end of August and is visited by over 125,000 visitors. ", "Many theater, dance and music groups from The Netherlands and abroad perform during this 11-day festival.", "\n\nAnother well-known event in the Noorderplantsoen is the plantsoenloop. ", "This run through the park is held annually in October or early November and attracts about 500 runners. ", "In 2007 the 50th edition of the plantsoenloop took place.", "\n\nExternal links\nNoorderplantsoen.nl\n\nCategory:Parks in Groningen (province)\nCategory:Urban public parks\nCategory:Groningen (city)" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.013513513513513514, 0, 0.021739130434782608, 0, 0, 0, 0, 0, 0, 0.005847953216374269, 0.015267175572519083, 0, 0, 0.0136986301369863, 0, 0, 0.015267175572519083 ]
0.00502
5
[ "Serum immunoglobulin levels and survival rates in bronchogenic carcinoma patients.", "\nSerum immunoglobulin IgG, IgA and IgM levels were estimated in 112 patients with bronchogenic carcinoma, and the obtained values were as follows: IgG = 1762 +/- 595 mg/100 ml; IgA = 332 +/- 104 mg/100 ml; IgM = 157 +/- 76 mg/100 ml. ", "Subsequently the patients were divided in a group of 74 patients with epidermoid carcinoma, and a group of 38 patients with small cell anaplastic carcinoma of the bronchus. ", "In patients with epidermoid carcinoma, in cases with disseminated disease the mean survival was shorter (7.9 months) when compared to the mean survival of patients with localized disease (20.8 months). ", "Similarly, a depression of lymphocyte counts was observed in cases with disseminated disease. ", "In cases with IgA concentrations ranging from 300 to 410 mg/100 ml longer survival rates were observed. ", "In patients with small cell anaplastic carcinoma variety, the survival rates in patients with localized disease were almost identical with those in patients with disseminated disease (11.4 months versus 9.9 months). ", "The longest survival rates were observed in cases with IgG concentrations ranging from 1600 to 2100 mg/100 ml, and IgM concentrations ranging from 190 to 320 mg/100 ml of serum." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.021367521367521368, 0, 0, 0, 0, 0, 0.005649717514124294 ]
0.003377
5
[ "In response to my last post about dd , a friend of mine noticed that GNU cp always uses a 128 KB buffer size when copying a regular file; this is also the buffer size used by GNU cat . ", "If you use strace to watch what happens when copying a file, you should see a lot of 128 KB read/write sequences:\n\n$ strace -s 8 -xx cp /dev/urandom /dev/null ... read(3, \"\\x61\\xca\\xf8\\xff\\x1a\\xd6\\x83\\x8b\"..., 131072) = 131072 write(4, \"\\x61\\xca\\xf8\\xff\\x1a\\xd6\\x83\\x8b\"..., 131072) = 131072 read(3, \"\\xd7\\x47\\x8f\\x09\\xb2\\x3d\\x47\\x9f\"..., 131072) = 131072 write(4, \"\\xd7\\x47\\x8f\\x09\\xb2\\x3d\\x47\\x9f\"..., 131072) = 131072 read(3, \"\\x12\\x67\\x90\\x66\\xb7\\xed\\x0a\\xf5\"..., 131072) = 131072 write(4, \"\\x12\\x67\\x90\\x66\\xb7\\xed\\x0a\\xf5\"..., 131072) = 131072 read(3, \"\\x9e\\x35\\x34\\x4f\\x9d\\x71\\x19\\x6d\"..., 131072) = 131072 write(4, \"\\x9e\\x35\\x34\\x4f\\x9d\\x71\\x19\\x6d\"..., 131072) = 131072 ...\n\nAs you can see, each copy is operating on buffers 131072 bytes in size, which is 128 KB. ", "GNU cp is part of the GNU coreutils project, and if you go diving into the coreutils source code you'll find this buffer size is defined in the file src/ioblksize.h. ", "The comments in this file are really fascinating. ", "The author of the code in this file (Jim Meyering) did a benchmark using dd if=/dev/zero of=/dev/null with different values of the block size parameter, bs . ", "On a wide variety of systems, including older Intel CPUs, modern high-end Intel CPUs, and even an IBM POWER7 CPU, a 128 KB buffer size is fastest. ", "I used gnuplot to graph these results, shown below. ", "Higher transfer rates are better, and the different symbols represent different system configurations.", "\n\nMost of the systems get faster transfer rates as the buffer size approaches 128 KB. ", "After that, performance generally degrades slightly.", "\n\nThe file includes a cryptic, but interesting, explanation of why 128 KB is the best buffer size. ", "Normally with these system calls it's more efficient to use larger buffer sizes. ", "This is because the larger the buffer size used, the fewer system calls need to be made. ", "So why the drop off in performance when a buffer larger than 128 KB is used?", "\n\nWhen copying a file, GNU cp will first call posix_fadvise(2) on the source file with POSIX_FADV_SEQUENTIAL as the \"advice\" flag. ", "As the name implies, this gives a hint to the kernel that cp plans to scan the source file sequentially. ", "This causes the Linux kernel to use \"readahead\" for the file. ", "On Linux you can also initiate readahead using madvise(2). ", "There's also a system call actually called readahead(2), but it has a slightly different use case.", "\n\nWhen you read(2) data from a regular file, if you're lucky some or all of the data you plan to read will already be in the kernel's page cache. ", "The page cache is a cache of disk pages stored in kernel memory. ", "Normally this works on an LRU basis, so when you read a page from disk the kernel first checks the page cache, and if the page isn't in the cache it reads it from disk and copies it into the page cache (possibly evicting an older page from the cache). ", "This means the first access to a disk page actually requires going to disk, but subsequent accesses can simply copy the data from main memory if the disk page is still in the page cache.", "\n\nWhen the kernel initiates readahead, it makes a best effort to prefetch pages that it thinks will be needed imminently. ", "In particular, when accessing a file sequentially, the kernel will attempt to prefetch upcoming parts of the file as the file is read. ", "When everything is working correctly, one can get a high cache hit rate even if the file contents weren't already in the page cache when the file was initially opened. ", "In fact, if the file is actually accessed sequentially, there's a good chance of getting a 100% hit rate from the page cache when the kernel is doing readahead.", "\n\nThere's a trade-off here, because if the kernel prefetches pages more aggressively there will be a higher cache hit rate; but if the kernel is too aggressive, it may wastefully prefetch pages that aren't actually going to be read. ", "What actually happens is the kernel has a readahead buffer size configured for each block device, and the readahead kernel thread will prefetch at most that much data for files on that block device. ", "You can see the readahead buffer size using the blockdev command:\n\n# Get the readahead size for /dev/sda $ blockdev --getra /dev/sda 256\n\nThe units returned by blockdev are in terms of 512 byte \"sectors\" (even though my Intel SSD doesn't actually have true disk sectors). ", "Thus a return value of 256 actually corresponds to a 128 KB buffer size. ", "You can see how this is actually implemented by the kernel in the file mm/readahead.c, in particular in the method ondemand_readahead() which calls get_init_ra_size() . ", "From my non-expert reading of the code, it appears that the code tries to look at the number of pages in the file, and for large files a maximum value of 128 KB is used. ", "Note that this is highly specific to Linux: other Unix kernels may or may not implement readahead, and if they do there's no guarantee that they'll use the same readahead buffer size.", "\n\nSo how is this related to disk transfer rates? ", "As noted earlier, typically one wants to minimize the number of system calls made, as each system call has overhead. ", "In this case that means we want to use as large a buffer size as possible. ", "On the other hand, performance will be best when the page cache hit rate is high. ", "A buffer size of 128 KB fits both of these constraints---it's the maximum buffer size that can be used before readahead will stop being effective. ", "If a larger buffer size is used, read(2) calls will block while kernel waits for the disk to actually return new data.", "\n\nIn the real world a lot of other things will be happening on the host, so there's no guarantee that the stars will align perfectly. ", "If the disk is very fast, the effect of readahead is diminished, so the penalty for using a larger buffer size might not be as bad. ", "It's also possible to race the kernel here: a userspace program could try to read a file faster than the kernel can prefetch pages, which will make readahead less effective. ", "But on the whole, we expect a 128 KB buffer size to be most effective, and that's exactly what the benchmark above demonstrates." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.005405405405405406, 0.0038809831824062097, 0, 0, 0.006329113924050633, 0.027210884353741496, 0, 0, 0.011627906976744186, 0, 0.010101010101010102, 0, 0, 0.013157894736842105, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.003676470588235294, 0.0136986301369863, 0.005917159763313609, 0.0058823529411764705, 0, 0, 0, 0, 0, 0.006802721088435374, 0, 0, 0, 0, 0.0078125 ]
0.002761
5
[ "This disclosure relates generally to locating a tracking device, and more specifically, to securely providing location and identity information for a tracking device to centralized system.", "\nElectronic tracking devices have created numerous ways for people to track the locations of people and/or objects. ", "For example, a user can use GPS technology to track a device remotely or determine a location of the user. ", "In another example, a user can attach a tracking device to an important object, such as keys or a wallet, and use the features of the tracking device to more quickly locate the object, (e.g., if it becomes lost).", "\nHowever, traditional tracking devices and corresponding systems suffer from one or more disadvantages. ", "For example, locating a tracking device from a far-away distance requires a considerable amount of power. ", "Thus, battery life of a tracking device is often limited. ", "Further, technology for long-range tracking is expensive, and often requires sophisticated circuitry for operating in connection with an associated electronic device (e.g., a mobile device). ", "Additionally, low-power options for tracking devices are limited to tracking nearby objects that require a user to be within a close proximity of the tracking devices, limiting the usefulness of such tracking devices." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0.009345794392523364, 0, 0, 0, 0, 0, 0 ]
0.001038
5
[ "The Nikon Creative Lighting System offers a comprehensive selection of revolutionary portable tools to match virtually any need. ", "Whether used for simple on-camera use at a family gathering or in multiple wireless off-camera arrays, Nikon flashes operate in perfect concert with Nikon’s CLS compatible cameras.", "\n\nNikon imaging software is as important to imaging excellence as the quality of NIKKOR lenses and the capabilities of Nikon cameras. ", "Powerful, sophisticated Nikon software—a vital link in the chain of creative control of the imaging process.", "\n\nWhatever your level of experience and with whatever camera brand you shoot, there's a class for you! ", "We will inspire you, help you master new techniques and improve your picture-taking skills by providing clear, direct information on a wide range of technical and creative topics.", "\n\nNikon Sport Optics\n\nFrom casual weekend outings to rainforest excursions to the safari trip of a lifetime, Nikon Sport Optics give you the ability to clearly view every detail in crisp, brilliant color at a respectful distance. ", "Choose from the range of legendary Nikon optics—binoculars, scopes, rangefinders, digiscoping adapters and accessories—for your viewing needs.", "\n\nArchived Products\n\nAs we develop exciting new products, some older products inevitably must be retired, no matter how beloved. ", "Never to be forgotten, we maintain the key information for these products—tech specs, user manuals and more.", "\n\nDVDs & Books\n\nNikon Ambassadors are some of the most talented and influential visual artists working in the business today. ", "From workshops to trade show platforms, online learning and social media; Nikon Ambassadors represent the most versatile and ambitious photographers today.", "\n\nChange your white balance during a sunrise or sunset. ", "Take your camera off auto white balance and switch to Cloudy or Shady white balance. ", "This will add more strength to the reds, oranges and yellows. ", "Auto White Balance tries to keep colors neutral.", "\n\nLooking for inspiration for your photography? ", "Look no further than Learn & Explore, the area on the Nikonusa website that is packed full of educational articles, how-to tutorials and inspirational pieces on all sorts of photography topics.", "\n\nCarry your camera manual, especially if your camera is new. ", "When traveling you'll probably have a chance to try some new shots. ", "It can also be the time you’re likely to forget the function of a particular button. ", "Or you may just want to explore all the cool things today’s cameras offer.", "\n\nExperiment with the white balance settings outside. ", "White balance on your camera will alter the color temperature and appearance you get in your picture. ", "For instance, a CLOUDY setting will give your pictures a warmer cast. ", "The FLUORESCENT setting will make your photographs cooler, skewing to a purple cast.", "\n\nWhen traveling abroad, check the power setting and type of plugs. ", "Most modern chargers do both 110 volts (USA) and 220 volts (most of the rest of the world). ", "Check yours, and then pick the right adapter for the plug. ", "Be careful to not use a 110-volt power strip in higher-voltage countries.", "\n\nTurn on the lights when shooting inside the house. ", "Lamps and overhead lights will brighten any picture indoors. ", "The light will add depth to the picture and often warm up the color. ", "Most importantly, it will brighten up the background.", "\n\nBe creative with your posing. ", "Don't just line everybody up. ", "Use the steps or the arm of a couch to experiment with some people standing and others sitting. ", "Have kids sitting in laps or someone sitting on the floor or kneeling. ", "Mix it up.", "\n\nGet yourself in the picture. ", "Nothing is worse than a vacation with no shots of the family photographer. ", "Get in the picture by using a tripod (or a steady surface such as a wall or a car hood) and the camera’s self-timer to make sure you're included in the family memories.", "\n\nJump for fun. ", "Have your kids line up for a picture. ", "As the photographer, get low, and get ready to shoot. ", "Have the kids all jump in the air at the same time. ", "Capturing them mid jump can bring out their true personalities.", "\n\nWhen photographing a lot of people at a party, use your camera’s Smart Portrait System to help you get better pictures. ", "The blink mode lets you know if your subjects blinked, and the smile timer can snap the photo when the camera sees that your subjects are smiling.", "\n\nTry turning off your flash at night to get what your eye really sees. ", "If it's at all dark or dim, the camera will try to fire the flash. ", "Find the flash off icon (usually a lightning bolt with a line through it) and select it. ", "Make sure to hold steady, or use a tripod, because the shutter speed may be slow.", "\n\nUse the pet scene mode when photographing cats and dogs. ", "If your camera doesn’t have a pet mode, disable the audible beeps and focus assist lamps while photographing them so the lights and sounds aren’t a distraction.", "\n\nGo shooting with a friend. ", "Not only will you add another pair of eyes to find interesting subjects, but you’ll also feed off of each other’s ideas and energy. ", "Try to organize regular shoots in the park. ", "Share lenses or tips on making that unforgettable photo.", "\n\nUse fill flash to add a little sparkle to your subject’s eyes when shooting portraits outdoors, during the day. ", "Even in bright sunlight, fill flash can even out the lighting for a more pleasing photograph.", "\n\nCompose photos using the “rule of thirds.” ", "Think of the frame as being broken into nine rectangles (like a tic-tac-toe grid over the picture). ", "Place your subject at one of the intersections of the lines for a more visually stimulating photo.", "\n\nWhen shooting an image that has a subject looking off to one side, compose your photograph so there is more space where the subject is looking. ", "This will give your photograph more of a natural feeling.", "\n\nWhen shooting landscapes at dusk or nighttime, use a tripod and cable release or self-timer so you can slow down the shutter speed to let in more light. ", "This is the technique used when you see pictures of car lights as lines, not pinpoints.", "\n\nOne of the rules of composition says that horizon lines should not be placed in the center of an image, but closer to the top or bottom of the frame. ", "Sometimes rules are meant to be broken. ", "When you’re photographing a subject and its reflection, its perfectly fine to place the horizon in the center of the frame.", "\n\nCorporate Profile\n\nNikon is the world leader in digital imaging, precision optics and photo imaging technology and is globally recognized for setting new standards in product design and performance. ", "The unique strength of the Nikon brand attributable to the company’s unwavering commitment to quality, performance, technology and innovation. ", "Nikon Inc. markets and distributes consumer and professional digital SLR cameras, NIKKOR optics, Speedlights…\n\nWas this helpful?helpful0unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/question/1178939/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D1178939&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nAnswers\n\n0points\n\n0out of0found this answer helpful.", "\n\nWas this helpful?helpful0unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/answer/1383742/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D1178939%26expandanswer%3D1383742&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nWas this helpful?helpful0unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/answer/1383730/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D1178939%26expandanswer%3D1383730&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nWas this helpful?helpful2unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/question/526588/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D526588&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nAnswers\n\n+1point\n\n1out of1found this answer helpful.", "\n\nWas this helpful?helpful1unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/answer/637815/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D526588%26expandanswer%3D637815&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nWas this helpful?helpful2unhelpful1http://answers.nikonusa.com/answers/7022-en_us/product/3637/question/632256/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D632256&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nAnswers\n\n+5points\n\n5out of5found this answer helpful.", "\n\nWas this helpful?helpful5unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/answer/737939/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D632256%26expandanswer%3D737939&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nWas this helpful?helpful3unhelpful1http://answers.nikonusa.com/answers/7022-en_us/product/3637/question/679135/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D679135&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nAnswers\n\n+3points\n\n3out of3found this answer helpful.", "\n\nWas this helpful?helpful3unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/answer/792353/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D679135%26expandanswer%3D792353&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nWas this helpful?helpful0unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/question/716354/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D716354&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nAnswers\n\n+1point\n\n1out of1found this answer helpful.", "\n\nWas this helpful?helpful1unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/answer/831470/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D716354%26expandanswer%3D831470&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nWas this helpful?helpful0unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/question/843454/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D843454&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__\n\nAnswers\n\n+1point\n\n1out of1found this answer helpful.", "\n\nWas this helpful?helpful1unhelpful0http://answers.nikonusa.com/answers/7022-en_us/product/3637/answer/983033/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.nikonusa.com%2Fanswers%2F7022-en_us%2Fproduct%2F3637%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D843454%26expandanswer%3D983033&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__" ]
{ "pile_set_name": "Pile-CC" }
[ 0.007751937984496124, 0.011111111111111112, 0.014925373134328358, 0.009259259259259259, 0, 0, 0.013043478260869565, 0.007042253521126761, 0, 0, 0, 0.0064516129032258064, 0, 0, 0, 0, 0, 0.010362694300518135, 0, 0, 0, 0, 0, 0, 0, 0.011904761904761904, 0, 0, 0, 0, 0, 0.01639344262295082, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00819672131147541, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.006993006993006993, 0.007530120481927711, 0.0018738288569643974, 0.0018604651162790699, 0.0018604651162790699, 0.00186219739292365, 0.00186219739292365, 0.0019193857965451055 ]
0.001778
5
[ "Musings on books, the near future, the process of writing, the Semantic Web, the origins of agriculture, evolutionary meme theories, the venture capital process and the occasional political rant; not necessarily in that order.", "\n\nSaturday, May 20, 2006\n\nMy friend Mark recently told me that there are two types of yoga. ", "I present them here for your edification:\n\nYoga from India:\n\nYoga from Horsetralia:\n\nI wish (Oh, how I wish!) ", "that I could take credit for these, but they were forwarded from Mark via a South African mailing list. ", "Unfortunately, they were ungoogleable, so I served them. ", "We wouldn't want them to be lost to posterity! ", "Please comment if you know who should get attribution.", "\n\nFriday, May 19, 2006\n\nEric Miller has announced his imminent departure from the World Wide Web Consortium as Semantic Web Activity Lead. ", "Eric has been Activity Lead for the last five years and was instrumental in producing the core technical infrastructure standards (RDF, RDFS and OWL). ", "He has recently directed the formation of working groups to work on rules interchange and life sciences, as well as continuing SemWeb deployment work. ", "The 2006 Semantic Web Activity Proposal summarizes the state of the Activity and future plans. ", "Eric is rumored to be heading for a more hands-on development role somewhere in the SemWeb space.", "\n\nMonday, May 15, 2006\n\nThis has been a busy week for the Semantic Web. ", "Some of items of interest:\n\nTopQuadrant has released a new SemWeb ontology editor (implemented as an Eclipse plug-in) called Top Braid Composer. ", "There is a free evaluation, but a commercial license. ", "The differentiator from Protégé and SWOOP seems to be a greater attempt at visualization.", "\n\nThe Semantic Web and Multimedia Group, Universita' Politecnica delle Marche, Italy, released version 0.4 of DBin, a P2P/SemWeb project for \"building Semantic Web communities\". ", "The project is under the GPL.", "\n\nMark Birbeck has posted his presentation on RDFa for XTech 2006. ", "RDFa (formerly known as the less Googleable RDF/A) is an up-and-coming way to represent metadata in XML, especially XHTML, documents.", "\n\nAlistair Miles has posted his paper on the requirements for the standardization for SKOS.", "\n\nTim Berners-Lee has made public his final draft report on the MIT-W3C DAML program. ", "In the conclusion, he expresses his ideas for the conditions necessary to make the Semantic Web a reality. ", "I think he was pretty honest about the challenges.", "\n\nSaturday, May 13, 2006\n\nA search for \"Semantic Web\" yielded some interesting and surprising results. ", "Firstly, the search term activity seemed to have peaked a couple of years ago. ", "Perhaps that is not surprising since that was when RDF and OWL were standardized. ", "Secondly, the regions which lead the pack in searching for the term are:\n\nNow, I knew that the Europeans were ahead of the US, so Greece, Ireland and Austria didn't surprise me, nor did the US's absence. ", "Korea, Singapore, India, Malaysia, Taiwan and Hong Kong are all well-known high-techers, so that's OK. ", "But Iran?", "\n\nUnsurprisingly, the news media and the US government continue to misunderstand the central issue in the domestic spying revelations I mentioned in Should We Trust Big Brother?. ", "The real story is protecting the civil rights of individual citizens from abuses, not everyday business-as-usual.", "\n\nThe news media have focused on whether or not Americans object to the NSA trolling their telephone records (they don't, by a 65% majority) and the likely prospects of General Michael Hayden to be confirmed as the next head of the CIA.", "\n\nHowever, consider the following scenario, where innocent people may be harmed for political gain.", "\n\nBy all reports, including the President's, the NSA has gained access to telephone call records in an attempt to track who terrorists are speaking to in the US. ", "Let's say that a terrorist on a watch list calls a dry cleaner in New York City. ", "Let's further stipulate that the dry cleaner is a legitimate business who is not part of any illegal activities. ", "Lots of other people will use that dry cleaner and some will make calls to them. ", "The NSA will not be able to assume that the dry cleaner is legitimate and so will have to analyze the second degree of contacts. ", "Did the dry cleaner make or receive any calls from known criminals or terrorist suspects?", "\n\nPerhaps our dry cleaner also services a local politician and his family. ", "Perhaps one of them has made a call to a 1 900 service, or a brothel or just happened to use the same dry cleaner of a terrorist suspect.", "\n\nCould our leaders resist the urge to use this knowledge for political gain? ", "Surely, some will. ", "History tells us unabashedly that some will not. ", "The theory of six degrees of separation suggests that we are more closely connected to each other than we may think. ", "Should such closeness be used against us, by default and without legislative or judicial oversight?", "\n\nThus, without a carefully crafted system of checks and balances (to include warrants), it is my strong opinion that American civil liberties will be damaged by the current system.", "\n\nI have no objection to the NSA being allowed to do its job! ", "I do, however, believe strongly that trust is earned and not to be given lightly. ", "Trust, say the Russians, but verify. ", "I have yet to hear a single voice raised to explain why the NSA should not be required to get a warrant to access, much less follow, the trail of information available in telephone records.", "\n\nThursday, May 11, 2006\n\nUSA Today reported today that the NSA is keeping a large database of telephone call records for US citizens, with the raw data being supplied by the large telecom carriers. ", "No surprise there. ", "Still, here are some thoughts on the subject:\n\nOne one hand, the limits of current technology would suggest that the NSA would probably need such a database in order to query it for the specific call records they want to find, such as those related to Al Queda, their associates or their correspondents. ", "I can think of no better way to solve the problem, especially when queries may be made during investigations well subsequent to the calls themselves.", "\n\nOn the other hand, I can understand the concerns of citizens not wishing the government to attain, or retain, this information at all. ", "Is there to be no expectation of privacy for any electronic communication? ", "That would engender a great change to the way Americans conduct themselves, especially given the trend to use so many new forms of electronic communications channels.", "\n\nOn the gripping hand, can we trust the NSA and the Administration (any Administration) not to yield to temptation? ", "If we allow them to collect and hold that information, can we trust them not to mine the data? ", "Does not the memory of Joseph McCarthy and J. Edgar Hoover suggest that we should not trust George Bush quite that much?", "\n\nIn any society, there are those who will gladly violate the rights of others just because an authority figure told them to. ", "Just where are the checks and balances on executive power under that scenario?", "\n\nI have to object. ", "On balance, it appears that President Bush is willing to trade a resonable expectation of electronic privacy for a better chance (chance!) ", "of catching a small number of terrorists. ", "I am not. ", "The public good is better served by refusing to become a police state." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.010869565217391304, 0.00909090909090909, 0, 0, 0, 0, 0.007194244604316547, 0.013245033112582781, 0, 0, 0.010309278350515464, 0, 0, 0, 0.02247191011235955, 0.02247191011235955, 0.034482758620689655, 0.014925373134328358, 0.015037593984962405, 0, 0.03488372093023256, 0, 0, 0, 0, 0.024390243902439025, 0, 0, 0, 0, 0, 0.012711864406779662, 0, 0.006172839506172839, 0, 0, 0, 0.007751937984496124, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.016129032258064516, 0, 0, 0.005291005291005291, 0.005025125628140704, 0, 0.003289473684210526, 0, 0.0072992700729927005, 0, 0, 0.02564102564102564, 0, 0.025, 0, 0, 0, 0.007194244604316547, 0, 0, 0 ]
0.00494
5
[ "Asian Pacific Heritage Month 2010: Scott Kim\n\nMay 1, 2010\n\nScott Kim is a special agent with Diplomatic Security, after working as an attorney in New York City. ", "He is currently a DS desk officer for South and Central Asia, supporting security programs at 18 posts and over 55 regional security officers (RSOs) throughout SCA.", "\n\nMr. Kim started his career in 1999 at the Los Angeles field office, where he participated in several complex criminal investigations, completed temporary assignments in Israel, Macedonia and Indonesia and supported many overseas visits by the Secretary of State. ", "His first overseas assignment was as an assistant regional security officer (ARSO) in Algiers. ", "During this tour, Algeria experienced a 6.8 magnitude earthquake, the largest in two decades. ", "With thousands reported dead or injured, including several Foreign Service National colleagues, he gained first-hand experience in crisis management.", "\n\nNext, Mr. Kim served as a team leader in the Office of Mobile Security Deployments, the tactical support unit for DS. ", "He led teams to Saudi Arabia, Israel, Haiti, Iraq and Liberia. ", "While in Monrovia supporting the first female president of an African nation, he coordinated security support for her inaugural ceremony, also attended by Secretary of State Condoleezza Rice and First Lady Laura Bush.", "\n\nMr. Kim considers his next overseas assignment in Seoul both professionally and personally rewarding. ", "He seized the opportunity to reconnect culturally and sharpen his Korean language skills. ", "He also faced many challenges, including unprecedented levels of anti-U.S. protests and demonstrations (numbering in the hundreds of thousands) and continuing provocations between North and South Korea, including a North Korean missile launch during the 2009 July 4th Embassy event.", "\n\nThe Office of Website Management, Bureau of Public Affairs, manages this site as a portal for information from the U.S. State Department.", "\nExternal links to other Internet sites should not be construed as an endorsement of the views or privacy policies contained therein.", "\n\nSign-in\n\nDo you already have an account on one of these sites? ", "Click the logo to sign in and create your own customized State Department page. ", "Want to learn more? ", "Check out our FAQ!", "\n\nBecause JavaScript is disabled, you can only sign in by entering your OpenID URL manually:" ]
{ "pile_set_name": "Pile-CC" }
[ 0.018633540372670808, 0.012195121951219513, 0.007547169811320755, 0.010526315789473684, 0, 0, 0.025, 0, 0.018433179723502304, 0.009615384615384616, 0, 0.0035460992907801418, 0.02158273381294964, 0, 0, 0.0125, 0, 0.05555555555555555, 0.010869565217391304 ]
0.010842
5
[ "The role of high levels of dietary fat in 7,12-dimethylbenzanthracene-induced mouse mammary tumorigenesis: lack of an effect on lipid peroxidation.", "\nThe effects of dietary fat on 7,12-dimethylbenzanthracene (DMBA)-induced mammary tumorigenesis were examined in BALB/c female mice. ", "In the first experiment, BALB/c mice were treated with a total dose of 1, 3, or 6 mg DMBA to induce mammary tumors. ", "One week after the last dose of DMBA, the mice were placed on a 5% (LF) or 20% (HF) corn oil semi-purified diet. ", "The 20% corn oil diet resulted in a significantly decreased mean tumor latency period in each of the three groups of mice (p less than 0.05). ", "However, the mammary tumor incidences at 11 months after DMBA treatment were the following: 6 mg DMBA (LF-14/32, HF-17/32); 3 mg DMBA (LF-13/50, HF-14/50); 1 mg (LF-2/50, HF-6/50). ", "In the second experiment, prolonged hormonal stimulation by pituitary isografts, but not a HF diet, enhanced the incidence of mammary tumors in BALB/c mice given a threshold dose of DMBA (0.5 mg). ", "In a further attempt to examine the mechanism of the enhancing effects of dietary fat, lipid peroxidation was measured in the microsomal-mitochondrial fractions of the mammary glands by two assays; measurements of conjugated dienes and TBA reactants (malonyldialdehyde). ", "The high fat diet had no effect on the levels of conjugated dienes in mammary cell membrane preparations and decreased the levels of TBA reactants (malonyldialdehyde). ", "The results indicated that a high fat diet did not lead to enhanced levels of lipid peroxidation in preparations of microsomal mitochondrial membranes from mouse mammary glands. ", "The implications of these results are discussed with respect to the role of dietary fat as a promoter of mouse mammary tumorigenesis." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0.017241379310344827, 0.017699115044247787, 0, 0.016574585635359115, 0.015228426395939087, 0.0036900369003690036, 0.005952380952380952, 0, 0 ]
0.006944
5
[ "Introduction {#Sec1}\n============\n\nSmoking is a risk factor for six of the eight leading causes of death in the world, including lung cancer \\[[@CR1]\\]. ", "The World Health Organization (WHO) estimates that without adequate controls, tobacco-related deaths will increase to more than 8 million in the year 2030, particularly in developing countries \\[[@CR2]\\]. ", "In Mexico, about 10 thousand new cases of lung cancer are diagnosed every year and the majority are related to smoking (71%). ", "Lung cancer ranks seventh in incidence among cancer sites and is first in mortality, and about 8000 Mexicans die from this neoplasm each year \\[[@CR3]\\].", "\n\nNicotine is associated with tobacco addiction. ", "Most of the nicotine metabolism takes place in the liver \\[[@CR4]\\]. ", "Approximately 80% of nicotine metabolism in the body is by phase I metabolism to cotinine and then to *trans*-3′-hydroxy-cotinine (3HC), mainly by the enzyme CYP2A6. ", "Nicotine, cotinine and 3HC are all glucuronidated in phase II metabolism by the glucuronosyltransferase (UGT) enzymes to render nicotine--*N*-glucuronide (nicotine-Gluc), cotinine-*N*-glucuronide (cotinine-Gluc) and 3HC-*O*-glucuronide (3HC-Gluc; Fig.", " [1](#Fig1){ref-type=\"fig\"}), resulting in more polar molecules that are easily excreted in the urine \\[[@CR5], [@CR6]\\]. ", "Also, nicotine and cotinine are oxidized to nicotine-*N*′-Oxide and cotinine-*N*-Oxide by flavin monooxygenases enzymes (FMOs) \\[[@CR7]\\], and it is believed that 4-oxo-4-(3-pyridyl) butanoic acid (4HPBA) is formed by the hydroxylation of nicotine by the CYP2A6 enzyme \\[[@CR8], [@CR9]\\].Fig. ", "1Schematic of major nicotine metabolites (adapted from Perez-Paramo et al. ", "\\[[@CR7]\\]).", "\n\nEnzymes of nicotine metabolism are highly polymorphic and their genetic variants can cause differences in enzyme activity \\[[@CR7], [@CR10]--[@CR16]\\]. ", "This may translate into inter-individual differences in the concentration of nicotine in the body and to differences in the number of cigarettes consumed by smokers \\[[@CR17]\\]. ", "For example, *CYP2A6* reduced activity gene variants are associated with reduced lung cancer risk in smokers \\[[@CR18], [@CR19]\\] and nicotine dependence \\[[@CR20], [@CR21]\\] in different populations. ", "While this variants are associated to increased risk for tobacco-related cancers in humans \\[[@CR22]--[@CR24]\\], they also can affect smoking-frequency, nicotine clearance, and data interpretation of tobacco use \\[[@CR25]\\]. ", "It has been reported that among Mexican smokers between 18 and 35 years, the average number of cigarettes consumed is 1--5 per day and less than half (37%) smoke daily \\[[@CR26]\\]. ", "This is considerably less than that observed in other populations. ", "For example, about 76% of U.S. smokers consume tobacco every day and 40% of them smoke more than 10--19 cigarettes per day \\[[@CR27]\\]. ", "African American, Caucasians, and Latino subjects older than 25-years-old smoke an average of 9.7 cigarettes per day, and 88% of them report daily smoking for 6 months or more \\[[@CR28]\\].", "\n\nSingle nucleotide polymorphisms (SNPs) have been associated with the metabolism of nicotine in several ethnic groups, but studies in Mexicans are still scarce \\[[@CR21], [@CR29]\\]. ", "The objective of the present study was to determine whether associations exist between genetic variants in nicotine metabolizing enzyme genes and the concentration of urinary metabolites of nicotine in Mexican smokers.", "\n\nMaterial and methods {#Sec2}\n====================\n\nStudy population {#Sec3}\n----------------\n\nThe study protocol was approved by the Ethics Committee of the School of Medicine and the University Hospital of the Universidad Autonoma de Nuevo Leon (code BI12-005) and ethical standards of the Declaration of Helsinki were followed. ", "Questionnaire data and samples were collected from 88 university students from the northeast region of Mexico. ", "This *n* was adapted to the number of cells available for NGS in the TrueSeq Custom amplicon kit (Illumina Inc.). ", "Inclusion criteria included being of ages 18--35 years and having smoked more than five cigarettes in the last 3 days. ", "Informed consent was provided by all subjects. ", "Exclusion criteria included liver or kidney disease and pregnancy. ", "Participants signed an informed consent letter, answered a questionnaire about socio-demographic data and their smoking exposure, and provided 5 mL of peripheral blood anticoagulated with EDTA and 50 mL of urine. ", "Samples were transported to the laboratory at 4 °C within 3 h after sample collection. ", "Genomic DNA was extracted with the TSNT technique (lysis buffer: 2% Triton, 1% SDS, 100 mM NaCl, 10 mM Tris-HCl, pH 8.0), followed by phenol-chloroform extraction. ", "Urine was aliquoted, and samples stored at −20 °C until analysis.", "\n\nQuantification of urine nicotine metabolites {#Sec4}\n--------------------------------------------\n\nNicotine metabolites were examined using an Acquity liquid chromatography---tandem mass spectrometer (LC-MS/MS system) (Waters Corporation, Milford, MA) as described by Chen et al. ", "\\[[@CR15]\\]. ", "Quantification was performed for the following urinary metabolites: nicotine, nicotine-*N'*-Oxide, nicotine-Gluc, cotinine, cotinine-Gluc, cotinine-*N*-Oxide, 3HC, 3HC-Gluc and 4HPBA. ", "Urinary creatinine was measured as a control for urine secretion and for normalization of nicotine metabolite levels between specimens \\[[@CR15]\\]. ", "To corroborate measurements, repeat testing was performed for 15% of all samples, chosen randomly. ", "The limit of quantitation (LLOQ) of all metabolites are shown in the Table [S1](#MOESM2){ref-type=\"media\"}. ", "The investigators who performed the phenotyping analysis were blinded to all demographic and genotyping data corresponding to the individual subjects including levels of smoking.", "\n\nQuantification of plasma cotinine {#Sec5}\n---------------------------------\n\nQuantification of plasma cotinine was performed in duplicate by ELISA (Calbiotech Inc., CA). ", "The assay's lower limit of quantitation (LLOQ) was 0.44 ng/mL.\n\nGenotyping by next-generation sequencing (NGS) {#Sec6}\n----------------------------------------------\n\nA custom panel was designed to sequence 384 genetic variants in 52 genes related to xenobiotic metabolism (Table [S2](#MOESM3){ref-type=\"media\"}), which included 167 genetic variants in 24 genes associated with nicotine metabolism. ", "Specific oligonucleotides were designed using Illumina's Design Studio program (Illumina Inc., San Diego, CA) and the quality and the Illumina staff verified feasibility of their design. ", "A group of 88 subjects who smoked more than five cigarettes in the last 3 days were included. ", "To confirm their tobacco use, plasma cotinine was measured for each subject, with plasma cotinine concentrations ranged between 2.4 and 500 ng/μL. DNA quality and concentrations were evaluated using a Nanodrop 8000 spectrophotometer (260/280 absorbance ratio ≥1.8; Thermo Scientific, Wilmington, DE). ", "NGS libraries were amplified using 250 ng of genomic DNA as template and the Truseq Custom amplicon kit in an Eppendorf EP Master Faster thermocycler (Foster City, CA). ", "The quality of the libraries were evaluated in an Agilent 2100 Bioanalyzer (Santa Clara, CA) and were standardized according to the manufacturer's instructions. ", "Libraries were adjusted to a concentration of 12 pM and verified using the Quant-iT Picogreen kit (Thermo Scientific). ", "A pool of libraries from 88 subjects was generated and added to the cartridge MiSeq reagent kit V2 (Illumina Inc.) and was sequenced using the platform MiSeq by Illumina (150 bp paired-end reads) (Illumina Inc.). ", "The variant call format files (VCFs) of each sample were visualized in the Variant Studio software (Illumina Inc.).", "\n\n*CYP2A6\\*12* genotyping {#Sec7}\n-----------------------\n\n*CYP2A6\\*12* is a variant resulting from a translocation between the *CYP2A6* and *CYP2A7* genes generated by a *CYP2A6/CYP2A7* hybrid formed by exons 1--2 of the *CYP2A7* gene and exons 3--9 of the *CYP2A6* gene; this causes the loss of 10 amino acids and reduced *CYP2A6* activity \\[[@CR30]\\]. ", "The genotyping of *CYP2A6\\*12* was developed by the method described by Oscarson et al. ", "\\[[@CR30]\\], with small variations. ", "The process was carried out in two steps (PCR1 and PCR2). ", "In PCR1, a common region of *CYP2A6\\*1* (wild type) and *CYP1A6\\*12* (variant) of 2.3 kb was amplified using 100 ng of DNA in each reaction. ", "The reaction mixture was incubated with GoTaq Green Master Mix (Promega) and 2.5 μM of the primers 2A-F (5′-GCACCCCTCCTGAGGTACCAC-3′) and 2A6ex3R1 (5′-GTCCCCTGCTCACCGCCA-3′) in a final volume of 10 μL. The PCR program started with denaturation at 95 °C for 1 min, followed by 35 cycles of denaturation at 95 °C for 15 sec, alignment at 60 °C for 20 s, extension at 72 °C for 1 min and final extension to 72 °C for 7 min. ", "The reaction mixture for PCR2 is a specific allele, the primer 2A6ex1 anneals the exon 1 from *CYP2A6* gene and the primer 2A7ex1 anneals the exón 1 from *CYP2A7* gene. ", "This PCR identifies the wild type allele and the chimeric *CYP2A6/CYP2A7* allele (respectively), both generate an amplicon of approximately 1.5 kb. ", "PCR2 was carried out with 1 μL of a 1:100 dilution of the PCR1 product, GoTaq Green Master Mix (Promega), 50 μM of sense primers (2A6ex1: 5′- AACACAGAGCAGATGTACA-3′ or 2A7ex1: 5′-AACACAGAGCACATATGTG-3′) and 50 μM of antisense primers (5′-CGCTCCCCGTT-GCTGAATA-3′) in a final volume of 10 μL. The PCR program started with a denaturation at 95 °C for 1 min, followed by 30 cycles of denaturation at 95 °C for 15 s, alignment at 60 °C for 20 s, extension at 72 °C for 1 min and a final extension at 72 °C for 7 min. ", "The products were stained with ethidium bromide and visualized in 1.2% agarose gels.", "\n\nData analysis {#Sec8}\n-------------\n\nTotal nicotine metabolite levels, or \"equivalents\" (Total-Nic-Eq) present in each urine sample were determined as the sum of the uM concentrations of nicotine, nicotine-Gluc, nicotine-*N*'-Oxide, cotinine, cotinine-Gluc, cotinine-*N*-Oxide, 3HC, 3HC-Gluc and 4HPBA. ", "The percentage of each analyte in the Total-Nic-Eq and as creatinine-normalized levels was calculated based on the equation: *C* (μM)/\\[Total-Nic-Eq (uM)\\] × 100, where \"*C*\" is the total urinary metabolite concentration. ", "R package (R-project.org) was used to produce the correlation matrix and Pearson analyses to assess relationship among metabolites. ", "Non parametric Spearman correlation was used to compare urinary and plasma cotinine levels with GraphPad Prism software. ", "To describe the study population, we used basic descriptive statistics. ", "For the analysis of the NGS data, The Human Genome Build construct (hg19) was used as a reference \\[GRCh38.p12. ", "Homo Sapiens (human). ", "Genome Reference Consortium (December 2017). ", "RefSeq assembly: GCF_000001405.38\\]. ", "The alignment and the variant calling were done with the Miseq Reporter TruSeq Amplicon (Illumina Inc.). ", "The variants were identified and visualized using Variant Studio software (Illumina Inc.), and the data filtering pipeline was as follows: Q \\> 30, quality of the readings \\> 100, depth \\> 60, and allelic frequency \\> 25%. ", "For the gene and metabolite analysis, the variances between groups were different and a Mann--Whitney test for STATA (StataCorp. ", "2019. ", "Stata Statistical Software: Release 15. ", "College Station, TX: StataCorp LLC) was used. ", "Significance level for *p*-values was set at 0.05 or less.", "\n\nResults {#Sec9}\n=======\n\nOf the 88 subjects recruited into this study the majority of subjects were native to the state of Nuevo Leon (74%), 24 (27%) were women. ", "The average age of the subjects was 20 years and the median age of smoking initiation was 15 years. ", "For this study, we selected the participants among those subjects who smoked more than five cigarettes in the last 3 days, since in a previous national survey, the range of consumption reported was 1 to 5 cigarettes per day \\[[@CR31]\\]. ", "Seventy-four subjects (84%) indicated that they were daily smokers. ", "Plasma cotinine was proportional to the number of cigarettes smoked (groups of cigarettes smoked: 1--5, 6--10, 11--20, \\>20; see Table [1](#Tab1){ref-type=\"table\"}). ", "In addition, urinary and plasma cotinine levels show a positive correlation (*r* = 0.79, *p* \\< 0.0001, and *r*^2^ = 0.50; Fig.", " [S1](#MOESM1){ref-type=\"media\"}).Table 1Demographic characteristics, smoking habits, and plasma cotinine levels in study subjects.", "CharacteristicsValues*N* (%)*PN* total88OriginNuevo leon65 (74)Coahuila9 (10)Others14 (16)GenderFemale24 (27)\\<0.0001\\*Male64 (73)Smoking dailyYes74 (84)\\<0.0001\\*No14 (16)CharacteristicsValues*N* (%)Cotinine (ng/mL) Mean (standard error)*P*Number of cigarettes smoked in the last three days1--518 (20)25 (12.26)0.007\\*\\*6--1019 (22)78 (22)11--1517 (19)63 (24)16--208 (9)139 (57)\\>2026 (30)131 (24)\\**P*-value from Chi^2^ test\\*\\**P*-value from ANOVA test\n\nTable [2](#Tab2){ref-type=\"table\"} shows the levels of each of the urinary nicotine metabolites expressed as a percentage of Total-Nic-Eq and after normalization with creatinine concentration. ", "The major metabolite in smokers was 3HC (35% of Total-Nic-Eq) followed by 4HPBA (17% of Total-Nic-Eq) \\> 3HC-Gluc (14% of Total-Nic-Eq) \\> cotinine (9.5% of Total-Nic-Eq) \\> nicotine-*N*'-Oxide (7.6% of Total-Nic-Eq) \\> cotinine-Gluc (7.3% of Total-Nic-Eq) \\> nicotine (4.3% of Total-Nic-Eq) \\> cotinine-*N*-Oxide (3.4% of Total-Nic-Eq) \\> nicotine--Gluc (3.0% of Total-Nic-Eq). ", "For the glucuronides, the ratios of 3HC-Gluc were 1.9 and 4.6 times higher than those observed for cotinine-Gluc and nicotine-Gluc, respectively. ", "For the oxidation products, the cotinine-*N*-Oxide ratios were 2.2 times higher than that observed for nicotine-*N*'-Oxide. ", "The levels of 3HC and 4HPBA were 3.7- and 1.7-fold higher, respectively, than those observed for cotinine. ", "When smokers were stratified by nicotine metabolic ratio (NMR), using the previously reported threshold (slow metabolizers \\< 0.31 and normal and fast metabolizers ≥ 0.31) 98.8% (*n* = 87) of our smokers fell into the normal metabolizers category \\[[@CR32]\\].Table 2Profile concentration of nicotine metabolites in urine of 88 smokers, expressed in percentage of Total-Nic-Eq and adjusted levels with milligrams of urinary creatinine.% de Total-Nic-EqCreatinine-adjusted levels (nmol/mg creatinine)Mean ± ES (95% CI)RangeMean ± ES (95% CI)Range3HC35 ± 1.6 (32--38)0.3--6111 ± 1.2 (8.7--14)0.02--534HPBA17 ± 2.1 (13--21)1.6--893.9 ± 0.5 (3.0--4.7)0.02--223HC-Gluc14 ± 0.7 (14--16)0.1--304.4 ± 0.6 (3.2--5.6)0.004--38Cotinine9.5 ± 0.5 (8.5--11)0.4--243.1 ± 0.4 (2.3--3.8)0.001--26Nicotine-*N*'-Oxide7.5 ± 1.4 (4.7--11)0.7--877.2 ± 5.1 (2.7--17)0.04--447Cotinine-Gluc7.0 ± 4.1 (6.4--8.1)0.3--182.5 ± 0.3 (1.9--3.1)0.01--14Nicotine4.0 ± 6.6 (3.0--5.7)0.1--471.2 ± 0.1 (0.9--1.5)0.001--6.2Cotinine-*N*-Oxide3.0 ± 1.6 (3.1--3.7)0.1--8.21.1 ± 0.1 (0.8--1.3)0.00--6.1Nicotine-Gluc3.0 ± 2.5 (2.5--3.5)0.2--161.1 ± 0.2 (0.8--1.5)0.8--1.4\n\nA linear correlation analysis of urinary metabolites normalized by creatinine levels was performed. ", "Figure [2](#Fig2){ref-type=\"fig\"} shows a positive correlation between cotinine-Gluc vs cotinine-*N*-Oxide (*r* = 0.91; *p* \\< 0.0001), cotinine-Gluc vs 3HC (*r* = 0.86; *p* \\< 0.0001) and cotinine-*N*-Oxide vs 3HC (*r* = 0.84; *p* \\< 0.0001). ", "Nicotine-*N*'-Oxide was the least correlated with all metabolites (*r* ≤ 0.38).Fig. ", "2Correlation Matrix of urinary nicotine and its eight major metabolites (nicotine, nicotine-*N*'-oxide, nicotine-Gluc, cotinine, cotinine-*N*-oxide, cotinine-Gluc, 3HC, 3HC-Gluc, and 4HPBA).Each cell in the table shows the correlation between two variables using the color code from the right side, where red indicates negative correlation values and blue indicate positive correlation values. ", "The calculated values of the correlation coefficient are shown in the lower half at below the diagonal of the matrix. ", "Pearson's product moment correlation coefficient are shown in the upper half above the diagonal of the matrix, where one, two or three asterisks indicate that the *p*-value was lower than 0.05, 0.01, and 0.001, respectively. ", "The empty cells indicate no correlation.", "\n\nA total of 10,283,992 readings were generated per NGS. ", "95% had a score higher than Q30. ", "402 SNPs in 68 genes were identified, of which 260 (65%) were found in exons. ", "Of the variants identified, 71 (27%) were missense variants. ", "After filtering sequence data, 11 variants in *CYP2A6*, 14 in *CYP2B6*, 4 in *UGT2B7* and 42 in *UGT1A* isoforms were available for association studies. ", "The variants associated with different concentrations of nicotine metabolites were: *CYP2A6\\*12* and rs145014075 in the *CYP2A6* gene, and rs12471326 in the *UGT1A9* gene locus. ", "These gene variants were in Hardy--Weinberg equilibrium, and the frequencies observed in our studied population are shown in Table [3](#Tab3){ref-type=\"table\"}.Table 3Allelic and genotypic frequencies of 88 subjects analyzed by NGS.VariantsAllele 1Allele 2Homozygous wild-typeHeterozygotesHomozygous variantMAF\\*HWE\\*\\* (*p*)*CYP2A6\\*12*CYP2A60.96CYP2A6/70.040.920.0800.040.67*CYP2A6*rs145014075G: 0.97T: 0.030.930.0700.030.71*UGT1A9*rs12471326T: 0.91C: 0.090.820.1800.090.34\\**MAF* minor allele frequency.\\*\\**HWE* Hardy--Weinberg Equilibrium.", "\n\nThe variants *CYP2A6\\*12* and rs145014075, both in the *CYP2A6* gene, were associated with altered levels of 3HC and nicotine, respectively. ", "The variant *CYP2A6\\*12* confers reduced enzyme activity as described above \\[[@CR30]\\] and the variant rs145014075 is a nonsense G/T change generating a stop codon (Ser467Stop). ", "The heterozygous genotype for *CYP2A6\\*12* was associated with low levels of 3HC (*p* = 0.014), 30% of Total-Nic-Eq of cotinine-Gluc were observed in heterozygotes vs 39% in wild type homozygotes. ", "The heterozygous genotype GT of rs145014075 variant was associated with high creatinine-adjusted levels of nicotine (*p* = 0.035): 3% in heterozygotes vs 0.5% in wild type homozygotes (Fig.", " [3](#Fig3){ref-type=\"fig\"}). ", "No homozygotes for the mutant allele were found for either of these variants. ", "The variant rs12471326 in the *UGT1A9* gene was associated with high levels of cotinine-Gluc (*p* = 0.030), 9% of Total-Nic-Eq of cotinine-Gluc was observed in heterozygotes vs 7% in wild type homozygotes (Fig.", " [3](#Fig3){ref-type=\"fig\"}). ", "No homozygotes for the mutant allele were found for this variant.", "Fig. ", "3Effect of variants on nicotine metabolite.**a** Genotypes *CYP2A6/6* and *CYP2A6/7* of the *CYP2A6* gene vs percentage of 3HC analyte in the Total-Nic-Eq. **", "b** GG and GT genotypes of the rs145014075 variant of *CYP2A6* vs creatinine-adjusted levels of nicotine. **", "c** TT and TC genotypes of the variant rs12471326 of the *UGT1A9* gene vs percentage of cotinine-Gluc analyte in the Total-Nic-Eq. ", "A Mann--Whitney test for STATA (College station, TX) was used to make the comparisons of the genotypes and the levels of the metabolites. ", "Metabolite levels are shown as percentage of analyte in the Total-Nic-Eq and creatinine-adjusted levels and are shown as the mean ± standard error.", "\n\nDiscussion {#Sec10}\n==========\n\nThis study showed that variants in *CYP2A6* are associated to urinary levels of nicotine and 3HC, while the *UGT1A9* variant is associated with urinary levels of cotinine-Gluc in young smokers from northeastern Mexico. ", "The remaining variants in genes related to the nicotine metabolism failed to show associations. ", "Regarding the *CYP2A6* variants, Bloom et al. ", "reported that the rs1137115 and rs28399435 were associated with low metabolism of nicotine in European Americans \\[[@CR33]\\], but in our study no differences were observed among urinary levels of nicotine, cotinine and 3HC with these variants. ", "The variant rs28399433 has been reported to be associated with smoking dependence in Mexican population \\[[@CR34]\\], but no association was observed in our study at large. ", "Nevertheless, when stratifying our samples according to their NMR, only the single sample that fell into the slow metabolizer category (NMR \\< 0.31) presented with a heterozygous genotype for the rs28399433 variant. ", "The low frequency of this variant among our studied population (MAF = 0.13) might explain the lack of significant associations. ", "CYP2A6 and CYP2B6 are responsible for 90 and 10% of the conversion of nicotine to cotinine, respectively \\[[@CR35]\\]. ", "CYP2A6 is responsible for 100% of the conversion of cotinine to 3HC \\[[@CR6]\\]. ", "Previous studies in cell lines and in vivo have shown that the *CYP2A6\\*12* variant reduces the metabolism of coumarin in approximately 60% of subjects \\[[@CR30], [@CR36]\\]. ", "The *CYP2A6\\*12* variant has been strongly associated with smoking status in Spaniards \\[[@CR37]\\]. ", "In the present study, the heterozygous genotype *CYP2A6/7* was associated with low levels of 3HC as a percentage of the Total-Nic-Eq in young smokers. ", "No differences of Total-Nic-Eq for cotinine were observed in *CYP2A6/6* homozygotes and *CYP2A6/7* heterozygotes. ", "The *CYP2A6\\*12* frequency in our population was low (4%), close to those reported for Spaniard and Chinese populations (2.2 and 0%, respectively) \\[[@CR30]\\]. ", "This variant can predispose to lower consumption of cigarettes \\[[@CR38]\\], but we did not find significant differences in the number of consumed cigarettes in this study (*p* = 0.69).", "\n\nThe variant rs145014075 of the *CYP2A6* gene was found in 3% of the subjects examined in this study. ", "This variant causes a stop codon (Ser467Stop), but functional studies have not yet been reported for the enzymatic effects of the nonsense variant. ", "This variant is reported in the 1000 Genomes Project Database at frequencies of 4% and 2% in African American and European American populations, respectively. ", "In the present study, this variant was associated with high creatinine-adjusted levels of nicotine, although no association was observed when examined as a percentage of Total-Nic-Eq. ", "This association was not observed for the other analyzed variants. ", "While this variant may reduce the activity of CYP2A6 and may be related to lower consumption of cigarettes, no association with the number of consumed cigarettes was found in the present study.", "\n\nRegarding *UGT2B7* gene variants, an important enzyme for the glucuronidation of 3HC \\[[@CR39]\\], we did not find associations with glucuronides of nicotine metabolites. ", "In the case of *UGT2B17*, most of the variants were discarded after filtering with the parameters described above. ", "We found an association between the levels of urinary cotinine-Gluc and the rs12471326 gene variant of *UGT1A9*. ", "This intronic variant was found to be associated with high percentages of Total-Nic-Eq of cotinine-Gluc. ", "There is a clinical study for this variant showing no differences in the in the postnatal metabolism of bilirubin, but no functional analyses in the nicotine metabolism have been reported \\[[@CR40]\\].", "\n\nKaivosaari et al. ", "reported that UGT1A9 did not exhibit any nicotine or cotinine glucuronidation activity in human liver microsomes (HLM) \\[[@CR41]\\], and other studies showed that UGTs 2B10 and 1A4 were the major enzymes responsible for nicotine and cotinine glucuronidation \\[[@CR14]\\]. ", "However, Kuehl and Murphy studies in human liver microsomes suggested that UGT1A9 may also be involved in nicotine and cotinine glucuronidation, particularly contributing to a greater percentage of glucuronidation when nicotine levels are low \\[[@CR42]\\]. ", "The results of this report may be applied to the present study, since the cigarette consumption in the analyzed population is low (1--5 cigarettes per day) when compared with other populations (Latinos: 9.4 cigarettes per day; African Americans:11 cigarettes per day; Native Hawaiians: 15 cigarettes per day) \\[[@CR43]\\].", "\n\nThe ethnicity and age of the studied subjects may explain the lack of associations among nicotine metabolites and variants in other UGTs involved in nicotine metabolism, like UGT2B17, UGT2B7, and UGT1A4, as reported in other studies \\[[@CR39], [@CR44]\\]. ", "Expression of these UGTs may be related to the age, and most of the studies of nicotine metabolism has been performed in elderly subjects \\[[@CR45]--[@CR47]\\]. ", "The expression of UGT1A9 is age-dependent. ", "Miyagi et al. ", "showed that the activity of UGT1A9 is higher in children than in adults and that this activity may be modulated by post-transcriptional and/or allosteric mechanisms in adults \\[[@CR48]\\].", "\n\nUGT2B10 is the major enzyme involved in both nicotine-Gluc and cotinine-Gluc formation and variants of this gene affect the glucuronidation of nicotine and cotinine \\[[@CR12], [@CR45], [@CR49]\\]. ", "We did not assess variants for *UGT2B10* and/or for the *FMO* genes and this may affect the interpretation of glucuronidation rates for this study.", "\n\nAllele frequencies of *UGT1A* variants differ among populations, as observed in the 1000 Genomes Project database. ", "The allele C of rs12471326 variant in *UGT1A9* described here was similar (9%) to that observed for MXL (6%), IBS (2%), CEU (2%), CHB (0%), and YRI (7%).", "\n\nThe levels of nicotine and its eight major metabolites were determined simultaneously in the urine of smokers in the present study. ", "Interestingly, 4HPBA was the second highest metabolite as a percentage of Total-Nic-Eq (17%). ", "Chen et al. ", "analyzed the same metabolites in the Caucasian population using the same methodology and found levels of 4HPBA that were almost 2-fold lower (%Total-Nic-Eq = 8.9%) than the present study \\[[@CR15]\\]. ", "Rangia et al. ", "reported 1.7-fold lower %Total-Nic-Eq of 4HPBA (9.7%) using a one-time urine collection \\[[@CR8]\\], while Piller et al. ", "reported 3.4-fold lower %Total-Nic-Eq (5.0%) in a 24-h urine specimens \\[[@CR50]\\]. ", "Subject age and/or ethnicity as well as level of cigarette consumption could all potentially be relevant factors influencing 4HPBA urinary levels in the population examined in the present study.", "\n\nIn conclusion, genetic variants rs145014075 and *CYP2A6\\*12* in the *CYP2A6* gene were associated with levels of phase I urinary nicotine metabolites and rs12471326 in *UGT1A9* gene were associated with cotinine-Gluc metabolites levels of II phase nicotine metabolites in young Mexican smokers. ", "These variants could be associated with addictive behaviors and with the development of diseases related to smoking in this population. ", "Functional studies are necessary to define the participation of these genetic variants in the nicotine detoxification process. ", "In addition, high levels of 4HPBA were found in the urine of the studied smokers. ", "It has been proposed that CYP2A6 participates in the 2′-hydroxylation of nicotine to produce 4HBPA \\[[@CR9]\\], but this has not been fully evaluated. ", "In the present study, several functional variants of CYP2A6 were analyzed, but none of these correlated with different levels of 4HPBA expressed in both, Total-Nic-Eq or creatinine-adjusted levels. ", "These data are consistent with possibility that other enzymes in addition to CYP2A6 are involved in 4HPBA formation.", "\n\nStudies characterizing the enzymes involved in 4HPBA formation should be performed to better define the possible health risks related to this metabolite.", "\n\nSupplementary information\n=========================\n\n {#Sec11}\n\nFigure S1 Table S1 Table S2\n\n**Publisher's note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.", "\n\nSupplementary information\n=========================\n\nThe online version of this article (10.1038/s41397-020-0147-4) contains supplementary material, which is available to authorized users.", "\n\nWe thank all of the subjects who were willing to participate in this study and the authorities of the Universidad Autonoma de Nuevo Leon. ", "These studies were funded by the grants CONACyT-Mexico S0008-2014-1 and CONACyT-Mexico 2016-01-3262 to G. Borrego-Soto, a grant from the National Institutes of Health, National Institutes of Environmental Health Sciences \\[Grant R01-ES025460\\] to PL, a grant from the Fulbright-Garcia Robles Program and a CONACyT dissertation grant to YXP-P, and a grant from the Health Sciences and Services Authority of Spokane, WA \\[Grant WSU002292\\] to the Washington State University College of Pharmacy and Pharmaceutical Sciences.", "\n\nThe authors declare that they have no conflict of interest.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.006535947712418301, 0.00975609756097561, 0, 0.013071895424836602, 0, 0.014492753623188406, 0, 0.00398406374501992, 0.01639344262295082, 0.010238907849829351, 0.013333333333333334, 0.08333333333333333, 0.01948051948051948, 0.0056179775280898875, 0.01990049751243781, 0.013333333333333334, 0.0055248618784530384, 0, 0.007352941176470588, 0.010638297872340425, 0.01092896174863388, 0, 0.012048192771084338, 0, 0.02631578947368421, 0, 0, 0, 0.004694835680751174, 0, 0.024390243902439025, 0.03076923076923077, 0.01773049645390071, 0.07692307692307693, 0.005434782608695652, 0.006756756756756757, 0, 0.009259259259259259, 0, 0.011627906976744186, 0.005012531328320802, 0.0106951871657754, 0, 0.0033222591362126247, 0.011834319526627219, 0, 0.008403361344537815, 0.023474178403755867, 0.017391304347826087, 0.0028169014084507044, 0.011363636363636364, 0.027777777777777776, 0, 0, 0.009501187648456057, 0, 0.006756756756756757, 0.005859375, 0, 0.003278688524590164, 0, 0.007575757575757576, 0.008264462809917356, 0, 0.026785714285714284, 0.045454545454545456, 0.022222222222222223, 0.02702702702702703, 0.009523809523809525, 0.004484304932735426, 0.015503875968992248, 0, 0, 0.06521739130434782, 0.017241379310344827, 0.006097560975609756, 0, 0.004219409282700422, 0, 0.012048192771084338, 0.007874015748031496, 0, 0.009230769230769232, 0.026385224274406333, 0, 0, 0.009345794392523364, 0.005695687550854353, 0.004098360655737705, 0, 0.005076142131979695, 0, 0.0044444444444444444, 0, 0.017543859649122806, 0.030303030303030304, 0, 0, 0, 0, 0.003676470588235294, 0, 0.00558659217877095, 0.01015228426395939, 0.005291005291005291, 0, 0, 0.009523809523809525, 0, 0, 0, 0, 0, 0.015267175572519083, 0.014492753623188406, 0, 0, 0, 0.021739130434782608, 0.004098360655737705, 0.011627906976744186, 0.009259259259259259, 0.0078125, 0.00847457627118644, 0.0125, 0.011494252873563218, 0.01, 0, 0.008771929824561403, 0.00625, 0.005434782608695652, 0, 0, 0, 0.005434782608695652, 0, 0, 0.005813953488372093, 0, 0, 0.009523809523809525, 0.005, 0, 0.011111111111111112, 0.01171875, 0.009345794392523364, 0.011673151750972763, 0.00625, 0.023255813953488372, 0.07142857142857142, 0.0053475935828877, 0.015151515151515152, 0, 0, 0.032679738562091505, 0, 0.010638297872340425, 0.08333333333333333, 0.005, 0.07142857142857142, 0.016666666666666666, 0.011904761904761904, 0, 0.003367003367003367, 0, 0, 0, 0.006666666666666667, 0.005050505050505051, 0, 0, 0, 0, 0.007142857142857143, 0.015355086372360844, 0, 0 ]
0.009439
5
[ "AOKP ICS Build 31# wifi problem !!!!!!!", "\n\nGuys I am using Samsung Galaxy Tab P1000 GSM running ICS AOKP Build 31#\nThe rom works pretty good & smooth but since updating the last rom Wifi is not working smoothly, network connection is poor and constantly disabled and slow. ", "3G network or HSDPA (Orange) also not function at all u\n\nPlease guys I use my tab for studying\nI need ur help guys\nBy the way this is my first thread :)\n\nLast edited by abed01; 16th April 2012 at 08:51 AM.", "\nReason: adding more information\n\nXDA Developers was founded by developers, for developers. ", "It is now a valuable resource for people who want to make the most of their mobile devices, from customizing the look and feel to adding new functionality.", "Are you a developer?" ]
{ "pile_set_name": "Pile-CC" }
[ 0.02564102564102564, 0.01293103448275862, 0.004878048780487805, 0, 0, 0 ]
0.007242
5
[ "1. ", "Technical Field\nThis invention relates generally to storage containers for recorded media and, more particularly, to a storage container having a centrally disposed retaining hub for engaging and selectively retaining an item of recorded media. ", "Specifically, the present invention is directed to a storage container for recorded media employing a retaining hub that releasably secures an item of recorded media such as a DVD while substantially protecting the stored item from bending stresses created during loading, storage, and removal of the item from the storage container.", "\n2. ", "Background Information\nCompact discs have become immensely popular in the past 15 years and have supplanted records and tapes as the dominant form of recorded music. ", "Over this time, numerous storage containers have been developed to hold the discs during shipping, display for sale, and subsequent home storage of the discs. ", "Most of these storage containers utilize some type of center hub that engages the center hole of the disc to hold the disc in place in the storage container.", "\nIn the recent past, digital versatile discs (DVDs) have been developed that hold more data than a compact disc. ", "Given their large storage capacity, DVDs may be used to hold feature length films as well as music. ", "It is also contemplated that the DVDs may be used to hold data in a computer readable form. ", "One problem with the DVD is that it currently trades durability for its increased storage space. ", "It has been found that a DVD may be damaged by the forces that are commonly used to remove compact discs from their storage containers, to hold the compact discs in the storage containers, and to store the compact discs in the containers. ", "Thus, a potential problem has been created in that it is believed that the vast number of consumers will treat a DVD like a CD because of the similarities in the products and will damage the DVD by doing things that do not harm a CD. ", "It is thus desired in the art to provide a DVD storage container that prevents a consumer from damaging a DVD by improperly removing a DVD from the container.", "\nOne of the chief areas of concern with a DVD storage container is the bending forces created in the DVD by the container or removal of the DVD from the container. ", "Although compact discs are relatively insensitive to bending stresses, DVDs are sensitive to such bending forces and may lose information or become unusable because of such bending forces. ", "Bending forces may occur during removal of the DVD from the storage container, loading the DVD into the storage container, or storage of the DVD in the container. ", "The industry has thus moved in a direction that requires DVD storage containers to securely retain a DVD during a drop test without creating a constant bending force on the DVD during storage or allowing a bending force to be placed on the DVD during installation or removal of the DVD from the storage container.", "\nAlthough a DVD is approximately the same size, weight, and dimensions as a compact disc, the storage containers used for compact discs are generally unsuitable for providing a DVD storage container that eliminates bending forces. ", "Most CD storage containers are unsuitable for DVDs because they include center hubs that radially and resiliently engage the center hole of a compact disc to retain the compact disc in the storage container. ", "It has been recently determined that such radial engagement creates a constant force on a DVD that eventually warps the DVD rendering it imperfect or unuseable. ", "Other compact disc storage containers allow a person to grasp the outer edge of a compact disc and pull upwardly causing the disc to disengage the center hub. ", "This action creates a significant amount of bending force in the body of the compact disc. ", "As compact discs are less sensitive to such bending force, this action does not substantially harm a compact disc while it may break a DVD or otherwise render it unuseable.", "\nOne device that holds a CD in a manner that reduces the large bending forces experienced by the CD during removal of the CD from the storage container is disclosed in German reference DE 3425579. ", "This device retains the CD with a central hub having a lip. ", "A plurality of spring members are disposed about the central hub and are configured to resiliently engage the bottom surface of the CD when it is stored in the container. ", "The CD is thus trapped between the spring members and the lip during storage. ", "The CD is released by depressing the center button which collapses into the center hole of the CD. ", "Once the lip of the hub is moved inwardly, the spring members pop the CD up to a position where it may be removed from the storage container.", "\nUnfortunately, the spring members create a constant force on the bottom of the CD which creates a small constant bending force in the CD. ", "Although this force is not large enough to damage a CD over time, it is large enough to slightly warp a DVD when the DVD is stored over long periods of time. ", "This slight warp may render the DVD unusable.", "\nOther embodiments of a storage device disclosed in the German patent utilize lever arms that lift the CD or DVD off of the retaining hub when the center button is depressed. ", "Although these lifting arms are effective for lifting the CD or DVD off of the hub, the center hub does not release the item of recorded media without creating bending forces. ", "These embodiments are also more difficult to manufacture than embodiments without lifting arms.", "\nAnother device that may be used to hold an item of recorded media such as a compact disc is disclosed in U.S. Pat. ", "No. ", "5,685,427. ", "The device in this patent allows a compact disc to be removed from the storage container through the engagement of a ridge with the inner wall that forms the central opening of the CD. ", "In the storage position, the ridge rests on the top surface of the CD. ", "When a person removes the CD from the container, the ridge is forced along the inner wall creating a bending force in the CD. ", "The specification describes that the force is significant enough that there is a slight clicking action as the ridge passes below the lower surface of the disc and grasps the disc. ", "This device also captures the interior wall of the central opening in the CD while the CD is being removed from the holder. ", "Such capturing creates an undesirable radially outward bending force in the CD or DVD while it is being removed from the holder.", "\nIn view of the damage created by the slight bending forces, the DVD industry has moved in the direction of requiring DVD storage containers to hold the DVDs without imparting any bending forces on the DVD. ", "One manner of indicating that no bending forces are imparted on the DVD is by allowing the DVD to freely rotate while in the storage position. ", "The devices described above do not allow the CD or DVD to freely rotate because the devices retain the CD or DVD with constant forces.", "\nIt is thus desirable to provide a storage container for recorded media such as a DVD that securely retains the item of recorded media in the storage container while not subjecting the item to significant bending stresses that can damage the item." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0.006024096385542169, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.000123
5
[ "Anthony Worrall Thompson Fire Pit Clarification\n\nLa Hacienda, the makers of the popular garden product the Fire Pit, endorsed by celebrity chef Anthony Worrall Thompson, today made the following statement:\n\n\"La Hacienda wish to inform customers of our Fire Pit that purchasing this item does not mean they can hunt Mr Worrall Thompson with a view to 'trying him out' in our excellent chimenea alternative. ", "Mr Worrall Thompson has assured us that he has increased his personal security after several such attempted attacks and further 'vigilante action' will not be tolerated.\"" ]
{ "pile_set_name": "Pile-CC" }
[ 0.007389162561576354, 0.0058823529411764705 ]
0.006636
5
[ "Q:\n\nHow can I increase the height of a div to fit the content?", "\n\nHow can I make a div increases its height to fit the text contained in it as the user decreases the width of the browser window? ", "Since I cannot let decrease the font-size, and after a certain width the container should maintain an aspect ratio, I'm a little bit lost on it.", "\nI'm using MaterializeCSS and I tried using the card-content class for it, as well as a min-height tag for the card itself.", "\n\n#about-us-desktop-container {\r\n position: relative;\r\n top: 20vw;\r\n width: 73vw;\r\n}\r\n.big-card {\r\n padding-bottom: 5.847vw;\r\n min-height: 35.88194444444444vw;\r\n}\r\n.brush-icon {\r\n position: absolute;\r\n top: 69px;\r\n left: 9vw;\r\n width: 72px;\r\n}\r\n.leaf-icon {\r\n position: absolute;\r\n top: 69.7px;\r\n left: 8vw;\r\n width: 68.6px;\r\n height: 65.6px;\r\n}\r\n.heart-icon {\r\n position: absolute;\r\n left: 5.5vw;\r\n top: 68px;\r\n width: 68px;\r\n}\r\n.about-us-info {\r\n position: relative;\r\n}\r\n.about-us-text-container {\r\n position: relative;\r\n top: 191.3px;\r\n min-height: 15.972222vw;\r\n border-left: #E7E7E7 solid 2px;\r\n padding-left: 3.611111112vw;\r\n}\r\n.about-us-caption {\r\n font-size: 1.7rem;\r\n font-weight: 600;\r\n text-align: left;\r\n}\r\n.about-us-text {\r\n font-size: 1.1rem;\r\n position: relative;\r\n top: 36.3px;\r\n color: #9A9A9A !", "important;\r\n text-align: left;\r\n max-width: 237.6px;\r\n font-weight: 400;\r\n line-height: 32px !", "important;\r\n}\r\n.first-text-container {\r\n border: 0 !", "important;\r\n left: 1.38vw;\r\n}\n<script src=\"https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js\"></script>\r\n\r\n <link rel=\"stylesheet\" href=\"https://cdnjs.cloudflare.com/ajax/libs/materialize/0.97.7/css/materialize.min.css\">\r\n <script src=\"https://cdnjs.cloudflare.com/ajax/libs/materialize/0.97.7/js/materialize.min.js\"></script>\r\n\r\n<div class=\"container\" id=\"about-us-desktop-container\">\r\n <div class=\"col s12 card big-card z-depth-2\">\r\n <div class=\"row card-content\">\r\n <div class=\"col s4\">\r\n <div class=\"about-us-info center\">\r\n <img class=\"brush-icon info-icon\" src=\"public/brush.svg\" />\r\n <div class=\"about-us-text-container first-text-container\">\r\n <p class=\"about-us-caption flow-text\">Lorem by\r\n <br/>99 amet egestas</p>\r\n <p class=\"about-us-text light\">Aenean feugiat erat vel euismod feugiat. ", "Aenean ut lectus iaculis, dignissim dui vitae, varius nibh!</p>\r\n </div>\r\n </div>\r\n </div>\r\n <div class=\"col s4\">\r\n <div class=\"about-us-info center\">\r\n <img class=\"leaf-icon info-icon\" src=\"public/leaf.svg\" />\r\n <div class=\"about-us-text-container\">\r\n <p class=\"about-us-caption flow-text\">Lorem Ipsum\r\n <br/>Aliquame</p>\r\n <p class=\"about-us-text light flow-text\">mattis metus sed enim luctus, nec aliquam sapien pellentesque. ", "Cum sociis natoque penatibus ipsum a maximus laoreet</p>\r\n </div>\r\n </div>\r\n </div>\r\n <div class=\"col s4\">\r\n <div class=\"about-us-info center\">\r\n <img class=\"heart-icon info-icon\" src=\"public/heart.svg\" />\r\n <div class=\"about-us-text-container\">\r\n <p class=\"about-us-caption flow-text\">Only 20 Ipsum\r\n <br/>in the Lorem!</p>\r\n <p class=\"about-us-text light flow-text\">Nec elit nec suscipit. ", "Aliquam erat volutpat. ", "Vivamus efficitur et lorem non gravida. ", "Vivamus pharetra blandit sagittis</p>\r\n </div>\r\n </div>\r\n </div>\r\n </div>\r\n </div>\r\n</div>\n\nAnd here is the result I'm currently getting\n\nA:\n\nIt is because you move your image with position absolute. ", "With this operator the div elements don't recognize them as part of the content. ", "Also you pushed your text down with position relative and top which the div doesn't recognize. ", "Try to rather float your elements.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0.01020408163265306, 0, 0.006756756756756757, 0.003883495145631068, 0.0020964360587002098, 0.043478260869565216, 0.025, 0, 0, 0, 0, 0 ]
0.005378
5
[ "Q:\n\nHow to both update and select in a same operation\n\nHow do I do this in TSQL? : ", "How UPDATE and SELECT at the same time\n\nA:\n\nThe TSQL equivalent of the answer in the linked question would be something like\nUPDATE [table]\nSET foo=1\nOUTPUT INSERTED.*, ", "DELETED.*", "\nWHERE boo=2\n\nIn an update statement you can use INSERTED to get the \"after\" values and DELETED the \"before\" values.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0 ]
0
5
[ "Now Commenting On:\n\nPirates rising toward top of Power Rankings\n\nPirates rising toward top of Power Rankings\n\nThis week's edition of the MLB.com Power Rankings is easy enough: Four first-place teams -- a pair of them who own the two longest current winning streaks in baseball -- round out the top four spots.", "\n\nThe Red Sox, leading the American League East, held steady in the No. ", "1 spot, but the Pirates, coming off an impressive series win against the division-rival Cardinals this week to take over first place in the National League Central, moved up a lofty five spots to No. ", "2.", "\n\nThose two squads are followed by the Braves, winners of 10 straight, and the Tigers, winners of eight in a row. ", "The Rays, just a game back of the Red Sox in the AL East, are fifth.", "\n\nThe Cardinals, who hold the NL's top Wild Card spot, fell from second to sixth this week. ", "Trailing them are the first-place A's and Dodgers. ", "The Indians and Rangers round out the Top 10.", "\n\nThe AL Central features three of the hottest teams in the game, with the Tigers, Indians and Royals all going 9-1 over their last 10 games. ", "Cleveland and Detroit square off for a pivotal four-game series at Progressive Field beginning Monday. ", "The Royals, 7 1/2 games back of first-place Detroit, moved up two spots from No. ", "15 to No. ", "13 this week.", "\n\nThe Reds, Orioles and Royals make it three third-place teams in a row from No. ", "11-13, ahead of the fourth-place Yankees at No. ", "14. ", "New York is 9 1/2 back of Boston in the contentious AL East.", "\n\nThe D-backs, suddenly 5 1/2 back of the Dodgers in the NL West, dropped a spot to 15th.", "\n\nFor the third season, MLB.com has set up a panel of experts to vote on the top 15 teams each week. ", "Three former Major League players -- Larry Dierker, Mitch Williams and Frank Thomas -- are part of the process, as are columnist Peter Gammons and Carlton Thompson, vice president and executive editor of MLB.com. ", "Former general manager and current MLB.com analyst Jim Duquette, along with MLB.com columnists Mike Bauman, Hal Bodley, Anthony Castrovince, Richard Justice, Matthew Leach and Jesse Sanchez are also part of the group.", "\n\n1. ", "Red Sox: We're sticking with the status quo in this week's top spot as the Red Sox held steady atop the AL East and the MLB.com Power Rankings. ", "At 68-45 -- easily the AL's best record -- the Red Sox are just one win shy of their win total from last season. ", "It's Aug. 5. ", "Talk about a turnaround.", "\nLast week: 1\n\n2. ", "Pirates: A late-July/early-August series will rarely make or break a season, but a five-game set against a division rival and perennial playoff contender sure could do wonders for the Pirates' confidence and their standing in the NL Central. ", "It definitely made a difference in this week's Power Rankings. ", "After taking four of five from the Cardinals this week, the Bucs' .604 winning percentage is the best in baseball.", "\nLast week: 7\n\n3. ", "Braves: Atlanta's 10-game winning streak has only widened the canyon in the NL East. ", "If the Braves can increase that streak this week against the Nationals, their lead in the division will also inflate. ", "Atlanta has improved its road record this season to 29-30, providing a nice complement to a fantastic 38-15 mark at Turner Field. ", "The Braves, at plus-116, are the only team in their division with a positive run differential.", "\nLast week: 6\n\n4. ", "Tigers: There's no place like home for the first-place Tigers, who just wrapped up an 8-0 homestand at Comerica Park with a sweep of the White Sox. ", "Detroit will be put to the test this week with a critical series against the second-place Indians.", "\nLast week: 5\n\n5. ", "Rays: Tampa Bay is holding steady, fighting for the AL East crown after a huge July spurt that catapulted the club right into Boston's rearview mirror. ", "Rays pitchers are fourth in baseball with 13 shutouts and second with a .235 opponents average. ", "Since returning from the disabled list in early July, David Price is 5-1 with a 1.57 ERA.", "\nLast week: 3\n\n6. ", "Cardinals: It's no coincidence that as the Pirates' stock soared this week, the Cardinals' plummeted. ", "St. Louis, which possesses the NL's top Wild Card spot, may be down after dropping four of five to the Pirates in Pittsburgh this week, but the Cardinals are definitely not out. ", "The two teams will meet again next week, and St. Louis' deficit in the division is only 1 1/2 games.", "\nLast week: 2\n\n7. ", "A's: Their lead in the AL West narrowed a bit this week with a home series loss to the rival Rangers, but the A's still have a 2 1/2-game lead. ", "It figures to be a two-horse race in the division, which could really boil down to an arms race. ", "The Rangers added starting pitching before the non-waiver Trade Deadline to compete with the A's staff, which is fourth in baseball with a .241 opponents batting average and third with 67 quality starts.", "\nLast week: 4\n\n8. ", "Dodgers: Finally, they are who we thought they were. ", "The Dodgers are rounding into the West Coast power everyone expected them to be when they assembled this group of talent, and they look poised to run away with the NL West. ", "A month ago they were 3 1/2 games back of the D-backs, and now they're 5 1/2 games ahead of them. ", "But Hanley Ramirez's health -- he had to leave Sunday's game in Chicago after hurting his right shoulder -- is paramount.", "\nLast week: 8\n\n9. ", "Indians: As good as the Tigers have been, the Indians have been good enough to keep them in sight. ", "Every time it seems like Detroit is poised to pull away, Cleveland runs off a streak of its own and keeps the AL Central up for grabs. ", "The Tribe still has to worry about the Royals, too, but a four-game series against the Tigers this week in Cleveland could make some waves in the standings. ", "The Indians are 3-9 against the Tigers this year, and have been outscored, 78-48.", "\nLast week: 11\n\n10. ", "Rangers: Texas is a half-game out of the second AL Wild Card spot, but it figures to be a tight race with Baltimore, New York and Tampa Bay, just for starters. ", "The Rangers certainly helped their cause within their division with a series win in Oakland this weekend, and continue their trip through the AL West this week with games in Anaheim and Houston. ", "Additional series this month against the Brewers, Mariners, White Sox and Twins should work in Texas' favor.", "\nLast week: 12\n\n11. ", "Reds: Cincinnati is the top third-place team in this week's Power Rankings, falling two spots since the July 29 edition. ", "But the Reds are well within striking distance in the NL Central (4 1/2 games back of Pittsburgh) and are well ahead of the Nationals for the second NL Wild Card spot. ", "Could we see three teams from the NL Central in this year's playoffs?", "\nLast week: 9\n\n12. ", "Orioles: It looks as if there will be at least one Wild Card spot to be had by an AL East club, and the Orioles are currently the most likely candidate for a second. ", "This month starts out pretty easy -- series against the Padres, Giants, D-backs and Rockies -- before they really have to put the pedal to the metal to finish August -- against the Rays, A's, Red Sox and Yankees.", "\nLast week: 10\n\n13. ", "Royals: Just like the Indians won't let the Tigers get away, the Royals won't let the Tigers and the Indians get away. ", "Kansas City still sits in third place in what was known for most of the season as a weak division. ", "But the AL Central now possesses three of the hottest teams in baseball at the top, with Kansas City reeling off nine wins in its last 10 games.", "\nLast week: 15\n\n14. ", "Yankees: New York could got hit by another injury bug on Sunday, when Derek Jeter strained his right calf. ", "His status is uncertain, as is Alex Rodriguez, who's expected to appeal any suspension he might receive from the Biogenesis investigation.", "\nLast week: 13\n\n15. ", "D-backs: It may not be entirely any fault of their own, but the D-backs could quickly find themselves fading fast in the NL West. ", "The Dodgers have suddenly turned into the team many expected them to be this season and Arizona is suddenly 5 1/2 games in the rear-view mirror. ", "This trip through the AL East (a series split against the Rays, series loss to the Red Sox and two more games against Tampa Bay this week) isn't making things any easier.", "\nLast week: 14" ]
{ "pile_set_name": "Pile-CC" }
[ 0.006472491909385114, 0.027777777777777776, 0.01, 0, 0.017543859649122806, 0.014705882352941176, 0.010869565217391304, 0.0196078431372549, 0.022222222222222223, 0.014084507042253521, 0, 0, 0, 0, 0.012345679012345678, 0.020833333333333332, 0, 0, 0.011235955056179775, 0.009900990099009901, 0.03286384976525822, 0.03225806451612903, 0, 0.006944444444444444, 0.017699115044247787, 0, 0, 0, 0, 0.015873015873015872, 0.017543859649122806, 0, 0, 0.00847457627118644, 0.007692307692307693, 0.010638297872340425, 0, 0.013513513513513514, 0, 0, 0.006578947368421052, 0, 0.02247191011235955, 0, 0.00980392156862745, 0.0056179775280898875, 0, 0, 0.013888888888888888, 0, 0.009852216748768473, 0, 0, 0.005780346820809248, 0, 0.008264462809917356, 0, 0.010101010101010102, 0.007407407407407408, 0.01910828025477707, 0.012345679012345678, 0, 0.00625, 0.005128205128205128, 0.037037037037037035, 0, 0.008264462809917356, 0.011904761904761904, 0.014492753623188406, 0, 0.012048192771084338, 0.018867924528301886, 0, 0.025210084033613446, 0, 0, 0, 0.018691588785046728, 0.007246376811594203, 0, 0, 0.006896551724137931, 0.011764705882352941, 0 ]
0.008049
5
[ "/* No comment provided by engineer. */", "\n\"%1$@ %2$@ has been downloaded and is ready to use! ", "Would you like to install it and relaunch %1$@ now?\" ", "= \"%1$@ %2$@ har laddats ned och är redo att användas! ", "Vill du installera det och därefter starta om %1$@?\";", "\n\n/* No comment provided by engineer. */", "\n\"%1$@ can't be updated when it's running from a disk image. ", "Move %1$@ to your Applications folder, relaunch it from there, and try again.\" ", "= \"%1$@ kan inte uppdateras när det körs från en skivavbild. ", "Flytta %1$@ till din Program-mapp, starta det därifrån och testa igen.\";", "\n\n/* No comment provided by engineer. */", "\n\"%@ %@ is currently the newest version available.\" ", "= \"%1$@ %2$@ är just nu den nyaste versionen.\";", "\n\n/* No comment provided by engineer. */", "\n\"%@ %@ is now available--you have %@. Would you like to download it now?\" ", "= \"%1$@ %2$@ finns nu att tillgå, du har %3$@. Vill du ladda hem den nyare versionen nu?\";", "\n\n/* No comment provided by engineer. */", "\n\"%@ of %@\" = \"%1$@ av %2$@\";\n\n/* No comment provided by engineer. */", "\n\"A new version of %@ is available!\" ", "= \"En ny version av %@ finns tillgänglig!\";", "\n\n/* No comment provided by engineer. */", "\n\"A new version of %@ is ready to install!\" ", "= \"En ny version av %@ finns för installation!\";", "\n\n/* No comment provided by engineer. */", "\n\"An error occurred in retrieving update information. ", "Please try again later.\" ", "= \"Kunde inte hämta information om uppdateringar. ", "Försök igen senare.\";", "\n\n/* No comment provided by engineer. */", "\n\"An error occurred while downloading the update. ", "Please try again later.\" ", "= \"Ett fel uppstod när uppdateringen laddades ned. ", "Försök igen senare.\";", "\n\n/* No comment provided by engineer. */", "\n\"An error occurred while extracting the archive. ", "Please try again later.\" ", "= \"Kunde inte extrahera arkivet. ", "Försök igen senare.\";", "\n\n/* No comment provided by engineer. */", "\n\"An error occurred while installing the update. ", "Please try again later.\" ", "= \"Ett fel uppstod när uppdateringen installerades. ", "Försök igen senare.\";", "\n\n/* No comment provided by engineer. */", "\n\"An error occurred while parsing the update feed.\" ", "= \"Ett fel uppstod vid tydandet av uppdateringsinformationen.\";", "\n\n/* No comment provided by engineer. */", "\n\"An error occurred while parsing the update feed: %@\" = \"Ett fel uppstod vid tydandet av uppdateringsinformationen: %@\";\n\n/* No comment provided by engineer. */", "\n\"An error occurred while relaunching %1$@, but the new version will be available next time you run %1$@.\" = \"Ett fel uppstod vid omstarten av %1$@. Den nya versionen kommer startas nästa gång du manuellt kör %1$@.\";\n\n/* the unit for bytes */\n\"B\" = \"B\";\n\n/* No comment provided by engineer. */", "\n\"Cancel\" = \"Avbryt\";\n\n/* No comment provided by engineer. */", "\n\"Cancel Update\" = \"Avbryt uppdateringen\";\n\n/* No comment provided by engineer. */", "\n\"Checking for updates...\" = \"Söker efter uppdateringar...\";\n\n/* No comment provided by engineer. */", "\n\"Downloading update...\" = \"Hämtar uppdatering…\";\n\n/* No comment provided by engineer. */", "\n\"Extracting update...\" = \"Extraherar uppdatering…\";\n\n/* the unit for gigabytes */\n\"GB\" = \"GB\";\n\n/* No comment provided by engineer. */", "\n\"Install and Relaunch\" = \"Installera och starta om\";\n\n/* No comment provided by engineer. */", "\n\"Installing update...\" = \"Installerar uppdatering…\";\n\n/* the unit for kilobytes */\n\"KB\" = \"KB\";\n\n/* the unit for megabytes */\n\"MB\" = \"MB\";\n\n/* No comment provided by engineer. */", "\n\"OK\" = \"OK\";\n\n/* No comment provided by engineer. */", "\n\"Ready to Install\" = \"Klar att installera\";\n\n/* No comment provided by engineer. */", "\n\"Should %1$@ automatically check for updates? ", "You can always check for updates manually from the %1$@ menu.\" ", "= \"Ska %1$@ automatiskt söka efter uppdateringar? ", "Du kan alltid söka manuellt från %1$@-menyn.\";", "\n\n/* No comment provided by engineer. */", "\n\"Update Error!\" ", "= \"Uppdateringsfel!\";", "\n\n/* No comment provided by engineer. */", "\n\"Updating %@\" = \"Uppdaterar %@\";\n\n/* No comment provided by engineer. */", "\n\"You already have the newest version of %@.\" = \"Du har redan den senaste versionen av %@.\";\n\n/* No comment provided by engineer. */", "\n\"You're up to date!\" ", "= \"Du har senaste versionen.\";", "\n" ]
{ "pile_set_name": "Github" }
[ 0, 0.018867924528301886, 0, 0.01818181818181818, 0, 0, 0, 0, 0.01639344262295082, 0, 0, 0, 0.02127659574468085, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0196078431372549, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.015873015873015872, 0, 0.006211180124223602, 0, 0, 0, 0, 0, 0, 0, 0.00558659217877095, 0, 0, 0, 0, 0, 0.021739130434782608, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.002024
5
[ "US company, Meritor, completed its €156.2 million acquisition of AxleTech from global investment firm The Carlyle Group this week.", "\n\nThe previously announced transaction is reported to enhance Meritor’s growth platform with the addition of a complementary product portfolio, including a full line of independent suspensions, axles, braking solutions and drivetrain components.", "\n\nAxleTech will operate within Meritor’s Aftermarket, Industrial & Trailer segment.", "\n\n“The addition of AxleTech advances our growth strategy while further diversifying our portfolio in strategic, adjacent markets,” said Meritor CEO and President, Jay Craig.", "\n\n“We are delighted to welcome AxleTech to the Meritor team with a shared focus on driving superior performance, efficiency and reliability for our global customers with a wider array of products and solutions.", "\n\n“We look forward to realising the benefits of the transaction as we continue executing on our priorities to enhance value for our shareholders, customers and employees,” he said.", "\n\n(Image: Meritor MTec6 trailer axle.)" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.015384615384615385, 0, 0.012048192771084338, 0.005780346820809248, 0.004761904761904762, 0, 0.02631578947368421 ]
0.009184
5
[ "Q:\n\nDoes every regular Noetherian domain have finite Krull dimension?", "\n\nBackground: A Noetherian ring is said to be regular if its localizations at all prime (or maximal) ideals are regular local rings. ", "Without this assumption, there are counter-examples.", "\nThanks.", "\n\nA:\n\nHere's my favorite example (is this the one nosr refers to in his comment? ", "I'm pretty sure it's also due to Nagata). ", " Let $k$ be a field and $A=k[x_1, x_2, x_3, \\ldots]$ be polynomial ring in countably many variables. ", " Let $P_1 := (x_1)$, $P_2 := (x_2, x_3)$, $P_3 := (x_4, x_5, x_6)$, and in general $P_n$ is generated by the \"next\" $n$ variables. ", " That is, $P_n := \\left(x_{{n \\choose 2} + 1}, x_{{n \\choose 2} + 2}, \\ldots, x_{{n+1} \\choose 2}\\right)$. Let $W := A \\setminus \\bigcup_{n=1}^\\infty P_n$, and let $R := W^{-1}A$. Then every prime ideal of $R$ is in some $P_nR$, each of which is a maximal ideal of $R$, and $R_{P_n R} \\cong k[y_1, \\dotsc, y_n]_{(y_1, \\dotsc, y_n)}$ is certainly a regular local ring. ", " Hence $R$ is a regular Noetherian ring. ", " But as it has essentially polynomial rings of every dimension as localizations, $R$ has infinite dimension.", "\nOn the other hand, every Noetherian local ring has finite Krull dimension.", "\n\nA:\n\nNo. ", "An example is given in K. Fujita, Infinite dimensional Noetherian Hilbert domains, Hiroshima Math. ", "J. 5 (1975), 181-185.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.014492753623188406, 0, 0, 0, 0, 0, 0, 0.007633587786259542, 0.005405405405405406, 0, 0, 0.013333333333333334, 0, 0.030303030303030304, 0, 0 ]
0.004448
5
[ "INSTALLATION\n\nNARROW RESULTS:\n\nSTANDARD HARDWARE FINISHES\n\nPREMIUM HARDWARE FINISHES\n\nThe Brickmould 300 series is highlighted by an attractive multi-tiered frame that provides a classic appearance. ", "Energy-efficient glass options and various grid configurations and styles add to this value driven series.", "\n\nThe Intercept® spacer system is standard and high performance ProSolar® and ProSolar® Shade glass packages are optional\n\nSuperior air, water and structural ratings define the Master series. ", "Together with an integral nailing fin and J-channel for streamlined installation, an attractive beveled frame and advanced glass options the Master series is the perfect choice for your new home.", "\n\nAn across-the-line R-50 performance rating makes Master series ideal for use with storm shutters\n\nAvailable ProSolar® Low E glass with Argon gas and the Supercept™ spacer system increase energy efficiency\n\nA complete selection of styles allows you to choose the ideal combination\n\nWhite, tan and driftwood colors are available, along with a wide choice of glass and grid options\n\nFeatures & options are not available on all styles.", "Series may not be available in all areas of the country.", "\n\nThe Contractor series offers virtually unlimited size and style options to give you the ultimate in design flexibility, while providing easy installation with an integral nailing fin and J-channel and impressive energy-efficient options.", "\n\nAvailable ProSolar® Low E glass with Argon gas and the Supercept™ spacer system increase energy efficiency\n\nChoose from a complete line of styles, including a Patio Door\n\nWhite, tan and driftwood colors are available, along with unique glass and grid options\n\nFeatures & options are not available on all styles.", "Series may not be available in all areas of the country.", "\n\nDesigned to install easily and look beautiful, Builder series windows feature an attractive angled exterior and an integral nailing fin. ", "This essential series, offers a solid value along with homeowner favorites and energy-efficient options.", "\n\nThe Intercept® spacer system is standard and high performance ProSolar® Low E glass with Argon gass is optional\n\nStyles include Single Hung, Slider, Picture and Geometric\n\nWhite and tan colors and several glass and grid options are available\n\nFeatures & options are not available on all styles.", "Series may not be available in all areas of the country." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.010416666666666666, 0, 0.006928406466512702, 0, 0, 0.009584664536741214, 0, 0, 0, 0.010135135135135136, 0 ]
0.002851
5
[ "Q:\n\nAssign pointer to class function to pointer to function\n\nI'm trying to send a pointer to a class function as a variable to another class. ", "I'm trying to keep both classes separate so I can reuse the code without having to edit it in the future.", "\nI'm compiling on Windows 7, using Visual Studio 2015.", "\nDATASTRUCT dataItem = {0, 1, 0, 1, dataText, parentClass::doSomething};\n\nchildClass.addItem(dataItem); //childClass is initiated as a member of parentClass\n\nElsewhere:\ntypedef struct dataStruct{\n double min_x;\n double max_x;\n double min_y;\n double max_y;\n GLTEXT label; //custom struct for text information\n void(*function)(void);\n}DATASTRUCT;\n\nI want childClass to be able to go about its business and check for certain parameters, and when childClass is done I want it to call doSomething from parentClass, without actually knowing it's a nested class.", "\nThe error I get during compile is:\nvoid(parentClass::)() cannot be used to initialise an entity of void()().", "\nI am able to define a standard function and call that, but that's not unique to each parentClass, and I then have to specify which parentClass::doSomething to which I am referring.", "\nThe simplest solution I have found is to redefine the pointer to function in childClass to void(parentClass::*)(), which is exactly what I want, but not how I want it.", "\nWith that said, I don't know where to take this, is there another way? ", "Something similar?", "\nEdit:\nIf possible, how would I explicitly send the information required for my childClass to properly interpret the function pointer dynamically.", "\nSo...\nchildClass.addItem(classInformation, dataItem, &parentClass::doSomething);\n\nOr does the receiving end always have to know \"parentClass::\" in advance? ", "Would this then be a good time to use void pointers?", "\nAm I chasing after my own tail or is this going somewhere?", "\nEdit:\nSomething like this seems dangerous, but, here it is.", "\nchildClass.addItem(classInformation, dataItem, static_cast<void*>(&parentClass::doSomething));\n\nchildClass::callParent(classInformation, void*function){\n static_cast<classInformation.something*>(function)();\n}\n\nWhat would \"classInformation.something\" be in this case?", "\n\nA:\n\nFunction pointers are really limiting. ", "I would suggest to use std::function<void()> instead. ", "Note that you will still have to tell which object member function would operate upon. ", "You can use std::bind or lambda to do that:\nDATASTRUCT dataItem = \n {0, 1, 0, 1, dataText, std::bind(&parentClass::doSomething, std::ref(someParentClassObject))};\n//or\nDATASTRUCT dataItem = \n {0, 1, 0, 1, dataText, [&someParentClassObject](){ someParentClassObject.doSomething(); }};\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0.005235602094240838, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.000276
5
[ "Norman Grant (politician)\n\nNorman Grant is a member of the Senate of Jamaica. ", "He is also the president of the Jamaican Agricultural Society, a position which he held up until 2009 and again after 2012.", "\n\nReferences\n\nCategory:Members of the Senate of Jamaica\nCategory:Year of birth missing (living people)\nCategory:Living people" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.038461538461538464, 0.008130081300813009, 0.008 ]
0.018197
5
[ "import assert from 'assert';\nimport cheerio from 'cheerio';\n\nimport HTML from './fixtures/extract-from-selectors';\nimport { extractFromMeta } from './index';\n\ndescribe('extractFromMeta($, metaNames, cachedNames, cleanTags)', () => {\n it('extracts an arbitrary meta tag by name', () => {\n const $ = cheerio.load(HTML.metaFoo.test);\n const result = extractFromMeta($, ['foo', 'baz'], ['foo', 'bat']);\n\n assert.equal(result, HTML.metaFoo.result);\n });\n\n it('returns nothing if a meta name is duplicated', () => {\n const $ = cheerio.load(HTML.metaDupes.test);\n const result = extractFromMeta($, ['foo', 'baz'], ['foo', 'bat']);\n\n assert.equal(result, HTML.metaDupes.result);\n });\n\n it('ignores duplicate meta names with empty values', () => {\n const $ = cheerio.load(HTML.metaEmptyDupes.test);\n const result = extractFromMeta($, ['foo', 'baz'], ['foo', 'bat']);\n\n assert.equal(result, HTML.metaEmptyDupes.result);\n });\n});\n" ]
{ "pile_set_name": "Github" }
[ 0.004201680672268907 ]
0.004202
5
[ " FILED\n NOT FOR PUBLICATION JUL 30 2010\n\n MOLLY C. DWYER, CLERK\n UNITED STATES COURT OF APPEALS U .S. C O U R T OF APPE ALS\n\n\n\n\n FOR THE NINTH CIRCUIT\n\n\n\nSOTERO ALVARADO; VIANEY No. ", "08-70963\nALVARADO,\n Agency Nos. ", "A079-534-315\n Petitioners, A079-534-316\n\n v.\n MEMORANDUM *\nERIC H. HOLDER, Jr., Attorney General,\n\n Respondent.", "\n\n\n\n On Petition for Review of an Order of the\n Board of Immigration Appeals\n\n Submitted July 19, 2010 **\n\nBefore: B. FLETCHER, REINHARDT, and WARDLAW, Circuit Judges.", "\n\n Sotero Alvarado and Vianey Alvarado, natives and citizens of Mexico,\n\npetition pro se for review of the Board of Immigration Appeals’ (“BIA”) order\n\ndenying their second motion to reopen. ", "Our jurisdiction is governed by 8 U.S.C. §\n\n\n\n\n *\n This disposition is not appropriate for publication and is not precedent\nexcept as provided by 9th Cir. ", "R. 36-3.", "\n **\n The panel unanimously concludes this case is suitable for decision\nwithout oral argument. ", "See Fed. ", "R. App. ", "P. 34(a)(2).", "\n\f1252. ", "We review for abuse of discretion, Iturribarria v. INS, 321 F.3d 889, 894\n\n(9th Cir. ", "2003), and we deny in part and dismiss in part the petition for review.", "\n\n The BIA did not abuse its discretion by denying petitioners’ second motion\n\nto reopen because it was untimely and numerically barred, see 8 C.F.R.\n\n§ 1003.2(c)(2), and petitioners failed to establish changed country conditions in\n\nMexico that are material to petitioners and their circumstances. ", "See 8 C.F.R. §\n\n1003.2(c)(3)(ii); Toufighi v. Mukasey, 538 F.3d 988, 996-67 (9th Cir. ", "2008)\n\n(requiring movant to produce previously unavailable evidence of changed country\n\nconditions that are material and establish prima facie eligibility for relief); see also\n\nDelgado-Ortiz v. Holder, 600 F.3d 1148, 1151-52 (rejecting as particular social\n\ngroup “returning Mexicans from the United States”).", "\n\n To the extent petitioners challenge the BIA’s March 8, 2005, order denying\n\npetitioners cancellation of removal, we lack jurisdiction because the petition for\n\nreview is not timely as to that order. ", "See 8 U.S.C. § 1252(b)(1); Singh v. INS, 315\n\nF.3d 1186, 1188 (9th Cir. ", "2003). ", "We decline to reconsider petitioners’ challenge to\n\nthe BIA’s denial of their first motion to reopen and reconsider because this court\n\nalready decided the issue in Alvarado v. Gonzales, No. ", "05-73685 (9th Cir. ", "Feb. 26,\n\n2007). ", "See Merritt v. Mackey, 932 F.2d 1317, 1320 (9th Cir. ", "1991) (explaining\n\nthat under the “law of the case doctrine,” one panel of an appellate court will not\n\n\n\n 2 08-70963\n\freconsider questions which another panel has decided on a prior appeal in the same\n\ncase).", "\n\n PETITION FOR REVIEW DENIED in part; DISMISSED in part.", "\n\n\n\n\n 3 08-70963\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.008385744234800839, 0, 0.00904977375565611, 0.020080321285140562, 0.01015228426395939, 0, 0.125, 0, 0.1111111111111111, 0.125, 0, 0, 0, 0, 0, 0.011627906976744186, 0, 0, 0, 0, 0, 0, 0, 0.018867924528301886, 0, 0, 0 ]
0.016269
5
[ "Oman Arena will go through a drastic transformation for the weekend of March 22 and 23.", "\n\nThe venue that hosts basketball games, professional wrestling, circuses and rodeos will become a massive dentist’s office for that weekend as the second annual Healthcare Community Health Fair will happen and bring opportunities for free dental care to those who need it but can’t afford it.", "\n\n“West Tennessee Healthcare participated in this event last year and saw a huge need to collaborate and make it even bigger this year,” said Melissa Walls, director of disease management at West Tennessee Healthcare. “", "So we’re adding more resources to help with disease management, health risk assessments for heart disease and diabetes and services from other vendors including Kirkland Cancer Center, West Tennessee Heart and Vascular, Pathways Behavioral Health, women’s and children’s services, pharmacy and others.”", "\n\nMartha Robinson, a professor in the University of Memphis at Lambuth’s department of management, is helping coordinate the event because she sees the need in the community.", "\n\n“This was launched last year as a community outreach to help the underserved in Jackson with primary dental care,” Robinson said. “", "And there will be dental chairs spread throughout the Oman Arena with dentists performing everything from cleanings to extractions and partials, trying to meet the patients’ needs on the spot or be referred to dentists in the area if they can’t get help with us that day.”", "\n\nWhile there are dentists coming in from other states to help with this effort, local dentists are encouraged to donate some of their time to be a part of this.", "\n\n“We’d like to see more local professionals be a part of this community outreach effort and donate their services for four or eight hours one day or both days,” Robinson said. “", "I think they’ll be glad they did once they see how lives are changed from that small amount of time they do donate.”", "\n\nWalls said she’s seen people’s entire outlooks on life change from going to this.", "\n\n“We’ll have people come in that won’t look up much or smile because they’re not proud of their smile,” Walls said. “", "But then when they finally do get in that dentist’s chair and get work done to repair damaged teeth, it makes a world of difference in how they view themselves.”", "\n\nDepending on the number of dentists and patients, there will probably be a wait time for people who come in, but there will be plenty of ways to pass the time while they wait. ", "Different vendors will have information booths up to discuss any other needs the patients may have. ", "There will also be a career readiness clinic for dressing for success with clothes available to help anyone who might be looking for a job.", "\n\n“It starts with that smile that gives people confidence walking into a job interview, and then if they need it, we’ll have clothes available to choose from for an outfit for the interview and people there donating their time to help the patients pick out the right clothes that fit right for them,” Walls said.", "\n\nVouchers will be available for work that can’t be done at the event. ", "The vouchers will help with the cost of the procedure at a local dentist’s office if it doesn’t pay for the entire procedure.", "\n\nLocal chapters of The Links Incorporated and 100 Black Men are helping with the effort as well.", "\n\nPatients will need photo ID when they come, and those who come with children will need another adult with them so the children aren’t left alone while the adult is getting dental work done.", "\n\nThe event will happen from 8 a.m. until 4 p.m. each day. ", "For more information, log on to springn2health.com.", "\n\n“I’ve been a part of mission trips in third world countries, and that work is good and needed,” Robinson said. “", "But this is a way people can contribute to mission work here at home.”", "\n\nReach Brandon Shields at bjshields@jacksonsun.com or at 731-425-9751. ", "Follow him on Twitter @JSEditorBrandon or on Instagram at editorbrandon." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.011494252873563218, 0.0034129692832764505, 0.0136986301369863, 0.006622516556291391, 0.017241379310344827, 0.007518796992481203, 0.003676470588235294, 0, 0.0056179775280898875, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.020618556701030927, 0, 0, 0, 0.008771929824561403, 0.014285714285714285, 0.041666666666666664, 0.027777777777777776 ]
0.006756
5
[ "South Africa - Powerball Lottery Information\n\nNext South Africa - Powerball Draw Online\n\nBuy South Africa Powerball tickets online for the next draw, which offers an uncapped, tax-free jackpot and eight secondary prizes! ", "Add excitement to your work week by entering your South Africa Powerball numbers for Tuesday or celebrate the weekend with Friday night’s lotto draw!", "\n\nGuess Range\n\n5/50 + PB 1/20\n\nHosted in\n\nSouth Africa\n\nSchedule\n\n(Local draw time)\n\nJackpot Type\n\nCASH\n\nTax Requirement\n\nLottery prizes are paid out tax-free. ", "Check the tax laws in your country of residence for any further local taxation you may be subject to.", "\n\nChances to win South Africa - Powerball\n\nShow\n\nHide\n\nDivisions\n\nMatch\n\nWinning Odds\n\n1 Prize\n\n5+PB\n\n1:42,375,200\n\n2 Prize\n\n5\n\n1:2,230,274\n\n3 Prize\n\n4+PB\n\n1:188,334\n\n4 Prize\n\n4\n\n1:9,912\n\n5 Prize\n\n3+PB\n\n1:4,280\n\n6 Prize\n\n3\n\n1:225\n\n7 Prize\n\n2+PB\n\n1:299\n\n8 Prize\n\n1+PB\n\n1:57\n\n9 Prize\n\n0+PB\n\n1:35\n\nSouth Africa - Powerball Information\n\nBased on the famous US Powerball, the South Africa Powerball draws lotto enthusiasts from around the globe with great jackpots, attractive Powerball winning odds and tax-free prizes.", "\n\nSouth African Powerball History\n\nThe South Africa Powerball was introduced in October of 2009 by the South Africa Lottery Administration, the sole Lottery funder and administrator in South Africa, as part as on-going efforts to raise money for public funds. ", "The South African Powerball was added to offer a bigger jackpot as well as higher statistical possibilities of winning than the other South African lotteries available.", "\n\nSouth Africa Powerball Rules\n\nTo play the South Africa Powerball, select 5/50 numbers and an additional number (Powerball) from a different matrix of 1-20. ", "Those who enjoy the South Africa Powerball, may wish to play US Powerball online, which regularly offers massive jackpot prizes!.", "\n\nWinning the South Africa Powerball\n\nPlayers win the South Africa Powerball jackpot by correctly selecting all five regular numbers as well as the Powerball number. ", "Prize winners are not required to pay taxes.", "\n\nOne winning Powerball ticket? ", "Why not two? ", "A Gauteng engineer bought two tickets, at two different stores in Johannesburg, with the exact same numbers to a South Africa Powerball draw in March 2017. ", "When the numbers were drawn, it turned out he had two of the four winning tickets. ", "The lucky man, who decided to stay anonymous, walked away with R15.2 million in prize money.", "\n\nAn enormous South African Powerball jackpot prize of R102 million was won in June 2011, but amazingly, that prize was never claimed. ", "Powerball set a new record when a R232,131,750.69 jackpot was won by single ticket in the draw on 19 February 2019. ", "Check lottery results for this and 80+ world lotteries here.", "\n\nLearn About South Africa Powerball Draws\n\nShow\n\nHide\n\nPowerball South Africa uses the exciting Powerball format popularized by the original American lottery, combining large jackpots with tax-free prizes and a smaller guess range. ", "The South Africa Powerball set a record when its jackpot reached R102,016,595 on 3 June 2011, but that prize was never collected. ", "That record was broken in the draw on 3 August 2018 when a single ticket won a jackpot prize of R145,469,799.30. ", "The current Powerball record is R232,131,750.69, an incredible jackpot prize won by a single ticket in the lottery's draw on 19 February 2019. ", "The jackpot stands as the biggest lottery prize ever awarded in South Africa. ", "Check the exciting Powerball South Africa Lottery Results here!" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.00625, 0, 0.007766990291262136, 0.007692307692307693, 0.005952380952380952, 0.006329113924050633, 0, 0, 0, 0, 0, 0.00641025641025641, 0, 0.010869565217391304, 0, 0, 0, 0, 0.007692307692307693, 0, 0, 0, 0.015873015873015872 ]
0.002993
5
[ "What is it they say about..\nWell she asked me for my help and every idea -fumbles with words- That's not really english.", "\nI'm gonna do that again.", "\nI don't get it.", "\nYou were just roman riding in front of hundreds of people at the rodeo\nTaking on a jump that -fumbles with words-\nWhat was that about?", "\nI don't know. ", "Something is wrong.", "\nIs that why the police are coming?", "\nLittle miss persistent just give me one minute, ok?", "\nI think it's sweet you bought me an anniversary present.", "\nExcuse me. ", "What have you got there?", "\nMaybe you need a little mustard on that!", "\nJack!", "\nI have some advice. ", "I think you should follow it.", "\nYeah, you know I....\nWhat would I say if I was going to retort?", "\nNo offense, Tim.", "\nNo offense, of course.", "\nSo then... what's your plan with them?", "\nWake up, Wayne.", "\nI don't know where my hands are supposed to be, Wayne. ", "I'm sorry.", "\nWhu what's that?", "\nYou split one more hair... no. ", "Ok.", "\nHe's just peeing. ", "Just a minute.", "\nHe's still peeing!", "\nYeah I can't wait.", "\nI don't know what happened on that take. ", " It just didn't really work out too well.", "\nDave?", "\n" ]
{ "pile_set_name": "YoutubeSubtitles" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.16666666666666666, 0, 0, 0, 0.058823529411764705, 0, 0, 0.0625, 0.017857142857142856, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.16666666666666666, 0 ]
0.014319
5
[ "Pavlos Fyssas, a 34 year old antifascist and hip hop artist (Killah P), was murdered by Golden Dawn neonazis in Keratsini, a working class neighborhood in Piraeus.", "\n\nFrom eye-witness report: \"Around 24:00 a group of 15-20 fascists, wearing black t-shirts and military pants and boots, was deployed on P. Tsaldari street. ", "During that time, Killah P was walking with his girlfriend and another couple when he was spotted by the fascists shouting \"what are you looking for here, you know there is no place for you in this hood\". ", "The fascists hunted the two couples down P. Tsaldari street towards Gr. ", "Lampraki avenue, where from another street, a new group of around 10 fascists came out and surrounded the guys. ", "At that time, a car drove opposite in an one-way street, stopped, the driver came out and stabbed Killah P once in the heart and once in the abdomen (the stabbing on his abdomen had an upside-down \"L\" shape).", "\n\nThe whole scene took place in the presence of DIAS motorbike police, that only afterwards and only as soon as most of the fascists had already dispersed, arrested the murderer (according to some witnesses Killah P while still in shock kept pointing at the murderer and this is how the cops arrested him - a 55year old holding a knife, described by other eye-witnesses as a known Golden Down associate). ", "The ambulance took 35 minutes to approach and Pavlos was pronounced dead at Nikaia general hospital.\"", "\n\nA call for a gathering on the spot of his assassination was made for today, Wednesday 18:00, on 60, P. Tsaldari street (from Athens, via public bus B18 from Ralli-Salaminas, or Γ18 from Gr. ", "Lampraki, from Piraeus via public bus 824 or 826). ", "There are also calls for demonstrations in Thessaloniki: 10:00 in the teachers demo, 16:00 in Physics dept. ", "in AUTH university campus, 18:00 demonstration from \"Kamara\" on Egnatia street. ", "In Mytilene, Lesbos island, 18:00 on Sappho square, in Patras, 10:00 on Olga square, in Larissa 10:00 in the 1rst Lyceum and 10:30 in the teachers' demo, in Komotini and many other towns there also demos on 18:00.", "\n\nIt is hardly surprising that the Greek police once again did nothing to prevent Golden Dawn nazi violence (Golden Dawn is largely supported by the Greek capitalists, the government and the church, as a willful thug against militants, workers and the poor, and more than half of the police vote for this openly neonazist party) if not actively participating in or covering the organisation of what looks as a death trap for a well-known radical, member of the metalworkers union and antifa hip-hop artist in a working class district, near the spot where a few days ago 8 members of the communist party (KKE) were also brutally assaulted by Golden Dawn nazis.", "\n\nIt is hardly surprising the silence of all the mass media, that are kept alive due to the government's vast loans and benefits, that either decided to mention the assassination as a \"fight after an arguement about football\" or to not mention it at all. ", "They are the same mass media that promote every misanthropic Golden Dawn activity as an \"opposition to the system's flaws\", and lately as a realistic government partner for the future. ", "They are of course the voice of their owners, the same few families of capitalists, owners of a shitload of shiptanks, banks and hotels that support the right-wing government and its thuggish little counterpart on the streets, the Golden Dawn, in what they see as a Golden opportunity to get rid of workers rights and turn Greece into a proper labour camp under the nationalist and religious kitsch.", "\n\nIt is worth noticing that this is a hard time for the government and their nazi counterparts, as even after their full scale assault on anarchists, squatters, and workers' struggles, the movements seems to find again its momentum, with the current struggles of the teachers, the hospital workers etc.", "\n\nSome additional info can be found in twitter: @antireport, #antireport, #KillahP" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.012269938650306749, 0.006369426751592357, 0.004878048780487805, 0.013888888888888888, 0, 0.004807692307692308, 0.0049382716049382715, 0.009900990099009901, 0.015625, 0, 0.018518518518518517, 0.0125, 0.014084507042253521, 0.0030349013657056147, 0.00392156862745098, 0, 0, 0, 0.012195121951219513 ]
0.007207
5
[ "Proportions\n\nIt is based on a \"half-fat-to-flour\" ratio. ", "Fat (lard, butter or full-fat margarine) is rubbed into plain flour to create a loose mixture that is then bound using a small amount of water, rolled out, then shaped and placed to create the top or bottom of a flan or pie.", "\n\nSweet\n\nSweetcrust pastry is made with the addition of sugar, which sweetens the mix and impedes the gluten strands, creating a pastry that breaks up easily in the mouth..\n\nTechniques\n\nIn both sweetcrust and shortcrust pastry, care must be taken to ensure that fat and flour are blended thoroughly before liquid is added - this ensures that the flour granules are adequately coated with fat and are less likely to develop gluten. ", "Overworking the dough is also a hazard. ", "Overworking elongates the gluten strands, creating a product that is chewy, as opposed to 'short', or light and crumbly." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0 ]
0
5
[ " UNITED STATES OF AMERICA\n MERIT SYSTEMS PROTECTION BOARD\n\n\n SPECIAL COUNSEL DOCKET NUMBER\n EX REL. ", "DEBBIE WHITE, CB-1208-17-0002-U-2\n Petitioner,\n\n v.\n DATE: November 18, 2016\n DEPARTMENT OF DEFENSE,\n Agency.", "\n\n\n\n\n THIS STAY ORDER IS NONPRECEDENTIAL *\n\n Lisa Powell, Esquire, Oakland, California, for the petitioner.", "\n\n Bradley R. Hansen, Esquire, and Sandra K. Whittington, Esquire, Fort Lee,\n Virginia, for the agency.", "\n\n\n BEFORE\n\n Susan Tsui Grundmann, Chairman\n Mark A. Robbins, Member\n\n\n\n ORDER ON STAY REQUEST\n\n¶1 Pursuant to 5 U.S.C. § 1214(b)(1)(B), the Office of Special Counsel (OSC)\n requests a 30-day extension of the previously granted stay of the agency’s action\n\n\n *\n A nonprecedential order is one that the Board has determined does not add\n significantly to the body of MSPB case law. ", "Parties may cite nonprecedential orders,\n but such orders have no precedential value; the Board and administrative judges are not\n required to follow or distinguish them in any future decisions. ", "In contrast, a\n precedential decision issued as an Opinion and Order has been identified by the Board\n as significantly contributing to the Board’s case law. ", "See 5 C.F.R. § 1201.117(c).", "\n\f 2\n\n demoting Debbie White. ", " For the reasons discussed below, OSC’s request is\n GRANTED, and the stay is extended through December 20, 2016.", "\n\n BACKGROUND\n¶2 On October 7, 2016, Member Mark A. Robbins granted OSC’s initial\n request for a 45-day stay of Ms. White’s demotion. ", " Special Counsel ex rel.", "\n Debbie White v. Department of Defense, MSPB Docket\n No. ", "CB-1208-17-0002-U-1, Stay Request File (SRF), Tab 1. ", " On\n November 1, 2016, OSC filed a timely request to extend the stay for an additional\n 30 days. ", "Special Counsel ex rel. ", "Debbie White v. Department of Defense , MSPB\n Docket No. ", "CB-1208-17-0002-U-2, Stay Request Extension File (SREF), Tab 1.", "\n OSC indicates that the agency consents to the extension. ", "Id. The agency has not\n filed a response to OSC’s request for an extension of the stay.", "\n\n ANALYSIS\n¶3 A stay granted pursuant to 5 U.S.C. § 1214(b)(1) is issued to maintain the\n status quo ante while OSC and the agency involved resolve the disputed matter.", "\n Special Counsel v. Department of Transportation, 74 M.S.P.R. 155, 157 (1997).", "\n The purpose of the stay is to minimize the consequences of an alleged prohibited\n personnel practice. ", "Id. In evaluating a request for an extension of a stay, the\n Board will review the record in the light most favorable to OSC and will grant a\n stay extension request if OSC’s prohibited personnel practice claim is not clearly\n unreasonable. ", "Id. at 158. ", "The Board may grant the extension for any period of\n time that it considers appropriate. ", "5 U.S.C. § 1214(b)(1)(B); Special Counsel ex\n rel. ", "Waddell v. Department of Justice, 105 M.S.P.R. 208, ¶ 3 (2007).", "\n¶4 In its initial stay request, OSC alleged that Ms. White, a commissary\n employee, disclosed to a department manager what she believed, based on her\n own observations, was a theft of commissary property by the store director and\n another commissary manager; that she anonymously reported the matter to the\n agency’s Fraud, Waste, and Abuse hotline; and that she also reported it to her\n\f 3\n\n first-line supervisor, to the West Area Deputy Director, and finally to the Zone\n Manager to whom she had been referred. ", "SRF, Tab 1. ", "Shortly thereafter, the\n store director began a wide-ranging investigation of Ms. White, recommending\n that she be removed or demoted, and seeking to determine, by asking other\n employees, whether she was the source of the fraud tip. ", "Subsequently, the store\n director proposed Ms. White’s demotion for Conduct Unbecoming a Federal\n Supervisor, and she was demoted from her GS-8 position to the part-time position\n of Cashier, GS-3. ", " Id. As noted, OSC sought a stay of the demotion, which\n Member Robbins granted for a period of 45 days.", "\n¶5 In its request for a stay extension, OSC asserts that it is working diligently\n to complete its investigation, having interviewed more than 20 witnesses, and that\n the agency is assisting in scheduling interviews and in providing documents,\n which OSC must review as they are produced. ", "SREF, Tab 1 at 2-3. ", "Once OSC\n completes its investigation, it may need additional time to evaluate and pursue the\n matter, as appropriate. ", "Id. at 3. ", "OSC represents that there has been no material\n change in the evidentiary record during the stay. ", "Id. at 1. ", "Under the specific\n circumstances of this case, including the limited length of the extension request,\n the fact that OSC represents that the agency consents to the extension and that the\n agency does not disagree with that representation, and in light of the fact that the\n evidentiary record supporting OSC’s initial stay request has not changed since\n Member Robbins granted the initial stay, we find it appropriate to extend the stay\n until December 20, 2016. ", "See Special Counsel ex rel. ", "Waddell, 103 M.S.P.R.\n 372, ¶ 5 (2006).", "\n\n ORDER\n¶6 Pursuant to 5 U.S.C. § 1214(b)(1)(B), a 30-day extension of the stay is\n hereby GRANTED. ", "It is hereby ORDERED that:\n (1) The terms and conditions of the stay issued on October 7, 2016, are\n extended through and including December 20, 2016;\n\f 4\n\n (2) Within 5 working days of this Order, the agency shall submit evidence\n to the Clerk of the Board showing that it has complied with this Order;\n and\n (3) Any request for a further extension of the stay pursuant to 5 U.S.C.\n § 1214(b)(1)(B) must be received by the Clerk of the Board and the\n agency, together with any evidentiary support, on or before\n December 5, 2016. ", "See 5 C.F.R. § 1201.26(b). ", "Any comments on such\n a request that the agency wishes the Board to consider pursuant to\n 5 U.S.C. § 1214(b)(1)(C) must be received by the Clerk of the Board,\n together with any evidentiary support, on or before December 12, 2016.", "\n See 5 C.F.R. § 1201.136(b).", "\n\n\n\n\nFOR THE BOARD: ______________________________\n Jennifer Everling\n Acting Clerk of the Board\nWashington, D.C.\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0.00411522633744856, 0.007633587786259542, 0.016, 0.009242144177449169, 0.0049261083743842365, 0.018072289156626505, 0, 0.008264462809917356, 0, 0.01092896174863388, 0, 0.02, 0.027777777777777776, 0, 0, 0.03278688524590164, 0.047619047619047616, 0, 0, 0, 0.012048192771084338, 0, 0.003952569169960474, 0, 0.010752688172043012, 0, 0.015873015873015872, 0.004739336492890996, 0.16666666666666666, 0.0040650406504065045, 0.014285714285714285, 0.008928571428571428, 0, 0.05, 0, 0, 0, 0, 0.0020491803278688526, 0, 0.023255813953488372, 0, 0.008658008658008658, 0, 0.011811023622047244, 0, 0.013761467889908258 ]
0.011629
5
[ "The Girlfriend Experience is a film that never could have been made in the star system of Old Hollywood. ", "The Hays Office would have forbidden it, first of all, but it never would have arrived on their desk for condemnation anyway. ", "There was a line between Hollywood sex and real sex that you didn't dare cross. ", "It was a line that director Steven Soderbergh helped erode in his Palme D'Or winner, 1989's Sex, Lies and Videotape, and a line that was officially buried and forgotten with Michael Winterbottom's 2004 film 9 Songs and John Cameron Mitchell's 2006 Shortbus.", "\n\nNow, thanks to Soderbergh, we have a porn actress starring in a mainstream film from a bona fide award-winning, A-list director. ", "That sound is Jack Warner and Lew Wasserman spinning in their graves.", "\n\nWith respect to adult thespians, the role is not a terrible stretch for Sasha Grey. ", "She plays Chelsea, a $2,000-an-hour hooker who is looking for more from life. ", "Not in the existential sense, of course. ", "No, she wants to be better paid for her time and body, and to find a better relationship than she has with her $125-an-hour personal trainer boyfriend. ", "At least she isn't another hooker with a heart of gold.", "\n\nThe film's jumbled timeline runs against the backdrop of the 2008 election and economic collapse, lingering on the business types who can afford her services freaking out at the thought of not being able to afford her services, while musing randomly on McCain, Obama and why gold is a better commodity than diamonds.", "\n\nA few of these creeps offer to help Chelsea, but do nothing but inflict damage once they've gotten what they want. ", "Case in point: A user-generated sex-website review of the Chelsea experience rips her by stating, 'With her flat affect, lack of culture and utter refusal to engage, Chelsea couldn't even dazzle the likes of Forrest Fucking Gump.â?", "� It's a damaging review for Chelsea, but the problem is that it's true about Grey herself, even more so than Chelsea. ", "Grey is less convincing as her character than most porn stars are at faking orgasm.", "\n\nWhile The Girlfriend Experience is not a good film by any stretch, I wouldn't hesitate to recommend it as being, at the very least, worth the time to watch it. ", "Clocking in at a paltry 77 minutes, it gets lost somewhere in the cracks between terrible and bearable. ", "There is something undeniably compelling about watching Grey flounder around onscreen next to this host of creepy user-men in her attempt to reach the next plateau of her business while still trying to find real love at the same time.", "\n\nIt's impossible to root for her, because her desires would be an absurd largesse bestowed on an undeserving person if she won them. (", "It's akin to hoping Spitzer's girl, Ashley Dupré, lands that record deal she's always wanted.) ", "Yet it is also impossible to wish failure upon her, since she only wants to succeed at her job. ", "It's all anyone wants, really." ]
{ "pile_set_name": "Pile-CC" }
[ 0.009523809523809525, 0.007936507936507936, 0, 0.019455252918287938, 0, 0.028985507246376812, 0.011627906976744186, 0.01282051282051282, 0, 0, 0, 0.0031446540880503146, 0.008547008547008548, 0.012987012987012988, 0.025210084033613446, 0, 0.006172839506172839, 0, 0.004273504273504274, 0, 0.021052631578947368, 0, 0 ]
0.007467
5
[ "Android phones allow users to customize what's called a \"launcher\" that appears when you press the Home button -- a feature that iPhone doesn't have. ", "Microsoft Launcher, which is based on Fluent design, allows you to further customize what you see. ", "In addition to \"Continue on PC,\" you can place icons of your favorite people on your home screen. ", "It also offers The Feed, where you can find your most-used apps, recent news, important events and more, all tailored to your needs. ", "You can access The Feed by swiping right.", "\n\nMicrosoft Launcher also offers full customization capabilities. ", "Not only do you have the ability to change backgrounds, but it offers \"gesture\" support to make you as productive as possible. ", "The app is available in Preview for now, and it's open to any Android user. ", "If you're on the Arrow Launcher beta, you'll automatically get the Microsoft Launcher update. ", "Support for Continue on PC will arrive with the Windows 10 Fall Creators Update." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.013333333333333334, 0.010101010101010102, 0, 0, 0, 0.015151515151515152, 0, 0.013157894736842105, 0.02127659574468085, 0 ]
0.007302
5
[ "Q:\n\nCan someone help me with this sentence, please?", "\n\nもっとも……洞窟の中にいたとしても、冷静に考えりゃ無事にはすまないんだが、それでも外よりはマシだっただろう。", "\n\nもっとも……洞窟の中にいたとしても would be \"Even if you are in the cave...\" and それでも外よりはマシだっただろう be \"It would be better than being outside\".", "\nBut I don't understand this part very well: 冷静に考えりゃ無事にはすまないんだが. I know that 冷静に考えりゃ is \"thinking calmly\", but 無事にはすまない confuses me. ", "I think \"すまない\" must be another word, because \"sorry\" doesn't make sense, but I don't recognize it without kanji.", "\n\nA:\n\n無事 means safety, and 済む is a verb that means to finish. ", "無事に済む is a very common set phrase that means to finish without trouble. ", "In this case it means something more physical: to get away without being injured. ", "考えりゃ is 考えれば, a colloquial eba-to-ya contraction. ", "This もっとも is something like admittedly, though.", "\nSo 洞窟の中にいたとしても冷静に考えりゃ無事にはすまない means \"even if we had been in the cave, come to think of it calmly, we could not have gotten away without getting injured\".", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0.02, 0, 0, 0 ]
0.001667
5