texts
sequence
meta
dict
scores
sequence
avg_score
float64
0
1
num_sents
int64
1
118k
[ "As we approach the end of May, we're also nearing the end of online fan voting for the Denver Broncos' Top 100 Team.", "\n\nWhat is the Broncos Top 100? ", "Quite simply, it's a list of the 100 greatest players to ever suit up for this storied franchise.", "\n\nIt is easy to vote: just go to DenverBroncos.com/forms/broncos100.", "\n\nTo be clear: Fans do not to need to vote for 100 players, which might be a bit intimidating for some or even most.", "\n\nYou can vote for as many or as few that you deem worthy of being on the team's all-time list.", "\n\nWe have already received nearly 5,000 votes, and it really does not matter if the players you select are as famous as our 32 (soon to be 33) Ring of Famers, or if they are obscure and not known by many people.", "\n\nI can assure you I have heard of the player, and so has Andrew Mason, our Senior Digital Reporter.", "\n\nWe are both honored to join our fans on the selection committee, and while I know there will be universal agreement on many of our greats, there will also some discussions and comparisons of lesser-known players.", "\n\nAfter all, this is the Denver Broncos' 60th year of play, and a lot of guys have suited up in that time, giving their blood, sweat and tears to help grow this franchise from the humblest of beginnings to the championship contender status that we have enjoyed since 1977.", "\n\nDenver's first year of play was 1960, when the Broncos joined the other seven original American Football League teams in the league's inaugural season.", "\n\nBooks have been written about the beginnings of the AFL, so we won't try to compete historically right now, but suffice it to say that every player who ever signed a contract and came to camp had high hopes and did his best to be a pro football player and make the Broncos better in the process.", "\n\nAnd if one of those players is remembered only by you, that still counts for a lot.", "\n\nWe want to hear from you with that name, and with all the others you want to include.", "\n\nDo not worry about spelling, or about the statistical history of the individual. ", "I guarantee every one will be considered and compared to every other.", "\n\nThere is no set limit on how many will be chosen at each position, and we will not try to rank them in order.", "\n\nAs Pro Football Hall of Fame member Deacon Jones once said to a group that included me, \"The Hall of Fame is a place where no quarterback can get away from me — and I cannot catch any quarterback, because we are all equals in the Hall.\"", "\n\nSo too will they be equals the Broncos' Top 100.", "\n\nIt is a list of 100, and every player cannot make it, but the starting point to who makes the list is dependent largely upon your vote.", "\n\nThis is an exciting part of our anniversary celebration for both our 60th year and the 100th anniversary season of the National Football League." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006196771282702684, 0.0007803072221577168, 0.0007606836734339595, 0.0005489308387041092, 0.0005650583188980818, 0.0008721851627342403, 0.0006709532462991774, 0.0005655346321873367, 0.0004841484478674829, 0.0015592877753078938, 0.0006352118216454983, 0.000576522434130311, 0.0006420231075026095, 0.0006087715155445039, 0.0006825233576819301, 0.0005543871666304767, 0.0006274469196796417, 0.0009791566990315914, 0.0007894276641309261, 0.0007682988070882857, 0.0005548127228394151 ]
0.000707
21
[ "Portable electronic devices are used for a variety of useful functions, including (i) communications devices such as mobile telephones, citizen band radios, family radio spectrum radio, and wireless internet devices, (ii) portable computing devices such as notebook computers, personal digital assistants, and calculators, (iii) military electronic devices, such as night visions devices, communications devices, precision GPS, laser targeting devices, data displays, and computing devices, and (iv) other items such as digital cameras, camcorders, global position satellite devices, portable electronic games, flashlights, radios, and audio CD/MP3 players. ", "Further, many more such types of devices are being created all the time. ", "In some cases, the new electronic devices have become critically important to public safety such as 911 emergency service on mobile telephones, or global position satellite devices for general aviation and marine use.", "\nOne common element in all these portable electronic devices is their need for portable electrical power. ", "This has been traditionally solved by using assemblies of chemical batteries, either the one time use disposable batteries (such as alkaline, zinc-air), or the multiple use rechargeable batteries (such as nickel-cadmium, nickel-metal-hydride, lead-acid, lithium-ion).", "\nElectronic devices can only be truly portable if their power sources are always available in the field. ", "Disposable batteries have a finite capacity. ", "One option is to carry a sufficient supply of spare disposable batteries. ", "However, each of the electronic devices can have a different power requirement with different voltages and currents. ", "As a result thereof, the user may be required to carry multiple different types of batteries. ", "Further, on a long trip or mission, the user may have to carry multiple sets of backup batteries. ", "Moreover, the used batteries create a significant waste problem because they often contain toxic chemicals such as lead or mercury. ", "As a result thereof, in many in situations, it is not practical to carry sufficient spare batteries.", "\nRechargeable batteries must be near a power source to be recharged, typically, a source of 60 Hz/120V. This is generally not available in remote locations. ", "Alternatively, dynamo style power generators have a long history of usage. ", "However, these generators are bulky, lowpower, single voltage, single device, hard to crank, inefficient, no feedback, and/or dangerous to batteries.", "\nIn light of the above, there is the need for an efficient portable device to produce electrical energy in the field. ", "Additionally, there is a need for a power source that can be used to generate output current and voltages to a wide range of different electronic devices with their various battery chemistries and power needs. ", "Moreover, there is a need for a power source that is relatively easy and efficient to use and control. ", "Further, there is a need for a power source that reduces user fatigue." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0006449413485825062, 0.0006041304441168904, 0.0005757788894698024, 0.0005912570632062852, 0.0006439178250730038, 0.0005595391849055886, 0.0008520570117980242, 0.0010745641775429249, 0.0006307202274911106, 0.0007444913499057293, 0.0007522907108068466, 0.0031195117626339197, 0.0007026513339951634, 0.0006393135990947485, 0.0006099039455875754, 0.003569688182324171, 0.0005410943413153291, 0.0006403569714166224, 0.0005819707293994725, 0.0005822883686050773 ]
0.000933
20
[ "A number of tools exist for interpreting these readouts, including GATK, VarDict, and FreeBayes. ", "However, these software programs typically use simpler statistical and machine-learning approaches to identifying mutations by attempting to rule out read errors.", "\n\n“One of the challenges is in difficult parts of the genome, where each of the [tools] has strengths and weaknesses,” says Brad Chapman, a research scientist at Harvard’s School of Public Health who tested an early version of DeepVariant. “", "These difficult regions are increasingly important for clinical sequencing, and it’s important to have multiple methods.”", "\n\nDeepVariant was developed by researchers from the Google Brain team, a group that focuses on developing and applying AI techniques, and Verily, another Alphabet subsidiary that is focused on the life sciences.", "\n\nThe team collected millions of high-throughput reads and fully sequenced genomes from the Genome in a Bottle (GIAB) project, a public-private effort to promote genomic sequencing tools and techniques. ", "They fed the data to a deep-learning system and painstakingly tweaked the parameters of the model until it learned to interpret sequenced data with a high level of accuracy.", "\n\nLast year, DeepVariant won first place in the PrecisionFDA Truth Challenge, a contest run by the FDA to promote more accurate genetic sequencing.", "\n\n“The success of DeepVariant is important because it demonstrates that in genomics, deep learning can be used to automatically train systems that perform better than complicated hand-engineered systems,” says Brendan Frey, CEO of Deep Genomics.", "\n\nThe release of DeepVariant is the latest sign that machine learning may be poised to boost progress in genomics.", "\n\nDeep Genomics is one of several companies trying to use AI approaches such as deep learning to tease out genetic causes of diseases and to identify potential drug therapies (see “An AI-Driven Genomics Company Is Turning to Drugs”)." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0005663983174599707, 0.0006632606382481754, 0.0005975810927338898, 0.0005421772366389632, 0.0006518758600577712, 0.0005967086181044579, 0.0006005080649629235, 0.00059574592160061, 0.0005934903165325522, 0.0006209946586750448, 0.0006836776155978441 ]
0.00061
11
[ "#N canvas 212 72 973 689 10;\n#X obj 121 172 inlet;\n#X floatatom 175 194 5 0 0 0 - - -;\n#X floatatom 383 334 5 0 0 0 - - -;\n#X floatatom 382 525 5 0 0 0 - - -;\n#X obj 382 504 r \\$0-float;\n#X floatatom 272 193 5 0 0 0 - - -;\n#X floatatom 525 195 5 0 0 0 - - -;\n#X floatatom 382 624 5 0 0 0 - - -;\n#X floatatom 322 194 5 0 0 0 - - -;\n#X obj 383 383 t a b;\n#X obj 383 407 list prepend set;\n#X obj 383 429 list trim;\n#X msg 383 452 a b c d 93;\n#X obj 382 603 r \\$0-prep;\n#X obj 525 217 list prepend prep;\n#X msg 175 215 attack \\$1;\n#X obj 121 312 rjdispatch \\$0 attack;\n#X obj 383 313 r \\$0-attack;\n#X obj 383 360 r \\$0-alist;\n#X obj 322 216 list prepend alist a b c d;\n#X text 84 23 [rjdispatch];\n#X text 123 45 Wrapper around [route] that automatically sends incoming\nmessages to a receiver called \"\\$1-\\$2\" \\, if they start with \\$2.", "\n;\n#X text 125 94 Non-matching messages get passed on to the outlet.;", "\n#X text 124 114 Useful for dispatching of inlet-messages if you create\nchains of [rjdispatch] objects like below:;\n#X text 274 312 sends to this:;\n#X text 271 358 sends to this:;\n#X text 268 502 sends to this:;\n#X text 268 603 sends to this:;\n#X msg 476 271 help;\n#X obj 121 503 rjdispatch \\$0 float;\n#X obj 121 600 rjdispatch \\$0 prep;\n#X obj 121 359 rjdispatch \\$0 alist;\n#X text 473 252 special method \"help\" to print all active rjdispatch\ntargets;\n#X obj 121 630 rjdispatch \\$0 bang;\n#X obj 258 630 r \\$0-bang;\n#X msg 135 215 bang;\n#X obj 258 658 print BANG;\n#X obj 671 527 rjdispatch \\$0 symbol;\n#X text 643 508 This does not work \\, don't use it:;\n#X connect 0 0 16 0;\n#X connect 1 0 15 0;\n#X connect 4 0 3 0;\n#X connect 5 0 16 0;\n#X connect 6 0 14 0;\n#X connect 8 0 19 0;\n#X connect 9 0 10 0;\n#X connect 9 1 10 0;\n#X connect 10 0 11 0;\n#X connect 11 0 12 0;\n#X connect 13 0 7 0;\n#X connect 14 0 16 0;\n#X connect 15 0 16 0;\n#X connect 16 0 31 0;\n#X connect 17 0 2 0;\n#X connect 18 0 9 0;\n#X connect 19 0 16 0;\n#X connect 28 0 16 0;\n#X connect 29 0 30 0;\n#X connect 30 0 33 0;\n#X connect 31 0 29 0;\n#X connect 34 0 36 0;\n#X connect 35 0 16 0;\n" ]
{ "pile_set_name": "Github" }
[ 0.027365893125534058, 0.001117576495744288, 0.03134414926171303 ]
0.019943
3
[ "Mahmoud Anbarani\n\nMahmoud Anbarani (Born in 1937 - Sabzevar - Iran) poet, writer, translator and scholar of Persian (Iran).", "\n\nLife \nHe passed his secondary education in city of Sabzevar, and moved to Mashhad in 1953. ", "In 1954, he was accepted in mashhad Medical School entrance, but due to personal problems, he neglected it. ", "In 1964, he was accepted in Dr.Shariati faculty of Literature and humanities, in Mashhad. ", "In the final undergraduate year, ranking first among all students of Mashhad Ferdowsi university Entrance in the Dramatic Arts. ", "He received the scholarship of Nancy,France university but due to family disagreement, he withdrew the trip to France.", "\n\nThen in 1968, after graduating with a degree in French language and literature, he moved to Isfahan. ", "After graduating in Management Science, he Started working as, head of administration and coordination center of Isfahan Iron foundry.", "\n\nIn 1975 he moved to Tehran and worked in the university of Industrial Training Center (Currently:khaje Nasir-e-din-Toosi University). ", "In posts such as: Assistant and supervisor of Tehranpars-Khak sefid, workships. ", "Then he requested retirement.", "\n\nHe translated a part of the small Larus Dictionary into Persian (Donya publication). ", "He also did the correction of the literary, medical and pharmaceutical parts of the \"Human Knowledge\" Encyclopedia.", "\n\nIn 1985, he returned to Mashhad and work in the institute of \"Islamic Research Foundation\", as a researcher, for 17 years. ", "In this period he published many scientific books and manuals.", "\n\nSources \n Persian Wikipedia\n\nCategory:1937 births\nCategory:Iranian poets\nCategory:Iranian scholars\nCategory:Iranian translators\nCategory:Living people" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0006088353111408651, 0.0008249878883361816, 0.0006313171470537782, 0.0006655875477008522, 0.0007402378832921386, 0.0006375477532856166, 0.0006014012615196407, 0.0006094487034715712, 0.0006685812841169536, 0.0005780118517577648, 0.0007747802301310003, 0.0006492442335002124, 0.0008352752774953842, 0.0006429054192267358, 0.0006311406032182276, 0.0005833421600982547 ]
0.000668
16
[ "Deferoxamine reduces the reperfusion injury in isolated neonatal rabbit hearts after hypothermic preservation.", "\nThe protective action of deferoxamine, an iron chelator, against reperfusion injury following hypothermic preservation was investigated in the Langendorff-perfused hearts of neonatal rabbits. ", "Left ventricular function and radical generation were used as parameters to evaluate functional and metabolic changes. ", "The free radicals in coronary effluents were measured with an electron spin resonance spectroscope using a spin trapping agent, 5,5-dimethyl-1-pyrroline-N-oxide (DMPO). ", "The hearts were preserved in cold St. Thomas solution at 4 degrees C for 6 h following cardiac arrest, then reperfused with oxygenated Krebs-Henseleit solution in a control. ", "Deferoxamine (100 microM) was added to the perfusate just prior to reperfusion in group I, and 3 min after the start of reperfusion in group II. ", "In the control group, the left ventricular developed pressure (LVDP) after 30-min reperfusion recovered up to 43.5 +/- 3.1% (mean +/- SD, n = 5) the preischemic value. ", "Group I showed a significant improvement in LVDP recovery after 30-min reperfusion at 57.1 +/- 3.1% (P < 0.01 vs control), but group II did not (47.5 +/- 2.3%). ", "When a burst of DMPO-OH signals was detected during the initial 5 min of reperfusion, the signal intensity in group I was significantly reduced to about 35-40% of the control value. ", "Group II showed a similar intensity to the control group. ", "Thus, we conclude that deferoxamine may exert a protective action against the dysfunction of neonatal mammalian hearts induced by preservation-reperfusion through an inhibition of iron-catalyzed radical formation." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0018371351761743426, 0.002248623641207814, 0.0009357825038023293, 0.0009307501022703946, 0.0006581088528037071, 0.0007794317789375782, 0.0008348440751433372, 0.0005978844710625708, 0.0006609114934690297, 0.000597950245719403, 0.0007949208957143128 ]
0.000989
11
[ "Price: £10.52\n\nQty:\n\nStock code: SEAC01\n\nRatings for this product\n\nDescription\n\n• Free airflow rate at 100psi(7bar) : 35-42cfm(991-1133ltr/min).", "\n• Manufactured in the UK, these fittings are the best money can buy.", "\n• Ideal for general workshop use with all types of wrenches, sanders and grinders." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005908675375394523, 0.0005390193546190858, 0.0006976300501264632 ]
0.000609
3
[ "The US Drug Enforcement Administration's \"Position on Marijuana 2010\" is a hot document. ", "Dated to July, it didn't really start circulating until this January when activist Ed Rosenthal found his name in it.", "\n\nSince then, the DEA link to the paper is gone, but aGoogle site search yields the file. ", "Yesterday, the Marijuana Policy Project told supporters that the DEA's position paper labels the drug law reform group Enemy #1. ", "But that's just a little bit of the 54-page collection of anecdotal Reefer Madness.", "\n\nThin on actual research, the littlescience the DEA cites is biased. ", "The paper almost never discloses the number of patients in a study group, and can't cite much US research — ironically, because the DEA plays a role in ensuring such studies never get approved. ", "But the paper does relate some sad drug war stories.", "\n\n- “While some people [think] the federal government has relaxed its policy on 'medical' marijuana, this in fact is not the case. ", "Investigations and prosecutions of violations of state and federal law will continue.”", "\n\n(Source)" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006127665983512998, 0.00060157326515764, 0.000718631490599364, 0.0006770312320441008, 0.0028044478967785835, 0.0008424223051406443, 0.0005636258865706623, 0.0008290604455396533, 0.0006890318472869694, 0.0005810467409901321, 0.0006585279479622841 ]
0.000871
11
[ "List of state leaders in 1618\n\n\n\nAfrica\nEthiopian Empire – Susenyos I (1606–1632)\n\nAsia\n Ayutthaya Kingdom (Siam) – Ekathotsarot (1605–1620)\nChina (Ming dynasty) - Wanli Emperor (1573–1620)\n Japan\nMonarch – Go-Mizunoo (1611–1629)\nTokugawa shogunate – Tokugawa Hidetada (1605–1623)\nRyukyu Kingdom – Shō Nei (1587–1620)\nJoseon (Korea) – Gwanghaegun (1608–1623)\nLater Jin (Manchu Empire) - Nurhaci (1616–1626)\nMughal Empire – Jahangir (1605–1627)\n\nEurope\nKingdom of Denmark – Christian IV (1588–1648)\nKingdom of England – James I (1603–1625)\nKingdom of France – Louis XIII (1610–1643)\nHoly Roman Empire – Matthias (1612–1619)\nPrince-Archbishopric of Bremen – John Frederick, Duke of Schleswig-Holstein-Gottorp, Lutheran Administrator of the Prince-Archbishopric of Bremen (1596–1634)\nPrince-Bishopric of Lübeck – John Frederick, Duke of Schleswig-Holstein-Gottorp, Lutheran Administrator of the Prince-Bishopric of Lübeck (1607–1634)\nOttoman (Turkish) Empire\n Mustafa I, Ottoman Sultan (1617–1618) and (1622–1623)\n Osman II, Ottoman Sultan (1618–1622)\nPolish–Lithuanian Commonwealth – Sigismund III Vasa (1587–1632)\nRussia - Michael I, Tsar of Russia (1613–1645)\nKingdom of Spain and Kingdom of Portugal and the Algarves – Philip III of Spain and II of Portugal (1598–1621)\nSweden - Gustavus Adolphus (1611–1632)\n United Provinces\nEstates of Friesland, Groningen, Guelders, Holland, Overijssel, Utrecht, Zeeland (1581–1795)\n Stadtholder - Maurice of Nassau, Prince of Orange, Stadtholder of Gelre, Holland, Overijssel, Utrecht and Zeeland (1585–1625)\nGrand Pensionary of Holland - Johan van Oldenbarnevelt (1586–1619)\nRepublic of Venice –\nGiovanni Bembo, Doge of Venice (1615–1618)\nAntonio Priuli, Doge of Venice (1618–1623)\n\nMiddle East and North Africa\n\nSafavid Empire – Abbas I, Shah of Iran (1587–1629)" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0009828077163547277 ]
0.000983
1
[ "3/29/16: Munenori Kawasaki hits a three-run jack to right field, and then gets the silent treatment when he returns to the dugout" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.008121262304484844 ]
0.008121
1
[ "1. ", "Introduction {#sec1-cancers-11-01175}\n===============\n\nThe use of nanomaterials as gene/drug delivery agents has increased significantly over the past few years, owing to their capability of delivering either water-insoluble or unstable drugs or degradable gene therapeutics. ", "Several categories of nanocarriers have been developed/utilized thus far, including quantum dots \\[[@B1-cancers-11-01175],[@B2-cancers-11-01175],[@B3-cancers-11-01175],[@B4-cancers-11-01175]\\], PLGA-PEG (polylactic acid-co-glycolic acid-polyethylene glycol) nanoparticles \\[[@B5-cancers-11-01175]\\], liposomes \\[[@B6-cancers-11-01175]\\], self-emulsifying drug delivery systems (SEDDSs) \\[[@B7-cancers-11-01175]\\], cyclodextrins \\[[@B8-cancers-11-01175]\\], gold nanoparticles \\[[@B9-cancers-11-01175]\\], and carbon nanotubes \\[[@B10-cancers-11-01175],[@B11-cancers-11-01175]\\] as delivery vehicles or diagnostic tools. ", "Among those, single-walled carbon nanotubes (SWCNTs) showed highly promising results for gene/drug delivery coupled with in vitro as well as in vivo imaging \\[[@B12-cancers-11-01175]\\]. ", "Their quasi-one-dimensional hydrophobic platform aids cellular internalization and the non-covalent or covalent attachment of active agents and targeting moieties \\[[@B13-cancers-11-01175]\\]. ", "At the same time, the intrinsic photostable fluorescence emission of SWCNTs in NIR (near-infrared) I and II regions with reduced scattering and autofluorescence backgrounds allows imaging through the layers of biological tissue \\[[@B14-cancers-11-01175],[@B15-cancers-11-01175]\\]. ", "As molecular transporters, SWCNTs can shuttle payloads, including drug molecules \\[[@B16-cancers-11-01175]\\], proteins \\[[@B17-cancers-11-01175]\\], DNA \\[[@B18-cancers-11-01175]\\], and RNA \\[[@B19-cancers-11-01175]\\] into biological cells and tissues. ", "Functionalized with drugs and targeting agents covalently \\[[@B20-cancers-11-01175]\\] or non-covalently by π-π stacking \\[[@B13-cancers-11-01175],[@B21-cancers-11-01175]\\], SWCNTs can provide reduced toxicity \\[[@B22-cancers-11-01175]\\], greater biological activity \\[[@B16-cancers-11-01175]\\], accumulation in the liver when formulated \\[[@B10-cancers-11-01175]\\], and controlled drug release \\[[@B23-cancers-11-01175]\\]. ", "Due to characteristic NIR SWCNT fluorescent emission, their location can be imaged to confirm the payload delivery. ", "As near-infrared exhibits significantly enhanced tissue penetration and lower scattering, it provides unique promise in the in vivo imaging of shallow targets. ", "Although it has been shown that SWCNTs can be used for the delivery of drugs \\[[@B11-cancers-11-01175],[@B24-cancers-11-01175]\\], cancer therapeutic siRNA oligos \\[[@B10-cancers-11-01175],[@B11-cancers-11-01175]\\], and imaging agents \\[[@B25-cancers-11-01175],[@B26-cancers-11-01175]\\], their capability for multidrug therapy and imaging has been underexplored to date, hampering their advancement to the successful treatment of complex conditions. ", "Additionally, the ability to follow chirally separated SWCNTs by imaging allows one to confirm that each component in multidrug therapies reaches the desired tissue of interest.", "\n\nSWCNT formulation is known to accumulate in the liver \\[[@B10-cancers-11-01175]\\], which offers the potential for the treatment of liver diseases including nonalcoholic steatohepatitis (NASH) and its progression into hepatocellular carcinoma (HCC). ", "Thus, in this work, NASH was chosen as a feasible treatment target to demonstrate the imaging/drug delivery capabilities of SWCNTs. ", "NASH is a non-curable condition present in 6--8% of adults in the US. ", "It accounts for a large number of cases of cirrhosis and can progress to HCC, leading to 75% of all liver cancer---the third leading cause of cancer-related deaths. ", "The transformation of NASH into HCC is known to be mediated by fibrosis \\[[@B27-cancers-11-01175]\\] progressing in over 30% of NASH patients, and inflammatory response with the involvement of a variety of cytokines \\[[@B28-cancers-11-01175]\\]. ", "Due to the complexity of this condition involving both inflammation and fibrosis, multifactor treatment strategies are required.", "\n\nCurrent molecular therapy approaches are often restricted by drug resistance and the inability to target multiple factors \\[[@B29-cancers-11-01175]\\]. ", "These challenges can be addressed by combination treatments involving multidrug approaches to surmount drug resistance, decrease treatment doses, and affect multiple therapeutic targets. ", "Although effective in treatment \\[[@B30-cancers-11-01175],[@B31-cancers-11-01175],[@B32-cancers-11-01175]\\], combination therapies suffer from non-specific toxicity \\[[@B33-cancers-11-01175],[@B34-cancers-11-01175]\\], difficulties in assessing the adverse effects of each drug separately, and the lack of image-guided capabilities \\[[@B35-cancers-11-01175]\\]. ", "On the other hand, combination gene \\[[@B36-cancers-11-01175],[@B37-cancers-11-01175],[@B38-cancers-11-01175]\\] or drug/gene \\[[@B39-cancers-11-01175]\\] therapies can circumvent the issue of non-specific toxicity due to the target-specific effects of gene therapeutics while providing effective routes to treatment. ", "However, due to the short lifetime of DNA/RNA oligonucleotides in the body, additional delivery mechanisms are required \\[[@B40-cancers-11-01175]\\].", "\n\nHere we explore a therapeutic platform with the capacity to address both inflammation and fibrosis pathways of NASH via combination drug/gene therapy. ", "The therapeutic approach used an siRNA target that has been shown to reduce the inflammatory cytokines that lead to liver fibrosis \\[[@B41-cancers-11-01175]\\], and a small-molecule PI3 kinase inhibitor, PX-866 \\[[@B28-cancers-11-01175]\\], that has been shown to reduce tissue fibrosis in vivo. ", "Fibrosis is known to increase the risk of HCC by 25 times \\[[@B42-cancers-11-01175]\\], as it leads initially to liver cirrhosis and subsequently develops into HCC. ", "In this progression, activated hepatic stellate cells (aHSCs) responsible for fibrosis development are often described as pericytes for angiogenesis and vascular remodeling in the liver \\[[@B43-cancers-11-01175]\\]. ", "Fibrosis mediated by HSCs is associated with the effects of inflammation, as multiple inflammatory cytokines are known to elicit further activation of HSCs \\[[@B44-cancers-11-01175]\\]. ", "Although the entire process is not fully understood, fibrotic cytokine release (i.e., TGF-β, sonic hedgehog, and TNF-α) in the course of NASH is believed to contribute to the progression of the latter through the fibrotic stage and cirrhosis to HCC \\[[@B28-cancers-11-01175]\\]. ", "Therefore, developing delivery and tracking through imaging modules for therapeutic entities that address both fibrosis and inflammation in NASH could be an important step toward mitigating the transformation of NASH into HCC.", "\n\nHepatic inflammation can be suppressed by gene therapies interfering with cytokine activation, including several siRNA sequences against the protein. ", "CCR5 (aka RANTES) siRNA is well-known for its anti-inflammatory effects \\[[@B45-cancers-11-01175],[@B46-cancers-11-01175],[@B47-cancers-11-01175]\\], and could be a potential key to the reduction of inflammation in the liver. ", "Among effective fibrotic drugs, a PI3 kinase inhibitor, PX-866, was chosen for two reasons: (1) PX-866 was previously shown to reduce fibrosis in the lungs \\[[@B48-cancers-11-01175]\\]; (2) PX-866 has been evaluated in clinical trials, its safety profile is understood, and it had shown some clinical benefit against solid-tumor cancers \\[[@B49-cancers-11-01175]\\]. ", "To reduce off-target effects of PX-866 and protect siRNA from enzymatic degradation in the blood, these therapies could benefit from a delivery vehicle that will direct their transport to the liver. ", "Additionally, to allow confirmation of the delivery of each therapeutic entity by the SWCNTs, the capability of image-tracking chiral SWCNTs is advantageous.", "\n\nIn the present work, chiral SWCNTs perform the critical function of delivery/imaging agents capable of protecting siRNA from enzymatic degradation in circulation, and protecting healthy tissue from the off-target effects of PX-866 by focusing this delivery to the liver tissue. ", "While using SWCNTs of one select chirality for the delivery of either siRNA sequence or a drug payload, chirality-specific SWCNT fluorescence \\[[@B50-cancers-11-01175]\\] in the NIR can be utilized to image the location and delivery pathways of the drug or gene separately.", "\n\nThe goal of this work was to assess the capabilities of SWCNTs for the non-covalent delivery and imaging of combination therapeutics such as PX-866 and siCRR5, each attached to SWCNTs of a particular chirality. ", "The efficacy of each payload was evaluated using hepatocellular carcinoma cells (HepG2) while NIR hyperspectral imaging was used to confirm the location and SWCNT-mediated delivery of each therapeutic separately. ", "Since SWCNTs are produced as a mixture of chiralities, several separation strategies have been developed to isolate single chirality fractions, including gel chromatography \\[[@B51-cancers-11-01175]\\], density-gradient ultracentrifugation \\[[@B52-cancers-11-01175]\\], free-solution electrophoresis \\[[@B53-cancers-11-01175]\\], aqueous two-phase extraction (ATPE) method \\[[@B54-cancers-11-01175]\\], etc. ", "ATPE is well-known and widely used for its high yield with maximum purity, low-cost surfactants, high production scalability, and availability of instrumentation required for separation in every laboratory. ", "Therefore, in order to develop scalable and affordable combination therapy platforms, in this study single-chirality SWCNTs were separated by a modified ATPE method \\[[@B54-cancers-11-01175]\\]. ", "We isolated (7,5) and (7,6) chiral SWCNTs from raw CoMoCAT (Cobalt Molybdenum Catalyst) SWCNT samples, as those chiralities exhibit spectrally well-separated emission at 1035 nm and 1130 nm, respectively. ", "NIR hyperspectral imaging was used to separately confirm the internalization of (7,5) and (7,6) chiral nanotubes, ensuring the delivery of drug and gene inside the HepG2 cells. ", "Overall, this work explores the feasibility of using single-chirality SWCNTs as efficient imaging and delivery vehicles. ", "Eventually, the utilization of such chiral SWCNTs may lead to the development of a unique image-guided multimodal therapy addressing several therapeutic targets. ", "Here we particularly explore the possibility of targeting both inflammation and fibrosis, which facilitate the progression of NASH to HCC.", "\n\n2. ", "Results and Discussion {#sec2-cancers-11-01175}\n=========================\n\nSince raw SWCNT samples contain nanotubes of different chiralities as well as SWCNT aggregates that are non-emissive and unsuitable for drug delivery, prior to sorting (7,5) and (7,6) chiral nanotubes, raw CoMoCAT SWCNT samples initially underwent aggregate depletion via 180 min centrifugation of sodium deoxycholate (DOC)-dispersed SWCNTs at 21,380× *g*. ", "This rigorous procedure resulted in the sedimentation of SWCNT aggregates with higher specific gravity than the individually wrapped SWCNTs. ", "In the aqueous two-phase extraction (ATPE) method, centrifuged SWCNTs with constant DOC concentration were combined in a PEG--dextran two-phase system with a variety of sodium dodecyl sulfate (SDS) concentrations, yielding the separation of chiralities from the dextran-enriched bottom to the PEG-enriched top phase. ", "The (7,5) and (7,6) chiral nanotubes were separated at 3 and 4 mg/mL of SDS, respectively allowing a substantial degree of control over top/bottom phase chirality composition, evident from their respective fluorescence and absorbance spectra ([Supporting Information Figures S1 and S2](#app1-cancers-11-01175){ref-type=\"app\"}) that were pronouncedly different from each other and from the spectra of the parent samples.", "\n\nSimulation of fluorescence spectra of (7,5) and (7,6) sorted fractions with single SWCNT chirality Lorentzian emission profiles ([Figure 1](#cancers-11-01175-f001){ref-type=\"fig\"}a,b) using the Applied Nanofluorescence Nanospectralyzer fitting routine allows for quantitative assessment of the sample optical properties and composition, yielding calculated excitation--emission maps ([Figure 1](#cancers-11-01175-f001){ref-type=\"fig\"}c,d) and relative abundances ([Figure 1](#cancers-11-01175-f001){ref-type=\"fig\"}e,f). ", "The spectral fitting process used in this work was based mainly on adjusting the expected widths and positions of theoretical fluorescence peaks from a variety of semiconducting SWCNT chiralities to simulate experimental emission spectra collected with four excitation wavelengths (532, 637, 671, and 782 nm), aiming for a perfect match between the simulated and measured spectra ([Figure 1](#cancers-11-01175-f001){ref-type=\"fig\"}a,b).", "\n\nBased on the chirality abundances, calculated from the weight of individual chirality contributions to the experimental spectra and reflected in the distribution of (n,m) species ([Figure 1](#cancers-11-01175-f001){ref-type=\"fig\"}e,f), substantial chirality enrichment was achieved in both sorted fractions (either (7,5) or (7,6)), with yields up to 40%. ", "Although not overwhelming, this enrichment left other chiralities with only 1--5% contribution. ", "In order to verify that this degree of separation is sufficient to monitor mainly SWCNTs of a single chirality microscopically, we examined the emission from (7,5) and (7,6) chirally sorted SWCNTs via NIR hyperspectral imaging at particular wavelengths corresponding to (7,3) (990 nm), (7,5) (1024 nm), and (7,6) (1120 nm) SWCNT chirality emission \\[[@B55-cancers-11-01175]\\]. (", "7,3) SWCNT emission was dominant in the unsorted sample ([Supporting Information Figures S1 and S2](#app1-cancers-11-01175){ref-type=\"app\"}) and thus could be a significant contaminant in both fractions. ", "However wavelength-resolved microscopy images show that the (7,5)-sorted fraction exhibited emission only at 1030 nm ([Figure 2](#cancers-11-01175-f002){ref-type=\"fig\"}a--c), corresponding only to (7,5) SWCNTs, whereas the (7,6) fraction only showed observable SWCNT emission at 1130 nm ([Figure 2](#cancers-11-01175-f002){ref-type=\"fig\"}d--f), corresponding to (7,6) SWCNTs. ", "No substantial cross-contamination or contamination from (7,3) SWCNTs was observed. ", "Furthermore, no observable contamination of the sorted sample by other SWCNT chiralities was detected by hyperspectral microscopy as we scanned the emission from 950 to 1350 nm with the step of 10 nm. ", "This indicates that the achieved degree of separation with minor percentages of contaminants of each chirality was sufficient for hyperspectral microscopy imaging.", "\n\nOne of the main drawbacks of utilizing chirality-sorted SWCNTs has always been the high toxicity of sorting surfactants. ", "In order to overcome this issue, we performed repeated multi-step centrifugal filtration (washing) with methanol/ethanol/DI water followed by the annealing of sorted SWCNTs at 200 °C for 1 h to remove the additional surfactants from the sorted SWCNTs. ", "The annealed SWCNT samples were cooled down to room temperature before any further processing. ", "The degree of surfactant removal was first verified spectroscopically by comparing the fluorescence spectral features of processed surfactant-purified samples: SWCNTs washed/annealed re-dispersed with EGFR siRNA and the spectra of raw SWCNTs dispersed directly with the same EGFR siRNA ([Figure 3](#cancers-11-01175-f003){ref-type=\"fig\"}a). ", "siRNA was chosen as it complexes non-covalently with SWCNTs and is known to form stable dispersions. ", "Since surfactant wrapping induces observable fluorescence shifts specific to each surfactant \\[[@B56-cancers-11-01175],[@B57-cancers-11-01175]\\] that are substantially different for bile salts and nucleic acids \\[[@B58-cancers-11-01175]\\], assessing shifts in the positions of major peaks allows the qualitative removal of surfactant. ", "Here, for the convenience of comparing multiple chirality peaks, we washed/annealed an unsorted SWCNT fraction, but with all the separation surfactants that are regularly present in the sorted samples. ", "Although a starting SWCNT sample which included sorting surfactants (PEG/dextran/SDS) exhibited major emission peaks at ca. ", "966, 986, 1035, 1130, 1185, and 1265 nm ([Figure 3](#cancers-11-01175-f003){ref-type=\"fig\"}a---black line), upon surfactant removal processing and redispersion with siRNA, major emissive features were observed at 1004, 1046, 1141, 1212, and 1308 nm ([Figure 3](#cancers-11-01175-f003){ref-type=\"fig\"}a---blue line). ", "Substantial shifts in the spectral positions (i.e., 11--18 nm shifts for 986, 1035, and 1130 nm peaks, a 27 nm shift for the 1185 nm peak, and a 43 nm shift for the 1265 nm peak), along with suppression of the 966 feature, indicate a significant change in the dielectric environment of SWCNTs that may have occurred due to the surfactant removal and replacement with siRNA. ", "Furthermore, new peak positions appeared to be close to those of raw SWCNTs dispersed with siRNA ([Figure 3](#cancers-11-01175-f003){ref-type=\"fig\"}a---red curve) that displayed a weak shoulder at 974 nm along with the most prominent emission features at ca. ", "996, 1041, 1141, 1213, and 1315 nm (comparison of peak positions listed in [Supporting Information Figure S3](#app1-cancers-11-01175){ref-type=\"app\"}). ", "The processed SWCNTs were re-dispersed, and yielded substantial fluorescence emission with characteristic spectra indicating that the SWCNTs were individualized, while the broadening could arise from only a loose aggregation. ", "Despite the difference in relative peak intensities affected by some aggregation accompanying the process of surfactant washing, substantial surfactant-removal-facilitated shifts of emission peaks toward those of siRNA-dispersed raw SWCNTs suggest a significant degree of surfactant depletion. ", "This may reduce the cytotoxicity of sorted SWCNTs, making them as suitable for biological applications as raw SWCNTs dispersed by siRNA. ", "It was also observed that SWCNTs' characteristic emissions were not affected by thermal annealing, suggesting the preservation of SWCNTs' fluorescence properties due to the thermal annealing at 200 °C for 1 h ([Supporting Information Figure S4](#app1-cancers-11-01175){ref-type=\"app\"}). ", "Additionally, a comparative fluorescence study was performed between before and after centrifuged washed/annealed SWCNTs + siRNA sample, exhibiting a slight insignificant change of photoluminescence intensity ([Supporting Information Figure S5](#app1-cancers-11-01175){ref-type=\"app\"}).", "\n\nA MTT cytotoxicity assay of centrifugally filtrated and thermally annealed SWCNTs further helped to assess if any residual surfactants could add to the toxicity profile of the formulation. ", "Confirming the findings derived from spectral position matching, MTT assays showed that washed/annealed SWCNTs had the same or lower cytotoxicity than the raw SWCNTs dispersed in siRNA ([Figure 3](#cancers-11-01175-f003){ref-type=\"fig\"}b). ", "The significantly lowered cell viability found in the assessment of the toxic profile of the parent unsorted SWCNT sample with all separation surfactants presents the benefit of surfactant removal. ", "Although this does not verify complete removal of surfactants, it indicates that washed/annealed SWCNTs are not more toxic than the raw SWCNTs, minimizing the toxicity contribution of sorting surfactants. ", "Further decrease in toxicity of SWCNT/siRNA formulation could be achieved by masking it with DSPE-PEG 5000 \\[[@B10-cancers-11-01175]\\], which was used for all in vitro studies in this work.", "\n\nSimilar to siRNA, SWCNTs can non-covalently complex with another therapeutic (i.e., PX-866) that was used in this work. ", "Upon ultrasonic processing, raw/unsorted SWCNTs showed a stable dispersion in an aqueous solution of PX-866, as well as distinct fluorescence emission ([Figure 4](#cancers-11-01175-f004){ref-type=\"fig\"}a). ", "Sorted, washed, and annealed SWCNT samples of (7,5) chirality could also be dispersed with PX-866 alone, showing distinct emission features corresponding to (7,5) SWCNTs ([Figure 4](#cancers-11-01175-f004){ref-type=\"fig\"}c). ", "Similarly, with only siRNA dispersion, raw SWCNTs ([Figure 4](#cancers-11-01175-f004){ref-type=\"fig\"}b) and sorted washed/burned SWCNTs ((7,6) chirality) ([Figure 4](#cancers-11-01175-f004){ref-type=\"fig\"}c) also formed stable emissive dispersions. ", "In fact, corresponding fluorescence ([Figure 4](#cancers-11-01175-f004){ref-type=\"fig\"}c) and absorbance ([Supporting Information Figure S6a,b](#app1-cancers-11-01175){ref-type=\"app\"}) spectra of (7,5) SWCNT/PX-866 and (7,6) SWCNT/siCCR5 fractions still showed the major features of the sorted SWCNT chiralities. ", "Interestingly, PX-866 on its own showed emission in green with 400 nm excitation ([Figure 4](#cancers-11-01175-f004){ref-type=\"fig\"}d) that was quenched when the drug was loaded on the SWCNTs ([Supporting Information Figure S7](#app1-cancers-11-01175){ref-type=\"app\"}). ", "This feature was used to locate/ensure the delivery of the drug in HepG2 cells as it was released from SWCNTs and the emission was restored.", "\n\nIn order to ensure the lower cytotoxicity, improved stability, and in vivo compatibility of the formulations for future studies, both SWCNTs dispersed with PX866 and siCCR5 were additionally coated with DSPE-PEG-5000 (at 1600 µM) via ultrasonic processing. ", "Aggregates that were not fully dispersed were further removed by centrifugal processing at 16,000× *g* for 5 min, while the excess of siRNA or PX-866, as well as DSPE-PEG-5000, was centrifugally filtered with 100-kDa molecular cutoff filters, leaving only drug or gene/SWCNT complexes in the solution. ", "TEM images of the final samples verify substantial SWCNT coating ([Supporting Information Figure S8](#app1-cancers-11-01175){ref-type=\"app\"}).", "\n\nFollowing successful separation, removal of the sorting surfactants and non-covalent attachment of the drugs and DSPE-PEG-5000, we further assessed the capability of (7,5) and (7,6) SWCNTs to trace the delivery of the drug and gene intracellularly. ", "Since combination therapy is envisioned for NASH, sorted (7,5) and (7,6) SWCNTs complexed with PX-866 and CCR5 siRNA were respectively combined in one suspension in equal proportions based on SWCNT concentrations and introduced to HepG2 cells. ", "After up to 3 h incubation, cells were washed twice with PBS (phosphate-buffered saline) solution to remove any extracellular SWCNTs, and only those that were internalized were imaged. ", "Among 0.5, 1, and 3 h incubation times tested, the highest intracellular emission was assessed at 3 h post transfection which was also found to be one of the optimal time points in the previous works \\[[@B10-cancers-11-01175],[@B59-cancers-11-01175],[@B60-cancers-11-01175]\\].", "\n\nHowever, the efficiency/maximum intracellular emission and cellular uptake may vary with cell types, SWCNT length, and SWCNT functionalization. ", "For example, Sekiyama et al. ", "\\[[@B61-cancers-11-01175]\\] used oxygen-doped SWCNTs/PEG to perform the intracellular imaging in cultured murine cancer cells (Colon-26) showing no emission/uptake up to 1 day, but started showing/increasing internalization from day 3 to day 7. ", "Additionally, Mao et al. ", "\\[[@B62-cancers-11-01175]\\] studied the cellular uptake and distribution of collagen-functionalized SWCNTs in bovine articular chondrocytes (BACs), showing longer retention in cells for more than one week. ", "The cellular uptake of SWCNTs was previously hypothesized to occur via nano-spearing of the cell membrane \\[[@B63-cancers-11-01175],[@B64-cancers-11-01175]\\], explained by needle-like hydrophobic SWCNT structure, while endocytosis \\[[@B65-cancers-11-01175],[@B66-cancers-11-01175]\\] is currently deemed as a more plausible SWCNT entry pathway and is considered as a major internalization mechanism in the current work.", "\n\nHerein, in vitro fluorescence imaging was accomplished with custom microscopy setup involving an inverted microscope coupled to two visible (Hamamatsu Image EMCCD) and near-infrared (InGaAs Xenics Xeva) cameras, allowing for filtered emission detection in the visible and spectrally resolved imaging in the near-infrared enabled by a Photon etc. ", "NIR hyperspectral imager. ", "In that configuration, wavelength-resolved images were recorded in the visible range with a lamp and in the NIR with 637 nm laser excitation. ", "This allowed the imaging of SWCNTs specifically at 1030 ([Supporting Information Figure S9b](#app1-cancers-11-01175){ref-type=\"app\"}) and 1130 nm ([Supporting Information Figure S9c](#app1-cancers-11-01175){ref-type=\"app\"}), corresponding to the emission wavelengths of sorted chiralities, while PX-866 was imaged in the visible with a 532 nm emission filter. ", "Confirming the sufficient degree of chirality separation, no emission in the NIR was observed outside the aforementioned spectral regions. ", "However, at 1030 and 1130 nm, substantial SWCNT fluorescence was observed within the cells ([Supporting Information Figure S10](#app1-cancers-11-01175){ref-type=\"app\"}), indicating the successful internalization of both formulations with no emission detected outside the cells. ", "Due to spectrally resolved imaging, no autofluorescence was detected in the non-treatment control. ", "The overlays of the fluorescence images of two chiral SWCNT fractions false-colored in red (for (7,5) SWCNT emission) and blue (for (7,6) SWCNT emission) ([Figure 5](#cancers-11-01175-f005){ref-type=\"fig\"}) verify the capability of tracking each therapeutic separately, as one could pinpoint the internalized SWCNTs or their clusters within HepG2 cells. ", "Additionally, the release of PX-866 could be assessed, as the released drug was no longer quenched by complexation to the SWCNTs: its fluorescence was also observed in the cells and was delocalized from its delivery vehicles while the extracellular PX-866 was removed by washing. ", "PX-866 imaging settings including integration time and excitation lamp intensity were chosen such that they yielded no autofluorescence from non-treatment control cells ([Figure 5](#cancers-11-01175-f005){ref-type=\"fig\"}a). ", "Additionally, the intracellular release of PX-866 was tracked qualitatively with different incubation times (0, 1, 4.5, 12 h) ([Supporting Information Figure S11](#app1-cancers-11-01175){ref-type=\"app\"}), yielding maximum release at the 3 h time point, also suggesting that 3 h is the best possible incubation time for the intracellular imaging. ", "A separate cellular internalization study was performed in HeLa (cervical cancer) cells, showing a brighter intracellular SWCNT emission ([Supporting Information Figure S12](#app1-cancers-11-01175){ref-type=\"app\"}) and indicating a substantial uptake capability of SWCNT/siRNA hybrids by several cancer cell lines.", "\n\nThe efficacy of the delivered and imaged therapeutics was assessed separately for each drug and gene. ", "The biocompatibility of SWCNTs in DSPE-PEG5000 coating used in these efficacy studies was verified both in HepG2 ([Figure 6](#cancers-11-01175-f006){ref-type=\"fig\"}) and HeLa ([Supporting Information Figure S13](#app1-cancers-11-01175){ref-type=\"app\"}) cells, indicating that at imaging and treatment concentrations SWCNTs do not exhibit substantial toxicity to several cell lines. ", "Due to the complexity of testing antifibrotic properties of PX-866 in vitro, its efficacy was assessed through the toxic response to HepG2 cancer cells. ", "A comparative MTT cytotoxicity assay was used to assess the toxic effect of PX-866 alone or delivered by the SWCNTs ([Figure 6](#cancers-11-01175-f006){ref-type=\"fig\"}). ", "When formulated with SWCNTs, PX-866 showed more significant cytotoxic ([Figure 6](#cancers-11-01175-f006){ref-type=\"fig\"}) effect, increased by the factor of \\~2.8 at 2.5 µg/mL likely due to improved transport with the nanomaterial delivery vehicle, generally known to enhance the efficacy of delivered therapeutics \\[[@B67-cancers-11-01175],[@B68-cancers-11-01175],[@B69-cancers-11-01175]\\]. ", "The antifibrotic effect of the drug leads to apparent toxicity that is best analyzed in the cancer cells. ", "The toxicity added by SWCNTs alone cannot be responsible for that increase, as those at 2.5 µg/mL equivalent to 2.5 µg/mL PX-866 concentrations showed only a small toxic response, with cell viability above 80%. ", "For the cytotoxicity testing, the SWCNT/PX-866 conjugation was accomplished using the concentration ratio of 1:1 for SWCNT and PX-866. ", "This yielded a stable SWCNT dispersion via non-covalent complexation with the drug.", "\n\nThe efficacy of SWCNT/siCCR5 formulation was evaluated by assessing the CCR5 siRNA-mediated knockdown in HepG2 cells after 48 h transfection via flow cytometry, as CCR5 is known to be expressed in HepG2 cells \\[[@B70-cancers-11-01175]\\]. ", "SWCNTs-formulated siRNA transfection showed much lower expression of chemokine receptor type 5 (CCR5) as compared to the natural expression exhibited in the control sample ([Figure 7](#cancers-11-01175-f007){ref-type=\"fig\"}), indicating substantial (over 90%) knockdown above or comparable to that regularly achieved by lyposomally delivered siRNA \\[[@B18-cancers-11-01175],[@B71-cancers-11-01175],[@B72-cancers-11-01175]\\].", "\n\nIt is evident that SWCNTs also facilitated siRNA transfection, as it does not transfect mammalian cells on its own \\[[@B73-cancers-11-01175],[@B74-cancers-11-01175],[@B75-cancers-11-01175]\\]. ", "IgG (immunoglobulin G) antibody was used as isotype control, to help differentiate the non-specific background signal from specific antibody signal. ", "Overall, this study verifies the efficacy of SWCNT/siCCR5 formulation and suggests SWCNTs as a promising gene-silencing carrier for NASH therapeutics.", "\n\nIt is also noteworthy that SWCNTs have the ability to protect the probe (siRNA) from degradation in blood circulation, because: (1) they offer only a small window for nucleases/proteins to degrade siRNA bound to the SWCNT surface; and (2) conjugation of SWCNT/siRNA may form an unusual RNA structure which helps to disguise the siRNA from enzyme binding sites \\[[@B76-cancers-11-01175]\\]. ", "Additionally, siRNA coating can prevent blood proteins from binding to the SWCNT surface \\[[@B10-cancers-11-01175]\\], reducing the protein corona formation. ", "The delivered therapeutics were analyzed separately in vitro as the effects of PX-866 would interfere with the determination of protein knockdown. ", "However, in vivo they are expected to perform synergistically against NASH-induced inflammation and fibrosis. ", "The present work shows the potential of chirality-sorted SWCNTs for delivery, separate NIR fluorescence imaging, and increase in the efficacy of combination drug/gene therapy aimed to address inflammation and fibrosis in NASH, which is necessary for the further application of SWCNT-mediated combination therapy for NASH in vivo. ", "Further NASH animal model studies will lead to the direct assessment of the antifibrotic potential of the SWCNT-delivered PX-866 via PCR analysis of TGF-B1, B2 expression, together with the assessment of the synergistic effects of the nanotherapeutics developed here.", "\n\n3. ", "Experimental Methods and Procedures {#sec3-cancers-11-01175}\n======================================\n\n3.1. ", "Sample Preparation {#sec3dot1-cancers-11-01175}\n-----------------------\n\nThe suspensions of SWCNTs (CoMoCAT, (7,6) chirality, ≥77% carbon as SWCNT) were prepared by dispersing 1.5 mg of SWCNTs in 1 mg/mL sodium deoxycholate (DOC) aqueous solution. ", "The samples were further processed via direct probe ultrasonic treatment (QSonica, Q55) for 60 min at 33 W in an ice bath. ", "The suspension was further centrifuged (Southwest Science, D3024) for 180 min at 21,380× *g* followed by the removal of SWCNT aggregates into the decant and collecting the supernatant only. ", "The collected SWCNTs were used for the chirality sorting. ", "In order to create two phases, 0.25 g/mL aqueous solution of PEG (MW---6 kDa) and 0.25 g/mL aqueous solution of dextran (MW---75 kDa) were used to produce the stock solution. ", "After that, a ratio of 0.4:0.28:0.28:0.04 (SWCNTs:PEG:dextran:water) was maintained to prepare the final sample for the separation. ", "Sodium dodecyl sulfate (SDS) was added to this final suspension with a variation in concentration from 1 to 7 mg/mL. The targeted (7,5) and (7,6) chiral tubes were separated in the top phase at 3 and 4 mg/mL SDS concentration.", "\n\nIn order to remove sorting surfactants, we performed repeated centrifugal filtration (Amicon Ultra 0.5 mL; 100,000 MWCO filter) using methanol (to condense the samples first) for five times followed by 15 times filtration with ethanol to wash the remainders of the surfactants from the separated SWCNTs. ", "As surfactants were washed through the filter pores, SWCNTs remained on the filter. ", "Washed samples were collected and further processed for thermal annealing at 200 °C for one hour in the mechanical convection oven (precision-18EM laboratory oven). ", "Processed (7,5), (7,6) chiral SWCNTs were then collected and dispersed with PX-866 and CCR5 siRNA (Biolegend, San Diego, CA, USA, Cat\\#359105) in aqueous suspension, respectively. ", "To assure non-covalent complexation, 0.3 mg/mL of SWCNTs and 0.5 µg/mL of siRNA in nuclease-free water or 0.3 mg/mL of PX-866 in DI water were mixed and subjected to ultrasonic treatment using a Covaris S2 (SN001263) ultrasonic disperser at 70 W for 2 min, which allowed avoidance of contact with the non-sterile probe. ", "Both siRNA and PX-866 were used at concentrations substantially below saturation \\[[@B10-cancers-11-01175]\\] for SWCNT binding, ensuring maximum loading assumed for PX-866/SWCNT cell viability assays. ", "SWCNTs dispersion with active agents was finally followed by the addition of 1600 µM of DSPE-PEG 5000 (NanoCS, Boston, MA, USA) attached to SWCNTs via additional ultrasonic agitation with Covaris at 50 W for 6 min. ", "SWCNT concentration in the samples was matched via absorption measurements with an extinction coefficient of 31.25 mL mg^−1^cm^−1^ at 632 nm \\[[@B10-cancers-11-01175]\\].", "\n\nTransmission electron microscopy (TEM JEOL JEM-2100) was utilized to observe the morphology of final SWNT formulations. ", "The sample for TEM measurement was prepared on a carbon-coated 200-mesh copper grid under ambient conditions.", "\n\n3.2. ", "Optical Characterization {#sec3dot2-cancers-11-01175}\n-----------------------------\n\nFluorescence and absorbance spectra were measured using an NS2 NanoSpectralyzer (Applied NanoFluorescence, Houston, TX, USA). ", "To measure the photoluminescence of SWCNTs, a 637-nm diode laser excitation was used. ", "The collected fluorescence spectra were simulated using fully integrated Nanospectralyzer GlobalFit software. ", "The software allows for the simulation of experimental SWCNT spectra with individual chirality SWCNT emission peaks for spectra with four excitations, models excitation--emission maps based on those, and extracts relative emissive SWCNT chirality abundances in the sample.", "\n\nSWCNTs concentration was calculated using the absorbance spectrum similarly to \\[[@B77-cancers-11-01175],[@B78-cancers-11-01175]\\]:\n\nSWCNTs Concentration (mg/mL) = Absorbance at 632 nm/31.25 mL mg\n\n−1\n\ncm\n\n−1\n\n(Experimental extinction co-efficient).", "\n\n3.3. ", "Fluorescence Microscopy Measurements {#sec3dot3-cancers-11-01175}\n-----------------------------------------\n\nFluorescence microscopy was performed using an Olympus IX73 fluorescence microscope with 60× (IR-corrected Olympus Plan Apo, Japan) water immersion objective coupled to two detectors: spectrally filtered by 10 filters throughout the visible Hamamatsu Image EMCCD camera, and InGaAs Xenics (Xeva-7870, XEN-000110) coupled to a hyperspectral fluorescence imager (Photon etc., ", "Montreal, QC, Canada) This allowed for spectrally-resolved imaging both in the visible and near-infrared.", "\n\n3.4. ", "Imaging in the Visible Region {#sec3dot4-cancers-11-01175}\n----------------------------------\n\nWe imaged the green (535 nm) emission of PX-866 in vitro with lamp excitation and (375 ± 25 nm) excitation and (535 ± 20 nm) emission filters by first determining the integration and lamp intensity settings that resulted in zero autofluorescence emission from non-treatment control cells and using the corresponding settings for PX-866 fluorescence imaging.", "\n\n3.5. ", "Imaging in the NIR Region {#sec3dot5-cancers-11-01175}\n------------------------------\n\nSWCNTs fluorescence in hepatocellular carcinoma (HepG2) and HeLa cells was imaged with an InGaAs camera (Xenics Xeva, Belgium) and an NIR hyperspectral imager (Photon etc. ", "IMA-IR^TM^) with 637 nm (130 mW output power) diode laser excitation. ", "This infrared hyperspectral imager captures full spatial information simultaneously utilizing a Bragg grating imaging filter \\[[@B79-cancers-11-01175]\\] which collects spectral information successively providing spectrally resolved imaging. ", "Individual SWCNT fluorescence could be resolved for all emissive chiralities using band-pass filtering mode (950--1450 nm), but only particular SWCNT chiralities can be imaged by selecting a specific spectral region. ", "For (7,5) and (7,6) SWCNT chiralities dispersed with PX-866 and CCR5 siRNA, 1030 and 1130 nm filter positions were found optimal. ", "In-vitro control images without SWCNTs were also captured, ensuring no emission in the NIR region.", "\n\n3.6. ", "Cell Culture {#sec3dot6-cancers-11-01175}\n-----------------\n\nIn this work, we used liver hepatocellular carcinoma (HepG2) and HeLa cell lines maintained in a Thermo-Scientific Midi 40 CO~2~ Incubator at 37.1 °C with 5% carbon dioxide and 95% air. ", "In order to prepare the glass coverslips for microscopy imaging, they were placed at the bottom of 6-well plates followed by adding cells in the media. ", "SWCNT-carried formulations were added at a concentration of 2 µg/mL in each well after 4 hours of cell attachment to the coverslips. ", "Cells were further washed with 0.5 mL of PBS (phosphate-buffered saline) to remove extracellular SWCNTs, followed by fixing them with 4% paraformaldehyde at room temperature for 30 min. ", "After that, the cell samples were rewashed with 0.5 mL of PBS for the microscopy imaging. ", "Transfection points of 0.5, 1, 3 h were used for imaging, with 2 µg/mL SWCNTs added to each well.", "\n\n3.7. ", "MTT Assays {#sec3dot7-cancers-11-01175}\n---------------\n\nIn order to assess the cytotoxicity for SWCNT, PX866, and their complex, HepG2 (human hepatocellular carcinoma) and HeLa cells were plated in a 96-well plate at a density of 5000 cells per well (100 μL/well) and kept in an incubator overnight at 37.1 °C while maintaining the CO~2~/air ratio of 1:19. ", "After 24 h of incubation, the samples (PX-866, SWCNTs, or SWCNT/PX-866 formulations) were added into each well at concentrations ranging from 0.125 to 2.5 µg/mL. After 24 h of incubation, the medium was replaced by 100 μL of 1 mg/mL thiazolyl blue tetrazolium bromide. ", "The cells were incubated further for 4 h followed by the replacement of MTT (3-(4--dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide) with 100 μL of DMSO (dimethyl sulfoxide) in order to solubilize the precipitation. ", "Reduction in MTT influences the metabolic activity of living cells, which can be assessed with absorbance measurements since living cells metabolize the MTT and form a highly absorbing purple colored byproduct known as formazan \\[[@B80-cancers-11-01175]\\]. ", "We measured the absorbance (essentially the cell viability) of the final sample at 540 nm wavelength using the FLUOstar Omega microplate reader.", "\n\n3.8. ", "siRNA Transfection {#sec3dot8-cancers-11-01175}\n-----------------------\n\nThe day before transfection, HepG2 cells were seeded onto 24-well plates in DMEM medium with 10% FBS to give \\~30% confluence at the time of transfection. ", "Before the transfection, the culture medium was replaced with fresh DMEM medium supplemented with 15% FBS and the SWCNTs complexed with CCR5 siRNA and DSPE-PEG 5000 as described above were then added to the medium, after which the cells were cultured for 48 h. For transfection efficiency examination, flow cytometry assay was performed at 48 h post-treatment.", "\n\n3.9. ", "Flow Cytometry {#sec3dot9-cancers-11-01175}\n-------------------\n\nFor the flow cytometry of the transfection efficiency experiment, HepG2 cells were washed twice with PBS and harvested by trypsin/EDTA. ", "Following trypsinization, the cells were washed by centrifugation and resuspended in staining buffer (1 × PBS, 2% FBS, 0.5% EDTA, and 0.1% NaN~3~). ", "The cell suspension was stained with PE (phycoerythrin)-conjugated human anti-CCR5 antibody (Biolegend, Cat\\#359105) for 30 min on ice. ", "To test the unspecific antibody binding, IgG (BioLegend, Cat\\#359105) was used as the isotype control. ", "Flow cytometry was performed using an Accuri C6 plus flow cytometer (BD Biosciences, San Jose, CA, USA), and the data were analyzed using FlowJo software ([www.flowjo.com/solutions/flowjo](www.flowjo.com/solutions/flowjo)).", "\n\n3.10. ", "Image Analysis {#sec3dot10-cancers-11-01175}\n--------------------\n\nWe utilized ImageJ software to analyze all the images, including the subtraction of the backgrounds and overlays of the bright-field cell images with emission from PX-866 and two sorted SWCNT chiralities (i.e., (7,5), (7,6)) at 1030 and 1130 nm, respectively.", "\n\n4. ", "Conclusions {#sec4-cancers-11-01175}\n==============\n\nIn this work, we developed and tested a single-walled carbon nanotube-based drug/gene combination therapeutic platform that allows for the image-tracking of each therapeutic agent. ", "Chirality-sorted SWCNTs emitting at different wavelengths in the NIR were used to selectively track and deliver two therapeutic payloads in vitro: CCR5 siRNA and the small-molecule drug PX-866, targeting inflammation and fibrosis factors that mediate the translation of nonalcoholic steatohepatitis into hepatocellular carcinoma. ", "For that purpose, (7,5) and (7,6) chiral SWCNTs separated from raw CoMoCAT starting material via aqueous two-phase extraction with over \\~40% fluorescence-derived purities and cleared from toxic sorting surfactants were individualized by the dispersion and non-covalent complexation with the corresponding drug or gene. ", "Hyperspectral NIR and spectrally-resolved visible fluorescence imaging allowed simultaneous monitoring at 1030 nm emission of (7,5) SWCNTs carrying PX-866 and at 1130 nm emission of (7,6) SWCNTs complexed with CCR5 siRNA internalized in HepG2 cells, as well as the visible 528 nm emission from PX-866 as it was released from the SWCNTs inside the cells. ", "This work demonstrates: (1) the successful delivery of drug/gene therapy with sorted chiral SWCNTs; (2) the potential for locating each therapeutic agent separately through characteristic SWCNT fluorescence; and (3) the improved efficacy of both therapeutics when delivered with SWCNTs with substantially increased effect of SWCNT/PX866 over PX866 alone and high (over 90%) apparent knockdown of CCR5 siRNA when carried by SWCNTs, suggesting a promising potential of these formulations for combination NASH therapy. ", "The emission of individual chiral SWCNTs in the near-infrared with low autofluorescence and high penetration depth could be utilized for multi-gene/drug delivery and imaging in animal models, whereas the high non-targeted liver accumulation of SWCNTs makes them advantageous candidates for liver conditions such as NASH.", "\n\nWe would like to thank Jason Strait at Airforce Research Laboratory, Wright-Patterson AFB, OH for his suggestions regarding the nanotubes separation using ATPE method and Bong Lee for the preparation of slides for imaging with HeLa cell lines.", "\n\n###### \n\nClick here for additional data file.", "\n\nThe following are available online at <https://www.mdpi.com/2072-6694/11/8/1175/s1>. ", "Figure S1: Fluorescence and corresponding absorbance spectra of Parent SWCNT sample: raw SWCNTs dispersed with DOC/PEG/Dextran that are used as a starting material for ATPE sorting, bottom phases of ATP system with 3 mg/mL and 4 mg/mL SDS added to sort top phases containing (7,5) and (7,6) chirality-sorted SWCNTs at 3 mg/mL and 4 mg/mL SDS, respectively, Figure S2: Fluorescence and corresponding absorbance spectra of SWCNT collected from top phases containing (7,5) and (7,6) chirality-sorted SWCNTs at 3 mg/mL and 4 mg/mL SDS, respectively, Figure S3: Table describing the peak positions and peak shifts for the following samples: Sample-1: SWCNTs + sorting surfactants; Sample-2: SWCNTs + siRNA; Sample-3: Washed/annealed SWCNTs + siRNA. ", "The oval shaped marker denotes the full restoration of the peak positions after the centrifugal washing/annealing and siRNA dispersion to those of raw SWCNTs dispersed with sRNA, whereas rectangle marker depicts partial but significant peak position recovery after washing/thermal annealing, Figure S4: Fluorescence spectra of untreated (no thermal annealing) SWCNTs/EGFR siRNA formulations, and thermally annealed SWCNTs dispersed with EGFR siRNA, Figure S5: Comparison between the fluorescence spectra of washed/annealed SWCNTs + siRNA before and after the centrifugation, Figure S6: Absorbance spectra of (7,5) SWCNT/PX-866, and (7,6) SWCNT/CCR5 siRNA, Figure S7: Fluorescence spectra of only PX-866 and PX-866+SWCNT showing the quenching of PX-866 fluorescence after the loading of PX-866 on the SWCNTs, Figure S8: TEM images of the mixture of (7,5) SWCNTs/DSPE-PEG/siCCR5 and (7,6) SWCNTs/DSPE-PEG/PX-866 showing SWCNTs coating (DSPE-PEG-5000, and gene or drug), Figure S9: Fluorescence images of non-treatment control (without SWCNTs), Parent CoMoCat SWCNTs in aqueous dispersion with ATPE surfactants containing SWCNTs of various chiralities imaged at 1030 nm corresponding to (7,5) SWCNT emission, 1130 nm corresponding to (7,6) SWCNT emission, and Fluorescence overlay image of both (7,5) and (7,6) SWCNTs in the sample, Figure S10: Brightfield/fluorescence overlay images of cellular (HepG2 cells) uptake of (7,5) SWCNTs/PX-866 imaged at 1030 nm, (7,6) SWCNTs/siRNA imaged at 1130 nm, and px-866 released from SWCNTs imaged at 535 nm, Figure S11: Brightfield/fluorescence overlay images of cellular (HepG2 cells) uptake and release of px-866 from SWCNTs with 1, 3, 4.5, 12 h incubation time imaged at 535 nm, Figure S12: Brightfield/ NIR fluorescence overlay images of cellular (HeLa cells) uptake of SWCNTs/siRNA imaged with 637 nm laser excitation, Figure S13: MTT assay cell viability of HeLa cells treated with SWCNT/siRNA.", "\n\nM.T.H. sorted the SWCNT samples using the ATPE method, prepared the samples for the study, performed optical characterization/TEM characterization/cellular imaging, and wrote the draft of the manuscript; E.C. and V.L. assessed the cytotoxicity; O.S. performed the flow cytometry experiment; G.A. prepared the slides for the cellular imaging and supervised the cytotoxicity study; L.K. and A.V.N. edited the manuscript and directed the research project; All authors reviewed the manuscript.", "\n\nThis work is supported by the TCU Invests in Scholarship grant funding.", "\n\nThe authors declare no conflicts of interest.", "\n\n![", "Measured and simulated fluorescence spectra of separated (**a**) (7,5), (**b**) (7,6) chiral single-walled carbon nanotubes (SWCNTs). ", "The corresponding generated photoluminescence--excitation contour plot of (**c**) (7,5), (**d**) (7,6) sorted fractions. ", "Graphene sheet representing the distribution of the emissive species in the respective (**e**) (7,5) and (**f**) (7,6) enriched sorted SWCNT samples. ", "The blue-filled portion of hexagons represent the relative abundance of the species.](cancers-11-01175-g001){#cancers-11-01175-f001}\n\n![", "Near-infrared (NIR) hyperspectral images of (7,5) sorted SWCNTs at (**a**) 990, (**b**) 1030, and (**c**) 1130 nm; and (7,6) sorted SWCNTs at (**d**) 990, (**e**) 1030, and (**f**) 1130 nm. ", "SWCNT fluorescence is only observed at the emission wavelengths of the corresponding sorted SWCNTs.](cancers-11-01175-g002){#cancers-11-01175-f002}\n\n![(**", "a**) Fluorescence spectra of raw SWCNTs dispersed with sorting surfactants, raw SWCNTs dispersed with siRNA, and SWCNTs washed/annealed for surfactant removal and re-dispersed with siRNA showing similar peak positions for raw SWCNTs dispersed with siRNA and washed/annealed SWCNTs dispersed with siRNA. (**", "b**) Cell viability of HepG2 cells subject to SWCNTs dispersed with sorting surfactants, raw SWCNTs dispersed with siRNA, and SWCNTs washed/annealed for surfactant removal and re-dispersed with siRNA.](cancers-11-01175-g003){#cancers-11-01175-f003}\n\n![", "Emission spectra of raw CoMoCAT SWCNTs dispersed with (**a**) PX-866, (**b**) siRNA. ", "Emission spectra of (**c**) (7,5) and (7,6) sorted washed/annealed SWCNTs dispersed with PX-866 and CCR5 siRNA, respectively. (**", "d**) Visible emission spectrum of PX-866 with 400 nm excitation.](cancers-11-01175-g004){#cancers-11-01175-f004}\n\n![", "Brightfield/fluorescence overlay images of (**a**) untreated control HepG2 cells and (**b**,**c**) cellular uptake of (7,5) sorted SWCNTs imaged at 1030 nm (red), (7,6) sorted SWCNTs imaged at 1130 nm (blue), and PX-866 imaged at 535 nm (green) after the intracellular release.](cancers-11-01175-g005){#cancers-11-01175-f005}\n\n![", "MTT assay cell viability of HepG2 cells treated with either SWCNTs, PX-866, or SWCNT/PX866 conjugates.](cancers-11-01175-g006){#cancers-11-01175-f006}\n\n![", "Downregulation of CCR5 in HepG2 cells by siRNA/nanotubes complex. ", "CCR5 expression was detected by flow cytometry after nanotubes-delivered siRNA-mediated knockdown for 48 h. IgG staining was used for isotype control (**left**). ", "Control indicated natural expression of CCR5 in HepG2 cells without any treatment (**middle**) compared to CCR5-targeting siRNA/nanotubes treatment (**right**).](cancers-11-01175-g007){#cancers-11-01175-f007}\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0009391896310262382, 0.0006732578622177243, 0.0007705960306338966, 0.0006104590720497072, 0.0008117007673718035, 0.000639878329820931, 0.000970371242146939, 0.0008898141095414758, 0.0005366893019527197, 0.0005627654027193785, 0.0006904967012815177, 0.0005966041935607791, 0.0010635781800374389, 0.0006291968165896833, 0.0020262866746634245, 0.0008842182578518987, 0.0010252792853862047, 0.0008614976541139185, 0.0006404109881259501, 0.0005883664707653224, 0.0007881674682721496, 0.0006464882171712816, 0.0006491628591902554, 0.0006408952176570892, 0.0009823247091844678, 0.00239750137552619, 0.000893561402335763, 0.0017644530162215233, 0.0006441440200433135, 0.0006508754449896514, 0.0007299362332560122, 0.000646159634925425, 0.0011019842932000756, 0.0009327337611466646, 0.000584144436288625, 0.0006356348167173564, 0.0006575947045348585, 0.0005728995311073959, 0.0006083478219807148, 0.0007358806324191391, 0.0005616716807708144, 0.000651919690426439, 0.0006389030604623258, 0.0006038077408447862, 0.0005945683806203306, 0.0006774120265617967, 0.0006178347975946963, 0.0011855863267555833, 0.0007538045174442232, 0.0006581474444828928, 0.000668681284878403, 0.0006020126165822148, 0.0006043783505447209, 0.0005871139001101255, 0.0005774832097813487, 0.0006421081488952041, 0.0006237989873625338, 0.000583085638936609, 0.0006671024020761251, 0.0007364355260506272, 0.0007106256671249866, 0.0006138657918199897, 0.0006879963329993188, 0.0007681890274398029, 0.000616861623711884, 0.0006093877600505948, 0.0007030116976238787, 0.000716532114893198, 0.0005970041383989155, 0.0005988231860101223, 0.0006857494590803981, 0.0006102510960772634, 0.0006170580163598061, 0.0005828447174280882, 0.0007409121608361602, 0.000725914491340518, 0.0008075124933384359, 0.0005742659559473395, 0.0005819171783514321, 0.0008588621858507395, 0.0006010187789797783, 0.0006163368816487491, 0.0007459386833943427, 0.0005757580511271954, 0.0007036334136500955, 0.0005752925644628704, 0.0006565592484548688, 0.0007745675393380225, 0.0006363097345456481, 0.0006057138671167195, 0.0006709874724037945, 0.0006188272382132709, 0.0008323205402120948, 0.0005534450174309313, 0.0005369664286263287, 0.0006681070663034916, 0.0008489963947795331, 0.0005918008973821998, 0.0006046557682566345, 0.0006634807214140892, 0.0007191748009063303, 0.0007402343326248229, 0.0006640383508056402, 0.0006952612893655896, 0.0006021469016559422, 0.0007418684544973075, 0.0005858590011484921, 0.0006378814578056335, 0.0005899485549889505, 0.0005887591396458447, 0.0005935328081250191, 0.0006145027000457048, 0.0005758106708526611, 0.0005848686560057104, 0.0005552113289013505, 0.0005739726475439966, 0.0005277444142848253, 0.0005913156783208251, 0.0009137021843343973, 0.0006030011572875082, 0.0009545957436785102, 0.0008213036926463246, 0.0008712793351151049, 0.0006535860011354089, 0.0009647346450947225, 0.0006754069472663105, 0.0006822284776717424, 0.0008098114631138742, 0.0006439018761739135, 0.0005946365999989212, 0.0008508222526870668, 0.0010429740650579333, 0.0006039835861884058, 0.0015461427392438054, 0.0006080513121560216, 0.0005668295198120177, 0.00117425003554672, 0.0009450665093027055, 0.0006754111382178962, 0.00058522610925138, 0.0008729662513360381, 0.0006537538720294833, 0.0006944169872440398, 0.0005871022003702819, 0.0005907810991629958, 0.0008443007827736437, 0.002127039013430476, 0.0005738380714319646, 0.000626188819296658, 0.0007887922110967338, 0.0006105050561018288, 0.0006419433047994971, 0.0005905837751924992, 0.000658326200209558, 0.0005503977881744504, 0.0013830541865900159, 0.0006259552319534123, 0.0007682841969653964, 0.0006492346292361617, 0.0006046387716196477, 0.0006121909827925265, 0.0013750585494562984, 0.0007809422095306218, 0.0005430812598206103, 0.0013624537969008088, 0.0006420530844479799, 0.0012834978988394141, 0.0006731068133376539, 0.0007171270553953946, 0.000704264675732702, 0.0006432977388612926, 0.0007199184037744999, 0.000647504988592118, 0.001249555847607553, 0.0006369350012391806, 0.0005527873290702701, 0.0006624407251365483, 0.0008412700262852013, 0.0005755429738201201, 0.000996797694824636, 0.0013068359112367034, 0.0006682401872240007, 0.0007060017669573426, 0.0009536484139971435, 0.0006757790688425303, 0.0005594647955149412, 0.0013727563200518489, 0.000712973705958575, 0.0005996872787363827, 0.0012998005840927362, 0.0006631045835092664, 0.0008180220611393452, 0.0009610056295059621, 0.0006179093034006655, 0.0006039180443622172, 0.0012011976214125752, 0.0006338465609587729, 0.0012900290312245488, 0.0005836074124090374, 0.0008740207413211465, 0.0007771101081743836, 0.0006699915393255651, 0.0005844362895004451, 0.0006479553994722664, 0.000528728065546602, 0.0007241981220431626, 0.0006105256616137922, 0.0006671113660559058, 0.0009036198607645929, 0.00062818534206599, 0.0006321016699075699, 0.0006135838921181858, 0.0019055787706747651, 0.0006624507950618863, 0.0007194305071607232, 0.004585994407534599, 0.0007608315791003406, 0.004186189733445644, 0.0007873548893257976, 0.0012715152697637677, 0.0010688483016565442, 0.004155853297561407, 0.0011294821742922068, 0.0006809243932366371, 0.0008640873711556196, 0.00080921093467623, 0.0007704826421104372, 0.0006308906595222652, 0.000642002618405968 ]
0.000807
229
[ "Q:\n\nNavigation on Raspberry Pi via Kivy\n\nI am working on a car project using Raspberry Pi with Raspbian Jessie and Kivy installed. ", "I also have the gps module by adafruit and finally made it to work. ", "I want to install a navigation system (like this one http://raspberrypi.link-tech.de/doku.php?id=navitnavigation ) but I want to run tha navit program via a kivy app. ", "\nBasically my goal is to have a kivy app that contains buttons and when I press the button \"navit\" then the navigation app pops up. ", "Is that possible? ", "\nAlso, is there a way to make the Raspberry boot directly into an app (python)? ", "\nThanks in advance! (", "Sorry if my English bad. ", "Not my native language)\n\nA:\n\nHere you can find a good explanation on how to add your kivy application to the autostart items of the Raspberry Pi standard desktop. ", "If you want the autostart for every user you can do as described:\nsudo nano /etc/xdg/lxsession/LXDE-pi/autostart\n\nand add (assuming you are using Python 2)\n@/usr/bin/python /path/to/your/kivy/main.py\n\nFor the navigation app popup:\nBind a python handler method to the navit-button and use the subproces.call method to start the existing navit application.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0008210051455534995, 0.0006012279191054404, 0.0014120645355433226, 0.0009501043241471052, 0.0007433241698890924, 0.0008105050656013191, 0.0006000263383612037, 0.0009839343838393688, 0.0007381780305877328, 0.0007989053847268224, 0.0019954426679760218 ]
0.00095
11
[ "Fairest Princess of All Twin Bed\n\n$3,900.00\n\n$3,900.00\n\nShips in up to 4 Weeks*\n\nA PoshTots exclusive!", "\n\nIndulge her colorful imagination and create the princess room of her dreams. ", "Day and night she'll be transported to a land far, far away where all is beautiful. ", "After all, she'll only be young for a short time.", "\n\nThis princess bed, with personalized crest, is brought to life by our extremely talented artist and craftsman Jason Hulfish. ", "Each piece is hand-crafted from composite board (MDF) and then uniquely hand-painted with a satin lacquer finish. ", "Must be seen to be believed. ", "Absolutely stunning." ]
{ "pile_set_name": "Pile-CC" }
[ 0.007783178705722094, 0.0008075959631241858, 0.001524060615338385, 0.0010572860483080149, 0.0006657994235865772, 0.0006458326824940741, 0.0006326510338112712, 0.0008679163875058293 ]
0.001748
8
[ "The concept of eating a “plant-based” diet is tossed around frequently, but it’s a label that can be confusing. ", "Some people shy away from the notion because they assume that plant-based is code for vegan. ", "On the other hand, it’s easy to think that eating all plants and no animals guarantees that your diet is healthful and nutritious. ", "But does it?", "\n\nThese days in addition to doing a lot of sports physicals for students wishing to join a team at school, I am doing wellness checkups and immunizations. ", "Vaccines are more than just a requirement in the state of Washington for attending school, they are a health and safety essential.", "\n\nPresident Donald Trump’s declaration Thursday that opioid overdose deaths are a public health emergency was low on specifics, but Washington’s top public health official said the order could bring needed resources to the state.", "\n\nLed by researchers at Virginia Mason’s Benaroya Research Institute, the Seattle team is the first to find a way to distinguish the “bad” immune-system cells that trigger allergies from “good” immune cells that fight infection. ", "They also showed that effective allergy therapy banishes the bad cells from the body.", "\n\nHearing aids that can cost more than $2,000 apiece are only slightly more effective than some over-the-counter sound-amplification devices that sell for just a few hundred dollars, according to a recent study.", "\n\nKetamine (Ketalar) is a fascinating drug that has been used since 1962 as a general anesthetic. ", "Over the past several years, researchers have discovered that this medication has profound antidepressant activity that kicks in within hours instead of the usual weeks of standard drugs.", "\n\nA recent article in the BMJ shows that the chemicals and scents put into a lot of our products might actually be causing increases in allergies, asthma and possibly autoimmune disease. ", "The remarkable increase we’ve seen in these problems in the past few years might be caused by – guess who? – ", "ourselves!", "\n\nWarm weather for hiking and camping, light late into the evening that allows for more time outdoors after work for exercising or entertainment, and a region that produces a buffet of some of the finest produce in the world.", "\n\nWhen it comes to weight loss, the past several years of research show that low-carb diets may have a slight short-term edge on average over low-fat diets, but that neither can claim true superiority, especially given that about 95 percent of dieters end up regaining." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007069426937960088, 0.0011210558004677296, 0.0025639724917709827, 0.0008756262250244617, 0.0008304644143208861, 0.0006179143092595041, 0.0008431337773799896, 0.0007292687660083175, 0.0018348876619711518, 0.0012188937980681658, 0.0009649884304963052, 0.0006634127348661423, 0.000683323887642473, 0.0007025499362498522, 0.0039289467968046665, 0.0005575584946200252, 0.0007706033647991717 ]
0.001154
17
[ "The Age of Anxiety\n\nThe Age of Anxiety: A Baroque Eclogue (1947; first UK edition, 1948) is a long poem in six parts by W. H. Auden, written mostly in a modern version of Anglo-Saxon alliterative verse.", "\n\nThe poem deals, in eclogue form, with man's quest to find substance and identity in a shifting and increasingly industrialized world. ", "Set in a wartime bar in New York City, Auden uses four characters – Quant, Malin, Rosetta, and Emble – to explore and develop his themes.", "\n\nThe poem won the Pulitzer Prize for Poetry in 1948. ", "It inspired a symphony by composer Leonard Bernstein, The Age of Anxiety (Symphony No. ", "2 for Piano and Orchestra), which in turn was used for both a 1950 ballet by Jerome Robbins and a 2014 ballet by Liam Scarlett.", "\n\nA critical edition of the poem, edited by Alan Jacobs, was published by Princeton University Press in 2011.", "\n\n\"The Age of Anxiety\" is also the title of the first chapter of The Wisdom of Insecurity by Alan Watts (1951).", "\n\nIn 2019, musician Pete Townshend's first novel was published. ", "Its title is The Age of Anxiety.", "\n\nReferences\n\nExternal links\n The W. H. Auden Society\n The Guardian's Book Review, 10 Apr 2010\n\nCategory:1947 books\nCategory:Books by W. H. Auden\nCategory:Poetry by W. H. Auden\nCategory:Pulitzer Prize for Poetry-winning works\nCategory:Random House books" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0007305231993086636, 0.0008764688391238451, 0.0006672223098576069, 0.0006811006460338831, 0.000607060850597918, 0.0005659827729687095, 0.0006006817566230893, 0.0006604301743209362, 0.0006000434514135122, 0.0006905411137267947, 0.0006093400297686458 ]
0.000663
11
[ "Cost-effective Recovery of Electronic and Mechanical Equipment\n\nSince 1992, we have been providing the Canadian Insurance industry with exemplary, straightforward and cost-effective recovery services. ", "Our RELECTRONIC division specializes in electronic restoration. ", "Our REMECH division specializes in mechanical equipment restoration.", "\n\nOur divisions, working individually or in tandem, have established RELECTRONIC-REMECH INC. ", "We assist with residential and commercial losses due to fire, water, lightning, power surges, and industrial dust. ", "Our experienced consultants work closely with the insured to reduce business interruption and losses.", "\n\nOUR HISTORY\n\nAs we continue to grow, so does our commitment to superior customer service.", "\n\nHumble Beginnings\n\nJay Sutherland began as a one-man company; servicing the Kitchener-Waterloo area, which cleaned and repaired electronics for contractors in 1988.", "\n\nGrowing Team\n\nAs our reputation for dependability and accurate evaluation grew, so did our company. ", "We hired a small staff and opened our Waterloo office to meet the needs of the industry.", "\n\nMaking the Move\n\nIn the late 90’s we made the move to our Head Office in Waterloo. ", "This move afforded us the room to include Restaurant Restoration to our Services. ", "As our company grew it became apparent that a larger location would once again be needed, this time in Mississauga and we proudly announced the opening in December of 2008.", "\n\nContinuing to Grow\n\nAs we continue to expand and grow our services, a custom software system will support our ability to provide prompt and detailed reports.", "\n\nOur President Jay Sutherland began in 1988 by servicing the local contractors in the Kitchener- Waterloo area with the repairs and cleaning of electronic equipment and in 1992, Jay established the RELECTRONIC-REMECH INC. ", "brand in Ontario. ", "As the company reputation for dependability and accurate evaluations grew, the team soon consisted of two additional employees – Greg Gummerson as a Technical Consultant and Sue Hoffman as Office Manager and both individuals are still with the organization. ", "Soon Jay and Greg were scoping large losses for insurers via independent adjusters and managing residential losses for contractors. ", "In 1999 Jay expanded the company services by including large commercial grade restaurant equipment for commercial insurers.", "\n\nIn 2002, RELECTRONIC-REMECH INC. ", "established an office in Mississauga to service the GTA and surrounding areas, north to Barrie and east to Oshawa. ", "Paul Norris-Lue joined our organization at this time as a Technical Consultant and worked from our Mississauga office for several years. ", "In 2008, we moved to a larger facility in Mississauga to accommodate our continued growth. ", "We now have sixteen employees in this office and many have been with the company for over 10 years.", "\n\nIn 2006, Jeff Sutherland joined our company as an expert in restaurant losses and now manages our satellite office in the Barrie – Georgian Bay region. ", "In 2013 Van Chau came to us with a strong background in large scale electronics and Van will focus on losses in the east end of Toronto and out to Kingston and Peterborough areas.", "\n\nRELECTRONIC-REMECH INC. ", "now has 30 employees between our three locations. ", "Our senior consultants have travelled to losses across Canada and in 2013 Paul acted as a Project Manager working with adjusters and contractors of the arena loss in Medicine Hat. ", "He was instrumental in facilitating the opening of the arena, much sooner than anticipated. ", "We now include large mechanical equipment, manufacturing equipment and data recovery on our roster of service.", "\n\nMEET THE TEAM\n\nWe are a team of dedicated professionals, ready to assist you in your loss recovery." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005569211207330227, 0.0006275970372371376, 0.0006068554939702153, 0.0005810910952277482, 0.0005840673693455756, 0.0006267350981943309, 0.0005891493055969477, 0.0005729150725528598, 0.0005692008417099714, 0.0005810075090266764, 0.0005595668917521834, 0.0005681003094650805, 0.0005618949653580785, 0.000530665332917124, 0.0005672313272953033, 0.0006481971358880401, 0.0005861120298504829, 0.0009008581982925534, 0.000596489931922406, 0.0006711789756081998, 0.0008058777893893421, 0.0006170244887471199, 0.0005819959915243089, 0.0005744400550611317, 0.0005721442867070436, 0.0005707251839339733, 0.0007959448848851025, 0.0006159709882922471, 0.0005541003192774951, 0.0005832515307702124, 0.0005759433261118829, 0.000554302881937474 ]
0.000609
32
[ "Isolation of St. Louis encephalitis virus from a killer whale.", "\nWe report the isolation of St. Louis Encephalitis (SLE) virus from a mature male killer whale (Orcinus orca). ", "This represents the first isolation of SLE virus from a marine mammal. ", "The animal presented with reduced appetite, rapidly became lethargic and subsequently died. ", "Virus-induced CPE was observed in a dolphin cell line, SP-1K (ATCC CCL 78), inoculated with brain, kidney, and lung tissues obtained at necropsy. ", "Electron microscopy of infected SP-1K cells revealed the presence of virions having morphology and size resembling members of the Flaviviridae. ", "Final identification as SLE virus was made by neutralization and immunofluorescence staining tests." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0021988824009895325, 0.0009708293946459889, 0.0007974211475811899, 0.010620892979204655, 0.0007350637461058795, 0.0007427990785799921, 0.0007668991456739604 ]
0.002405
7
[ "Hair lead levels to evaluate the subclinical impact of lead on growth in Sardinian children (Italy).", "\nThe aim of this study was to determine if there are significant relationships between lead concentrations in children's hair and height, sitting height, and estimated leg length. ", "We analyzed three samples collected at different times: 1998, 2002, 2007. ", "The total sample consisted of 825 children between 11 and 14 years of age living in different municipalities of Sardinia (Italy). ", "Inductively coupled plasma atomic emission spectrometry (1998), inductively coupled plasma atomic absorption spectrometry (2002), and inductively coupled mass spectrometry (2007) were used to measure the lead concentration in hair (PbH). ", "Some AAS measurements were also performed on the 1998 and 2007 samples to check the reliability of the data. ", "The mean PbH is much higher in 1998 (5.84 μg/g) than in 2002 (1.49 μg/g) and 2007 (0.78 μg/g). ", "Multivariate regression analysis of the three samples, controlling for age and sex, indicates a subclinical impact of lead on growth that differs according to the mean lead concentration in the hair. ", "In fact, for 1998, the relationships between all three anthropometric variables and logPbH are significantly negative. ", "For 2002, there are significant negative associations between height and estimated leg length and logPbH but not between sitting height and logPbH. For 2007, there are not significant associations between logPbH and anthropometric variables. ", "Our results support the use of hair lead levels as a biomarker to assess the impact of subclinical lead on the physical growth of children, especially when the study area presents medium and/or high levels of lead pollution." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006297639920376241, 0.0007236682577058673, 0.0005232951370999217, 0.0006977677694521844, 0.0006945102941244841, 0.0005500739789567888, 0.0007277409895323217, 0.0007566589047200978, 0.0006531127728521824, 0.0006177029572427273, 0.0009216780890710652 ]
0.000681
11
[ "package com.thekhaeng.materialstyletemplate.tab.subtab.elevation\n\nimport android.os.", "Bundle\nimport com.thekhaeng.materialstyletemplate.adapter.base.", "BaseItem\nimport com.thekhaeng.materialstyletemplate.base.", "BaseRecyclerFragment\nimport kotlinx.android.synthetic.main.fragment_recycler_view.fragment_recycler_view as recyclerView\n\n/**\n * Created by「 The Khaeng 」on 10 May 2018 :)\n */\nclass ElevationFragment : BaseRecyclerFragment() {\n\n companion object {\n fun newInstance(): ElevationFragment {\n val fragment = ElevationFragment()\n val args = Bundle()\n fragment.arguments = args\n return fragment\n }\n }\n\n override\n fun setupItem(): List<BaseItem> = ElevationItemCreator.createItem(context)\n\n}" ]
{ "pile_set_name": "Github" }
[ 0.0008141163852997124, 0.0007106053526513278, 0.0008248447556979954, 0.0008497595554217696 ]
0.0008
4
[ "World\n\n2018-05-29 14:08:35\n\nBAGHDAD, May 28 (Xinhua) -- The Iraqi parliament on Monday approved manual recounting of 10 percent of votes in the May 12 parliamentary election amid allegations of fraud, forgery and irregularities.", "\n\nWith the attendance of 165 lawmakers at the emergency session, the parliament passed a draft bill to recount 10 percent of the votes.", "\n\nAnd if one quarter of the 10-percent votes are found with irregularity, the recounting would be carried out for all the votes across the country, said a statement of the parliament.", "\n\nThe decision will also cancel the votes of the polling centers outside Iraq if irregularities were found, as well as the results of the \"conditional voting\" in the refugee camps, according to the statement.", "\n\nThe \"conditional voters\" refer to those who showed any IDs to prove their Iraqi citizenship instead of valid voting cards.", "\n\nIn addition, recounting of the votes at the polling stations in the ethnically-mixed city of Kirkuk will be held, as well as for some polling stations that were already cancelled by the electoral commission in the disputed areas claimed by both Baghdad central government and the semi-autonomous Kurdistan region.", "\n\nOn May 19, the Iraqi Independent High Electoral Commission (IHEC) announced the final results of the parliamentary election, which showed that the al-Sa'iroon Coalition, led by Shiite cleric Moqtada al-Sadr, was the front-runner by winning 54 of the 329 parliament seats.", "\n\nThe al-Fath Coalition, led by Hadi al-Ameri, came in the second place with 47 seats, while the al-Nasr Coalition, led by Iraqi Prime Minister Haider al-Abadi, came in third with 42 seats. ", "The State of Law Coalition, headed by Vice President and former Prime Minister Nuri al-Maliki, garnered 25 seats.", "\n\nMany Iraqi parties, especially in the Kurdistan region and the disputed areas including Kirkuk province, have complained about irregularities and forgery in the parliamentary election.", "\n\nThe complaints put the electoral commission under pressure, as it has not carried out manual recounting of many ballot boxes and depended only on the electronic counting of the votes.", "\n\nEarlier, Riyadh al-Badran, head of the electoral commission, told a press conference \"there is no justification for a manual recount yet,\" despite many complaints about voter fraud.", "\n\nOn May 17, UN Special Envoy to Iraq Jan Kubis issued a statement, calling on the IHEC to carry out an immediate and thorough investigation into all complaints concerning the election.", "\n\nThe Iraqi parliament also called on May 19 for measures to instill confidence in the election process after receiving complaints from political entities about alleged irregularities.", "\n\nOn May 24, the Iraqi Council of Ministers (cabinet) met with top judicial and intelligence officials and the IHEC's security committee to discuss immunity of the electronic devices used in casting and counting the votes for the first time in the Iraqi election, a government statement said.", "\n\nThe cabinet appointed a special committee to investigate the allegations, whose results would be handed to the council of ministers, high judicial council and the federal court, according to the statement.", "\n\nOn May 12, Iraq held the first parliamentary election since defeating the Islamic State (IS) militant group in last December." ]
{ "pile_set_name": "Pile-CC" }
[ 0.000777060107793659, 0.0005999780260026455, 0.0005931252962909639, 0.0005885178688913584, 0.0006175054586492479, 0.0005369630525819957, 0.0007172966143116355, 0.0009782814886420965, 0.0006109445239417255, 0.0006106251967139542, 0.0007010704721324146, 0.0007617223891429603, 0.0006512849940918386, 0.0006046100170351565, 0.0005317176692187786, 0.0005530650960281491, 0.0007223367574624717 ]
0.000656
17
[ "1. ", "Field of the Invention\nThis invention relates to the use of chemical substances for the prevention and therapy of mammalian Apicomplexa protozoan parasitic infestations.", "\n2. ", "Description of Related Art\nProtozoan parasites of the phylum Apicomplexa include the causative agents of the human disease malaria, as well as the agents of cattle diseases such as Texas cattle fever and East Coast fever. ", "Furthermore, the causative agent of the human disease toxoplasmosis, Toxoplasma gondii, is also found in this phylum. ", "Schmidt, G. D. and Roberts, L. S. Foundations of Parasitology. ", "St. Louis, Times Mirror/Mosby, 1985. ", "pp. ", "149, 173-178.", "\nMalaria is one of the most important diseases of mankind. ", "Two billion people are at risk of contracting malaria; over 200 million people are infected by the disease, and 3 million people die of malarial infection each year. ", "The disease is caused by four species of plasmodia, Plasmodium falciparum, Plasmodium vivax, Plasmodium ovale, and Plasmodium malariae. ", "Strains of the most common and most severe causative agent, P. falciparum have developed resistance to many of the current drugs used in treatment, and drug resistance has also been reported in P. vivax. ", "Pudney, M. \"Antimalarial: From Quinine to Atovaquone\" in: Hunter, P. A., Darby, G. K. and Russell, N. J. Fifty Years of Antimicrobial. ", "Past Perspectives and Future Trends (Cambridge, Society for General Microbiology, 53rd Symposium, 1995), pp. ", "229-247.", "\nA 35-kb genome of plastid origin has been found in several of the Apicomplexa and it is through to be present in all protozoan species which are members of this phylum. ", "Some Apicomplexa have been shown to be sensitive to members of certain triazine herbicides. ", "This sensitivity is probably due to the interaction of the triazine herbicide with the D1 protein of the photosynthetic reaction center of these parasites organelles. ", "Hackstein, J. H. P., Mackenstedt, U., Mehlhorn, H., Meijerink, J. P. P., Schubert, H., and Leunissen, J. A. M. Parasitic apicomplexans harbor a chlorophyll .alpha.-D1 complex, the potential target for therapeutic triazines. ", "Parasitology Research, Vol. ", "81, (1995), pp. ", "207-216.", "\nFurther research has indicated the 35 kb extrachromosomal DNA of apicomplexan parasites is located in a novel organelle surrounded by four membranes. ", "This suggests that the Apicomplexa parasites acquired this discrete organelle by secondary endosymboisis, probably of a green alga. ", "Kohler, S., Delwiche, C. F., Denny, P. W., Tilney, L. G., Webster, P., Wilson, R. J. M., Palmer, J. D. and Roos, D. S. A Plastid of Probable Green Algal Origin in Apicomplexan Parasites. ", "Science, Vol. ", "275, (Mar. 7, 1997), pp. ", "1485-1489.", "\nReplication of the Apicomplexa protozoan parasite T. gondii has been found to be sensitive to inhibition by dinitroaniline herbicides at concentrations which do not inhibit host primary human fibroblasts. ", "Such herbicides are known as specific and potent inhibitors of plant microtubules. ", "Stokkermans, T. J. W., Schwartzman, J. D., Keenan, K., Morrissette, N. S., Tilney, L. G. and Roos, D. S. Inhibition of Toxoplasma gondii Replication by Dinitroaniline Herbicides. ", "Experimental Parasitology, Vol. ", "84, (1996), pp. ", "355-370.", "\nThe prior art has disclosed the use of chemical agents belonging to the triazine class of herbicides as potential therapeutic agents. ", "Such activity against some apicomplexan parasites is thought to result from interaction of the herbicide with the D1 protein of the photosynthetic reaction center of organelles of the parasites. ", "In addition, dinitroaniline herbicides known to be inhibitors of plant microtubules also inhibit some apicomplexan parasites. ", "The prior art, however, has not disclosed the use of herbicidal agents which inhibit carotenoid synthesis or certain herbicidal agents which inhibit fatty acid synthesis as inhibitors of apicomplexan parasites." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0009391896310262382, 0.0006018516723997891, 0.0011855863267555833, 0.0007968142163008451, 0.0014943861169740558, 0.0008366502006538212, 0.0007067052647471428, 0.0008769825217314065, 0.0008574781822972, 0.026966281235218048, 0.06218835338950157, 0.002372653456404805, 0.000804010487627238, 0.00078928581206128, 0.0005850462475791574, 0.0009641709038987756, 0.0007107394631020725, 0.0006463458994403481, 0.0007258460391312838, 0.000805026211310178, 0.0008813003660179675, 0.0006928581860847771, 0.0008265170617960393, 0.0006263466784730554, 0.004605497699230909, 0.0007911729626357555, 0.0007083496893756092, 0.0006756828515790403, 0.0008543203584849834, 0.0008925161091610789, 0.0007203638670034707, 0.0008022368419915438, 0.0009019832941703498, 0.0006873249658383429, 0.0006950495881028473, 0.0006513625849038363, 0.0008851754828356206, 0.0007660865085199475, 0.0008712178678251803 ]
0.003189
39
[ "Immunopathogenesis of falciparum malaria: implications for adjunctive therapy in the management of severe and cerebral malaria.", "\nDespite optimal antimalarial treatment and advances in malaria eradication, the mortality rate associated with severe malaria due to Plasmodium falciparum infection, including cerebral malaria (CM), remains unacceptably high. ", "This suggests that strategies directed solely at parasite eradication may be insufficient to prevent neurological complications and death in all cases of CM. ", "Therefore, there is an urgent need to develop innovative adjunctive therapeutic strategies to effectively reduce CM-associated mortality. ", "CM pathogenesis is believed to be due, in part, to an aberrant host immune response to P. falciparum, resulting in deleterious consequences, including vascular activation and dysfunction. ", "Development of effective and affordable therapeutic strategies that act to modulate the underlying host-mediated immunopathology should be explored to improve outcome. ", "In this article, we summarize immunomodulatory therapies that have been assessed in clinical trials to date, and highlight novel and promising treatment strategies currently being investigated to address this major global health challenge." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0009621818317100406, 0.0007923363009467721, 0.0007542594103142619, 0.0005845034029334784, 0.0007936209440231323, 0.0005628660437650979, 0.0005454755155369639 ]
0.000714
7
[ "Q:\n\nYii encrypt and decrypt password\n\nI'm using Yii CSecurityManager for Password encryption:\n$this->securityManager->encrypt('TEST', '1');\n\n*the TEST is the string to encrypt and the 1 is the key.", "\nbut when i test before i decrypt i find that the value keeps changing.", "\nfor ($index = 0; $index < 10; $index++) {\n $EncPassword = $this->securityManager->encrypt('TEST', '1');\n echo $EncPassword;\n }\n\ni'm relying on this value in another part of my application...I dug into the encrypt password i see that it is in fact random:\npublic function encrypt($data,$key=null)\n{\n $module=$this->openCryptModule();\n $key=$this->substr($key===null ? ", "md5($this->getEncryptionKey()) : $key,0,mcrypt_enc_get_key_size($module));\n srand();\n $iv=mcrypt_create_iv(mcrypt_enc_get_iv_size($module), MCRYPT_RAND);\n mcrypt_generic_init($module,$key,$iv);\n $encrypted=$iv.mcrypt_generic($module,$data);\n mcrypt_generic_deinit($module);\n mcrypt_module_close($module);\n return $encrypted;\n}\n\nso my question is how can i encrypt based on a key and get the same value each time?", "\nthanks,\nDanny\n\nA:\n\nIn principle you can create the same ciphertext each time. ", "Just use a static IV and you would have accomplished it. ", "It would however mean that you would leak information about the passwords. ", "Identical passwords would have the same ciphertext for different users.", "\nIf you really want to have the same ciphertext, prepend the first 16 bytes of a hash over the username to the password and encrypt with a zero IV. ", "Note that this still could leak a bit of information about the password in time.", "\nNote that using the ciphertext value for other means than storage of the plain text is a very bad idea in general.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0015614763833582401, 0.0006424877210520208, 0.002532856073230505, 0.0012483609607443213, 0.0006035316037014127, 0.0006990233669057488, 0.0007411963888444006, 0.0006024588947184384, 0.0010504144011065364, 0.0005745232338085771, 0.0007565456908196211, 0.0019954426679760218 ]
0.001084
12
[ "Tuesday, December 24, 2013\n\nThe ultimate artist gift: Josef Albers Interaction of Color app\n\nMy last minute gift suggestion for an artist on your list…. ", "Josef Albers \"Interaction of Color\" iPad app. ", "Now obviously only a limited number of people will be able to have this due to technology, and for that I point out this is a book still available. ", "But for iPad users this is quite amazing. ", "And at £6.99/US$9.99 it's a steal.", "\n\nFirstly, it's the full text of the book. ", "This in itself is insightful and a great reference for returning to. ", "It's a classic tome of colour theory, but unless most others out there. ", "Albers' instructions are about physical, physiological and psychological interactions of colours - but without the scientific jargon or bent of many theories that go on about colour circles, colour models, etc. ", "Mostly this is about seeing and using the colour, actually putting it to test.", "\n\nSecondly, there are snippets of video of artists and designers, students and peers of Albers commenting on how they used the tools or the effect of the exercises. ", "These are short. ", "While I'd love to see some exercises being carried out (perhaps something to add to a 2nd version?), ", "these are still useful for some context.", "\n\nLastly, and most importantly, the exercises. ", "Some images are just examples, but most have a \"create\" option that allows you to practice the concept illustrated. ", "Drag and drop colour palettes, the ability to rearrange, save your studies, and do as many versions as you want. ", "Also, each exercise has the text for the instructions and ideas for that specific task.", "\n\nI've seen a few negatives reviews of this app that clearly think it's exercises in creativity. ", "Be clear that it is not. ", "These are quite structured yet open exercises in analysing colour use. ", "It's suitable for the serious artist who wants to improve their colour theory and use knowledge, or for the beginner just learning how to use colour.", "\n\nAny artist can use it! ", "But it's a real tool and not just a fun toy.", "\n\nSo why an app?", "\n\nThe interactivity of the iPad app makes Albers' exercises with colour more accessible and repeatable.", "\n\nIt takes a few goes to get used to the palette color chooser - but then you can do the practices over and over again. ", "Try it with your favourite colours, with your least favourite colours, with a limited palette, with constracting hues. ", "Because you can save all your studies you can look back at them, too. ", "This means that not only can you do the exercises while you read, but that it's simple to pick them up as tools in the studio if you're pondering the colour combination or balance in a current work. ", "The convenience over having a huge file of paper samples is beyond measure.", "\n\nThe colour palette itself is large, yet limited. ", "Which you'll discover when you just can't quite find that pinkish-green grey that is the perfect fit!", "\n\nBut that's precisely what Albers, I think, had in mind. ", "His original instructions are to use collected bits of coloured paper; in fact he advises strictly against paint. ", "The exercises are to be done with limited available colours, and it's wonderful to read him describing how it may not work. ", "That you might have to adjust your original colour choices, or just submit to their being no solution. ", "On top of the subjectiveness of it all!", "\n\nIn that sense the app is brilliant. ", "You are forced to work to the constraints and it makes you think harder and experiment more.", "\n\nDespite being told I'm a fairly intuitive colorist, I still found many of the studies gave me real \"ah ha!\" ", "moments. ", "And most were quite challenging. ", "All the images in this review are of my own arrangements.", "\n\nI love that I can use and re-use this app with a palette of 'paper' at the ready.", "\n\nThe ability to drag the selector palette up the page - sometimes I was looking for a colour for a space that was under the palette and it would have been useful to browse the circle with the space in view next to its neighbour colours.", "\n\nThe ability to interact with my own studies. ", "Some of the examples you could drag the pieces away or near to see how they interacted. ", "Once I was done with my own studies I would have liked the option to do that also, to test how well my choices worked. (", "especially in chapter XV)\n\nThe ability to highlight text, though this is just a minor request.", "\n\nMerry Christmas!", "\nBut don't blame me if your artist spends the holiday on their iPad." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006661869119852781, 0.0006647706613875926, 0.0005401894450187683, 0.000554807425942272, 0.02218947932124138, 0.0006174437003210187, 0.0005400334484875202, 0.0006287768483161926, 0.0006948938826099038, 0.0005909134051762521, 0.0006163738435134292, 0.0008750357665121555, 0.0005277291056700051, 0.0005380571819841862, 0.0006247236742638052, 0.0005651439423672855, 0.0010597252985462546, 0.0005763925146311522, 0.0005480953841470182, 0.0006791712949052453, 0.0005612457171082497, 0.0006382101564668119, 0.0007279064157046378, 0.0011702250922098756, 0.0008472612826153636, 0.0006017180276103318, 0.0006153279100544751, 0.0011356392642483115, 0.000787910248618573, 0.0005369566497392952, 0.0005721633788198233, 0.0006346732843667269, 0.0009999426547437906, 0.0008008326403796673, 0.0007269969210028648, 0.0005379017675295472, 0.0006304531125351787, 0.0009543365449644625, 0.00061365170404315, 0.0010394105920568109, 0.0006337569211609662, 0.000689763342961669, 0.0006127216038294137, 0.0006390385678969324, 0.0005518386606127024, 0.0005615694681182504, 0.0007184239802882075, 0.000667555897962302, 0.0005179409636184573, 0.0005685371579602361, 0.0008296365849673748, 0.0015035599935799837 ]
0.001114
52
[ "I am really thankful to Clean Septic for their work, and the way they repaired our septic system issues with ease. ", "They were very thorough in their assessment, and made sure I understood everything, every step of the way. ", "The staff was highly experienced and professional. ", "I would recommend your company and services from now on. ", "Thanks again!", "\n\nAaron\n\nCommercial Customer\n\nClean Septic has really helped a lot in resolving our septic issues. ", "The workers came on time, and put great effort in fixing the septic damages. ", "They examined and repaired our entire septic system very quickly. ", "Thank you Clean Septic for your great service.", "\n\nGerald and Terry\n\nResidential Customer\n\nIt was late one evening when we really needed some help for our septic tank system. ", "We called Clean Septic, and they came out the very next morning to fix it! ", "We were really thankful to the skilled team when they detected, and resolved the issue in just a few hours. ", "We would recommend any services performed by Clean Septic and its team.", "\n\nLuciana\n\nCommercial Customer\n\nI am so grateful for the amazing services provided by Clean Septic. ", "They really did a great job in inspecting and dealing with the horrible septic matters at one of our properties. ", "Thank you for your work, and assessment on our rental.", "\n\nAnne and Benson\n\nResidential Customer\n\nWe had persistent complications in our home septic system, and we couldn’t figure out why. ", "Then, a friend recommended we call Clean Septic, and I am so happy we did! ", "Our communication with Clean Septic proved really beneficial, as they did not only solve the issue but also explained the entire problem to us. ", "And they still check in with us. ", "Our experience with Clean Septic was awesome and we will put our trust in them for future help." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0008798283524811268, 0.0005476157530210912, 0.0005708576645702124, 0.0005434551276266575, 0.0008066257578320801, 0.0015924300532788038, 0.0009478068677708507, 0.0018445722525939345, 0.05189849063754082, 0.000720913230907172, 0.0209820419549942, 0.0005080337286926806, 0.0009589215624146163, 0.0011144557502120733, 0.0008413221221417189, 0.0005018461961299181, 0.0009930813685059547, 0.016236068680882454, 0.002105106133967638, 0.0006544557982124388, 0.0019484857330098748 ]
0.005105
21
[ "Q:\n\nJavascript place random object/images in a grid\n\nI'm trying to place random object in a dynamic grid using only javascript. ", "I'm stuck on how to place random objects/images in the grid. ", "Something like minesweeper but looking for simple example to start with. ", "\nThis is the link of the post I was following Creating a dynamic grid of divs with Javascript\nCode below:\n<html><head> \n<script language=\"javascript\"> \nfunction genDivs(v){ \n var e = document.body; // whatever you want to append the rows to: \n for(var i = 0; i < v; i++){ \n var row = document.createElement(\"div\"); \n row.className = \"row\"; \n for(var x = 1; x <= v; x++){ \n var cell = document.createElement(\"div\"); \n cell.className = \"gridsquare\"; \n cell.innerText = (i * v) + x;\n row.appendChild(cell); \n } \n e.appendChild(row); \n } \n document.getElementById(\"code\").innerText = e.innerHTML;\n\n }\n </script> \n </head> \n<body> \n <input type=\"button\" onclick=\"genDivs(6)\" value=\"click me\"> \n <code id=\"code\"></code>\n</body> \n</html> \n\nA:\n\nHere is a working version:\n<style>\n .row { width: 100%; clear: both; text-align: center; }\n .col { display: inline-block; min-height: 20px; min-width: 20px; padding: 8px 10px; background-color: #ededed; margin: 1px; }\n .col:hover { background-color: #333333; color: #ffffff; }\n</style>\n\n<input type=\"button\" onClick=\"genDivs(6);\" value=\"click me\" /> \n<div id=\"target\"></div>\n\n<script language=\"javascript\"> \nfunction genDivs(rows,cols){ \n var e = document.getElementById(\"target\");\n cols = cols || rows;\n for(var r = 0; r < rows; r++) {\n var row = document.createElement(\"div\");\n row.className = \"row\";\n for(var c = 0; c < cols; c++) {\n var col = document.createElement(\"div\");\n col.className = \"col\";\n col.innerHTML = (r * rows) + c;\n col.innerHTML = getElement();\n row.appendChild(col);\n } \n e.appendChild(row);\n } \n }\n function getElement(){\n var elements = [ \n \"A\",\n \"B\",\n \"C\"\n ]\n return elements[Math.floor(Math.random() * (elements.length))];\n }\n</script> \n\nThis is easier with jQuery. ", " I used vanilla Javacript. ", " I'd usually put the onclick in the javascript, but I left it as is for you.", "\nHere's a jsfiddle:\nhttps://jsfiddle.net/mckinleymedia/chLLg4rr/\nHope this helps.", "\n\nPer request, I've made a jQuery version. ", " I also used lodash to make this more efficient(lodash comes in really handy). ", " And I've more properly separated the script, the html and the styles - these should each go in a different file. ", " Here's a jsfiddle:\nhttps://jsfiddle.net/mckinleymedia/btb9vp26/\nscript:\nfunction grid(rows,cols,target){ \n cols = cols || rows;\n target = target || \"grid\";\n var gridDiv = $(\".\" ", "+ target);\n gridDiv.html(''); // clear grid to reload\n _.times(rows, function() {\n gridDiv\n .each(function(){ // allows multiple grids\n $(this).append(addRows(rows,cols));\n });\n });\n};\nfunction addRows(rows,cols){\n return $(\"<div />\")\n .addClass(\"row\")\n .html(\n addCols(cols)\n );\n};\nfunction addCols(cols){\n return _.times(cols, function() {\n return $(\"<div />\")\n .addClass(\"col\")\n .html( getElement() );\n });\n};\nfunction getElement(){\n var elements = [ \n \"A\",\n \"B\",\n \"C\"\n ];\n return _.sample(elements);\n};\n$(\".js-grid\").click( function(){ grid(6,10) } );\n$(\".js-grid2\").click( function(){ grid(3,5,'grid2') } );\n\nhtml:\n<button type=\"btn btn-info\" class=\"js-grid\">Click me</button> \n<button type=\"btn btn-info\" class=\"js-grid\">Or me</button> \n<button type=\"btn btn-info\" class=\"js-grid2\">Grid 2</button> \n<div class=\"grid\"></div><div class=\"grid2\"></div>\n<div class=\"grid\"></div>\n\nstyles:\n.row { width: 100%; clear: both; text-align: center; }\n.col { display: inline-block; min-height: 20px; min-width: 20px; padding: 8px 10px; background-color: #ededed; margin: 1px; }\n.col:hover { background-color: #333333; color: #ffffff; }\n.grid, .grid2 { margin-bottom: 10px; }\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006768035236746073, 0.0006072410615161061, 0.0007231133058667183, 0.0016265304293483496, 0.0006455695838667452, 0.0008488770690746605, 0.0007655081572011113, 0.0006194430170580745, 0.0005641747266054153, 0.0005575125105679035, 0.0007275933166965842, 0.0008129249326884747 ]
0.000765
12
[ "The split ejaculate: assessment of fertility potential using two in vitro test systems.", "\nSemen samples (split & whole ejaculates) were obtained from 12 normal men (group A) and 8 oligospermic infertile men with sperm concentrations of less than 20 x 10(6) sperm/ml (group B). ", "All samples were evaluated by standard semen analysis, bovine cervical mucus penetration assay (CMPT), and, in all cases with sufficient sperm, in the human spermatozoa zona-free hamster in vitro penetration assay (SPA). ", "In group A the motile sperm concentration was significantly higher in the ejaculated material of the first two contractions (fraction I or FI) than in the remainder of the ejaculate (fraction II or FII) (p less than 0.02). ", "No significant differences were observed in sperm penetration into zona-free hamster ova or bovine cervical mucus by sperm from FI, FII or the whole ejaculate. ", "Motile sperm concentration was significantly correlated with sperm penetration into bovine cervical mucus (r = 0.65, p less than 0.01), but not into zona-free hamster ova (r = 0.01 NS). ", "In the samples collected by group B, the mean sperm concentration and motile sperm concentration were higher in the first (FI) than in the second (FII) fractions of the split ejaculate or the whole ejaculate (p less than 0.05). ", "No significant differences were found among the FI, FII and the whole ejaculate semen samples for penetration of sperm into bovine cervical mucus. ", "Sperm concentration and motile sperm concentration were significantly correlated with sperm penetration into bovine cervical mucus (r = 0.58, p less than 0.01 and r = 0.57, p less than 0.01, respectively).(ABSTRACT TRUNCATED AT 250 WORDS)" ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.3781721889972687, 0.6723399758338928, 0.11332359910011292, 0.15903912484645844, 0.46197932958602905, 0.08745463192462921, 0.10371127724647522, 0.5106236338615417, 0.004302134271711111 ]
0.276772
9
[ "The Government wants to get a \"better deal\" from controversial pay-for-residency visas.", "\n\nKey points: The significant investor visa makes to easier for migrants to get residency if they invest $5 million\n\nThe significant investor visa makes to easier for migrants to get residency if they invest $5 million Some are calling for it to be abolished, but others claim it presents \"fair value\"\n\nSome are calling for it to be abolished, but others claim it presents \"fair value\" Almost 200 significant investor visas (SIVs) were handed out in 2017-18\n\nBut the head of the firm driving uptake of the significant investor visa (SIV) in Australia — and attracting billions in capital for Australian companies — has claimed the country is already getting \"fair value\".", "\n\nThe SIV provides a streamlined pathway to permanent residency for migrants with $5 million to invest.", "\n\nAndrew Martin, managing director of asset management at Moelis Australia, said the SIV program in Australia has been \"a massive success\", leading to direct investment of more than $11 billion since it commenced in 2012.", "\n\n\"It has been estimated that the follow-on investment from SIV investors has been up to four to five times more than the mandatory $5 million, meaning capital invested into Australia could be as much as $50 billion.\"", "\n\nThe program was tweaked in 2015 to shift investment towards venture capital and emerging companies and away from real estate.", "\n\nBut Immigration Minister David Coleman flagged this month that the business and investment visa scheme — of which the SIV is the headline program — will be reviewed.", "\n\n\"I will be reviewing our business investment visas with a simple question in mind: can we get a better deal for Australia?\"", "\n\nBehind investment visas\n\nAbout 7,000 visas are granted each year across the entire business and investment visa program.", "\n\nBusiness innovation and investor visas, not SIVs, represent the majority of grants under the scheme. ", "These apply business and investment requirements as well as a points test, which values migrants with youth, English language ability, qualifications and experience.", "\n\nBut larger investments arrive through the SIV scheme, which does not apply a points test. ", "Plus, SIV holders qualify for permanent residency if they have spent just 40 days in Australia per year.", "\n\nThere were 183 SIVs were granted in 2017-18, with the program on track to deliver a similar figure for 2018-19, according to figures released in February.", "\n\nEighty-seven per cent of SIVs have been given to Chinese nationals since 2012, ahead of Hong Kong (3.2 per cent), Malaysia (1.5 per cent), South Africa (1.3 per cent) and Vietnam (0.9 per cent).", "\n\nThe first permanent visas under the program were awarded in 2017-18. ", "Approximately 700 had been granted at January 31, 2019.", "\n\nSIVs were most often granted to people from these five countries in 2018. ( ", "Supplied: Moelis )\n\nMoelis, the largest manager of SIV investments in Australia, has a team of 12 across Sydney, Melbourne and Shanghai working with clients.", "\n\nIts 2019 first-half results released this week stated capital flows from high net worth Chinese clients into the SIV program have \"remained strong\".", "\n\n\"Despite the redemption of some SIV funds by clients who have achieved their residency objective, we have been successful in retaining the investment funds of many SIV clients who, despite having received permanent residency from the Australian Government, have chosen to retain their investment with Moelis Australia.\"", "\n\nIt boasted there were barriers to entry for competing asset management firms, given Moelis has been pursuing SIVs for six years.", "\n\n\"It is an attractive pool of capital to manage given the relatively long duration of investment [up to eight years].\"", "\n\nThe share price of Moelis Australia hit a two-year low after results were released.", "\n\nTowards a 'better deal'\n\nMr Coleman declined to elaborate to the ABC on his planned review of the scheme.", "\n\nIn the speech two weeks ago, he said: \"We need to sharply focus on the practical execution to ensure that we are fully delivering on the goal.\"", "\n\nImmigration Minister David Coleman wants a \"better deal\" from business and investment visas. ( ", "ABC News: Nick Haggarty )\n\n\"Immigration to Australia is highly attractive to this cohort, and we need to ensure that we maximise the returns to our economy from their investment.\"", "\n\nA 2016 report into the migration program argued the SIV (and its little-used \"premium\" $15 million investor visa) should be abolished.", "\n\n\"The broader economic benefits of the significant investor and premium investor visas are negligible, and any benefits accrue mainly to those visa holders and to fund managers,\" it stated.", "\n\n\"It is likely that immigrants through these streams have less favourable social impacts than other skilled immigrants.\"", "\n\nMr Martin said he welcomed the review but stressed it needed to consider competition from the US and Europe.", "\n\n\"It is widely accepted that Australia's SIV program is best of breed in terms of investment migration — especially in terms of its key investment requirements such as the $5 million amount which is much, much higher than most competing programs,\" he said.", "\n\nHe suggested the Government could increase the proportion of funds that had to be invested into emerging companies, but that \"we are getting fair value\".", "\n\nEditor's note August 30, 2019: An earlier version of this story stated almost 600 significant investor visas were granted in 2017-18. ", "The correct figure is 183." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0005654354463331401, 0.0005323642399162054, 0.0005113361403346062, 0.0005632553366012871, 0.0005170299555175006, 0.0006126322550699115, 0.0005757624749094248, 0.0005687596276402473, 0.000561736524105072, 0.0005729715921916068, 0.0005472445045597851, 0.0005647899233736098, 0.0005243094055913389, 0.000551941804587841, 0.0006114061689004302, 0.0005352055304683745, 0.000572465592995286, 0.0005219715530984104, 0.000544122769497335, 0.0005294290604069829, 0.0005262081976979971, 0.0005654489505104721, 0.0005271660629659891, 0.0007111032609827816, 0.0005947611061856151, 0.0005297066527418792, 0.0005283245118334889, 0.0005625021294690669, 0.0005969830672256649, 0.0006068739457987249, 0.0005986628239043057, 0.000521157227922231, 0.0005368517595343292, 0.0005466778529807925, 0.0005658174050040543, 0.0006469322834163904 ]
0.000562
36
[ "Q:\n\nIIS Certificates VS Windows Certificate\n\nI'd like to understand the link, if any, between certificates installed throug IIS and those installed through windows.", "\nBy IIS Certificates I mean the list shown when we open the \"Server Certificates\" on feature view on the home page of IIS Manager.", "\nBy windows I mean the default installation when we double clic a certificate and are prompted to install it. ", "After installation we can find installed certificate via certmgr.msc.", "\n\nA:\n\nThe certificates you see from IIS Manager Server Certificates page are a subset of certificates that IIS uses.", "\nCertificate adding in MMC of course gives you control on all certificates of that machine.", "\nThat's the relationship between the two.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006452276138588786, 0.0005753296427428722, 0.0006366100278683007, 0.0005898072267882526, 0.0006306523573584855, 0.0006334971985779703, 0.0006543233175761998, 0.0019954426679760218 ]
0.000795
8
[ "<html>\n<body>\n<h1>Directory listing</h1>\n<hr/>\n<pre>\n<a href=\"content-api-client_2.8.0-1.6-sources.jar\">content-api-client_2.8.0-1.6-sources.jar</a>\n<a href=\"content-api-client_2.8.0-1.6.jar\">content-api-client_2.8.0-1.6.jar</a>\n<a href=\"content-api-client_2.8.0-1.6.pom\">content-api-client_2.8.0-1.6.pom</a>\n</pre>\n</body>\n</html>\n" ]
{ "pile_set_name": "Github" }
[ 0.0009752705809660256 ]
0.000975
1
[ "The more I read about this sort of thing, the more I believe patents should be scrapped altogether. ", "The ideas will still be developed and the products will still be sold because coming up with ideas sells products and selling products is their income stream. ", "As it is, people are actually dying because of patents (not page turns of course) so they are essentially quite evil. ", "On the copyright front, I reckon 30-50 years from publish date with some protection during writing. ", "AND, I reckon as soon as a copyrighted work is not available for sale after the first 5 years, the patent should lapse automatically. ", "Check the constitution, copyright is a monopoly granted for a time in consideration of the enrichment of society by authors, not a means to manipulate pricing by withholding supply. ", "Finally, the copyright should be with the author only, not tradeable to one publishing house, so that the author gets his dues and there is still competition in the market. ", "I just don't understand how the constitution can be so ignored by law makers.", "\n\nI have seen so many animations for this for years on various different devices and there is nothing here that is not non-obvious except perhaps that nobody else has done it “exactly” like this.", "\nIf so, the patent wont stand in a trial. ", "Why not try to invalidate the patent?", "\nIf nobody done \"exactly\" like this, but did otherwise means, you can still do it those ways without violating the patent. ", "Then why are you worried about abuse?", "\n\nAlmost as ludicrous as the copyright of the \"Happy Birthday\" song which purportedly brings in $2m/year to Time Warner, which owns the rights. ", "The good news is that is will return to public domain circa 2030 so we can legally start singing it again without it denting our wallets.", "\nI can't wait.", "\n\nAnybody ever watch commercial television? ", "Digital video effects generators having page turns have been available for decades. ", "I despise software patents. ", "With their 17/20 year terms software patents are the enemy of innovation. ", "There is no way for a coder to know when he is infringing and no way to avoid penalty if the infringement is revealed. ", "He is not protected even if the infringing code is for personal use since fair use, as in copyrights, does not exist for patents.", "\n\nNothing wrong with patents, but this is really is the limit. ", "In Europe we strived against software patents, and this is a perfect example why I am against software patents: They only do delay proper software development. ", "Hey, don't you agree that is one of the reasons why we are stuck with lousy software products from Micro$oft? ", "Talking about greed.... And for Apple: They at least do proper product and software engineering, but a lot of people are not happy with their patent policy.", "\n\nEE Times electronic version comes with the page turner video and the sound of the page as well.", "\nWill UBM have to fight this patent as well?", "\nAlso, don't fool yoursef that we don't pat for the lawyers and clerks! ", "Price increase on the next version.", "\n\nStop buying their stupid products. ", "If you give them money you just inspire their greed.", "\nIn todays's fast pace design cycle it is nearly impossible to come up with a new idea, let alone a unique product. ", "If there is money involved, the idea/product will be stolen/copied.", "\nEnforcing patents and copyrights is nearly impossible. ", "To date, few perpatrators have been punished enough to discourage anyone else from trying. ", "Maybe a mind wipe would work?", "\nJust my opinion.", "\n\nIn conjunction with unveiling of EE Times’ Silicon 60 list, journalist & Silicon 60 researcher Peter Clarke hosts a conversation on startups in the electronics industry. ", "One of Silicon Valley's great contributions to the world has been the demonstration of how the application of entrepreneurship and venture capital to electronics and semiconductor hardware can create wealth with developments in semiconductors, displays, design automation, MEMS and across the breadth of hardware developments. ", "But in recent years concerns have been raised that traditional venture capital has turned its back on hardware-related startups in favor of software and Internet applications and services. ", "Panelists from incubators join Peter Clarke in debate." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005281968624331057, 0.0006150092231109738, 0.025573022663593292, 0.0005628907238133252, 0.0006317731458693743, 0.0006630183197557926, 0.0006026409682817757, 0.0007586954161524773, 0.0005997719126753509, 0.001116200815886259, 0.001246588653884828, 0.0007684994488954544, 0.001279380638152361, 0.0008226598729379475, 0.0022411367390304804, 0.00137333944439888, 0.0007850212859921157, 0.0005981854046694934, 0.03337128460407257, 0.007086970377713442, 0.0012385614681988955, 0.000871559081133455, 0.0009037545532919466, 0.0006872516241855919, 0.030943825840950012, 0.0006439844146370888, 0.000612917821854353, 0.0011053687194362283, 0.07228846102952957, 0.0006279087392613292, 0.9723791480064392, 0.0008449401939287782, 0.0005872459732927382, 0.001654194900766015, 0.0006746889557689428, 0.0008881451212801039, 0.0070082442834973335, 0.0007370003731921315, 0.0005694610299542546, 0.0005772765725851059, 0.0006054302793927491, 0.000654874776955694 ]
0.028055
42
[ "Trouble logging in?If you can't remember your password or are having trouble logging in, you will have to reset your password. ", "If you have trouble resetting your password (for example, if you lost access to the original email address), please do not start posting with a new account, as this is against the forum rules. ", "If you create a temporary account, please contact us right away via Forum Support, and send us any information you can about your original account, such as the account name and any email address that may have been associated with it.", "\n\n... anyone else hoping a picture that involves Vamp Tsukune leaks by accident? (", "after all, that probably would be a huge spoiler for the series, even bigger than Kokoa being in it, and you know how anime companies get about spoilers...)\n\n... anyone else hoping a picture that involves Vamp Tsukune leaks by accident? (", "after all, that probably would be a huge spoiler for the series, even bigger than Kokoa being in it, and you know how anime companies get about spoilers...)\n\nYes it's like if it's not in the spoilers it probably won't make it into the season as well, sry guys\n\nWaven - Founder of the 'Vamp-Tsukune (and Mizore) are way overrated, gimme more Gin and Kurumu' - association\n\nLadies, are you looking for a kind-hearted young man to love? ", "Especially one that when the situation calls for it, can prove to be an excellent bodyguard to get you out of trouble? ", "Then look no further than Aono Tsukune, and join his harem today! ", "True, you might have to share him, but he looks for different qualities in different girls, so you just might be the next thing he needs. ", "Each of these girls brings something to the table, and they're all really good friends as well. ", "So not only do you get a strong and kind man, you're also bound to make a bunch of friends as well. ", "You only have to meet the following requirement: of not being afraid of monsters that have humanoid form, and it is recommended that you yourself are a monster.", "\n\nTo apply for being part of Aono Tsukune's harem, all you have to do is visit Youkai Academy, show your kind side, then get into a battle and have Tsukune rescue. ", "With thrills like these, who wouldn't want to be part of the fun?", "\n\ni think the only people that will be in his harem are Monsters that normaly look humanish...\n\nthe girls arent really monsters though there youkai, and how they look and there true forms is pretty much the same, as it is in human form, with the exception of wings, claws maybe, silver hair, fangs...\n\ncongrats on joining the mizore fanclub. ", "i sure hope that the preistess gets her butt kicked badly.", "\n\n...and after that... joins the harem, that's what happens to all of them right? (", "well except for art and math teacher -.-') - after all Tsukune needs someone with 'experience' in the harem if you get what i mean\n\n...if you don't know by know i'm just kidding, just to make sure there are no \"I don't think that will happen\" - replies...\n\n...and after that... joins the harem, that's what happens to all of them right? (", "well except for art and math teacher -.-') - after all Tsukune needs someone with 'experience' in the harem if you get what i mean\n\n...if you don't know by know i'm just kidding, just to make sure there are no \"I don't think that will happen\" - replies...\n\nnah, only one ice queen is needed and that position is filled already by mizore. ", "the preistesscan fall back to the postion of crazy power hungry hag." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0013743221061304212, 0.0007076493930071592, 0.0005516919773072004, 0.0010637961095198989, 0.0008799294009804726, 0.002591220661997795, 0.0010213333880528808, 0.012150133959949017, 0.0008279331377707422, 0.0005662628100253642, 0.0008280897745862603, 0.1699059009552002, 0.04029723256826401, 0.0007602362311445177, 0.057344332337379456, 0.9457899332046509, 0.002188526326790452, 0.0008707817178219557, 0.0008368530543521047, 0.619911789894104 ]
0.093023
20
[ "Report from the International Conference on Viral Hepatitis - 2017.", "\nThe International Conference on Viral Hepatitis 2017 brought exciting news on the treatment of viral hepatitis. ", "The most recent estimates of the burden for hepatitis B virus and hepatitis C virus (HCV) infections were presented. ", "The current gaps and prospects for regional and global eradication of viral hepatitis were discussed on the light of the WHO roadmap until 2030. ", "Debates focused on hepatitis C and expectations using the new approved HCV pan-genotypic, once daily, oral direct-acting antivirals (DAAs), glecaprevir-pibrentasvir, and sofosbuvir-velpatasvir-voxilaprevir. ", "The management of difficult-to-cure HCV patients included individuals who had failed prior DAAs, people who inject drugs, patients with decompensated cirrhosis, or renal insufficiency. ", "Special patient populations such as children, pregnant women, persons with acute hepatitis C, or HIV coinfection were addressed separately. ", "The use of HCV treatment as prevention was subject to debate, balancing the benefits on halting transmission and the risk for HCV reinfections and high medication costs. ", "Complementary efforts on behavioral interventions and harm reduction programs were highlighted. ", "Data from both clinical trials and real-world experience (i.e., from the US Veterans) were compared. ", "Further debates addressed hepatic conditions that may alter the management and outcome of viral hepatitis, such as hepatitis B reactivation, non-alcoholic fatty liver disease, liver transplantation, and hepatocellular carcinoma. ", "Finally, the recent data on often neglected hepatitis D and E virus infections were reviewed." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006045644404366612, 0.0005387510173022747, 0.000566961127333343, 0.0005449919262900949, 0.0006169577245600522, 0.0007363369804807007, 0.0008826673147268593, 0.0006095172720961273, 0.0005612406530417502, 0.0005400903173722327, 0.0005903586279600859, 0.0005504292785190046 ]
0.000612
12
[ "Santo Tagliafico\n\nSanto Tagliafico, also known as Santino Fortunato Tagliafichi, (1756 - 1829) was an Italian painter, mainly active in Genoa. ", "He trained under Carlo Giuseppe Ratti. ", "He was a member of a prolific family of artists, including father, Nicolò Gaetano (1698-1776) (engineer and scenic designer), and Santo's brothers starting with Andrea (architect); Giuseppe (priest and not artist); Giovanni (architect); Giambattista (engineer and scenic designer); and Domenico (jeweller). ", "Further family members were (Emanuele) Andrea (1729-1812), and Giovanni Andrea. ", "One of Santo's pupils was Gaetano Gallino.", "\n\nReferences\n\nCategory:1756 births\nCategory:1829 deaths\nCategory:18th-century Italian painters\nCategory:Italian male painters\nCategory:19th-century Italian painters\nCategory:Genoese painters" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0011974181979894638, 0.0008679937454871833, 0.0007570122834295034, 0.0006107969675213099, 0.0007904110825620592, 0.0005820203805342317 ]
0.000801
6
[ "A dress, nearly every day.", "\n\nGiant Book Review Roundup Post\n\nBook the first is Sew Fast Sew Easy Sew On, which is subtitled \"All You Need To Know to Start Sewing and Serging — Today!\" ", "I'm not so sure about the \"today\" part — it may take you a little time to round up the supplies you want — but with a little stick-to-it-tiveness, you could be sewing tomorrow, or at the very least Sunday.", "\n\nI love this kind of rah-rah, you-can-do-it sewing book, because (rah-rah!) ", "you CAN do it. ", "Seriously. ", "People ask me if it's hard to sew, and I always say that if you can drive a car and follow a recipe you can sew, because sewing is really just like following a recipe (and my sewing machine has a foot pedal). ", "You take measurements, you mix things up, and if you've been paying attention, you get something delicious at the end. (", "And to push the driving metaphor a bit farther: sewing machines hardly EVER crash into each other.)", "\n\nSew Fast Sew Easy Sew On lays out, with detailed illustrations, all the basics of sewing. ", "What you need. ", "How to cut out a pattern. ", "The parts of a sewing machine and of a serger. ", "Basic garment construction. ", "It's a very patient and helpful outline of sewing knowledge, and a great beginner book. ", "And it includes some beginner patterns — a t-shirt, a halter dress, a pair of drawstring pants, a box cushion, and the inevitable iPod cozy.", "\n\nOne-Piece Wearables is for slightly more advanced sewists — its subtitle is \"25 Chic Garments and Accessories to Sew from Single-Pattern Pieces.\" ", "At first I thought the single.jpgece thing was a gimmick, but then I remembered how many times I'd altered a pattern to remove a seam I thought superfluous, and decided to take a closer look.", "\n\nThe book includes 15 patterns, several of the halter-top variety (there's only so much you can do with only one pattern piece!) ", "but I was pleasantly surprised by the dress patterns, including a sweet little number called the \"window-shopping dress\". ", "There's a t-shaped tunic that's not bad either, a great circle skirt, a very interesting little jacket, and even a really cute cloche-y hat!", "\n\nThe illustrations are more aspirational than technical but there are good diagrams of the cutting layouts and the instructions and supply lists are very clear. ", "For intermediate sewists, this would be a great purchase; for beginners it may be a stretch; advanced sewists might want to get their hands on a copy as a jumping-off point for their own ideas.", "\n\nForgotten Fashion is not a how-to book, unless what you need to know how to do is be charmingly absurd. ", "I consider myself a connoisseur of the absurd, so take it from me: this is some high-grade absurd, right here. ", "Forgotten Fashion claims to be an \"illustrated faux history of outrageous trends and their untimely demise,\" including safari pajamas (modeled after those worn in a screwball comedy where the stars were interrupted — repeatedly — on their wedding night by the groom's pet elephant, Jinx), the \"poly-chem Oxford,\" a man's shirt made of space-age chemicals and designed to last fifty years, and my favorite, the \"Four-O'Clock Dress\" a toga-like garment to be worn AFTER coming home from shopping but BEFORE \"the mister\" got home. ", "It had \"secret inner pockets to hide the tools of whatever vice occupied the otherwise abject and idle afternoon … miniature gin bottles, marijuana joints, or palm-sized erotic novels.\" ", "Genius! (", "What would be in your secret pocket, I ask?)", "\n\nReady to Share: Fashion & the Ownership of Creativity might be harder to find than the books above, but it's well worth it. ", "A collection of essays on creativity, sharing, idea transfer, and homage/borrowing/\"theft\" in fashion, published by the Norman Lear Center at USC, it's completely engrossing. ", "If you like fashion and are fascinated by the arbitrariness of copyright, patents, and IP law in general, you have to read this book. (", "And how much do I love that I know that a considerable number of you reading this blog ARE in that category?) ", "The book also includes a DVD of the related event put on by the center.", "\n\nWhew, okay, that's it for the books on my desk today. ", "Check back at some undetermined interval for more book-reviewing madness!", "\n\nLike this:\n\nRelated\n\nPost navigation\n\n0 thoughts on “Giant Book Review Roundup Post”\n\nWhen you click on the link for the Ready to Share book, you go to the Lear Center site for the project – and there is an email link to click on for a free copy. ", "I’ve requested a copy, and hope to get it and post a review on my blog.", "Off to check out the others – they all sound fascinating!!", "\n\nIn my secret pocket, there would be a small two-way radio so I could talk to the other female gangsters who were picking up protection money (under cover of “shopping.”) ", "In case they needed backup, you know?", "\n\nThere NEEDS to be a secret, ring shaped pocket (with closure!) ", "so if it all gets too much and you need to nip into a bar for someone to buy you a drink, you can safely stash your wedding band. ", "Eliminates confusion during blackouts.", "\n\ntea, I’ve seen that fabric and I LOVE it!! ", "erin, if you ever decide you need someone to do some of the book reviews, I’d be happy to help 🙂 I’m soooo jealous that you get to read all of these great books! ", "I’m definitely going to get myself a copy of the last one.", "I think I need a four o’clock dress made of gorgeous spacey-type fabric. ", "With secret pockets full of candy.", "\n\nI’ve put in my request for “Ready to Share” and requested Sew Fast from the library — I want, in the abstract, to learn to sew but I still find it very intimidating! ", "Much easier just to draw what I like, but that approach has practical drawbacks…\n\nSaw a lovely vintage dress on http://www.thevintagerevolution.co.ukThere are not many vintage clothes but like the red dress they have there.", "Very informative blog – glad I found it to share my vintage passion!!!", "\n\nMy mom had a sewing machine with a foot pedal for years!I could never do it properly because it’s so hard to load threads and to work simultaniously with your hands and feet, but it’s definitely elegant!!", "\n\nRan across the “Faux Fashions” book on a “quick” trip to a local bookstore, and found it fascinating.", "Really, sewing IS pretty easy, once you get a handle on a basic set of skills. ", "You just slowly expand out from the basics, as far as you like.", "People look at me with their mouths hanging open when they realize I make pretty much everything I wear, which is sort of fun, but also kind of sad, because all of them are bright enough to do it if they wanted to.", "Liberate yourselves from the oppressive grip of department store buyers! (", "yeah!)", "\n\n(and now my husband wants to know what I am thinking about. “", "What would I put in a secret pocket dress while you are away at work?”Perhaps a packet of purple prose from my secret admirer? *", "It’s just a letter!* ", "😉\n\n“charmingly absurd”: words I fully expect as my epitaph 😉 What wonderful fabric, Tea! ", "All DaD-ers should be incorporating this into inside cuffs and secret-pocket linings.", "On the subject of sewing books, may I plug a fellow International Sewing Conspirator, Erin? ", "Ruth Singer (great name for a sewist) has written ‘Sew It Up: a modern manual of practical and decorative sewing techniques’ which aims to cover everything from threading a needle on up through 150 fascinating and useful techniques, culminating in 20 masterclasses (e.g. couture hemming). ", "Haven’t seen a copy, but it’ll be published in the UK on 30th October, and should be distributed in the US and Australia too. ", "More information on availability etc here: http://www.sewitupbook.blogspot.com/, though you can also locate Ruth on Facebook (even via the International Sewing Conspiracy page!).", "\n\nI just ADORE Forgotten Fashion. ", "It arrived on my doorstep just as I was coming down with an awful cold, and provided some much-needed chuckles between bouts of hacking, wheezing and nose-blowing. ", "Excellent!", "\n\nI learned so much about reading patterns from the first Sew Fast Sew Easy book, written by the same author and now out-of-print, I believe. ", "I made all three projects, and have gotten so many compliments on them.", "I’ve got the new book but haven’t yet tried any sewing — I just make so little time for sewing during the summer, but I plan to tackle the wrap dress this fall, for sure!I would really recommend Elissa Meyrich’s books, especially the first Sew Fast Sew Easy book if you can find a copy. ", "As someone who knew how to work a sewing machine but was always frustrated by how poorly many of my projects came out, her approach was a revelation and has made me a much, much better sewer!" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0008684417698532343, 0.0036603782791644335, 0.0011899338569492102, 0.0011273419950157404, 0.0008766697137616575, 0.0014787459513172507, 0.0007828827947378159, 0.000573735567741096, 0.0006249936996027827, 0.000825467926915735, 0.0008365939720533788, 0.0008832621388137341, 0.000724450743291527, 0.0006269884761422873, 0.0006505787023343146, 0.0009609299595467746, 0.0010349935619160533, 0.0006040080916136503, 0.0006473720422945917, 0.0005560064455494285, 0.0008506900630891323, 0.000608752656262368, 0.0006579875480383635, 0.003368835663422942, 0.0042170751839876175, 0.0009621314820833504, 0.0015132986009120941, 0.0007126764976419508, 0.0008110204362310469, 0.0005853703478351235, 0.0005436979117803276, 0.0006101042963564396, 0.0006463609752245247, 0.0006148802931420505, 0.0010360886808484793, 0.001212019706144929, 0.0005407798453234136, 0.0005661408067680895, 0.000821720517706126, 0.02164134569466114, 0.0008775418973527849, 0.0005865557468496263, 0.030261335894465446, 0.0009259277139790356, 0.0009758133674040437, 0.0006931276875548065, 0.00077775091631338, 0.0012256159679964185, 0.0009670223225839436, 0.0009602353093214333, 0.000699881580658257, 0.0006910790107212961, 0.006325468420982361, 0.0006584494840353727, 0.0005952371284365654, 0.0006554832798428833, 0.21135540306568146, 0.05221898481249809, 0.0010594078339636326, 0.0006717751384712756, 0.0015313333133235574, 0.0013792141107842326, 0.005976731423288584, 0.0019524027593433857, 0.0006651848088949919, 0.0011464073322713375, 0.000564712390769273, 0.0005850186571478844, 0.016001390293240547, 0.014605063013732433, 0.0007285796455107629, 0.000648717163130641, 0.0005706373485736549, 0.0007293166709132493, 0.05166257545351982 ]
0.00632
75
[ "Fifty years of driving safety research.", "\nThis brief review covers the 50 years of driving-related research published in Human Factors, its contribution to driving safety, and emerging challenges. ", "Many factors affect driving safety, making it difficult to assess the impact of specific factors such as driver age, cell phone distractions, or collision warnings. ", "The author considers the research themes associated with the approximately 270 articles on driving published in Human Factors in the past 50 years. ", "To a large extent, current and past research has explored similar themes and concepts. ", "Many articles published in the first 25 years focused on issues such as driver impairment, individual differences, and perceptual limits. ", "Articles published in the past 25 years address similar issues but also point toward vehicle technology that can exacerbate or mitigate the negative effect of these issues. ", "Conceptual and computational models have played an important role in this research. ", "Improved crash-worthiness has contributed to substantial improvements in driving safety over the past 50 years, but future improvements will depend on enhancing driver performance and perhaps, more important, improving driver behavior. ", "Developing models to guide this research will become more challenging as new technology enters the vehicle and shifts the focus from driver performance to driver behavior. ", "Over the past 50 years, Human Factors has accumulated a large base of driving-related research that remains relevant for many of today's design and policy concerns." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0007037279428914189, 0.0005508055910468102, 0.0006008099881000817, 0.0005311888526193798, 0.0005498994141817093, 0.0006094615091569722, 0.0005818245699629188, 0.0005317509057931602, 0.0006366567104123533, 0.0005554240779019892, 0.0005564205348491669 ]
0.000583
11
[ "/*\n * (C) Copyright 2007-2008\n * Matthias Fuchs, esd gmbh, matthias.fuchs@esd-electronics.com.", "\n *\n * See file CREDITS for list of people who contributed to this\n * project.", "\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by the Free Software Foundation; either version 2 of\n * the License, or (at your option) any later version.", "\n *\n * This program is distributed in the hope that it will be useful,\n * but WITHOUT ANY WARRANTY; without even the implied warranty of\n * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ", "See the\n * GNU General Public License for more details.", "\n *\n * You should have received a copy of the GNU General Public License\n * along with this program; if not, write to the Free Software\n * Foundation, Inc., 59 Temple Place, Suite 330, Boston,\n * MA 02111-1307 USA\n */\n\n#ifndef __PMC440_H__\n#define __PMC440_H__\n\n/*\n * GPIOs\n */\n#define GPIO1_INTA_FAKE (0x80000000 >> (45-32)) /* GPIO45 OD */\n#define GPIO1_NONMONARCH (0x80000000 >> (63-32)) /* GPIO63 I */\n#define GPIO1_PPC_EREADY (0x80000000 >> (62-32)) /* GPIO62 I/O */\n#define GPIO1_M66EN (0x80000000 >> (61-32)) /* GPIO61 I */\n#define GPIO1_POST_N (0x80000000 >> (60-32)) /* GPIO60 O */\n#define GPIO1_IOEN_N (0x80000000 >> (50-32)) /* GPIO50 O */\n#define GPIO1_HWID_MASK (0xf0000000 >> (56-32)) /* GPIO56..59 I */\n\n#define GPIO1_USB_PWR_N (0x80000000 >> (32-32)) /* GPIO32 I */\n#define GPIO0_LED_RUN_N (0x80000000 >> 30) /* GPIO30 O */\n#define GPIO0_EP_EEP (0x80000000 >> 23) /* GPIO23 O */\n#define GPIO0_USB_ID (0x80000000 >> 21) /* GPIO21 I */\n#define GPIO0_USB_PRSNT (0x80000000 >> 20) /* GPIO20 I */\n\n/*\n * FPGA programming pin configuration\n */\n#define GPIO1_FPGA_PRG (0x80000000 >> (53-32)) /* FPGA program pin (ppc output) */\n#define GPIO1_FPGA_CLK (0x80000000 >> (51-32)) /* FPGA clk pin (ppc output) */\n#define GPIO1_FPGA_DATA (0x80000000 >> (52-32)) /* FPGA data pin (ppc output) */\n#define GPIO1_FPGA_DONE (0x80000000 >> (55-32)) /* FPGA done pin (ppc input) */\n#define GPIO1_FPGA_INIT (0x80000000 >> (54-32)) /* FPGA init pin (ppc input) */\n#define GPIO0_FPGA_FORCEINIT (0x80000000 >> 27) /* low: force INIT# low */\n\n/*\n * FPGA interface\n */\n#define FPGA_BA CONFIG_SYS_FPGA_BASE0\n#define FPGA_OUT32(p,v) out_be32(((void*)(p)), (v))\n#define FPGA_IN32(p) in_be32((void*)(p))\n#define FPGA_SETBITS(p,v) out_be32(((void*)(p)), in_be32((void*)(p)) | (v))\n#define FPGA_CLRBITS(p,v) out_be32(((void*)(p)), in_be32((void*)(p)) & ~(v))\n\nstruct pmc440_fifo_s {\n\tu32 data;\n\tu32 ctrl;\n};\n\n/* fifo ctrl register */\n#define FIFO_IE (1 << 15)\n#define FIFO_OVERFLOW (1 << 10)\n#define FIFO_EMPTY (1 << 9)\n#define FIFO_FULL (1 << 8)\n#define FIFO_LEVEL_MASK 0x000000ff\n\n#define FIFO_COUNT 4\n\nstruct pmc440_fpga_s {\n\tu32 ctrla;\n\tu32 status;\n\tu32 ctrlb;\n\tu32 pad1[0x40 / sizeof(u32) - 3];\n\tu32 irig_time; /* offset: 0x0040 */\n\tu32 irig_tod;\n\tu32 irig_cf;\n\tu32 pad2;\n\tu32 irig_rx_time; /* offset: 0x0050 */\n\tu32 pad3[3];\n\tu32 hostctrl; /* offset: 0x0060 */\n\tu32 pad4[0x20 / sizeof(u32) - 1];\n\tstruct pmc440_fifo_s fifo[FIFO_COUNT]; /* 0x0080..0x009f */\n};\n\ntypedef struct pmc440_fpga_s pmc440_fpga_t;\n\n/* ctrl register */\n#define CTRL_HOST_IE (1 << 8)\n\n/* outputs */\n#define RESET_EN (1 << 31)\n#define CLOCK_EN (1 << 30)\n#define RESET_OUT (1 << 19)\n#define CLOCK_OUT (1 << 22)\n#define RESET_OUT (1 << 19)\n#define IRIGB_R_OUT (1 << 14)\n\n/* status register */\n#define STATUS_VERSION_SHIFT 24\n#define STATUS_VERSION_MASK 0xff000000\n#define STATUS_HWREV_SHIFT 20\n#define STATUS_HWREV_MASK 0x00f00000\n\n#define STATUS_CAN_ISF (1 << 11)\n#define STATUS_CSTM_ISF (1 << 10)\n#define STATUS_FIFO_ISF (1 << 9)\n#define STATUS_HOST_ISF (1 << 8)\n\n/* inputs */\n#define RESET_IN (1 << 0)\n#define CLOCK_IN (1 << 1)\n#define IRIGB_R_IN (1 << 5)\n\n/* hostctrl register */\n#define HOSTCTRL_PMCRSTOUT_GATE (1 << 17)\n#define HOSTCTRL_PMCRSTOUT_FLAG (1 << 16)\n#define HOSTCTRL_CSTM1IE_GATE (1 << 7)\n#define HOSTCTRL_CSTM1IW_FLAG (1 << 6)\n#define HOSTCTRL_CSTM0IE_GATE (1 << 5)\n#define HOSTCTRL_CSTM0IW_FLAG (1 << 4)\n#define HOSTCTRL_FIFOIE_GATE (1 << 3)\n#define HOSTCTRL_FIFOIE_FLAG (1 << 2)\n#define HOSTCTRL_HCINT_GATE (1 << 1)\n#define HOSTCTRL_HCINT_FLAG (1 << 0)\n\n#define NGCC_CTRL_BASE (CONFIG_SYS_FPGA_BASE0 + 0x80000)\n#define NGCC_CTRL_FPGARST_N (1 << 2)\n\n/*\n * FPGA to PPC interrupt\n */\n#define IRQ0_FPGA (32+28) /* UIC1 - FPGA internal */\n#define IRQ1_FPGA (32+30) /* UIC1 - custom module */\n#define IRQ2_FPGA (64+ 3) /* UIC2 - custom module / CAN */\n#define IRQ_ETH0 (64+ 4) /* UIC2 */\n#define IRQ_ETH1 ( 27) /* UIC0 */\n#define IRQ_RTC (64+ 0) /* UIC2 */\n#define IRQ_PCIA (64+ 1) /* UIC2 */\n#define IRQ_PCIB (32+18) /* UIC1 */\n#define IRQ_PCIC (32+19) /* UIC1 */\n#define IRQ_PCID (32+20) /* UIC1 */\n\n#endif /* __PMC440_H__ */\n" ]
{ "pile_set_name": "Github" }
[ 0.0007198728271760046, 0.0005746659589931369, 0.0006692560855299234, 0.000637053104583174, 0.0005785227986052632, 0.0028902774211019278 ]
0.001012
6
[ "Kavyata …. ", "is knowledge\n\nKavyata …. ", "is knowledge\n\nAfter 7 years teaching beginner’s level tango lessons, I have devised this mnemonic to help students memorize\nthe preparation for, and the execution of, the first step in close embrace tango.", "\n\n** I am going to use “he” for the leader’s part, and “she” for the follower’s part.", "\n\n1) S for SMILE\nBring your smile to the floor and be open to the experience. ", "Nobody likes to dance with a sad or angry person.", "\nNatural selection in the humankind is heavily dependent on the power of the smile!", "\n\n2) S for STANCE\nProject your chest up and forward. ", "Feel how tall you are. ", "Relax and open your chest to your partner.", "\n\n3) S for SEPARATION\nFor a beginning leader, it is common to step on his partner. ", "One way to reduce this problem is\nhaving about 2 to 3 inches between his shoes and hers.", "\n\n4) S for SURROUND\nThis is when you literally surround each other with your arms. ", "The close embrace has many contact areas,\nbut the important ones are:\n\nThe front of your torsos (wherever the contact is, without compromising your stance).", "\n\nHis right bicep with the her left side ribs. ", "This contact area is a reference vertical axis for her\naround which she may hinge depending on his lead.", "\n\nHis forearm and her back (no pressure is required, but this contact defines her “working space.”)", "\n\nHer forearm and his shoulder (or back). ", "No pressure is required, but this contact help her to detect his moves.", "\n\n(optional) Heads contact each other. ", "Again, no pressure required, but this contact helps her to feel his lead.", "\n\nThe goal for him is to make her feel comfortable. ", "She has the final word on how the embrace will be.", "\n\n5) S for SMELL\nThis is the time to enjoy the embrace before the dance. ", "Feel his/her perfume, his/her warm arms, his/her\nfirm embrace, his/her pressure, his/her steadiness, his/her trustfulness. ", "And then fall in love for the next three minutes!", "\n\n6) S for SWING\nBeginning leaders may have hard time finding out what foot she is standing on (she should always be 100% in one foot).", "\nBy swinging his chest side to side, no more than a few inches (without stepping!), ", "he will find out whether her weight\nis on her left or right leg. ", "Swing to more than 2 times.", "\n\n7) S for SINK and STRETCH\nOnce he knows where her weight is, he will initiate a sinking-forward motion of his hips what will project his chest forward\nby less than an inch. ", "This little motion of his chest is enough for her to start stretching her legs in anticipation of his step.", "\nShe should not step before the music hits the beat. ", "This means that his sinking motion has to happen before the beat to give\nher time to stretch and step. ", "This is very important, otherwise you both will dance off-beat (delayed).", "\n\n8) S for STEP\nThis is the consequence of the previous move. ", "It happens because of the sinking/stretching combined with his forward motion.", "\nThe hard part for her is to maintain her chest pressing up and forward while stretching and walking backwards.", "\nThe hard part for him is to maintain a steady chest, with steady speed that won’t send mixed signals to her.", "\n\nThe most standard way to step with your shoes is:\n\nforward walk: heel -> arch -> toe\n\nbackward walk: toe -> arch -> heel\n\nBut there is no rule on how to step other than being “flexible” with you joints (foot joints, knee joint, hip joint).", "\nStiff joints reflect vibrations on your chest that your partner will be annoyed by.", "\n\nHaving said all this, the truth is that the best way to learn tango is by dancing it!", "\nNobody learns swimming without jumping in the pool." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0013362462632358074, 0.0008742814534343779, 0.000692393456120044, 0.011823941022157669, 0.0006373819778673351, 0.21535196900367737, 0.0008296520682051778, 0.1002165824174881, 0.0023193361703306437, 0.11200698465108871, 0.0005778311751782894, 0.0012336346553638577, 0.0008861534879542887, 0.0006076755817048252, 0.33920523524284363, 0.0005993365193717182, 0.0008598656277172267, 0.013109520077705383, 0.0006252623861655593, 0.000629824644420296, 0.0005825315602123737, 0.0005906650912947953, 0.0006119398749433458, 0.0010118179488927126, 0.0007313636015169322, 0.014632602222263813, 0.0007245084270834923, 0.028859881684184074, 0.003853767178952694, 0.00066568044712767, 0.003074887441471219, 0.036744970828294754, 0.0048212334513664246, 0.0007855670992285013, 0.000732221407815814, 0.0007287036278285086, 0.000655531941447407, 0.0027685065288096666, 0.001288932398892939, 0.000846225768327713, 0.0048267957754433155, 0.0006998262251727283, 0.0013191703474149108 ]
0.021302
43
[ "Campagnolo Ghibli Track Disc\n\nPurchase\n\nThe selected item is out of stock, please select a different item or combination\n\nDescription\n\nThe Campagnolo Ghibli Disc Wheel is one of the best disc wheels available for Track Cycling and is designed to excel in the velodrome.", "\n\nWith a legendary pedigree the Ghibli Disc Wheel has stood the test of time, consistently helping great riders achieve their goals over the last seventy-five year, so why not make that next rider you\n\nMaximum aerodynamics, maximum lightness and maximum stiffness, it features a tensile-structure design adapted from aerospace technology that confers exceptional power transmission while maintaining extraordinary lightness.", "\n\nNothing but a time trial between you and glory. ", "The Ghibli Ultra will help you overcome the challenge and put you on the podium. ", "You cannot hide yourself in time trials; there is no group to draft behind and catch your breath.", "\n\nThe rigidity is obtained by using a tensile structure made of aramidic fibre derived from aerospace technology. ", "Aerodynamics and rigidity are at the maximum levels to help force all the power you can generate into the wheel. ", "Ghibli Ultra wheels present an attractive new graphic and adopt the new CULT technology for the road version." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007721558795310557, 0.0008810245781205595, 0.0028501099441200495, 0.0009800913976505399, 0.024821829050779343, 0.000600669183768332, 0.0006568512180820107, 0.0007789895753376186 ]
0.004043
8
[ "'For Dummies' guide publisher, Wiley, seeks piracy trial Published duration 18 April 2012\n\nimage caption Wiley says that over 74,000 copies of its Photoshop guide have been shared\n\nUS publisher John Wiley & Sons is demanding a trial by jury of people accused of copying its books.", "\n\nPapers filed in New York and revealed by the Torrent Freak news site said four defendants were involved.", "\n\nThe firm's lawyer said that he believed this would be the first trial of its kind based on the use of Bittorrent.", "\n\nThe peer-to-peer communications protocol allows users to upload and download files to each others' computers.", "\n\nWiley had previously filed 15 lawsuits to obtain the identities of about 200 people believed to have infringed the copyright of its titles.", "\n\nIt said in papers filed last October that users had \"engaged in the illegal copying and distribution of Wiley's 'For Dummies' books through the peer-to-peer file sharing software known as Bittorrent\".", "\n\nAlthough it said that it was unable to give a precise figure for the amount of revenue lost, it described the sum as \"enormous\".", "\n\nIt noted that one title - Photoshop CS5 All-In-One For Dummies - had been downloaded 74,000 times over a 16-month period. ", "The title is sold for £28.", "\n\nDamages\n\nThe firm signalled that it had tried to settle the cases and that its main intention was to stop the activity and publicise the fact that sharing books illegally denied authors their rightful compensation.", "\n\nWiley's lawyer, William Dunnegan, told the BBC: \"We are asking people who are identified by their ISPs as being copyright infringers to pay the minimum amount due under the Copyright Act as statutory damages. ", "That sum is $750.", "\n\n\"For the most part people are owning up and complying with the law. ", "However, the named defendants have not.\"", "\n\nThe US Copyright Act allows a penalty of up to $150,000 (£94,000) to be imposed per infringement if the accused loses the case.", "\n\nThe Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA) have shied away from trying to sue individual file sharers and have instead focused on forcing ISPs to police the activity.", "\n\nErnesto Van Dersar, editor of Torrent Freak, said that if Wiley's claim made it to trial it would be the first time that evidence against Bittorrent users would have been tested in a US court.", "\n\n\"The problem they have is that their evidence will be based on an IP address which is tied to an internet connection,\" he said." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0008380584185943007, 0.0007795338751748204, 0.0008896208601072431, 0.0006238359492272139, 0.0007407332304865122, 0.0012726366985589266, 0.0006241627270355821, 0.0012516994029283524, 0.0006402599392458797, 0.0006785783916711807, 0.0007118538487702608, 0.002694180700927973, 0.0008365752291865647, 0.0005978226545266807, 0.0009410204365849495, 0.0008539552800357342, 0.0009076051064766943, 0.0008651039097458124 ]
0.00093
18
[ "Securities and Exchange Commission – Corporate & Securities Law Bloghttps://www.corporatesecuritieslawblog.com\nUp-to-date Information on Corporate & Securities LawWed, 22 May 2019 23:20:41 +0000en-UShourly1https://wordpress.org/?v=4.9.10New Effort to Exempt Crypto Currency from Certain SEC, Tax and Other Regulatory Burdenshttps://www.corporatesecuritieslawblog.com/2019/04/tax-digital-unit/\nhttps://www.corporatesecuritieslawblog.com/2019/04/tax-digital-unit/#respondFri, 19 Apr 2019 21:09:19 +0000https://www.corporatesecuritieslawblog.com/?p=3003Continue Reading]]>A new bill, the Token Taxonomy Act was introduced to congress to amend the Securities Act of 1933 and the Securities Exchange Act of 1934 to exclude digital tokens from the definition of a security, to direct the Securities and Exchange Commission to enact certain regulatory changes regarding digital units secured through public key cryptography, to adjust taxation of virtual currencies held in individual retirement accounts, to create a tax exemption for exchanges of one virtual currency for another, to create a de minimis exemption from taxation for gains realized from the sale or exchange of virtual currency for other than cash, and for other purposes.", "\n\nIf passed this will be a huge boost for cryptocurrency.", "\n\nThe bill is pretty technical. ", "Some of the highlights are as follows.", "\n\nFor purposes of the act, the term ‘digital token’ means a digital unit:\n\n(A) that is created—\n\n(i) in response to the verification or collection of proposed transactions;\n(ii) pursuant to rules for the digital unit’s creation and supply that cannot be altered by any single person or persons under common control; or\n(iii) as an initial allocation of digital units that will otherwise be created in accordance with clause (i) or (ii);\n\n(B) that has a transaction history that—\n\n(i) is recorded in a distributed, digital ledger or digital data structure in which consensus is achieved through a mathematically verifiable process; and\n(ii) after consensus is reached, resists modification or tampering by any single person or group of persons under common control;\n\n(C) that is capable of being transferred between persons without an intermediate custodian; and\n\n(D) that is not a representation of a financial interest in a company or partnership, including an ownership interest or revenue share.", "\n\nAmong other things, the bill seeks to preempt state law as follows.", "\n\nNo law, rule, regulation, or order, or other administrative action of any State or any political subdivision thereof—\n\n(A) requiring, or with respect to, registration or qualification of securities, or registration or qualification of securities transactions, shall directly or indirectly apply to a digital token;\n\n(B) shall directly or indirectly prohibit, limit, or impose any conditions upon the use of—\n\n(i) with respect to a digital token, any disclosure document concerning an offer or sale of a digital token that is prepared by or on behalf of a person developing, offering, or selling a digital token; or\n(ii) any proxy statement, report to digital token-holders, or other disclosure document relating to a digital token or a person developing, offering, or selling a digital token;\n\n(C) shall directly or indirectly prohibit, limit, or impose conditions, based on the merits of a digital token offering or a person developing, offering, or selling a digital token, upon the offer or sale of any digital token; or\n\n(D) shall directly or indirectly require the filing of any notices or other documents, or the assessment of any fees, with respect to digital tokens or digital token transactions.", "\n\nAdditionally, states and political subdivisions thereof shall retain jurisdiction under the laws of such State to investigate and bring enforcement actions with respect to fraud or deceit, or unlawful conduct by any person, in connection with digital tokens or digital token transactions.", "\n\nAnother important provision of the bill treats certain exchanges as non-taxable. ", "The bill proposes to amend the Internal Revenue Code to state that exchange of virtual currency (as defined) shall be treated as if such exchange were an exchange of real property; that Gross income shall not include gain (up to $600) from the sale or exchange of virtual currency for other than cash or cash equivalents.", "\n\nIt is too early to tell whether this bill has a chance of passing. ", "If it does, it will be historic.", "\n\n]]>https://www.corporatesecuritieslawblog.com/2019/04/tax-digital-unit/feed/0United States Supreme Court Holds That Knowing Dissemination of False Statements Made by Others Can Constitute Primary “Scheme Liability” In Violation of Rule 10b-5(a) and (c)https://www.corporatesecuritieslawblog.com/2019/04/false-statements-violation/\nhttps://www.corporatesecuritieslawblog.com/2019/04/false-statements-violation/#respondMon, 01 Apr 2019 17:29:38 +0000https://www.corporatesecuritieslawblog.com/?p=2999Continue Reading]]>In Lorenzo v. Securities & Exchange Comm., ", "No. ", "17-1077, 2019 WL 1369839 (U.S. Mar. 27, 2019), the Supreme Court of the United States (Breyer, J.) held that an individual who did not “make” a false or misleading statement within the meaning of Janus Capital Group, Inc. v. First Derivative Traders, 564 U.S. 135 (2011) (blog article here), but instead disseminated it to potential investors with intent to defraud, can be held to have employed a scheme to defraud and/or engaged in an act, practice or course of business to defraud in violation of subsections (a) and (c) of Securities and Exchange Commission (“SEC”) Rule 10b-5, 17 C.F.R. § 240.10b-5. ", "This decision broadens the scope of primary liability under Rule 10b-5 beyond those who make false and misleading statements to include those who knowingly “disseminate” (i.e., communicate to potential investors) such false or misleading statements. ", "Although this decision involved an SEC enforcement action, it is likely to be invoked by plaintiffs in private securities litigation to expand the scope of named defendants beyond the issuer and individuals directly responsible for making public statements on the issuer’s behalf.", "\n\nThe relevant facts were not in dispute. ", "The defendant represented himself as “Vice President-Investment Banking” for a registered broker-dealer in Staten Island, New York. ", "In 2009, he sent emails to prospective investors at the direction of his boss, who supplied the content and approved the messages. ", "Those emails contained false and misleading information about the client’s business. ", "Defendant allegedly knew that.", "\n\nThe SEC brought an enforcement action. ", "It determined that defendant violated Rule 10b-5 (among other provisions of the federal securities laws), issued a $15,000 fine and bar order. ", "Defendant appealed. ", "He argued, inter alia, that he could not be held liable under Rule 10b-5(b), which prohibits (in pertinent part) “mak[ing] any untrue statement of a material fact,” because he was not the “maker” of the statements in the emails at issue within the meaning of Janus Capital. ", "The United States Court of Appeals for the District of Columbia Circuit agreed. ", "SeeSecurities & Exchange Comm. ", "v. Lorenzo, 872 F.3d 578 (D.C. Cir. ", "2017). ", "The Court of Appeals nevertheless held that defendant’s conduct violated Rule 10b-5(a) and (c) which prohibit (in pertinent part) “employ[ing] any device, scheme, or artifice to defraud” and “engag[ing] in any act, practice, or course of business which operates or would operate as a fraud or deceit.” ", "The D.C. Circuit’s decision conflicted with decisions in other Circuits holding that alleged misconduct involving misstatements in violation of Rule 10b-5(b) cannot also give rise to “scheme liability” under Rule 10b-5(a) and (c). ", "See, e.g., WPP Luxembourg Gamma Three Sarl v. Spot Runner, Inc., 655 F.3d 1039 (9th Cir. ", "2011).", "\n\nThe Supreme Court affirmed the decision of the D.C. Circuit. ", "In its ruling, the six-justice majority (Kavanaugh, J., did not participate) relied heavily upon the plain language of the Rule and dictionary definitions of its terms. “", "It would seem obvious that the words in [Rule 10b-5(a) and (c)] are, as ordinarily used, sufficiently broad to include within their scope the dissemination of false or misleading information with the intent to defraud.” ", "The Court also seemed influenced by its view of the egregiousness of the facts of the case:\n\n[W]e see nothing borderline about this case, where the relevant conduct (as found by the [SEC]) consists of disseminating false or misleading information to prospective investors with the intent to defraud. ", "And while one can readily imagine other actors tangentially involved in dissemination—say, a mailroom clerk—for whom liability would typically be inappropriate, the petitioner in this case sent false statements directly to investors, invited them to follow up with questions, and did so in his capacity as vice president of an investment banking company.", "\n\nThe dissent (Thomas, J., in which Gorsuch, J., joined) argued that the majority’s decision undermined the limitations on the scope of securities liability established in, among other cases, Janus Capital and Central Bank of Denver, N. A. v. First Interstate Bank of Denver, N. A., 511 U.S. 164 (1994) (no private right of action for aiding and abetting securities fraud). ", "The majority commented that “we can assume that Janus would remain relevant (and pre­clude liability) where an individual neither makes nor disseminates false information—provided, of course, that the individual is not involved in some other form of fraud” (emphasis in original). ", "With respect to the blurring of the distinction between primary and secondary (aiding and abetting) liability, the majority acknowledged an overlap between the two types of liability:\n\nThose who disseminate false statements with intent to defraud are primarily liable under Rules 10b-5(a) and (c) . . . , ", "even if they are secondarily liable under Rule 10b-5(b). [", "Defendant] suggests that classifying dissemination as a primary violation would inappropriately subject peripheral players in fraud (including him, naturally) to substantial liability. ", "We suspect the investors who re­ceived [his] e-mails would not view the deception so favorably. ", "And as Central Bank itself made clear, even a bit participant in the securities markets “may be liable as a primary violator under [Rule] 10b-5” so long as “all of the requirements for primary liability . . . ", "are met.”", "\n\nThe dissent also noted that the Court’s interpretation that Rule 10b-5(a) and (c) encompasses conduct addressed more directly in Rule 10b-5(b) effectively rendered subsection (b) superfluous. ", "Here, too, the majority seemed unconcerned, given the breadth of the plain language of the Rule and the salutary purposes of the federal securities laws.", "\n\nThe Court’s decision in Lorenzo expands the scope of primary liability under Rule 10b-5. ", "Although the majority did limit the expansion in scope in this case to those who “disseminate” false statements, plaintiffs in private securities litigation likely will invoke Lorenzo as a basis to add as defendants individuals and entities alleged to have participated in the fraudulent scheme under Rule 10b-5(a) and (c) through activities besides “dissemination.” ", "We note that although the Court did not explain the legal basis for which it would be “inappropriate” to hold a “mailroom clerk” or other “tangential” persons primarily liable for disseminating false or misleading statements made by others, that basis would appear to be the separate requirement set forth in Stoneridge Investment Partners, LLC v. Scientific-Atlanta, Inc., 552 U.S. 148 (2008) (blog article here), that investors plead and prove they (or the market generally) were aware of the deceptive conduct at issue, i.e., they knew of and relied upon the fraudulent acts of the “mailroom clerk” or other “tangential” participants. ", "Lower courts will need to grapple with these issues left open by the Supreme Court’s decision in this case.", "\n\n]]>https://www.corporatesecuritieslawblog.com/2019/04/false-statements-violation/feed/0With the SEC, Cooperation is Keyhttps://www.corporatesecuritieslawblog.com/2019/03/cooperation-gladius/\nhttps://www.corporatesecuritieslawblog.com/2019/03/cooperation-gladius/#respondFri, 08 Mar 2019 18:29:14 +0000https://www.corporatesecuritieslawblog.com/?p=2988Continue Reading]]>As an expensive “slap on the wrist,” the Securities and Exchange Commission (“SEC” or the “Commission”) recently concluded that approximately $12.7 million worth of funds raised in a 2017 Initial Coin Offering (“ICO”) by Gladius Network LLC (“Gladius”) were part of an unregistered securities offering, and all proceeds must be returned to investors. ", "However, the penalty to Gladius for their regulatory violations was zero.", "\n\nIn recent years, the SEC has brought a number of actions involving offerings of digital asset securities including ICOs. ", "These actions have principally focused on two important questions. ", "First, the SEC examines when is a digital asset a “security” for purposes of the federal securities laws, and if the digital asset is a “security,” the SEC examines what registration requirements apply, if any. ", "After the Commission warned in its Decentralized Autonomous Organization (DAO) Report of Investigation that ICOs can be securities offerings, Gladius raised approximately $12.7 million in digital assets. ", "Gladius did not register its ICO under the federal securities laws. ", "Moreover, the ICO did not qualify for an exemption from registration requirements. ", "However, in the summer of 2018, Gladius proactively elected to self-report to the SEC’s enforcement staff and expressed an interest in taking prompt remedial steps, then cooperated with the SEC investigation. ", "Unlike a number of other unregistered ICO enforcement actions, the SEC imposed no penalties because Gladius self-reported its conduct, agreed to compensate investors and agreed to register the tokens as a class of securities.", "\n\nIn other cases where proactive measures or cooperation with regulators were absent, the SEC enforced much harsher penalties. ", "For example, two former executives behind the AriseCoin ICO were stopped by the SEC in 2018 and ordered in federal court to pay fines of nearly $2.7 million. ", "Moreover, the then-CEO and then-COO responsible for the AriseCoin ICO were both prohibited from serving as officers or directors of public companies or participating in any future offerings of digital securities. ", "The harsh penalties came after an SEC investigation, wherein there was little cooperation by AriseCoin. ", "In fact, the SEC sought emergency relief to prevent investors from being victimized by the many misrepresentations throughout the AriseCoin ICO, and halted hundreds of millions in investment.", "\n\nThe SEC will impose penalties, even in ICOs where fraudulent misrepresentation is absent. ", "Last year, the SEC imposed large civil penalties solely for ICO securities offering registration violations against two companies, CarrierEQ Inc. (Airfox) and Paragon Coin Inc. Both conducted ICOs, like Gladius, after the SEC warned that ICOs can be securities offerings. ", "Airfox, a Boston-based startup, raised approximately $15 million worth of digital assets. ", "Paragon, an online entity, raised approximately $12 million worth of digital assets. ", "Neither Airfox nor Paragon registered their ICOs pursuant to the federal securities laws, nor did they qualify for an exemption to the registration requirements. ", "The SEC imposed $250,000 penalties against each company and required actions to compensate and reimburse harmed investors who purchased tokens in the illegal offerings.", "\n\nSince 2017, the number of new ICOs has steadily increased through 2018. ", "However, as one might expect with the increasing competition, the amount of capital raised by each ICO has, on average, decreased. ", "In 2018, the average amount of funds collected by a single ICO was $11.52 million. ", "This is a sharp decrease from the average amount of funds collected by a single ICO in 2017, which was $24.35 million. ", "Even after a dramatical downsizing, the crypto market is still larger than at the beginning of the upward trend in 2017, and many are focusing on alternative ways to finance the crypto industry in light of the fact that the SEC has not published new rules regarding digital securities or security tokens to address gray areas in this time of uncertainty.", "\n\nThe trend in leading crypto market exchanges is backing Security Token Offerings (STOs). ", "Unlike an ICO, a security token denotes an investment contract into an underlying investment asset, such as stocks, bonds, funds or real estate investment trusts. ", "When one invests in traditional stocks, ownership information is written on a document and a digital certificate is issued. ", "For STOs, the process remains the same, except the transaction is recorded on a blockchain and a security token is issued. ", "STOs offer the advantage of regulatory predictability to both traditional and crypto investors because security tokens are straightforwardly classified and fit into exhibiting regulatory frameworks in place for traditional securities. ", "With STOs, all parties have an increased likelihood of avoiding regulatory purgatory, making STOs more attractive to most investors and issuers.", "\n\nThe era of mega ICOs is coming to a slow halt. ", "Companies which have successfully conducted an ICO in the past would be wise to proactively correct any regulatory missteps, including the failure to register, make proper disclosures or any other litany of violations. ", "Careful corrections to past ICOs may be necessary to avoid potentially enormous regulatory fines, as exemplified by the relative leniency the SEC showed with respect to Gladius based on its self-reporting and cooperative actions with the SEC enforcement staff.", "\n\nItem 401(e) of Regulation S-K requires “a brief discussion of the specific experience, qualifications, attributes or skills that led to the conclusion that the person should serve as a director.” ", "Item 407(c)(2)(vi) of Regulation S-K requires disclosure of how a company’s board (or nominating committee) implements policies that it follows with regard to the consideration of diversity in identifying director nominees.", "\n\nIn new CDIs Questions 116.11 and 133.13, the SEC stated that, to the extent the board or nominating committee, in determining the specific experience, qualifications, attributes, or skills of an individual for board membership, considered any such self-identified diversity characteristics of a director who consented to the disclosure of those characteristics, they would expect the company to identify those characteristics and discuss how they were considered. ", "The SEC also stated that they expect that any description of diversity policies followed by the company would include a discussion of how the company considers the self-identified diversity attributes of a nominee, as well as any other qualifications its diversity policy takes into account, such as diverse work experiences, military service, or socio-economic or demographic characteristics.", "\n\nWhile the SEC does not define diversity, permitting companies to define it in ways they consider appropriate, all public companies should be prepared to be more transparent in their diversity discussions in their SEC filings.", "\n\n]]>https://www.corporatesecuritieslawblog.com/2019/02/sec-issues-new-guidance-on-diversity-disclosure-requirements/feed/0Expansion of Regulation A to Reporting Companies: Increased Alternatives Now Available to Public Companies Seeking to Raise Capital or for Mergers and Acquisitionshttps://www.corporatesecuritieslawblog.com/2019/02/expansion-regulation-a/\nhttps://www.corporatesecuritieslawblog.com/2019/02/expansion-regulation-a/#respondFri, 01 Feb 2019 16:49:12 +0000https://www.corporatesecuritieslawblog.com/?p=2969Continue Reading]]>On December 19, 2018, the SEC announced that it had adopted final rules that allow reporting companies to rely on the Regulation A exemption from registration for their securities offerings.[1]\n\nUntil recently, the only way that companies subject to the reporting requirements of Section 13 or Section 15(d) of the Securities Exchange Act of 1934 (the “Exchange Act”) have been able to access the capital markets has been through a private placement in public equity (PIPE) or a traditional registered public offering. ", "PIPE’s have presented a number of issues regarding confidentiality, illiquidity of securities, limitations on offering size[2] and greater pricing discounts, whereas registered public offerings can be both time-consuming and costly. ", "These issues are particularly magnified for smaller public companies that may not be eligible to use S-3 shelf registrations.", "\n\nIn announcing the new rules, SEC Chairman, Jay Clayton, stated “[t]he amended [Regulation A] rules will provide reporting companies additional flexibility when raising capital.” ", "This additional flexibility will assist reporting companies in raising capital by reducing costs and streamlining the registration process similar to the streamlined process of registering securities on a Form S-3.", "\n\nRegulation A provides an exemption from the registration requirements of the Securities Act of 1933, as amended, for offerings of securities that do not exceed $50 million in a 12 month period, and was only initially available to companies that were not subject to the reporting requirements of the Exchange Act.", "\n\nReporting companies may want to consider using Regulation A for reasons including, but not limited to the following:\n\nTier 2 issuers that are not listed on national exchanges are eligible for blue sky preemption. ", "This means that OTC listed issuers do not have to make blue sky filings on a state by state basis for a public offering – this is particularly significant for smaller (OTC listed) issuers that traditionally were only able register their secondary offerings in a very limited number of states;\n\nTier 2 issuers may solicit investors such as qualified institutional buyers, accredited investors and non-accredited investors before the SEC qualifies an offering circular which permits an issuer to gauge investor interest prior to launching the offering;\n\nSubject to certain regulations, securities issued in a Regulation A offerings are unrestricted and freely tradeable; and\n\nRegulation A offers cost and time savings compared to traditional offerings. ", "In addition to amending 17 CFR 230.251, the SEC will eliminate the reporting requirements set forth in 17 CFR 230.257 so that Tier 2 issuers will be deemed to meet the periodic and current reporting requirements under Regulation A if they have otherwise complied with the reporting requirements of the Exchange Act.", "\n\nPrior to the new rules, Regulation A has been used for a number of notable initial public offerings, such as Elio Motors, Inc., Myomo, Inc., Chicken Soup for the Soul Entertainment, Inc. and ShiftPixy, Inc., among others. ", "Each of these issuers were able to utilize Regulation A to sell their securities and list on a national securities exchange, such as Nasdaq and the New York Stock Exchange; however, not all issuers that have used Regulation A as an IPO avenue (mini-IPO) have been successful after listing to national exchanges. ", "This could be due to a number of reasons, including, but not limited to: the fact that these Regulation A offerings were conducted on a best-efforts basis (rather than on a firm commitment basis), and, as such, did not include an over-allotment option which would otherwise help in market stabilization; the valuation of these companies; the performance of these companies; and limited liquidity in the after market As a result of the performance and post-IPO trading of some companies which have used the mini-IPO route, we believe Nasdaq and the New York Stock Exchange have become reluctant to list companies that do not use the traditional IPO route.", "\n\nWhile issuers have generally used Regulation A primarily as a way to conduct an IPO, companies should now consider the variety of ways that they may utilize and take advantage of the benefits of Regulation A such as the following:\n\nFollow-on Offerings. ", "After completing its IPO, an issuer may offer additional securities to the public using one of the following types of follow-on offerings\n\n◦ Primary Offering. ", "A primary offering is an offering in which an issuer sells its securities directly to the public.", "◦ Secondary Offerings. ", "A secondary offering is an offering in which selling stockholders of the issuer sells securities rather than the issuer selling its own securities. ", "Although issuers do not receive any proceeds from the sale of secondary offerings, the purpose of such offerings is to provide liquidity to stockholders of the issuer.", "\n\nRights Offerings. ", "A rights offering is an offering by the issuer to existing stockholders whereby such existing stockholders purchase additional securities of the issuer in proportion to their existing holdings. ", "By conducting a rights offering, issuers are able to raise capital with little marketing effort and can forego large underwriting fees, and current stockholders are afforded the opportunity to maintain their percentage ownership in the issuer without being diluted by new stockholders.", "\n\nMergers and Acquisitions. ", "The Staff of the SEC has indicated in Compliance & Disclosure Interpretation 182.07 that Regulation A can be relied upon by an issuer for business combination transactions such as mergers or acquisitions. ", "This means that issuers can register securities using an offering circular rather than Form S-4 which is a very costly and time-consuming process. ", "For additional information on using Regulation A for mergers and acquisitions, see Regulation A May Provide Useful Alternative to Form S-4 Registration for Public Companies Doing Smaller M&A Deal.", "\n\nInitial Coin Offerings. ", "In addition to the foregoing, while there have been discussions with respect to issuers considering using Regulation A for conducting initial coin offerings as a way to reach a large audience of potential investors which may include both accredited and non-accredited investors, to date, no such offerings have been approved by the SEC.", "\n\nIssuers should consult with securities counsel for additional information about the uses of Regulation A as a way for both reporting and non-reporting companies to tap into the public markets.", "\n\nPlease note that the amendments to Regulation A will become effective upon publication in the Federal Register, which has not occurred as of the date this article was posted.", "\n\n[2] In certain circumstances, issuers listed on Nasdaq may not sell securities through a PIPE without prior stockholder approval if, as a result of such PIPE, the issuer would issue securities in excess of 20% of the issuer’s then outstanding common stock or voting power. ", "See Nasdaq Rule 5635(d).", "\n\n]]>https://www.corporatesecuritieslawblog.com/2019/02/expansion-regulation-a/feed/0The Impact of the Government Shutdown on S.E.C. Enforcementhttps://www.corporatesecuritieslawblog.com/2019/01/impact-government-shutdown-sec-enforcement/\nhttps://www.corporatesecuritieslawblog.com/2019/01/impact-government-shutdown-sec-enforcement/#respondThu, 24 Jan 2019 20:01:44 +0000https://www.corporatesecuritieslawblog.com/?p=2955Continue Reading]]>The federal government partial shutdown, now entering its second month, has had a severe impact upon the Securities and Exchange Commission, and its Division of Enforcement in particular, with enforcement activity coming to nearly a complete halt.", "\n\nFunding for the SEC lapsed in December 2018. ", "During a lapse of appropriations, the Anti-deficiency Act (31 USC §1341, et seq.) ", "restricts the conduct of agencies’ staff except in very limited circumstances, including “emergencies involving the safety of human life or the protection of property.” ", "Accordingly, the SEC immediately furloughed the majority of its personnel, leaving only a skeleton staff of supervisors to attend to ongoing emergency matters. ", "Furloughed staff are prohibited from working until an appropriation has been enacted, and cannot even respond to email or voice mail messages.", "\n\nThe result is that the Division of Enforcement has virtually gone dark. ", "All pending administrative proceedings pending before either an administrative law judge or the Commission have been stayed. ", "The Division also has halted: (1) all investigative work, including commencing investigations and conducting investigative testimony, except as necessary for the protection of property; (2) pursuing the collection of any delinquent debts or work to distribute funds to harmed investors; and, (3) nonemergency examinations and inspections and related follow-up.", "\n\nA small number of (unpaid) Division of Enforcement supervisory staff remain on duty to handle emergency enforcement matters, including temporary restraining orders and/or imminent deadline concerns, or investigations of ongoing fraud or misconduct that poses a threat of imminent harm to investors. ", "The Division of Enforcement also continues to monitor for submissions to its Tips, Complaints, and Referrals system that appear to allege conduct that may pose a risk of imminent harm. ", "The only litigation actions that appear to be proceeding are those necessary to comply with schedules that have been set by domestic and foreign courts and/or to avoid a delay that would prejudice the Commission’s litigation position (such as the running of a statute of limitation).", "\n\nWhile the Division in a busy month might commence or settle several dozen enforcement actions a month, only a single action has been commenced in 2019. ", "If the shutdown drags on for an extended period of months, risks to market participants from bad actors could increase. ", "As the old proverb goes, when the cat is away, the mice will play.", "\n\n]]>https://www.corporatesecuritieslawblog.com/2019/01/impact-government-shutdown-sec-enforcement/feed/0The Effects of the SEC Shutdown on the Capital Marketshttps://www.corporatesecuritieslawblog.com/2019/01/effects-sec-shutdown-on-the-capital-markets/\nhttps://www.corporatesecuritieslawblog.com/2019/01/effects-sec-shutdown-on-the-capital-markets/#respondFri, 18 Jan 2019 23:47:26 +0000https://www.corporatesecuritieslawblog.com/?p=2952Continue Reading]]>Although EDGAR continues to accept filings, the government shutdown has now eclipsed its 28th day and the SEC continues to operate with limited staff which is having a crippling effect on the ability of many companies to raise money in the public markets. ", "This is particularly due to the fact that the SEC is unable to perform many of the critical functions during the lapse in appropriations, including the review of new or pending registration statements and/or the declaration of effectiveness of any registration statements.", "\n\nAlthough Section 8(a) of the Securities Act of 1933, as amended, creates an avenue whereby a registration statement will automatically become effective 20 calendar days after the filing of the latest pre-effective amendment that does not include “delaying amendment” language, many companies seeking to raise money in the public markets, including through an initial public offering, are reluctant to use this route for the following reasons. ", "First, any pre-effective amendment which removes the “delaying amendment” language must include all information required by the form including pricing information relating to the securities being sold as Rule 430A is not available in the absence of a delaying amendment. ", "This means that companies must commit to pricing terms at least 20 days in advance of the offering which may be difficult due to the volatility in the markets. ", "In the event pricing terms change, companies must file another pre-effective amendment which restarts the 20-day waiting period. ", "Second, companies run the risk that the SEC may, among other things, issue a stop order. ", "Finally, companies may run into issues with FINRA, Nasdaq or the NYSE as these organizations may not agree to list securities on such exchanges without the SEC confirming that they have reviewed and cleared such filing and affirmatively declared the registration statement effective. ", "These risks, among others, associated with using Section 8(a) as a means by which a registration statement can become effective after the 20-day waiting period, seem to outweigh the benefits of pursuing this alternative despite the fact that many companies with a December 31st year end will soon be required to file audited financial statements for the year ended December 31, 2018 pursuant to Rule 3-12 of Regulation S-X which will further delay the process resulting in an increase in both cost and time related to the offering.", "\n\nAlthough companies seeking to raise money in the public markets, including through initial public offerings or shelf registration statements, may be reluctant to rely upon Section 8(a), some companies have already chosen to remove the “delaying amendment” language. ", "For example, some companies which appear to have cleared all comments from the SEC prior to the partial government shutdown have elected to remove the “delaying amendment” and proceed with their offerings after the 20-day waiting period. ", "In addition, other companies conducting rights offerings, such as Trans-Lux Corporation and Roadrunner Transportation Systems, Inc., are also relying on Section 8(a) as a means of raising money. ", "Finally, some special purpose acquisition companies (“SPACs”), including Andina Acquisition Corp. III, Gores Metropoulous, Inc., Pivotal Acquisition Corp. and Wealthbridge Acquisition Limited, are among the issuers that are using Section 8(a) as a way to procced with their offerings during this partial government shutdown since SPACs, in particular, are not sensitive to price volatility in the markets because they have no operations.", "\n\nCompanies and underwriters that may be considering filing a pre-effective amendment to a registration statement to take advantage of Section 8(a) of the Securities Act should discuss the effects of removing the “delaying amendment” language with securities counsel before proceeding down such path.", "\n\n]]>https://www.corporatesecuritieslawblog.com/2019/01/effects-sec-shutdown-on-the-capital-markets/feed/0Regulation A May Prove Useful Alternative to Form S-4 Registration for Public Companies Doing Smaller M&A Dealshttps://www.corporatesecuritieslawblog.com/2019/01/regulation-form-s4-registration-securities-act/\nhttps://www.corporatesecuritieslawblog.com/2019/01/regulation-form-s4-registration-securities-act/#respondTue, 15 Jan 2019 16:58:23 +0000https://www.corporatesecuritieslawblog.com/?p=2948Continue Reading]]>Last month, the U.S. Securities and Exchange Commission (“SEC”) announced it had adopted final rules to amend certain parts of Regulation A[1] promulgated under the Securities Act of 1933 (“Securities Act”).", "\n\nThese new rules implement changes as directed by the Economic Growth, Regulatory Relief, and Consumer Protection Act[2] signed into law on May 24, 2018 by President Donald J. Trump. ", "There are two conceptual changes, both affecting Regulation A as it applies to reporting companies.", "\n\nThe first change is to remove the existing requirement that an issuer not be subject to the reporting requirements of the Securities Exchange Act of 1934 (“Exchange Act”) immediately prior to the offering.", "\n\nThe second change is to eliminate the periodic and current reporting requirements of Rule 257, otherwise required for an issuer completing a Tier 2 offering under Regulation A, for any issuer that is subject to the reporting requirements of the Exchange Act, if the issuer is in compliance with its obligations thereunder.", "\n\nAs so amended, Regulation A could prove particularly useful to reporting companies that seek to use stock consideration ($50 million or less in a Tier 2 offering) to acquire a target company with many equity holders in a transaction that would otherwise require registration on Form S-4 due to the unavailability of Rule 506 of Regulation D or another exemption from registration under the Securities Act.", "\n\nThe SEC Staff has confirmed in published guidance (Compliance & Disclosure Interpretation, Question 182.07) that Regulation A may be relied upon by an issuer for business combination transactions, such as a merger or acquisition.", "\n\nAdvantages of Regulation A over Form S-4 Registration\n\nAs with a registered offering on Form S-4, the securities to be issued in a Regulation A offering will be unrestricted and freely tradeable under the Securities Act, though issuers and recipients of the securities will need to be mindful of transfer restrictions under Rule 144 in respect of any “control securities.”", "\n\nIn addition, there are several advantages to relying on Regulation A for an offering of securities related to a business combination instead of registering the offering on Form S-4:\n\nIncorporation by reference of information with respect to the issuer.", "\n\nTiming and SEC Staff comments.", "\n\nRelaxed exhibit requirements.", "\n\nFederal preemption of state blue sky laws.", "\n\nNo strict liability under Section 11 of the Securities Act.", "\n\nGreater flexibility to communicate with target company shareholders.", "\n\nIntegration safe harbor.", "\n\nPotential greater flexibility with lock-up agreements.", "\n\nNo filing fee.", "\n\nDisadvantages of Regulation A over Form S-4 Registration\n\nAlthough there are a number of advantages to using Regulation A over Form S-4, there are a few disadvantages as well as some other issues to consider:\n\nRegulation A eligibility restrictions.", "\n\n$50 million limit.", "\n\nLimitation on sales of securities not listed on a national securities exchange.", "\n\nThe expansion of Regulation A to reporting companies may significantly reduce the compliance obligations under the Securities Act in respect of securities offerings made in connection with business combination transactions, particularly for small cap companies acquiring smaller companies with diverse shareholder bases that previously would have otherwise required an expensive and time-consuming registration on Form S-4. ", "It will be interesting to see how practice develops in this area.", "\n\n[Please note: these final rules will become effective upon publication in the Federal Register, which has not occurred as of the date this article was posted.]", "\n\n]]>https://www.corporatesecuritieslawblog.com/2019/01/regulation-form-s4-registration-securities-act/feed/0Recent Development in Regulatory Enforcement of Digital Securitieshttps://www.corporatesecuritieslawblog.com/2018/09/enforcement-digital-securities-tokens/\nhttps://www.corporatesecuritieslawblog.com/2018/09/enforcement-digital-securities-tokens/#respondThu, 13 Sep 2018 18:16:12 +0000https://www.corporatesecuritieslawblog.com/?p=2928Continue Reading]]>In a flurry of activity and confluence of developments, the SEC, FINRA and a Brooklyn federal judge have commenced actions and made rulings that continue to define the regulatory framework and obligations surrounding the sale and trading of digital securities, whether they are labeled as cryptocurrencies or tokens.", "\n\nSEC Cease and Desist Order\n\nOn Tuesday, September 11, 2018, the Securities and Exchange Commission entered its first Administrative Order against a hedge fund manager that invested in digital assets, or cryptocurrencies, claiming that he violated the Securities Act of 1933 and the Investment Company Act of 1940 by failing to register with the SEC, and the Investment Advisers Act of 1940, which makes it unlawful for any investment adviser to a pooled investment vehicle to make any untrue statement of a material fact or to omit to state a material fact necessary to make the statements made, in the light of the circumstances under which they were made, not misleading, to any investor or prospective investor in the pooled investment vehicle.", "\n\nAlso on Tuesday, September 11, 2018, The Financial Industry Regulatory Authority filed its first disciplinary action involving cryptocurrencies against a Massachusetts broker, claiming that he fraudulently sold HempCoins without registering them with the Securities and Exchange Commission, and that he engaged in the offer and sale of unregistered securities in contravention of Section 5 of the Securities Act of 1933 and thereby in violation of FINRA Rule 2010. ", "The FINRA complaint can be found here.", "\n\nFederal District Court Ruling on Motion to Dismiss\n\nFinally, on Tuesday, September 11, 2018, a Brooklyn federal judge ruled that an action against a defendant that is alleged to have engaged in a fraudulent offering of virtual securities related to two Initial Coin Offerings could not be dismissed on the grounds that the digital tokens were not securities, but rather that the question of whether the tokens were securities was one that a jury would have to decide. ", "This case is one of the first to consider the applicability of federal securities laws in a criminal case involving digital securities or tokens. ", "The Memorandum and Order on the Motion to Dismiss can be found here.", "\n\nAdditional SEC Cease and Desist Order\n\nIn addition to the foregoing, there was also one more noteworthy item involving another SEC Administrative Order that involved the settlement by TokenLot LLC, an ICO “superstore”, in which they were alleged to have acted as an unregistered broker-dealer. ", "TokenLot this was a platform that was touted as a way to purchase and engage in secondary trading of digital securities. ", "The action was based upon claims that Token Lot violated the Securities Exchange Act of 1934 due to their failure to register as a broker-dealer while their profits were made from facilitating trades and from a percentage of funds raised during their offerings. ", "The individuals involved agreed to industry and penny stock bars as well as bars from serving or acting as an employee, director or member of an investment company or investment adviser. ", "The Administrative Order can be found here.", "\n\n]]>https://www.corporatesecuritieslawblog.com/2018/09/enforcement-digital-securities-tokens/feed/0Airdrop of Crypto Tokens Hits Regulatory Flakhttps://www.corporatesecuritieslawblog.com/2018/08/crypto-tokens-regulatory-tomahawk/\nhttps://www.corporatesecuritieslawblog.com/2018/08/crypto-tokens-regulatory-tomahawk/#respondTue, 28 Aug 2018 18:07:09 +0000https://www.corporatesecuritieslawblog.com/?p=2919Continue Reading]]>On August 14, 2018, the U.S Securities and Exchange Commission (“SEC”) issued a cease and desist order (the “Tomahawk Order”) against Tomahawk Exploration LLC (“Tomahawk”) and David Thompson Laurance (“Laurance”) for their actions in connection with an initial coin offering of digital assets called “Tomahawkcoins” or “TOM” (the “Tomahawk ICO”). ", "Tomahawk and Laurance’s actions were problematic for the same reasons cited by the SEC in other recent orders related to digital assets (e.g. the Munchee Order). ", "Consistent with such orders, the SEC determined that Tomahawkcoins are securities because they constitute investment contracts under the “Howey” test. ", "However, what makes the Tomahawk Order particularly noteworthy are the lessons to be gleaned regarding cryptocurrency “airdropping.”", "\n\nWhat is Airdropping?", "\n\n“Airdropping” is the distribution of tokens or cryptocurrencies without monetary payment from the token recipient. ", "The practice of airdropping tokens became prevalent in late 2017 and early 2018 when ICOs began to face stricter regulatory scrutiny. ", "Token airdrops or “free crypto” distributions have been particularly popular in conjunction with ICO marketing campaigns, such as the Bounty Program (“Bounty Program”) offered in connection with the Tomahawk ICO. ", "As part of its Bounty Program, Tomahawk dedicated 200,000 Tomahawkcoins, and offered third-parties between 10-4,000 Tomahawkcoins for activities such as making requests to list Tomahawkcoins on token trading platforms, promoting the coins on blogs and other online forums, and creating professional images, videos or other promotional materials. ", "Ultimately, Tomahawk airdropped more than 80,000 Tomahawkcoins to approximately 40 wallet holders as part of its Bounty Program.", "\n\nAirdropping as a Section 5 Violation\n\nUnder Section 5 of the Securities Act of 1933, as amended (the “Securities Act”), any offer and sale of securities must be registered with the SEC or exempt from registration. ", "Section 5 regulates the timeline and distribution process for issuers who offer securities for sale. ", "In the Tomahawk Order, the SEC found that Tomahawk’s Bounty Program constituted an offer and sale of securities because “[Tomahawk] provided TOM to investors in exchange for services designed to advance Tomahawk’s economic interests and foster a trading market for its securities.” ", "Despite not receiving payment in exchange for the airdropped Tomahawkcoins, the SEC nonetheless found that the airdrops made in connection with the Bounty Program constituted the offer and sale of securities: “a ‘gift’ of a security is a ‘sale’ within the meaning of the Securities Act when the donor receives some real benefit…Tomahawk received value in exchange for the bounty distributions, in the form of online marketing…in the creation of a public trading market for its securities.” ", "By offering and selling Tomahawkcoins without having a registration statement filed or in effect with the SEC or qualifying for an exemption from registration, Tomahawk and Laurance were found to be in violation of Sections 5(a) and 5(c) of the Securities Act.", "\n\nPotential Consequences of a Section 5 Violation\n\nIn light of the Tomahawk Order, it is important to understand the potential consequences of a Section 5 violation, which may include the following:\n\nSEC Enforcement Action[1]: In addition to having the power to impose monetary penalties, the SEC can also bar an individual from serving as an officer or director of a public company for a period of several years. ", "Through the Tomahawk Order, the SEC not only imposed a $30,000 penalty (a reduced amount due to Laurance’s inability to pay a civil penalty) but also barred Laurance from acting as an officer or director of a public company or from participating in any offering of a penny stock.", "\n\nRescission Rights: Under Section 12(a)(1) of the Securities Act, purchasers of securities that were sold in violation of Section 5 of the Securities Act have a right of rescission. ", "This right of rescission is essentially a “put right” whereby the purchasers can force the seller of the securities to buy the securities back at cost plus interest.", "\n\nControl Person Liability[2]: Even if a person did not directly take part in the airdrop, under Section 15 of the Securities Act, such person might still face liability. ", "Under Section 15 of the Securities Act, each person who, by or through stock ownership, agency, or otherwise, controls any person who violates Section 5 of the Securities Act, may also be jointly and severally liable for such Section 5 violation.", "\n\nAccounting Consequences: Potential payments in respect of rescission rights may be required to be booked as contingent liabilities under GAAP, which can negatively impact financial statements and the issuer’s ability to comply with financial covenants under bank documents.", "\n\nConclusion\n\nAny company considering airdropping tokens or other digital assets should make sure to work with their securities lawyers to confirm that such actions do not run afoul of federal or state securities laws.", "\n\n[1] Directors and Officers Insurance Policies do often cover these types of claims, but just because someone has car insurance does not mean they should drive recklessly." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006964546046219766, 0.004063001833856106, 0.0006685809348709881, 0.0005788311245851219, 0.0006496155983768404, 0.0006271910388022661, 0.0007318003918044269, 0.0006679145153611898, 0.0006247319397516549, 0.0006466613267548382, 0.0008281485643237829, 0.0005917498492635787, 0.0007949883001856506, 0.0013785824412479997, 0.0006719569209963083, 0.0007184246787801385, 0.0005683629424311221, 0.000638188561424613, 0.0006235059699974954, 0.0005308570107445121, 0.0008824083488434553, 0.0006628805422224104, 0.0009105010540224612, 0.0008157234406098723, 0.000736712128855288, 0.0011472463374957442, 0.0006703617400489748, 0.0008198637515306473, 0.0009064383339136839, 0.0007498807972297072, 0.0012330495519563556, 0.0007297052652575076, 0.0007166062132455409, 0.0007603908888995647, 0.0006303557311184704, 0.0006432075751945376, 0.0007869299151934683, 0.0008032481418922544, 0.0005611422238871455, 0.0007573947077617049, 0.0006732973270118237, 0.0006198782939463854, 0.0006429090863093734, 0.0008534781518392265, 0.0006654292228631675, 0.0006233833264559507, 0.0006679306970909238, 0.0007371303508989513, 0.0007382926996797323, 0.0005829531000927091, 0.0006154287839308381, 0.0007347013452090323, 0.0007391790859401226, 0.0013388716615736485, 0.0015557516599074006, 0.00057933887001127, 0.0005454483907669783, 0.0005916245863772929, 0.0005805903929285705, 0.0008229939267039299, 0.0006029003416188061, 0.0006009569624438882, 0.0007022266509011388, 0.0006441099685616791, 0.0005931442719884217, 0.0006620200583711267, 0.0006249111611396074, 0.0006264998228289187, 0.0007187777082435787, 0.0006448630010709167, 0.0005834221956320107, 0.0006481968448497355, 0.0006300825043581426, 0.0007462017238140106, 0.0005791964358650148, 0.0005757547914981842, 0.0005612896056845784, 0.0005969387129880488, 0.0006436702678911388, 0.0007087498670443892, 0.0007065268000587821, 0.0005628072540275753, 0.0006388711044564843, 0.0006047439528629184, 0.000970519962720573, 0.00817115604877472, 0.0006208642153069377, 0.0005707028903998435, 0.0005436904029920697, 0.0005797362537123263, 0.0005399603396654129, 0.000550994067452848, 0.0005528890760615468, 0.0006607238901779056, 0.0006040791631676257, 0.0006087494548410177, 0.0005946048768237233, 0.0005699285538867116, 0.0005382043891586363, 0.0005703597562387586, 0.0005811318405903876, 0.0006114067509770393, 0.0006102583720348775, 0.0006071450188755989, 0.0005588372587226331, 0.000571026059333235, 0.0005395346670411527, 0.0006240588845685124, 0.0007977521163411438, 0.0007184544811025262, 0.0006264657713472843, 0.0006278567016124725, 0.0006818978581577539, 0.0006239479407668114, 0.0006835020030848682, 0.0005727187963202596, 0.0006041088490746915, 0.0005615400150418282, 0.0006055912817828357, 0.0005491992924362421, 0.0005245223292149603, 0.0005434481427073479, 0.0006222438532859087, 0.0006006680196151137, 0.0009235290344804525, 0.0006122053018771112, 0.0006887777126394212, 0.0008798378985375166, 0.0006482228054665029, 0.0010220634285360575, 0.0008706095977686346, 0.0006182925426401198, 0.0006292888429015875, 0.000655788229778409, 0.0006580599583685398, 0.0006178889889270067, 0.0005499672843143344, 0.0011439354857429862, 0.009347496554255486, 0.0010094100143760443, 0.0006732113542966545, 0.0005475995712913573, 0.0006390595226548612, 0.0008927822927944362, 0.0006262269453145564, 0.0007442179485224187, 0.0005798614583909512, 0.0005812985473312438, 0.0005490074981935322, 0.0006454086978919804, 0.0005725673399865627, 0.0006905486807227135, 0.0005528616602532566, 0.0007457712781615555, 0.0005743688670918345, 0.0005784918903373182, 0.0005834942567162216, 0.0005907351733185351, 0.0005787304253317416, 0.0005418527871370316, 0.000546128605492413, 0.0005523165455088019, 0.0006124734063632786, 0.0005977457039989531, 0.0007611985201947391, 0.0006624502129852772, 0.0005790640134364367, 0.0006570553523488343, 0.0006680548540316522, 0.0007813716074451804, 0.0005956818349659443, 0.0006984386709518731, 0.0006403892766684294, 0.0005765518872067332, 0.0005252445116639137, 0.000547258066944778, 0.0006925980560481548, 0.0006537114968523383, 0.0006886303890496492, 0.0006064114277251065, 0.0006658476195298135, 0.000617883400991559, 0.000595398829318583, 0.0005966747412458062, 0.0005850892048329115, 0.0006665143300779164, 0.0005487945745699108, 0.0005812309682369232, 0.0010732669616118073, 0.0006942915497347713, 0.0009126407094299793, 0.001315142260864377, 0.0007875544833950698, 0.0010218960233032703, 0.0006046967464499176, 0.0008235971909016371, 0.0009291507885791361, 0.0011313909199088812, 0.0005989584606140852, 0.0005623118486255407, 0.0008442315738648176, 0.0007133549661375582, 0.0010608945740386844, 0.0005940211121924222, 0.0008792119333520532, 0.0006244569085538387, 0.0007496525067836046, 0.0006338076782412827, 0.0006384924636222422, 0.0005717648891732097, 0.00060620455769822, 0.0007293855305761099 ]
0.000779
212
[ "Q:\n\nWhat happens if you say you're doing Adventurers League, but end up playing a completely home rule thing?", "\n\nA game shop near me hosts organised play. ", "I've visited it to play Adventurers League. ", " The DM is instead playing a World of Warcraft adventure including variant rules like a mana system. ", " The game has nothing to do with AL, proper.", "\nThey are using actual D&D Adventurers League branding, including logos in the pamphlet and the publicity. ", "The DM claims it's official, and when I tried to tell them it wasn't they insisted it was since, “[he] bought the world of warcraft D&D book”.", "\nWhat can a player do? ", "Can I call/write to the AL organizer and tell them that this event isn't really AL-official? ", "Do I just stop going and look elsewhere? ", "Do I ring up the D&D brass and tell them to slap the wrist of the DM in question?", "\n\nA:\n\nDo I just stop going and look elsewhere?", "\n\nAssuming that you want to play official AL games, then you should definitely do this. ", "The shop you are visiting doesn't supply what you want so you have to go elsewhere if you want to play AL.", "\n\nCan I call/write to the AL organizer and tell them that this event isn't really AL-official?", "\n\nI had a look through the AL website, including the FAQ and couldn't see any recommendations on how to handle this. ", "\nIt sounds like they have wasted your time, and taking some steps that might save other people the same bother could be worthwhile.", "\nYou've already spoken to the DM. ", "If you're going to escalate it, then talk to the store owner next. (", "Thanks to doppelgreener for pointing that out)\nIf that fails, then getting in touch with AL (e.g. through customer services to try to improve things. ", "Note that it could hurt the store (which is why you should try to get the store to resolve it) so you should consider the effects there as well as on players.", "\n\nWotC have this to say:\n\nIt's worth talking to the store management and letting them know of\n the issue, especially if they are reporting the games in their Wizards\n Play Network information. ", "If the DM persists, reach out to Wizards\n customer service: \nhttps://dnd-support.wizards.com/hc/en-us/requests/new\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007378566660918295, 0.0006073886761441827, 0.0006566750234924257, 0.0009155182051472366, 0.0017341667553409934, 0.0005895820795558393, 0.0006551750120706856, 0.0010927378898486495, 0.0006868895725347102, 0.0009224029490724206, 0.0562998428940773, 0.0008931552874855697, 0.0008121824357658625, 0.007994825951755047, 0.0006868895725347102, 0.0005952601204626262, 0.0025481064803898335, 0.0009547844529151917, 0.000637305376585573, 0.0006136634619906545, 0.000693218840751797, 0.0005554518429562449, 0.0006211713771335781 ]
0.003587
23
[ "var parse = require('../');\nvar test = require('tape');\n\ntest('whitespace should be whitespace' , function (t) {\n t.plan(1);\n var x = parse([ '-x', '\\t' ]).x;\n t.equal(x, '\\t');\n});\n" ]
{ "pile_set_name": "Github" }
[ 0.0015868993941694498 ]
0.001587
1
[ "Q:\n\nDefine a list type into a variable\n\nHello everybody\nI have a LINQ declaration like this :\nvar query = from foo in NHibernate_Helper.session.", "Linq<TheType>() select foo;\n\nIs it possible to store TheType into a variable to dynamically define this one ?", "\nThank you by advance\n\nA:\n\nThis doesn't do exactly what you asked, but can you just make your method generic?", "\npublic IEnumerable<T> GetSomething<T>()\n{\n return (from foo in NHibernate_Helper.session.", "Linq<T>() select foo);\n}\n...\nGetSomething<TheType>();\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0010025191586464643, 0.0008311748970299959, 0.0005352060543373227, 0.002207440324127674, 0.0011283471249043941 ]
0.001141
5
[ "Old 'n indie repository GOG.com had previously planned to introduce Linux support to its catalogue this Autumn, with an initial batch of 100 titles. ", "Instead, after getting just over 50 games working on the open-OS, they seemingly threw up their arms and went \"eh, what the hell?\" ", "And so, that first, smaller batch has arrived early, alongside a sale that's running for users of any operating system.", "\n\n\"We're still aiming to have at least 100 Linux games in the coming months,\" write GOG , \"but we've decided not to delay the launch just for the sake of having a nice-looking number to show off to the press. ", "It's not about them, after all, it's about you. ", "So, one of the most popular site feature requests on our community wishlist is granted today: Linux support has officially arrived on GOG.com!\"", "\n\nJokes on them. ", "We're still going to cover it.", "\n\nOf the fifty, a few are for games currently available on Linux through Steam, but many are being now running natively in the OS for the first time. ", "It's not just indie stuff, either. ", "A few older games are available, from the FlatOuts to Sid Meier's Colonization. ", "From what I can tell, most games specify their compatibility as Ubuntu 14.04, Mint 17.", "\n\nTo celebrate, GOG also have a promotional sale on the newly Lunux'd titles." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006896828417666256, 0.21047993004322052, 0.0005815808544866741, 0.0006464469479396939, 0.01500953733921051, 0.0006288658478297293, 0.0009240188519470394, 0.0009207656839862466, 0.0006205477402545512, 0.000676155963446945, 0.0006065472844056785, 0.000628905079793185, 0.0007129248115234077 ]
0.017933
13
[ "<template>\n <div\n class=\"bael-slideout xs-border xs-text-6 md-text-5\"\n :class=\"{ isOpen: $store.state.menuIsActive }\"\n >\n <div class=\"bael-slideout-opener\">\n <div\n @click=\"toggle\"\n class=\"hamburger hamburger--spin js-hamburger\"\n :class=\"{'is-active': $store.state.menuIsActive }\"\n >\n <div class=\"hamburger-box\">\n <div class=\"hamburger-inner\"></div>\n </div>\n </div>\n </div>\n <ul class=\"bael-slideout-menu list-unstyled\">\n <li class=\"bael-slideout-menu-item menu-logo\">\n <nuxt-link\n v-if=\"info.siteicon && info.showmenu\"\n style=\"color:#000\"\n class=\"text-black black-font site--name\"\n to=\"/\"\n exact\n >\n <img\n style=\"width:64px;\"\n class=\"xs-block xs-fit xs-mb2\"\n :src=\"info.siteicon\"\n :alt=\"info.sitename\"\n />\n </nuxt-link>\n </li>\n <li class=\"bael-slideout-menu-item--small\">\n <nuxt-link to=\"/\" exact>Home</nuxt-link>\n </li>\n <li v-if=\"categories.length\" class=\"bael-slideout-menu-item--small\">\n <nuxt-link to=\"/categories\" exact>Categories</nuxt-link>\n </li>\n <li v-for=\"(p,i) in pages\" :key=\"`pg-${i}`\" class=\"bael-slideout-menu-item--small\">\n <nuxt-link :to=\"p.path\">{{p.title}}</nuxt-link>\n </li>\n <li v-if=\"info.menu\" class=\"xs-mt5 bael-slideout-menu-item heading-font\">Links</li>\n <li v-for=\"m in info.menu\" :key=\"m.position\" class=\"bael-slideout-menu-item--small\">\n <a :href=\"m.link\">{{m.name}}</a>\n </li>\n </ul>\n </div>\n</template>\n\n <script>\nexport default {\n fetchOnServer: true,\n async fetch() {\n const pages = await this.$content(\"page\").fetch();\n this.pages = pages;\n },\n data() {\n return {\n isOpen: false,\n links: null,\n pages: null,\n };\n },\n computed: {\n info() {\n return this.$store.state.info;\n },\n categories() {\n return this.$store.state.categories;\n },\n },\n methods: {\n open() {\n this.isOpen = true;\n },\n close() {\n this.isOpen = false;\n },\n toggle() {\n // Look for .hamburger\n this.$store.commit(\"toggleMenuState\");\n\n var hamburger = document.querySelector(\".hamburger\");\n // On click\n\n // Toggle class \"is-active\"\n\n if (this.isOpen) {\n this.close();\n } else {\n this.open();\n }\n },\n },\n};\n</script>\n <style lang=\"scss\">\n.heading-font {\n text-transform: uppercase;\n font-weight: 800;\n border-top: 2px solid rgba(119, 119, 119, 0.4);\n color: rgba(119, 119, 119, 0.4);\n padding: 0.5rem 0.3rem;\n font-size: 85%;\n}\n.hamburger {\n padding: 15px 15px;\n display: inline-block;\n cursor: pointer;\n transition-property: opacity, filter;\n transition-duration: 0.15s;\n transition-timing-function: linear;\n font: inherit;\n color: inherit;\n text-transform: none;\n background-color: transparent;\n border: 0;\n margin: 0;\n overflow: visible;\n}\n.hamburger:hover {\n opacity: 0.7;\n}\n\n.hamburger-box {\n width: 40px;\n height: 24px;\n display: inline-block;\n position: relative;\n}\n\n.hamburger-inner {\n display: block;\n top: 50%;\n margin-top: -2px;\n}\n.hamburger-inner,\n.hamburger-inner::before,\n.hamburger-inner::after {\n width: 40px;\n height: 4px;\n background-color: #000;\n border-radius: 4px;\n position: absolute;\n transition-property: transform;\n transition-duration: 0.15s;\n transition-timing-function: ease;\n}\n.hamburger-inner::before,\n.hamburger-inner::after {\n content: \"\";\n display: block;\n}\n.hamburger-inner::before {\n top: -10px;\n}\n.hamburger-inner::after {\n bottom: -10px;\n}\n\n.hamburger--spin .hamburger-inner {\n transition-duration: 0.22s;\n transition-timing-function: cubic-bezier(0.55, 0.055, 0.675, 0.19);\n}\n.hamburger--spin .hamburger-inner::before {\n transition: top 0.1s 0.25s ease-in, opacity 0.1s ease-in;\n}\n.hamburger--spin .hamburger-inner::after {\n transition: bottom 0.1s 0.25s ease-in,\n transform 0.22s cubic-bezier(0.55, 0.055, 0.675, 0.19);\n}\n\n.hamburger--spin.is-active .hamburger-inner {\n transform: rotate(225deg);\n transition-delay: 0.12s;\n transition-timing-function: cubic-bezier(0.215, 0.61, 0.355, 1);\n}\n.hamburger--spin.is-active .hamburger-inner::before {\n top: 0;\n opacity: 0;\n transition: top 0.1s ease-out, opacity 0.1s 0.12s ease-out;\n}\n.hamburger--spin.is-active .hamburger-inner::after {\n bottom: 0;\n transform: rotate(-90deg);\n transition: bottom 0.1s ease-out,\n transform 0.22s 0.12s cubic-bezier(0.215, 0.61, 0.355, 1);\n}\n.bael-slideout {\n position: fixed;\n right: 0;\n top: 0;\n width: auto;\n min-width: 180px;\n height: 100vh;\n z-index: 1000;\n background-color: #fff;\n transform: translate3D(100%, 0, 0);\n transition: transform 0.6s;\n\n &.isOpen {\n transform: translate3D(0, 0, 0);\n transition: transform 0.6s;\n }\n}\n\n.bael-slideout-opener {\n position: absolute;\n top: -4px;\n right: 100%;\n transform: scale(0.5);\n margin-right: 0px;\n font-weight: 600;\n text-transform: uppercase;\n letter-spacing: 0.08em;\n color: #000;\n cursor: pointer;\n\n &:hover {\n text-decoration: underline;\n }\n}\n\n.bael-slideout-menu {\n font-weight: 600;\n transition: transform 1.6s ease(out-cubic);\n .menu-logo {\n padding: 0.5rem 0.3rem;\n }\n}\n\n.bael-slideout-menu-item,\n.bael-slideout-menu-item--small {\n text-transform: uppercase;\n}\n\n.bael-slideout-menu-item--small {\n font-weight: 800;\n text-transform: uppercase;\n}\n\n.bael-slideout-menu-item--small a {\n cursor: pointer;\n border-top: 1px solid #666;\n display: block;\n padding: 0.5rem 0.3rem;\n &:hover {\n background: var(--hover-bg);\n }\n &:focus,\n :active {\n background: var(--active-bg);\n }\n}\n.bael-slideout-menu-item--small a:hover {\n text-decoration: none;\n}\n</style>\n" ]
{ "pile_set_name": "Github" }
[ 0.0014183511957526207 ]
0.001418
1
[ "Borwick railway station\n\nBorwick railway station formerly served the village of Borwick in Lancashire, England. ", "It was located on the Furness and Midland Joint Railway line between Carnforth and Wennington, east of Carnforth Joint station.", "\n\nHistory\n\nThe station was opened in June 1867, when passenger services began operating over the line. ", " Whilst it was jointly owned by the two constituent companies, the station was run by the Midland Railway who also operated all the trains that served it (the Furness Railway was responsible for the upkeep of the permanent way and associated structures on the line). ", " Facilities at the station were modest, with the main buildings on the northern (eastbound) platform and a shelter on the westbound side. ", " It also had a signal box and small goods yard at its western end. ", " Passenger services from the station initially ran to a temporary station at Carnforth next to the junction between the Joint line and the Furness line proper towards Barrow, but began using the main line station in 1880.", "\n\nAlong with its neighbours further east, the station was served mainly by local trains between Wennington and Carnforth - the 1912 passenger timetable listed six departures in each direction each weekday and this level of service was maintained for most of the station's life (although it did drop to as low as two per day during the First World War and again in the early 1940s). ", "\n \nThe station passed into the control of the London, Midland and Scottish Railway at the 1923 Grouping and then to British Railways at nationalisation in 1948. ", " It was then closed by the British Transport Commission on 12 September 1960 (along with neighbouring Arkholme) when the local service between Wennington and Carnforth ceased.", "\n\nThe site today\n\nThe old station house still exists to this day, having been converted into a private residence after closure. ", " Portions of the old platforms also survive, albeit derelict and heavily overgrown but the rest of the station has been demolished. ", " The route meanwhile is still operational as part of the Leeds to Morecambe Line.", "\n\nNotes\n\nReferences\n\n Binns, D. (1982), The Little North Western Railway, Wyvern Publications, Skipton, .", "\n\nExternal links\n RAILSCOT - Borwick Gallery\n\nSources\n Station on Navigable O.S map\n\nCategory:Disused railway stations in Lancaster\nCategory:Railway stations opened in 1867\nCategory:Railway stations closed in 1960\nCategory:Former Midland Railway stations\nCategory:Former Furness Railway stations" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0008284571813419461, 0.0011333681177347898, 0.0005518208490684628, 0.0006256095948629081, 0.000581379747018218, 0.0010541270021349192, 0.0006585687515325844, 0.000704565376508981, 0.000671324844006449, 0.0007585713174194098, 0.0006556984735652804, 0.0006799510447308421, 0.0008043714333325624, 0.0006403865409083664, 0.000623102649115026 ]
0.000731
15
[ "Sylvite\n\nSylvite, or sylvine, is potassium chloride (KCl) in natural mineral form. ", "It forms crystals in the isometric system very similar to normal rock salt, halite (NaCl). ", "The two are, in fact, isomorphous. ", "Sylvite is colorless to white with shades of yellow and red due to inclusions. ", "It has a Mohs hardness of 2.5 and a specific gravity of 1.99. ", "It has a refractive index of 1.4903. ", "Sylvite has a salty taste with a distinct bitterness.", "\n\nSylvite is one of the last evaporite minerals to precipitate out of solution. ", "As such, it is only found in very dry saline areas. ", "Its principal use is as a potassium fertilizer.", "\n\nSylvite is found in many evaporite deposits worldwide. ", "Massive bedded deposits occur in New Mexico and western Texas, and in Utah in the US, but the largest world source is in Saskatchewan, Canada. ", "The vast deposits in Saskatchewan, Canada were formed by the evaporation of a Devonian seaway. ", "Sylvite is the official mineral of Saskatchewan.", "\n\nSylvite was first described in 1832 at Mt. Vesuvius near Napoli in Italy and named for the Dutch chemist, François Sylvius de le Boe (1614–1672).", "\n\nSylvite, along with quartz, fluorite and halite, is used for spectroscopic prisms and lenses.", "\n\nSee also\nSylvinite\n\nReferences\n\nExternal links\nMineral Resources of Saskatchewan\n\nCategory:Potassium minerals\nCategory:Halide minerals\nCategory:Cubic minerals\nCategory:Evaporite\nCategory:Potash\nCategory:Rocksalt group" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0007173875928856432, 0.0006563500501215458, 0.0009599440381862223, 0.0007594354101456702, 0.000657987839076668, 0.0007989484001882374, 0.0007097680936567485, 0.01511223055422306, 0.0009284684783779085, 0.0006797116948291659, 0.0008199965232051909, 0.0005718504544347525, 0.0006383123691193759, 0.0007258574478328228, 0.0006516239955089986, 0.0007002531783655286, 0.0006223379168659449 ]
0.001571
17
[ "\n\n\n\nRough looking, nicknamed “Mr. Junk”, this 1951 Chevrolet Deluxe Coupe looks as if it was picked straight from the junkyard, but actually is one hell of a custom-built ride. ", "That truly isn’t a piece of junk whatsoever.", "\n\nMr. Junk might look like an absolute wreck at a quick glance, but upon a closer look, this patina-clad rat rod is one of the coolest cars we’ve seen. ", "At first sight, this thing looks weird but when you look inside of it, is like a different world.", "\n\n\n\n\n\nThe owner’s goal was to build a car that looked ugly on the outside but classy on the inside. ", "And he was right, the inside of Mr. Junk is surreal.", "Plush and comfy, the tweed headliner and maroon seats, stemming from a late model Pontiac Grand Am, make Mr. Junk look so elegant. ", "Taking it up a notch, the custom dash will awe those who sit in it.", "\n\nThe tilt steering column came off a Cadillac and the awkward brake pedal is positioned where it is because the master cylinder is welded to the frame, forcing it to come up through the floor.", "\n\nThis nasty looking rat rod is chopped, tubed, it has tons of suspension and performance upgrades. ", "Check out the car inside and prepare to be amazed at the amount of craftsmanship that has gone into making this ride the ultimate old school set of wheels.", "\n\n\n\nUnder the hood (or what’s left of the hood) rests a custom-built 555 cubic-inch engine with a Dart block, with dual 1150 cfm carburetors, pushing 800 horsepower and 758 lb-ft of torque at 5,700 rpm. ", "Custom headers, custom… well, really you name it, and it’s been rebuilt and customized. ", "What’s more, the owner said TCI built a custom two-speed power glide transmission just for Mr. Junk. ", "A sweet air ride system gives Mr. Junk the ability to ride at any height the user feels is right.", "\n\nIt’s a sight to see, so check it out in the video down below." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.00370742566883564, 0.3541618287563324, 0.1329450160264969, 0.0007144564879126847, 0.0025065874215215445, 0.11150659620761871, 0.012896261177957058, 0.0005711218691430986, 0.0007059509516693652, 0.10255880653858185, 0.0007215035730041564, 0.0007714873063378036, 0.0005965454038232565, 0.022964632138609886, 0.0462450310587883, 0.0006282784161157906 ]
0.049638
16
[ "Telomerase inhibition induces acute ATM-dependent growth arrest in human astrocytomas.", "\nThe purpose of the study was to examine the degree of hTERT, the catalytic subunit of telomerase, expression in paediatric high-grade astrocytoma and to explore the potential of telomerase inhibition as a therapy for these tumours. ", "hTERT was expressed at high levels in 36 of 44 paediatric astrocytomas. ", "Telomerase inhibition induced acute DNA damage and ATM-pathway-dependent G2/M cell cycle arrest in astrocytomas in vitro, both occurring prior to telomere shortening itself. ", "Our data suggest that telomerase inhibition could be a useful adjuvant therapy for high-grade astrocytomas, potentially inducing tumour growth arrest following short-term treatment." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0008795986068435013, 0.0006244932301342487, 0.0012689727591350675, 0.0008272648556157947, 0.0007406947552226484 ]
0.000868
5
[ "Q:\n\nSingular values and singular vector pair for the matrix\n\nWhat are the singular values and singular vector pairs for a matrix $1_{1\\times q}\\otimes w_{p\\times 1}$? ", "Here $1_{1\\times q}$ is the row vector of all ones, $w_{p\\times 1}$ is an arbitrary column vector of complex entries and $\\otimes$ represents the Kronecker product of two matrices.", "\n\nA:\n\nYour matrix can be written more simply as \n$$\nw_{p \\times 1} 1_{q \\times 1}^T = \\sqrt{n}\\cdot \\|w\\|\\cdot \\hat w {\\hat 1}{}^T\n$$\nWhere $\\hat u$ denotes $u/\\|u\\|$. This is a rank 1 matrix.", "\nThe singular values of this matrix are $\\sigma_1 = \\sqrt{n}\\|w\\|$ and $\\sigma_2 = \\cdots = \\sigma_p = 0$.\nWe have $u_1 = \\hat 1 $ and $v_1 = \\hat w$. For $i \\geq 2$, the only requirement is that the vectors $u_i$ form an orthonormal basis of $1 ^\\perp$, while the $v_i$ for an orthonormal basis of $w^\\perp$.\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0014673678670078516, 0.001564176520332694, 0.020487608388066292, 0.006307690404355526 ]
0.007457
4
[ "Q:\n\nViewController reference in AppDelegate using Storyboard\n\nI am writing a one view application based on storyboard.", "\nI have added a toolbar, clicking on buttons messages are received into the AppDelegate.", "\nI need to forward them to the ViewController but I am not able to get a reference to it in the AppDelegate.", "\nHow do I do that?", "\n\nA:\n\nAs simple as that:\n- (void)applicationDidBecomeActive:(NSNotification *)aNotification {\n\n if (_viewController==nil) {\n _viewController = (ViewController *)[[NSApplication sharedApplication] mainWindow].contentViewController;\n }\n}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006038140854798257, 0.0006408566259779036, 0.0005846184794791043, 0.0008425251580774784, 0.0007438300526700914 ]
0.000683
5
[ "\nF.A.A. Scrambles to Replace Retiring Controllers - peter123\nhttp://www.nytimes.com/2009/04/05/business/05airtraffic.html?hpw\n======\njoshwa\nIn case anyone is interested in trying it, here's a good single-player\nsimulator:\n\n<http://www.atc-sim.com/>\n\nIf you want to try it live with other humans:\n\n<http://www.vatsim.net/>\n\nNot easy. ", "Try memorizing _all_ of this:\n<http://www.laartcc.org/training/index2.php>\n\n" ]
{ "pile_set_name": "HackerNews" }
[ 0.0008638082654215395, 0.0008664019405841827 ]
0.000865
2
[ "SpiceSeedは、『キン肉マン』のキャラクター“悪魔将軍(悪)”のフィギュアの予約受付を1月25日21:00から開始します。価格は99,800円+税。", "\n\n悪魔将軍は、悪魔超人たちを束ねる首領であり、キン肉マンをもっとも苦しめた超人。超人墓場への侵略開始前の時期が“悪”、新連載で登場した現在の悪魔将軍が“善”という商品名で発売されるとのこと。", "\n\n通常カラー(シルバー)の“悪魔将軍(悪)”と、キャンディカラー塗装の“悪魔将軍(悪)コミック背表紙ver”の2体が同時販売される予定です。コミック背表紙verは、宝石のような光沢感が出るように何層にもカラーリングされた“キャンディ塗装”が施され、特別感が表現されています。", "\n\n台座に両足を開いて座った“威厳ver”と脚を組んで座った“峻厳ver”の2ポーズが通常カラーverとコミック背表紙verのどちらにも用意され、好きな悪魔将軍を選べます。また、2点以上購入するともれなく、SpiceSeed特製の非売品“台座付き金銀マスク”がもらえます。", "\n\nなお、特設ページの説明によると、ヘッドのマスクは付け替え可能で、オプションパーツを用意することによって、悪魔将軍とゴールドマンと二大超人の表情を楽しめるとのこと。", "\n\n■“悪魔将軍(悪)フィギュア”商品概要\n\n\n\n【仕様】\n\n・塗装済み完成品\n\n【素材】\n\n・レジンキャスト\n\n【サイズ】\n\n・全高約29cm\n\n・奥行約23cm\n\n・幅約23cm\n\n・重量約3.5kg\n\n【生産】\n\n・原型~塗装仕上げまですべて国内自社工場\n\n【付属品】\n\n・悪魔将軍\n\n・専用玉座(固定式)\n\n(C)ゆでたまご・東映アニメーション\n\n関連サイト" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.001125213922932744, 0.0013826775830239058, 0.001417395775206387, 0.002348612993955612, 0.001778388163074851, 0.0021987035870552063 ]
0.001708
6
[ "er than -3008/3?", "\nTrue\nWhich is smaller: -526 or -1.5?", "\n-526\nIs 1 at least -3/383?", "\nTrue\nIs 28208 bigger than 28208?", "\nFalse\nWhich is greater: -1/6 or 1/34?", "\n1/34\nWhich is greater: -2 or -115?", "\n-2\nAre 1883 and 1883 equal?", "\nTrue\nIs -6526 greater than or equal to -6526?", "\nTrue\nIs -361 greater than -362?", "\nTrue\nIs 270 at most as big as 2428/9?", "\nFalse\nIs 472 at most 474?", "\nTrue\nIs 243 greater than -1?", "\nTrue\nIs 1 greater than -21/752?", "\nTrue\nWhich is greater: 979 or 976?", "\n979\nIs 8383 equal to 8383?", "\nTrue\nWhich is greater: -84 or 0.3?", "\n0.3\nIs 5 <= -8?", "\nFalse\nWhich is smaller: -2/41459 or -1?", "\n-1\nWhich is smaller: 0 or -8/7?", "\n-8/7\nIs -1 at least -19?", "\nTrue\nIs -887 !", "= -0.1?", "\nTrue\nIs 180/217 smaller than 0?", "\nFalse\nWhich is bigger: 1 or 2/753?", "\n1\nWhich is smaller: 190 or 188?", "\n188\nIs -41/13 < -3?", "\nTrue\nDo 2127 and 2127 have the same value?", "\nTrue\nWhich is smaller: 622/163 or 4?", "\n622/163\nWhich is bigger: -3/37 or 0.2?", "\n0.2\nIs 0.13 > -16.8?", "\nTrue\nDo 875 and 1 have the same value?", "\nFalse\nIs 4 > 9578?", "\nFalse\nIs 1509 not equal to 1509?", "\nFalse\nWhich is smaller: 317 or 328?", "\n317\nDoes -219/4 = -54?", "\nFalse\nWhich is smaller: 19493 or 19495?", "\n19493\nIs -2 > -37/19?", "\nFalse\nIs -103 at least -0.1?", "\nFalse\nIs 11 at least -0.3?", "\nTrue\nWhich is smaller: 13 or 2/27?", "\n2/27\nIs 133/5 > 2/7?", "\nTrue\nIs -0.25 greater than 43?", "\nFalse\nWhich is bigger: 249 or 248?", "\n249\nIs 0.0699 < -5?", "\nFalse\nIs -2 at most as big as 118/13?", "\nTrue\nIs -0.2 < 789?", "\nTrue\nWhich is greater: 449 or 451?", "\n451\nWhich is smaller: -3 or -5/3?", "\n-3\nWhich is bigger: 848 or 854?", "\n854\nIs -136 less than or equal to -137?", "\nFalse\nIs -1023 at least as big as -1021?", "\nFalse\nWhich is greater: -0.708 or -0.1?", "\n-0.1\nIs 0 at most as big as 26?", "\nTrue\nIs 46 less than or equal to -183?", "\nFalse\nIs 2 greater than or equal to 34.5?", "\nFalse\nWhich is bigger: 71 or 67?", "\n71\nWhich is smaller: 0 or 14?", "\n0\nWhich is smaller: 990/13 or 76?", "\n76\nIs -3 less than -10/3?", "\nFalse\nWhich is smaller: 0.15 or -4?", "\n-4\nWhich is smaller: -0.001 or 2/9?", "\n-0.001\nWhich is greater: -0.13 or 215?", "\n215\nWhich is greater: -142 or -83?", "\n-83\nIs 1/4 < -145?", "\nFalse\nIs 1072 less than or equal to 1082?", "\nTrue\nWhich is smaller: 3/8777 or -1?", "\n-1\nWhich is smaller: -955 or -950?", "\n-955\nWhich is bigger: -376/21 or 0.1?", "\n0.1\nWhich is greater: 15 or 2?", "\n15\nWhich is smaller: 33 or 57?", "\n33\nWhich is smaller: 22 or 0.011?", "\n0.011\nWhich is greater: -83 or -84?", "\n-83\nIs 948 >= 946?", "\nTrue\nWhich is bigger: -1/5017 or 0?", "\n0\nWhich is bigger: 1/6 or 4?", "\n4\nWhich is smaller: 0.137 or -18?", "\n-18\nWhich is bigger: -1555/3 or -517?", "\n-517\nIs 851/4 greater than 212?", "\nTrue\nIs 21 at most 9?", "\nFalse\nWhich is bigger: -84/53 or -1?", "\n-1\nAre -1 and -1/509 nonequal?", "\nTrue\nIs 72 !", "= 364/5?", "\nTrue\nIs 0 smaller than -26/101?", "\nFalse\nWhich is greater: 6/3709 or 0?", "\n6/3709\nIs 0 <= -4/73?", "\nFalse\nWhich is smaller: 4/4181 or -1?", "\n-1\nWhich is smaller: 26 or 27?", "\n26\nWhich is bigger: 2 or 45/34?", "\n2\nWhich is smaller: -853/3 or -284?", "\n-853/3\nIs 5492 >= 5493?", "\nFalse\nWhich is smaller: 8/45 or 3?", "\n8/45\nWhich is greater: -56/57 or -1?", "\n-56/57\nIs -1 at most as big as 140.28?", "\nTrue\nWhich is greater: -52 or -47?", "\n-47\nAre -7 and -16 equal?", "\nFalse\nIs -1432 >= -1430?", "\nFalse\nIs 5391 greater than 5392?", "\nFalse\nIs -669 >= -677?", "\nTrue\nWhich is greater: -7421 or -2/3?", "\n-2/3\nAre 819 and 819 equal?", "\nTrue\nWhich is smaller: -766 or -1?", "\n-766\nWhich is smaller: -2177 or -2176?", "\n-2177\nWhich is smaller: 9 or 89/10?", "\n89/10\nIs 1334 less than 1332?", "\nFalse\nIs -1 less than -1.09?", "\nFalse\nWhich is bigger: 1 or 2/38511?", "\n1\nAre -1.6 and -4 unequal?", "\nTrue\nWhich is bigger: -5196 or -5197?", "\n-5196\nAre -1115/4 and -279 non-equal?", "\nTrue\nWhich is smaller: -1 or -13/7?", "\n-13/7\nIs -248/5 less than -50?", "\nFalse\nWhich is smaller: 6/2191 or 0.1?", "\n6/2191\nDo -31.8 and 23 have different values?", "\nTrue\nWhich is smaller: -3797 or -3798?", "\n-3798\nIs -3/236 smaller than 1?", "\nTrue\nWhich is smaller: -1586 or -1588?", "\n-1588\nWhich is smaller: -390 or -391?", "\n-391\nWhich is smaller: -1/4 or -0.2061?", "\n-1/4\nWhich is smaller: -0.1 or 403/56?", "\n-0.1\nWhich is smaller: 50 or 10/7?", "\n10/7\nWhich is bigger: 2/17 or -97?", "\n2/17\nIs 3 at least as big as 80/47?", "\nTrue\nWhich is bigger: 151 or 16?", "\n151\nWhich is smaller: -89 or -0.55?", "\n-89\nWhich is smaller: 3/13 or -18/5?", "\n-18/5\nIs 5363 > 5364?", "\nFalse\nIs -2726 less than -2726?", "\nFalse\nDo -0.2 and 100/11 have the same value?", "\nFalse\nWhich is greater: 1 or 2/457?", "\n1\nAre 80 and 5/2 unequal?", "\nTrue\nIs 2/485 at least 7?", "\nFalse\nDo -0.1 and 1/4023 have the same value?", "\nFalse\nWhich is greater: -20 or -107/5?", "\n-20\nIs 174 equal to 172?", "\nFalse\nWhich is bigger: 2076 or 2075?", "\n2076\nIs -69.3 greater than or equal to -1/2?", "\nFalse\nWhich is bigger: -44 or -21/4?", "\n-21/4\nIs -35 at most as big as -35?", "\nTrue\nAre -1 and -19/20 nonequal?", "\nTrue\nWhich is smaller: -3637 or -3639?", "\n-3639\nIs 3877 at most as big as 3876?", "\nFalse\nDo 108 and 110 have the same value?", "\nFalse\nWhich is greater: 10360 or 31079/3?", "\n10360\nAre 179 and -3 unequal?", "\nTrue\nWhich is greater: 0 or 1/11209?", "\n1/11209\nWhich is bigger: -2 or -6.03?", "\n-2\nIs -16 less than -1/13?", "\nTrue\nWhich is smaller: 812 or 792?", "\n792\nIs -372 at least -370?", "\nFalse\nAre -88 and 3/5 equal?", "\nFalse\nWhich is smaller: 4308/7 or 614?", "\n614\nIs -2711/5 greater than -541?", "\nFalse\nWhich is bigger: -611 or -613?", "\n-611\nWhich is bigger: 5/36 or 0?", "\n5/36\nWhich is smaller: -18 or -11?", "\n-18\nIs 147 smaller than 147?", "\nFalse\nWhich is greater: 1.1504 or 3/7?", "\n1.1504\nIs -14266 greater than or equal to 0?", "\nFalse\nWhich is greater: 0 or -1/102?", "\n0\nIs -1 at most as big as -0.6918?", "\nTrue\nIs -6 less than or equal to -0.088?", "\nTrue\nWhich is bigger: -26 or 185?", "\n185\nWhich is greater: 4.94 or -1?", "\n4.94\nWhich is smaller: -31 or -676/21?", "\n-676/21\nIs -400 at most as big as -398?", "\nTrue\nIs 36/241 less than or equal to -1?", "\nFalse\nWhich is greater: -115 or -114?", "\n-114\nIs -15 at most -4/5?", "\nTrue\nWhich is smaller: -29625/4 or -7406?", "\n-29625/4\nWhich is bigger: -5/43 or 1?", "\n1\nWhich is smaller: 0 or -15466?", "\n-15466\nIs -335 > -336?", "\nTrue\nIs -1446/7 < -206?", "\nTrue\nIs 1 > -2/2185?", "\nTrue\nWhich is smaller: -1/2 or -1/48?", "\n-1/2\nIs 154 bigger than -2/3?", "\nTrue\nWhich is greater: -0.083 or 0.2?", "\n0.2\nWhich is bigger: 0 or 6/1885?", "\n6/1885\nIs -134/161 less than -1?", "\nFalse\nWhich is smaller: 119 or -27?", "\n-27\nIs 1.593 at most 2?", "\nTrue\nWhich is smaller: -52/45 or 0?", "\n-52/45\nIs -222 <= 4?", "\nTrue\nWhich is smaller: 98 or 197/2?", "\n98\nWhich is smaller: -2/109 or -0.6?", "\n-0.6\nWhich is bigger: -42 or -37?", "\n-37\nAre 0 and 2/437 equal?", "\nFalse\nIs 2182 > 2181?", "\nTrue\nIs -328 equal to -324?", "\nFalse\nWhich is greater: 590 or 617?", "\n617\nWhich is bigger: 1 or 3/7?", "\n1\nIs 8 bigger than 129?", "\nFalse\nWhich is greater: -113 or -106?", "\n-106\nWhich is bigger: 85/14 or 6?", "\n85/14\nAre -18/229 and 0 equal?", "\nFalse\nIs -67 less than -269/4?", "\nFalse\nWhich is bigger: -1 or -24/59?", "\n-24/59\nWhich is bigger: -92 or -94?", "\n-92\nIs 1/42 equal to 1?", "\nFalse\nIs 46825 !", "= 0.1?", "\nTrue\nWhich is smaller: -105/1286 or 1?", "\n-105/1286\nWhich is bigger: -0.3451 or -0.3?", "\n-0.3\nAre -8/27 and 0.02 nonequal?", "\nTrue\nIs 0 < 100/77?", "\nTrue\nIs 23701 at most as big as 23699?", "\nFalse\nIs 11562 at most as big as 11563?", "\nTrue\nIs -17 at least as big as 0?", "\nFalse\nWhich is greater: 40/1047 or 0?", "\n40/1047\nWhich is greater: -380/9 or -41?", "\n-41\nIs 1.2 not equal to 4/3?", "\nTrue\nIs 0.7 at most as big as 3.7?", "\nTrue\nIs 90/37 smaller than 1?", "\nFalse\nWhich is greater: -6000 or -6003?", "\n-6000\nDo 3583 and 3583 have the same value?", "\nTrue\nIs 11876 < 11874?", "\nFalse\nIs -181 not equal to -182?", "\nTrue\nWhich is smaller: 0.18 or -0.06?", "\n-0.06\nWhich is smaller: -7/50 or 0?", "\n-7/50\nWhich is smaller: -1 or 18/565?", "\n-1\nWhich is smaller: -12 or -1?", "\n-12\nWhich is bigger: -561 or -1/6?", "\n-1/6\nAre -1 and 1/1901 nonequal?", "\nTrue\nAre 590/21 and -1 unequal?", "\nTrue\nWhich is smaller: -264/7 or -37?", "\n-264/7\nWhich is greater: -3 or -243?", "\n-3\nIs -13160 equal to -13161?", "\nFalse\nWhich is smaller: 1/5 or 1/1365?", "\n1/1365\nWhich is bigger: -88 or -90?", "\n-88\nIs -3/100 at least as big as 1/7?", "\nFalse\nIs -788/9 equal to -1?", "\nFalse\nIs -1.3 equal to 1/10?", "\nFalse\nWhich is smaller: 2/3 or 2.3?", "\n2/3\nWhich is greater: 3/104 or -0.2?", "\n3/104\nIs 287 less than or equal to 288?", "\nTrue\nWhich is smaller: 1148 or 1146?", "\n1146\nAre 1749 and 1750 unequal?", "\nTrue\nIs 2/4937 < -1?", "\nFalse\nWhich is bigger: 28/9 or -1?", "\n28/9\nIs -39 not equal to -598/15?", "\nTrue\nIs 2/257 > -1?", "\nTrue\nIs 962 < 963?", "\nTrue\nIs -4 less than -153/44?", "\nTrue\nWhich is greater: 256 or -22/3?", "\n256\nAre -52/385 and -0.1 nonequal?", "\nTrue\nIs -311 at least -320?", "\nTrue\nIs -1 <= -4/579?", "\nTrue\nAre 48 and 44 non-equal?", "\nTrue\nIs 0.1 greater than 69?", "\nFalse\nWhi" ]
{ "pile_set_name": "DM Mathematics" }
[ 0.0008603819296695292, 0.0007490462157875299, 0.0008662058971822262, 0.0014521462144330144, 0.0013598034856840968, 0.0008161215810105205, 0.0007655826047994196, 0.0009815421653911471, 0.0010660365223884583, 0.0006993968272581697, 0.0017792314756661654, 0.0010080818319693208, 0.0009436444379389286, 0.0008543484145775437, 0.0032272390089929104, 0.0007917465991340578, 0.0018341742688789964, 0.0009927772916853428, 0.0007454963051714003, 0.0009094570414163172, 0.003155091777443886, 0.0011410149745643139, 0.0011462982511147857, 0.0015086031053215265, 0.0007455026498064399, 0.001037470530718565, 0.0007394009735435247, 0.0007047437247820199, 0.0009348031599074602, 0.0012829736806452274, 0.0007582115358673036, 0.003999560140073299, 0.002933440962806344, 0.0007873225840739906, 0.0009666248806752264, 0.0008134297677315772, 0.0009004633757285774, 0.001141465618275106, 0.001612784923054278, 0.0006906569469720125, 0.0010714444797486067, 0.0009766443399712443, 0.0012752903858199716, 0.0016442937776446342, 0.0010401663603261113, 0.0011944399448111653, 0.000821216031908989, 0.0006920313462615013, 0.0007472984143532813, 0.0012334142811596394, 0.0016020996263250709, 0.0020125359296798706, 0.001707713003270328, 0.0012977849692106247, 0.002161127980798483, 0.0011929707834497094, 0.0007953019812703133, 0.0008169404463842511, 0.0011759267654269934, 0.0009590883273631334, 0.0007085830438882113, 0.0008719993638806045, 0.0008615173865109682, 0.0012883235467597842, 0.002809867262840271, 0.0007138953078538179, 0.0007515953038819134, 0.0009724595001898706, 0.0008567161276005208, 0.0007274508243426681, 0.0007657383685000241, 0.0009591248235665262, 0.001177470083348453, 0.0008743652724660933, 0.0009693588363006711, 0.0007572214817628264, 0.0009556217701174319, 0.0010239297989755869, 0.0009621856152079999, 0.0012601796770468354, 0.0011675540590658784, 0.005874044727534056, 0.000883435015566647, 0.0008450476452708244, 0.0012439052807167172, 0.001687256502918899, 0.0009542479529045522, 0.0006747368024662137, 0.0008100391714833677, 0.0006857471307739615, 0.0012121149338781834, 0.0008763176738284528, 0.0008033165941014886, 0.0010643647983670235, 0.0008163339225575328, 0.0011120066046714783, 0.00196740566752851, 0.006044415757060051, 0.003088769968599081, 0.0008192405803129077, 0.0010722822044044733, 0.0007294744718819857, 0.0007996620843186975, 0.0006828070618212223, 0.0012027587508782744, 0.0017380442004650831, 0.0009762452682480216, 0.0008952569332905114, 0.0010219831019639969, 0.0011901917168870568, 0.000720254029147327, 0.001195852062664926, 0.0010066651739180088, 0.0007655650260858238, 0.0008124320302158594, 0.0009271680610254407, 0.0008123503648675978, 0.0007169965538196266, 0.0007684361189603806, 0.0006989850662648678, 0.0007318673888221383, 0.0008721460471861064, 0.0009122051415033638, 0.0007599677774123847, 0.0007576350471936166, 0.000727689010091126, 0.0011266549117863178, 0.0028290394693613052, 0.000946459942497313, 0.0012510616797953844, 0.0009574111900292337, 0.0009632173459976912, 0.0010387487709522247, 0.0014071768382564187, 0.0012609383556991816, 0.0010337367421016097, 0.0010281383292749524, 0.0015258576022461057, 0.0013385912170633674, 0.0011081990087404847, 0.0007480212370865047, 0.0017647704808041453, 0.0009690882870927453, 0.0009492473909631371, 0.0009089966770261526, 0.0008352132281288505, 0.0008679511956870556, 0.0010714310919865966, 0.0007449217373505235, 0.000885905756149441, 0.0022646195720881224, 0.0008489417377859354, 0.0009549932437948883, 0.0025426598731428385, 0.0008245984208770096, 0.0007208239403553307, 0.0008633133256807923, 0.0012952800607308745, 0.001455418998375535, 0.0014000135706737638, 0.0015918829012662172, 0.0012996571604162455, 0.0008203021716326475, 0.0008481885306537151, 0.0007431335980072618, 0.0012471814407035708, 0.0011106445454061031, 0.0012266699923202395, 0.0008388709975406528, 0.000692729779984802, 0.0007492796867154539, 0.0007682373397983611, 0.000879614963196218, 0.001055934582836926, 0.0009971685940399766, 0.0007648078026250005, 0.001349190017208457, 0.0009431667276658118, 0.0007762896711938083, 0.0009761512628756464, 0.0008398167556151748, 0.0009229308925569057, 0.0007113279425539076, 0.0009840542916208506, 0.0007064978126436472, 0.0008122067665681243, 0.00098891812376678, 0.0014034952037036419, 0.0026990987826138735, 0.0009102408075705171, 0.0010233500506728888, 0.00085873604984954, 0.0011880644597113132, 0.0012726554414257407, 0.0007562007522210479, 0.0012929541990160942, 0.0015009865164756775, 0.0014675153652206063, 0.0008577809203416109, 0.0013050416018813848, 0.028754927217960358, 0.001118415268138051, 0.000697594485245645, 0.0008676300058141351, 0.0009577395976521075, 0.0013275999808683991, 0.0011525211157277226, 0.002567074028775096, 0.0012401974527165294, 0.0011974433436989784, 0.0007665396551601589, 0.0010503748198971152, 0.001100354129448533, 0.0008428611326962709, 0.0014568023616448045, 0.0008613051613792777, 0.0013201362453401089, 0.0013745826436206698, 0.0007599685923196375, 0.000788286910392344, 0.0007409552927128971, 0.0007260390557348728, 0.0008697696030139923, 0.0009337967494502664, 0.00082488136831671, 0.0007088400307111442, 0.000775547290686518, 0.0010349946096539497, 0.0009019080316647887, 0.0008326739189215004, 0.0012246847618371248, 0.0016985394759103656, 0.002130479784682393, 0.0009693940519355237, 0.0008485302096232772, 0.001200551982037723, 0.0007105674594640732, 0.0007320364820770919, 0.0010542826494202018, 0.0012544612400233746, 0.0011119821574538946, 0.0009469633223488927, 0.0012101306347176433, 0.001097956788726151, 0.0007065489771775901, 0.0007361763273365796, 0.0007506050751544535, 0.0010966637637466192, 0.001263490761630237, 0.0010683988220989704, 0.07499010115861893 ]
0.001549
251
[ "Priocnemis coriacea\n\nPriocnemis coriacea is a large species of pepsid spider wasp characterised by having plentiful erect hair on the face and propodeum. ", "It is a member of the subgenus Umbripennis.", "\n\nDistribution\nP. coriacea is an uncommon species which is scarce in central Europe, rare in northern and southern Europe. ", "In Great Britain it is widely distributed through southern and central England.", "\n\nHabitat\nP. coriacea shows a preference for light soils in open habitats such as downland and thinly wooded heathland.", "\n\nBiology\nIn Great Britain the flight period is April to August, although it has been stated that June may be the latest date.", "\n \nNo prey items have been recorded, but it is likely that P. coriacea takes larger species of the families Lycosidae and Gnaphosidae. ", "Its nesting biology is largely unknown but members of Priocnemis generally use pre-existing cavities and then excavate a number of cells within them. ", "The only flower which P. coriacea has been recorded feeding on is wood spurge, but it may visit a wide range of flowers, so long as they have short corollas.", "\n\nReferences\n\nCategory:Pepsinae\nCategory:Hymenoptera of Europe\nCategory:Insects described in 1843\nCategory:Taxa named by Anders Gustaf Dahlbom" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.013934748247265816, 0.0007000723853707314, 0.0006849323399364948, 0.0006185863167047501, 0.0006254423642531037, 0.0005457937368191779, 0.0007710566278547049, 0.0008042008266784251, 0.0027499760035425425, 0.0006036093109287322 ]
0.002204
10
[ "Valve are set to host demos of two new videogame titles for the HTC Vive at PAX Prime, Seattle, this weekend, Fantastic Contraption from Radial Games & Northway Games and Final Approach from Phaser Lock Interactive, but alongside the official press release for this showcase came new information on the launch strategy for the virtual reality (VR) device. ", "A 2-phase rollout has been revealed, with initial shipments of the HTC Vive to be very limited.", "\n\n“Vive developer kits have been available for free since May,” reads the official press release. “", "To date, HTC and Valve have received over 10,000 dev kit inquiries and over 80 VR titles are known to be in production for the Vive. ", "The developer sign up page has closed but development kits continue to ship through this summer and fall.”", "\n\nMoving onto the consumer release of the HTC Vive, Valve’s official statement reads: “Later this year, HTC will offer the first commercial Vive units via a limited quantity of community and developer systems, with larger quantities shipping in calendar Q1 2016.”", "\n\nThis launch strategy has been rumoured for some time, however now Valve has openly gone on record with the plan. ", "No specific quantities of units available nor any information on pre-orders are available at this time, however VRFocus will keep you updated with all the latest details." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006395061500370502, 0.0005491665797308087, 0.0005545389140024781, 0.0006262693786993623, 0.0006090988172218204, 0.0005513884243555367, 0.0005781818181276321, 0.0005659115267917514 ]
0.000584
8
[ "A variety of packaging techniques are offered today for integrated circuits (ICs). ", "Packaging an integrated circuit allows it to be mountable to a circuit board, and more particularly a printed circuit board (PCB). ", "In addition, packaging allows an IC to be electrically isolated from other IC packages on a PCB. ", "The packaging itself also provides a measure of protection against exposure to direct physical contact with the IC during assembly and operation.", "\nPackaged ICs are available in a variety of packaging schemes that include a Dual Inline Package (DIP), Small Outline Integrated Circuit package (SOIC), Thin Shrink Small Outline Package (TSSOP), or Shrink Small Outline Package (SSOP) to name a few. ", "These packages include interconnects that are coupled with an IC. ", "The IC itself is surrounded, housed, molded, or encapsulated in a dielectric material such as plastic or ceramic. ", "A DIP encapsulated in plastic may be referred to as a Plastic Dual Inline Package (PDIP). ", "Alternatively, if a DIP is encapsulated in a ceramic material it may be referred to as a Ceramic Dual Inline Package (CDIP).", "\nAn example DIP 10 is illustrated in FIG. ", "1a. ", "DIP 10 includes an IC 12 and a dielectric housing 14. ", "The IC 12 is laterally mounted within the dielectric housing 14. ", "Upon mounting the IC 12, the dielectric housing 14 is sealed. ", "Prior to the dielectric housing 14 being sealed, however, conductive interconnects, such as interconnect 16, made up of a material such as aluminum or copper are wire bonded to the IC 12 via wire and bump bonds 20.", "\nThe profile of DIP 10 is illustrated in FIG. ", "1b. ", "DIP 10 is offset from a PCB 24 by an offset height 26. ", "One drawback to DIP 10 is that its offset height 26 may not be suitable for modem electronics. ", "Many modem electronics devices, such as cell-phones and personal digital assistants (PDAs), have stringent offset height requirements for IC packages. ", "Primarily these stringent offset height requirements are due to the drive to make modem electronic devices more compact. ", "By minimizing the offset height of IC packages, a PCB and its mounted IC packages become more compact and thereby make an electronic device more compact.", "\nOne IC package that is capable of being more compact is an SOIC package. ", "One such SOIC package 28 is illustrated in FIG. ", "1c. ", "The interconnects, such as interconnect 30, in this configuration allow the SOIC package to be mounted closer to the PCB 24, thereby reducing the offset height 32. ", "One problem still inherent to this configuration is that a layer of dielectric material 34 still contributes to the offset height 32.", "\nAdditionally, another problem associated with conventional IC packages is that they are not easily vertically, or perpendicularly mountable. ", "One application that some modem electronic devices include is compassing. ", "These compassing applications use axis sensors to sense a magnetic field. ", "X and Y-axis (or 2-axis) magnet field sensors may be placed laterally in an IC package (and in turn a PCB) and operate appropriately. ", "X, Y, and Z-axis (or 3-axis) sensors, however, require that one of the sensors be orthogonally placed in relation to the other two sensors.", "\nWhen a conventional third axis of a 3-axis sensor is mounted, it is difficult to meet the stringent offset height requirement that modem electronic devices require. ", "The offset height of the third axis sensor is increased because the IC and the IC package is mounted perpendicularly, the interconnects are not easily bondable to a PCB, and the dielectric housing contributes to the offset height.", "\nTherefore, an IC package is presented that allows an IC within an IC package to be mounted perpendicularly and minimizes the offset height of the IC package." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0005751903518103063, 0.0005911387270316482, 0.0005911812768317759, 0.0005847978754900396, 0.0006380794220604002, 0.0005820139776915312, 0.0006670953589491546, 0.0007847030647099018, 0.0006564538343809545, 0.0010634170612320304, 0.0008930217591114342, 0.0008627783390693367, 0.0006647975533269346, 0.0006292105535976589, 0.0006535215070471168, 0.0008199461735785007, 0.0008560396381653845, 0.0006631621508859098, 0.0009650113643147051, 0.0006276568747125566, 0.0006447812775149941, 0.0006107698427513242, 0.0006208783597685397, 0.0006695826887153089, 0.0011111382627859712, 0.0006118424935266376, 0.0007531087612733245, 0.0007067887345328927, 0.0006242287345230579, 0.0006474506808444858, 0.0006011812365613878, 0.0006341743865050375, 0.0007256778771989048, 0.0006156475865282118, 0.0006150435074232519 ]
0.000702
35
[ "<?", "php\n\n/*\n * This file is part of Rocketeer\n *\n * (c) Maxime Fabre <ehtnam6@gmail.com>\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.", "\n *\n */\n\nnamespace Rocketeer\\Strategies\\Deploy;\n\nuse Rocketeer\\Strategies\\AbstractStrategy;\n\n/**\n * Uses a system of folders current/releases/shared to roll releases.", "\n */\nclass RollingStrategy extends AbstractStrategy implements DeployStrategyInterface\n{\n /**\n * @var string\n */\n protected $description = 'Uses a system of folders current/releases/shared to roll releases';\n\n /**\n * {@inheritdoc}\n */\n public function deploy()\n {\n if ($this->connections->getCurrentConnectionKey()->isFtp()) {\n return $this->explainer->error('Rolling strategy is not compatible with FTP connections, use \"Upload/Sync\" instead');\n }\n\n // Check if server is ready for deployment\n $this->steps()->setupIfNecessary();\n $this->steps()->executeTask('CreateRelease');\n $this->steps()->executeTask('PrepareRelease');\n\n return $this->runSteps();\n }\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0010000207694247365, 0.0006872375379316509, 0.0007938573253341019, 0.0008991507929749787 ]
0.000845
4
[ "15th Anniversary\n\nHooray! ", "15 years ago today, on August 30th 1997, the first match ever in Hattrick kicked off. ", "Since then, hundreds of millions of matches have been played, and users from all over the world have spent billions of hours figuring out match orders, hunting for the perfect player on the transfer market, or just socialising with other users. ", "When we got started, we could never imagine that Hattrick would become what it is today. ", "But some ideas just take on a life on their own.", "\n\nIt's been an incredible journey, folks. ", "Sometimes the road has been rocky, but mostly it has been great fun, and we couldn't have wished for better company than the magnificent Hattrick community. ", "We look forward to the next few decades together! ", "As they say, 15 years old is no age these days.", "\n\n«\n\n»\n\nDAY\n\n15\n\nDAY\n\n14\n\nDAY\n\n13\n\nDAY\n\n12\n\nDAY\n\n11\n\nDAY\n\n10\n\nDAY\n\n9\n\nDAY\n\n8\n\nDAY\n\n7\n\nDAY\n\n6\n\nDAY\n\n5\n\nDAY\n\n4\n\nDAY\n\n3\n\nDAY\n\n2\n\nDAY\n\n1\n\nEverybody deserves their own football team\n\nHattrick is the original online football manager game, and it's free to play. ", "Here you get to create your own club, build the team of your dreams, and compete against hundreds of thousands of real people from all over the globe." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0014166698092594743, 0.0009093747939914465, 0.000640416459646076, 0.0006227473495528102, 0.0013331267982721329, 0.0005649724043905735, 0.000580454827286303, 0.0007472822908312082, 0.006231161765754223, 0.0011631330708041787, 0.0026965043507516384 ]
0.001537
11
[ "Q:\n\nEclipse - how to remove light bulb on warnings\n\nSuper quick question here that has been bugging me for a very long time -\nIs there any way to remove the light bulb that appears on the left side of the line when there is a warning in Eclipse (Specifically using Java IDE, if it matters).", "\nIt is very annoying the way it hides breakpoints, and honestly - I can see the little squiggly yellow line just fine.", "\nThanks.", "\n\nA:\n\nGo to Windows > Preferences > General > Editors > Text Editors > Annotations. ", "\nSelect Warnings option in the Annotation Types list box, un-select Vertical Ruler\n\nA:\n\nWindow -> Preferences -> Java -> Editor\n Uncheck Light bulb for quick assists\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007092785672284663, 0.0014333382714539766, 0.0006072824471630156, 0.0006852205842733383, 0.0009483903995715082 ]
0.000877
5
[ "TL;TL;DR;DR\n\nSome evidence of an expansion coming, but no official word yet. ", "But E3 is coming…\n\nFINAL UPDATE: Our prayers have been answered! ", "A new expansion is on the way, named War of the Chosen, featuring a new set of characters, classes, factions, maps and enemies, and much more coming on 29 August! ", "You can catch the details from the trailer below or on the newly-released Steam page.", "\n\nUPDATE 23/5/2017: It looks like Take-Two are “not really showing products” at this year’s E3. ", "Our hopes may be dashed…\n\nUPDATE 9/6/2017: A recent tweet from the official XCOM Twitter seems to be hinting at a long-awaited XCOM 2 expansion. ", "Ready your hype engines, and make sure you tune in to the PC Gaming Show on June 12 at 10am PT at E3!", "\n\nJune 12 at 10am PT / 1pm ET / 6pm BST. ", "➜ https://t.co/9LTRgZUs3i pic.twitter.com/UFkVfHgZ08 — XCOM (@XCOM) 8 June 2017\n\nRead on below to get the full story on the first hints of upcoming changes and what this new expansion could include.", "\n\nTL;DR\n\nThere have been changes on the Steam store that could indicate something new is coming for XCOM 2: potentially an expansion pack similar to Enemy Within.", "\n\nthat could indicate something new is coming for XCOM 2: potentially an expansion pack similar to Enemy Within. ", "No official announcement yet . ", "The likeliest moment was PAX, which has now passed. ", "However, Take-Two Interactive, the parent company of Firaxis, has representation at E3. ", "This would be an ideal time to announce an expansion.", "\n\n. ", "The likeliest moment was PAX, which has now passed. ", "This would be an ideal time to announce an expansion. ", "Timeline for a possible expansion matches that of the original XCOM reboot.", "\n\nIf there is an expansion pack, it may continue the story from the vanilla game with Terror from the Deep , hinted at the end of the main game.", "\n\n, hinted at the end of the main game. ", "This would not follow the previous trend of weaving additional content into the main gameplay – and Terror from the Deep might be the topic for a sequel, rather than an expansion.", "\n\nMore likely is that it will be based around the adventures of Vahlen, as this allows for a new secondary plotline, new enemies and new mechanics while still weaving the expansion into the main storyline and also tying up a major loose end.", "\n\nLong version:\n\nXCOM: Enemy Within is easily one of my favourite expansion packs. ", "Though, to be honest, any title that gets an expansion that includes cyborgs that rocket-punch aliens into the stratosphere is going to be a good one in my books.", "\n\nBut it did so much more than that – no one-trick pony here. ", "In an industry dominated by microtransactions and small DLCs, it really warmed my cockles to experience a true-to-God expansion pack. ", "And one that delivered on both quality and quantity at that. ", "Seriously, if you haven’t played Enemy Within, it needs to be on your list.", "\n\nWhile the additional content for XCOM 2 hasn’t been disappointing exactly (barring the terrible Anarchy’s Children off-tone bullshit), they still haven’t quite delivered the same level of quality that Enemy Within managed to achieve. ", "Yes, we have robots now; yes, we have snek hats, and of course Long War 2 has been there to fill the void in a big way.", "\n\nBut when you get a game as good as XCOM 2, it’s hard not to want more.", "\n\nIt’s understandable, then, that my hype train engines (and many others) are getting heavily revved as rumours of a possible expansion pack for XCOM 2 start getting some tantalising (though not rock-solid) evidence.", "\n\nHere’s what we know so far:\n\nSteam file ch-ch-changes\n\nThe rumours for an upcoming expansion pack have been around for months. ", "Many were expecting that Jake Solomon would announce it during the PAX East stream – but it didn’t end up happening.", "\n\nHowever, there is a new hope on the horizon; some new tidbits have been spotted by reddit user jeep-eep on SteamDB. ", "Their eagle eyes found that some interesting new files have begun compatibility testing in Steam. ", "We even have an internal name for the possible expansion: Oz.", "\n\nCompatibility testing is quite late-stage, so if we’re lucky (and the hype-train is on the right track), we could be seeing an announcement as to what this Oz business is all about quite soon.", "\n\nAge is just a number\n\nWARNING: This section contains amateur-ish interpretation of statistics data.", "\n\nYou might be thinking: “XCOM 2? ", "Didn’t that come out ages ago? ", "Why would they release an expansion pack now? ", "Would it really be the right time to do so? ", "Aren’t they just working on the sequel by now?”", "\n\nIf you are thinking that, firstly: aren’t you the curious cucumber?", "\n\nSecondly, you’re right. ", "XCOM 2 was released in February 2016, more than a year ago now. ", "It cracked 130,000 concurrent players shortly after release – nothing to sniff at for sure – and currently has about 1.4 million owners. ", "It was a popular game, and got a pretty great critical reception. ", "The playerbase has now dropped to about 5,000 to 10,000 a week; not bad for a game more than a year old.", "\n\nBut here’s the thing about expansion packs: they can create an enormous surge in popularity. ", "Even those who might not be interested in the original game might purchase it, and those who played the game in the first few days, then disappeared, may return. ", "Sometimes they even double-dip, buying a gold edition of the title to catch up on all the DLC they have missed. ", "I did that with Enemy Within on console, and I know that I’m not alone.", "\n\nWe have momentum for the hype train. ", "Why wouldn’t they release an expansion pack at this stage?", "\n\nJust look at how well Enemy Within did to boost the numbers of the original XCOM reboot. ", "It went from 5,000 concurrent players (about 7% of the original playerbase) to a huge 30,000 (almost half the original playerbase). ", "If XCOM 2 could achieve something similar, that could translate to 65,000 players all jumping on board with the expansion pack. ", "Many of these would likely be new purchasers. ", "Ding ding ding, money for the developers!", "\n\nWhat’s more, this timeline for a full-blown expansion pack isn’t actually all that unusual. ", "Remember, it’s not a DLC! ", "Enemy Within was released a year and a bit after the original. ", "We’re now a year and a bit after the release of vanilla XCOM 2. ", "Plenty of players have jumped back on due to the release of Long War 2 as well.", "\n\nWe have momentum for the hype train. ", "Why wouldn’t they release an expansion pack at this stage?", "\n\nWhat would the expansion pack even be about?", "\n\n***SPOILER WARNING FOR XCOM 2 VANILLA. ", "STOP READING NOW IF YOU DON’T WANT THE ENDING SPOILED. ", "SPOILER SPOILER SPOILER BIG BLOODY SPOILER DON’T COMPLAIN IF YOU READ PAST THIS POINT HERE’S THE SPOILER WARNING THIS IS A SPOILER WARNING OH LOOK AT HOW WONDERFUL THIS BIG FUCKING SPOILER WARNING IS***\n\nWe’ve basically been purely speculating at this point, but now we’re going full-blown fantasy land. ", "In reality, we have no idea what an expansion pack for XCOM 2 would be about.", "\n\nBut it’s fun to pretend we do, isn’t it? ", "Here’s what I reckon:\n\nTerror from the Deep?", "\n\nAt the end of XCOM 2, after defeating the Elders/Ethereals and their Avatars, we get to revel in the ultimate success of the Resistance movement. ", "However, the Elders leave us with a dire warning; that something even worse than them is coming, and that we are not ready for it yet.", "\n\nUnder the ocean, we catch a brief glimpse of some kind of crack in the floor, from which purple tendrils (or perhaps tentacles) are reaching out – similar in many ways to the psionic gate we just closed. ", "It appears that something terrible is coming… some kind of… Terror from the Deep…\n\nROLL CREDITS!", "\n\nYou can see what we’re talking about below. ", "Skip to 3:50 if you’d like to get to the crux of what I’m talking about.", "\n\nThis appears to be some kind of set-up for a sequel – a harkening back to the original XCOM series which featured a game titled Terror from the Deep. ", "This game was set four decades after the original UFO: Enemy Unknown (much like how XCOM 2 is set years after the XCOM reboot), and rather than aliens coming from the sky, they were coming from our deepest oceans.", "\n\nIt’s all a little bit too neat to be a coincidence:\n\nXCOM 2 is the sequel to a critically acclaimed reboot.", "\n\nTerror from the Deep was the sequel to the critically acclaimed original.", "\n\nThe beasties came from the ocean in the original, and they appear to be coming from the ocean in the ending.", "\n\nThose glowing tendrils are very Lovecraftian in a way, and the Terror from the Deep aliens also played a great deal on the same themes.", "\n\nThis could easily be the topic of an expansion pack. ", "Considering the Oz name could be referencing Australia i.e. going “down under”, some have inferred that this is evidence of an upcoming underwater adventure.", "\n\nHowever, it could also be the setup for a sequel rather than an expansion.", "\n\nIt’s all a little bit too neat to be a coincidence.", "\n\nSwitching the gameplay up enough to be fighting different aliens, pursuing different goals, with different maps and probably different technology trees, abilities, assets and so on, is a huge task. ", "I don’t think it could be done justice with just an expansion pack, and 2K and Firaxis will know that too.", "\n\nEnemy Within added some new enemies and some new mechanics, sure, but they played on already-established processes rather than having to invent entirely new ones. ", "They weaved the new content into the established plotline – extremely well, I might add. ", "That’s not going to be possible with something as enormous as recreating Terror from the Deep.", "\n\nFor those reasons, I don’t think any expansion pack for XCOM 2 would be based around Terror from the Deep. ", "Far more likely is that this will be the story of XCOM 3.", "\n\nThe outcome that even Tygan could predict\n\nWhat’s more likely is that the expansion will continue the trend the DLCs have started. ", "First, we had Bradford coming along on a special mission (Alien Hunters). ", "Then we had Shen suiting up for her own story arc (Shen’s Last Gift). ", "I can’t see Tygan grabbing his gun and his gear and setting off for his own adventure, and Shen Sr. ", "is dead. ", "So who does that leave?", "\n\nVahlen. ", "Dr Vahlen, of the original XCOM team.", "\n\nThis is even hinted at in Alien Hunters. ", "Vahlen is out there, somewhere, having previously been working to create the genetically modified alien monarchs that turn up out of nowhere and wipe your best squad for no reason at all fuck you RNG. ", "We never really get to hear the conclusion of what exactly happened to her, or Big Sky (the original pilot from XCOM) for that matter, whom is also hinted at in that DLC. ", "Too many loose ends left untied, and I sincerely doubt this was unintentional.", "\n\nPerhaps we’ll find Vahlen and rescue her, opening up a new slew of genetic modifications for our soldiers. ", "She could even be an antagonist, being brainwashed into fighting against the Resistance (or actually choosing to work for ADVENT). ", "Whatever way they choose to go, this option allows an easy way to introduce new plotlines (finding Vahlen), new enemies (genetic modification), and new gameplay features (tinkering with our own troops, utilising the alien’s technology against them).", "\n\nPerhaps we’ll find Vahlen and rescue her, opening up a new slew of genetic modifications for our soldiers.", "\n\nThe fact that they didn’t deal with Vahlen’s story within Alien Hunters is, to me, a big sign that this will be the central plot of any new expansion that gets released. ", "Not Terror from the Deep; that’s going to be the sequel. ", "Not disappearing off to other planets, even if Bradford does hint at that during Avenger chats – that would also be sequel material.", "\n\nNo. ", "Chances are, it’s going to be Vahlen. ", "What capacity she appears in, and what new mechanics would be introduced, are another matter entirely. ", "But considering Firax’s previous behaviour and the quality of (most) of the work they’ve put out in this series, it’s probably going to be a goodie either way.", "\n\nOne last thought: If the books are canonical, then Vahlen escaped from ADVENT by going out to sea. ", "And who would be the most suitable person to discover the new threat from the deep? ", "Yeah. ", "Vahlen’s tale might just be a part of XCOM 3, rather than an expansion. ", "But let a poor guy dream, okay?", "\n\nSummary\n\nPhew, bit of a long one! ", "I’ve put a TL;DR at the top, but here it is again to save your scrolling finger:\n\nThere have been changes on the Steam store that could indicate something new is coming for XCOM 2: potentially an expansion pack similar to Enemy Within.", "\n\nthat could indicate something new is coming for XCOM 2: potentially an expansion pack similar to Enemy Within. ", "No official announcement yet . ", "The likeliest moment was PAX, which has now passed. ", "However, Take-Two Interactive, the parent company of Firaxis, has representation at E3. ", "This would be an ideal time to announce an expansion.", "\n\n. ", "The likeliest moment was PAX, which has now passed. ", "This would be an ideal time to announce an expansion. ", "Timeline for a possible expansion matches that of the original XCOM reboot.", "\n\nIf there is an expansion pack, it may continue the story from the vanilla game with Terror from the Deep , hinted at the end of the main game.", "\n\n, hinted at the end of the main game. ", "This would not follow the previous trend of weaving additional content into the main gameplay – and Terror from the Deep might be the topic for a sequel, rather than an expansion.", "\n\nMore likely is that it will be based around the adventures of Vahlen, as this allows for a new secondary plotline, new enemies and new mechanics while still weaving the expansion into the main storyline and also tying up a major loose end.", "\n\nDo you think there’s an expansion on the way? ", "What gameplay mechanics do you think will be included? ", "Let me know in the comments below!" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006540683098137379, 0.000873947108630091, 0.0009103331831283867, 0.0005548711051233113, 0.0007535980548709631, 0.0005745169473811984, 0.0009183763759210706, 0.0008611881639808416, 0.0009242169326171279, 0.0007492383010685444, 0.000778182758949697, 0.0006852480582892895, 0.0008491691551171243, 0.0006074943812564015, 0.0005409721634350717, 0.0021375217474997044, 0.0008491691551171243, 0.0005409721634350717, 0.0006213922169990838, 0.0006465337937697768, 0.0005980819114483893, 0.0006581885390914977, 0.000847398885525763, 0.0007009191904217005, 0.0009276660275645554, 0.0022921960335224867, 0.108608178794384, 0.0005651030805893242, 0.016639498993754387, 0.17649565637111664, 0.0011275310534983873, 0.0009313453338108957, 0.0006135125295259058, 0.0005899151437915862, 0.0006065252819098532, 0.0006359026301652193, 0.0005986365722492337, 0.0005839371006004512, 0.0005429306766018271, 0.000857649720273912, 0.0006647319532930851, 0.0006805731682106853, 0.0007562530227005482, 0.0008328076801262796, 0.0007493110606446862, 0.2828426659107208, 0.0007347846985794604, 0.0006340743857435882, 0.0010550407459959388, 0.0006769035244360566, 0.021892808377742767, 0.0007271721842698753, 0.0005484460270963609, 0.0013248180039227009, 0.0009015665855258703, 0.0005693893763236701, 0.0006885880720801651, 0.0007195391226559877, 0.0007754257530905306, 0.0006816929089836776, 0.0006259059882722795, 0.003815932897850871, 0.0006557347369380295, 0.002889743074774742, 0.000700080709066242, 0.0006991582340560853, 0.0006030971999280155, 0.0005693893763236701, 0.0006885880720801651, 0.000700417032931, 0.0023523340933024883, 0.007976436987519264, 0.9858369827270508, 0.0006496957503259182, 0.0007101016817614436, 0.004397636279463768, 0.0005994184757582843, 0.0012337261578068137, 0.0007598193478770554, 0.013071664609014988, 0.0005680095637217164, 0.001353540807031095, 0.0007596806972287595, 0.0007734762621112168, 0.0008181472076103091, 0.0011146782198920846, 0.0007860017358325422, 0.000745131284929812, 0.000575793965253979, 0.0005753707373514771, 0.0005845914129167795, 0.0008551424834877253, 0.0008172235684469342, 0.0007355027482844889, 0.0007455520681105554, 0.0005669432575814426, 0.0019411101238802075, 0.0009852566290646791, 0.0006293179467320442, 0.0007538942736573517, 0.0005651033134199679, 0.0006546875811181962, 0.0024200836196541786, 0.04239997640252113, 0.001774473930709064, 0.0014276194851845503, 0.0007603669655509293, 0.0006035692640580237, 0.9946162104606628, 0.0006038034916855395, 0.002263966714963317, 0.03109479695558548, 0.001282364595681429, 0.0008240195456892252, 0.03109479695558548, 0.0007194328354671597, 0.001539134536869824, 0.0008548145415261388, 0.0013785824412479997, 0.001980598783120513, 0.0008290521800518036, 0.0005550258210860193, 0.0006691419403068721, 0.0016758005367591977, 0.0010335048427805305, 0.000673863512929529, 0.03578181937336922, 0.0053673190996050835, 0.004364892840385437, 0.000778182758949697, 0.0006852480582892895, 0.0008491691551171243, 0.0006074943812564015, 0.0005409721634350717, 0.0021375217474997044, 0.0008491691551171243, 0.0005409721634350717, 0.0006213922169990838, 0.0006465337937697768, 0.0005980819114483893, 0.0006581885390914977, 0.000847398885525763, 0.0008949959301389754, 0.0006303515983745456, 0.0006147974054329097 ]
0.019851
145
[ "DFL23448, A Novel Transient Receptor Potential Melastin 8-Selective Ion Channel Antagonist, Modifies Bladder Function and Reduces Bladder Overactivity in Awake Rats.", "\nThe transient receptor potential melastin 8 ion channel (TRPM8) is implicated in bladder sensing but limited information on TRPM8 antagonists in bladder overactivity is available. ", "This study characterizes a new TRPM8-selective antagonist (DFL23448 [5-(2-ethyl-2H-tetrazol-5-yl)-2-(3-fluorophenyl)-1,3-thiazol-4-ol]) and evaluates it in cold-induced behavioral tests and tests on bladder function and experimental bladder overactivity in vivo in rats. ", "DFL23448 displayed IC50 values of 10 and 21 nM in hTRPM8 human embryonic kidney 293 cells activated by Cooling Agent 10 or cold, but it had limited activity (IC50 > 10 μM) at transient receptor potential vanilloids TRPV1, TRPA1, or TRPV4 or at various G protein-coupled receptors. ", "In rats, DFL23448 administered intravenously or orally had a half-life of 37 minutes or 4.9 hours, respectively. ", "DLF23448 (10 mg/kg i.v.) ", "reduced icilin-induced \"wet dog-like\" shakes in rats. ", "Intravesical DFL23448 (10 mg/l), but not vehicle, increased micturition intervals, micturition volume, and bladder capacity. ", "During bladder overactivity by intravesical prostaglandin E2 (PGE2), vehicle controls exhibited reductions in micturition intervals, micturition volumes, and bladder capacity by 37%-39%, whereas the same parameters only decreased by 12%-15% (P < 0.05-0.01 versus vehicle) in DFL23448-treated rats. ", "In vehicle-treated rats, but not in DFL23448-treated rats, intravesical PGE2 increased bladder pressures. ", "Intravenous DFL23448 at 10 mg/kg, but not 1 mg/kg DFL23448 or vehicle, increased micturition intervals, micturition volumes, and bladder capacity. ", "During bladder overactivity by intravesical PGE2, micturition intervals, micturition volumes, and bladder capacity decreased in vehicle- and 1 mg/kg DFL23448-treated rats, but not in 10 mg/kg DFL23448-treated rats. ", "Bladder pressures increased less in rats treated with DFL23448 10 mg/kg than in vehicle- or 1 mg/kg DFL23448-treated rats. ", "DFL23448 (10 mg/kg i.v.), ", "but not vehicle, prevented cold stress-induced bladder overactivity. ", "Our results support a role for bladder TRPM8-mediated signals in experimental bladder overactivity." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0012597211170941591, 0.0006306007271632552, 0.0006853616796433926, 0.0006448667263612151, 0.0008709846297279, 0.0006717216456308961, 0.012172010727226734, 0.0006453137029893696, 0.0007729598437435925, 0.0008171534282155335, 0.0006396214012056589, 0.0007495039026252925, 0.0007097793277353048, 0.0006756126531399786, 0.0007090072031132877, 0.0005711858393624425 ]
0.001452
16
[ "\n52 Cal.4th 419 (2011)\n257 P.3d 72\n128 Cal. ", "Rptr. ", "3d 648\nTHE PEOPLE, Plaintiff and Respondent,\nv.\nEDDIE JASON LOWERY, Defendant and Appellant.", "\nNo. ", "S179422.", "\nSupreme Court of California.", "\nAugust 11, 2011.", "\n*421 William D. Farber, under appointment by the Supreme Court, for Defendant and Appellant.", "\nEdmund G. Brown, Jr., and Kamala D. Harris, Attorneys General, Dane R. Gillette, Chief Assistant Attorney General, Gary W. Schons, Assistant Attorney General, Steven T. Oetting, Gil Gonzalez and Christine Levingston Bergman, Deputy Attorneys General, for Plaintiff and Respondent.", "\n\nOPINION\nKENNARD, J.—\nIn a recorded telephone conversation with his incarcerated wife, defendant said he would kill Joseph Gorman, an 88-year-old man who had accused the couple of stealing $250,000 from his mobilehome and who had testified against them in court. ", "Based on defendant's comments, he was charged with violating a state statute that prohibits \"willfully\" threatening violence against a crime witness or victim. (", "Pen. ", "Code, § 140, subd. (", "a) (section 140(a)); further undesignated statutory references are to the Penal Code.) ", "A jury convicted defendant. ", "On appeal, defendant argued that because the statute lacked a specific intent requirement, it infringed his right to free speech under the federal Constitution's First Amendment. ", "The Court of Appeal disagreed and upheld the conviction.", "\nDoes section 140(a) violate the First Amendment, as defendant contends? ", "Or does the statute target only \"true threats,\" a category of speech that has no First Amendment protection?", "\n*422 We construe section 140(a) as requiring proof that a reasonable person would understand the allegedly threatening statements—when considered in their context and surrounding circumstances—\"to communicate a serious expression of an intent to commit an act of unlawful violence,\" the high court's definition of a \"`true threat.'\" (", "Virginia v. Black (2003) 538 U.S. 343, 359 [155 L.Ed.2d 535, 123 S.Ct. ", "1536].) ", "So construed, section 140(a) does not run afoul of the First Amendment. ", "Although, as noted earlier, the Court of Appeal upheld the constitutionality of the statute, it did so on grounds different from the reasonable person standard just articulated. ", "Therefore, we reverse the judgment of the Court of Appeal and remand this case to that court to consider whether our holding affects defendant's judgment of conviction.", "\n\nI\nOn June 26, 2007, 88-year-old Joseph Gorman hired defendant and his wife, Veronica, to clean Gorman's mobilehome in Cathedral City, Riverside County. ", "Gorman then left for several hours. ", "When he returned, the couple had already departed. ", "Gorman soon discovered the loss of some $250,000 in cash, which he had wrapped in small bundles and hidden under a couch. ", "Gorman called the police. ", "Eventually, defendant and Veronica were charged with theft of the money. ", "They were tried separately. ", "Defendant was acquitted but Veronica was convicted. ", "Veronica was sentenced to state prison and ordered to pay Gorman $250,000 in restitution.", "\nOn several occasions between August 2007 and June 2008, while Veronica was incarcerated in the Riverside County jail, defendant talked to her by telephone. ", "Those talks, as generally occurs with inmates' telephone calls, were periodically interrupted by recorded warnings that the conversations were being tape-recorded. ", "Included in the recorded telephone conversations between defendant and Veronica, totaling more than 80 minutes, were these statements by defendant: \"I'm going down to Gorman's and I'm gonna steal 250,000 dollars! ", "I'm a [sic] blow his fucken [sic] head away! ", "I will kill the fucken [sic] bastard that said I stole 250,000! ", "I will do it! ", "You know what? ", "I stole 100,000 dollars . . . ", "Listen! ", "Listen! ", "I stole 100,000 dollars! ", "I burned it all! ", "Okay?! ", "Well, guess what I'm gonna do?! ", "I'm gonna kill the bastard! ", "And I'm gonna go down to Mr. Gorman's house, maybe this week, and I'm gonna blow his fucken [sic] head away!\"", "\nAlso: \"I'm not getting mad at you about it, I'm getting . . . ", "I'm gonna get mad at the Lawyer and the D.A. and, and Mr. Gorman, I'm gonna go down there and tell him, `Look! ", "You say my wife stole 250,000 . . . ", "you said I stole 250,000! ", "Let's get the 250,000 out of your house right now!' ", "Yeah, but he needed to take the 250,000 dollars off, because I'm gonna tell the . . . ", "the . . . *", "423 that blond-headed chic[k], uh . . . ", "that was uh . . . ", "the D.A. . . . ", "I'm gonna kill her! ", "And I'm gonna kill a lot of people! ", "So I might do life in prison! ", "We might be in the same prison!\"", "\nAnd: \"Listen! ", "Okay, listen! ", "You, you tell `em that [your] husband's going down and get 250,000 dollars from that man, and then when he gets the 250,000 dollars, he's . . . ", "he's gonna kill anybody that steps in his way!!\"", "\nThese statements by defendant led to his prosecution under section 140(a), which prohibits \"willfully\" threatening to use physical force against a crime victim or witness.", "\nAt trial, defendant admitted making the statements but denied any intent to harm Gorman. ", "Defendant explained that he was simply expressing his anger over Gorman's false accusation that defendant and Veronica had stolen Gorman's $250,000 in cash and over the trial court's order that Veronica pay that amount in restitution.", "\nThe jury found defendant guilty. ", "The trial court suspended imposition of sentence and placed defendant on probation for three years conditioned upon serving one year in county jail. ", "The Court of Appeal affirmed the judgment. ", "We granted defendant's petition for review to decide whether section 140(a) violates the First Amendment's free speech guarantee.", "\n\nII\nWe begin with a brief overview of the federal decisional law on point here, followed in part III, post, by our resolution of the issue presented.", "\n(1) The First Amendment states that \"Congress shall make no law . . . ", "abridging the freedom of speech . . . .\" (", "U.S. Const., ", "1st Amend.) ", "This proscription, as incorporated through the Fourteenth Amendment's due process clause, likewise binds the states. (", "Virginia v. Black, supra, 538 U.S. 343, 358.) ", "The provision is not absolute, however. ", "Not within the First Amendment's protection are \"`certain well-defined and narrowly limited classes of speech'\" — those \"`\"of such slight social value as a step to truth that any benefit that may be derived from them is clearly outweighed by the social interest in order and morality.\"'\" (", "Virginia v. Black, supra, at pp. ", "358-359, quoting R.A.V. v. St. Paul (1992) 505 U.S. 377, 382-383 [120 L.Ed.2d 305, 112 S.Ct. ", "2538].) ", "Falling into that category are what the United States Supreme Court has described as \"true threats.\" (", "Virginia v. Black, supra, at p. 343; Watts v. United States (1969) 394 U.S. 705, 707-708 [22 L.Ed.2d 664, 89 S.Ct. ", "1399].)", "\n*424 The high court first used the term \"true threat\" in Watts v. United States, supra, 394 U.S. 705, which involved a federal conviction under a statute prohibiting \"`knowingly and willfully'\" making a threat \"`to take the life of or to inflict bodily harm upon the President of the United States.'\" (", "Id. at p. 705, quoting 18 U.S.C. § 871(a).) ", "The defendant in Watts, speaking at a political meeting, said that he had just received a draft notice to report for military service, adding that \"`[i]f they ever make me carry a rifle the first man I want to get in my sights is L.B.J. [(U.S. President Lyndon B. Johnson)].'\" (", "394 U.S. at p. 706.) ", "In a short \"By the Court\" opinion, the United States Supreme Court reversed the conviction, deeming the defendant's statement to be mere \"political hyperbole\" (id. at p. 708) and, as such, not supporting the conviction for threatening to kill or inflict bodily injury on the President of the United States (id. at pp. ", "706-707). ", "The high court stressed that any statute that \"makes criminal a form of pure speech . . . ", "must be interpreted with the commands of the First Amendment clearly in mind,\" and that \"[w]hat is a threat must be distinguished from what is constitutionally protected speech.\" (", "Id. at p. 707.) ", "Applying that distinction in Watts, the high court concluded that the defendant's statement about shooting President Johnson was not a \"true `threat.'\" (", "Id. at p. 708.) ", "But the high court did not define that term in Watts.", "\nConsequently, as the Colorado Court of Appeals noted in People v. Stanley (Colo.App. ", "2007) 170 P.3d 782, various federal appellate courts construing statutes criminalizing threats \"almost uniformly applied an objective [reasonable person] standard . . . ", "to determine whether a statement was a true threat.\" (", "Id. at p. 787; see, e.g., U.S. v. Malik (2d Cir. ", "1994) 16 F.3d 45, 49 [using a \"reasonable person\" standard to decide that evidence was sufficient to establish a true threat]; U.S. v. Kosma (3d Cir. ", "1991) 951 F.2d 549, 552, 556-557 [upholding conviction for threatening President Ronald Reagan after a court trial at which the judge found the defendant guilty using \"the objective, reasonable person standard\"]; U.S. v. Orozco-Santillan (9th Cir. ", "1990) 903 F.2d 1262, 1265 [evidence sufficient to establish true threat].)", "\n(2) Thirty-four years after its 1969 decision in Watts v. United States, supra, 394 U.S. 705, holding that \"true threats\" fell outside the First Amendment's protection, the high court did define the term: \"`True threats' encompass those statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual or group of individuals. [", "Citations.] ", "The speaker need not actually intend to carry out the threat. ", "Rather, a prohibition on true threats `protect[s] individuals from the fear of violence' and `from the disruption that fear engenders,' in addition to protecting people `from the possibility that the threatened violence will occur.'\" (", "Virginia v. Black, supra, 538 U.S. 343, 359-360.)", "\n*425 At issue in Virginia v. Black was a state criminal statute making it unlawful \"`for any person or persons, with the intent of intimidating any person or group of persons, to burn, or cause to be burned, a cross on the property of another, a highway or other public place.'\" (", "Virginia v. Black, supra, 538 U.S. at p. 348, quoting Va. Code Ann. § ", "18.2-423.) ", "The Virginia statute also provided that burning a cross would be prima facie evidence of an intent to intimidate. (", "Virginia v. Black, at p. 348.) ", "The high court observed that the Commonwealth of Virginia could, without violating the First Amendment's free speech protection, \"outlaw cross burnings done with the intent to intimidate because burning a cross is a particularly virulent form of intimidation.\" (", "538 U.S. at p. 363.)", "\nNonetheless, the high court struck down the Virginia statute; it reasoned that the statute's provision that burning a cross \"shall be prima facie evidence of an intent to intimidate\" (Va. Code Ann. § ", "18.2-423) allowed for a conviction \"based solely on the fact of the cross burning itself,\" thus creating \"`\"an unacceptable risk of the suppression of ideas\"'\" (Virginia v. Black, supra, 538 U.S. at pp. ", "363, 365 (plur. ", "opn. ", "of O'Connor, J., joined by Rehnquist, C. J., Stevens & Breyer, JJ.); ", "see id., at p. 385 (conc. & ", "dis. ", "opn. ", "of Souter, J., joined by Kennedy & Ginsburg, JJ.)).", "\nAs explained in Justice O'Connor's plurality opinion in that case, the cross burner might well be engaging in \"constitutionally proscribable intimidation.\" (", "Virginia v. Black, supra, 538 U.S. at p. 365.) ", "But, the plurality noted, that same conduct might likewise indicate \"that the person is engaged in core political speech\" protected under the First Amendment. (", "Virginia v. Black, at p. 365.) ", "The plurality went on to state that although punishing cross burning \"done with the purpose of threatening or intimidating a victim\" does not run afoul of the First Amendment (Virginia v. Black, at p. 366, italics added), that cannot be said of punishing cross burning intended as \"a statement of ideology\" or as \"a symbol of group solidarity,\" both of which \"`would almost certainly be protected expression'\" (id. at pp. ", "365-366).", "\nDefendant here contends that because section 140(a), the California statute at issue, does not require that the threat be made with an intent to intimidate the crime victim or witness, the statute violates the First Amendment. ", "We discuss that issue below.", "\n\nIII\nSection 140(a), as relevant here, provides: \"[E]very person who willfully. . . ", "threatens to use force or violence upon the person of a witness to, or a victim of, a crime or any other person . . . ", "because the witness, victim, or other person has provided any assistance or information to a law enforcement *426 officer, or to a public prosecutor in a criminal proceeding . . . ", "shall be punished by imprisonment in the county jail not exceeding one year, or by imprisonment in the state prison for two, three, or four years.\" ", "The statutory language includes no requirement that the defendant act with a specific intent to intimidate the particular victim (People v. McDaniel (1994) 22 Cal.", "App.4th 278, 284 [27 Cal.", "Rptr.2d 306]) and does not even require that the threat be communicated to the victim (People v. McLaughlin (1996) 46 Cal.", "App.4th 836, 842 [54 Cal.", "Rptr.2d 4]).", "\nAs noted earlier, defendant here contends that a statute such as section 140(a), which punishes verbal threats, violates the First Amendment unless it is limited to threats made with the specific intent to intimidate the victim. ", "Defendant relies on the high court's decision in Virginia v. Black, supra, 538 U.S. 343, which, as we have explained, invalidated the Virginia cross-burning statute because of its prima facie evidence provision, which operated to remove the element of the defendant's intent from the jury's consideration. ", "Defendant asserts that because the high court invalidated the Virginia cross-burning statute, a majority of that court must have determined that a conviction under that statute would violate the First Amendment unless a jury found that the defendant's burning of the cross was intended to intimidate an individual or group of individuals. ", "From this premise, defendant reasons that any statute that criminally punishes threats must include an element of specific intent to intimidate the victim. ", "We are not persuaded.", "\nThe statute at issue in Virginia v. Black, supra, 538 U.S. 343, expressly prohibited cross burning done \"`with the intent of intimidating any person. . . .'\" (", "Id. at p. 348.) ", "That specific intent requirement served to ensure that the prohibited cross burning was limited to cross burning undertaken as a threat. ", "But the statute's prima facie evidence provision, which made a defendant's burning of a cross prima facie evidence of a specific intent to intimidate, in effect directed the jury to convict even if the jury concluded that the cross burning was not intended as intimidation but was merely an expression of the defendant's beliefs, and thus was speech protected by the First Amendment. ", "As the high court in Virginia v. Black, supra, at pages 365-366 explained, cross burning may be undertaken for a variety of nonthreatening reasons (such as \"a symbol of group solidarity\" or as \"a statement of ideology\") and thus not constitute a threat at all.", "\nThe statute at issue here, section 140(a), prohibits making threats of violence against a crime victim or witness. ", "In Virginia v. Black, supra, 538 U.S. 343, the high court did not hold that, to pass muster under the First Amendment, a statute such as the one at issue here must limit the prohibited threats to those made with the specific intent to intimidate a particular *427 victim.[1] Our conclusion finds support in the high court's description of \"True threats\" in that case: \"`True threats,'\" the high court said, \"encompass those statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual or group of individuals.\" (", "Virginia v. Black, supra, at p. 359, italics added.) ", "Thus, the category of threats that can be punished by the criminal law without violating the First Amendment includes but is not limited to threatening statements made with the specific intent to intimidate.", "\n(3) Does section 140(a), the California statute at issue here, prohibit only true threats, which fall outside the free speech protection of the First Amendment? ", "We note that section 140(a) requires that a threat against a crime victim or witness be made \"willfully.\" ", "But a penal statute's use of the term \"willfully\" to describe the intent with which an act is done ordinarily implies \"simply a purpose or willingness to commit the act,\" not \"any intent to violate law, or to injure another . . . .\" (§ ", "7, subd. ", "1; see People v. Licas (2007) 41 Cal.4th 362, 366 [60 Cal.", "Rptr.3d 31, 159 P.3d 507]; People v. Atkins (2001) 25 Cal.4th 76, 85 [104 Cal.", "Rptr.2d 738, 18 P.3d 660].) ", "Accordingly, a person who under section 140(a) \"willfully\" utters threatening language against a crime victim or witness could be found to have violated section 140(a) even if the person had no intention of carrying out the threat, as the mere use of the threatening language, without more, completes the crime.", "\n(4) Insofar as practicable, this court will construe a statute so as to \"`render it valid . . . ", "or free from doubt as to its constitutionality . . . .'\" (", "In re Marriage Cases (2008) 43 Cal.4th 757, 800, fn. ", "21 [76 Cal.", "Rptr.3d 683, 183 P.3d 384]; see Myers v. Philip Morris Companies, Inc. (2002) 28 Cal.4th 828, 846 [123 Cal.", "Rptr.2d 40, 50 P.3d 751]; see also In re Smith (2008) 42 Cal.4th 1251, 1269 [73 Cal.", "Rptr.3d 469, 178 P.3d 446] [our \"common practice\" is to employ this statutory construction device, \"`when reasonable, to avoid difficult constitutional questions'\"].) (", "5) Therefore, to ensure the constitutionality of section 140(a), we construe it as applying only to those threatening statements that a reasonable listener would understand, in light of the context and surrounding circumstances, to constitute a true threat, namely, \"a serious expression of an intent to commit an act of unlawful violence\" (Virginia v. Black, supra, 538 U.S. at p. 359), rather than an expression of jest or frustration. ", "The latter category carries First Amendment protection; the former does not. (", "Virginia v. Black, at p. 359.) ", "So construed, section 140(a) does not violate the First Amendment.", "\n*428 (6) We also reject defendant's contention that section 140(a) violates the First Amendment because it lacks any requirement that the threat to harm a crime witness or victim is to be carried out immediately or that the defendant have the apparent ability to carry it out. ", "In support, defendant cites U.S. v. Kelner (2d Cir. ", "1976) 534 F.2d 1020. ", "In that case, a federal appeals court held that under the First Amendment \"only unequivocal, unconditional and specific expressions of intention immediately to inflict injury may be punished\" as threats. (", "Kelner, at p. 1027, italics added.) ", "The Kelner opinion, however, was issued almost three decades before, and appears to conflict with, the United States Supreme Court's 2003 decision in Virginia v. Black, supra, 538 U.S. 343. ", "Nothing the high court said there suggests that speech threatening bodily harm is entitled to First Amendment protection, and thus is immune from criminal prosecution, absent proof that the speaker intended to inflict the threatened harm immediately, or had the apparent ability to do so.", "\n\nCONCLUSION AND DISPOSITION\nAlthough the Court of Appeal rejected defendant's First Amendment challenge to section 140(a), it did so on grounds that differ from those we have articulated here. ", "Accordingly, we reverse the judgment of the Court of Appeal, and we remand this case to that court to consider whether our holding affects the judgment of conviction.", "\nCantil-Sakauye, C. J., Baxter, J., Werdegar, J., Chin, J., Corrigan, J., and Zelon, J.,[*] concurred.", "\nBAXTER, J., Concurring. ", "—\nThe First Amendment allows states \"to ban a `true threat.'\" (", "Virginia v. Black (2003) 538 U.S. 343, 359 [155 L.Ed.2d 535, 123 S.Ct. ", "1536] (Black).) ", "The majority opinion, which I have joined, is consistent with the First Amendment. ", "It upholds the constitutionality of Penal Code section 140, subdivision (a), on the ground that the statute applies \"only to those threatening statements that a reasonable listener would understand, in light of the context and surrounding circumstances, to constitute a true threat, namely, `a serious expression of an intent to commit an act of unlawful violence.'\" (", "Maj. ", "opn., ", "ante, at p. 427, quoting Black, supra, 538 U.S. at p. 359.) ", "I write separately to discuss more fully the Ninth Circuit's mistaken belief that a \"true threat\" requires something else, namely, proof that the speaker subjectively intended the statements be taken as a threat. (", "See U.S. v. Bagdasarian (9th Cir., ", "July 19, 2011, No. ", "09-50529) ___ F.3d ___, ___ [2011 U.S.App. ", "Lexis 14684, pp. *", "11-*16]; U.S. v. Cassel (9th Cir. ", "2005) 408 F.3d 622, 631-633.)", "\n*429 As this court's opinion points out, decisions prior to Black \"`almost uniformly'\" applied an objective standard, not a subjective standard, to determine whether a statement was a true threat and thus outside of the protections afforded by the First Amendment. (", "Maj. ", "opn., ", "ante, at p. 424; see also Doe v. Pulaski County Special School Dist. (", "8th Cir. ", "2002) 306 F.3d 616, 622 (en banc) [\"All the courts to have reached the issue have consistently adopted an objective test that focuses on whether a reasonable person would interpret the purported threat as a serious expression of an intent to cause a present or future harm.\"].) ", "To construe Black as upsetting the legal landscape would be a peculiar reading. ", "Black did not criticize the existing case law. ", "Indeed, it did not even purport to announce what criminal intent was constitutionally required. (", "Strasser, Advocacy, True Threats, and the First Amendment (2011) 38 Hastings Const. ", "L.Q. 339, 377.) ", "Rather, Black involved a criminal statute that expressly included a showing of subjective intent—i.e., ", "a Virginia statute banning cross burning with \"`an intent to intimidate a person or group of persons.'\" (", "Black, supra, 538 U.S. at p. 347, quoting Va. Code Ann., § ", "18.2-423.) ", "The constitutional necessity of such a provision was never at issue.", "\nRather, the controversy in Black centered on an additional provision of the Virginia criminal statute under which \"`any . . . ", "burning of a cross shall be prima facie evidence of an intent to intimidate a person or group of persons.'\" (", "Black, supra, 538 U.S. at p. 363 (plur. ", "opn. ", "of O'Connor, J.) [quoting Va. Code Ann. § ", "18.2-423].) ", "Because of the prima face provision, the jury was instructed that \"`[t]he burning of a cross, by itself, is sufficient evidence from which you may infer the required intent.'\" (", "Id. at p. 364 (plur. ", "opn. ", "of O'Connor, J.).) ", "A historical survey of cross burning, however, called into question the validity of the prima facie provision and the corresponding instruction. ", "Having originated as a means for Scottish tribes to signal each other, cross burning in the United States had become \"inextricably intertwined with the history of the Ku Klux Klan\" as \"a `symbol of hate.'\" (", "Id. at pp. ", "352, 357.) ", "Even so, a burning cross can convey both a political message or a threatening one. (", "Id. at p. 357.) ", "A burning cross may stand at times as a \"symbol[] of shared group identity and ideology\" at Ku Klux Klan gatherings (or in movies depicting the Klan), or it may blaze as \"a tool of intimidation and a threat of impending violence.\" (", "Id. at pp. ", "356, 354.) ", "Because of this dual history, \"a burning cross does not inevitably convey a message of intimidation\" (id. at p. 357)—or, in other words, a burning cross is not inevitably a true threat. ", "Something more would be required to make it a true threat.", "\nOne \"type of true threat,\" according to the high court, occurs \"where a speaker directs a threat to a person or group of persons with the intent of placing the victim in fear of bodily harm or death.\" (", "Black, supra, 538 U.S. at *430 p. 360.) ", "Although \"some cross burnings fit within this meaning of intimidating speech, and rightly so\" (ibid.), \"[", "t]he prima facie evidence provision in [Black] ignores all of the contextual factors that are necessary to decide whether a particular cross burning is intended to intimidate\" (id. at p. 367 (plur. ", "opn. ", "of O'Connor, J.)). ", "The plurality then concluded: \"The First Amendment does not permit such a shortcut.\" (", "Ibid. (", "plur. ", "opn. ", "of O'Connor, J.); see also id. at p. 380 (conc. & ", "dis. ", "opn. ", "of Scalia, J.) [the jury instruction made it \"impossible to determine\" whether the verdict rested on the entirety of the evidence, \"including evidence that might rebut the presumption that cross burning was done with an intent to intimidate,\" or whether the jury instead \"focused exclusively on the fact that the defendant burned a cross\"].) ", "Indeed, \"the prima facie provision strips away the very reason why a State may ban cross burning with the intent to intimidate. . . . ", "The provision permits the Commonwealth to arrest, prosecute, and convict a person based solely on the fact of the cross burning itself\"—even when the conduct is \"core political speech\" and, hence, not a true threat. (", "Id. at p. 365 (plur. ", "opn. ", "of O'Connor, J.).)", "\nPenal Code section 140, subdivision (a), by contrast, applies only to true threats, not to speech protected by the First Amendment. ", "As our opinion today explains, section 140, subdivision (a), applies \"only to those threatening statements that a reasonable listener would understand, in light of the context and surrounding circumstances, to constitute a true threat, namely, `a serious expression of an intent to commit an act of unlawful violence.'\" (", "Maj. ", "opn., ", "ante, at p. 424, quoting Black, supra, 538 U.S. at p. 359.) ", "Under these circumstances, there need not be any additional showing that the speaker subjectively intended the statements be taken as a threat. ", "The need to punish true threats—i.e., ", "to \"`protect[] individuals from the fear of violence' and `from the disruption that fear engenders'\" (Black, supra, 538 U.S. at p. 360)—is triggered when a reasonable listener would understand the statements, in context, to be a serious expression of an intent to commit an act of unlawful violence. ", "The fear of violence and the accompanying disruption such fear may cause is in no way diminished by the possibility that the speaker subjectively (and silently) did not intend to make a threat. ", "And Black did not hold otherwise.", "\nOur ruling today is consistent with the understanding of most courts that have considered the issue since Black was decided. (", "City of San Jose v. Garbett (2010) 190 Cal.", "App.4th 526, 539 [118 Cal.", "Rptr.3d 420] [Black does not require the defendant have \"an intent that a statement `be received as a threat'\"]; U.S. v. Armel (4th Cir. ", "2009) 585 F.3d 182, 185 [\"Statements constitute a `true threat' if `an ordinary reasonable recipient who is familiar with the[ir] context . . . ", "would interpret [those statements] as a threat of injury.'\"]; ", "U.S. v. Jongewaard (8th Cir. ", "2009) 567 F.3d 336, 339, fn. ", "2 [\"In this circuit, the test for distinguishing a true threat from constitutionally *431 protected speech is whether an objectively reasonable recipient would interpret the purported threat `as a serious expression of an intent to harm or cause injury to another.'\"]; ", "Porter v. Ascension Parish School Bd. (", "5th Cir. ", "2004) 393 F.3d 608, 616 [\"Speech is a `true threat' and therefore unprotected if an objectively reasonable person would interpret the speech as a `serious expression of an intent to cause a present or future harm.' ", "The protected status of the threatening speech is not determined by whether the speaker had the subjective intent to carry out the threat; rather, to lose the protection of the First Amendment and be lawfully punished, the threat must be intentionally or knowingly communicated to either the object of the threat or a third person.\" (", "fns. ", "omitted)]; U.S. v. Zavrel (3d Cir. ", "2004) 384 F.3d 130, 136; U.S. v. Nishnianidze (1st Cir. ", "2003) 342 F.3d 6, 14-15 [\"A true threat is one that a reasonable recipient familiar with the context of the communication would find threatening\"; thus the government had to prove only \"that the defendant intended to transmit the interstate communication and that the communication contained a true threat\"]; U.S. v. Syring (D.D.C. 2007) 522 F.Supp.2d 125, 129 [\"courts in all jurisdictions consider whether a reasonable person would consider the statement a serious expression of an intent to inflict harm . . .\"]; ", "New York ex rel. ", "Spitzer v. Cain (S.D.N.Y. 2006) 418 F.Supp.2d 457, 479 [\"The relevant intent is the intent to communicate a threat, not as defense counsel maintains, the intent to threaten.\"]; ", "Citizen Publishing Co. v. Miller (2005) 210 Ariz. 513 [115 P.3d 107, 114] [under Arizona's test, which is \"substantially similar\" to Black, \"`true threats' are those statements made `in a context or under such circumstances wherein a reasonable person would foresee that the statement would be interpreted by those to whom the maker communicates the statement as a serious expression of an intention to inflict bodily harm upon or to take the life of [a person]'\"]; People v. Stanley (Colo.App. ", "2007) 170 P.3d 782, 789 [\"Black does not hold that subjective intent to threaten must be proved.\"]; ", "State v. DeLoreto (2003) 265 Conn. 145 [827 A.2d 671, 680] [\"In the context of a threat of physical violence, `whether a particular statement may properly be considered to be a threat is governed by an objective standard—whether a reasonable person would foresee that the statement would be interpreted by those to whom the maker communicates the statement as a serious expression of intent to harm or assault.'\"]; ", "Hearn v. State (Miss. 2008) 3 So.3d 722, 739, fn. ", "22 [\"The protected status of threatening speech is not based upon the subjective intent of the speaker.\"]; ", "State v. Johnston (2006) 156 Wn.2d 355 [127 P.3d 707, 710] [\"`[W]hether a true threat has been made is determined under an objective standard that focuses on the speaker.'\"]; ", "see generally Citron, Cyber Civil Rights (2009) 89 B.U. L.Rev. ", "61, 107, fn. ", "321 [\"Only the Ninth Circuit requires proof that the defendant subjectively intended to threaten the victim.\"].)", "\n*432 Thus, when the high court said, \"`True threats' encompass those statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual or group of individuals\" (Black, supra, 538 U.S. at p. 359), it did not thereby, for the first time, require proof that the speaker subjectively intended the speech be taken as a threat. ", "The relevant intent remains the intent to communicate, not the intent to threaten. (", "Porter v. Ascension Parish School Bd., ", "supra, 393 F.3d at pp. ", "616-617.) ", "A reading of Black that recasts \"`means to communicate'\" into a requirement that the speaker \"intend[ed] for his language to threaten the victim\" (U.S. v. Cassel, supra, 408 F.3d at p. 631) assumes that the single word \"communicate\" was designed to overrule the settled law discussed above, and assigns \"communicate\" much more work than the word ordinarily can bear. ", "Moreover, the high court, in the same paragraph in Black, went on to say that the \"prohibition on true threats `protects individuals from the fear of violence' and `from the disruption that fear engenders,' in addition to protecting people `from the possibility that the threatened violence will occur.'\" (", "Black, supra, 538 U.S. at p. 360.) ", "The need for such protection, as noted above, does not depend on whether the speaker subjectively intended to threaten the victim. \"", "A standard for threats that focused on the speaker's subjective intent to the exclusion of the effect of the statement on the listener would be dangerously underinclusive with respect to the first two rationales for the exemption of threats from protected speech.\" (", "New York ex rel. ", "Spitzer v. Cain, supra, 418 F.Supp.2d at p. 479.)", "\nOne might also question the logic of resting the constitutional determination whether speech qualifies as a true threat on the subjective understanding of the speaker, without regard to whether the speech objectively would be viewed as threatening. (", "See U.S. v. Bagdasarian, supra, ___ F.3d at p. ___ & fn. ", "14 [2011 U.S.App. ", "Lexis 14684, pp. *", "11-*12 & fn. ", "14].) ", "A statement that is subjectively intended to be a threat but which presents no objective indicators of its threatening nature would not trigger fear in the recipient or cause disruption. ", "Indeed, such speech is unlikely ever to come to the attention of law enforcement. (", "See People v. Parson (2008) 44 Cal.4th 332, 346 [79 Cal.", "Rptr.3d 269, 187 P.3d 1] [\"`\"`intent may be inferred from words, acts, and other objective facts'\"'\"].)", "\nIn short, the subjective standard created by the Ninth Circuit is both mistaken, in that it purports to define what is a true threat for federal constitutional purposes, and dangerous, in that it compromises the government's ability to protect individuals from the fear of violence and the *433 disruption that fear engenders. ", "California has good reason for adopting the objective standard, the standard already used in many other jurisdictions. ", "I therefore join the opinion of the court authored by Justice Kennard.", "\nCantil-Sakauye, C. J., Werdegar, J., Chin, J., and Corrigan, J., concurred.", "\nNOTES\n[1] We are not persuaded by the quite recent decision in U.S. v. Bagdasarian (9th Cir., ", "July 19, 2011, No. ", "09-50529) ___ F.3d ____ [2011 U.S.App. ", "Lexis 14684], in which the United States Court of Appeals for the Ninth Circuit concluded that in Virginia v. Black, supra, 538 U.S. 343, the high court held that every statute criminally punishing threats must include as an element of proof the defendant's subjective intent to make a threat.", "\n[*] Associate Justice of the Court of Appeal, Second Appellate District, Division Seven, assigned by the Chief Justice pursuant to article VI, section 6 of the California Constitution.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.000699134892784059, 0.001292047556489706, 0.0007339022122323513, 0.0013785824412479997, 0.001266677863895893, 0.0008817035122774541, 0.0007376474677585065, 0.0006531317485496402, 0.0006903191097080708, 0.02234025113284588, 0.000918092904612422, 0.0026674452237784863, 0.0006785178557038307, 0.0006093818810768425, 0.0009200628264807165, 0.0007488167611882091, 0.0007269698544405401, 0.0008383886306546628, 0.0008904045098461211, 0.000802980677690357, 0.0010079098865389824, 0.0008198997238650918, 0.0008091593044809997, 0.0006097304285503924, 0.0006273650215007365, 0.0007114567561075091, 0.0007046771934255958, 0.0007928553386591375, 0.0009845256572589278, 0.0019122444791719317, 0.0010255048982799053, 0.0005813115858472884, 0.0007673029904253781, 0.007043049670755863, 0.0005394287290982902, 0.0007599286618642509, 0.002677563112229109, 0.9935731291770935, 0.995141863822937, 0.0018034684471786022, 0.0010293340310454369, 0.009540901519358158, 0.0023060233797878027, 0.0023060233797878027, 0.01759842038154602, 0.19831004738807678, 0.0014994413359090686, 0.002090292517095804, 0.9903078675270081, 0.9898229837417603, 0.0011449666926637292, 0.13306482136249542, 0.011599953286349773, 0.02866964228451252, 0.5570732951164246, 0.0012271081795915961, 0.0014821027871221304, 0.12123323976993561, 0.0009755084756761789, 0.0013022690545767546, 0.8598029613494873, 0.8584859371185303, 0.05760503187775612, 0.026022206991910934, 0.000996747286990285, 0.0011088922619819641, 0.09782646596431732, 0.8261273503303528, 0.0007712344522587955, 0.0008314969018101692, 0.0011498300591483712, 0.0010032710852101445, 0.001467397203668952, 0.0007337392889894545, 0.0006762961274944246, 0.0005269984831102192, 0.0007842485792934895, 0.0008889370365068316, 0.0008424519910477102, 0.0007340351003222167, 0.0005640246672555804, 0.0009159370674751699, 0.0006250193109735847, 0.0006831773789599538, 0.0008953196229413152, 0.0007555283955298364, 0.0008554289815947413, 0.0008175074472092092, 0.0009671429870650172, 0.0008200531592592597, 0.001578115508891642, 0.000727575970813632, 0.0007140899542719126, 0.0006707336287945509, 0.0012808461906388402, 0.0008877491345629096, 0.0008812148007564247, 0.0014544319128617644, 0.0008137810509651899, 0.0006997264572419226, 0.0007911812863312662, 0.0006240672082640231, 0.0006565627409145236, 0.0007323773461394012, 0.0011592153459787369, 0.0007841408951207995, 0.0007663698634132743, 0.0007876430754549801, 0.0007898904732428491, 0.0007577965152449906, 0.0006813863292336464, 0.0009576259762980044, 0.0008321884670294821, 0.000877240439876914, 0.0018943254835903645, 0.0008289648685604334, 0.0008167155319824815, 0.008855408057570457, 0.0007613711641170084, 0.0010492317378520966, 0.0006649575661867857, 0.0013706621248275042, 0.0008336615283042192, 0.000819942622911185, 0.013723687268793583, 0.0006408783374354243, 0.0006109887617640197, 0.0019112899899482727, 0.013723687268793583, 0.0006938510341569781, 0.0011816740734502673, 0.0007627530721947551, 0.0005762939108535647, 0.0007542004459537566, 0.0009066011407412589, 0.0007717034313827753, 0.0008487209561280906, 0.0005348537233658135, 0.0033363094553351402, 0.032005853950977325, 0.0006886950577609241, 0.001194614451378584, 0.000710329448338598, 0.0007764945621602237, 0.0007858991739340127, 0.0008049533935263753, 0.0007650002953596413, 0.0008526905439794064, 0.0006670099683105946, 0.0007901882636360824, 0.0011139606358483434, 0.0006553548737429082, 0.0017506350995972753, 0.0008139826823025942, 0.0010123386746272445, 0.0009145326330326498, 0.0006880383589304984, 0.0010417397134006023, 0.0007546792039647698, 0.0007049237610772252, 0.0011171188671141863, 0.0008545177988708019, 0.0013653076021000743, 0.0010829396778717637, 0.0009672835585661232, 0.0006771371117793024, 0.0008404110558331013, 0.0006961881299503148, 0.0012160653714090586, 0.0011033971095457673, 0.0006606612005271018, 0.0007184931891970336, 0.0010355188278481364, 0.000706211372744292, 0.0006782825221307576, 0.0006402117433026433, 0.0012350071920081973, 0.0006089421221986413, 0.0007678739493712783, 0.0008358019404113293, 0.0008508899481967092, 0.0006838792469352484, 0.0008565655443817377, 0.0007750911172479391, 0.0006929229712113738, 0.0007800800958648324, 0.002277195220813155, 0.0005909973406232893, 0.0006089215166866779, 0.0007154134218581021, 0.0006264120456762612, 0.0009247506968677044, 0.0010079098865389824, 0.0016148146241903305, 0.0006491609965451062, 0.0007511115982197225, 0.0034774041268974543, 0.003872227855026722, 0.0009134532301686704, 0.0005811176961287856, 0.0006945559871383011, 0.0007364299381151795, 0.0007866619271226227, 0.0007057245820760727, 0.0008550573256798089, 0.0007273370865732431, 0.0006979932077229023, 0.0034774041268974543, 0.003872227855026722, 0.0007022192585282028, 0.0010177966905757785, 0.0006792292697355151, 0.003912719432264566, 0.0017673781840130687, 0.0008523091673851013, 0.0006998284952715039, 0.0007098059868440032, 0.0021277680061757565, 0.0031481124460697174, 0.001162410480901599, 0.0008167155319824815, 0.0006939978338778019, 0.0007617383962497115, 0.0413084477186203, 0.0012221430661156774, 0.013723687268793583, 0.000672173744533211, 0.0008148560882546008, 0.0012298082001507282, 0.0008567280019633472, 0.013723687268793583, 0.0007204596186056733, 0.0006494212429970503, 0.0017833096208050847, 0.002123740967363119, 0.0006540405447594821, 0.0008436766802333295, 0.0008591825608164072, 0.0011107079917564988, 0.002123740967363119, 0.000673562113661319, 0.0007351965177804232, 0.001668326323851943, 0.0021566993091255426, 0.0011144249001517892, 0.0006311493343673646, 0.0018301793606951833, 0.013723687268793583, 0.000717607035767287, 0.0005903021083213389, 0.0006818680558353662, 0.0020202151499688625, 0.013723687268793583, 0.0006345764268189669, 0.0019112899899482727, 0.013723687268793583, 0.0006859399727545679, 0.012322054244577885, 0.0009755335631780326, 0.0008362110238522291, 0.013723687268793583, 0.0007204596186056733, 0.0008544978336431086, 0.0007334558176808059, 0.0034774041268974543, 0.003872227855026722, 0.0009177759056910872, 0.0007103561656549573, 0.009556294418871403, 0.0012676366604864597, 0.0009466863702982664, 0.004867142532020807, 0.0006919208681210876, 0.0006985834916122258, 0.0008195099653676152, 0.0009372003842145205, 0.0008040943648666143, 0.0008408428984694183, 0.0010892447317019105, 0.0007117246859706938, 0.0008893479243852198, 0.0006679319776594639, 0.001019195420667529, 0.001127099385485053, 0.0008192549576051533, 0.001309375511482358, 0.0007034899317659438, 0.001019766554236412, 0.000848190626129508, 0.0011948916362598538, 0.0008979595149867237, 0.0028865323401987553, 0.001920924405567348, 0.0007975624757818878, 0.000839036947581917, 0.0008341923821717501, 0.0007460648776032031, 0.0006189956329762936, 0.0009031346999108791, 0.0006870086072012782, 0.0008659079321660101, 0.0007229903130792081, 0.0007095723412930965, 0.000826315488666296, 0.0008251628023572266, 0.0014559139963239431, 0.0007413607090711594, 0.000952520698774606, 0.0007681637653149664, 0.0007064961246214807, 0.0011948916362598538, 0.0008082484710030258, 0.0006093685515224934, 0.0007265578024089336, 0.0006900483858771622, 0.0007057245820760727, 0.0009716464555822313, 0.0009050501394085586, 0.0012886812910437584, 0.0007220690022222698, 0.00067524379119277, 0.0006135473377071321, 0.0008247909136116505, 0.0005814252072013915, 0.0006162748904898763, 0.000714900903403759, 0.0006113187409937382, 0.0007364299381151795, 0.0007519068894907832, 0.0007271881331689656, 0.0006844403105787933, 0.0019954426679760218 ]
0.025077
332
[ "Schizophrenia and violent crime: the experience of parents.", "\nIndividuals with schizophrenia have an increased risk of committing a violent crime, although their contribution to the overall criminality in society is small. ", "In this qualitative study we have interviewed parents of adult sons, diagnosed with schizophrenia and who recently had been referred to forensic psychiatric treatment due to a violent crime, with an aim to explore the parents' experiences and emotional reactions. ", "Four events, or status passages, emerged as crucial and common for all parents. ", "These were the onset of the mental disorder, the diagnosis of schizophrenia, the violent behaviour/criminality and the recent referral to forensic psychiatric treatment. ", "Every passage evoked strong emotional reactions such as guilt, fear, disappointment, anger and relief, which in return led to different actions taken. ", "Unawareness of the character and severity of their sons' mental illness and the type of violent criminality they had committed were common and complicated contacts both between the parents and their sons, and also between family members and official authorities. ", "The findings emphasize that psychiatric health care professionals must take the initiative and responsibility for information, education and support of family members." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.002849369077011943, 0.018091849982738495, 0.0007132720202207565, 0.000667672953568399, 0.0016348524950444698, 0.0006321721011772752, 0.002211456885561347, 0.0008486509905196726 ]
0.003456
8
[ "Cow_Trix\n\nHeya folks. ", "This week I’ve been refining the map, trying to address some of the issues I spoke about last week. ", "To save you going back and reading, the biggest issue is navigability and giving players landmarks to be able to place themselves. ", "It’s a bit of a time consuming process to create these little landmarks but it’s lots of fun. ", "You may have seen a few already in the map, including a few radio towers, little rock formations, small buildings with some loot, and more. ", "There will be plenty more of these to come, as I think they’re really important in making the map feel alive and interesting. ", "I also added a secondary tier of roads that branch off the main road, and a few stretches of fence-poles and powerlines. ", "These linear map elements do a great job of orienting yourself, I found. ", "You can come across a trail and follow it, and be pretty sure you’re going somewhere interesting.", "\n\nThis coming week I’ll be looking into integrating Splatt’s new biome into the map, and continuing to add features and landmarks. ", "I have loads of ideas of what landmarks I want to do, and it’s just going to be a case of what we can do quickly and with the assets and time that we have.", "\n\nSomething else we’re going to have a go with is changing how resource hotspots work, to be a bit more explicit. ", "Currently there are valleys where resources are found more often, which we call hotspots. ", "You can tell you’re in one of these because you get the No Building effect, but it’s kind of amorphous and unclear. ", "Instead of having blobby increased areas of resources, we’re going to put distinct features in valleys that denote that in that small area, you’ll find a bunch of a certain type of resource. ", "For instance, the area below would be of a flint area, where a few flint nodes would spawn. ", "Looking forward to seeing how this will affect farming and contesting resources.", "\n\nMils\n\nI made a skin for the AWM last week, it actually has 3 colours, one major and two minor flourishes. ", "This will be a nice simple skin people can use to colour their AWM like the standard weapon. ", "We wanted the default colour to have that green that the real gun has. ", "I’ll jump back on the colour masks when the other parts are complete. ", "Speaking of which, I started working on another Stock for the AWM. ", "This is going well, I hope to complete it this week. ", "I am also working on a new road texture for the main roads that run throughout the game. ", "Lastly I’m working on a texture for the offroad tracks that we now connect to the main roads. ", "This will help players find their way back to the main road, which will in turn help them make their way through the biomes.", "\n\nTom\n\nThis week I’ve been working on the 0.4.3.1 and 0.4.3.2 hotfix patches. ", "As well as some changes I mentioned last week, this included:\n\nVehicle disassembly and spear flipping not working due to some missing colliders\n\nFixed scale of some world items\n\nConfiguring new workbench visuals\n\nConfigured new improvised bow and longbow visuals\n\nFixing incorrect low LOD on bor AI\n\nSetup new arrow recipes for each workbench tier\n\nFixed some missing materials on roach attachments\n\nMade rancid steak once again stackable\n\nAs well as these fixes I improved the character customisation system so it will store your customisation options. ", "These options get saved as part of your server identity so you can have different looks saved to different servers. ", "The last customisation options you played with are also saved locally onto your computer, if the server doesn’t have your identity saved (eg. ", "first time on server or a fresh wipe) then it will try and apply your last saved options. ", "I say try because these customisation options can be different from server to server based on the mod configuration they are running. ", "If the options cannot be applied they are clamped to the closest possible valid configuration (internally the customisation options are saved as array indicies).", "\n\nThis coming week I’ll be working on the upcoming 0.4.4.0 patch due to release on the 25th of August (more about this one next week) as well as continuing on with bug fixes, today I’ve fixed a bug where our mesh baker would occasionally double up sets of gear as well as fixing an exploit with the construction hammer.", "\n\nI hope to release these fixes in another minor patch this week.", "\n\nTEHSPLATT\n\nTook the test biome I’ve been working on to the next level and worked out some real environmental rules to make it feel more realistic, which is something we discussed a lot, things like making sure the peaks and valleys make sense based on how the erosion would have happened in the real world, these sorts of rules are very important for creating biomes that don’t feel weird and out of place. ", "While I’m still having a bit of trouble with the correct scaling of the world the biome is really starting to come together and genuinely feels fun and interesting to run around in. ", "The next step is taking the assets and using the environmental constraints to generate good looking maps, hand crafting every single peak and valley would be extremely time consuming and in my opinion still wouldn’t look as good as a procedural terrain bound to rules set by the specific biome it’s trying to replicate. ", "I would very much like to do a pass on all the biomes currently in game and see if I can add a little more life to them using the knowledge I’ve gained creating this biome.", "\n\nSpencer\n\nLast week for me was spent on authoring content creatures, resources and loot for Fridays patch as well as bug fixes. ", "Today I’ve been getting started on creating generation templates for Splatt’s new forest.", "\n\nThis biome is very different from the other biomes so far in that it isn’t massively dependant on rocks and has much more open spaces. ", "It looks amazing right now, the challenge is to make it fit into the game well.", "\n\nThe first step to building a generator for the map was attempting to write a map magic template that can handle all the nature and terrain parts. ", "This got us a bit of the way there with painting valleys and trees and a basic heightmap:\n\nThe main struggule here was to create the heightmap with good enough erosion not to need rocks to mask the sides of the hills. ", "MapMagic is great but lacks the power for terrain generation of dedicated tools. ", "After going through a few different ones I’ve settled on World Machine which kicks ass for anything heightmap generation related.", "\n\nAfter a few hours of tinkering I’m pretty happy with this generation formula for the first cut of our new biome:\n\nWorld machine doesn’t integrate directly with Unity, however it can export high resolution heightmap images, which MapMagic can import with ease. ", "We can then run procedural tree planting and splat painting as if the heightmap was generated by MapMagic itself.", "\n\nAnother kickass feature of World Machine is its ability to export flow maps (which basically shows the path sediment was moved down during erosion), they can also be used as inputs for procedural texturing, planting, and opening gates to hell(they look awesomely creepy)\n\nBalance Stuff\n\nI got to play a heap of the latest patch over the weekend. ", "Was great to murder a few of you on EU West!", "\n\nI’m really happy with our progress over the last couple weeks, but obviously there is a heap of stuff we can improve on:\n\nGeneral balance of most resources need work, I collected a lot of info while playing, should be much better next patch PVP Weapons need a re-balance. ", "Not much reason to head out with anything more than a bow right now Points of contention need to be more focused, you should know what you are fighting over, and be rewarded when you win Retiring resources as you progress feels shitty. ", "Takes the fun about of the progression a bit. ", "Will transition resource types less rapidly The deeper the progression gets, the less its worth investing in your base as you just need to stick around to get the next workbench. ", "Possibly will make common areas buildable and high tier biomes all nobuild meaning there will be reason to fight over the hub zone and build up a base there. ", "Raiding (other than camping doors) should be a part of the game earlier and accessible to more players\n\nNext experimental wipe will be on the 25th, and will likely include another big update to Mangatang along with some other stuff we will go through in next weeks blog." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.15502949059009552, 0.0005610352964140475, 0.0008565455791540444, 0.0005868470761924982, 0.0006811863277107477, 0.000528587494045496, 0.0008860011002980173, 0.0006459185387939215, 0.0005897583323530853, 0.0005920479889027774, 0.0005428598378784955, 0.0007209861068986356, 0.0005865789134986699, 0.0008369722636416554, 0.0006081118481233716, 0.0005746231763623655, 0.0005404194234870374, 0.0006837346008978784, 0.0007423355127684772, 0.0007183381239883602, 0.0006551141268573701, 0.0005891546024940908, 0.0005541552673093975, 0.0005721573834307492, 0.0005752876750193536, 0.0008530115010216832, 0.000673176720738411, 0.0007554272306151688, 0.00064979208400473, 0.0007695106905885041, 0.0008951703202910721, 0.0005876423674635589, 0.00060608412604779, 0.000602471234742552, 0.0006017403793521225, 0.0006136783049441874, 0.0005464446730911732, 0.0005693766288459301, 0.001226130872964859, 0.0007641550619155169, 0.0007355728885158896, 0.0007571479654870927, 0.0005505693843588233, 0.0006132921553216875, 0.000652045535389334, 0.0007626215810887516, 0.3662927448749542, 0.0008856462081894279, 0.0006866306648589671, 0.007712597493082285, 0.7608973979949951, 0.0005526830209419131, 0.24782249331474304, 0.0006811571074649692, 0.0009069364168681204, 0.0009813649812713265, 0.000630841706879437 ]
0.027602
57
[ "Surgical cannulas and surgical trocars are well known in the art.", "\nSurgical cannulas are essentially tube-like members which are inserted into openings made in the body so as to line the openings and maintain them against closure. ", "Surgical cannulas are used during so-called \"closed\" surgical procedures (e.g. laparoscopic procedures) to provide a portal between the region outside the body and the interior surgical site. ", "In essence, the surgical cannulas serve as protective liners to allow surgical instruments to be inserted into, and withdrawn from, the internal surgical site with a minimum of trauma to the intervening tissue.", "\nSurgical trocars are sharp, pointed instruments which are used to make openings in tissue so as to facilitate proper placement of the surgical cannulas in the body. ", "More particularly, a surgical trocar is typically inserted into a cannula so that the trocar's sharp distal tip protrudes from the distal end of the cannula. ", "The cannula and trocar are then advanced through the tissue as a unit, with the trocar's sharp tip leading the cannula so as to open up the tissue before the advancing cannula. ", "Once the cannula has penetrated the tissue to the extent required, the trocar is withdrawn from the cannula. ", "The cannula may thereafter be used to pass surgical instruments to and from the interior surgical site.", "\nAs noted above, when the trocar has been inserted into the cannula, the sharp distal tip of the trocar extends out of the distal end of the cannula. ", "It will be appreciated, therefore, that this arrangement causes serious concerns among operating room personnel, since the sharp tip of the trocar is exposed and could cause injury to anyone accidentally coming into contact with the tip. ", "This concern is heightened inasmuch as AIDS, hepatitis and/or other life-threatening disorders could be transferred from one person to another through such an injury. ", "Thus, it is desirable to provide some sort of shield arrangement to protect operating room personnel from accidental contact with trocar's sharp point.", "\nOne such arrangement has been developed by United States Surgical Corp. (\"USSC\") of Norwalk, Conn. More particularly, USSC currently markets a surgical cannula and trocar system under the trade names \"Auto Suture\" and \"SURGIPORT\" wherein the trocar is provided with a telescoping sheath member which is capable of alternatively covering or exposing the trocar's sharp tip. ", "Various locking arrangements are provided on the trocar which coact with counterpart elements on the surgical cannula to control sheath movement relative to the trocar's sharp tip.", "\nUnfortunately, the foregoing surgical cannula and trocar system of USSC suffers from a number of disadvantages. ", "Among other things, it requires that the surgical trocar be more complex in design. ", "This increased complexity is undesirable, inasmuch as it leads to greater cost of manufacture and increased possibility of malfunction.", "\nFurthermore, in laparoscopic procedures of the sort commonly used today, a plurality of surgical cannulas are typically inserted through the abdominal wall so that their distal ends reside inside the abdominal cavity while their proximal ends reside outside the body. ", "In addition, in order to improve visual and instrument access to the interior surgical site, the patient's abdomen is typically inflated with a pressurized gas so as to extend the abdominal wall away from the interior organs. ", "Inasmuch as the cannulas serve as a conduit between the pressurized surgical cavity and the region outside the body, some sort of sealing means must generally be provided with the surgical cannulas to prevent the pressurized gas from escaping out through the cannula, since this could cause the abdomen to deflate during the surgical procedure.", "\nIn this regard it should also be appreciated that the aforementioned sealing means must be effective both when an instrument extends through the cannula as well as when no instrument extends through the cannula. ", "Furthermore, the sealing means must be capable of maintaining a good seal about an instrument even as the instrument is moved about during a surgical procedure. ", "Unfortunately, the various sealing means heretofore provided on surgical cannulas have proven somewhat less than satisfactory, for a variety of different reasons." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0008274170104414225, 0.0008393196039833128, 0.0006630388670600951, 0.0007505996036343277, 0.0008958216640166938, 0.0022187086287885904, 0.0008435758063569665, 0.0025529004633426666, 0.0006009406060911715, 0.0010969990398734808, 0.000638679601252079, 0.0014541444834321737, 0.0007458861218765378, 0.0006277855136431754, 0.000774616317357868, 0.0007371935062110424, 0.000704091158695519, 0.0007644402212463319, 0.00071746576577425, 0.0006614446174353361, 0.0011788572883233428, 0.0005256669828668237, 0.0005312361754477024, 0.0006233351887203753 ]
0.000916
24
[ "/*\n *\n * Copyright 2013 Canonical Ltd.\n *\n * Licensed to the Apache Software Foundation (ASF) under one\n * or more contributor license agreements. ", " See the NOTICE file\n * distributed with this work for additional information\n * regarding copyright ownership. ", " The ASF licenses this file\n * to you under the Apache License, Version 2.0 (the\n * \"License\"); you may not use this file except in compliance\n * with the License. ", " You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing,\n * software distributed under the License is distributed on an\n * \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n * KIND, either express or implied. ", " See the License for the\n * specific language governing permissions and limitations\n * under the License.", "\n *\n*/\nimport QtQuick 2.0\nimport Ubuntu.", "Components.", "Popups 0.1\nimport Ubuntu.", "Components 0.1\nimport com.canonical.", "Oxide 1.0\n\nRectangle {\n anchors.fill: parent\n id: inappbrowser\n property string url1\n Rectangle {\n border.color: \"black\"\n width: parent.width\n height: urlEntry.height\n color: \"gray\"\n TextInput {\n id: urlEntry\n width: parent.width - closeButton.width\n text: url1\n activeFocusOnPress: false\n }\n Image {\n id: closeButton\n width: height\n x: parent.width - width\n height: parent.height\n source: \"close.png\"\n MouseArea {\n anchors.fill: parent\n onClicked: {\n root.exec(\"InAppBrowser\", \"close\", [0, 0])\n }\n }\n }\n }\n\n property string usContext: \"oxide://main-world/2\"\n\n function executeJS(scId, code) {\n var req = _view.rootFrame.sendMessage(usContext, \"EXECUTE\", {code: code});\n\n req.onreply = function(response) {\n var code = 'cordova.callback(' + scId + ', JSON.parse(\\'' + JSON.stringify(response.result) + '\\'))';\n console.warn(code);\n cordova.javaScriptExecNeeded(code);\n console.warn(\"RESP:\" + JSON.stringify(response));\n };\n }\n\n WebView {\n width: parent.width\n y: urlEntry.height\n height: parent.height - y\n url: url1\n id: _view\n onLoadingStateChanged: {\n root.exec(\"InAppBrowser\", \"loadFinished\", [_view.loading])\n }\n context: WebContext {\n id: webcontext\n\n userScripts: [\n UserScript {\n context: usContext\n emulateGreasemonkey: true\n url: \"InAppBrowser_escapeScript.js\"\n }\n ]\n }\n }\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.000617633166257292, 0.0005399917718023062, 0.000598523358348757, 0.0005496324156410992, 0.0005567807238548994, 0.031498536467552185, 0.0008301755879074335, 0.0012475003022700548, 0.0007509048446081579, 0.0015640099300071597 ]
0.003875
10
[ "Hang 'em high Texas is not the first place you might look for lessons in criminal justice. ", "The lone star state prides itself on\n\nits toughness, with more executions and fewer bleeding hearts than\n\nelsewhere in America, the most hardline state in a nation that locks\n\nup more miscreants than anywhere else in the world. ", "But it is the unlikely centre of a revolution in prison reform sweeping the US, overthrowing decades of failed polices and sterile debate driven by politicians scared of being seen as soft. ", "The state has cut crime, costs and the numbers in jail to such an extent it has just shut a high-security prison for the first time in history.", "\n\nWhat makes this prison revolt even more unexpected is that it is led by some of the most conservative figures in politics. ", "They have decided – correctly – that an expensive prison system repeatedly locking up the same people is a sign of failure. ", "As a result, they have endorsed policies traditionally seen as liberal to keep people out of jail.", "\n\nThe right in Britain should take note as our prison population hits record highs. ", "Just as in this country, politicians in Texas were desperate to be seen as being tough on crime. ", "There was reckless rhetoric and endless headline-grabbing legislation, including the ludicrous three-strikes law that led to life sentences for a third offence – even when that was stealing a slice of pizza.", "\n\nInevitably, prison populations and spending soared. ", "The costs of incarceration rose fourfold in two decades. ", "America now accounts for a quarter of all prisoners on the planet – and two-thirds of new inmates are recidivists.", "\n\nThen Texas decided enough was enough. ", "Four years ago, it was told to spend another $2bn on 17,332 new prison places. ", "Instead, the state opted to invest in halfway houses to help those leaving prison and schemes to aid addicted and mentally ill offenders. ", "Since then, taxpayers have saved a billion dollars, violent crime has fallen to its lowest level for three decades, and the right has seen the light on criminal justice. ", "More than a dozen states have made similar moves, with some of the most doughty bastions of conservatism softening sentencing policies and shifting emphasis to treatment, training, early release and community-based punishments. ", "A campaign called Right On Crime has been launched to promote the idea, supported by conservative standard-bearers such as Jeb Bush and Newt Gingrich.", "\n\nThe driving force was financial. ", "But it makes perfect sense for the right. ", "As the group's website says, turning law-breakers into law-abiding citizens should be a conservative priority because it advances public safety and the rule of law. ", "The cause unites libertarians wanting to scale back the state, fiscal conservatives seeking to reduce spending, social conservatives concerned by family breakdown, and a religious right that believes in redemption.", "\n\nIs it too much to hope for a similar outbreak of common sense in Britain? ", "Among the biggest disappointments of the Blair and Brown governments was their pandering to the right on crime, with 28 criminal justice bills. ", "The coalition has tried to adopt a more evidence-based approach, with an emphasis on rehabilitation and payment by results, but is wobbling in the face of fury on the backbenches and in the media.", "\n\nSuch is the hysteria that the sensible abandonment of cruel indeterminate sentencing had to be smuggled out last month under cover of tougher sentences for knife crimes. ", "There was relief in Downing Street at the strategy's success – but they are still kicking around a keynote speech on crime by the prime minister already postponed for a year.", "\n\nIt is clear from several countries, notably Finland, that imprisonment has no impact on crime rates. ", "Putting fewer people in prison means more money can be spent on more effective community-based punishments, which are often tougher than lying around stoned all day in prison. ", "In the Netherlands this approach has been so successful prisons built in expectation of rising crime are being rented to Belgium.", "\n\nLocking people up and throwing away the key is a costly failure. ", "The alternatives are smart, not soft.", "\n\n• This article was amended on 21 November 2011. ", "An editing error led to the published version stating that Texas \"locks up more miscreants than anywhere else in the world\". ", "This was supposed to be a reference to the United States itself and has now been corrected" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.006679888814687729, 0.0016598531510680914, 0.0011535034282132983, 0.005451763514429331, 0.0007003930513747036, 0.006901618093252182, 0.0022032547276467085, 0.0007373119005933404, 0.0007058992050588131, 0.006934115197509527, 0.0006411817157641053, 0.0027788972947746515, 0.020302731543779373, 0.002006160095334053, 0.0007508493144996464, 0.07334508001804352, 0.000858741463162005, 0.0006623305380344391, 0.0008756457827985287, 0.0006835336680524051, 0.0006085899076424539, 0.0005609737709164619, 0.0019844246562570333, 0.000646988395601511, 0.0008500475669279695, 0.0007156183128245175, 0.046015139669179916, 0.0005814603646285832, 0.000633460411336273, 0.014257586561143398, 0.0005693103885278106, 0.06893869489431381, 0.0007070545107126236, 0.0005781126674264669, 0.0006976563599891961, 0.0006760789547115564 ]
0.00764
36
[ "using System.", "Reflection;\nusing System.", "Runtime.", "CompilerServices;\nusing System.", "Runtime.", "InteropServices;\n\n// General Information about an assembly is controlled through the following\n// set of attributes. ", "Change these attribute values to modify the information\n// associated with an assembly.", "\n[assembly: AssemblyTitle(\"SystemCollector\")]\n[assembly: AssemblyDescription(\"\")]\n[assembly: AssemblyConfiguration(\"\")]\n[assembly: AssemblyCompany(\"\")]\n[assembly: AssemblyProduct(\"SystemCollector\")]\n[assembly: AssemblyCopyright(\"Copyright © 2018\")]\n[assembly: AssemblyTrademark(\"\")]\n[assembly: AssemblyCulture(\"\")]\n\n// Setting ComVisible to false makes the types in this assembly not visible\n// to COM components. ", " If you need to access a type in this assembly from\n// COM, set the ComVisible attribute to true on that type.", "\n[assembly: ComVisible(false)]\n\n// The following GUID is for the ID of the typelib if this project is exposed to COM\n[assembly: Guid(\"3e82f538-6336-4fff-aeec-e774676205da\")]\n\n// Version information for an assembly consists of the following four values:\n//\n// Major Version\n// Minor Version\n// Build Number\n// Revision\n//\n// You can specify all the values or you can default the Build and Revision Numbers\n// by using the '*' as shown below:\n// [assembly: AssemblyVersion(\"1.0.*\")]", "\n[assembly: AssemblyVersion(\"1.0.0.0\")]\n[assembly: AssemblyFileVersion(\"1.0.0.0\")]\n" ]
{ "pile_set_name": "Github" }
[ 0.0007823824416846037, 0.000656146090477705, 0.0007687499164603651, 0.0007667533936910331, 0.0007687499164603651, 0.0005664881318807602, 0.0006220354698598385, 0.0006154475267976522, 0.0006550115067511797, 0.0006648876005783677, 0.0006234411848708987 ]
0.000681
11
[ "Paradoxical normoxia-dependent selective actions of inorganic nitrite in human muscular conduit arteries and related selective actions on central blood pressures.", "\nInorganic nitrite dilates small resistance arterioles via hypoxia-facilitated reduction to vasodilating nitric oxide. ", "The effects of nitrite in human conduit arteries have not been investigated. ", "In contrast to nitrite, organic nitrates are established selective dilators of conduit arteries. ", "We examined the effects of local and systemic administration of sodium nitrite on the radial artery (a muscular conduit artery), forearm resistance vessels (forearm blood flow), and systemic hemodynamics in healthy male volunteers (n=43). ", "Intrabrachial sodium nitrite (8.7 μmol/min) increased radial artery diameter by a median of 28.0% (25th and 75th percentiles, 25.7% and 40.1%; P<0.001). ", "Nitrite (0.087-87 μmol/min) displayed conduit artery selectivity similar to that of glyceryl trinitrate (0.013-4.4 nmol/min) over resistance arterioles. ", "Nitrite dose-dependently increased local cGMP production at the dose of 2.6 μmol/min by 1.1 pmol·min(-1)·100 mL(-1) tissue (95% confidence interval, 0.5-1.8). ", "Nitrite-induced radial artery dilation was enhanced by administration of acetazolamide (oral or intra-arterial) and oral raloxifene (P=0.0248, P<0.0001, and P=0.0006, respectively) but was inhibited under hypoxia (P<0.0001) and hyperoxia (P=0.0006) compared with normoxia. ", "Systemic intravenous administration of sodium nitrite (8.7 μmol/min) dilated the radial artery by 10.7% (95% confidence interval, 6.8-14.7) and reduced central systolic blood pressure by 11.6 mm Hg (95% confidence interval, 2.4-20.7), augmentation index, and pulse wave velocity without changing peripheral blood pressure. ", "Nitrite selectively dilates conduit arteries at supraphysiological and near-physiological concentrations via a normoxia-dependent mechanism that is associated with cGMP production and is enhanced by acetazolamide and raloxifene. ", "The selective central blood pressure-lowering effects of nitrite have therapeutic potential to reduce cardiovascular events." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0012751877075061202, 0.017573580145835876, 0.0020980730187147856, 0.005534778814762831, 0.0006152378628030419, 0.0006513191619887948, 0.0012810028856620193, 0.0006802790449000895, 0.0017411420121788979, 0.0007383099291473627, 0.012606659904122353, 0.0014254770940169692 ]
0.003852
12
[ "Sweden's DEAD LORD has revealed the cover artwork for their upcoming album, Heads Held High, which is going to be released worldwide by Century Media Records on August 21st. ", "DEAD LORD's debut album, G...\n\nDevil City Angels, the band originally formed by Rikki Rockett (Poison), Tracii Guns (L.A Guns), Eric Brittingham (Cinderella), and vocalist Brandon Gibbs, has signed a worldwide deal with Century Med...\n\nLas Vegas based Hard Rock band OTHERWISE will return to the road supporting their newest release \"Peace At All Costs\" with an extensive Summer touring run in North America. ", "The group will play multipl...\n\nCentury Media Records is proud to announce the signing of DEAD LORD from Sweden.", "\nDEAD LORD was formed in January 2012. ", "The mission was to rock. ", "It still is.", "\nThe band's critically acclaimed debut alb...\n\nAfter two years of touring, writing and recording, the Las Vegas rockers OTHERWISE release their highly anticipated sophomore album PEACE AT ALL COSTS today. ", "Singer Adrian Patrick and his brother, gui...\n\nBuckcherry: to Release New Album 'Confessions' February 19, 2013 via Century Media Records Free Download of First Single, \"Gluttony\" Available Today Only; Digital Single Available for Purchase at iTunes Tomorrow (December 11)\n\nMulti-Platinum Los Angeles rock band Buckcherry will release their new CD Confessions February 19, 2013 via Century Media Records. \"", "Gluttony\"--the first single from the album--will be available for purchase through iTunes tomorrow (Tuesday, December 11). ", "In the meantime, a free download of \"Gluttony\" is available today only (Monday, December 10) at www.centurymedia.com/specials/buckcherry. ", "A lyric video for \"Gluttony\" can also be seen on the free download page.", "\n\nBuckcherry just wrapped a string of UK dates and will headline North American shows in late December and January before joining Kid Rock as special guests on the upcoming \"Rebel Soul\" Tour beginning February 2 in Kansas City, MO. ", "In addition, Buckcherry will co-headline Fremont Street Experience's Downtown Countdown New Year's Eve 2013 celebration in Las Vegas December 31.", "\n\nWhile on tour, Buckcherry will preview new songs from Confessions, the band's sixth studio album and first U.S. release for Century Media Records. ", "Confessions merges punk grit, gutter attitude, honest storytelling, and razor sharp hooks. ", "The lyrics are tied together by the underlying theme of the Seven Deadly Sins.", "\n\nBuckcherry continues to resonate because they're so unabashedly honest in their recordings and on stage. \"", "It's a real rock 'n' roll band,\" says Nelson. \"", "You get 100 percent of what we are and what we're about. ", "We don't apologize for it.\"", "\n\nBuckcherry--Josh Todd (vocals), Keith Nelson (guitar), Stevie D. (guitar), Jimmy Ashhurst (bass), Xavier Muriel (drums)--are one of the premier rock bands of the new millennium, having sold more than three million records in America alone and touring virtually non-stop, playing with everyone from AC/DC to Avenged Sevenfold, touring sold-out arenas alongside Nickelback and KISS, and headlining festivals ranging from the punk rock Ink-N-Iron (also featuring the Misfits and Pennywise) to Sturgis. ", "Radio staples \"Lit Up,\" \"Crazy Bitch\" and \"Sorry\" have cemented the band as one of the most identifiable and sought-after bands on the radio and the live circuits, and Confessions is primed to take the band to even greater heights.", "\n\nAdditional dates have been added to the band's run of headlining North American gigs. ", "The current Buckcherry tour itinerary is as follows:" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006778822280466557, 0.0007616733782924712, 0.0007104123942553997, 0.001010951236821711, 0.0019879615865647793, 0.0008208893705159426, 0.0007076898473314941, 0.000743324460927397, 0.001581818563863635, 0.000958760327193886, 0.0032716509886085987, 0.0008942282292991877, 0.0007187811424955726, 0.000626496272161603, 0.0027807028964161873, 0.0006803409778513014, 0.0008182714809663594, 0.0009475116385146976, 0.0012662658700719476, 0.00064002291765064, 0.0011619660072028637, 0.09885065257549286, 0.0005777347832918167, 0.001398758846335113 ]
0.005191
24
[ "[Antimicrobial activity of derivatives of 1,2,4-benzothiadiazine-1,1-dioxide. ", "VIII].", "\nThe antimicrobial activity of a series of fluoro derivatives of benzothiadiazine and sulfonamides was studied. ", "The compounds tested can be grouped as: a) 3-alkylmercapto derivatives of 6-trifluoromethyl-1,2,4-benzothiadiazine-1,1-dioxide (III leads to VI); the 3-mercapto precursor (VII) and the related 3-picolinic salt (VIII); b) 3-trifluoromethyl derivatives of 1,2,4-benzothiadiazine-1,1-dioxide and of its benzene substituted derivatives (IX leads to XVI); c) trifluoroacetylaminobenzenesulfonamides (XVII leads to XXV). ", "Two of the 3-alkylmercapto compounds [(V) and (VI)] showed marked inhibitory activity against some strains of Staphylococcus, Streptococcus and Diplococcus. ", "None of the compounds tested proved active against Gram-negative schizomycetes (genera Salmonella, Shigella, Escherichia, Proteus, Pseudomonas, Enterobacter, Klebsiella, Serratia, Yersinia, Providencia) or against yeasts (Candida)." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0007412892882712185, 0.0007793753175064921, 0.0007086340337991714, 0.000649775902274996, 0.0008562146686017513, 0.0016593016916885972 ]
0.000899
6
[ "Q:\n\nPython Package Import Error--Python Doesn't Recognize Package\n\nRecently, in attempting to import a module I'd written, I have been coming across errors that ostensibly should not happen. ", "Here is the idea, I'm writing in my main.py file, and my hierarchy looks like this:\nstarsearch/\n main.py\n parser/\n __init__.py\n parse.py\n\nthe __ init __.py file in parser/ is empty, but when I try, in my program, to:\nimport parser\n\nit returns an AttributeError. ", "This happens when I call the function inside of parse.py, called getstar().", "\nor\nfrom parser import parse\n\nit returns an ImportError.", "\nSo my Python doesn't recognize that parse.py exists? ", "I have done a bit of research, and having an __ init __.py file that's empty should do the trick, but I'm stumped.", "\n\nA:\n\nparser is a name of a build-in module in python.", "\nwhen you write\nimport parser\n\nYou import the built-in module. ", "Since that module does not contain the getstar() function or a parse module, you get either AttributeError or ImportError\nTry changing the name of the \"parser\" directory to anything else and it should work. ", "The empty init.py file is not needed\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007003425853326917, 0.0012789389584213495, 0.0014068037271499634, 0.001230328343808651, 0.001069735619239509, 0.0007028416148386896, 0.0008946846355684102, 0.0009148198296315968, 0.001048044883646071, 0.0014572122599929571 ]
0.00107
10
[ "Reboot Diesel is one of the best things happened lately in fashion. ", "With Nicola Formichetti and its entry into Diesel nothing is as before. ", "No rules, it’s all a matter of having the power to do something, to be free. ", "It’s a positive revolution. ", "My tee is all of this, is provocative, sexy, unique. ", "You will see it often on me." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006362678832374513, 0.0009446847252547741, 0.0011315795127302408, 0.0006540417671203613, 0.14150719344615936, 0.0005780763458460569 ]
0.024242
6
[ "A witness took video of the aftermath of an officer-involved shooting on the 5 Freeway on Jan. 4, 2016. (", "Credit: Corbin Williams)\n\nThis is an archived article and the information in the article may be outdated. ", "Please look at the time stamp on the story to see when it was last updated.", "\n\nPlease enable Javascript to watch this video\n\nAll lanes of the 5 Freeway were closed through Burbank and Sun Valley Monday evening following a crash and officer-involved shooting connected to a wanted \"armed and dangerous\" suspect LAPD was tracking.", "\n\nUndercover officers spotted the suspect, identified by LAPD Chief Charlie Beck as Artyom Gasparyan, around 2 p.m. at a car repair shop in Northridge driving a silver Volkswagen Jetta.", "\n\nWhen Gasparyan realized he'd been spotted, he took off and a police pursuit ensued.", "\n\n\"He fled in his vehicle, the same vehicle that's been used continuously throughout this crime spree,\" Beck said.", "\n\nIn an attempt to elude officers, Beck said Gasparyan got onto the 5 Freeway going the wrong way.", "\n\nAs he attempted to flee, Gasparyan hit two other vehicles head on in the slow lane about 3:20 p.m., according to the California Highway Patrol’s incident log.", "\n\nAn officer-involved shooting then occurred near Glenoaks Boulevard, the log stated.", "\n\nGasparyan, 32, was wanted in a string of violent crimes, including murder, attempted murder and carjacking.", "\n\n\"He's a very, very dangerous man and very unpredictable,\" Beck said.", "\n\nThe crimes began on Dec. 6 in northeast Los Angeles, and include incidents in Burbank, West Hollywood and Carson, according to an LAPD news release issued Saturday.", "\n\nOn Monday, the Los Angeles County Sheriff’s Department identified Gasparyan as the suspect in the Dec. 29 shooting of a food delivery driver in West Hollywood.", "\n\nA silver Volkswagen Jetta was used in several crimes committed by Gasparyan, according to a Sheriff’s Department community alert.", "\n\nAnd the Burbank Police Department has said Gasparyan was the gunman who fired on a 67-year-old Burbank resident and also struck a 33-year-old gardener outside a home on Dec. 9.", "\n\nGasparyan’s accomplice in multiple crimes, Daniel Ramirez, died Saturday after stabbing and shooting himself following a carjacking and pursuit that ended in Long Beach, according to LAPD.", "\n\nAt the scene of the freeway shooting Monday, aerial video from Sky5 showed a jumble of cars in lanes, as well as several emergency vehicles.", "\n\nA silver Volkswagen sedan appeared to have severe damage to the front end and rear right side. ", "First responders appeared to help occupants in several other vehicles, including children who were in a dark SUV.", "\n\nBefore Beck confirmed the suspect's identity, LAPD Officer Aaeron Jefferson said the pursuit of a wanted suspect began about 2:10 p.m. in the 8300 block of Foothill Boulevard, and ended on the 5 Freeway at Glenoaks.", "\n\nThe suspect was in unknown condition, and an ambulance had been requested for him, Jefferson said.", "\n\nAll northbound traffic was being taken off at Hollywood Way, and southbound traffic was being diverted at the State Route 170, according to CHP. ", "Traffic was backed up for miles.", "\n\nCHP's Southern Division said all lanes would be closed for an unknown duration, but LAPD said southbound traffic was expected to flow again around 6 p.m.\n\nNorthbound would reopen in two to three hours, LAPD stated on Twitter about 5:30 p.m.\n\nTwo of the southbound lanes reopened around 7:30 p.m., according to the CHP.", "\n\nShooting on the 5 Freeway! ", "Cops just shot this man right in front of us! ", "pic.twitter.com/5xvDXkeHFd — Corbin Williams (@corbinwilliams) January 4, 2016\n\nPlease enable Javascript to watch this video\n\nPlease enable Javascript to watch this video\n\nPlease enable Javascript to watch this video\n\n34.221603 -118.359828" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0005891377804800868, 0.0005953803774900734, 0.0005246116197668016, 0.0006683047977276146, 0.0009330825414508581, 0.0023593194782733917, 0.0009330702014267445, 0.0020025584381073713, 0.0012826418969780207, 0.0006982300546951592, 0.04208042100071907, 0.0011724354699254036, 0.0006498657166957855, 0.000806761032436043, 0.0007745502516627312, 0.0018727339338511229, 0.007668501231819391, 0.0005560279241763055, 0.00367950857616961, 0.0012743814149871469, 0.0008107075118459761, 0.0010367947397753596, 0.0006261396338231862, 0.0006777950329706073, 0.0006046578637324274, 0.0012734817573800683, 0.30376848578453064, 0.0007379596936516464 ]
0.013595
28
[ "Potential chemosignals in the anogenital gland secretion of giant pandas, Ailuropoda melanoleuca, associated with sex and individual identity.", "\nWith a combination of dichloromethane extraction and analysis by gas chromatography-mass spectrometry (GC-MS), we found 39 compounds (corresponding to 38 GC peaks) in the anogenital gland secretion (AGS) of captive adult giant pandas, Ailuropoda melanoleuca, during the non-mating season. ", "In addition to indole, squalene, and some of the straight-chain fatty acids that had been characterized previously from the AGS of giant pandas, we identified several new compounds such as decenal, two isomers of decadienal, phenylacetic acid, 5-methylhydantoin, hydroquinone, phenylpropanoic acid, and erucic acid. ", "Quantitative comparison of the relative abundances of the 20 main GC peaks revealed that 5-methylhydantoin, indole, and erucic acid are putative female pheromones, whereas squalene and hydroquinone are putative male pheromones. ", "In addition to the presence of a few individual-specific compounds, the relative abundances of most of the 21 constituents varied more among individuals than within individuals. ", "This suggests that individual identity might be coded in both digital and analog form. ", "The chemical composition of different AGS samples from the same pandas consistently displayed a minimum cluster distance, much smaller than that between samples from different individuals in a hierarchical linkage cluster (average linkage) dendrogram. ", "Our results indicate that the AGS might contain an \"odor fingerprint.\" ", "Although putative sex pheromones such as squalene and erucic acid should be assessed further by bioassay, our study suggests that synthetic chemosignals might be useful in modulating the behavior and physiology of giant pandas." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.008397279307246208, 0.0010571591556072235, 0.0009273376781493425, 0.0034617367200553417, 0.0005524196894839406, 0.0005531164933927357, 0.000570991775020957, 0.0006049615913070738, 0.023765262216329575 ]
0.004432
9
[ "Open Abdomen Improves Survival in Patients With Peritonitis Secondary to Acute Superior Mesenteric Artery Occlusion.", "\nDamage control surgery and open abdomen (OA) have been extensively used in the severe traumatic patients. ", "However, there was little information when extended to a nontrauma setting. ", "The purpose of this study was to evaluate whether the liberal use of OA as a damage control surgery adjunct improved the clinical outcome in acute superior mesenteric artery occlusion patients. ", "A single-center, retrospective cohort review was performed in a national tertiary surgical referral center. ", "Forty-four patients received OA (OA group) and 65 patients had a primary fascial closure (non-OA group) after diagnosed as peritonitis secondary to acute superior mesenteric artery occlusion from January, 2005 to June, 2016. ", "Revascularization was achieved through endovascular aspiration embolectomy, open embolectomy, or percutaneous stent. ", "No difference of bowel resection length was found between groups in the first emergency surgery. ", "However, more non-OA patients (35.4%) required a second-look enterectomy to remove the residual bowel ischemia than OA patients (13.6%, P<0.05). ", "OA was closed within a median of 7 days (4 to 15 d). ", "There was a mean of 134 cm residual alive bowel in OA, whereas 96 cm in non-OA. ", "More non-OA patients suffered from intra-abdominal sepsis (23.1% vs. 6.8%, P<0.01), intra-abdominal hypertension (31% vs. 0, P<0.01), and acute renal failure (53.8% vs. 31.8%, P<0.05) than OA group after surgery. ", "Short-bowel syndrome occurred infrequently in OA than non-OA patients (9.1% vs. 36.9%, P<0.01). ", "OA significantly decreased the 30-day (27.3% vs. 52.3%, P<0.01) and 1-year mortality rate (31.8 % vs. 61.5%, P<0.01) compared with non-OA group. ", "Liberal use of OA, as a damage control adjunct avoided the development of intra-abdominal hypertension, reduced sepsis-related complication, and improved the clinical outcomes in peritonitis secondary to acute SMA occlusion." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0016548816347494721, 0.0006466582417488098, 0.0005710644763894379, 0.0008070001495070755, 0.0005656739813275635, 0.0009804986184462905, 0.0018696764018386602, 0.0010815493296831846, 0.0011745408410206437, 0.0006628790288232267, 0.00107081129681319, 0.0011109266197308898, 0.0019547075498849154, 0.0006377219106070697, 0.0010619228705763817 ]
0.001057
15
[ "Bob Dylan covering Frank Sinatra songs probably isn’t an album that’ll appeal to many people born in the last half century. ", "So, as it’s come time to market Shadows in the Night, Dylan’s new album composed entirely of Sinatra covers, the legendary songwriter is focusing his efforts on the 50 and older demo.", "\n\nThis week, Dylan gave his first interview in three years to AARP The Magazine, the bi-monthly publication catering specifically to seniors. ", "Not only that, but as Wondering Sound reports, 50,000 randomly selected subscribers of the magazine will be receiving free copies of Shadows in the Night.", "\n\n\n\n(Read: Ranking: Bob Dylan From Worst to Best)\n\nShadows in the Night arrives officially on February 3rd through Columbia Records (pre-order your copy here). ", "Below, listen to the latest teaser track, “Stay With Me”." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0007574892370030284, 0.0006025473703630269, 0.0005723161157220602, 0.0006214429158717394, 0.0006705831037834287, 0.0006646420806646347 ]
0.000648
6
[ "Jo-Hanko de Villiers\n\nJo-Hanko de Villiers (born ) is a South African rugby union player for the in Super Rugby, the in the Currie Cup and the in the Rugby Challenge. ", "His regular position is eighth man.", "\n\nReferences\n\nCategory:South African rugby union players\nCategory:Living people\nCategory:1996 births\nCategory:Sportspeople from Bloemfontein\nCategory:Rugby union number eights\nCategory:Golden Lions players" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0012546369107440114, 0.0009386913734488189, 0.0007685954333283007 ]
0.000987
3
[ "\"(THEME MUSIC PLAYING)\" \"(WIND WHISTLING)\" \"(RATTLING)\" \"Homosexual?\" \"", "No.\" \"", "On any meds?\" \"", "Ventolin for my asthma.\" \" ", "Anything else?\" \" ", "No.\" \"", "You sure?\" \"", "You're looking a little walleyed there.\" \"", "Um...\" \"I'm nervous.\" \"", "Suicidal ideations?\" \"", "Ideations?\" \"", "Are you thinking about killing yourself?\" \"", "No.\" \"", "You in fear for your life?\" \"", "Should I be?\" \"", "You a civilian?\" \"", "No gang affiliation?\" \"", "Okay.\" \"", "Well, in that case, good luck to you.\" \"", "Let me ask you something.\" \"", "Where were you before you came up here?\" \" ", "Coffee room.\" \" ", "How did you get here?\" \"", "What... what do you mean?\" \"", "Did you consume caffeinated, dark beverages at 1100 hours before commencing to proceed, in an orderly fashion, to the present location, or did you walk here?\" \"", "We walked here.\" \" ", "Do them again, in English.\" \" (", "SCOFFS)\" \"Actually, I was wondering about the part where she mentions me throwing up.\" \"", "You did.\" \"", "I know, but is it okay if she leaves that part out?\" \"", "See them?\" \"", "Either one of them goes in front of a jury, he's done for.\" \"", "You know why?\" \"", "The eyes.\" \"", "There's no one home.\" \"", "They'll look at you like they'd just as soon gut you as ask you the time.\" \"", "It doesn't make a difference if the prosecutor speaks gibberish, they're going away.\" \"", "But Nasir Khan, he doesn't look like them.\" \"", "He looks like any other normal college kid, so the jury's gonna wonder, \"Could he really stick that knife into that girl?\"\" \"", "We have to fight that.\" \"", "I'm...\" \"I'm sorry.\" \"", "I don't...\" \"I don't understand.\" \" ", "What's your first name?\" \" ", "Robert.\" \"", "Office Robert Maldonado, fresh out of the academy.\" \"", "He goes into a crime scene and he comes out throwing up.\" \"", "And why shouldn't he?\" \"", "He's a new cop, just saw his first dead body.\" \"", "Now, Nasir Khan may very well be a human being, but so was Andrea Cornish, and so is Robert \"Bobby\" Maldonado.\" \"", "So you throwing up...\" \"absolutely, keep it in.\" \"", "Now, get out of here.\" \" (", "URINATING) - (PANTS UNZIPPING)\" \"So who's the lead on the Khan kid case?\" \"", "Helen?\" \"", "This concerns you, John, because...?\" \"", "Because I'm representing him.\" \"(", "SCOFF) I'm sorry, but how on earth?\" \"", "You had a chance to review or no?\" \"", "You were at the precinct when they brought him in.\" \"", "That's how it happened, isn't it?\" \"", "He's a sweet kid, actually, soft-spoken, sincere.\" \"", "Cool.\" \"", "I'd like to give his loving parents some idea of what it's gonna cost, and to do that, it'd be helpful to know how strong a case you think it is.\" \" ", "Strong.\" \" ", "Strong?\" \"", "Or strong?\" \"", "Wait till you see the crime-scene photos.\" \"", "Ah, come on.\" \" ", "What do you got?\" \" ", "Everything.\" \"", "I don't know why Helen's not on to the next murder.\" \"", "This one's done.\" \"", "Sorry.\" \"", "Hey, you're not gonna get rich off of this one.\" \"", "It's gonna be quick.\" \" ", "How's the feet?\" \" (", "SIGHS) Okay.\" \"", "Ah, fuck.\" \"", "Three. ", "105.\" \"", "Yeah, here it is.\" \"", "Okay.\" \"", "Here goes nothing.\" \"", "With the proofs the District Attorney's office think they have, there's a good chance your son is facing life imprisonment.\" \"", "The good news is that's why we go to court.\" \"", "But any way you slice it, it's gonna be a long battle with no guarantee of a successful outcome.\" \"", "And any lawyer who comes to you with the words \"I guarantee!\" ", "is a liar.\" \"", "But I promise you this.\" \"", "I'll work every angle I can for Naz, and I won't rest until everything that can be done is done.\" \" ", "Thank you.\" \" ", "However, a good defense costs money.\" \"", "How much?\" \"", "Let me tell you this before I tell you that.\" \"", "Most lawyers charge by the hour.\" \"", "Why?\" \"", "Because it's to their benefit.\" \"", "Every phone call, email, meeting, motion, delay, every note jotted down on every Post-it, the meter's running.\" \"", "With a murder, that could easily run $150,000.\" \"", "Now, I'm not gonna do that to you.\" \"", "I'm charging a flat fee.\" \"", "$75,000 if it goes to trial, and half of that if it doesn't.\" \"", "If it doesn't what?\" \" ", "Go to trial.\" \" ", "You mean if they drop the charges.\" \"", "Oh, no, no, no, no.\" \"", "They're not gonna do that.\" \"", "I mean if there's a plea.\" \"", "A plea to what?\" \"", "To something less than first-degree murder, like second-degree murder.\" \"", "He didn't murder anyone.\" \"", "Why would you even say that?\" \"", "There probably won't be a plea.\" \"", "The state seems confident.\" \"", "I just mention it in terms of my fee.\" \"", "$75,000.\" \"", "I know it sounds like a lot of money, but I guarantee you that no competent lawyer would take it on for any less.\" \"", "How do you expect me to pay you?\" \"", "We have $8,000 in the bank.\" \"", "Can you get any friends or relatives to help out?\" \"", "Everyone we know is in worse shape than us.\" \"", "You own your own house.\" \"", "Look, I'll do it for 60, and that's only because I couldn't live with myself if your son went down because of some cut-rate, take-the-money-and-run hustler.\" \"", "I'm sorry.\" \"", "We can't afford you.\" \"", "Okay.\" \"", "Then here's your best option:\" \"a legal-aid lawyer.\" \"", "And here's what you get for your money.\" \"", "It's a guy who starts his day in court, fishing a half a dozen random case files out of a wire basket, meets with his clients for a half hour before going in front of the judge,\" \"takes the first deal off it, goes around the corner to Starbucks, comes back with his latte, opens up the next file, and does the exact same thing six times a day, every day.\" \"", "Look, I'll take it on for 55,000.\" \"", "Any less than that, it's Naz who will suffer, since I'll be going up against the DA armed with nothing.\" \"(", "SIGHS) 55?\" \"", "I'm writing down... $50,000.\" \"", "This is my retainer.\" \"", "If you can, uh, sign it now,\" \"I can get to work and figure out a payment schedule later.\" \"(", "SIGHS) I need to read it.\" \"", "Of course.\" \"", "I'll leave it.\" \"", "You take as long as you need.\" \"", "But know that I can't get to work on behalf of your son until you sign it.\" \"(", "ELECTRONIC BUZZING)\" \"♪ ♪\" \"Commentator (ON TV):\" \"You can see why people liked him so much on his way up.\" \"", "I was one of them.\" \"", "Rangy.\" \"", "Look how fast his hands are, and he carries power, confident.\" \"", "Distance in which they're fighting in favor of Sillah.\" \"", "But Kovalev's tming is very good.\" \"", "COMMENTATOR 2:\" \"Another jab to the body.\" \"", "If and when Kovalev can get going, he throws four- and five-punch combinations with all power.\" \"", "♪ ♪\" \"(COMMENTATORS CONTINUE INDISTINCTLY)\" \"Let's go.\" \"", "Out!\" \"", "Commentator (ON TV):\" \"Landed a right cross moments ago.\" \"", "Got in another shot there.\" \"(", "PRISONERS CHATTERING INDISTINCTLY)\" \" POLICEWOMAN:\" \"Gate!\" \" (", "DOOR BUZZES)\" \" POLICEWOMAN:\" \"Gate!\" \" (", "DOOR BUZZES)\" \"WOMAN:\" \"Yeah, Freddy!\" \"(", "MOANING)\" \"Yeah!\" \"", "Shit!\" \"", "Uh!\" \"", "Yeah!\" \"", "Yeah!\" \"", "Oh, God!\" \"", "Yeah!\" \"", "Yeah!\" \"", "Yeah!\" \"", "Yeah!\" \"", "Yeah!\" \"(", "MOANING)\" \" (DOOR BUZZES)\" \" Religion?\" \"", "MAN:\" \"Baptist.\" \" ", "POLICEMAN:\" \"Religion?\" \" ", "Muslim.\" \" ", "POLICEMAN:\" \"Religion?\" \"", "As-salamu alaykum.\" \"", "Oh, come on, man.\" \"", "I can't eat that other shit.\" \"", "Give me Arab food.\" \"(", "SCOFFS)\" \"Religion.\" \" ", "That's it?\" \" ", "Baby, I can't do this no more.\" \"", "They're bringing in polygraphs.\" \" ", "We still okay?\" \" ", "Yeah.\" \"", "You don't got to pay my rent no more if you don't want to.\" \"", "Take me back.\" \"", "MAN:\" \"As per usual, I see some old faces here.\" \"", "Glad you learned your lesson.\" \"", "For the freshmen, I'll keep it simple.\" \"", "You get told to do something, you do it.\" \"", "You lay a hand on any one of us, we will break out the riot gear, put you in the fucking hospital, and add another charge.\" \"", "So far this year, we've done this 2,000 times, so you might say we look forward to it.\" \"", "That's it.\" \"", "Gate!\" \"(", "DOOR BUZZES)\" \"GUARD:\" \"When I call your name, you're gonna take a bed.\" \"(", "INMATE WHISTLES) Oh!\" \"", "GUARD:\" \"Williams.\" \"", "INMATE:\" \"Goddamn!\" \"", "GUARD:\" \"Let's go!\" \"", "Keep the line tight!\" \"", "GUARD:\" \"Rogers!\" \"", "Martinez!\" \"", "Brown!\" \"", "Davis!\" \"", "Holmes!\" \"", "Khan!\" \"", "Ortiz, W.\" \"Ortiz, F.\" \"Hernandez!\" \" ", "MAN:\" \"Did he do it?\" \" ", "HELEN:\" \"No question.\" \" ", "You know who's repping him?\" \" ", "Actually, that's the best part:\" \" John Stone.\" \" ", "Who?\" \"", "He's no one, a precinct crawler.\" \" ", "Really?\" \" ", "Yeah.\" \"", "Still, sex, drugs, and rock 'n' roll, and he's Muslim?\" \"", "We're on \"Nancy Grace\" every night, so fast-track it.\" \" ", "Get it before the grand jury now.\" \" ", "Yes, sir.\" \"", "Johnny.\" \"", "Helen.\" \"", "How are you?\" \"", "How are you?\" \"", "I'm good.\" \"", "Your son?\" \"", "Work?\" \"", "Your feet?\" \"", "They're fine.\" \"", "Everything's good.\" \"", "I was really happy when I heard you were on the Khan case.\" \" ", "Good for you.\" \" ", "I'm really happy you're still here.\" \"", "Where would I go?\" \"", "What would I do?\" \"", "Spend more time with my grandchildren?\" \"", "They'd hate that.\" \"(", "CHUCKLES)\" \"What can I do for you?\" \"", "You know.\" \"", "Oh... it's too soon for that.\" \"", "Come on.\" \"", "Let's talk.\" \"", "We both know what a mess this is gonna be.\" \"", "This is Jodi Arias time, only this is a good kid, no history of anything.\" \"", "Let's nip it in the bud.\" \"", "Jodi didn't have any priors and slit poor Travis' throat ear-to-ear.\" \"", "No one slit anyone's throat here.\" \"", "This girl was stabbed the same number of times as her age, John, 22.\" \" ", "She was?\" \" ", "Mm-hmm.\" \"", "Eh, there you go.\" \"", "It wasn't my boy, then.\" \"", "That's a passion job.\" \"", "The knife was in his pocket.\" \"", "A knife in the pocket, very different from the knife.\" \"", "Cops find the motive there, too?\" \"\"", "Please, please don't rape me\" isn't motive?\" \"", "That's not what happened.\" \"", "This isn't murder one.\" \"", "He didn't go out looking.\" \"", "Whatever happened just happened.\" \"", "He's as clean as Donny Osmond.\" \"", "Didn't Donny Osmond get into some sort of trouble?\" \" ", "Did he?\" \" ", "Didn't he?\" \"", "I don't think so.\" \"", "In any case, why take the chance this turns into Abu Ghraib?\" \"", "Let's work something out.\" \"", "The Muslim part is only helpful.\" \"", "Not if there's one Muslim on the jury, and there's no way you'll keep them all off.\" \"", "I'll take as many as I can get.\" \"", "They're not gonna like what this is gonna do to their community.\" \" ", "Manslaughter.\" \" ", "Excuse me?\" \" ", "Let's get it off your desk.\" \" ", "Johnny, it's homicide.\" \"", "There's no way around it.\" \"", "There's nothing I can do for you.\" \"", "I'm sorry.\" \"", "Just give me something back.\" \"", "Anything.\" \"", "There's a tailor I know on 33rd Street.\" \"", "Very reasonable.\" \"", "I mean this sincerely.\" \"", "Get something for the trial, not brown.\" \"(", "MIDDLE EASTERN MUSIC PLAYING)\" \"MAN:\" \"Salim...\" \"Did you hear what I said?\" \"", "No.\" \"", "Where is it?\" \"", "Where is what?\" \"", "The cab.\" \"", "I don't know.\" \"", "Have you asked anybody?\" \"", "Have you called anybody?\" \"", "My son is in prison.\" \"", "I know.\" \"", "I still have to make a living.\" \"", "I can't afford not to be working.\" \"", "Yusuf can't.\" \"", "Every day that goes by, we're losing money that we need.\" \"", "I know.\" \"(", "CAMERA SHUTTER CLICKING)\" \" (INHALER HISSES) - (INHALES SHARPLY)\" \"MAN:\" \"You see, right now, everybody taking a hard look at you.\" \"", "You just let them look.\" \"", "Anybody asks you anything, you keep your head down, your mouth shut, and your business to yourself.\" \"", "'Cause they just probing for weakness.\" \" ", "You hear me?\" \" ", "Yeah.\" \"", "So, what are you in for?\" \"", "Um, they're accusing me of...\" \"Motherfucker, what'd I just tell you?\" \"!\" \"", "♪ ♪\" \"♪ ♪\" \"Are you wearing perfume?\" \"", "Cologne, Paco Rabanne, for men.\" \"", "Yes, I know it's for men.\" \"", "Uh, where?\" \"", "Around my ankles, to counteract the smell of the Neosporin.\" \"", "Neosporin smells like maple syrup.\" \"", "What's wrong with that?\" \"", "At the pancake house, nothing.\" \"", "And if I told you it's an allergic reaction to cologne that's hastening the spread?\" \"", "Then that would be ironic.\" \"", "Taking your antihistamines?\" \"", "I can't.\" \"", "They knock me out halfway into the next day.\" \"", "Do you want to get better or not?\" \"", "I do.\" \"", "I just...\" \"Then throw out the Paco Rabanne and the chopsticks.\" \"", "Start taking your antihistamines.\" \"", "Pick up some Saran Wrap and Crisco.\" \"", "Apply a large dollop to each foot morning and night and wrap them up.\" \"", "You're kidding, right?\" \"", "I can't walk around in public like that.\" \"", "Saran Wrap is clear.\" \"", "No one will even notice.\" \"", "Do it, come back and see me in a week, and we will marvel together at the improvement.\" \"", "Why not some WD-40 and a Glad cinch sack?\" \"", "We're not only going after the so-called doctor who mauled Ms. Hahn's face, but also the airline that fired her because, as they put it, the results made it too disturbing for the passengers to interact with her.\" \"", "FEMALE REPORTER:\" \"But the surgery was voluntary, wasn't it?\" \"", "You're a stewardess who served your employer faithfully for 25 years.\" \"", "After awarding your silver wings for a quarter-century of service, they start dropping hints like confetti that you need to start keeping up your appearance, the \"or else\" as implicit as a storm cloud.\" \"", "So you, husbandless, childless, and in terror of losing the job you've devoted your life to, do what you know you have to do, what any woman over the age of 40 who deals with the public\" \"to earn a living has to do, what a reporter who works for Channel 7 News, before you know it, will have to do.\" \"", "So was it voluntary?\" \"", "You tell me.\" \"", "Woman (OVER PA):\" \"Put all prohibited items in the lockers.\" \"", "Prohibited items are:\" \"weapons, cell phones, belts, keys key rings, nail clippers,pens, pencils...\" \"MAN:\" \"Good.\" \"", "Next.\" \"", "Arms out, please.\" \"", "Pat you down.\" \"", "Woman (OVER PA): ...\" \"lighters, matches...\" \"POLICEMAN:\" \"Okay.\" \"", "Thank you.\" \"", "POLICEMAN 2:\" \"Good.\" \"", "Stand right here.\" \"", "Arms out.\" \"(", "PA ANNOUNCEMENT CONTINUES INDISTINCTLY)\" \"POLICEMAN:\" \"Got anything in your pockets?\" \"(", "WOMAN SPEAKING SPANISH OVER PA)\" \"(INDISTINCT CONVERSATIONS)\" \" Name?\" \" ", "Mine?\" \"", "No.\" \"", "Who I'm visiting?\" \"(", "SIGHS)\" \"Nasir Khan.\" \" ", "Spell it.\" \" ", "N-a-s-i-r K-h-a-n.\" \"I need another one for my wife.\" \"", "Tell her to get in line.\" \"", "You need to check in too.\" \"", "POLICEMAN:\" \"Arms out.\" \"(", "WAND SQUEALING)\" \"Lift your blouse.\" \"", "Man (OVER PA): ...hands above the table.\" \"", "You are not permitted to exchange any item with the person you are visiting...\" \"All the way.\" \"", "Man (OVER PA):\" \"At the completion of your visit, you must remain seated until the person you are visiting...\" \"(DOOR BUZZES)\" \"(BABY CRYING)\" \"NASIR:\" \"I liked her.\" \"", "She liked me.\" \"", "We drank.\" \"", "We went to bed.\" \"", "Woke up in the kitchen.\" \"", "I don't remember going there.\" \"", "I went back upstairs to the bedroom.\" \"", "I didn't kill her.\" \"", "Even if you can't remember anything, you'd know that.\" \"", "You'd feel it, right?\" \"", "I don't.\" \" ", "I'm not a murderer.\" \" ", "SAFAR:\" \"Of course you're not.\" \"", "I'm so sorry I did this to you.\" \"", "SALIM:\" \"Listen, you didn't do anything, huh?\" \"", "The jury, they'll see right past, uh, the... the so-called evidence and the lawyers and all this, and they'll see you.\" \" (", "INDISTINCT CHATTER) - (MAN CLEARS THROAT)\" \"At, uh, 2:30 a.m. Saturday morning, a 22-year-old woman, Andrea Cornish, was found stabbed to death in her home on West 87th Street.\" \"", "Less than a quarter-mile away from the murder scene, a 23-year-old male, Nasir Khan, was detained by officers on suspicion of DUI.\" \"", "While in custody, a knife believed to be the murder weapon was found on his person.\" \"", "Additional forensic evidence and eyewitness accounts further tie him to the crime.\" \"", "He has been formally charged with murder and was arraigned earlier today.\" \"", "FEMALE REPORTER:\" \"What was their relationship?\" \"", "DETECTIVE:\" \"That's under investigation.\" \"", "MALE REPORTER:\" \"Do you have a motive for the killing?\" \"", "At this point, it looks sexual in nature, but that, too, is under investigation.\" \"", "MALE REPORTER:\" \"Is the suspect a citizen?\" \"", "DETECTIVE:\" \"The records show he was born here, yes.\" \"", "Thank you.\" \"", "MALE REPORTER:\" \"But he's Muslim.\" \"", "Is that right?\" \"", "We understand he is.\" \" ", "MALE REPORTER:\" \"Does he have ties to any foreign organizations?\" \"", "DETECTIVE:\" \"That's under investigation.\" \"", "Organizations.\" \"", "What organizations?\" \"", "What are they saying?\" \"", "You know what they are saying.\" \"", "MALE REPORTER:\" \"Does he have a history of violent crimes?\" \"", "DETECTIVE:\" \"That, too, is under investigation.\" \"", "That's all I have for you right now.\" \"", "I'll update you when we have more information.\" \"", "Thank you.\" \"", "Hey, come here.\" \"", "Got something to say, okay?\" \"", "You ready?\" \"", "You rolling?\" \"\"", "Foreign organizations.\" ", "They're doing this already.\" \"", "My client was born here.\" \"", "He's as American as baseball.\" \"", "Detective Williams, please.\" \"", "What are they gonna do next, look at the Chechen extremist groups?\" \"", "What are we, in Boston?\" \" ", "Can you do something for me?\" \"", "This Khan kid killer, I would really love the family's home address.\" \"(", "GASPING)\" \"You rape that girl?\" \"", "No.\" \"(", "DOOR OPENS)\" \"(FOOTSTEPS APPROACHING)\" \" From Freddy.\" \" ", "Who?\" \"", "What for?\" \"", "GUARD:\" \"Traction.\" \"", "♪ ♪\" \"♪ ♪\" \"(TELEPHONE RINGING)\" \"Yeah.\" \"", "It's here.\" \"", "Great.\" \"", "What do we pay?\" \"", "Nothing till it's released.\" \"", "That's why we're here.\" \"", "You can't have it now.\" \"", "If you'd have called, I could have told you that.\" \"", "Well, we have to come back to get it.\" \"", "When?\" \"", "After the trial, or never.\" \" ", "Excuse me?\" \" ", "It's your cab?\" \"", "It's ours, the three of us all together.\" \"", "Then you should all get lawyers.\" \"", "What are you talking about?\" \"", "The cab was used in the commission of a crime, which means the state can sue in order to keep it in a civil court.\" \"", "Sue?\" \"", "Sue who?\" \"", "You, the registered owners.\" \"", "But the suit won't get filed until the criminal trial and however many months that'll take, which I could have told you over the phone if you'd have called first.\" \" ", "Months?\" \" ", "Or longer.\" \"", "Slow wheels of justice and all.\" \"", "And I hate to say it, but you'll probably lose in civil court.\" \"", "Unless, uh... which of you is Khan?\" \"", "Him.\" \" ", "Is it your relative, sir?\" \" ", "What?\" \" ", "Is it your relative who's been charged?\" \" ", "Yes.\" \"", "My son.\" \"", "Did he have permission from you to drive the cab?\" \"", "Not really.\" \"", "Well, then that's your out.\" \"", "You might have a chance with that if you don't mind filing charges, grand theft.\" \"", "File charges against my son?\" \"", "You're crazy.\" \"", "Hey, I'm just trying to help you guys out.\" \"", "I'm no lawyer, but if he won't do it, it doesn't mean you guys can't give it a shot since you're co-owners.\" \" ", "Do you have an attorney?\" \" ", "No.\" \"", "Make sure you tell him I gave you this card.\" \"", "Good luck, man.\" \"(", "NEWSPAPERS RUSTLING)\" \"♪ ♪\" \"♪ ♪\" \" How goes it, guys?\" \" ", "All quiet on the Western Front.\" \" ", "Anyone still working in there?\" \" ", "No.\" \"", "Done by all appearances.\" \" ", "That was fast.\" \" ", "It's all right.\" \"", "Here you go.\" \"", "I come bearing gifts.\" \"(", "DOOR CREAKS)\" \"(CAMERA SHUTTER CLICKS)\" \"STONE:\" \"Don't worry.\" \"", "I won't put you on YouTube.\" \"", "Don't even joke around like that.\" \"", "Come on.\" \" ", "Can I open it?\" \" ", "I didn't say you could.\" \"(", "DOOR CREAKS)\" \"(MEOWS)\" \"Check the fridge.\" \"", "You check the fridge.\" \"(", "SNIFFS)\" \"Here you go.\" \"(", "MEOWS, PURRING)\" \"(MAN PRAYING IN ARABIC)\" \"(ELEVATOR DINGS)\" \"(TELEPHONE RINGING)\" \"(KEYBOARD CLACKING)\" \"Chandra.\" \"", "That's right, isn't it?\" \" ", "Yes.\" \" ", "Come here.\" \" ", "WOMAN:\" \"Crowe and Associates.\" \" ", "ALISON:\" \"Where you from?\" \" ", "Um, Baltimore.\" \" ", "Your parents.\" \" ", "Mumbai.\" \" ", "Close enough.\" \"_\" \"_\" \"_\" \"_\" \"", "SAFAR:\" \"I was just saying that she's very pretty.\" \"", "She is, and very smart.\" \"", "Can I ask you how much you know about Mr. Stone?\" \"", "Nothing.\" \"", "Well, there isn't much more than that to know.\" \"", "Basically, Mr. Stone represents drug dealers and prostitutes.\" \"", "That's the world he lives in.\" \"", "And when I say \"represents,\" I mean pleads.\" \"", "He already said something about that to us, and I said, \"What?\" \"", "Plead?\"\" \"", "Well, that's because he doesn't want to be in a courtroom any more than a courtroom wants him in it.\" \"", "Mr. Stone is not a trial lawyer.\" \"", "He's barely a lawyer.\" \"", "He wants his fee, wants things over fast, and then onto the next case, which works for him, but does it work for his clients?\" \"", "Well, they'll never know.\" \"", "They're in jail.\" \"", "I didn't get a good feeling from this man.\" \"", "You have good instincts.\" \"", "And your son deserves better than someone who's never tried a murder case.\" \"", "Did he ask you to sign anything?\" \"", "He tried, but I didn't sign it.\" \"", "He left it, there.\" \" ", "A retainer?\" \" ", "Yeah.\" \"", "Did he say how much he wanted to charge you?\" \" ", "$50,000.\" \" ", "Flat?\" \" ", "Excuse me?\" \" ", "Flat fee, like, um, early-bird parking.\" \"", "I'm sorry, but just from what I know right now, this case could easily cost five times that, and anyone who tells you any different is lying.\" \" ", "SALIM:\" \"Five times that?\" \" ", "ALISON:\" \"Uh-huh.\" \"", "But I will do it for nothing.\" \"", "Which is why I didn't come here with a retainer in my hand.\" \"", "Because this is the kind of case that reminds me why I wanted to be a lawyer to begin with.\" \"", "And it'll get the full attention of my firm and all of my resources, including Chandra.\" \"(", "SOBBING)\" \"_\" \"Thank you.\" \"", "SAFAR:\" \"Thank you.\" \"", "MAN:\" \"It's spreading, and you haven't gone back to the clinic?\" \" ", "MAN 2:\" \"Nope.\" \" ", "MAN:\" \"Why not?\" \"", "MAN 2: 'Cause I'm sick of clinics.\" \"", "I'm sick of doctors.\" \"", "I'm sick of waiting rooms, sick of all the bullshit,\" \"\"Wrap it in this,\" \"Soak it in that,\" \"Try this cream, that cream, this air purifier, that new study that says,\" blah, blah, blah.\" \"", "You know, I think my flare-ups are an allergic reaction to my dermatologist.\" \"(", "ALL LAUGH)\" \"MAN:\" \"Go ahead, Steve.\" \"", "I got some good news.\" \"", "Since the last time, I decided to jump back into the dating pool.\" \"", "MAN:\" \"How's that going for you?\" \"", "I got to tell you, I'm holding my own.\" \"", "That's not exactly the best choice of words there, Steve.\" \"(", "LAUGHTER)\" \"STONE:\" \"I'm...\" \"I'm kidding.\" \"", "More power to you, brother.\" \" ", "And how you doing, John?\" \" ", "Me?\" \" ", "You know, I'm holding my own.\" \" (", "LAUGHTER)\" \"He drug you down the street by your hair and brought you back to the house, and you're pregnant.\" \" ", "WOMAN:\" \"Yes.\" \" ", "JUDGE:\" \"Did you do that?\" \" ", "MAN:\" \"I don't remember that.\" \" ", "JUDGE:\" \"Wait, wait, wait.\" \"", "The question is not whether you remember it.\" \"", "Did someone tell you that you did it?\" \"", "Were you drunk, and that's why you don't remember perhaps?\" \"", "Was he intoxicated when he did this?\" \"", "WOMAN:\" \"Yeah, yeah.\" \"", "He used to...\" \"He's different now, but back then...\" \" JOHN:\" \"No, no red.\" \" ", "MAN:\" \"Yeah.\" \"", "No blue, either, no.\" \"", "No black, no yellow, 'cause those are gang colors.\" \"", "You know what I mean?\" \"", "And, uh...\" \"you know what?\" \"", "I'll take an extra pair of socks 'cause he could always use it.\" \" ", "MAN:\" \"Okay.\" \" ", "JOHN:\" \"Okay.\" \" ", "Right there.\" \"", "All right?\" \" ", "Mm.\" \" ", "$40.\" \" ", "All right.\" \"", "It's a bargain.\" \" ", "Thank you.\" \" ", "Take it easy, all right, my friend?\" \"", "Okay.\" \"", "Power to you, baby.\" \"", "I love you.\" \"", "Salim (ON PHONE):\" \"We talked to another attorney, a real attorney.\" \"", "She's going to take over.\" \"", "So, what about Mr. Stone?\" \"", "What about him?\" \"", "Forget about him.\" \"", "He's not good.\" \"", "How do you know?\" \"", "Now, the first thing he said to us was,\" \"\"Here's how much this is going to cost.\"\" \"", "That's all he cares about.\" \"", "This new attorney doesn't want anything, only to help.\" \" ", "Why?\" \"", "Why?\" \" ", "Why?\" \" ", "Because she can afford to.\" \"", "She makes enough money defending rich people.\" \"", "She is a very big lawyer.\" \"", "Baba, I kind of like Mr. Stone.\" \"", "Like him?\" \"", "What's there to like?\" \"", "It doesn't matter.\" \"", "This is what's happening, and it's good.\" \"", "We are very lucky.\" \"(", "BEEPING)\" \"Turn around.\" \"(", "PA ANNOUNCEMENT PLAYS)\" \"A little to the left, Sean.\" \"", "You want to see your fucking client, or you want us to toss your ass out?\" \"", "Sorry.\" \"", "Grab your stuff.\" \"", "How's the feet?\" \"", "So, hey, I brought you some clothes.\" \"", "You can collect them after.\" \"", "Did your folks put some money in your account?\" \"", "Uh, no.\" \"", "I don't think they knew to.\" \"", "Well, I'll make a deposit for you.\" \"", "You need money in here.\" \" ", "How you doing?\" \" ", "I'm okay.\" \"", "Okay.\" \"", "Good.\" \"", "So, I, uh, I talked to the DA.\" \"", "They're moving forward, which is to be expected, but that doesn't mean they won't deal later.\" \"", "All we can do is wait to see exactly what they have, which we'll find out once there's a grand jury.\" \"", "You're not my lawyer anymore.\" \"", "Excuse me?\" \"", "My parents, they hired somebody else.\" \"", "Really?\" \" ", "Who?\" \" ", "Um, Alison somebody.\" \"", "Alison somebody?\" \"", "Crowe?\" \"", "I don't know.\" \"", "That figures.\" \"", "Well, okay.\" \"", "I'm really sorry.\" \"", "No, no, no.\" \"", "I understand.\" \"", "This is, you know...\" \"This is important, so...\" \"Okay, look, whatever.\" \"", "Here's my number.\" \"", "Anytime you... you want to call me, day or night, for anything.\" \"", "Thank you.\" \"", "You got to leave first.\" \"", "I can't go until you do.\" \"", "I think we're done here.\" \"", "Hey, can I give you some last-minute advice?\" \"", "I can't think of any.\" \"", "You'll be okay.\" \"", "♪ ♪\" \" CHANDRA:\" \"Mr. Stone?\" \" ", "Huh?\" \"", "I'm Chandra Kapoor.\" \"", "I'm working with Ms. Crowe on the Khan case.\" \" ", "Okay.\" \"", "Let's go see her.\" \" ", "Um, actually, she's asked me to tell you she's sorry, but she's left for the day.\" \" ", "Chandra, huh?\" \" ", "Mm-hm.\" \"", "Your boss is too much.\" \"", "I'm sorry.\" \"", "I'm not sure what that means.\" \"", "You do.\" \"", "She took you with her when she stole my client.\" \" ", "Tell me I'm wrong.\" \" ", "She didn't steal anyone, Mr. Stone.\" \"", "She did.\" \"", "But I'm talking about you now.\" \"", "Is that what you went to law school for, to be a prop, Ms. Kapoor?\" \"", "Is there a message you'd like me to give Ms. Crowe?\" \"(", "LAUGHS)\" \"You know what the message is.\" \"", "♪ ♪\" \"♪ ♪\" \"(SIREN WAILING IN DISTANCE)\" \"(CAT MEOWS)\" \"(MEOWS)\" \"Sorry.\" \"", "Can't take you.\" \"", "Allergic.\" \"(", "INDISTINCT CHATTER)\" \"(FOOTSTEPS)\" \"He wants to see you.\" \"", "Who?\" \"", "Come on.\" \"", "Let's go.\" \"", "Come on.\" \"(", "DOOR LOCKS)\" \"Have a seat.\" \"", "That guard, Tito, his daughter's having her quinceañera this weekend.\" \"", "That's a sweet 16, only 15.\" \"", "But the dude lives in Brownsville, man, as shitty a hood as they come.\" \"", "So I said, \"Man, you should be concerned about the local thugs crashing the thing, getting high, fighting.\" \"", "Next thing you know, somebody's squeezing off shots, don't care who they hit.\"\" \"", "You know, I said, \"I couldn't guarantee that won't happen, but I could make a few phone calls, see if I can help out with that.\"\" \"", "That's what that little thank you is for.\" \"", "You see, us and the guards, we all from the same hood.\" \"", "Some of us even grew up together.\" \"", "They know our families.\" \"", "We know theirs.\" \"", "Family's everything, right?\" \"", "It is in a Muslim family.\" \"", "Yeah.\" \"", "I'll tell you something, man.\" \"", "See those brothers you pray with, the Nation of Islam?\" \"", "They're not your friends.\" \"", "In fact, they hate your ass because you're a natural-born Muslim, and they're just phony jailhouse opportunists looking for better food.\" \"", "Don't know the difference between Cairo, Egypt, or Cairo, Illinois.\" \"", "I'm Pakistani, not Egyptian.\" \"", "Yeah, well, my ancestors came from Dahomey and not the Congo, but who gives a fuck, man?\" \"", "See, you're a celebrity in here, and I'm not talking the good kind.\" \"", "Dude kills four guys over some dope.\" \"", "Okay.\" \"", "But murder a girl?\" \"", "Rape a girl?\" \" ", "I didn't.\" \" ", "Doesn't matter.\" \"", "It makes no difference.\" \"", "See, there's a whole separate judicial system in here, and you just been judged and juried, and it didn't come out good for you.\" \"", "Close your eyes.\" \"", "Close your eyes, I said.\" \"(", "PAPER RUSTLING)\" \"Give me your hand.\" \"", "Don't be afraid, Nasir.\" \"", "It feels good, right?\" \"", "Like silk.\" \"", "What is it?\" \"", "It's meat.\" \"(", "CHUCKLES) You wish.\" \"", "It's somebody's heart.\" \"(", "LAUGHS) Yeah, it's meat, but the best kind, veal.\" \" ", "Your people eat veal, right?\" \" ", "Sometimes.\" \"", "Ah, but only blessed, right?\" \" ", "I respect that.\" \" ", "Thank you.\" \"", "Listen to you, all polite and shit.\" \"", "See, the reason it feels like silk is because from the day it's born, they keep it in a dark crate, so small they can't even turn around.\" \"", "And it stays there, half-blind in the dark, drinking baby formula, waiting to die.\" \"", "There are some bad people in here, but I could protect you.\" \"", "Nasir, do you want my protection?\" \"", "Or do you prefer dead in the shower, with your brains bashed in, guts on the floor?\" \"", "It's up to you.\" \"", "What'd he say?\" \"", "He offered to help me in here.\" \" ", "And you said?\" \" ", "I didn't.\" \"", "Are you crazy?\" \"", "Freddy wiggles five fingers up on that tier, and five people are dead in the Bronx.\" \"", "Whatever he's offering, you got to take it, no discussion.\" \"", "Otherwise, you are dead.\" \"", "No.\" \" (", "BELL RINGS) - (DOGS BARKING)\" \"I don't know.\" \"", "People like, uh, you know, purebreds or, uh, really pretty cats.\" \"", "This is what I would call a, uh...\" \" Ugly cat.\" \" ", "Yeah.\" \"", "Yeah, kind of.\" \" ", "I got to sign anything or, uh...\" \" Nope.\" \" ", "All right, well, thanks.\" \" ", "Yeah.\" \"", "You bet.\" \"", "How long you keep them before you, you know, gas them or whatever?\" \" ", "Out of curiosity.\" \" ", "Ten days.\" \" (", "DOGS BARKING) - (CAT MEOWS)\" \"♪ ♪\" \" MAN:\" \"You fucking pussy!\" \" ", "MAN 2:\" \"Get him, man!\" \"(", "INMATES SHOUTING)\" \"(SHOUTING CONTINUING)\" \"♪ ♪\" \"♪ ♪\"" ]
{ "pile_set_name": "OpenSubtitles" }
[ 0.06526874750852585, 0.0008441181853413582, 0.0008121263235807419, 0.0026113083586096764, 0.0007634905632585287, 0.0008441181853413582, 0.0007545778062194586, 0.000731059059035033, 0.0007016593590378761, 0.0012187231332063675, 0.0006940967286936939, 0.8678486943244934, 0.0008441181853413582, 0.16233885288238525, 0.0012702061794698238, 0.003603218123316765, 0.0008826383273117244, 0.0006919825682416558, 0.0005519854603335261, 0.0006082401960156858, 0.0010937252081930637, 0.0007557537173852324, 0.0008034142665565014, 0.0008083439315669239, 0.0011890053283423185, 0.0006327326991595328, 0.000715564121492207, 0.0017368249827995896, 0.001102109206840396, 0.0006093946867622435, 0.0007315587718039751, 0.0013090874999761581, 0.0009312086622230709, 0.0007886122330091894, 0.001058690482750535, 0.4432128369808197, 0.003915322013199329, 0.0014066731091588736, 0.2214420586824417, 0.0010858156019821763, 0.0008024816052056849, 0.0014242111938074231, 0.001007339684292674, 0.0007276810356415808, 0.0006301671965047717, 0.02482612244784832, 0.0009715145570226014, 0.008776748552918434, 0.0011142450384795666, 0.011684795841574669, 0.6869436502456665, 0.042554229497909546, 0.0007940467912703753, 0.0008460161043331027, 0.0006101147155277431, 0.04183107614517212, 0.0006861832225695252, 0.0008409314323216677, 0.0007039224146865308, 0.0006423034355975688, 0.0006526473443955183, 0.0007685917662456632, 0.0007400565664283931, 0.0008129265042953193, 0.0008187660714611411, 0.0006078253500163555, 0.00130568933673203, 0.0008201833115890622, 0.0007830905960872769, 0.0020891150925308466, 0.0007439570035785437, 0.0007211304036900401, 0.0355270653963089, 0.0006220482173375785, 0.0008458177908323705, 0.0006628878763876855, 0.9867160320281982, 0.0015447712503373623, 0.0009093279368244112, 0.0006522981566376984, 0.0006919825682416558, 0.0017944921273738146, 0.015414468012750149, 0.0006022657034918666, 0.0008160111028701067, 0.0024873861111700535, 0.5278282761573792, 0.0006771670887246728, 0.0009447883348912001, 0.0005571154179051518, 0.0010013063438236713, 0.0011093048378825188, 0.0008143042214214802, 0.0007721135625615716, 0.0009252539020963013, 0.0009910397930070758, 0.0006902983295731246, 0.011387903243303299, 0.12761810421943665, 0.0013678239192813635, 0.000926793203689158, 0.000739839393645525, 0.22878926992416382, 0.0008314283331856132, 0.0009292238391935825, 0.001037168549373746, 0.0006771980552002788, 0.0009372747736051679, 0.02455514296889305, 0.005342328455299139, 0.0008383123204112053, 0.0006817604880779982, 0.0005853044567629695, 0.0005805433611385524, 0.0007950416766107082, 0.0007422241615131497, 0.043229054659605026, 0.0007056751637719572, 0.0007314130780287087, 0.004271017387509346, 0.2565639019012451, 0.1932397186756134, 0.0006722749676555395, 0.06285379081964493, 0.0006919825682416558, 0.0006522117764689028, 0.0037514318246394396, 0.0012802807614207268, 0.0007813668344169855, 0.08721712231636047, 0.0008041384280659258, 0.0006663043168373406, 0.002291463315486908, 0.0005695321597158909, 0.0005731736891902983, 0.0006442742305807769, 0.0006709758890792727, 0.0007675685337744653, 0.0014542767312377691, 0.0005914529319852591, 0.0008710045367479324, 0.0017976510571315885, 0.0007601220859214664, 0.0008704719366505742, 0.0006248748395591974, 0.003851334797218442, 0.0009288621949963272, 0.0006294588674791157, 0.09770336002111435, 0.0005919300601817667, 0.0012304644333198667, 0.0006677191122435033, 0.000734100176487118, 0.0012105931527912617, 0.001646495540626347, 0.9831673502922058, 0.0009496436105109751, 0.0011334820883348584, 0.0011334820883348584, 0.009377069771289825, 0.0011334820883348584, 0.0011334820883348584, 0.0011334820883348584, 0.0011334820883348584, 0.0009978660382330418, 0.0010371010284870863, 0.0008116358076222241, 0.0009467161144129932, 0.16070625185966492, 0.0009467161144129932, 0.0008366346010006964, 0.002326961839571595, 0.9475648999214172, 0.0029269936494529247, 0.0024274878669530153, 0.0008725321386009455, 0.0019714762456715107, 0.0006423639715649188, 0.0006713075563311577, 0.0007149254088290036, 0.011623166501522064, 0.011849150992929935, 0.00228668050840497, 0.0008577940170653164, 0.0005479204119183123, 0.0013280172133818269, 0.9950382113456726, 0.0005368666024878621, 0.0009489968651905656, 0.0008910062024369836, 0.11635211855173111, 0.0010646111331880093, 0.0006259981892071664, 0.9501650333404541, 0.0020120572298765182, 0.0033353327307850122, 0.0007585345301777124, 0.0013985057594254613, 0.0011947174789384007, 0.000948643428273499, 0.002331782365217805, 0.0024852906353771687, 0.0006954242708161473, 0.0007259233971126378, 0.0006422596634365618, 0.0019047046080231667, 0.0005778565537184477, 0.0011352942092344165, 0.22572889924049377, 0.0008307232055813074, 0.0007149254088290036, 0.8732388019561768, 0.0006532048573717475, 0.0024520386941730976, 0.0006539716850966215, 0.002600125502794981, 0.0007867980166338384, 0.001141029759310186, 0.001141029759310186, 0.0005822070525027812, 0.002064917702227831, 0.0008125923341140151, 0.0042196172289550304, 0.00067612633574754, 0.0005825906409882009, 0.0005405605770647526, 0.0005727247917093337, 0.0006846663891337812, 0.0011213078396394849, 0.001087534474208951, 0.0015736880013719201, 0.04566429182887077, 0.0006563785136677325, 0.0008041848195716739, 0.0009296837961301208, 0.002807093784213066, 0.0006247325800359249, 0.001508047222159803, 0.0007429151446558535, 0.0006326651782728732, 0.20786619186401367, 0.14343254268169403, 0.013658029958605766, 0.00155672209803015, 0.000778860121499747, 0.0007027661777101457, 0.0008533594664186239, 0.0006269068690016866, 0.005995431449264288, 0.0010363097535446286, 0.0013157298089936376, 0.05983562394976616, 0.0007471321150660515, 0.004043335560709238, 0.0008399159414693713, 0.0006578789907507598, 0.07145659625530243, 0.0009926633210852742, 0.0011305026710033417, 0.0008543138392269611, 0.0007113933679647744, 0.0007960837101563811, 0.000632238108664751, 0.014691515825688839, 0.031840916723012924, 0.0006803014548495412, 0.0102313831448555, 0.018632501363754272, 0.001838519936427474, 0.028233300894498825, 0.0008855551132000983, 0.0007470964919775724, 0.003464126493781805, 0.0006722749676555395, 0.0008614480029791594, 0.000787957280408591, 0.0005945560988038778, 0.0006085194763727486, 0.0006146930390968919, 0.0009595481096766889, 0.0006137838936410844, 0.0008441181853413582, 0.0009231669828295708, 0.0009140130132436752, 0.0010189765598624945, 0.0007662306888960302, 0.0007482885266654193, 0.0008275912841781974, 0.013042827136814594, 0.0007598196971230209, 0.0013298640260472894, 0.0011964332079514861, 0.0015187532408162951, 0.002380105433985591, 0.0006785266450606287, 0.0006220659706741571, 0.001535603660158813, 0.852993369102478, 0.013865068554878235, 0.005319852381944656, 0.0007149254088290036, 0.0010585509007796645, 0.9935160875320435, 0.00134117784909904, 0.0007530421135015786, 0.000722462369594723, 0.0007306934567168355, 0.0021248245611786842, 0.0014787439722567797, 0.0008037093793973327, 0.0012963179033249617, 0.0008148188935592771, 0.0006510100793093443, 0.006425694562494755, 0.001092870021238923, 0.005345712415874004, 0.0014287076191976666, 0.0007695011445321143, 0.0019676873926073313, 0.061088405549526215, 0.0010121756931766868, 0.0012828625040128827, 0.0008437109063379467, 0.00191212329082191, 0.0006523304618895054, 0.0014191456139087677, 0.0005601854063570499, 0.044281281530857086, 0.011951149441301823, 0.000746666977647692, 0.0526876226067543, 0.0022101651411503553, 0.35830336809158325, 0.0008818615460768342, 0.0011534391669556499, 0.006737892050296068, 0.0006211918080225587, 0.0007313500391319394, 0.0006688808789476752, 0.4204314351081848, 0.0009499088046140969, 0.0005571154179051518, 0.0005959668778814375, 0.0014039523666724563, 0.000989240943454206, 0.000641578109934926, 0.000637928256765008, 0.0010409167734906077, 0.0008441181853413582, 0.0007576437783427536, 0.0006639971979893744, 0.0014184343162924051, 0.2856743633747101, 0.0024764263071119785, 0.0005939365364611149, 0.0007679478731006384, 0.001243690145201981, 0.0007464190130122006, 0.0006615836173295975, 0.0007011867710389197, 0.0009927706560119987, 0.0018302071839571, 0.0019419268937781453, 0.0008329624542966485, 0.0006635506288148463, 0.0034789580386132, 0.049146685749292374, 0.0009443748276680708, 0.0006477824645116925, 0.0009661571239121258, 0.0027442816644906998, 0.020872576162219048, 0.11753170192241669, 0.0014276780420914292, 0.000672872643917799, 0.002540630055591464, 0.0015479620778933167, 0.0014744119253009558, 0.000575303565710783, 0.0019918109755963087, 0.0008250153623521328, 0.0006512083928100765, 0.0015462612500414252, 0.000799397355876863, 0.0007713869563303888, 0.000672545749694109, 0.0005571154179051518, 0.16330084204673767, 0.0007738415733911097, 0.0010754162212833762, 0.0006519019952975214, 0.0006512083928100765, 0.0006537900189869106, 0.0007119789952412248, 0.0008024647831916809, 0.0007080183713696897, 0.0012236667098477483, 0.0006631269934587181, 0.0007524610264226794, 0.00056034344015643, 0.0005571154179051518, 0.0012445528991520405, 0.0006161753553897142, 0.0008227641228586435, 0.0014368402771651745, 0.0006467642961069942, 0.000693522160872817, 0.000686556682921946, 0.0025609596632421017, 0.000624169479124248, 0.0012478528078645468, 0.0008481481345370412, 0.0008867025608196855, 0.0009880474535748363, 0.8311198353767395, 0.0007150930468924344, 0.0006070825038477778, 0.0011352942092344165, 0.0008111487259157002, 0.0006369225447997451, 0.0006708755390718579, 0.0007213279604911804, 0.0007403651834465563, 0.013067223131656647, 0.0007464175578206778, 0.0007389695383608341, 0.0008588395430706441, 0.0006306195864453912, 0.0008241875912062824, 0.0008339169435203075, 0.0006937779253348708, 0.001838519936427474, 0.0018277481431141496, 0.0006300077075138688, 0.030739691108465195, 0.0007810668321326375, 0.0007369848899543285, 0.008241216652095318, 0.006120930425822735, 0.0017166350735351443, 0.0006333028431981802, 0.00074281997513026, 0.0007133682374842465, 0.0007436713203787804, 0.013873743824660778, 0.0017921559046953917, 0.0036677925381809473, 0.0007547928253188729, 0.000925688655115664, 0.0008887189906090498, 0.0006974359857849777, 0.0008650675881654024, 0.0009471984230913222, 0.0007539392681792378, 0.008000173605978489, 0.0013572475872933865, 0.0030413377098739147, 0.9664585590362549, 0.0005945490556769073, 0.0007811044342815876, 0.0010927707189694047, 0.0008441181853413582, 0.000885887595359236, 0.000541908317245543, 0.00072095962241292, 0.0006918579456396401, 0.0006619169726036489, 0.0008441181853413582, 0.0006562552298419178, 0.0007544599357061088, 0.000639640842564404, 0.000803679577074945, 0.0008549734484404325, 0.0031844417098909616, 0.03538668900728226, 0.02414652332663536, 0.002807093784213066, 0.0008784386445768178, 0.000845614355057478, 0.0069019123911857605, 0.0006761772092431784, 0.013821677304804325, 0.0008817691705189645, 0.0007187883602455258, 0.0006974359857849777, 0.0033055974636226892, 0.000714190595317632, 0.0007110829465091228, 0.0006999789620749652, 0.03656985983252525, 0.0006993525312282145, 0.0009019571007229388, 0.0009873323142528534, 0.000751908344682306, 0.0006464262842200696, 0.0018709636060521007, 0.0006772842607460916, 0.1361372023820877, 0.001150484662503004, 0.0006174930604174733, 0.0005907050799578428, 0.0008123348816297948, 0.00068290950730443, 0.0009573714924044907, 0.0646049752831459, 0.0007066988619044423, 0.0008946710731834173, 0.048891495913267136, 0.0006462401943281293, 0.0006063932087272406, 0.06220795214176178, 0.0008086474845185876, 0.000683935359120369, 0.0006453210371546447, 0.002494573360309005, 0.0007149254088290036, 0.05144992843270302, 0.0007761516608297825, 0.0018458430422469974, 0.001838519936427474, 0.0006535560823976994, 0.0010480283526703715, 0.000812382495496422, 0.0008907272713258862, 0.001198282465338707, 0.0014109993353486061, 0.0006268791039474308, 0.0007658303366042674, 0.0005782520747743547, 0.0006295716157183051, 0.0008821044466458261, 0.0008639300940558314, 0.0006973076961003244, 0.012052081525325775, 0.041205596178770065, 0.9364911317825317, 0.004117313306778669, 0.0007491376018151641, 0.0005748760304413736, 0.0006368861068040133, 0.0006591068231500685, 0.001087361597456038, 0.000642104190774262, 0.000713710964191705, 0.003284335834905505, 0.001061461167410016, 0.001019137678667903, 0.0009969448437914252, 0.5938251614570618, 0.0011326012900099158, 0.0007438191096298397, 0.0006551732076331973, 0.0008420764352194965, 0.0006750517059117556, 0.0010158021468669176, 0.03667599335312843, 0.0016398003790527582, 0.0019408809021115303, 0.0011716785375028849, 0.0006811902276240289, 0.0007553090690635145, 0.0022345357574522495, 0.0009105982026085258, 0.0007991798920556903, 0.0013851890107616782, 0.0006573892314918339, 0.0007064368692226708, 0.0006798066315241158, 0.0007488770643249154, 0.0009184862719848752, 0.0009262682870030403, 0.0006731600733473897, 0.0007244300795719028, 0.0005571154179051518, 0.0006871733348816633, 0.0006919825682416558, 0.0014731844421476126, 0.0006640740903094411, 0.0006069937371648848, 0.0013780377339571714, 0.0007273000665009022, 0.000799862202256918, 0.0022583650425076485, 0.006839180365204811, 0.000888457871042192, 0.010422326624393463, 0.002777636982500553, 0.0008256476721726358, 0.0009252539020963013, 0.0009252539020963013, 0.0009252539020963013, 0.0013844239292666316, 0.0016272059874609113, 0.009024295024573803, 0.0007889659027568996, 0.004579286556690931, 0.0008436855277977884, 0.0013735664542764425, 0.0005846075364388525, 0.000540020817425102, 0.001647111726924777, 0.0006867379997856915, 0.9972079396247864, 0.0007211304036900401, 0.0175136998295784, 0.0008862519753165543, 0.00338296452537179, 0.0007913806475698948, 0.0029991844203323126, 0.00075487419962883, 0.000735317007638514, 0.0006324455025605857, 0.0011766164097934961, 0.0008337588515132666, 0.0006295240018516779, 0.0006919825682416558, 0.0006345456349663436, 0.0006308206939138472, 0.0006618862971663475, 0.0007495982572436333, 0.052621833980083466, 0.001838519936427474, 0.0008050205069594085, 0.0008307232055813074, 0.0011352942092344165, 0.0007259359117597342, 0.0007979669026099145, 0.0007861485937610269, 0.0007662306888960302, 0.0006749362219125032, 0.0006729146698489785, 0.0006187180988490582, 0.0008126217289827764, 0.0006412574439309537, 0.0007380465394817293, 0.0010375460842624307, 0.002176643116399646, 0.0005571154179051518, 0.0018233949085697532, 0.0012893570819869637, 0.0007111327140592039, 0.0006935098790563643, 0.00071230239700526, 0.0006460308213718235, 0.0007299400167539716, 0.001426420290954411, 0.0006981352344155312, 0.0005772449658252299, 0.0006919825682416558, 0.0006551072583533823, 0.0006193801527842879, 0.0010582836112007499, 0.000856803497299552, 0.43010416626930237, 0.0006722749676555395, 0.0006652986048720777, 0.0013803415931761265, 0.02569284476339817, 0.0009650905267335474, 0.0012635798193514347, 0.0008925237925723195, 0.0006019561551511288, 0.0010002104099839926, 0.0006943183834664524, 0.0007087569683790207, 0.0009309097076766193, 0.018980449065566063, 0.0006637861370109022, 0.000622416497208178, 0.0011352942092344165, 0.002807093784213066, 0.0008637221762910485, 0.001540714525617659, 0.0006663056556135416, 0.00098038325086236, 0.0008618306019343436, 0.8981545567512512, 0.017561927437782288, 0.043701689690351486, 0.0005725660012103617, 0.0006179134361445904, 0.001224203035235405, 0.0006973217241466045, 0.0006863375310786068, 0.0006256077904254198, 0.0007744749891571701, 0.0009400360868312418, 0.0007149254088290036, 0.0006595803424715996, 0.002337964717298746, 0.004003265872597694, 0.9886512756347656, 0.0006249751895666122, 0.0010656100930646062, 0.9832305908203125, 0.001518396195024252, 0.7760988473892212, 0.0006919825682416558, 0.45114120841026306, 0.7971920967102051, 0.0008846400887705386, 0.0013154265470802784, 0.0008250899845734239, 0.0006020507426001132, 0.07498196512460709, 0.03221294656395912, 0.0008212030516006052, 0.0036728507839143276, 0.0005603063618764281, 0.0007440994959324598, 0.0008812680607661605, 0.0014951882185414433, 0.0006700902595184743, 0.0007141137612052262, 0.0007287532789632678, 0.005178022664040327, 0.0007230216288007796, 0.0006231501465663314, 0.0005785250104963779, 0.0005571154179051518, 0.952082633972168, 0.0006760506075806916, 0.25525668263435364, 0.0064234659075737, 0.0065505970269441605, 0.8421631455421448, 0.0006577548920176923, 0.0007410448743030429, 0.0005817885394208133, 0.000719874573405832, 0.0008846400887705386, 0.7941753268241882, 0.018451929092407227, 0.0006415157113224268, 0.5737693905830383, 0.0007150930468924344, 0.000769255158957094, 0.00183162244502455, 0.19033774733543396, 0.0007149254088290036, 0.000725132878869772, 0.0010249101324006915, 0.0005618403665721416, 0.0007149254088290036, 0.0007128830184228718, 0.038815516978502274, 0.0006701713427901268, 0.0006765036378055811, 0.9971975088119507, 0.021729303523898125, 0.0008608383359387517 ]
0.040837
751
[ "/**\n * Copyright (c) 2016, All Contributors (see CONTRIBUTORS file)\n *\n * This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. ", "If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/.\n */\npackage com.eventsourcing.postgresql.index;\n\nimport com.eventsourcing.", "Entity;\nimport com.eventsourcing.index.", "Attribute;\nimport com.eventsourcing.index.", "EqualityIndexTest;\nimport lombok.", "SneakyThrows;\nimport org.testng.annotations.", "Test;\n\nimport javax.sql.", "DataSource;\n\nimport static com.eventsourcing.postgresql.", "PostgreSQLTest.createDataSource;\n\n@Test\npublic class PostgreSQLEqualityIndexTest extends EqualityIndexTest<EqualityIndex> {\n\n private DataSource dataSource;\n\n @Override\n @SneakyThrows\n public <A, O extends Entity> EqualityIndex onAttribute(Attribute<O, A> attribute) {\n if (dataSource == null) {\n this.dataSource = createDataSource();\n }\n return EqualityIndex.onAttribute(dataSource, attribute, false);\n }\n}" ]
{ "pile_set_name": "Github" }
[ 0.0006428254419006407, 0.0006601032800972462, 0.0007537348428741097, 0.0007593980990350246, 0.0009107461082749069, 0.0008983975858427584, 0.0007690481143072248, 0.0009892667876556516, 0.0018698758212849498 ]
0.000917
9
[ "MathOverflow\n\nMathOverflow is a mathematics question-and-answer (Q&A) website, which serves as an online community of mathematicians. ", " It allows users to ask questions, submit answers, and rate both, all while getting merit points for their activities. ", "It is a part of the Stack Exchange Network.", "\n\nIt is primarily for asking questions on mathematics research – i.e. related to unsolved problems and the extension of knowledge of mathematics into areas that are not yet known – and does not welcome requests from non-mathematicians for instruction, for example homework exercises. ", " It does welcome various questions on other topics that might normally be discussed among mathematicians, for example about publishing, refereeing, advising, getting tenure, etc. ", " It is generally inhospitable to questions perceived as tendentious or argumentative.", "\n\nOrigin and history \nThe website was started by Berkeley graduate students and postdocs Anton Geraschenko, David Zureick-Brown, and Scott Morrison on 28 September 2009. ", "The hosting was supported by Ravi Vakil. ", " The site originally ran on a separate installation of the StackExchange 1.0 software engine; on June 25, 2013, it was integrated in the regular Stack Exchange Network, running SE 2.0.", "\n\nNaming \nAccording to MathOverflow FAQ, the proper spelling is \"MathOverflow\" rather than \"Math Overflow\".", "\n\nUse of mathematical formulas \nThe original version of the website did not support LaTeX markup for mathematical formulas. ", "To support most of the functionality of LaTeX, MathJax was added in order for the site to transform math equations into their appropriate forms. ", "In its current state, any post including \"Math Mode\" (text between $'s) will translate into proper mathematical notation.", "\n\nUsage \nAs of April 4, 2012, there were 16,496 registered users on MathOverflow, most of whom were located in the United States (35%), India (12%), and the United Kingdom (6%). ", "By December 11, 2018, the number of registered users had grown to 87,850. ", "As of June 2019, 103,308 questions have been posted.", "\n\nIn 2011, questions were answered an average of 3.9 hours after they were posted, and \"Acceptable\" answers took an average of 5.01 hours.", "\n\nReception \nTerence Tao compared it to \"the venerable newsgroup sci.math, but with more modern, 'Web 2.0' features.\"", "\nJohn C. Baez writes that \"website 'Math Overflow' has become a universal clearinghouse for math questions\".", "\nAccording to Gil Kalai, MathOverflow \"is ran by an energetic and impressive group of very (very very) young people\".", "\nJordan Ellenberg comments that the website \"offers a constantly changing array of new questions\" and is \"addictive\" in a \"particularly pure form\", as he compares it to the Polymath Project.", "\nJared Keller in The Atlantic writes, \"Math Overflow is almost an anti-social network, focused solely on productively addressing the problems posed by its users.\" ", " He quotes Scott Morrison saying \"Mathematicians as a whole are surprisingly skeptical of many aspects of the modern Internet... In particular, things like Facebook, Twitter, etc. ", "are viewed as enormous wastes of time.\"", "\n\nSee also \n nLab\n PhysicsOverflow\n\nNotes\n\nFurther reading\n\nExternal links \n \n — podcast with Joel Spolsky and Jeff Atwood (creators of Stack Exchange) and Anton Geraschenko (creator of MathOverflow).", "\n\nCategory:Mathematics websites\nCategory:Internet properties established in 2009\nCategory:Stack Exchange network" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0007276778924278915, 0.0006054434925317764, 0.0006634191377088428, 0.0006021506269462407, 0.0005300372140482068, 0.0006629583076573908, 0.0005773063166998327, 0.000728825107216835, 0.0006262580864131451, 0.0006138532771728933, 0.0006461642333306372, 0.0006737049552612007, 0.0005880699609406292, 0.0005981072899885476, 0.0006291643367148936, 0.0005903572309762239, 0.0006051781238056719, 0.0006232719169929624, 0.0006307981093414128, 0.0005550465430133045, 0.000571804353967309, 0.0006256054039113224, 0.0005831548478454351, 0.010149368084967136, 0.0005965866148471832, 0.0006328554591163993 ]
0.000986
26
[ "Vegan Chain Expands in Florida, Plans to Open 100 Locations Worldwide\n\nLike us on Facebook:\n\nIt’s always good news when there’s more vegan choices.", "\n\nLatest Vegan News reports that Choices Organic Cafe has settled in to it’s fifth location in Weston, Florida. ", "The health centric, 100% plant-based spot was founded five years ago by brothers Alex and Jorge Cuevas, and is known for serving up brunch, bowls, burgers, and massive platters of brownies (okay mostly healthy). ", "They even have a vegan “bacon” donuts that’s made headlines. ", "They’ve been able to share their compassionate, sustainable example of living in big ways in a small period of time.", "\n\nA wheel of chocolate brownie goodness…🍫 Online catering available. #", "WeAreTheSumOfOurChoices #organic #glutenfree #vegan A photo posted by Choices Cafe (@choicescafe) on Mar 29, 2016 at 3:19am PDT\n\nAnd the team isn’t planning on slowing down either, with aspirations to continue spreading the love until they have 100 locations. “", "Our mission is to inspire compassionate choices by serving food that is made with love for people, for animals, and for the planet,” Choices Cafe president, Lori Zito, told LVN. “", "We believe there is a gentler, kinder way of life. ", "And by giving people the opportunity to choose plant-based food, we can help cultivate change with every meal we serve.” ", "Hear hear!", "\n\nOutside of their own impact, Choices has been credited with pioneering the vegan scene in Miami by influencing other vegan restaurant’s to pop-up, and grocery stores to carry more faux meats and dairy-free options. ", "Lito says, “We’d like to believe that we’ve played some part in this rise of consciousness. ", "And we are hopeful that this movement is only at its infancy, and will continue to grow and gain momentum.” ", "Florida today, waking up the world tomorrow.", "\n\nA photo posted by Choices Cafe (@choicescafe) on Mar 25, 2016 at 3:35pm PDT\n\n“We acknowledge the suffering that is occurring in our world today, and we are way too stubborn to let it continue,” Lito continued. ", "It’s clear a good number of hungry Floridians agree that suffering shouldn’t be on the menu. ", "This Canadian hopes there’ll be even more Choices for vegans in the future!", "\n\nHave you had a chance to dine at Choices Cafe? ", "Tell us about your experience below!", "\n\nPhoto from Choices Cafe Facebook page" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0007889282424002886, 0.0006239667418412864, 0.0007651796331629157, 0.0364701934158802, 0.0005060801631771028, 0.0008431137539446354, 0.0009312632028013468, 0.000639468664303422, 0.0006023314781486988, 0.0005789047572761774, 0.001961636357009411, 0.0007424689247272909, 0.0006296688807196915, 0.0005362401134334505, 0.0009200277854688466, 0.0012657094048336148, 0.008151189424097538, 0.004859153181314468, 0.0008336424943991005, 0.0006115026189945638, 0.0006134999566711485 ]
0.003042
21
[ "The present invention relates to a protective system for a three phase high voltage transmission line, and more particularly, to an overvoltage directional blocking relay having means to more correctly sense the presence of an external fault, i.e., a fault behind the relay location.", "\nAs the voltage and current ratings and the length of transmission lines have increased, greater emphasis has been placed on decreasing the operating times for the protective relays associated with such lines so as to provide shorter fault clearing times. ", "The desired relay operating times may be relatively small compared to the time constants of the natural frequency transients on long high voltage transmission lines.", "\nIn a directional comparison relaying system for a transmission line, there are typically directional relays at opposite terminals of the line, and each comprises a tripping unit and a blocking unit. ", "If the tripping unit at one line terminal senses fault current flowing into the transmission line through this one terminal, it will act to produce tripping of a circuit breaker at this terminal unless the tripping unit is blocked from producing such tripping by a blocking signal received from the relay at the opposite terminal of the line. ", "The primary purpose of the blocking unit of the relay system at the opposite terminal is to transmit a blocking signal if the fault that produced the fault current is external to the transmission line. ", "If the fault is an internal fault, no blocking signal is transmitted and the tripping unit at the one end is free to produce tripping in response to the fault.", "\nSince operation of the tripping unit must usually be delayed until the blocking unit of the relay at the opposite line terminal has had an opportunity to determine whether the fault is internal or external and to transmit a blocking signal if the fault is external, it is important to high speed tripping of the circuit breaker on internal faults, and hence minimum delay time, that such blocking unit be capable of quickly establishing whether the fault is an external one.", "\nFor long line applications, certain difficulties are encountered in quickly establishing the presence of an external fault. ", "Some of these difficulties result from the fact that immediately following fault occurrence, the fault current in the line is the current associated with travelling waves propagated into the line by the fault. ", "The steady-state fault current, which is the current that the usual blocking relay responds to, is established only after some time has elapsed relative to the initiation of the travelling waves; and this can delay response of the blocking relay to an external fault.", "\nAn object of my invention is to provide a blocking relay of the overvoltage directional type which is capable of correctly responding very rapidly to an external fault, even in long line applications where travelling waves may persist for a relatively long period.", "\nAnother condition that can cause problems for directional relays is the failure of one or two phase potentials on a three phase system. ", "Such a failure typically causes the presence of negative sequence voltage and the absence of negative sequence current, which conditions, in turn, may cause tripping relays to operate erroneously.", "\nA further problem that may result from slow operation of the blocking relays is one that arises in those applications where the relays are fed from parallel current transformers and the fault current is such as to produce a reasonable probability of current transformer saturation. ", "If the prefault residual flux levels in the current transformers are such that an adversely located current transformer saturates rapidly (whereas another current transformer saturates slowly); then, if the operating times of the blocking relays are delayed, the adversely located current transformer may saturate before the blocking relays operate, creating the possibility that the lack of operation of the blocking relays will allow the trip relays to operate and cause a false trip.", "\nA further difficulty is involved with blocking relays utilizing negative or zero sequence components in that the operation may be degraded when a fault is located on a parallel line such that the negative (and/or the zero) sequence voltage at each end of the protected line is approximately equal. ", "Thus, the negative (and/or zero) sequence relay current at each end of the protected line is established by the negative (and/or zero) sequence voltage at the line terminals and the net shunt impedance in the line, which is typically capacitive. ", "The capacitive shunt impedance produces a current in the relay that may cause the external fault in the parallel line to appear as an internal fault in the protected line to a negative (or zero) sequence directional unit.", "\nAccordingly, it is an object of the present invention to provide a directional overvoltage relay utilizing the negative (or zero sequence) components having means to correctly distinguish the fault current associated with external fault conditions.", "\nIt is a further object of my invention to provide more reliable detection of external faults where the current transformers are driven into their undesirable saturation condition.", "\nA still further object of my invention is to provide a means for detecting potential failure of one or two phase potentials on a three phase system and initiating transient blocking of the tripping relays.", "\nIt is a still further object of this invention to provide a directional overvoltage relay that is minimally affected by travelling waves on long lines, and is capable of fast operation in the presence of said travelling waves.", "\nThese and other objects of the present invention will become apparent to those skilled in the art upon consideration of the following description of the invention." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0006464906618930399, 0.0006472797831520438, 0.0005948058096691966, 0.0006179260672070086, 0.0007303908932954073, 0.0008479998796246946, 0.0011364471865817904, 0.0007294435054063797, 0.0006171335699036717, 0.000692501722369343, 0.0007913410663604736, 0.0007183825946412981, 0.0007644657744094729, 0.0010184631682932377, 0.0008201759192161262, 0.0009027317282743752, 0.0007441540947183967, 0.0007847250672057271, 0.0012585591757670045, 0.0007101439987309277, 0.0007153922924771905, 0.0007462177309207618, 0.0006643399829044938, 0.000549291493371129 ]
0.000769
24
[ "Q:\n\nCopy and combine sheets to a workbook\n\nI need VBA code for Excel which: will be activated by a button in an empty workbook, loop through open workbooks, copies only sheets called \"specificsheetname\" from workbooks and pastes it into a new worksheet in the button activator workbook. ", "So idea is that it will combine many worksheets from different workbooks into a one workbook. ", "I tried this:\nSub workbookFetcher()\n\nDim book As Workbook, sheet, wsNew, wsCurr As Worksheet\n\nSet wsCurr = ActiveSheet\n\nFor Each book In Workbooks\n For Each sheet In book.", "Worksheets\n If sheet.", "Name = \"COOLING_RAW\" Then\n Set wsNew = Sheets.", "Add(After:=wsCurr)\n book.", "Worksheets(\"COOLING_RAW\").Copy\n Set wsNew = book.", "Worksheets(\"COOLING_RAW\")\n End If\n Next sheet\nNext book\n\nEnd Sub\n\nIt kind of works but it pastes all the copied worksheets to a new workbook. ", "That's not what I want, I want them to pasted in the same workbook.", "\n\nA:\n\nAs I said in my comment:\nSub workbookFetcher()\n\nDim book As Workbook, sheet as Worksheet\n\nFor Each book In Workbooks\n For Each sheet In book.", "Worksheets\n If sheet.", "Name = \"COOLING_RAW\" Then\n book.", "Worksheets(\"COOLING_RAW\").Copy After:=ThisWorkbook.", "Sheets(ThisWorkbook.", "Sheets.", "Count)\n End If\n Next sheet\nNext book\n\nEnd Sub\n\nIf you want it to be after the ActiveSheet and the ActiveSheet is in the middle of other sheets, you can still use your wsCurr and just increment the index.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006969791720621288, 0.0006129625835455954, 0.0016396865248680115, 0.0007446922245435417, 0.0006865020841360092, 0.0007982741808518767, 0.0006444667233154178, 0.0006317984079942107, 0.0007881757337599993, 0.00116959388833493, 0.0007446922245435417, 0.0006075218552723527, 0.0006052128155715764, 0.0007030294509604573, 0.0015306802233681083, 0.0011044770944863558, 0.0019954426679760218 ]
0.000924
17
[ "Q:\n\nFunction to wrap the_content in a div\n\nWhenever I've developing a new theme I always wrap the_content in a div, like so;\n<div class=\"entry-content\">\n <?", "php the_content();?", ">\n</div>\n\nIs there a way I can streamline this process and automatically wrap the_content in a div via a function so I don't always have to manually code it and, more importantly, so if my client ever feels like flexing their coding muscles there wont be a problem if they forget to do it...\n\nA:\n\nYou can hook the_content filter.", "\npaste below code in functions.php :\n<?", "php\n add_action('the_content','ravs_content_div');\n function ravs_content_div( $content ){\n return '<div class=\"entry-content\">'.$content.", "'</div>';\n }\n?", ">\n\nAfter paste this code in functions.php, the_content() print post/page content after wrap content in div with class entry-content.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006558147724717855, 0.0007009088294580579, 0.0008422638056799769, 0.0009929375955834985, 0.0007192405755631626, 0.0008997635450214148, 0.0007702260045334697, 0.0019954426679760218 ]
0.000947
8
[ "1. ", "Field of the Invention\nThis invention relates generally to wireless digital communication systems. ", "In particular, the invention discloses a technique for increasing the performance of a wireless communication link operating in the presence of an external source of intermittent interference.", "\n2. ", "Description of the Prior Art\nCordless telephones have become increasingly popular in recent years. ", "As improved technology is incorporated into cordless telephone designs, their sound quality and reliability have greatly improved, leading to the increasing proliferation and acceptance of cordless telephone devices in residential, and even commercial, environments.", "\nHowever, as cordless telephones (which operate via a wireless radio frequency (RF) communication link established between the phone handset and a base unit) and other wireless devices have become more popular, the electromagnetic spectrum over which such devices communicate has, in turn, become increasingly crowded. ", "Additionally, increasing numbers of other electronic devices are being used throughout society. ", "Many such devices radiate electromagnetic energy that “pollutes” the spectrum over which wireless devices must communicate. ", "As a result of these spurious transmissions and radiated noise, wireless devices commonly experience crosstalk and interference that inhibits the accurate and reliable transmission of signals.", "\nIn order to reduce the crowding of the electromagnetic spectrum designated for use by cordless telephones and other personal wireless devices, numerous frequency domain interference avoidance techniques, such as dynamic channel allocation, have been developed. ", "Such techniques typically involve altering of the radio frequencies corresponding to the “channels” over which a wireless device communicates in an attempt to avoid externally generated radiated electromagnetic energy. ", "Also, additional frequency bands have been allocated for personal wireless communications devices, thereby spreading out device traffic and reducing the potential for interference.", "\nSystems known in the art utilize many techniques to avoid the effects of RF interference that occur in a device's communication band. ", "Many such techniques involve changing the system's frequency domain RF transmission characteristics. ", "For example, calls may be handed off to a different carrier frequency, or noisy channels in the hopping pattern of a frequency hopping spread spectrum system may be substituted for different channels. ", "Such channel substitution techniques are particularly effective in avoiding continuous narrowband sources of interference, such as may be generated by other cordless telephones.", "\nRecently, the 2.4 GHz ISM band has become popular for use by cordless telephones and other wireless devices. ", "Telephones operating in the 2.4 GHz ISM band commonly employ a Time Domain Multiple Access (“TDMA”) communication protocol comporting with the Digital Enhanced Cordless Telecommunications (“DECT”) standard, as defined in ETSI standard ETS 300 175-2, Section 4.2 (September 1996). ", "Due to the characteristics and regulation of the 2.4 GHz band, devices operating thereon may offer increased range and/or bandwidth compared to other available frequency bands. ", "The DECT standard is being widely adopted throughout the world for wireless applications including cordless telephones, wireless offices and wireless telephone lines to the home. ", "The DECT standard allows for multiple communication links between devices on a single RF carrier frequency through the use of time domain multiplexing. ", "Following the success of DECT in Europe, Africa and South America, a variant of DECT has been developed for the North American market called Worldwide Digital Cordless Telecommunications (“WDCT”). ", "The WDCT standard is currently becoming popular for use at the 2.4 GHz ISM band.", "\nHowever, one substantial difficulty faced by designers of electronic equipment utilizing the 2.4 GHz ISM band is interference generated by operation of a common household microwave oven. ", "During their operation, microwave ovens generate substantial levels of RF energy throughout the 2.4 GHz frequency range. ", "Therefore, when a microwave oven is in operation, a nearby, active 2.4 GHz cordless telephone of prior art design would commonly experience substantial interference. ", "Such interference would degrade the sound quality of the telephone call to an objectionable, if not unusable, level. ", "The impact of microwave oven radiation on cordless telephone operation is particularly significant when users place the cordless telephone base unit directly on top of a microwave oven. ", "In certain circumstances, it is possible that a cordless telephone call conducted in the presence of microwave oven generated interference would be dropped altogether.", "\nPrior art frequency domain interference avoidance techniques are of limited effectiveness in the presence of an interference source that emits interfering energy over a substantial portion of a communication band. ", "It is estimated that a microwave oven may radiate substantial levels of interfering RF energy on a majority of the frequency channels defined in the 2.4 GHz ISM band.", "\nAccordingly, it is an object of this invention to provide a method that can be used in conjunction with a wireless communications system to avoid electromagnetic interference radiated by a microwave oven, or similar source.", "\nIn addition to reliability and sound quality, power efficiency of a cordless telephone handset is an important consideration in cordless telephone design. ", "Cordless telephone customers demand telephones with extended battery life, such that talk time and time between required charging of the telephone handset needs to be as great as possible. ", "However, consumers also desire compact and light weight portable telephone handsets, which, in turn, limits the physical size and, in turn, the electrical capacity of the battery that may be incorporated. ", "While compact, high energy density battery technologies are one solution, they tend to be expensive, thereby increasing the cost of a cordless telephone that uses high density batteries to extend talk time. ", "Therefore, it is highly desirable, and therefore it is an object of this invention, to provide a cordless telephone design that is power efficient.", "\nFinally, some advanced wireless communications systems utilize multiple communication links over a single time domain multiplexed data frame. ", "For example, advanced cordless telephone base units may support multiple portable handsets; wireless data communications may involve multiple devices on different time slots of a common carrier; and Wireless Local Loop technology may provide wireless telephone line service to a plurality of handsets in one or more homes using a common RF carrier. ", "Therefore, it is an object of this invention to provide an interference avoidance technique that efficiently utilizes the capacity of a communications channel.", "\nThese and other objects of this invention will become apparent to those of ordinary skill in the art in view of the invention described herein." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0009391896310262382, 0.0005623978213407099, 0.0006040630396455526, 0.0011855863267555833, 0.0005911706248298287, 0.0005726161180064082, 0.0006384994485415518, 0.0006086325738579035, 0.0010389452800154686, 0.0007279945421032608, 0.0006284799892455339, 0.0005934289656579494, 0.0006593512953259051, 0.000683685764670372, 0.0006138681783340871, 0.0005765290698036551, 0.0007285781903192401, 0.0006679457146674395, 0.0006148975808173418, 0.0005700953188352287, 0.0006389602785930037, 0.0006100484752096236, 0.0006063362816348672, 0.0005887816078029573, 0.0006272855098359287, 0.0006698769866488874, 0.0006581298657692969, 0.0008315931772813201, 0.0007204798748716712, 0.0006013548118062317, 0.0007012526039034128, 0.0007754837279208004, 0.0006399673293344676, 0.0005796937621198595, 0.0006563168717548251, 0.0005815787008032203, 0.0006938229198567569, 0.0006219275528565049, 0.0005845396080985665, 0.0005919119575992227, 0.0006338076782412827, 0.0005841862293891609 ]
0.000667
42
[ "Q:\n\nHow to plot multiple graphs in one using 3 different files and another file to sort them?", "\n\nI have 2 CSV files. ", "One of them has the sorted data and another unsorted. ", "Example data is as shown below. ", "\nI am trying to do is to take the unsorted data and sort it according to index numbers from the sorted data. ", "Ex: in the sorted data, I have index number \"1\" corresponds to \"name001.a.a\". ", "So, since it iss index number = \"1\", In the unsorted file, I want \"name 001.a.a,0001\" to be the first in the list. ", "The number after the comma in unsorted file is 4 digit number which does not play a role in sorting but is attached to the names.", "\nOne more sample would be: index \"2\" is for \"name002.a.a\", so after sorting, new file would have \"name002.a.a,0002\" as a second item in the list\nunsorted.csv:\nname002.a.a,0002\nname001.a.a,0001\nname005.a.a,0025\n\nhostnum.csv (sorted):\n\"1 name001.a.a\"\n\"2 name002.a.a\"\n\"3 name005.a.a\"\n\nI need help to figure out where I have coded wrong and if possible, need help with completing it.", "\nEDIT- CODE:\nAfter changing the name csv_list to csv_file, I am receiving the following error\nfrom matplotlib import pyplot as plt\nimport numpy as np\nimport csv\n\ncsv_file = []\nwith open('hostnum.csv', 'r') as f:\n csvreader = csv.reader(f)\n for line in csvreader:\n csv_file.append(line)\n\nus_csv_file = []\nwith open('unsorted.csv', 'r') as f:\n csvreader = csv.reader(f)\n for line in csvreader:\n us_csv_file.append(line)\nus_csv_file.sort(key=lambda x: csv_file.index(x[1]))\n\nplt.plot([int(item[1]) for item in us_csv_file], 'o-')\nplt.xticks(np.arange(len(csvfile)), [item[0] for item in csvfile])\n\nplt.show()\n\nERROR:\nTraceback (most recent call last):\n File \"C:/..../TEST_ALL.py\", line 16, in <module>\n us_csv_file.sort(key=lambda x: csv_file.index(x[1]))\n File \"C:/..../TEST_ALL.py\", line 16, in <lambda>\n us_csv_file.sort(key=lambda x: csv_file.index(x[1]))\nValueError: '0002' is not in list\n\nA:\n\nWell, you haven't defined csv_list in your code. ", "Looking quickly through your code, I'd guess changing us_csv_file.sort(key=lambda x: csv_list.index(x[1])) to us_csv_file.sort(key=lambda x: csv_file.index(x[1])) (i.e. using the correct variable name, which is csv_file and not csv_list), might just solve the problem.", "\n\nHere's a new attempt. ", "This one tries to extract the numbers from the second column from hostnum.csv and puts them onto a separate list, which it then uses to sort the items. ", "When I run this code, I get ValueError: '025' is not in list but I assume that's because you haven't given us the entire files and there is indeed no such line that would contain name025.a.a in the snippet of hostnum.csv you gave us, I also added a [1:] to the sorting statement.", "\nIf this doesn't work, try removing that [1:] and changing csv_file_numbers.append(csv_file[-1][1][4:].split('.", "')[0]) to csv_file_numbers.append(csv_file[-1][1][4:].split('.", "')[0].zfill(4)). ", "string.zfill(4) will add zeros to the beginning of a string so long that its length is at least 4.", "\nBecause your sorted file contains one more zero than the unsorted file, I also changed \nfrom matplotlib import pyplot as plt\nimport numpy as np\nimport csv\n\ncsv_file = []\ncsv_file_numbers = []\n\n##with open('hostnum.csv', 'r') as f:\n## csvreader = csv.reader(f, dialect=\"excel-tab\")\n## for line in csvreader:\n## csv_file.append(line)\n## csv_file_numbers.append(line[-1][4:].split('.", "')[0])\n\nwith open('hostnum.csv', 'r') as f:\n sorted_raw = f.read()\n\nfor line in sorted_raw.splitlines():\n csv_file.append(line.split('\\t'))\n csv_file_numbers.append(csv_file[-1][1][4:].split('.", "')[0])\n\nus_csv_file = []\nwith open('unsorted.csv', 'r') as f:\n csvreader = csv.reader(f)\n for line in csvreader:\n us_csv_file.append(line)\nus_csv_file.sort(key=lambda x: csv_file_numbers.index(x[1][1:]))\n\nplt.plot([int(item[1]) for item in us_csv_file], 'o-')\nplt.xticks(np.arange(len(csvfile)), [item[0] for item in csvfile])\n\nplt.show()\n\nThis one worked on my computer:\nfrom matplotlib import pyplot as plt\nimport numpy as np\nimport csv\n\ncsv_file = []\ncsv_file_dict = {}\n\n##with open('hostnum.csv', 'r') as f:\n## csvreader = csv.reader(f, dialect=\"excel-tab\")\n## for line in csvreader:\n## csv_file.append(line)\n## csv_file_numbers.append(line[-1][4:].split('.", "')[0])\n\nwith open('hostnum.csv', 'r') as f:\n sorted_raw = f.read()\n\nfor line in sorted_raw.splitlines():\n csv_file.append(line.split('\\t'))\n csv_file_dict[csv_file[-1][-1][:-1]] = int(csv_file[-1][0][1:])\n\nus_csv_file = []\nwith open('unsorted.csv', 'r') as f:\n csvreader = csv.reader(f)\n for line in csvreader:\n us_csv_file.append(line)\nus_csv_file.sort(key=lambda x: csv_file_dict[x[0]])\n\nplt.plot([int(item[1]) for item in us_csv_file], 'o-')\nplt.xticks(np.arange(len(csv_file)), [item[0] for item in csv_file])\n\nplt.show()\n\nSo now I created a dict which stores the index values as values and the names of each cell that is found in both files as keys. ", "I also removed the quotations manually, as for some reason, csv.reader didn't seem to do it correctly, at least it didn't handle the tabs in the desired way. ", "As I wrote in one of my comments, I don't know why for sure, I'd guess it's because the quotations are not closed within the cells in the file. ", "Anyway, I decided to split each line manually with string.split('\\t').", "\nAlso, you had missed the underscore in the variable name csv_file from a couple of places at the end, so I added them.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007480094209313393, 0.0005875205970369279, 0.0006167952087707818, 0.0005806955159641802, 0.0006338692619465292, 0.0005993196391500533, 0.0006192650180310011, 0.0006465953774750233, 0.0006107419030740857, 0.000896196928806603, 0.0005907923332415521, 0.002754828194156289, 0.0006138950702734292, 0.0008271055412478745, 0.0009955699788406491, 0.0007545386324636638, 0.0008276416920125484, 0.0010444894433021545, 0.001048052916303277, 0.0008202075259760022, 0.000875180761795491, 0.0007648205501027405, 0.0005804282845929265, 0.0005624356563203037, 0.0009452024823985994, 0.0005647869547829032, 0.0019954426679760218 ]
0.000856
27
[ "Q:\n\nc# running application icon duplicates on taskbar instead of highlight shortcut\n\nI've a .NET 4.0 C# WinForm application and the related shortcut placed on taskbar. ", "In Windows 7, after application starts, the icon of the shortcut in taskbar is \"highlighted\" as i expect. ", "Differently, in Windows 10, after program starts, a second app icon appears on the taskbar as the rightmost one, and the shortcut icon remains without \"highlight\".", "\nSomeone may help me?", "\n\nA:\n\nI've solved this issue re-creating and re-pinning to the Win10 taskbar the shortcut (.lnk) to the application.", "\nAs Hans Passant (thanks Hans) pointed out in comments to the question, this may be a behaviour related to the system-assigned AppUserModelIDs. ", "Read https://docs.microsoft.com/en-us/windows/desktop/shell/appids for complete infos.", "\nMaybe you need to re-create shortcut any time you modify and recompile your app.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007580037345178425, 0.0005968986079096794, 0.0006220585783012211, 0.0006789742619730532, 0.0006412690854631364, 0.0005779595230706036, 0.0005916291265748441, 0.0007412847480736673, 0.0019954426679760218 ]
0.0008
9
[ "Q:\n\nHow to place multiple objects using ARCore\n\nI want to make an ARCore app where you can select what you want to place. ", "Does anyone know how to do this\n\nA:\n\nIf you are using the default example, you can change the line:\npublic GameObject m_andyAndroidPrefab;\n\nto the line:\npublic List<GameObject> m_Prefabs;\n\nIn your Update() method, change the existing Instantiate invocation with this:\nvar object = Instantiate(m_Prefabs[m_currentObjectIndex], \n hit.", "Point, Quaternion.identity, anchor.transform);\n\nm_currentObjectIndex is an integer that holds the current index of the desired prefab to create. ", "You will need to update this field when the user selects an object in your menu, for example.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007028750842437148, 0.0009533587144687772, 0.0007353030377998948, 0.000590881856624037, 0.0019954426679760218 ]
0.000996
5
[ "Thus unfolded the 'Night of Terror' on Nov. 15, 1917, when the warden at the Occoquan Workhouse in Virginia ordered his guards to teach a lesson to the suffragists imprisoned there because they dared to picket Woodrow Wilson's White House for the right to vote.", "\n\nFor weeks, the women's only water came from an open pail. ", "Their food--all of it colorless slop--was infested with worms.", "\n\n(Alice Paul)\n\nWhen one of the leaders, Alice Paul, embarked on a hunger strike, they tied her to a chair, forced a tube down her throat and poured liquid into her until she vomited. ", "She was tortured like this for weeks until word was smuggled out to the press.", "\n\nWe have carpool duties? ", "We have to get to work? ", "Our vote doesn't matter? ", "It's raining?", "\n\nLast week, I went to a sparsely attended screening of HBO's new movie 'Iron Jawed Angels.' ", "It is a graphic depiction of the battle these women waged so that I could pull the curtain at the polling booth and have my say. ", "I am ashamed to say I needed the reminder.", "\n\nAll these years later, voter registration is still my passion. ", "But the actual act of voting had become less personal for me, more rote. ", "Frankly, voting often felt more like an obligation than a privilege. ", "Sometimes it was inconvenient.", "\n\nMy friend Wendy, who is my age and studied women's history, saw the HBO movie, too. ", "When she stopped by my desk to talk about it, she looked angry. ", "She was--with herself. '", "One thought kept coming back to me as I watched that movie,' she said. '", "What would those women think of the way I use, or don't use,my right to vote? ", "All of us take it for granted now, not just younger women, but those of us who did seek to learn.' ", "The right to vote, she said, had become valuable to her 'all over again.'", "\n\nHBO released the movie on video and DVD . ", "I wish all history, social studies and government teachers would include the movie in their curriculum I want it shown on Bunco night, too, and anywhere else women gather. ", "I realize this isn't our usual idea of socializing, but we are not voting in the numbers that we should be, and I think a little shock therapy is in order.", "\n\nIt is jarring to watch Woodrow Wilson and his cronies try to persuade a psychiatrist to declare Alice Paul insane so that she could be permanently institutionalized. ", "And it is inspiring to watch the doctor refuse. ", "Alice Paul was strong, he said, and brave. ", "That didn't make her crazy.", "\n\nThe doctor admonished the men: 'Courage in women is often mistaken for insanity.", "'Please, if you are so inclined, pass this on to all the women you know.", "\n\nWe need to get out and vote and use this right that was fought so hard for by these very courageous women. ", "Whether you vote democratic, republican or independent party - remember to vote.", "\n\nWednesday, September 24, 2008\n\nOf all the stupid injuries I've had in my life time, last night's might be the stupidest of all. (", "Is stupidest a word?)", "\n\nIn 9th grade, I was playing tag football in P.E. and some BIG girl took it upon herself to tackle me and break my thumb. ", "That same year, I split open my knee jumping hurdles. ", "I guess that's not so stupid, but still. ", "As an adult, I broke my ankle at my old job. ", "That is not funny, but the way I did it was. ", "I was standing on a table trying to hang all the legal crap posters in the office. ", "More specifically, I was hanging a workman's comp poster while standing on a table. ", "So as I was coming off of the table, my ankle just decided it wanted to play a trick on me, I fell and it broke. ", "Pretty funny, right? ", "Well two surgeries (one experimental) and 5 million hours of physical therapy later, I'm walking and all is good. ", "For the most part. ", "People laugh to this day when I they see the scars and ask about them.", "\n\nUp until last night, that was my dumbest injury.", "\n\nI am not a domestic goddess. ", "I do the best that I can with my abilities, however, I'm no Martha Stewart or Betty Crocker and certainly no Rachel Ray. ", "I decided I was going to make taco salad for dinner. ", "Everything was going well. ", "I didn't burn anything or anyone.", "\n\nBut I cut myself. ", "How, do you ask? ", "Was I chopping lettuce? ", "No. ", "Was I chopping tomatoes? ", "No. ", "There was no knife involved. ", "A container of Daisy Sour Cream was the culprit. ", "I attempted to take the plastic lid off and then remove the foil lining. ", "As I was lifting the plastic lid, I felt a slice right into my stupid finger. ", "And there was blood. ", "Enough to bleed through a band aid. ", "What the hell? ", "Never in my life have I heard of anyone cutting their finger on a plastic container. ", "Leave it up to me to be the first.", "\n\n/frɛnd/ Pronunciation Key - Show Spelled Pronunciation[frend] Pronunciation Key - Show IPA Pronunciation–noun1.a person attached to another by feelings of affection or personal regard.2.a person who gives assistance; patron; supporter: friends of the Boston Symphony.3.a person who is on good terms with another; a person who is not hostile: Who goes there? ", "Friend or foe?4.a member of the same nation, party, etc.5.(initial capital letter) a member of the Religious Society of Friends; a Quaker. –", "verb (used with object)6.Rare. ", "to befriend. —", "Idiom7.make friends with, to enter into friendly relations with; become a friend to.[Origin: bef. ", "900; ME friend, frend, OE fréond friend, lover, relative (c. OS friund, OHG friunt (G Freund), Goth frijōnds), orig. ", "prp. ", "of fréogan, c. Goth frijōn to love]\n\nMonday, September 22, 2008\n\nWord of advice for anyone looking for an apartment in Fremont, California; DO NOT MOVE HERE.", "\n\nI am so pissed. ", "Last week we got a notice posted on both doors at the front of our building saying that they would be repaving the drive way on September 22nd. ", "Actually, more specifically, it reads as follows:\n\nMONDAY SEPTEMBER 22, 2008 BETWEEN THE HOURS OF 8:00 - 6:00 PM\n\nTHE ASPHALT WILL BE REPAIRED AND REPLACED. ", "RESIDENTS ARE REQUIRED TO MOVE THEIR CARS FROM ANY HIGHLIGHTED AREA BEFORE THIS TIME. ", "ANY CARS STILL PLACED IN ANY UNCOVERED SPOT WILL BE TOWED AT THE OWNER OF THE VEHICLE'S EXPENSE.", "\n\nGuess what happened!? ", "They towed the Trans Am. ", "I went to the office and saw a stack of Mapquested directions to the tow yard. ", "I spoke with the manager and she said that everyone was notified of the parking situation. ", "Then she pulls out another notice that was posted after the first one. ", "Two days later to be precise.", "\n\nNO PARKING!!!", "\n\nWe would like to first apologize for any inconvenience that this may cause you. ", "On Monday, September 22, 2008 from 7:30 AM to 6:00 PM you will not be able to park your vehicle if you park in spot numbers 1 to 98, 1D to 26D, 538 to 551, 414 to 431, 55C to 68C, 273 to 373, and 1B to 40B. We will be repairing the asphalt on the community and we will be sealing and stripping on September 29th and 30th and October 2nd and 3rd. ", "A second notice will follow for the dates and parking numbers that will be included in the 4 day seal and stripe.", "If you do not move your car by 7:30 AM you will be towed at your own expense. ", "If you fail to remove your car you may call AA Wheat Tow at 510-972-1900 to make arrangements to pick up your vehicle. ", "Please keep in mind that it will be a minimum charge of $295.00 that you will have to pay in-order to have your vehicle released.", "We cannot stress the importance of this to you and we will not reimburse anyone for not removing their vehicle. ", "You may park on the street until the work is complete. ", "We do not have any other parking area in which you may move your vehicle on the property.", "If you have any questions please feel free to call the office at 510-656-7552.Thank you in advance for your cooperation and understanding.", "\n\nI did in fact get this notice. ", "But to be completely honest, I didn't even realize it until after I talked to the manager. ", "Why would a property management company take the time to go around the complex and post information, to only give new information 2 days later? ", "As you can see, the second notice is quite different from the first notice. ", "For the record, the Tans Am was park in a COVERED UN-HIGHLIGHTED SPACE. ", "I feel they should have made more of an attempt to let residents know. ", "As a result, we have to pay $380 to get the car out of the tow yard. ", "And I'm sure that fee will continue to increase if we don't get it out tomorrow.", "\n\nMoral of the story, this apartment complex BLOWS and I can't wait to get the f**k out of here. ", "I wish we could do it right now.", "\n\nIn the beginning of my time, there was no internet. ", "Hell, I don't even think there were home computers. ", "But I remember being fascinated with computers come 2nd or 3rd grade and playing Oregon Trail on a black screen with everything in green on a floppy disc that was bigger than my hands. ", "Now I simply cannot function without a computer. ", "I am a MySpace addict. ", "I need to check my email excessively, I'm working on my AA online, all my music is online, I need a computer to do my job...the list goes on and on. ", "So this morning, my best friend informs me, and the rest of MySpace that she created a blog here and kinda sorta made me do it too. ", "She didn't threaten my life or anything, but I always have to do what she does. ", "So fine. ", "Here's my blog Danielle. ", "As for the rest of you who don't know me, let me give you some background. ", "The first being (and probably most important in the blogosphere) is that I'm a good writer in the sense that I use proper grammar and punctuation. ", "I don't however do well with paragraphs or any other type of formatting one might expect. ", "So if you can get past that, we're all good. ", "Back to me. ", "I'm 30 friggin' years old. ", "I'm still learning to deal with it as it's all new to me. ", "About 23 days new to me to be exact. ", "I have an 11 year old son. ", "Still getting used to that too. ", "Who tells kids to grow up so fast? ", "I have a boyfriend James who I've been with for about 4 1/2 years, give or take a few months. ", "We live in the SF Bay Area. ", "I have lived what seems to be just about half of everywhere in the United States. ", "Born in Portland, OR. ", "Raised mostly in the Bay, although I've lived in Utah, Minnesota, Texas, Florida, Oregon...and I really feel like I'm missing something in between. ", "I went to more schools than I can remember. ", "My parents were kinda sorta hippy gypsy type people with some illegal activities involved. ", "So yeah...definitely hippy gypsies. ", "I lived with various family members growing up as a result of my parents lack of respect for responsibility. ", "All of these things have made me into the person I am today. ", "Not many people grew up the way I did and I honest to God don't think I'd change it if I could. ", "I've learned what people are all about and how stuff works. ", "I often find myself rambling in my mind and just thinking about one thing that leads me to the next and the next. ", "Last week, I was out back of the warehouse where I work and saw a crane standing in the water/sewer run off that I hope doesn't lead into the Bay although I'm pretty sure it does. ", "Anyway, this stork was just standing there in the water looking down. ", "I'm guessing he was fishing. ", "So there I was, on my cell phone talking about nothing in particular and wondering if this crane was fishing. ", "Or maybe he was cooling off. ", "Or playing. ", "Who knows.", "But this got me to thinking. ", "Do animals, fish, reptiles, blah blah blah do everything with a purpose? ", "Think about it this way. ", "We buy HD TVs, video game consoles, expensive computers, alcohol, cigarettes, hookahs, drugs, books...anything that is someone's vice. ", "And aside from the entertainment factor, what is the point? ", "That crane has it easy. ", "All he does is look for food to eat, find a mate to reproduce, and sleep. ", "He doesn't worry about getting the latest iPhone, the latest UFC pay per view, or car insurance. ", "Life in it's simplest form. ", "So that got me to thinking. ", "Do you think that all animals are homeless? ", "Or do they have a dedicated spot in the bush that is theirs and theirs alone. ", "Do you think the crane (let's name him Joe) gets pissed if Sally Squirrel's kid, Albert* goes into Joe's little spot in the bush looking for food? ", "Do you think Joe and Sally Squirrel worry about where their next meals are coming from? ", "Or do you suppose that they are so confident in their survival skills that they don't even worry about that? ", "And if Joe really was fishing in that run off...what about the fish? ", "Do you think that the fish he could have caught has family like Finding Nemo? ", "I wonder if it's like a horrible thing to happen to a fish family. ", "Can you imagine your sister just being picked up and eaten right in front of you? ", "Do you think that fish swim around the lakes, rivers, and oceans with or without a purpose? ", "I think about shit like that. ", "Do fish only stay in one part of the river because that's where their home is? ", "Or do they just swim endlessly in search of food? ", "And is it true that fish never sleep? ", "If so, what a horrible existence. ", "But if they do sleep, I'm pretty sure they don't lay down. ", "Until next time....Oh, and * refers to Albert. ", "The true story of a snotty nosed kid in Ohio. ", "Read about him and Cliff here." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0017414370086044073, 0.022466696798801422, 0.2682052254676819, 0.04093955084681511, 0.018646840006113052, 0.00195848336443305, 0.001253823284059763, 0.0009679428185336292, 0.0008891255711205304, 0.0006062790635041893, 0.0010413442505523562, 0.003028671257197857, 0.0006756963557563722, 0.012207454070448875, 0.0007233851938508451, 0.00088993035024032, 0.0006754426867701113, 0.006285075563937426, 0.0015493318205699325, 0.0006150400149635971, 0.03630615398287773, 0.0005764298839494586, 0.0007874718867242336, 0.0006105247884988785, 0.002081820275634527, 0.000735641922801733, 0.004280630499124527, 0.0008181386510841548, 0.0006458227871917188, 0.006560064852237701, 0.003432979341596365, 0.0027912731748074293, 0.000993566820397973, 0.0008700104081071913, 0.7431107759475708, 0.6906778216362, 0.012784704566001892, 0.0011004128027707338, 0.13888919353485107, 0.013046098873019218, 0.0008502864511683583, 0.7326151728630066, 0.0016574140172451735, 0.028144709765911102, 0.0006448221392929554, 0.0007748931529931724, 0.0006604065420106053, 0.0006021354347467422, 0.6769421100616455, 0.010409926064312458, 0.0009850829374045134, 0.0009001923608593643, 0.0005820492515340447, 0.015944136306643486, 0.07579614222049713, 0.0008982050349004567, 0.06644593179225922, 0.0013785824412479997, 0.01803065463900566, 0.0013785824412479997, 0.0015174573054537177, 0.00452776113525033, 0.0012568915262818336, 0.8403611183166504, 0.30450439453125, 0.06962123513221741, 0.8640711903572083, 0.012994288466870785, 0.0014600041322410107, 0.0006773952627554536, 0.0006523513002321124, 0.000636054202914238, 0.0011147663462907076, 0.0007617390365339816, 0.007217621896415949, 0.0011004065163433552, 0.0008342468063347042, 0.6614808440208435, 0.0006651575677096844, 0.0005556943942792714, 0.0009162765927612782, 0.0007685993914492428, 0.0008486526785418391, 0.0011186351766809821, 0.0008074417128227651, 0.0006119891768321395, 0.0007278353441506624, 0.0005939416587352753, 0.015982292592525482, 0.0009250948787666857, 0.0006849036435596645, 0.0005184435285627842, 0.07390681654214859, 0.0010499026393517852, 0.0008503917488269508, 0.0005937882233411074, 0.0026928202714771032, 0.0012273764004930854, 0.0005023932899348438, 0.0007322158198803663, 0.0005578221171163023, 0.0006448181229643524, 0.0005915781366638839, 0.0005988762713968754, 0.0005875640199519694, 0.008725271560251713, 0.0008355057216249406, 0.9820353984832764, 0.0005756650352850556, 0.0007254272932186723, 0.09108131378889084, 0.0012265759287402034, 0.001239326549693942, 0.018026163801550865, 0.0010294443927705288, 0.0006204009987413883, 0.0019901671912521124, 0.0012783799320459366, 0.0006372237112373114, 0.0009627742692828178, 0.000584192865062505, 0.0006722935941070318, 0.0005918860551901162, 0.0019640650134533644, 0.7703704237937927, 0.0007008861284703016, 0.0006367370951920748, 0.004116582218557596, 0.0006792516214773059, 0.06308796256780624, 0.0009259982616640627, 0.0007522115483880043, 0.0006897663115523756, 0.0007303954334929585, 0.0006114673451520503, 0.0006893867976032197, 0.003215736709535122, 0.4892354905605316, 0.0008159784483723342, 0.0006756509537808597, 0.0009581982740201056, 0.0005959569243714213, 0.0006793095380999148, 0.0006708205910399556, 0.02473336085677147, 0.0007351404638029635, 0.0006754873902536929, 0.0012525951024144888, 0.001110085635446012, 0.0010837214067578316, 0.000615100609138608, 0.0036937689874321222, 0.0008504878496751189, 0.008720459416508675, 0.0006076924037188292, 0.000681229867041111, 0.015687795355916023, 0.0007777338614687324, 0.0007302298326976597, 0.0006217571790330112, 0.01569942757487297, 0.0010471990099176764, 0.01873565837740898, 0.0010937085608020425, 0.0006953722331672907, 0.0011704637436196208, 0.0014315173029899597, 0.006280088797211647, 0.2231525480747223, 0.000824196555186063, 0.9494767189025879, 0.0013472357532009482, 0.000961630663368851, 0.0036927673500031233, 0.1841305047273636, 0.0017685976345092058, 0.0007999021327123046, 0.06706525385379791, 0.0006474612164311111 ]
0.059025
179
[ "Christmas seems to be trying so hard for me to like it that I can’t help but hate it, as though it were an ad campaign that was constantly in your face. ", "I wish for a time machine that could take me to my in-laws’ house on Christmas Eve, where family, good cheer, and good food really are the most important things. ", "Because then the Christmas carols on the stereo there wouldn’t make me want to put on headphones and listen to my iPod, and I wouldn’t have to force myself to smile every time someone says “Merry Christmas.” ", "I love watching my kids enjoy Christmas, and I don’t want to hate it. ", "But I do.", "\n\nI think we can all, even the most ardent lovers of Christmas, relate to that. ", "The Walgreen’s near my house had Christmas displays out the day after Halloween this year. ", "Sh*t has gotten out of control.", "\n\nJoin The Discussion\n\nI remember as a kid in the eighties hearing people bitch about how early the holiday decorations came out. ", "I have a sneaking suspicion that all of the pining for the old days of Christmas is complete utter revisionist bullshit and is the holiday equivalent of republicans who imagine an America in the 50s that didn’t actually exist." ]
{ "pile_set_name": "Pile-CC" }
[ 0.15501227974891663, 0.0006299600354395807, 0.0017971718916669488, 0.005686033517122269, 0.0010789894731715322, 0.0005700556794181466, 0.0014347851974889636, 0.6222555041313171, 0.5044701099395752, 0.6863213777542114 ]
0.197926
10
[ "Changing your major?", "\n\nThe Department of Kinesiology and Health Sciences requires all prospective HPEX students to attend a change of major workshop prior to declaring the major. ", "We cover potential career/professional options, the HPEX curriculum (including both concentrations), and help students determine which classes to consider for next semester.", "\n\nTo view upcoming workshop dates or register for an upcoming workshop click this link: http://bit.ly/HPEXworkshop. ", "Please contact us if you have any questions.", "\n\nThe workshop will be held in the 500 AC building, which is located at 1020 West Grace Street (the same block as the Village Cafe, but opposite side of the street).", "\n\nPlease bring all questions to the workshop as we will have an Q and A segment at the end where we will discuss course registration for upcoming semesters and our override policy for HPEX courses. ", "Visit our website for additional information in the meantime (khs.vcu.edu), or find us on Facebook (VCU Kinesiology and Health Sciences Department).", "\n\nThank you for showing interest in the HPEX major. ", "We look forward to meeting you soon!" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0036955643445253372, 0.0005537727265618742, 0.0005238887970335782, 0.00057494972134009, 0.0006193030858412385, 0.0006449392531067133, 0.0005146712646819651, 0.0005647551734000444, 0.0005160875152796507, 0.0008265686919912696 ]
0.000903
10
[ "// license:BSD-3-Clause\n// copyright-holders:Raphael Nabet\n/****************************************************************************\n\n fat.cpp\n\n PC FAT disk images\n\n*****************************************************************************\n\n Master boot record format:\n\n Offset Length Description\n ------ ------ -----------\n 0 446 Boot machine code\n 446 16 Partion #1 info\n 462 16 Partion #2 info\n 478 16 Partion #3 info\n 494 16 Partion #4 info\n 510 2 Magic bytes (0x55 0xAA)\n\n\n Partition info format:\n\n Offset Length Description\n ------ ------ -----------\n 0 1 Active byte (0x80=active 0x00=inactive)\n 1 1 Starting head\n 2 1 Starting sector (bits 5-0) and high bits of starting track (bits 6-5)\n 3 1 Low bits of starting track\n 4 1 Partition type:\n 0x00 Unused\n 0x?1 FAT12 (0-15 MB)\n 0x?2 XENIX\n 0x?4 FAT16 (16-32 MB)\n 0x?6 FAT16` (32 MB-2 GB)\n 0x?7 HPFS or NTFS\n 0x?A Boot Manager\n 0x?B FAT32 (512 MB-2 TB)\n 0x?C FAT32 (512 MB-2 TB LBA)\n 0x1? ", " OS/2 Boot manager/Win95 hidden\n 0xC? ", " DR-DOS secured partition\n 0xD? ", " Multiuser DOS secured partition\n 0xE? ", " SpeedStor extended partition\n 5 1 Ending head\n 6 1 Ending sector (bits 5-0) and high bits of ending track (bits 6-5)\n 7 1 Low bits of ending track\n 8 4 Sector index of beginning of partition\n 12 4 Total sectors in partition\n\n\n Boot sector format:\n\n Offset Length Description\n ------ ------ -----------\n 0 3 Jump instruction (to skip over header on boot)\n 3 8 OEM Name\n 11 2 Bytes per sector\n 13 1 Sectors per cluster\n 14 2 Reserved sector count (including boot sector)\n 16 1 Number of FATs (file allocation tables)\n 17 2 Number of root directory entries\n 19 2 Total sectors (bits 0-15)\n 21 1 Media descriptor\n 22 2 Sectors per FAT\n 24 2 Sectors per track\n 26 2 Number of heads\n 28 4 Hidden sectors\n 32 4 Total sectors (bits 16-47)\n 36 1 Physical drive number\n 37 1 Current head\n 38 1 Signature\n 39 4 ID\n 43 11 Volume Label\n 54 8 FAT file system type\n 62 448 Boot machine code\n 510 2 Magic bytes (0x55 0xAA)\n\n For more information:\n http://support.microsoft.com/kb/q140418/\n\n\n Directory Entry Format:\n\n Offset Length Description\n ------ ------ -----------\n 0 8 DOS File Name (padded with spaces)\n 8 3 DOS File Extension (padded with spaces)\n 11 1 File Attributes\n 12 2 Unknown\n 14 4 Time of Creation\n 18 2 Last Access Time\n 20 2 EA-Index (OS/2 stuff)\n 22 4 Last Modified Time\n 26 2 First Cluster\n 28 4 File Size\n\n\n Dates and times are stored in separate words; when together, the time is\n first and the date is second.", "\n\n Time:\n bits 15-11 Hour\n bits 10- 5 Minute\n bits 4- 0 Second / 2\n\n Date:\n bits 15- 9 Year - 1980\n bits 8- 5 Month\n bits 4- 0 Day\n\n LFN Entry Format:\n\n Offset Length Description\n ------ ------ -----------\n 0 1 Sequence Number (bit 6 is set on highest sequence)\n 1 10 Name characters (five UTF-16LE chars)\n 11 1 Attributes (always 0x0F)\n 12 1 Reserved (always 0x00)\n 13 1 Checksum of short filename entry\n 14 12 Name characters (six UTF-16LE chars)\n 26 2 Entry Cluster (always 0x00)\n 28 4 Name characters (two UTF-16LE chars)\n\n Valid characters in DOS file names:\n - Upper case letters A-Z\n - Numbers 0-9\n - Space (though there is no way to identify a trailing space)\n - ! # ", "$ % & ( ) - @ ^ _ ` { } ~\n - Characters 128-255 (though the code page is indeterminate)\n\n For more information:\n http://en.wikipedia.org/wiki/File_Allocation_Table\n\n****************************************************************************/\n\n#include <ctime>\n#include <cctype>\n#include \"imgtool.h\"\n#include \"formats/imageutl.h\"\n#include \"unicode.h\"\n#include \"fat.h\"\n\n#define FAT_DIRENT_SIZE 32\n#define FAT_SECLEN 512\n\n#define LOG(x)\n\nstruct fat_partition_info\n{\n\tuint32_t fat_bits;\n\tuint32_t sectors_per_cluster;\n\tuint32_t cluster_size;\n\tuint32_t reserved_sectors;\n\tuint32_t fat_count;\n\tuint32_t root_entries;\n\tuint32_t sectors_per_fat;\n\tuint64_t total_sectors;\n\tuint32_t total_clusters;\n};\n\nstruct fat_file\n{\n\tunsigned int root : 1;\n\tunsigned int directory : 1;\n\tunsigned int eof : 1;\n\tuint32_t index;\n\tuint32_t filesize;\n\tuint32_t first_cluster;\n\tuint32_t parent_first_cluster;\n\tuint32_t cluster;\n\tuint32_t cluster_index;\n\tuint32_t dirent_sector_index;\n\tuint32_t dirent_sector_offset;\n};\n\nstruct fat_dirent\n{\n\tchar long_filename[512];\n\tchar short_filename[13];\n\tunsigned int directory : 1;\n\tunsigned int eof : 1;\n\tuint32_t filesize;\n\tuint32_t first_cluster;\n\tuint32_t dirent_sector_index;\n\tuint32_t dirent_sector_offset;\n\timgtool::datetime creation_time;\n\timgtool::datetime lastmodified_time;\n};\n\nstruct fat_freeentry_info\n{\n\tuint32_t required_size;\n\tuint32_t candidate_position;\n\tuint32_t position;\n};\n\nstruct fat_mediatype\n{\n\tuint8_t media_descriptor;\n\tuint8_t heads;\n\tuint8_t tracks;\n\tuint8_t sectors;\n};\n\nenum creation_policy_t\n{\n\tCREATE_NONE,\n\tCREATE_FILE,\n\tCREATE_DIR\n};\n\n\n\nstatic const fat_mediatype known_media[] =\n{\n\t{ 0xF0, 2, 80, 36 },\n\t{ 0xF0, 2, 80, 18 },\n\t{ 0xF9, 2, 80, 9 },\n\t{ 0xF9, 2, 80, 15 },\n\t{ 0xFD, 2, 40, 9 },\n\t{ 0xFF, 2, 40, 8 },\n\t{ 0xFC, 1, 40, 9 },\n\t{ 0xFE, 1, 40, 8 },\n\t{ 0xF8, 0, 0, 0 }\n};\n\n/* boot sector code taken from FreeDOS */\nstatic const uint8_t boot_sector_code[] =\n{\n\t0xfa, 0xfc, 0x31, 0xc0, 0x8e, 0xd8, 0xbd, 0x00, 0x7c, 0xb8, 0xe0, 0x1f,\n\t0x8e, 0xc0, 0x89, 0xee, 0x89, 0xef, 0xb9, 0x00, 0x01, 0xf3, 0xa5, 0xea,\n\t0x5e, 0x7c, 0xe0, 0x1f, 0x00, 0x00, 0x60, 0x00, 0x8e, 0xd8, 0x8e, 0xd0,\n\t0x8d, 0x66, 0xa0, 0xfb, 0x80, 0x7e, 0x24, 0xff, 0x75, 0x03, 0x88, 0x56,\n\t0x24, 0xc7, 0x46, 0xc0, 0x10, 0x00, 0xc7, 0x46, 0xc2, 0x01, 0x00, 0x8b,\n\t0x76, 0x1c, 0x8b, 0x7e, 0x1e, 0x03, 0x76, 0x0e, 0x83, 0xd7, 0x00, 0x89,\n\t0x76, 0xd2, 0x89, 0x7e, 0xd4, 0x8a, 0x46, 0x10, 0x98, 0xf7, 0x66, 0x16,\n\t0x01, 0xc6, 0x11, 0xd7, 0x89, 0x76, 0xd6, 0x89, 0x7e, 0xd8, 0x8b, 0x5e,\n\t0x0b, 0xb1, 0x05, 0xd3, 0xeb, 0x8b, 0x46, 0x11, 0x31, 0xd2, 0xf7, 0xf3,\n\t0x89, 0x46, 0xd0, 0x01, 0xc6, 0x83, 0xd7, 0x00, 0x89, 0x76, 0xda, 0x89,\n\t0x7e, 0xdc, 0x8b, 0x46, 0xd6, 0x8b, 0x56, 0xd8, 0x8b, 0x7e, 0xd0, 0xc4,\n\t0x5e, 0x5a, 0xe8, 0xac, 0x00, 0xc4, 0x7e, 0x5a, 0xb9, 0x0b, 0x00, 0xbe,\n\t0xf1, 0x7d, 0x57, 0xf3, 0xa6, 0x5f, 0x26, 0x8b, 0x45, 0x1a, 0x74, 0x0b,\n\t0x83, 0xc7, 0x20, 0x26, 0x80, 0x3d, 0x00, 0x75, 0xe7, 0x72, 0x68, 0x50,\n\t0xc4, 0x5e, 0x5a, 0x8b, 0x7e, 0x16, 0x8b, 0x46, 0xd2, 0x8b, 0x56, 0xd4,\n\t0xe8, 0x7e, 0x00, 0x58, 0x1e, 0x07, 0x8e, 0x5e, 0x5c, 0xbf, 0x00, 0x20,\n\t0xab, 0x89, 0xc6, 0x01, 0xf6, 0x01, 0xc6, 0xd1, 0xee, 0xad, 0x73, 0x04,\n\t0xb1, 0x04, 0xd3, 0xe8, 0x80, 0xe4, 0x0f, 0x3d, 0xf8, 0x0f, 0x72, 0xe8,\n\t0x31, 0xc0, 0xab, 0x0e, 0x1f, 0xc4, 0x5e, 0x5a, 0xbe, 0x00, 0x20, 0xad,\n\t0x09, 0xc0, 0x75, 0x05, 0x88, 0xd3, 0xff, 0x6e, 0x5a, 0x48, 0x48, 0x8b,\n\t0x7e, 0x0d, 0x81, 0xe7, 0xff, 0x00, 0xf7, 0xe7, 0x03, 0x46, 0xda, 0x13,\n\t0x56, 0xdc, 0xe8, 0x34, 0x00, 0xeb, 0xe0, 0x5e, 0xac, 0x56, 0xb4, 0x0e,\n\t0xcd, 0x10, 0x3c, 0x2e, 0x75, 0xf5, 0xc3, 0xe8, 0xf1, 0xff, 0x45, 0x72,\n\t0x72, 0x6f, 0x72, 0x21, 0x20, 0x48, 0x69, 0x74, 0x20, 0x61, 0x20, 0x6b,\n\t0x65, 0x79, 0x20, 0x74, 0x6f, 0x20, 0x72, 0x65, 0x62, 0x6f, 0x6f, 0x74,\n\t0x2e, 0x30, 0xe4, 0xcd, 0x13, 0xcd, 0x16, 0xcd, 0x19, 0x56, 0x89, 0x46,\n\t0xc8, 0x89, 0x56, 0xca, 0x8c, 0x46, 0xc6, 0x89, 0x5e, 0xc4, 0xe8, 0xbe,\n\t0xff, 0x2e, 0xb4, 0x41, 0xbb, 0xaa, 0x55, 0x8a, 0x56, 0x24, 0x84, 0xd2,\n\t0x74, 0x19, 0xcd, 0x13, 0x72, 0x15, 0xd1, 0xe9, 0x81, 0xdb, 0x54, 0xaa,\n\t0x75, 0x0d, 0x8d, 0x76, 0xc0, 0x89, 0x5e, 0xcc, 0x89, 0x5e, 0xce, 0xb4,\n\t0x42, 0xeb, 0x26, 0x8b, 0x4e, 0xc8, 0x8b, 0x56, 0xca, 0x8a, 0x46, 0x18,\n\t0xf6, 0x66, 0x1a, 0x91, 0xf7, 0xf1, 0x92, 0xf6, 0x76, 0x18, 0x89, 0xd1,\n\t0x88, 0xc6, 0x86, 0xe9, 0xd0, 0xc9, 0xd0, 0xc9, 0x08, 0xe1, 0x41, 0xc4,\n\t0x5e, 0xc4, 0xb8, 0x01, 0x02, 0x8a, 0x56, 0x24, 0xcd, 0x13, 0x0f, 0x82,\n\t0x75, 0xff, 0x8b, 0x46, 0x0b, 0xf6, 0x76, 0xc0, 0x01, 0x46, 0xc6, 0x83,\n\t0x46, 0xc8, 0x01, 0x83, 0x56, 0xca, 0x00, 0x4f, 0x75, 0x98, 0x8e, 0x46,\n\t0xc6, 0x5e, 0xc3, 0x4d, 0x45, 0x54, 0x41, 0x4b, 0x45, 0x52, 0x4e, 0x53,\n\t0x59, 0x53, 0x00, 0x00, 0x55, 0xaa\n};\n\nstatic const char fat8_string[8] = { 'F', 'A', 'T', ' ', ' ', ' ', ' ', ' ' };\nstatic const char fat12_string[8] = { 'F', 'A', 'T', '1', '2', ' ', ' ', ' ' };\nstatic const char fat16_string[8] = { 'F', 'A', 'T', '1', '6', ' ', ' ', ' ' };\nstatic const char fat32_string[8] = { 'F', 'A', 'T', '3', '2', ' ', ' ', ' ' };\n\n\n\nstatic fat_partition_info *fat_get_partition_info(imgtool::partition &partition)\n{\n\treturn (fat_partition_info *)partition.extra_bytes();\n}\n\n\n\nstatic imgtoolerr_t fat_read_sector(imgtool::partition &partition, uint32_t sector_index,\n\tint offset, void *buffer, size_t buffer_len)\n{\n\t//const fat_partition_info *disk_info;\n\timgtoolerr_t err;\n\tuint8_t data[FAT_SECLEN];\n\tuint32_t block_size;\n\tsize_t len;\n\n\t//disk_info = fat_get_partition_info(partition);\n\n\t/* sanity check */\n\terr = partition.get_block_size(block_size);\n\tif (err)\n\t\treturn err;\n\tassert(block_size == sizeof(data));\n\n\twhile(buffer_len > 0)\n\t{\n\t\terr = partition.read_block(sector_index++, data);\n\t\tif (err)\n\t\t\treturn err;\n\n\t\tlen = std::min(buffer_len, sizeof(data) - offset);\n\t\tmemcpy(buffer, data + offset, len);\n\n\t\tbuffer = ((uint8_t *) buffer) + len;\n\t\tbuffer_len -= len;\n\t\toffset = 0;\n\t}\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_write_sector(imgtool::partition &partition, uint32_t sector_index,\n\tint offset, const void *buffer, size_t buffer_len)\n{\n\t//const fat_partition_info *disk_info;\n\timgtoolerr_t err;\n\tuint8_t data[FAT_SECLEN];\n\tconst void *write_data;\n\tuint32_t block_size;\n\tsize_t len;\n\n\t//disk_info = fat_get_partition_info(partition);\n\n\t/* sanity check */\n\terr = partition.get_block_size(block_size);\n\tif (err)\n\t\treturn err;\n\tassert(block_size == sizeof(data));\n\n\twhile(buffer_len > 0)\n\t{\n\t\tlen = std::min(buffer_len, sizeof(data) - offset);\n\n\t\tif ((offset !", "= 0) || (buffer_len < sizeof(data)))\n\t\t{\n\t\t\terr = partition.read_block(sector_index, data);\n\t\t\tif (err)\n\t\t\t\treturn err;\n\t\t\tmemcpy(data + offset, buffer, len);\n\t\t\twrite_data = data;\n\t\t}\n\t\telse\n\t\t{\n\t\t\twrite_data = buffer;\n\t\t}\n\n\t\terr = partition.write_block(sector_index++, write_data);\n\t\tif (err)\n\t\t\treturn err;\n\n\t\tbuffer = ((uint8_t *) buffer) + len;\n\t\tbuffer_len -= len;\n\t\toffset = 0;\n\t}\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n#ifdef UNUSED_FUNCTION\nstatic imgtoolerr_t fat_clear_sector(imgtool::partition &partition, uint32_t sector_index, uint8_t data)\n{\n\tchar buf[FAT_SECLEN];\n\tmemset(buf, data, sizeof(buf));\n\treturn fat_write_sector(partition, sector_index, 0, buf, sizeof(buf));\n}\n#endif\n\n\nstatic imgtoolerr_t fat_partition_open(imgtool::partition &partition, uint64_t first_block, uint64_t block_count)\n{\n\tuint8_t header[FAT_SECLEN];\n\timgtoolerr_t err;\n\tfat_partition_info *info;\n\tuint32_t fat_bits, total_sectors_l, total_sectors_h, sector_size;\n\tuint64_t available_sectors;\n\t//int has_extended_bios_param_block = true;\n\n\tinfo = fat_get_partition_info(partition);\n\n\t/* read the boot/root sector */\n\terr = fat_read_sector(partition, 0, 0, header, sizeof(header));\n\tif (err)\n\t\treturn err;\n\n\t/* magic bytes present? */", "\n\tif ((header[510] !", "= 0x55) || (header[511] !", "= 0xAA))\n\t\treturn IMGTOOLERR_CORRUPTIMAGE;\n\n\t/* determine which type of FAT is on this disk */\n\tif (!", "memcmp(&header[54], fat8_string, sizeof(fat8_string)))\n\t\tfat_bits = 8;\n\telse if (!", "memcmp(&header[54], fat12_string, sizeof(fat12_string)))\n\t\tfat_bits = 12;\n\telse if (!", "memcmp(&header[54], fat16_string, sizeof(fat16_string)))\n\t\tfat_bits = 16;\n\telse if (!", "memcmp(&header[54], fat32_string, sizeof(fat32_string)))\n\t\tfat_bits = 32;\n\telse\n\t{\n\t\tfat_bits = 8;\n\t\t//has_extended_bios_param_block = false;\n\t}\n\n\tinfo->fat_bits = fat_bits;\n\tsector_size = pick_integer_le(header, 11, 2);\n\tinfo->sectors_per_cluster = pick_integer_le(header, 13, 1);\n\tinfo->reserved_sectors = pick_integer_le(header, 14, 2);\n\tinfo->fat_count = pick_integer_le(header, 16, 1);\n\tinfo->root_entries = pick_integer_le(header, 17, 2);\n\ttotal_sectors_l = pick_integer_le(header, 19, 2);\n\tinfo->sectors_per_fat = pick_integer_le(header, 22, 2);\n\ttotal_sectors_h = pick_integer_le(header, 32, 4);\n\n\tif (info->sectors_per_cluster == 0)\n\t\treturn IMGTOOLERR_CORRUPTIMAGE;\n\n\tinfo->total_sectors = total_sectors_l + (((uint64_t) total_sectors_h) << 16);\n\tavailable_sectors = info->total_sectors - info->reserved_sectors\n\t\t- (info->sectors_per_fat * info->fat_count)\n\t\t- (info->root_entries * FAT_DIRENT_SIZE + FAT_SECLEN - 1) / FAT_SECLEN;\n\tinfo->total_clusters = (available_sectors + info->sectors_per_cluster - 1) / info->sectors_per_cluster;\n\tinfo->cluster_size = FAT_SECLEN * info->sectors_per_cluster;\n\n\tif (info->fat_count == 0)\n\t\treturn IMGTOOLERR_CORRUPTIMAGE;\n\tif (sector_size !", "= FAT_SECLEN)\n\t\treturn IMGTOOLERR_CORRUPTIMAGE;\n\tif (info->sectors_per_fat == 0)\n\t\treturn IMGTOOLERR_CORRUPTIMAGE;\n\tif (info->sectors_per_cluster == 0)\n\t\treturn IMGTOOLERR_CORRUPTIMAGE;\n\tif (info->reserved_sectors == 0)\n\t\treturn IMGTOOLERR_CORRUPTIMAGE;\n\tif (info->total_clusters * info->fat_bits > info->sectors_per_fat * FAT_SECLEN * 8)\n\t\treturn IMGTOOLERR_CORRUPTIMAGE;\n\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_create(imgtool::image &image, uint64_t first_block, uint64_t block_count)\n{\n\timgtoolerr_t err;\n\tuint32_t heads, tracks, sectors_per_track;\n\tuint32_t fat_bits, sectors_per_cluster, reserved_sectors, hidden_sectors;\n\tuint32_t root_dir_count, root_dir_sectors;\n\tuint32_t sectors_per_fat, fat_count, i;\n\tuint32_t boot_sector_offset;\n\tuint64_t total_clusters;\n\tuint8_t media_descriptor;\n\t//const char *title;\n\tconst char *fat_bits_string;\n\tuint8_t header[FAT_SECLEN];\n#if 0\n\tuint64_t first_fat_entries;\n#endif\n\n\t/* check for limits */\n\tif (block_count > 0xFFFFFFFFFFFFU)\n\t\treturn IMGTOOLERR_PARAMTOOLARGE;\n\n\t/* get the geometry */\n\terr = image.get_geometry(&tracks, &heads, &sectors_per_track);\n\tif (err)\n\t\treturn err;\n\n\t/* cap our sector count so that we only use FAT12/16 */\n\tsectors_per_cluster = (block_count + 65524 - 1) / 65524;\n\n\t/* compute the FAT file system type */\n\tif ((block_count / sectors_per_cluster) <= 4084)\n\t{\n\t\tfat_bits = 12;\n\t\tfat_bits_string = fat12_string;\n\t}\n\telse if ((block_count / sectors_per_cluster) <= 65524)\n\t{\n\t\tfat_bits = 16;\n\t\tfat_bits_string = fat16_string;\n\t}\n\telse\n\t{\n\t\tfat_bits = 32;\n\t\tfat_bits_string = fat32_string;\n\t}\n\n\t/* figure out media type */\n\ti = 0;\n\twhile((known_media[i].heads > 0) && ((known_media[i].heads !", "= heads)\n\t\t|| (known_media[i].tracks !", "= tracks)\n\t\t|| (known_media[i].sectors !", "= sectors_per_track)))\n\t{\n\t\ti++;\n\t}\n\tmedia_descriptor = known_media[i].media_descriptor;\n\n\t/* other miscellaneous settings */\n\t//title = \"\";\n\tfat_count = 2;\n\troot_dir_count = 512;\n\thidden_sectors = 0;\n\treserved_sectors = 1;\n\n\t/* calculated settings */\n\troot_dir_sectors = (root_dir_count * FAT_DIRENT_SIZE + FAT_SECLEN - 1) / FAT_SECLEN;\n\ttotal_clusters = (block_count - reserved_sectors - hidden_sectors - root_dir_sectors)\n\t\t/ sectors_per_cluster;\n\tsectors_per_fat = (total_clusters * fat_bits + (FAT_SECLEN * 8) - 1)\n\t\t/ (FAT_SECLEN * 8);\n\n\t/* prepare the header */\n\tmemset(header, 0, sizeof(header));\n\tmemcpy(&header[3], \"IMGTOOL \", 8);\n\tplace_integer_le(header, 11, 2, FAT_SECLEN);\n\tplace_integer_le(header, 13, 1, sectors_per_cluster);\n\tplace_integer_le(header, 14, 1, reserved_sectors);\n\tplace_integer_le(header, 16, 1, fat_count);\n\tplace_integer_le(header, 17, 2, root_dir_count);\n\tplace_integer_le(header, 19, 2, (uint16_t) (block_count >> 0));\n\tplace_integer_le(header, 21, 1, media_descriptor);\n\tplace_integer_le(header, 22, 2, sectors_per_fat);\n\tplace_integer_le(header, 24, 2, sectors_per_track);\n\tplace_integer_le(header, 26, 2, heads);\n\tplace_integer_le(header, 28, 4, hidden_sectors);\n\tplace_integer_le(header, 32, 4, (uint32_t) (block_count >> 16));\n\tplace_integer_le(header, 36, 1, 0xFF);\n\tplace_integer_le(header, 38, 1, 0x28);\n\tplace_integer_le(header, 39, 1, std::rand());\n\tplace_integer_le(header, 40, 1, std::rand());\n\tplace_integer_le(header, 41, 1, std::rand());\n\tplace_integer_le(header, 42, 1, std::rand());\n\tmemcpy(&header[43], \" \", 11);\n\tmemcpy(&header[54], fat_bits_string, 8);\n\n\t/* store boot code */\n\tboot_sector_offset = sizeof(header) - sizeof(boot_sector_code);\n\tif (boot_sector_offset < 62)\n\t\treturn IMGTOOLERR_UNEXPECTED; /* sanity check */\n\tif (boot_sector_offset > 510)\n\t\treturn IMGTOOLERR_UNEXPECTED; /* sanity check */\n\tmemcpy(&header[boot_sector_offset], boot_sector_code, sizeof(boot_sector_code));\n\n\t/* specify jump instruction */\n\tif (boot_sector_offset <= 129)\n\t{\n\t\theader[0] = 0xEB; /* JMP rel8 */\n\t\theader[1] = (uint8_t) (boot_sector_offset - 2); /* (offset) */\n\t\theader[2] = 0x90; /* NOP */\n\t}\n\telse\n\t{\n\t\theader[0] = 0xE9; /* JMP rel16 */\n\t\theader[1] = (uint8_t) ((boot_sector_offset - 2) >> 0); /* (offset) */\n\t\theader[2] = (uint8_t) ((boot_sector_offset - 2) >> 8); /* (offset) */\n\t}\n\n\terr = image.write_block(first_block, header);\n\tif (err)\n\t\treturn err;\n\n\t/* clear out file allocation table */\n\tfor (i = reserved_sectors; i < (reserved_sectors + sectors_per_fat * fat_count + root_dir_sectors); i++)\n\t{\n\t\terr = image.clear_block(first_block + i, 0);\n\t\tif (err)\n\t\t\treturn err;\n\t}\n\n\t// FIXME: this causes a corrupt PC floppy image since it doubles the FAT partition header - works without it though\n#if 0\n\t/* set first two FAT entries */\n\tfirst_fat_entries = ((uint64_t) media_descriptor) | 0xFFFFFF00;\n\tfirst_fat_entries &= (((uint64_t) 1) << fat_bits) - 1;\n\tfirst_fat_entries |= ((((uint64_t) 1) << fat_bits) - 1) << fat_bits;\n\tfirst_fat_entries = little_endianize_int64(first_fat_entries);\n\n\tfor (i = 0; i < fat_count; i++)\n\t{\n\t\terr = image->write_block(first_block + 1 + (i * sectors_per_fat), &first_fat_entries);\n\t\tif (err)\n\t\t\treturn err;\n\t}\n#endif\n\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_load_fat(imgtool::partition &partition, uint8_t **fat_table)\n{\n\timgtoolerr_t err = IMGTOOLERR_SUCCESS;\n\tconst fat_partition_info *disk_info;\n\tuint8_t *table;\n\tuint32_t table_size;\n\tuint32_t pos, len;\n\tuint32_t sector_index;\n\n\tdisk_info = fat_get_partition_info(partition);\n\n\ttable_size = disk_info->sectors_per_fat * disk_info->fat_count * FAT_SECLEN;\n\n\t/* allocate the table with extra bytes, in case we \"overextend\" our reads */\n\ttable = (uint8_t*)malloc(table_size + sizeof(uint64_t));\n\tif (!", "table)\n\t{\n\t\terr = IMGTOOLERR_OUTOFMEMORY;\n\t\tgoto done;\n\t}\n\tmemset(table, 0, table_size + sizeof(uint64_t));\n\n\tpos = 0;\n\tsector_index = disk_info->reserved_sectors;\n\n\twhile(pos < table_size)\n\t{\n\t\tlen = std::min(table_size - pos, uint32_t(FAT_SECLEN));\n\n\t\terr = fat_read_sector(partition, sector_index++, 0, &table[pos], len);\n\t\tif (err)\n\t\t\tgoto done;\n\n\t\tpos += FAT_SECLEN;\n\t}\n\ndone:\n\tif (err && table)\n\t{\n\t\tfree(table);\n\t\ttable = NULL;\n\t}\n\t*fat_table = table;\n\treturn err;\n}\n\n\n\nstatic imgtoolerr_t fat_save_fat(imgtool::partition &partition, const uint8_t *fat_table)\n{\n\timgtoolerr_t err = IMGTOOLERR_SUCCESS;\n\tconst fat_partition_info *disk_info;\n\tuint32_t table_size;\n\tuint32_t pos, len;\n\tuint32_t sector_index;\n\n\tdisk_info = fat_get_partition_info(partition);\n\n\ttable_size = disk_info->sectors_per_fat * disk_info->fat_count * FAT_SECLEN;\n\n\tpos = 0;\n\tsector_index = disk_info->reserved_sectors;\n\n\twhile(pos < table_size)\n\t{\n\t\tlen = std::min(table_size - pos, uint32_t(FAT_SECLEN));\n\n\t\terr = fat_write_sector(partition, sector_index++, 0, &fat_table[pos], len);\n\t\tif (err)\n\t\t\tgoto done;\n\n\t\tpos += FAT_SECLEN;\n\t}\n\ndone:\n\treturn err;\n}\n\n\n\nstatic uint32_t fat_get_fat_entry(imgtool::partition &partition, const uint8_t *fat_table, uint32_t fat_entry)\n{\n\tconst fat_partition_info *disk_info;\n\tuint64_t entry;\n\tuint32_t bit_index, i;\n\tuint32_t last_entry = 0;\n\tuint32_t bit_mask;\n\n\tdisk_info = fat_get_partition_info(partition);\n\tbit_index = fat_entry * disk_info->fat_bits;\n\tbit_mask = 0xFFFFFFFF >> (32 - disk_info->fat_bits);\n\n\tif (fat_entry >= disk_info->total_clusters)\n\t{\n\t\tassert(0);\n\t\treturn 1;\n\t}\n\n\t/* make sure that the cluster is free in all fats */\n\tfor (i = 0; i < disk_info->fat_count; i++)\n\t{\n\t\tmemcpy(&entry, fat_table + (i * FAT_SECLEN\n\t\t\t* disk_info->sectors_per_fat) + (bit_index / 8), sizeof(entry));\n\n\t\t/* we've extracted the bytes; we now need to normalize it */\n\t\tentry = little_endianize_int64(entry);\n\t\tentry >>= bit_index % 8;\n\t\tentry &= bit_mask;\n\n\t\tif (i == 0)\n\t\t\tlast_entry = (uint32_t) entry;\n\t\telse if (last_entry !", "= (uint32_t) entry)\n\t\t\treturn 1; /* if the FATs disagree; mark this as reserved */\n\t}\n\n\t/* normalize special clusters */\n\tif (last_entry >= (0xFFFFFFF0 & bit_mask))\n\t{\n\t\tlast_entry |= 0xFFFFFFF0;\n\t\tif (last_entry >= 0xFFFFFFF8)\n\t\t\tlast_entry = 0xFFFFFFFF;\n\t}\n\treturn last_entry;\n}\n\n\n\nstatic void fat_set_fat_entry(imgtool::partition &partition, uint8_t *fat_table, uint32_t fat_entry, uint32_t value)\n{\n\tconst fat_partition_info *disk_info;\n\tuint64_t entry;\n\tuint32_t bit_index, i;\n\n\tdisk_info = fat_get_partition_info(partition);\n\tbit_index = fat_entry * disk_info->fat_bits;\n\tvalue &= 0xFFFFFFFF >> (32 - disk_info->fat_bits);\n\n\tfor (i = 0; i < disk_info->fat_count; i++)\n\t{\n\t\tmemcpy(&entry, fat_table + (i * FAT_SECLEN\n\t\t\t* disk_info->sectors_per_fat) + (bit_index / 8), sizeof(entry));\n\n\t\tentry = little_endianize_int64(entry);\n\t\tentry &= (~((uint64_t) 0xFFFFFFFF >> (32 - disk_info->fat_bits)) << (bit_index % 8)) | ((1 << (bit_index % 8)) - 1);\n\t\tentry |= ((uint64_t) value) << (bit_index % 8);\n\t\tentry = little_endianize_int64(entry);\n\n\t\tmemcpy(fat_table + (i * FAT_SECLEN\n\t\t\t* disk_info->sectors_per_fat) + (bit_index / 8), &entry, sizeof(entry));\n\t}\n}\n\n\n\nstatic void fat_debug_integrity_check(imgtool::partition &partition, const uint8_t *fat_table, const fat_file *file)\n{\n#ifdef MAME_DEBUG\n\t/* debug function to test the integrity of a file */\n\tuint32_t cluster;\n\tconst fat_partition_info *disk_info;\n\n\tdisk_info = fat_get_partition_info(partition);\n\tcluster = file->first_cluster ? ", "file->first_cluster : 0xFFFFFFFF;\n\n\tif (!", "file->root)\n\t{\n\t\twhile(cluster !", "= 0xFFFFFFFF)\n\t\t{\n\t\t\tassert((cluster >= 2) && (cluster < disk_info->total_clusters));\n\t\t\tcluster = fat_get_fat_entry(partition, fat_table, cluster);\n\t\t}\n\t}\n#endif\n}\n\n\n\nstatic imgtoolerr_t fat_seek_file(imgtool::partition &partition, fat_file *file, uint32_t pos)\n{\n\timgtoolerr_t err = IMGTOOLERR_SUCCESS;\n\tconst fat_partition_info *disk_info;\n\tuint32_t new_cluster;\n\tuint8_t *fat_table = NULL;\n\n\tdisk_info = fat_get_partition_info(partition);\n\n\t/* can't seek past end of file */\n\tif (!", "file->directory && (pos > file->filesize))\n\t\tpos = file->filesize;\n\n\tif (file->first_cluster == 0)\n\t{\n\t\t/* special case; the root directory */\n\t\tfile->index = pos;\n\t}\n\telse\n\t{\n\t\t/* first, we need to check to see if we have to go back to the beginning */\n\t\tif (pos < file->index)\n\t\t{\n\t\t\tfile->cluster = file->first_cluster;\n\t\t\tfile->cluster_index = 0;\n\t\t\tfile->eof = 0;\n\t\t}\n\n\t\t/* skip ahead clusters */\n\t\twhile((file->cluster_index + disk_info->cluster_size) <= pos)\n\t\t{\n\t\t\tif (!", "fat_table)\n\t\t\t{\n\t\t\t\terr = fat_load_fat(partition, &fat_table);\n\t\t\t\tif (err)\n\t\t\t\t\tgoto done;\n\t\t\t}\n\n\t\t\tnew_cluster = fat_get_fat_entry(partition, fat_table, file->cluster);\n\n\t\t\tfile->cluster = new_cluster;\n\t\t\tfile->cluster_index += disk_info->cluster_size;\n\n\t\t\t/* are we at the end of the file? */", "\n\t\t\tif (new_cluster == 0xFFFFFFFF)\n\t\t\t{\n\t\t\t\tpos = file->cluster_index;\n\t\t\t\tfile->eof = 1;\n\t\t\t}\n\t\t}\n\t\tfile->index = pos;\n\t}\n\ndone:\n\tif (fat_table)\n\t\tfree(fat_table);\n\treturn err;\n}\n\n\n\nstatic uint32_t fat_get_filepos_sector_index(imgtool::partition &partition, fat_file *file)\n{\n\tuint32_t sector_index;\n\tconst fat_partition_info *disk_info;\n\n\tdisk_info = fat_get_partition_info(partition);\n\n\tsector_index = disk_info->reserved_sectors + (disk_info->sectors_per_fat * disk_info->fat_count);\n\tif (file->root)\n\t{\n\t\t/* special case for the root file */\n\t\tsector_index += file->index / FAT_SECLEN;\n\t}\n\telse\n\t{\n\t\t/* cluster out of range? */", "\n\t\tif ((file->cluster < 2) || (file->cluster >= disk_info->total_clusters))\n\t\t\treturn 0;\n\n\t\tsector_index += (disk_info->root_entries * FAT_DIRENT_SIZE + FAT_SECLEN - 1) / FAT_SECLEN;\n\t\tsector_index += (file->cluster - 2) * disk_info->sectors_per_cluster;\n\t\tsector_index += (file->index / FAT_SECLEN) % disk_info->sectors_per_cluster;\n\t}\n\treturn sector_index;\n}\n\n\n\nstatic imgtoolerr_t fat_corrupt_file_error(const fat_file *file)\n{\n\timgtoolerr_t err;\n\tif (file->root)\n\t\terr = IMGTOOLERR_CORRUPTIMAGE;\n\telse if (file->directory)\n\t\terr = IMGTOOLERR_CORRUPTDIR;\n\telse\n\t\terr = IMGTOOLERR_CORRUPTFILE;\n\treturn err;\n}\n\n\n\nstatic imgtoolerr_t fat_readwrite_file(imgtool::partition &partition, fat_file *file,\n\tvoid *buffer, size_t buffer_len, size_t *bytes_read, int read_or_write)\n{\n\timgtoolerr_t err;\n// const fat_partition_info *disk_info;\n\tuint32_t sector_index;\n\tint offset;\n\tsize_t len;\n\n// disk_info =\n\t\tfat_get_partition_info(partition);\n\tif (bytes_read)\n\t\t*bytes_read = 0;\n\tif (!", "file->directory)\n\t\tbuffer_len = std::min(buffer_len, size_t(file->filesize - file->index));\n\n\twhile(!file->eof && (buffer_len > 0))\n\t{\n\t\tsector_index = fat_get_filepos_sector_index(partition, file);\n\t\tif (sector_index == 0)\n\t\t\treturn fat_corrupt_file_error(file);\n\n\t\toffset = file->index % FAT_SECLEN;\n\t\tlen = std::min(buffer_len, size_t(FAT_SECLEN - offset));\n\n\t\t/* read or write the data from the disk */\n\t\tif (read_or_write)\n\t\t\terr = fat_write_sector(partition, sector_index, offset, buffer, len);\n\t\telse\n\t\t\terr = fat_read_sector(partition, sector_index, offset, buffer, len);\n\t\tif (err)\n\t\t\treturn err;\n\n\t\t/* and move the file pointer ahead */\n\t\terr = fat_seek_file(partition, file, file->index + len);\n\t\tif (err)\n\t\t\treturn err;\n\n\t\tbuffer = ((uint8_t *) buffer) + len;\n\t\tbuffer_len -= len;\n\t\tif (bytes_read)\n\t\t\t*bytes_read += len;\n\t}\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_read_file(imgtool::partition &partition, fat_file *file,\n\tvoid *buffer, size_t buffer_len, size_t *bytes_read)\n{\n\treturn fat_readwrite_file(partition, file, buffer, buffer_len, bytes_read, 0);\n}\n\n\n\nstatic imgtoolerr_t fat_write_file(imgtool::partition &partition, fat_file *file,\n\tconst void *buffer, size_t buffer_len, size_t *bytes_read)\n{\n\treturn fat_readwrite_file(partition, file, (void *) buffer, buffer_len, bytes_read, 1);\n}\n\n\n\nstatic uint32_t fat_allocate_cluster(imgtool::partition &partition, uint8_t *fat_table)\n{\n\tconst fat_partition_info *disk_info;\n\tuint32_t i, val;\n\n\tdisk_info = fat_get_partition_info(partition);\n\n\tfor (i = 2; i < disk_info->total_clusters; i++)\n\t{\n\t\tval = fat_get_fat_entry(partition, fat_table, i);\n\t\tif (val == 0)\n\t\t{\n\t\t\tfat_set_fat_entry(partition, fat_table, i, 1);\n\t\t\treturn i;\n\t\t}\n\t}\n\treturn 0;\n}\n\n\n\n/* sets the size of a file; ~0 means 'delete' */\nstatic imgtoolerr_t fat_set_file_size(imgtool::partition &partition, fat_file *file,\n\tuint32_t new_size)\n{\n\timgtoolerr_t err = IMGTOOLERR_SUCCESS;\n\tconst fat_partition_info *disk_info;\n\tuint32_t new_cluster_count;\n\tuint32_t old_cluster_count;\n\tuint32_t cluster, write_cluster, last_cluster, new_pos, i;\n\tuint8_t *fat_table = NULL;\n\tuint8_t dirent[32];\n\tsize_t clear_size;\n\tvoid *clear_buffer = NULL;\n\tint delete_file = false;\n\tint rest_free = false;\n\n\tdisk_info = fat_get_partition_info(partition);\n\n\tLOG((\"fat_set_file_size(): file->first_cluster=%d new_size=0x%08x\\n\", file->first_cluster, new_size));\n\n\t/* special case */\n\tif (new_size == ~0)\n\t{\n\t\tdelete_file = true;\n\t\tnew_size = 0;\n\t}\n\n\t/* if this is the trivial case (not changing the size), succeed */\n\tif (!", "delete_file && (file->filesize == new_size))\n\t{\n\t\terr = IMGTOOLERR_SUCCESS;\n\t\tgoto done;\n\t}\n\n\t/* what is the new position? */", "\n\tnew_pos = std::min(file->index, new_size);\n\n\tif (file->root)\n\t{\n\t\t/* this is the root directory; this is a special case */\n\t\tif (new_size > (disk_info->root_entries * FAT_DIRENT_SIZE))\n\t\t{\n\t\t\terr = IMGTOOLERR_NOSPACE;\n\t\t\tgoto done;\n\t\t}\n\t}\n\telse\n\t{\n\t\told_cluster_count = (file->filesize + disk_info->cluster_size - 1) / disk_info->cluster_size;\n\t\tnew_cluster_count = (new_size + disk_info->cluster_size - 1) / disk_info->cluster_size;\n\t\tcluster = 0;\n\n\t\t/* load the dirent */\n\t\terr = fat_read_sector(partition, file->dirent_sector_index, file->dirent_sector_offset, dirent, sizeof(dirent));\n\t\tif (err)\n\t\t\tgoto done;\n\n\t\t/* need to load the FAT whether we are growing or shrinking the file */\n\t\tif (old_cluster_count !", "= new_cluster_count)\n\t\t{\n\t\t\terr = fat_load_fat(partition, &fat_table);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\n\t\t\tcluster = 0;\n\t\t\ti = 0;\n\t\t\tdo\n\t\t\t{\n\t\t\t\tlast_cluster = cluster;\n\t\t\t\twrite_cluster = 0;\n\n\t\t\t\t/* identify the next cluster */\n\t\t\t\tif (cluster !", "= 0)\n\t\t\t\t\tcluster = fat_get_fat_entry(partition, fat_table, cluster);\n\t\t\t\telse\n\t\t\t\t\tcluster = file->first_cluster ? ", "file->first_cluster : 0xFFFFFFFF;\n\n\t\t\t\t/* do we need to grow the file by a cluster? */", "\n\t\t\t\tif (i < new_cluster_count && ((cluster < 2) || (cluster >= disk_info->total_clusters)))\n\t\t\t\t{\n\t\t\t\t\t/* grow this file by a cluster */\n\t\t\t\t\tcluster = fat_allocate_cluster(partition, fat_table);\n\t\t\t\t\tif (cluster == 0)\n\t\t\t\t\t{\n\t\t\t\t\t\terr = IMGTOOLERR_NOSPACE;\n\t\t\t\t\t\tgoto done;\n\t\t\t\t\t}\n\n\t\t\t\t\twrite_cluster = cluster;\n\t\t\t\t}\n\t\t\t\telse if (i >= new_cluster_count)\n\t\t\t\t{\n\t\t\t\t\t/* we are shrinking the file; we need to unlink this node */\n\t\t\t\t\tif ((cluster < 2) || (cluster >= disk_info->total_clusters))\n\t\t\t\t\t\tcluster = 0xFFFFFFFF; /* ack file is corrupt! ", "recover */\n\t\t\t\t\twrite_cluster = 0xFFFFFFFF;\n\t\t\t\t}\n\n\t\t\t\t/* write out the entry, if appropriate */\n\t\t\t\tif (write_cluster !", "= 0)\n\t\t\t\t{\n\t\t\t\t\t/* are we tieing up loose ends? */", "\n\t\t\t\t\tif (rest_free && (write_cluster == 0xFFFFFFFF))\n\t\t\t\t\t\twrite_cluster = 0;\n\n\t\t\t\t\tif (last_cluster == 0)\n\t\t\t\t\t\tfile->first_cluster = (write_cluster !", "= 0xFFFFFFFF) ? ", "write_cluster : 0;\n\t\t\t\t\telse\n\t\t\t\t\t\tfat_set_fat_entry(partition, fat_table, last_cluster, write_cluster);\n\n\t\t\t\t\t/* did we write the last cluster? ", " if so, the rest (if any) are free */\n\t\t\t\t\tif (write_cluster == 0xFFFFFFFF)\n\t\t\t\t\t\trest_free = true;\n\t\t\t\t}\n\t\t\t}\n\t\t\twhile((++i < new_cluster_count) || (cluster !", "= 0xFFFFFFFF));\n\t\t}\n\n\t\t/* record the new file size */\n\t\tplace_integer_le(dirent, 26, 2, file->first_cluster);\n\t\tplace_integer_le(dirent, 28, 4, new_size);\n\n\t\t/* delete the file, if appropriate */\n\t\tif (delete_file)\n\t\t\tdirent[0] = 0xE5;\n\n\t\t/* save the dirent */\n\t\terr = fat_write_sector(partition, file->dirent_sector_index, file->dirent_sector_offset, dirent, sizeof(dirent));\n\t\tif (err)\n\t\t\tgoto done;\n\n\t\t/* if we've modified the FAT, save it out */\n\t\tif (fat_table)\n\t\t{\n\t\t\terr = fat_save_fat(partition, fat_table);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\t\t}\n\n\t\t/* update the file structure */\n\t\tif (!", "file->directory)\n\t\t\tfile->filesize = new_size;\n\t\tfile->cluster = file->first_cluster;\n\t\tfile->index = 0;\n\t\tfile->cluster_index = 0;\n\t\tfile->eof = (new_cluster_count == 0);\n\t}\n\n\t/* special case; clear out stale bytes on non-root directories */\n\tif (file->directory && !", "delete_file)\n\t{\n\t\tif (file->root)\n\t\t\tclear_size = std::min(file->filesize - new_size, uint32_t(FAT_DIRENT_SIZE));\n\t\telse\n\t\t\tclear_size = (disk_info->cluster_size - (new_size % disk_info->cluster_size)) % disk_info->cluster_size;\n\n\t\tif (clear_size > 0)\n\t\t{\n\t\t\terr = fat_seek_file(partition, file, new_size);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\n\t\t\tclear_buffer = malloc(clear_size);\n\t\t\tif (!", "clear_buffer)\n\t\t\t{\n\t\t\t\terr = IMGTOOLERR_OUTOFMEMORY;\n\t\t\t\tgoto done;\n\t\t\t}\n\t\t\tmemset(clear_buffer, '\\0', clear_size);\n\n\t\t\terr = fat_write_file(partition, file, clear_buffer, clear_size, NULL);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\t\t}\n\t}\n\n\t/* seek back to original pos */\n\terr = fat_seek_file(partition, file, new_pos);\n\tif (err)\n\t\tgoto done;\n\n\tif (fat_table)\n\t\tfat_debug_integrity_check(partition, fat_table, file);\n\ndone:\n\tif (fat_table)\n\t\tfree(fat_table);\n\tif (clear_buffer)\n\t\tfree(clear_buffer);\n\treturn err;\n}\n\n\n\nstatic void prepend_lfn_bytes(char16_t *lfn_buf, size_t lfn_buflen, size_t *lfn_len,\n\tconst uint8_t *entry, int offset, int chars)\n{\n\tuint16_t w;\n\tint i;\n\tsize_t move_len;\n\n\tmove_len = std::min(*lfn_len + 1, lfn_buflen - chars - 1);\n\tmemmove(&lfn_buf[chars], &lfn_buf[0], move_len * sizeof(*lfn_buf));\n\n\tfor (i = 0; i < chars; i++)\n\t{\n\t\t/* read the character */\n\t\tmemcpy(&w, &entry[offset + i * 2], 2);\n\t\tw = little_endianize_int16(w);\n\n\t\t/* append to buffer */\n\t\tlfn_buf[i] = (w !", "= 0xFFFF) ? ", "w : 0;\n\t}\n\t*lfn_len += chars;\n}\n\n\n\nstatic uint8_t fat_calc_filename_checksum(const uint8_t *short_filename)\n{\n\tuint8_t checksum;\n\tint i, j;\n\n\tchecksum = 0;\n\tfor (i = 0; i < 11; i++)\n\t{\n\t\tj = checksum & 1;\n\t\tchecksum >>= 1;\n\t\tif (j)\n\t\t\tchecksum |= 0x80;\n\t\tchecksum += short_filename[i];\n\t}\n\treturn checksum;\n}\n\n\n\nstatic void fat_calc_dirent_lfnchecksum(uint8_t *entry, size_t entry_len)\n{\n\tuint8_t checksum;\n\tint i;\n\n\tchecksum = fat_calc_filename_checksum(entry + entry_len - FAT_DIRENT_SIZE);\n\n\tfor (i = 0; i < (entry_len / FAT_DIRENT_SIZE - 1); i++)\n\t\tentry[i * FAT_DIRENT_SIZE + 13] = checksum;\n}\n\n\n\nstatic char fat_canonicalize_sfn_char(char ch)\n{\n\t/* return the display version of this short file name character */\n\treturn tolower(ch);\n}\n\n\n\nstatic void fat_canonicalize_sfn(char *sfn, const uint8_t *sfn_bytes)\n{\n\t/* return the display version of this short file name */\n\tint i;\n\n\tmemset(sfn, '\\0', 13);\n\tmemcpy(sfn, sfn_bytes, 8);\n\trtrim(sfn);\n\tif (sfn[0] == 0x05)\n\t\tsfn[0] = (char) 0xE5;\n\tif ((sfn_bytes[8] !", "= ' ') || (sfn_bytes[9] !", "= ' ') || (sfn_bytes[10] !", "= ' '))\n\t{\n\t\tstrcat(sfn, \".\");", "\n\t\tmemcpy(sfn + strlen(sfn), &sfn_bytes[8], 3);\n\t\trtrim(sfn);\n\t}\n\tfor (i = 0; sfn[i]; i++)\n\t\tsfn[i] = fat_canonicalize_sfn_char(sfn[i]);\n}\n\n\n\nstatic imgtool::datetime fat_crack_time(uint32_t fat_time)\n{\n\tutil::arbitrary_datetime dt;\n\tdt.second = ((fat_time >> 0) & 0x001F) * 2;\n\tdt.minute = ((fat_time >> 5) & 0x003F);\n\tdt.hour = ((fat_time >> 11) & 0x001F);\n\tdt.day_of_month = ((fat_time >> 16) & 0x001F);\n\tdt.month = ((fat_time >> 21) & 0x000F);\n\tdt.year = ((fat_time >> 25) & 0x007F) + 1980;\n\treturn imgtool::datetime(imgtool::datetime::LOCAL, dt);\n}\n\n\n\nstatic uint32_t fat_setup_time(time_t ansi_time)\n{\n\tstd::tm t = *localtime(&ansi_time);\n\n\tuint32_t result = 0;\n\tresult |= (((uint32_t) (t.tm_sec / 2)) & 0x001F) << 0;\n\tresult |= (((uint32_t) t.tm_min) & 0x003F) << 5;\n\tresult |= (((uint32_t) t.tm_hour) & 0x001F) << 11;\n\tresult |= (((uint32_t) t.tm_mday) & 0x001F) << 16;\n\tresult |= (((uint32_t) t.tm_mon) & 0x000F) << 21;\n\tresult |= (((uint32_t) (t.tm_year + 1900 - 1980)) & 0x007F) << 25;\n\n\treturn result;\n}\n\n\n\nstatic imgtoolerr_t fat_read_dirent(imgtool::partition &partition, fat_file *file,\n\tfat_dirent &ent, fat_freeentry_info *freeent)\n{\n\timgtoolerr_t err;\n\t//const fat_partition_info *disk_info;\n\tuint8_t entry[FAT_DIRENT_SIZE];\n\tsize_t bytes_read;\n\tint i, j;\n\tchar32_t ch;\n\tchar16_t lfn_buf[512];\n\tsize_t lfn_len = 0;\n\tint lfn_lastentry = 0;\n\tuint8_t lfn_checksum = 0;\n\tuint32_t entry_index, entry_sector_index, entry_sector_offset;\n\n\tassert(file->directory);\n\tlfn_buf[0] = '\\0';\n\tmemset(&ent, 0, sizeof(ent));\n\t//disk_info = fat_get_partition_info(partition);\n\n\t/* The first eight bytes of a FAT directory entry is a blank padded name\n\t *\n\t * The first byte can be special:\n\t * 0x00 - entry is available and no further entry is used\n\t * 0x05 - first character is actually 0xe5\n\t * 0x2E - dot entry; either '.' ", "or '..'\n\t * 0xE5 - entry has been erased and is available\n\t *\n\t * Byte 11 is the attributes; and 0x0F denotes a LFN entry\n\t */\n\tdo\n\t{\n\t\tentry_index = file->index;\n\t\tentry_sector_index = fat_get_filepos_sector_index(partition, file);\n\t\tentry_sector_offset = file->index % FAT_SECLEN;\n\n\t\terr = fat_read_file(partition, file, entry, sizeof(entry), &bytes_read);\n\t\tif (err)\n\t\t\treturn err;\n\t\tif (bytes_read < sizeof(entry))\n\t\t\tmemset(entry, 0, sizeof(entry));\n\n\t\tif (entry[11] == 0x0F)\n\t\t{\n\t\t\t/* this is an LFN entry */\n\t\t\tif ((lfn_lastentry == 0)\n\t\t\t\t|| ((entry[0] & 0x3F) !", "= (lfn_lastentry - 1))\n\t\t\t\t|| (lfn_checksum !", "= entry[13]))\n\t\t\t{\n\t\t\t\tlfn_buf[0] = 0;\n\t\t\t\tlfn_len = 0;\n\t\t\t\tlfn_checksum = entry[13];\n\t\t\t}\n\t\t\tlfn_lastentry = entry[0] & 0x3F;\n\t\t\tprepend_lfn_bytes(lfn_buf, ARRAY_LENGTH(lfn_buf),\n\t\t\t\t&lfn_len, entry, 28, 2);\n\t\t\tprepend_lfn_bytes(lfn_buf, ARRAY_LENGTH(lfn_buf),\n\t\t\t\t&lfn_len, entry, 14, 6);\n\t\t\tprepend_lfn_bytes(lfn_buf, ARRAY_LENGTH(lfn_buf),\n\t\t\t\t&lfn_len, entry, 1, 5);\n\t\t}\n\t\telse if (freeent && (freeent->position == ~0))\n\t\t{\n\t\t\t/* do a quick check to find out if we found space */\n\t\t\tif ((entry[0] == '\\0') || (entry[0] == 0xE5))\n\t\t\t{\n\t\t\t\tif (freeent->candidate_position > entry_index)\n\t\t\t\t\tfreeent->candidate_position = entry_index;\n\n\t\t\t\tif ((entry[0] == '\\0') || (freeent->candidate_position + freeent->required_size < file->index))\n\t\t\t\t\tfreeent->position = freeent->candidate_position;\n\t\t\t}\n\t\t\telse\n\t\t\t{\n\t\t\t\tfreeent->candidate_position = ~0;\n\t\t\t}\n\t\t}\n\t}\n\twhile((entry[0] == 0x2E) || (entry[0] == 0xE5) || (entry[11] == 0x0F));\n\n\t/* no more directory entries? */", "\n\tif (entry[0] == '\\0')\n\t{\n\t\tent.eof = 1;\n\t\treturn IMGTOOLERR_SUCCESS;\n\t}\n\n\t/* pick apart short filename */\n\tfat_canonicalize_sfn(ent.short_filename, entry);\n\n\t/* and the long filename */\n\tif (lfn_lastentry == 1)\n\t{\n\t\t/* only use the LFN if the checksum passes */\n\t\tif (lfn_checksum == fat_calc_filename_checksum(entry))\n\t\t{\n\t\t\ti = 0;\n\t\t\tj = 0;\n\t\t\tdo\n\t\t\t{\n\t\t\t\ti += uchar_from_utf16(&ch, &lfn_buf[i], ARRAY_LENGTH(lfn_buf) - i);\n\t\t\t\tj += utf8_from_uchar(&ent.long_filename[j], ARRAY_LENGTH(ent.long_filename) - j, ch);\n\t\t\t}\n\t\t\twhile(ch !", "= 0);\n\t\t}\n\t}\n\n\t/* other attributes */\n\tent.filesize = pick_integer_le(entry, 28, 4);\n\tent.directory = (entry[11] & 0x10) ? ", "1 : 0;\n\tent.first_cluster = pick_integer_le(entry, 26, 2);\n\tent.dirent_sector_index = entry_sector_index;\n\tent.dirent_sector_offset = entry_sector_offset;\n\tent.creation_time = fat_crack_time(pick_integer_le(entry, 14, 4));\n\tent.lastmodified_time = fat_crack_time(pick_integer_le(entry, 22, 4));\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nenum sfn_disposition_t\n{\n\tSFN_SUFFICIENT, /* name fully representable in short file name */\n\tSFN_DERIVATIVE, /* name not fully representable in short file name, but no need to tildize */\n\tSFN_MANGLED /* name not representable in short file name; must tildize */\n};\n\nstatic imgtoolerr_t fat_construct_dirent(const char *filename, creation_policy_t create,\n\tuint8_t **entry, size_t *entry_len)\n{\n\timgtoolerr_t err = IMGTOOLERR_SUCCESS;\n\tuint8_t *created_entry = NULL;\n\tuint8_t *new_created_entry;\n\tuint32_t now;\n\tsize_t created_entry_len = FAT_DIRENT_SIZE;\n\tsize_t created_entry_pos = 0;\n\tchar32_t ch;\n\tchar last_short_char = ' ';\n\tchar short_char = '\\0';\n\tchar canonical_short_char;\n\tchar16_t buf[UTF16_CHAR_MAX];\n\tint i, len;\n\tint sfn_pos = 0;\n\tsfn_disposition_t sfn_disposition = SFN_SUFFICIENT;\n\tint sfn_in_extension = 0;\n\n\t/* sanity check */\n\tif (*filename == '\\0')\n\t{\n\t\terr = IMGTOOLERR_BADFILENAME;\n\t\tgoto done;\n\t}\n\n\t/* construct intial entry */\n\tcreated_entry = (uint8_t *) malloc(FAT_DIRENT_SIZE);\n\tif (!", "created_entry)\n\t{\n\t\terr = IMGTOOLERR_OUTOFMEMORY;\n\t\tgoto done;\n\t}\n\n\t/* set up the basics for the new dirent */\n\tmemset(created_entry + 0, ' ', 11);\n\tmemset(created_entry + 12, '\\0', FAT_DIRENT_SIZE - 12);\n\tcreated_entry[11] = (create == CREATE_DIR) ? ", "0x10 : 0x00;\n\n\t/* set up file dates in the new dirent */\n\tnow = fat_setup_time(time(NULL));\n\tplace_integer_le(created_entry, 14, 4, now);\n\tplace_integer_le(created_entry, 18, 2, now);\n\tplace_integer_le(created_entry, 22, 4, now);\n\n\twhile(*filename)\n\t{\n\t\tfilename += uchar_from_utf8(&ch, filename, UTF8_CHAR_MAX);\n\n\t\t/* append to short filename, if possible */\n\t\tif ((ch < 32) || (ch > 128))\n\t\t\tshort_char = '\\0';\n\t\telse if (isalnum((char) ch))\n\t\t\tshort_char = toupper((char) ch);\n\t\telse if (strchr(\".!#$%^()-@^_`{}~\", (char) ch))\n\t\t\tshort_char = (char) ch;\n\t\telse\n\t\t\tshort_char = '\\0'; /* illegal SFN char */\n\t\tcanonical_short_char = fat_canonicalize_sfn_char((char) ch);\n\t\tif (!", "short_char || (short_char !", "= canonical_short_char))\n\t\t{\n\t\t\tif (toupper(short_char) == toupper(canonical_short_char))\n\t\t\t\tsfn_disposition = std::max(sfn_disposition, SFN_DERIVATIVE);\n\t\t\telse\n\t\t\t\tsfn_disposition = SFN_MANGLED;\n\t\t}\n\n\t\t/* append the short filename char */\n\t\tif (short_char == '.')", "\n\t\t{\n\t\t\t/* multiple extensions or trailing spaces? */", "\n\t\t\tif (sfn_in_extension)\n\t\t\t\tsfn_disposition = SFN_MANGLED;\n\t\t\telse if (last_short_char == ' ')\n\t\t\t\tsfn_disposition = std::max(sfn_disposition, SFN_DERIVATIVE);\n\n\t\t\tsfn_in_extension = 1;\n\t\t\tsfn_pos = 8;\n\t\t\tcreated_entry[created_entry_len - FAT_DIRENT_SIZE + 8] = ' ';\n\t\t\tcreated_entry[created_entry_len - FAT_DIRENT_SIZE + 9] = ' ';\n\t\t\tcreated_entry[created_entry_len - FAT_DIRENT_SIZE + 10] = ' ';\n\t\t}\n\t\telse if (sfn_pos == (sfn_in_extension ? ", "11 : 8))\n\t\t{\n\t\t\t/* ran out of characters for short filename */\n\t\t\tsfn_disposition = SFN_MANGLED;\n\t\t}\n\t\telse if (short_char !", "= '\\0')\n\t\t{\n\t\t\tcreated_entry[created_entry_len - FAT_DIRENT_SIZE + sfn_pos++] = short_char;\n\t\t}\n\t\tlast_short_char = short_char;\n\n\n\t\t/* convert to UTF-16 and add a long filename entry */\n\t\tlen = utf16le_from_uchar(buf, UTF16_CHAR_MAX, ch);\n\t\tfor (i = 0; i < len; i++)\n\t\t{\n\t\t\tswitch(created_entry_pos)\n\t\t\t{\n\t\t\t\tcase 0:\n\t\t\t\tcase 32:\n\t\t\t\t\t/* need to grow */\n\t\t\t\t\tnew_created_entry = (uint8_t *) malloc(created_entry_len + FAT_DIRENT_SIZE);\n\t\t\t\t\tif (!", "new_created_entry)\n\t\t\t\t\t{\n\t\t\t\t\t\terr = IMGTOOLERR_OUTOFMEMORY;\n\t\t\t\t\t\tgoto done;\n\t\t\t\t\t}\n\n\t\t\t\t\t/* move existing entries forward */\n\t\t\t\t\tmemmove(new_created_entry + 32, created_entry, created_entry_len);\n\n\t\t\t\t\tif (created_entry) free(created_entry);\n\t\t\t\t\tcreated_entry = new_created_entry;\n\t\t\t\t\tcreated_entry_len += 32;\n\n\t\t\t\t\t/* set up this LFN */\n\t\t\t\t\tmemset(created_entry, '\\0', 32);\n\t\t\t\t\tmemset(&created_entry[1], '\\xFF', 10);\n\t\t\t\t\tmemset(&created_entry[14], '\\xFF', 12);\n\t\t\t\t\tmemset(&created_entry[28], '\\xFF', 4);\n\t\t\t\t\tcreated_entry[11] = 0x0F;\n\n\t\t\t\t\t/* specify entry index */\n\t\t\t\t\tcreated_entry[0] = (created_entry_len / 32) - 1;\n\t\t\t\t\tif (created_entry[0] >= 0x40)\n\t\t\t\t\t{\n\t\t\t\t\t\terr = IMGTOOLERR_BADFILENAME;\n\t\t\t\t\t\tgoto done;\n\t\t\t\t\t}\n\t\t\t\t\tcreated_entry_pos = 1;\n\t\t\t\t\tbreak;\n\n\t\t\t\tcase 11:\n\t\t\t\t\tcreated_entry_pos = 14;\n\t\t\t\t\tbreak;\n\n\t\t\t\tcase 26:\n\t\t\t\t\tcreated_entry_pos = 28;\n\t\t\t\t\tbreak;\n\t\t\t}\n\n\t\t\tmemcpy(&created_entry[created_entry_pos], &buf[i], 2);\n\t\t\tcreated_entry_pos += 2;\n\t\t}\n\t}\n\n\t/* trailing spaces? */", "\n\tif (short_char == ' ')\n\t\tsfn_disposition = std::max(sfn_disposition, SFN_DERIVATIVE);\n\n\tif (sfn_disposition == SFN_SUFFICIENT)\n\t{\n\t\t/* the short filename suffices; remove the LFN stuff */\n\t\tmemcpy(created_entry, created_entry + created_entry_len - FAT_DIRENT_SIZE, FAT_DIRENT_SIZE);\n\t\tcreated_entry_len = FAT_DIRENT_SIZE;\n\t\tfree(created_entry);\n\t\tcreated_entry = NULL;\n\t\tnew_created_entry = (uint8_t *) malloc(created_entry_len);\n\t\tif (!", "new_created_entry)\n\t\t{\n\t\t\terr = IMGTOOLERR_OUTOFMEMORY;\n\t\t\tgoto done;\n\t\t}\n\t\tcreated_entry = new_created_entry;\n\t}\n\telse\n\t{\n\t\t/* need to do finishing touches on the LFN */\n\t\tcreated_entry[0] |= 0x40;\n\n\t\t/* if necessary, mangle the name */\n\t\tif (sfn_disposition == SFN_MANGLED)\n\t\t{\n\t\t\ti = 6;\n\t\t\twhile((i > 0) && isspace(created_entry[created_entry_len - FAT_DIRENT_SIZE + i - 1]))\n\t\t\t\ti--;\n\t\t\tcreated_entry[created_entry_len - FAT_DIRENT_SIZE + i + 0] = '~';\n\t\t\tcreated_entry[created_entry_len - FAT_DIRENT_SIZE + i + 1] = '1';\n\t\t}\n\t\tfat_calc_dirent_lfnchecksum(created_entry, created_entry_len);\n\t}\n\ndone:\n\tif (err && created_entry)\n\t{\n\t\tfree(created_entry);\n\t\tcreated_entry = NULL;\n\t}\n\t*entry = created_entry;\n\t*entry_len = created_entry_len;\n\treturn err;\n}\n\n\n\nstatic void fat_bump_dirent(imgtool::partition &partition, uint8_t *entry, size_t entry_len)\n{\n\tuint8_t *sfn_entry;\n\tint pos, digit_count, i;\n\tuint32_t digit_place, val = 0;\n\n\tsfn_entry = &entry[entry_len - FAT_DIRENT_SIZE];\n\n\tdigit_place = 1;\n\tfor (pos = 7; (pos >= 0) && isdigit((char) sfn_entry[pos]); pos--)\n\t{\n\t\tval += (sfn_entry[pos] - '0') * digit_place;\n\t\tdigit_place *= 10;\n\t}\n\tval++;\n\tpos++;\n\n\t/* count the digits */\n\tdigit_place = 1;\n\tdigit_count = 1;\n\twhile(val >= digit_place * 10)\n\t{\n\t\tdigit_count++;\n\t\tdigit_place *= 10;\n\t}\n\n\t/* give us some more space, if necessary */\n\twhile ((pos > 0) && ((pos + digit_count) > 8))\n\t\tpos--;\n\n\t/* have we actually ran out of digits */\n\tif ((pos + digit_count) > 8)\n\t{\n\t\t/* extreme degenerate case; simply randomize the filename */\n\t\tfor (i = 0; i < 6; i++)\n\t\t\tsfn_entry[i] = 'A' + (std::rand() % 26);\n\t\tsfn_entry[6] = '~';\n\t\tsfn_entry[7] = '0';\n\t}\n\telse\n\t{\n\t\t/* write the tilde, if possible */\n\t\tif (pos > 0)\n\t\t\tsfn_entry[pos - 1] = '~';\n\n\t\t/* write out the number */\n\t\twhile(digit_place > 0)\n\t\t{\n\t\t\tsfn_entry[pos++] = (val / digit_place) + '0';\n\t\t\tval %= digit_place;\n\t\t\tdigit_place /= 10;\n\t\t}\n\t}\n\n\t/* since we changed the short file name, we need to recalc the checksums\n\t * in the LFN entries */\n\tfat_calc_dirent_lfnchecksum(entry, entry_len);\n}\n\n\n\nstatic imgtoolerr_t fat_lookup_path(imgtool::partition &partition, const char *path,\n\tcreation_policy_t create, fat_file *file)\n{\n\timgtoolerr_t err;\n\tconst fat_partition_info *disk_info;\n\tfat_dirent ent;\n\tfat_freeentry_info freeent = { 0, };\n\tconst char *next_path_part;\n\tuint8_t *created_entry = NULL;\n\tsize_t created_entry_len = 0;\n\tuint32_t entry_sector_index, entry_sector_offset;\n\tuint32_t parent_first_cluster;\n\tint bumped_sfn;\n\tchar sfn[13];\n\n\tdisk_info = fat_get_partition_info(partition);\n\n\tmemset(file, 0, sizeof(*file));\n\tfile->root = 1;\n\tfile->directory = 1;\n\tfile->filesize = disk_info->root_entries * FAT_DIRENT_SIZE;\n\n\twhile(*path)\n\t{\n\t\tif (!", "file->directory)\n\t\t{\n\t\t\terr = IMGTOOLERR_PATHNOTFOUND;\n\t\t\tgoto done;\n\t\t}\n\n\t\tnext_path_part = path + strlen(path) + 1;\n\t\tif (create && (*next_path_part == '\\0'))\n\t\t{\n\t\t\t/* this is the last entry, and we are creating a file */\n\t\t\terr = fat_construct_dirent(path, create, &created_entry, &created_entry_len);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\n\t\t\tfreeent.required_size = created_entry_len;\n\t\t\tfreeent.candidate_position = ~0;\n\t\t\tfreeent.position = ~0;\n\t\t}\n\n\t\tdo\n\t\t{\n\t\t\terr = fat_read_dirent(partition, file, ent, created_entry ? &", "freeent : NULL);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\n\t\t\tLOG((\"fat_lookup_path(): %s/%s: %d\\n\", ent.short_filename, ent.long_filename, ent.dirent_sector_offset));\n\t\t}\n\t\twhile(!ent.eof && core_stricmp(path, ent.short_filename) && core_stricmp(path, ent.long_filename));\n\n\t\tparent_first_cluster = file->first_cluster;\n\n\t\tif (ent.eof)\n\t\t{\n\t\t\t/* it seems that we have reached the end of this directory */\n\t\t\tif (!", "created_entry)\n\t\t\t{\n\t\t\t\terr = IMGTOOLERR_FILENOTFOUND;\n\t\t\t\tgoto done;\n\t\t\t}\n\n\t\t\tif (created_entry_len > FAT_DIRENT_SIZE)\n\t\t\t{\n\t\t\t\t/* must ensure uniqueness of the short filename */\n\t\t\t\tdo\n\t\t\t\t{\n\t\t\t\t\t/* rewind to the beginning of the directory */\n\t\t\t\t\terr = fat_seek_file(partition, file, 0);\n\t\t\t\t\tif (err)\n\t\t\t\t\t\tgoto done;\n\n\t\t\t\t\tbumped_sfn = false;\n\t\t\t\t\tfat_canonicalize_sfn(sfn, &created_entry[created_entry_len - FAT_DIRENT_SIZE]);\n\n\t\t\t\t\tdo\n\t\t\t\t\t{\n\t\t\t\t\t\terr = fat_read_dirent(partition, file, ent, NULL);\n\t\t\t\t\t\tif (err)\n\t\t\t\t\t\t\tgoto done;\n\n\t\t\t\t\t\tif (!", "core_stricmp(sfn, ent.short_filename))\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tbumped_sfn = true;\n\t\t\t\t\t\t\tfat_bump_dirent(partition, created_entry, created_entry_len);\n\t\t\t\t\t\t\tfat_canonicalize_sfn(sfn, &created_entry[created_entry_len - FAT_DIRENT_SIZE]);\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\twhile(!ent.eof);\n\t\t\t\t}\n\t\t\t\twhile(bumped_sfn);\n\t\t\t}\n\n\t\t\tLOG((\"fat_lookup_path(): creating entry; pos=%u length=%u\\n\", freeent.position, freeent.required_size));\n\n\t\t\terr = fat_set_file_size(partition, file, std::max(file->filesize, uint32_t(freeent.position + created_entry_len)));\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\n\t\t\terr = fat_seek_file(partition, file, freeent.position);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\n\t\t\terr = fat_write_file(partition, file, created_entry, created_entry_len, NULL);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\n\t\t\t/* we have to do a special seek operation to get the main dirent */\n\t\t\terr = fat_seek_file(partition, file, freeent.position + created_entry_len - FAT_DIRENT_SIZE);\n\t\t\tif (err)\n\t\t\t\tgoto done;\n\t\t\tentry_sector_index = fat_get_filepos_sector_index(partition, file);\n\t\t\tentry_sector_offset = file->index % FAT_SECLEN;\n\n\t\t\t/* build the file struct for the newly created file/directory */\n\t\t\tmemset(file, 0, sizeof(*file));\n\t\t\tfile->directory = (created_entry[created_entry_len - FAT_DIRENT_SIZE + 11] & 0x10) ? ", "1 : 0;\n\t\t\tfile->dirent_sector_index = entry_sector_index;\n\t\t\tfile->dirent_sector_offset = entry_sector_offset;\n\t\t}\n\t\telse\n\t\t{\n\t\t\t/* update the current file */\n\t\t\tmemset(file, 0, sizeof(*file));\n\t\t\tfile->directory = ent.directory;\n\t\t\tfile->filesize = ent.filesize;\n\t\t\tfile->cluster = ent.first_cluster;\n\t\t\tfile->first_cluster = ent.first_cluster;\n\t\t\tfile->dirent_sector_index = ent.dirent_sector_index;\n\t\t\tfile->dirent_sector_offset = ent.dirent_sector_offset;\n\t\t}\n\n\t\tpath = next_path_part;\n\t\tfile->parent_first_cluster = parent_first_cluster;\n\t}\n\n\terr = IMGTOOLERR_SUCCESS;\n\ndone:\n\tif (created_entry)\n\t\tfree(created_entry);\n\treturn err;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_beginenum(imgtool::directory &enumeration, const char *path)\n{\n\timgtoolerr_t err;\n\tfat_file *file;\n\n\tfile = (fat_file *) enumeration.extra_bytes();\n\n\terr = fat_lookup_path(enumeration.partition(), path, CREATE_NONE, file);\n\tif (err)\n\t\treturn err;\n\tif (!", "file->directory)\n\t\treturn IMGTOOLERR_PATHNOTFOUND;\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_nextenum(imgtool::directory &enumeration, imgtool_dirent &ent)\n{\n\timgtoolerr_t err;\n\tfat_file *file;\n\tfat_dirent fatent;\n\n\tfile = (fat_file *) enumeration.extra_bytes();\n\terr = fat_read_dirent(enumeration.partition(), file, fatent, NULL);\n\tif (err)\n\t\treturn err;\n\n\t/* copy stuff from the FAT dirent to the Imgtool dirent */\n\tsnprintf(ent.filename, ARRAY_LENGTH(ent.filename), \"%s\", fatent.long_filename[0]\n\t\t? ", "fatent.long_filename : fatent.short_filename);\n\tent.filesize = fatent.filesize;\n\tent.directory = fatent.directory;\n\tent.eof = fatent.eof;\n\tent.creation_time = fatent.creation_time;\n\tent.lastmodified_time = fatent.lastmodified_time;\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_read_bootblock(imgtool::partition &partition, imgtool::stream &stream)\n{\n\timgtoolerr_t err;\n\tuint8_t block[FAT_SECLEN];\n\n\terr = fat_read_sector(partition, 0, 0, block, sizeof(block));\n\tif (err)\n\t\treturn err;\n\n\tstream.write(block, sizeof(block));\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_write_bootblock(imgtool::partition &partition, imgtool::stream &stream)\n{\n\timgtoolerr_t err;\n\tuint8_t block[FAT_SECLEN];\n\tuint8_t new_block[FAT_SECLEN];\n\n\tif (stream.size() !", "= sizeof(new_block))\n\t\treturn IMGTOOLERR_UNEXPECTED;\n\tstream.read(new_block, sizeof(new_block));\n\n\tif (new_block[510] !", "= 0x55)\n\t\treturn IMGTOOLERR_UNEXPECTED;\n\tif (new_block[511] !", "= 0xAA)\n\t\treturn IMGTOOLERR_UNEXPECTED;\n\n\t/* read current boot sector */\n\terr = fat_read_sector(partition, 0, 0, block, sizeof(block));\n\tif (err)\n\t\treturn err;\n\n\t/* merge in the new stuff */\n\tmemcpy(&block[ 0], &new_block[ 0], 3);\n\tmemcpy(&block[62], &new_block[62], 448);\n\n\t/* and write it out */\n\terr = fat_write_sector(partition, 0, 0, block, sizeof(block));\n\tif (err)\n\t\treturn err;\n\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_readfile(imgtool::partition &partition, const char *filename, const char *fork, imgtool::stream &destf)\n{\n\timgtoolerr_t err;\n\tfat_file file;\n\tsize_t bytes_read;\n\tchar buffer[1024];\n\n\t/* special case for bootblock */\n\tif (filename == FILENAME_BOOTBLOCK)\n\t\treturn fat_read_bootblock(partition, destf);\n\n\terr = fat_lookup_path(partition, filename, CREATE_NONE, &file);\n\tif (err)\n\t\treturn err;\n\n\tif (file.directory)\n\t\treturn IMGTOOLERR_FILENOTFOUND;\n\n\tdo\n\t{\n\t\terr = fat_read_file(partition, &file, buffer, sizeof(buffer), &bytes_read);\n\t\tif (err)\n\t\t\treturn err;\n\n\t\tdestf.write(buffer, bytes_read);\n\t}\n\twhile(bytes_read > 0);\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_writefile(imgtool::partition &partition, const char *filename, const char *fork, imgtool::stream &sourcef, util::option_resolution *opts)\n{\n\timgtoolerr_t err;\n\tfat_file file;\n\tuint32_t bytes_left, len;\n\tchar buffer[1024];\n\n\t/* special case for bootblock */\n\tif (filename == FILENAME_BOOTBLOCK)\n\t\treturn fat_write_bootblock(partition, sourcef);\n\n\terr = fat_lookup_path(partition, filename, CREATE_FILE, &file);\n\tif (err)\n\t\treturn err;\n\n\tif (file.directory)\n\t\treturn IMGTOOLERR_FILENOTFOUND;\n\n\tbytes_left = (uint32_t) sourcef.size();\n\n\terr = fat_set_file_size(partition, &file, bytes_left);\n\tif (err)\n\t\treturn err;\n\n\twhile(bytes_left > 0)\n\t{\n\t\tlen = (std::min<size_t>)(bytes_left, sizeof(buffer));\n\t\tsourcef.read(buffer, len);\n\n\t\terr = fat_write_file(partition, &file, buffer, len, NULL);\n\t\tif (err)\n\t\t\treturn err;\n\n\t\tbytes_left -= len;\n\t}\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_delete(imgtool::partition &partition, const char *filename, unsigned int dir)\n{\n\timgtoolerr_t err;\n\tfat_file file;\n\tfat_dirent ent;\n\n\terr = fat_lookup_path(partition, filename, CREATE_NONE, &file);\n\tif (err)\n\t\treturn err;\n\tif (file.directory !", "= dir)\n\t\treturn IMGTOOLERR_FILENOTFOUND;\n\n\tif (dir)\n\t{\n\t\terr = fat_read_dirent(partition, &file, ent, NULL);\n\t\tif (err)\n\t\t\treturn err;\n\t\tif (!", "ent.eof)\n\t\t\treturn IMGTOOLERR_DIRNOTEMPTY;\n\t}\n\n\terr = fat_set_file_size(partition, &file, ~0);\n\tif (err)\n\t\treturn err;\n\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_deletefile(imgtool::partition &partition, const char *filename)\n{\n\treturn fat_partition_delete(partition, filename, 0);\n}\n\n\n\nstatic imgtoolerr_t fat_partition_freespace(imgtool::partition &partition, uint64_t *size)\n{\n\timgtoolerr_t err;\n\tconst fat_partition_info *disk_info;\n\tuint8_t *fat_table;\n\tuint32_t i;\n\n\tdisk_info = fat_get_partition_info(partition);\n\n\terr = fat_load_fat(partition, &fat_table);\n\tif (err)\n\t\tgoto done;\n\n\t*size = 0;\n\tfor (i = 2; i < disk_info->total_clusters; i++)\n\t{\n\t\tif (fat_get_fat_entry(partition, fat_table, i) == 0)\n\t\t\t*size += disk_info->cluster_size;\n\t}\n\ndone:\n\tif (fat_table)\n\t\tfree(fat_table);\n\treturn err;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_createdir(imgtool::partition &partition, const char *path)\n{\n\timgtoolerr_t err;\n\tfat_file file;\n\tuint8_t initial_data[64];\n\n\terr = fat_lookup_path(partition, path, CREATE_DIR, &file);\n\tif (err)\n\t\treturn err;\n\tif (!", "file.directory)\n\t\treturn IMGTOOLERR_FILENOTFOUND;\n\n\terr = fat_set_file_size(partition, &file, sizeof(initial_data));\n\tif (err)\n\t\treturn err;\n\n\t/* set up the two directory entries in all directories */\n\tmemset(initial_data, 0, sizeof(initial_data));\n\tmemcpy(&initial_data[0], \". ", " \", 11);\n\tplace_integer_le(initial_data, 11, 1, 0x10);\n\tplace_integer_le(initial_data, 26, 2, file.first_cluster);\n\tmemcpy(&initial_data[32], \". ", " \", 11);\n\tplace_integer_le(initial_data, 43, 1, 0x10);\n\tplace_integer_le(initial_data, 58, 2, file.parent_first_cluster);\n\n\terr = fat_write_file(partition, &file, initial_data, sizeof(initial_data), NULL);\n\tif (err)\n\t\treturn err;\n\n\treturn IMGTOOLERR_SUCCESS;\n}\n\n\n\nstatic imgtoolerr_t fat_partition_deletedir(imgtool::partition &partition, const char *path)\n{\n\treturn fat_partition_delete(partition, path, 1);\n}\n\n\n\nvoid fat_get_info(const imgtool_class *imgclass, uint32_t state, union imgtoolinfo *info)\n{\n\tswitch(state)\n\t{\n\t\t/* --- the following bits of info are returned as 64-bit signed integers --- */\n\t\tcase IMGTOOLINFO_INT_INITIAL_PATH_SEPARATOR: info->i = 1; break;\n\t\tcase IMGTOOLINFO_INT_OPEN_IS_STRICT: info->i = 1; break;\n\t\tcase IMGTOOLINFO_INT_SUPPORTS_CREATION_TIME: info->i = 1; break;\n\t\tcase IMGTOOLINFO_INT_SUPPORTS_LASTMODIFIED_TIME: info->i = 1; break;\n\t\tcase IMGTOOLINFO_INT_SUPPORTS_BOOTBLOCK: info->i = 1; break;\n\t\tcase IMGTOOLINFO_INT_PATH_SEPARATOR: info->i = '\\\\'; break;\n\t\tcase IMGTOOLINFO_INT_ALTERNATE_PATH_SEPARATOR: info->i = '/'; break;\n\t\tcase IMGTOOLINFO_INT_PARTITION_EXTRA_BYTES: info->i = sizeof(fat_partition_info); break;\n\t\tcase IMGTOOLINFO_INT_DIRECTORY_EXTRA_BYTES: info->i = sizeof(fat_file); break;\n\n\t\t/* --- the following bits of info are returned as NULL-terminated strings --- */\n\t\tcase IMGTOOLINFO_STR_FILE: strcpy(info->s = imgtool_temp_str(), __FILE__); break;\n\t\tcase IMGTOOLINFO_STR_EOLN: strcpy(info->s = imgtool_temp_str(), \"\\r\\n\"); break;\n\n\t\t/* --- the following bits of info are returned as pointers to data or functions --- */\n\t\tcase IMGTOOLINFO_PTR_CREATE_PARTITION: info->create_partition = fat_partition_create; break;\n\t\tcase IMGTOOLINFO_PTR_OPEN_PARTITION: info->open_partition = fat_partition_open; break;\n\t\tcase IMGTOOLINFO_PTR_BEGIN_ENUM: info->begin_enum = fat_partition_beginenum; break;\n\t\tcase IMGTOOLINFO_PTR_NEXT_ENUM: info->next_enum = fat_partition_nextenum; break;\n\t\tcase IMGTOOLINFO_PTR_READ_FILE: info->read_file = fat_partition_readfile; break;\n\t\tcase IMGTOOLINFO_PTR_WRITE_FILE: info->write_file = fat_partition_writefile; break;\n\t\tcase IMGTOOLINFO_PTR_DELETE_FILE: info->delete_file = fat_partition_deletefile; break;\n\t\tcase IMGTOOLINFO_PTR_FREE_SPACE: info->free_space = fat_partition_freespace; break;\n\t\tcase IMGTOOLINFO_PTR_CREATE_DIR: info->create_dir = fat_partition_createdir; break;\n\t\tcase IMGTOOLINFO_PTR_DELETE_DIR: info->delete_dir = fat_partition_deletedir; break;\n\t}\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.036575816571712494, 0.0013015257427468896, 0.0010265337768942118, 0.0013958485797047615, 0.001446093083359301, 0.0007903873920440674, 0.029167989268898964, 0.007582398597151041, 0.000784548232331872, 0.0011153829982504249, 0.20258507132530212, 0.016364388167858124, 0.010454434901475906, 0.018899893388152122, 0.025220682844519615, 0.048831161111593246, 0.0007326244376599789, 0.0006826600292697549, 0.0054726083762943745, 0.03916578367352486, 0.019535774365067482, 0.0036619212478399277, 0.0009289989247918129, 0.03157743811607361, 0.000912017363589257, 0.02018948830664158, 0.011040200479328632, 0.025720665231347084, 0.027155118063092232, 0.0024484898895025253, 0.05021263659000397, 0.020352652296423912, 0.007976946420967579, 0.0017816137988120317, 0.03573773428797722, 0.003047710284590721, 0.0080952113494277, 0.0017391251167282462, 0.005168566945940256, 0.009177887812256813, 0.0025931033305823803, 0.03137778490781784, 0.0011862970422953367, 0.006872035562992096, 0.01484713889658451, 0.002035608049482107, 0.03622530773282051, 0.0013470831327140331, 0.001388351432979107, 0.0008303994545713067, 0.029066475108265877, 0.002647325862199068, 0.0010194717906415462, 0.001985423034057021, 0.007504778914153576, 0.0007635458605363965, 0.008572510443627834, 0.0013896046439185739, 0.030108967795968056, 0.001992285018786788, 0.0007882823701947927, 0.0007419451139867306, 0.0013596221106126904, 0.0017242571339011192, 0.011084959842264652, 0.0026730212848633528, 0.004154555033892393, 0.00980257149785757, 0.006293071433901787, 0.03332901373505592, 0.013534452766180038, 0.011121655814349651, 0.00779758719727397, 0.017715327441692352, 0.017748208716511726, 0.0015577028971165419, 0.002178920665755868, 0.024132736027240753, 0.0472075380384922, 0.03368295729160309, 0.004562651738524437, 0.0006377283134497702, 0.0102870287373662 ]
0.014264
83
[ "S: Since I’ve never heard of this book (or volume of books) can you just explain to me their history and background a bit. (", "Is it based on a Chinese legend or folk story or something?)", "\n\nWL: The Story of the Stone is a Chinese novel, written by Cao Xueqin, who lived from 1715?-63. ", "I read the David Hawkes translation. ", "The first edition was published in 1792. ", "Throughout the five volumes it’s published in, the chapter numbers are consecutively numbered — volume 1 ends with chapter 26, volume 2 starts with chapter 27 — so I really consider them one book, even though each volume subsequent to the first has a unique name.", "\n\nIt contains, to some degree, a “sandwich” of what I take to be a Chinese legend, although I don’t recall if that’s something I read or if I just assumed. ", "The large majority of the story, though, chronicles the life of a boy, Bao-yu, and the girls who he grows up with, along with their very large, very wealthy family and its triumphs and trials. ", "The book is at least somewhat autobiographical, although some facts were changed intentionally to lessen that correlation. ", "When the book came out, it was apparently potentially dangerous (seditious), so this would have been important.", "\n\nS: What book or author would you compare these to?", "\n\nWL: I’ve heard The Story of the Stone called the War and Peace of Chinese literature, since it’s the preeminent Chinese classic. ", "It’s also sweeping, epic, like War and Peace. ", "Of course (depending on what kind of comparison you’re looking for) the culture of the book is clearly dissimilar to Tolstoy’s work, but I haven’t read enough Chinese literature to be able to make comparisons for you there.", "\n\nS: Why did you decide to read these books?", "\n\nWL: I knew I wanted to read Story of the Stone as soon as I learned it was a classic work of Chinese literature. ", "I’ve been interested in and intrigued by Asia for about a decade now. ", "After I learned in contained poetry, I knew I wanted to read the Hawkes translation; this one at least attempts to maintain the rhythm and feel of the text, rather than just translating literally, word for word.", "\n\nS: Did you read all five volumes? ", "If so, which volume was your favorite? ", "Least favorite? ", "How long are each of the volumes?", "\n\nWL: I did read all five volumes. ", "As I said earlier, I really do consider it just one book. ", "Probably the first and second volumes are my favorite parts, though. ", "It really takes more time than than for the characters’ true identities to come to light. ", "I think of these as more happy, more innocent, than the later volumes. ", "Each one really does have high points.", "\n\nThat’s a total of 2,480 pages. ", "I didn’t include the appendices in the page counts.", "\n\nS: Summarize the story in a couple or three sentences, but remember, no spoilers!", "\n\nWL: The Story of the Stone details the lives of Bao-yu and his female cousins, (and the rest of the huge family) from the elaborate parties they host and the poetry (writing) club they form when the government favors them to how they function when its not. ", "It brings to life a time in China’s history and shows the culture and how people lived; it entails peace and corruption.", "\n\nS: What was your favorite thing about these books?", "\n\nWL: That’s hard to say. ", "I really loved them so much, for so many reasons. ", "I loved the window into China that it opened for me. ", "I loved the vocabulary, I was fascinated by the medical remedies used when someone was sick and the education processes, I was struck by the beauty of the environment, and the so-stark contrast in the book between rich and poor. ", "It entails beautiful imagery, hilarious dialogue and intriguing characters.", "\n\nS: What was your least favorite thing about them?", "\n\nWL: I can’t really say, without a spoiler. ", "But it’s a minor point, anyway.", "\n\nS: Who was your favorite character in the story and why?", "\n\nWL: My favorite character is probably Dai-yu, one of the cousins. ", "I felt a kinship with her. ", "She’s frail but strong, and incredibly smart. ", "Her plight isn’t the most stable, either. ", "I’m also a fan of Bao-yu’s grandmother, Grandmother Jia. ", "She’s smart, discerning and kind. ", "The matriarch of the family bears a large load.", "\n\nS: To whom would you recommend these books?", "\n\nWL: I would recommend The Story of the Stone to anyone interested in literature of the world, or of Asia in particular. ", "Readers who enjoy historical fiction. ", "Avid readers; I might not recommend it to anyone who hasn’t made it through (or at least if they don’t want to read) War and Peace.", "\n\nS: How would you rate this book on a five star rating scale (1 the worst, 5 the best)?", "\n\nWL: I’d have to call it a 5, there’s really no deliberation needed for that one.", "\n\n___________________\n\nAnd now, my interview of Suey, of It’s All About Books, about A Walk in the Woods by Bill Bryson:WL: Ooh, reading the Amazon synopsis, this sounds like an intriguing book. ", "I hadn’t heard of Bryson or his work before, but it sounds quite readable. ", "Do you agree?", "\n\nS: Yes, this book was VERY readable. ", "Wonderful narrative. “", "Reads like a novel” as they say.", "\n\nWL: Did the book live up to what you’d heard before picking it up?", "\n\nS: Yes, I’d heard it was “laugh out loud” funny, and it was. ", "I did laugh out loud, and that’s someting I don’t do a whole lot while reading.", "\n\nWL: What made you pick this one as your first foray into Bryson’s writing?", "\n\nS: Hmmm … not sure. ", "I think it was just the first one I’d heard of. ", "Since then I’ve seen many of his others out there, but this one just stuck in my mind. ", "Also, the idea of hiking such a huge long trail is very intriguing to me, though I could never in a million years do it.", "\n\nWL: I don’t read much nonfiction. ", "How does this book convey story? ", "Plot?", "\n\nS: Well, there’s not a whole lot of plot. ", "Bryson and his friend decide to hike the Appalachian Trail and so he tells about it. ", "You do wonder if they finish or not… and what kind of mishaps they have… all which make a great story. ", "But for the most part, the people they come across and the struggles they have are the real story. ", "So I think he does a great job turning this nonfiction subject into a really fun story." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005523323197849095, 0.0007669229526072741, 0.0007275742245838046, 0.0005876681534573436, 0.0006635553436353803, 0.0005624801269732416, 0.0006424894672818482, 0.0006675056647509336, 0.0005888913292437792, 0.0005707815289497375, 0.0007065668469294906, 0.0006640244391746819, 0.0010617898078635335, 0.0005805021501146257, 0.0006719803204759955, 0.0005765765672549605, 0.0005349301500245929, 0.0005631893291138113, 0.0007650271872989833, 0.0009333795751444995, 0.0010087715927511454, 0.0007694648811593652, 0.0006428803317248821, 0.0005435934872366488, 0.000667234999127686, 0.0006010542856529355, 0.0005596388946287334, 0.0005927531747147441, 0.0006898636347614229, 0.0006313521298579872, 0.0010667132446542382, 0.0006303945556282997, 0.0009868653723970056, 0.0007489541894756258, 0.000972396635916084, 0.0007067957776598632, 0.0007685166201554239, 0.00088595348643139, 0.0006266150739975274, 0.0007819902966730297, 0.0038015765603631735, 0.0006515901768580079, 0.0007297122501768172, 0.0007002751808613539, 0.0005956800887361169, 0.0008795768953859806, 0.0007393924752250314, 0.0008739092736504972, 0.0010493171866983175, 0.0012584931682795286, 0.0007207717862911522, 0.0005415487103164196, 0.0006701959646306932, 0.0006270927260629833, 0.0021188072860240936, 0.0008730144472792745, 0.0007660197443328798, 0.0005577317206189036, 0.0007444963557645679, 0.0006007487536408007, 0.0006006446201354265, 0.0006086749490350485, 0.0008803377859294415, 0.0009633427835069597, 0.0032870499417185783, 0.0007029256084933877, 0.0008393751340918243, 0.0006418965058401227, 0.0006287555443122983, 0.0005702931666746736, 0.0008315424202010036, 0.000688980333507061, 0.0008209468796849251, 0.0008980607963167131, 0.0006123342900536954, 0.0007562004029750824, 0.000574220553971827, 0.0005800433573313057 ]
0.000811
78
[ "Q:\n\nIs DirextX9 material no longer worthy material for learning win32 API programming?", "\n\nI have been expanding my library (Physical library of these weird things called 'books'... I know... I know) and I'm reading Beginning DirectX 9.0 by Wendy Jones. ", "As I have gone through some books in the past that are 'outdated' the logic behind them is actually the same, if not more important in the earlier versions (in my experience) of things like C++ books I have read. ", "The issue I am having with this DirectX 9 book is, 10/10 practice codes, don't work, ever. ", "Even the solutions found on here, and MSDN \ndidn't work for me. (", "Identical problem). ", "\nSo I was hoping if you could tell me before I go and purchase a book on DX11, if it might be something to do with my compiler/vs or the fact that vs is updated 2015, and this DX9 is obselete/DX11 standards have been introduced.", "\n//Include the Windows header file that's needed for all Windows applications \n#include <Windows.h>\n\nHINSTANCE hInst; // global handle to hold the application instance\nHWND wndHandle; // global variable to hold the window handle\n\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPTSTR lpCmdLine, int nCmdShow);\n\n//forward declerations\nbool initWindow(HINSTANCE hInstance);\nLRESULT CALLBACK WndProc(HWND, UINT WPARAM, LPARAM);\n\n//This is winmain, the main etry point for Windows applications\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPTSTR lpCmdLine, int nCmdShow)\n{\n //Initialize the window\n if (!", "initWindow(hInstance))\n return false;\n //main message loop: (See page 13, \"Adding the Windows Code\" - Chapter 2\n MSG msg;\n ZeroMemory(&msg, sizeof(msg));\n while (msg.message !", "= WM_QUIT);\n {\n //Check the message queue\n while (GetMessage(&msg, wndHandle, 0, 0))\n {\n TranslateMessage(&msg);\n DispatchMessage(&msg);\n }\n }\n return(int)msg.wParam;\n}\n\n/****************************************************************************** \n* bool initWindow( HINSTANCE hInstance ) \n* initWindow registers the window class for the application, creates the window \n******************************************************************************/\n\nbool initWindow(HINSTANCE hInstance)\n{\n WNDCLASSEX wcex;\n\n //Fill in the WNDCLASSEX structure. ", "THis describes how the window will look to the system\n wcex.cbSize = sizeof(WNDCLASSEX); // the size of the structure\n wcex.style = CS_HREDRAW | CS_VREDRAW; // the class style\n wcex.lpfnWndProc = (WNDPROC)WndProc; // the window procedure callback\n wcex.cbClsExtra = 0; // extra bytes to allocate for this calss\n wcex.cbWndExtra = 0; // extra bytes to allocate for this instance\n wcex.hInstance = hInstance; // handle to the application\n wcex.hIcon = 0; // icon to associate with the application\n wcex.hCursor = LoadCursor(NULL, IDC_ARROW); // the default cursor\n wcex.lpszMenuName = NULL; // the resource name for the menu\n wcex.lpszClassName = NULL; // the class name being created\n wcex.hIconSm = 0;\n RegisterClassEx(&wcex);\n\n //Create the window\n wndHandle = CreateWindow(\n (LPCWSTR)\"DirectXExample\", // the window class to use\n (LPCWSTR)\"DirectXExample\", // the title bar text\n WS_OVERLAPPEDWINDOW, // the window style\n CW_USEDEFAULT, // the starting x coordinate\n CW_USEDEFAULT, // the starting y coordinate\n 640, //the pixel width of the window\n 480, //the pixel height of the window\n NULL, // the parent window; NULL for desktop\n NULL, // the menu for the application; NULL for none\n hInstance, // the handle to the apllication instance\n NULL); // no values passed to the window\n\n //make sure that the window handle that is created is valid\n if (!", "wndHandle)\n return false;\n\n //Display the window on the screen\n ShowWindow(wndHandle, SW_SHOW);\n UpdateWindow(wndHandle);\n return true;\n}\n\nA:\n\nIt's perfectly fine to keep using DirectX 9. ", " But your implementation for getting a minimal host window up on the screen has some simple bugs. ", "It also is doing some bad casts between ANSI and wide strings. ", "Let's get you fixed:\nRemove the forward declaration of WinMain. ", " This line, just remove it.", "\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPTSTR lpCmdLine, int nCmdShow);\n\nIn the actual function body for WinMain, change the type for lpCmdLine from LPTSTR parameter to be just LPSTR.", "\n//This is winmain, the main etry point for Windows applications\nint WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nCmdShow)\n{\n //Initialize the window\n if (!", "initWindow(hInstance))\n\nYour declaration of WndProc is also incorrect. ", " WndProc should be declared as follows:\nLRESULT CALLBACK WndProc(HWND hwnd, UINT uMsg, WPARAM wparam, LPARAM lparam);\n\nOnce you fix the above declaration of WndProc, you can take out that bad cast operation in the WNDCLASS initialization. ", "Change this:\nwcex.lpfnWndProc = (WNDPROC)WndProc; // the window procedure callback\n\nTo this:\nwcex.lpfnWndProc = WndProc; // the window procedure callback\n\nYou are missing a definition of WndProc. ", " You need to implement that function yourself. ", " Here's a minimal implementation:\nLRESULT CALLBACK WndProc(HWND hWnd, UINT message, WPARAM wParam, LPARAM lParam)\n{\n switch (message)\n {\n case WM_CLOSE:\n PostQuitMessage(0);\n break;\n default:\n return DefWindowProc(hWnd, message, wParam, lParam);\n }\n return 0;\n\n}\n\nThe above will get your code to compile, but it will still have some bugs and won't actually run like it should. ", " Let's fix those. ", " \nFirst, your message pump has an extra ; that is preventing it from actually running and keeping your code in an infinite loop. ", " This line:\nwhile (msg.message !", "= WM_QUIT);\n\nShould be (without the semicolon):\nwhile (msg.message !", "= WM_QUIT)\n\nAnd while I'm here, your message pump implementation is kind of weird. ", " GetMessage only returns FALSE when msg.message==WM_QUIT So the outer loop is not needed. ", "Change this:\nwhile (msg.message !", "= WM_QUIT)\n{\n //Check the message queue\n while (GetMessage(&msg, wndHandle, 0, 0))\n {\n TranslateMessage(&msg);\n DispatchMessage(&msg);\n }\n}\n\nto be this:\n//Check the message queue until WM_QUIT is received\nwhile (GetMessage(&msg, wndHandle, 0, 0))\n{\n TranslateMessage(&msg);\n DispatchMessage(&msg);\n}\n\nWhen you actually implement your graphics loop for your DX app, you can change the GetMessage call to PeekMessage and then explicitly check for WM_QUIT then.", "\nYour initWindow is failing for many reasons.", "\nYou are leaving some garbage values in the WNDCLASSEX variable. ", " Change this line:\n WNDCLASSEX wcex;\n\nTo be this:\nWNDCLASSEX wcex = {};\n\nYou are forgetting to set wcex.lpszClassName. ", " Make it this:\n wcex.lpszClassName = L\"DirectXExample\";\n\nAnd then your casting of ANSI strings to (LPCWSTR) is incorrect. ", " To make it easier, here's a fixed version of your initWindow function.", "\nbool initWindow(HINSTANCE hInstance)\n{\n WNDCLASSEX wcex = {};\n\n //Fill in the WNDCLASSEX structure. ", "THis describes how the window will look to the system\n wcex.cbSize = sizeof(WNDCLASSEX); // the size of the structure\n wcex.style = CS_HREDRAW | CS_VREDRAW; // the class style\n wcex.lpfnWndProc = (WNDPROC)WndProc; // the window procedure callback\n wcex.cbClsExtra = 0; // extra bytes to allocate for this calss\n wcex.cbWndExtra = 0; // extra bytes to allocate for this instance\n wcex.hInstance = hInstance; // handle to the application\n wcex.hIcon = LoadIcon(NULL, IDI_APPLICATION); // icon to associate with the application\n wcex.hCursor = LoadCursor(NULL, IDC_ARROW); // the default cursor\n wcex.lpszMenuName = NULL; // the resource name for the menu\n wcex.lpszClassName = L\"DirectXExample\"; // the class name being created\n wcex.hIconSm = 0;\n RegisterClassEx(&wcex);\n\n //Create the window\n wndHandle = CreateWindow(\n L\"DirectXExample\", // the window class to use\n L\"DirectXExample\", // the title bar text\n WS_OVERLAPPEDWINDOW, // the window style\n CW_USEDEFAULT, // the starting x coordinate\n CW_USEDEFAULT, // the starting y coordinate\n 640, //the pixel width of the window\n 480, //the pixel height of the window\n NULL, // the parent window; NULL for desktop\n NULL, // the menu for the application; NULL for none\n hInstance, // the handle to the apllication instance\n NULL); // no values passed to the window\n\n //make sure that the window handle that is created is valid\n if (!", "wndHandle)\n return false;\n\n //Display the window on the screen\n ShowWindow(wndHandle, SW_SHOW);\n UpdateWindow(wndHandle);\n return true;\n}\n\nAnd that should do it.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0008885771967470646, 0.0006846807664260268, 0.0005937468959018588, 0.0012451381189748645, 0.0006272959872148931, 0.0007341925520449877, 0.0006273662438616157, 0.001029687118716538, 0.0010331120574846864, 0.0069935922510921955, 0.0012471891241148114, 0.0009955567074939609, 0.000713772198650986, 0.0011328905820846558, 0.0006893782992847264, 0.0007693266379646957, 0.0007570108282379806, 0.0009119943133555353, 0.0013998489594087005, 0.0012718308717012405, 0.0011598399141803384, 0.0010255137458443642, 0.0010157357901334763, 0.0007562062237411737, 0.0009128590463660657, 0.0009129050304181874, 0.0011038014199584723, 0.001536030089482665, 0.0009532560361549258, 0.0008337687468156219, 0.0010468588443472981, 0.012789905071258545, 0.07448284327983856, 0.0011213216930627823, 0.0007647768943570554, 0.0006651556468568742, 0.0009736119536682963, 0.0012022199807688594, 0.0014670856762677431, 0.0019954426679760218 ]
0.003277
40
[ "Un blitz di Polizia di Stato e Carabinieri è scattato durante la notte nei confronti di una cellula jihadista in pieno centro a Venezia. ", "L’operazione è coordinata dalla Direzione distrettuale antimafia e antiterrorismo della città lagunare. ", "Alla cellula gli investigatori sono arrivati grazie ad una capillare attività di controllo del territorio, svolta in stretto coordinamento da Ps e Cc.", "\n\nTre arresti e un minorenne in stato di fermo\n\nTre persone sono state arrestate mentre per un minorenne è scattato il fermo di polizia. ", "I coinvolti sono tutti cittadini originari del Kosovo e residenti in Italia con un regolare permesso di soggiorno. ", "Eseguite anche 12 perquisizioni: dieci in centro storico a Venezia, una a Mestre e una a Treviso. ", "L’indagine è stata svolta dagli uomini del reparto operativo dei Carabinieri e dal personale dalla Digos di Venezia: dopo aver individuato la cellula, sono state ricostruite le dinamiche relazionali, la radicalizzazione religiosa dei vari soggetti, i luoghi che frequentavano. ", "All’operazione hanno partecipato anche il personale della Direzione centrale della polizia di prevenzione, unità cinofile dei Carabinieri, il nucleo Artificieri della questura di Venezia e personale della Polizia scientifica." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.008975663222372532, 0.007694364991039038, 0.018211619928479195, 0.04958338290452957, 0.005361421965062618, 0.008385106921195984, 0.03588075563311577, 0.0015473173698410392 ]
0.016955
8
[ "> One more question please. ", "When using DateRanges with swish.cgi,\n> where does the range of years in the dropdowns come from?", "\nI think from the module itself. ", "That module was a one hour hack so\nthere's not a lot of control.", "\nYes, I think this is it:\n$CGI->popup_menu(\n-name => \"${name}_year\",\n-default => $year,\n-values => [reverse ($cur_year-8..$cur_year) ],\n);\n--\nBill Moseley\nmoseley@hank.org" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005992233636789024, 0.0076765501871705055, 0.000574455363675952, 0.0008870827732607722, 0.0007731966325081885 ]
0.002102
5
[ "TL;DR: Setting up access control of AWS S3 consists of multiple levels, each with its own unique risk of misconfiguration. ", "We will go through the specifics of each level and identify the dangerous cases where weak ACLs can create vulnerable configurations impacting the owner of the S3-bucket and/or through third party assets used by a lot of companies. ", "We also show how to do it properly and how to monitor for these sorts of issues.", "\n\nA simplified version of this write-up is available on the Detectify blog.", "\n\nQuick background\n\nAmazon Web Services (AWS) provides a service called Simple Storage Service (S3) which exposes a storage container interface. ", "The storage container is called a “bucket” and the files inside the bucket are called “objects”. ", "S3 provides an unlimited storage for each bucket and owners can use them to serve files. ", "Files can be served either privately (via signed URLs) or publicly via an appropriately configured ACL (Access Control List) or ACP (Access Control Policy).", "\n\nAWS also provides a (CDN) service called CloudFront which is often configured to quickly serve S3 hosted files/objects from an optimized CloudFront server as close as possible to the user who is requesting the file.", "\n\nIntroduction\n\nRecently, a few blog posts have mentioned scenarios where the misconfiguration of a S3 bucket may expose sensitive data as well as explaining that the S3 access control lists (ACL) are quite different to the regular user permission setup in AWS which is called Identify Access Management (IAM).", "\n\nHowever, we decided to approach this from a different angle. ", "By identifying a number of different misconfigurations we discovered that we could suddenly control, monitor and break high end websites due to weak configurations of the bucket and object ACLs.", "\n\nDisclaimer\n\nAll instances disclosed below were reported to the affected parties using responsible disclosure policies. ", "In some of the cases, third party companies were involved and we got assistance from the companies affected to contact the vulnerable party.", "\n\nWe do not recommend testing any of the vulnerable scenarios below without prior approval. ", "This is especially important in scenarios where the only way to identify the vulnerability was to actually override files and configurations. ", "We did, however, identify one method to detect one of the vulnerable setups without actually modifying the data. ", "You should still make sure you’re not affecting any party that has not given you written approval.", "\n\nTechnical details\n\nThe different misconfigurations and the impact of each depend on the following criteria:\n\nWho owns the S3 bucket\n\nWhat domain is being used to serve the files from the bucket\n\nWhat type of files are inside the bucket\n\nWe will try to go through all different cases below and explain when they can be created with a vulnerable misconfiguration.", "\n\nIdentification of buckets\n\nTo start off, we need to be able to identify buckets owned by or used by the company. ", "We need the specific bucket’s name to make signed requests to the bucket.", "\n\nIdentifying a bucket depends on the setup and also how the bucket is being reached: The request can go directly to S3, to CloudFront (or any other CDN proxy serving files from the bucket), to the S3 “Static Website” option, or more.", "\n\nSome methods to identify S3-buckets are:\n\nLook at the HTTP-response for a Server -header which says AmazonS3 .", "\n\n-header which says . ", "Look at a random URL that doesn’t exist and see if it gives you a S3-404, either with “Static Website enabled” or not, containing Access Denied or NoSuchKey :\n\n\n\nor : The DNS-entry of the domain might reveal the bucket-name directly if the host points directly to S3.", "\n\nTry accessing the root-URL. ", "If index-listing is enabled (public READ on the Bucket ACL) you will be able to see the bucket-name defined in <Name> -element.", "\n\nWe have identified multiple ways to make an S3-bucket actually reveal itself independent of proxies in front of it. ", "We have notified AWS about these methods and chosen not mention them above.", "\n\nIf you do find a domain that is pointing to a bucket, but cannot get the bucket name, try the actual fully qualified domain name (FQDN) as the bucket name, this is a common setup, having the bucket named as the domain that is pointing to it.", "\n\nIf this doesn’t work, try to:\n\nGoogle the domain and see if any history of it exposes the bucket name.", "\n\nLook at response headers of objects in the bucket to see if they have meta data that reveals the bucket name.", "\n\nLook at the content and see if it refers to any bucket. ", "We’ve seen instances where assets are tagged with the bucket name and a date when they were deployed.", "\n\nBrute-force. ", "Be nice here, don’t shoot thousands of requests against S3 just to find a bucket. ", "Try be clever depending on the name of the domain pointing to it and the actual reason why the bucket exists. ", "If the bucket contains audio files for ACME on the domain media.acme.edu , try media.acme.edu , acme-edu-media , acme-audio or acme-media .", "\n\nIf the response on $bucket.s3.amazonaws.com shows NoSuchBucket you know the bucket doesn’t exist. ", "An existing bucket will either give you ListBucketResult or AccessDenied .", "\n\n(You might also stumble upon AllAccessDisabled , these buckets are completely dead).", "\n\nRemember, just because a bucket is named as the company or similar, that doesn’t mean it is owned by that company. ", "Try find references directly from the company to the bucket to confirm it is indeed owned by the specific company.", "\n\nPermission/predefined groups\n\nFirst, we will explore the different options that can be used for giving access to a requester of a bucket and the objects within:\n\nID / emailAddress\n\nYou are able to give access to a single user inside AWS using either the AWS user ID or their email address. ", "This makes sense if you want to allow a single user to have specific access to the bucket.", "\n\nAuthenticatedUsers\n\nThis is probably the most misunderstood predefined group in AWS S3’s ACL. ", "Having the ACL set to AuthenticatedUsers basically means “Anyone with a valid set of AWS credentials”. ", "All AWS accounts that can sign a request properly are inside this group. ", "The requester doesn’t need to have any relation at all with the AWS account owning the bucket or the object. ", "Remember that “authenticated” is not the same thing as “authorized”.", "\n\nThis grant is likely the most common reason a bucket is found vulnerable in the first place.", "\n\nAllUsers\n\nWhen this grant is set, the requester doesn’t even need to make an authenticated request to read or write any data, anyone can make a PUT request to modify or a GET request to download an object, depending on the policy that is configured.", "\n\nPolicy permissions / ACP (Access Control Policies)\n\nThe following policy permissions can be set on the bucket or on objects inside the bucket.", "\n\nThe ACPs on bucket and objects control different parts of S3. ", "AWS has a list showing exactly what each grant does. ", "There are more cases not mentioned below where you can create specific IAM policies for a bucket, called a bucket-policy. ", "Creating a bucket-policy has its own issues, however, we will only cover the standard setup of ACLs set on buckets and objects.", "\n\nREAD\n\nThis gives the ability to read the content. ", "If this ACP is set on a bucket, the requester can list the files inside the bucket. ", "If the ACP is set on an object, the content can be retrieved by the requester.", "\n\nREAD will still work on specific objects inside a bucket, even if Object Access READ is not set on the complete bucket.", "\n\nWith the following ACL setup inside AWS S3:\n\nBucket-ACL:\n\nObject-ACL:\n\n\n\nWe can still read the specific object:\n\n$ aws s3api get-object --bucket test-bucket --key read.txt read.txt { \"AcceptRanges\": \"bytes\", \"ContentType\": \"text/plain\", \"LastModified\": \"Sun, 09 Jul 2017 21:14:15 GMT\", \"ContentLength\": 43, \"ETag\": \"\\\"1398e667c7ebaa95284d4efa2987c1c0\\\"\", \"Metadata\": {} }\n\nThis means READ can be different for each object, independently of the settings on the bucket.", "\n\nREAD_ACP\n\nThis permission gives the ability to read the access control list of the bucket or object. ", "If this is enabled, you can identify vulnerable assets without trying to modify the content or ACP at all.", "\n\nREAD_ACP will still work on specific objects inside a bucket, even if Object Access READ_ACP is not set on the complete bucket.", "\n\nBucket-ACL:\n\nObject-ACL:\n\n\n\n$ aws s3api get-object-acl --bucket test-bucket --key read-acp.txt { \"Owner\": { \"DisplayName\": \"fransrosen\", ...\n\nThis means READ_ACP can be different for each object, independently of the settings on the bucket.", "\n\nWRITE\n\nThis permission gives the ability to write content. ", "If the bucket has this enabled for a user or group, that party can upload, modify and create new files.", "\n\nWRITE will not work on specific objects inside a bucket, if Object Access WRITE is not set on the complete bucket:\n\nBucket-ACL:\n\nObject-ACL:\n\n\n\n$ aws s3api put-object --bucket test-bucket --key write.txt --body write.txt An error occurred (AccessDenied) when calling the PutObject operation: Access Denied\n\nHowever, if WRITE is set on the bucket, all objects will obey and will not be able to decide individually if they should be writable or not:\n\nBucket-ACL:\n\nObject-ACL:\n\n\n\n$ aws s3api put-object --bucket test-bucket --key write.txt --body write.txt { \"ETag\": \"\\\"1398e667c7ebaa95284d4efa2987c1c0\\\"\" }\n\nThis means, WRITE can be verified on the bucket in two ways, either by uploading a random file, or by modifying an existing one. ", "Modifying an existing file is destructive and should not be done at all. ", "Below we will explain a way to check this without doing a destructive call, by triggering an error in between the access control check and the actual modification of the file.", "\n\nWRITE_ACP\n\nThis permission gives the ability to modify the permission ACL of a bucket or object.", "\n\nIf the bucket has this enabled for a user or a group, that party can modify the ACL of the bucket which is extremely bad. ", "Having WRITE_ACP on a bucket will completely expose it to be controlled by the party having the ACP set, meaning any content of any object can now be controlled by the party. ", "The attacker might not be able to READ every object already in the bucket, but they can still fully modify the existing objects. ", "Also, the initial owner of the S3-bucket will get an Access Denied in the new AWS S3-console when the attacker is claiming ownership of it when removing the READ-access on the bucket.", "\n\nFirst, no access to READ_ACP or WRITE :\n\n$ aws s3api get-bucket-acl --bucket test-bucket An error occurred (AccessDenied) when calling the GetBucketAcl operation: Access Denied $ aws s3api put-object --bucket test-bucket --key write-acp.txt --body write-acp.txt An error occurred (AccessDenied) when calling the PutObject operation: Access Denied\n\nThen we try to change the bucket ACL:\n\n$ aws s3api put-bucket-acl --bucket test-bucket --grant-full-control emailaddress=frans@example.com && echo \"success\" success\n\nThe initial owner of the bucket will now see this:\n\n(Being the owner, they will still be able to modify the policy of the bucket, but this is a weird case anyway.)", "\n\nWe can now control everything:\n\n$ aws s3api get-bucket-acl --bucket test-bucket { ... \"Grants\": [ { \"Grantee\": { \"Type\": \"CanonicalUser\", \"DisplayName\": \"frans\", \"ID\": \"...\" }, \"Permission\": \"FULL_CONTROL\" $ aws s3api put-object --bucket test-bucket --key write-acp.txt --body write-acp.txt { \"ETag\": \"\\\"1398e667c7ebaa95284d4efa2987c1c0\\\"\" }\n\nA very interesting thing is that WRITE_ACP will actually still work on specific objects inside a bucket even if Object Access WRITE_ACP is not set on the complete bucket:\n\nBucket-ACL:\n\nObject-ACL:\n\n\n\n$ aws s3api put-object-acl --bucket test-bucket --key write-acp.txt --grant-write-acp uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers && echo \"success\" success\n\nAlso, the opposite of WRITE applies here, having WRITE_ACP on the bucket, doesn’t mean you directly have WRITE_ACP on an object:\n\nBucket-ACL:\n\nObject-ACL:\n\n\n\n$ aws s3api put-object-acl --bucket test-bucket --key write-acp.txt --grant-full-control emailaddress=frans@example.com An error occurred (AccessDenied) when calling the PutObjectAcl operation: Access Denied\n\nHowever, by performing the following steps when having WRITE_ACP on the bucket you will still gain full access of the content of any object, by replacing the existing object with new content:\n\nModify the bucket ACL: $ aws s3api put-bucket-acl --bucket test-bucket --grant-full-control emailaddress=frans@example.com && echo \"success\" success Modify the object (This changes you to the owner of the object): $ aws s3api put-object --bucket test-bucket --key write-acp.txt --body write-acp.txt { \"ETag\": \"\\\"1398e667c7ebaa95284d4efa2987c1c0\\\"\" } Modify ACP of the object again: $ aws s3api put-object-acl --bucket test-bucket --key write1.js --grant-full-control emailaddress=frans@example.com && echo \"success\" success\n\nSince WRITE still needs to be set on the bucket, you cannot upgrade a WRITE_ACP on an object to give yourself WRITE on the same object:\n\n$ aws s3api put-object-acl --bucket test-bucket --key write-acp.txt --grant-write-acp uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers --grant-write uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers --grant-read-acp uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers --grant-read uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers && echo \"success\" success\n\nBucket-ACL:\n\nObject-ACL:\n\n\n\nThis will still give you:\n\n$ aws s3api put-object --bucket test-bucket --key write-acp.txt --body write-acp.txt An error occurred (AccessDenied) when calling the PutObject operation: Access Denied\n\nHowever, you can still remove all ACPs on the object, making the object completely private, which will stop it being served, giving a 403 Forbidden .", "\n\nWRITE_ACP can unfortunately only be verified by testing writing a new ACP on a bucket or object. ", "Modifying the existing one is of course destructive and should not be done without approval. ", "We have not found a non-destructive way of testing this ACP.", "\n\nFULL_CONTROL\n\nThis is the policy that combines all other policies. ", "However, WRITE will still not work on an object unless the bucket has it set, even if this permission is set on an object.", "\n\nVulnerable scenarios\n\nThe following scenarios are cases where the company can be affected.", "\n\n1. ", "Bucket used on a domain owned by the company\n\nYou found a bucket which is served by a subdomain or domain of the company.", "\n\nYou should test for:\n\nBUCKET READ\n\nListing files in the bucket. ", "Sensitive information might be exposed.", "\n\nListing files in the bucket. ", "Sensitive information might be exposed. ", "BUCKET READ-ACP\n\nLet’s look at the ACP and see if we can identify the bucket being vulnerable without actually trying anything. ", "If we see that AllUsers or AuthenticatedUsers has WRITE_ACP set, we know we can gain full control over the bucket, without doing anything else.", "\n\nLet’s look at the ACP and see if we can identify the bucket being vulnerable without actually trying anything. ", "If we see that or has set, we know we can gain full control over the bucket, without doing anything else. ", "BUCKET WRITE (Simulate using invalid-MD5 hack)\n\nIf we can upload a new file to the bucket. ", "This also tells us we can overwrite any object in the bucket. ", "However, if we want to avoid uploading anything, we can try the following hack, not uploading anything but still see that we are able to do it:\n\nWhen making a signed PUT request to a bucket, we have the option to add a Content-MD5 telling AWS the checksum of the content being uploaded. ", "It turns out that this check is happening inside the following flow: Check that the user has access writing the file. ", "Check that the MD5-checksum is matching the content. ", "Upload the file. ", "Since the checksum control happens after we know that we have access to the file, but before actually modifying it, we do not need to write to the file to know that we are able to. ", "The following bash code simulates this scenario: # use this by: ./put-simulate.sh test-bucket/write.txt AWS_ACCESS_KEY_ID=\"***\" AWS_SECRET_ACCESS_KEY=\"***\" AWS_S3_BUCKET=\"$(echo \"$1\" | cut -d \"/\" -f1)\" AWS_PATH=\"/$(echo \"$1\" | cut -d \"/\" -f2-)\" date=$(date +\"%a, %d %b %Y %T %z\") acl=\"x-amz-acl:private\" content_type='application/octet-stream' # we create a checksum of the word \"yepp\", but will upload a file with the content \"nope\". ", "content_md5=$(openssl dgst -md5 -binary <(echo \"yepp\") | openssl enc -base64) string=\"PUT\n\n${content_md5}\n\n${content_type}\n\n${date}\n\n${acl}\n\n/${AWS_S3_BUCKET}${AWS_PATH}\" signature=$(echo -en \"${string}\" | openssl sha1 -hmac \"${AWS_SECRET_ACCESS_KEY}\" -binary | base64) echo \"PUT to S3 with invalid md5: ${AWS_S3_BUCKET}${AWS_PATH}\" result=$(curl -s --insecure -X PUT --data \"nope\" \\ -H \"Host: ${AWS_S3_BUCKET}.s3.amazonaws.com\" \\ -H \"Date: $date\" \\ -H \"Content-Type: ${content_type}\" \\ -H \"Content-MD5: ${content_md5}\" \\ -H \"$acl\" \\ -H \"Authorization: AWS ${AWS_ACCESS_KEY_ID}:${signature}\" \\ \"https://${AWS_S3_BUCKET}.s3.amazonaws.com${AWS_PATH}\") if [ \"$(echo ${result} | grep 'The Content-MD5 you specified did not match what we received')\" !", "= \"\" ]; then echo \"SUCCESS: ${AWS_S3_BUCKET}${AWS_PATH}\" exit 0 fi echo \"$result\" exit 1 On a bucket we can upload to, this will result in: $ ./put-simulate.sh test-bucket/write.txt PUT to S3 with invalid md5: test-bucket/write.txt SUCCESS: test-bucket/write.txt On a bucket we cannot upload to, this will result in: $ ./put-simulate.sh test-secure-bucket/write.txt PUT to S3 with invalid md5: test-secure-bucket/write.txt <?", "xml version=\"1.0\" encoding=\"UTF-8\"?", "> <Error><Code>AccessDenied</Code><Message>Access Denied</Message> We will therefore never modify the content, only confirm we can do it. ", "This unfortunately only works on WRITE on objects, not on WRITE_ACP as far as we know.", "\n\n(Simulate using invalid-MD5 hack) If we can upload a new file to the bucket. ", "This also tells us we can overwrite any object in the bucket. ", "However, if we want to avoid uploading anything, we can try the following hack, not uploading anything but still see that we are able to do it: When making a signed PUT request to a bucket, we have the option to add a telling AWS the checksum of the content being uploaded. ", "It turns out that this check is happening inside the following flow: BUCKET WRITE-ACP\n\nThe most dangerous one. ", "Fully upgradable to full access of the bucket. ", "Destructive call. ", "Be careful. ", "The only way to do this one properly is to first figure out how the bucket behaves to not break any current ACP. ", "Remember that you can still have access to WRITE_ACP even though you do not have access to READ_ACP .", "\n\nAPI-documentation reference\n\nThe most dangerous one. ", "Fully upgradable to full access of the bucket. ", "Destructive call. ", "Be careful. ", "The only way to do this one properly is to first figure out how the bucket behaves to not break any current ACP. ", "Remember that you can still have access to even though you do not have access to . ", "API-documentation reference OBJECT READ\n\nWe can try to read the content of files we are interested in found by BUCKET READ.", "\n\nWe can try to read the content of files we are interested in found by BUCKET READ. ", "OBJECT WRITE\n\nNo need to test this one, since BUCKET WRITE decides fully. ", "If BUCKET WRITE gives an error the object will not be writable and if BUCKET WRITE is successful, the object will always be writable.", "\n\nHowever, if the company using the bucket has an application where users can upload files, look at the implementation of how they make the actual file upload to S3. ", "If the company is using a POST Policy upload, specifically look in the policy at the Condition Matching of the $key and the Content-type . ", "Depending on if they use starts-with you might be able to modify the content type to HTML/XML/SVG or similar, or change the location of the file being uploaded.", "\n\nNo need to test this one, since BUCKET WRITE decides fully. ", "If BUCKET WRITE gives an error the object will not be writable and if BUCKET WRITE is successful, the object will always be writable. ", "However, if the company using the bucket has an application where users can upload files, look at the implementation of how they make the actual file upload to S3. ", "If the company is using a POST Policy upload, specifically look in the policy at the Condition Matching of the and the . ", "Depending on if they use you might be able to modify the content type to HTML/XML/SVG or similar, or change the location of the file being uploaded. ", "OBJECT WRITE-ACP\n\nWe can try modifying the ACP of the specific object. ", "It will not enable us to modify the content, but only the access control of the file, giving us the ability to stop files from working publicly.", "\n\nAPI-documentation reference\n\nPossible vulnerabilities:\n\nReflected XSS . ", "If we can do BUCKET READ we can list assets and might find vulnerable objects, like a vulnerable SWF served on the company’s domain.", "\n\n. ", "If we can do BUCKET READ we can list assets and might find vulnerable objects, like a vulnerable SWF served on the company’s domain. ", "Stored XSS / asset control . ", "If we can do BUCKET WRITE or BUCKET WRITE-ACP (also meaning OBJECT WRITE) we can modify existing content or create new content, being able to modify javascript/css-files or by uploading a new HTML-file.", "\n\n. ", "If we can do BUCKET WRITE or BUCKET WRITE-ACP (also meaning OBJECT WRITE) we can modify existing content or create new content, being able to modify javascript/css-files or by uploading a new HTML-file. ", "Denial of server . ", "If we can modify the ACP of objects using OBJECT WRITE-ACP, we can prevent objects from loading publicly.", "\n\n. ", "If we can modify the ACP of objects using OBJECT WRITE-ACP, we can prevent objects from loading publicly. ", "Information disclosure . ", "If we can list objects we might find sensitive information.", "\n\n. ", "If we can list objects we might find sensitive information. ", "RCE. ", "If the bucket contains modifiable executables this can result in Remote Code Execution (RCE) depending on where the executables are being used and if/by whom they are being downloaded.", "\n\n2. ", "Assets from bucket used by the company\n\nAdditional Disclaimer: The assets being used by a company might not always be owned by the company. ", "You need to be extremely careful here not to attack anyone other than the intended target who has given you permission to test.", "\n\nThere are projects trying to automate this, such as Second Order. ", "However, Second Order only checks for assets being referenced in the HTTP-response, files being loaded dynamically are not being checked. ", "Below is a quick example of also checking for dynamically loaded assets using Headless Chrome.", "\n\nFirst, start the headless version on port 9222:\n\n\"/Applications/Google Chrome.app/Contents/MacOS/Google Chrome\" --remote-debugging-port=9222 --disable-gpu --headless\n\nWe can then use a small script. (", "context.js is borrowed from the HAR-capturer-project since that one properly closes tabs)\n\nconst CDP = require('chrome-remote-interface'); const URL = require('url').URL; const Context = require('./context'); async function log_requests(orig_url) { const context = new Context({}); process.on('SIGTERM', function () { context.destroy(); }); try { const client = await context.create(); const {Network, Page} = client; const ourl = new URL('http://' + orig_url); const ohost = ourl.host; Network.requestWillBeSent((params) => { if (params.request.url.match('^data:')) { return; } const url = new URL(params.request.url); console.log(ohost + ':' + url.host + ':' + params.request.url); }); await Promise.all([Network.enable(), Page.enable()]); await Page.navigate({url: 'http://' + orig_url}); await Page.loadEventFired(); await Page.navigate({url: 'https://' + orig_url}); await Page.loadEventFired(); } finally { await context.destroy(); } } const url = process.argv.slice(2)[0]; log_requests(url);\n\nWhich will give us all assets on the page which we then can use to figure out if they are served from S3 or not:\n\nYou should test for:\n\nPossible vulnerabilities:\n\nStored XSS / asset control . ", "If we can do BUCKET WRITE or BUCKET WRITE-ACP (also meaning OBJECT WRITE) we can modify existing content or create new content, being able to modify javascript/css-files or similar. ", "This can be extremely bad depending on where the assets are being used, such as on login pages or on main pages.", "\n\n. ", "If we can do BUCKET WRITE or BUCKET WRITE-ACP (also meaning OBJECT WRITE) we can modify existing content or create new content, being able to modify javascript/css-files or similar. ", "This can be extremely bad depending on where the assets are being used, such as on login pages or on main pages. ", "Denial of server . ", "If we can modify the ACP of objects using OBJECT WRITE-ACP, we can prevent objects from loading publicly.", "\n\n. ", "If we can modify the ACP of objects using OBJECT WRITE-ACP, we can prevent objects from loading publicly. ", "RCE. ", "If assets are modifiable executables this can result in Remote Code Execution (RCE) depending on where the executables are being used and if/by whom they are being downloaded.", "\n\n3. ", "Bucket randomly found, indications it’s owned by the company\n\nThis one is a bit complicated. ", "You need to have clear evidence and proof that the bucket is indeed owned by the company. ", "Try to find references from the company pointing to this bucket, such as references on their website, CI logs or open source code.", "\n\nYou should test for:\n\nPossible vulnerabilities:\n\nStored XSS / asset control . ", "If we can do BUCKET WRITE or BUCKET WRITE-ACP (also meaning OBJECT WRITE) we can modify existing content or create new content, being able to modify javascript/css-files. ", "However, in this case we don’t know where the files are being used so we cannot know how big the impact is without talking with the company.", "\n\n. ", "If we can do BUCKET WRITE or BUCKET WRITE-ACP (also meaning OBJECT WRITE) we can modify existing content or create new content, being able to modify javascript/css-files. ", "However, in this case we don’t know where the files are being used so we cannot know how big the impact is without talking with the company. ", "Denial of server . ", "If we can modify the ACP of objects using OBJECT WRITE-ACP, we can prevent objects from loading publicly. ", "We do not know in this case if they are however.", "\n\n. ", "If we can modify the ACP of objects using OBJECT WRITE-ACP, we can prevent objects from loading publicly. ", "We do not know in this case if they are however. ", "Information disclosure . ", "If we can list objects we might find sensitive information. ", "Only do this if you have confirmed that the bucket is indeed connected to the company you have approval from.", "\n\n. ", "If we can list objects we might find sensitive information. ", "Only do this if you have confirmed that the bucket is indeed connected to the company you have approval from. ", "RCE. ", "If the bucket contains modifiable executables this can result in Remote Code Execution (RCE) depending on where the executables are being used and if/by whom they are being downloaded.", "\n\nResults\n\nDuring this research we were able to confirm we could control assets on high profile websites. ", "We reported these issues directly and were able to get them solved quickly. ", "The following categories of websites were affected:\n\nPassword managers\n\nDNS/CDN providers\n\nFile storage\n\nGaming\n\nAudio and video streaming providers\n\nHealth tracking\n\nWe identified vulnerable assets placed on the login pages of some companies.", "\n\nIn some cases, vulnerable assets were loaded using Google Tag Manager (gtm.js) however, they did not sandbox the third parties properly, running the third party assets directly on the domain itself (not by sandboxing them using www.googletagmanager.com )\n\nWe got in touch with some third party providers, both directly but also with help from the affected companies, quickly identifying the issue and solving it very fast.", "\n\nHow to stay safe\n\nThe following processes can prevent this issue from happening:\n\nSandbox third party assets. ", "As soon as you are in need of third party assets, through gtm.js or similar, try isolating the scripts either by using the iframe provided by Google Tag Manager or by placing them on a separate domain (not only using a subdomain). ", "Also ask your provider how they handle access control on their files, and if they are using S3 for file serving. ", "If you have your own buckets, take a look through the bucket ACLs to verify WRITE and WRITE_ACP are only set on specific users, never on groups such as AllUsers or AuthenticatedUsers . ", "The hardest fix is to prevent any object in any bucket from having WRITE_ACP , test yourself by doing a aws s3api put-object-acl with the appropriate settings using a restricted AWS-user against your own objects in your buckets. ", "You might need to update the ACL on every object to mitigate this completely. ", "Take a look and see how you are uploading objects to S3 buckets and make sure you set the proper ACLs on both buckets and objects. ", "Do not use a secret bucket name as a form of Security through Obscurity. ", "Treat the bucket name like it is already public information.", "\n\nOn a final note\n\nIt’s clear after this research that this problem is widespread and hard to identify and completely solve, especially if the company uses a huge amount of buckets, created by different systems. ", "WRITE_ACP is the most dangerous one for reasons mentioned, both on buckets and objects.", "\n\nAn interesting detail when manually uploading files to S3 using Cyberduck, changing the access control on a file looks like this:\n\nPretty easy to accidentally pick the wrong one there.", "\n\nUntil next time.", "\n\nWhat Detectify scans for\n\nDetectify tests web applications for the following S3 misconfiguration vulnerabilities with a severity range between 4.4-9 on the CVSS scale:\n\nAmazon S3 bucket allows for full anonymous access\n\nAmazon S3 bucket allows for arbitrary file listing\n\nAmazon S3 bucket allows for arbitrary file upload and exposure\n\nAmazon S3 bucket allows for blind uploads\n\nAmazon S3 bucket allows arbitrary read/writes of objects\n\nAmazon S3 bucket reveals ACP/ACL" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0007216837839223444, 0.0005862550460733473, 0.0005494168726727366, 0.0005703456117771566, 0.0006180414929986, 0.0007845123764127493, 0.0006730298046022654, 0.0006026016199029982, 0.0006264866678975523, 0.0006039614672772586, 0.0005484669236466289, 0.00120863551273942, 0.0005971839418634772, 0.0005310546839609742, 0.0005551464855670929, 0.0005617860588245094, 0.0005913869827054441, 0.0007627066224813461, 0.0006640219362452626, 0.0005897532682865858, 0.0006347954622469842, 0.0006875742110423744, 0.0007539266953244805, 0.0006987735978327692, 0.0011888648150488734, 0.004961951170116663, 0.0005761796492151916, 0.0006636976613663137, 0.0006299588712863624, 0.0008408380672335625, 0.0008191960514523089, 0.0007021416095085442, 0.0007114188629202545, 0.0005610256339423358, 0.0012091952376067638, 0.007019180338829756, 0.001211592578329146, 0.0010237039532512426, 0.06677014380693436, 0.014347782358527184, 0.004981485195457935, 0.0007106588454917073, 0.00065570481820032, 0.0006301527027972043, 0.0008706909138709307, 0.0007951000588946044, 0.0008724048966541886, 0.0006436960538849235, 0.0008639925508759916, 0.00085241231136024, 0.0006464826292358339, 0.0006842470029368997, 0.000678650161717087, 0.0008005457348190248, 0.0007138174260035157, 0.0006478377035818994, 0.000735182489734143, 0.0005816349876113236, 0.0008158179698511958, 0.0006264941766858101, 0.0008008638978935778, 0.0010410681134089828, 0.0007261269493028522, 0.0005430745659396052, 0.000860187690705061, 0.0011691114632412791, 0.0006062406464479864, 0.0009069917141459882, 0.0018712272867560387, 0.0012006310280412436, 0.000623460509814322, 0.0011426263954490423, 0.004004292655736208, 0.0008222985779866576, 0.0009146141237579286, 0.0010331548983231187, 0.0012961926404386759, 0.006930231582373381, 0.0007559468504041433, 0.0006961394101381302, 0.0006937998114153743, 0.0008326569222845137, 0.0009904480539262295, 0.0005549753550440073, 0.0009391896310262382, 0.001975820166990161, 0.0007895235321484506, 0.0007369908853434026, 0.0008340791100636125, 0.0007369908853434026, 0.0007265827152878046, 0.0007676489185541868, 0.0006682481034658849, 0.0006931158131919801, 0.0008588138152845204, 0.0010154693154618144, 0.0007272765506058931, 0.0006322691915556788, 0.0007102370145730674, 0.0008371238363906741, 0.0006461114971898496, 0.0010586138814687729, 0.001396614476107061, 0.0019539031200110912, 0.0006190646672621369, 0.0008660585153847933, 0.000642721017356962, 0.0009199419291689992, 0.0010154693154618144, 0.0007663030410185456, 0.0007520405924879014, 0.002971661277115345, 0.015127837657928467, 0.0008868867298588157, 0.0010931309079751372, 0.0007770623196847737, 0.0006452998495660722, 0.002971661277115345, 0.015127837657928467, 0.0008868867298588157, 0.0010931309079751372, 0.0009190036216750741, 0.0005771027063019574, 0.0005726554663851857, 0.0007949307910166681, 0.0011100554838776588, 0.0006480297306552529, 0.0006197477341629565, 0.0005803541280329227, 0.0006498375441879034, 0.0011100554838776588, 0.0006480297306552529, 0.0005973672959953547, 0.0005520325503312051, 0.000773470033891499, 0.0006544860661961138, 0.0007553574396297336, 0.0006430706125684083, 0.0021375217474997044, 0.0006430706125684083, 0.000702981895301491, 0.0008294113213196397, 0.0021375217474997044, 0.0008294113213196397, 0.0030287462286651134, 0.001013335888274014, 0.0021375217474997044, 0.001013335888274014, 0.0006579426699317992, 0.0005665022181347013, 0.0021375217474997044, 0.0005665022181347013, 0.001310044783167541, 0.0011850952869281173, 0.0011855863267555833, 0.0006475623813457787, 0.0007521448424085975, 0.0006170712877064943, 0.0006404515588656068, 0.0006287639262154698, 0.0007517661433666945, 0.0019999155774712563, 0.000805672025308013, 0.0006536912405863404, 0.0021375217474997044, 0.000805672025308013, 0.0006536912405863404, 0.0030287462286651134, 0.001013335888274014, 0.0021375217474997044, 0.001013335888274014, 0.001310044783167541, 0.0007831148686818779, 0.00117425003554672, 0.000801958201918751, 0.0009388129110448062, 0.0005973359802737832, 0.0007150808232836425, 0.0007960667135193944, 0.0005508436588570476, 0.0021375217474997044, 0.0007960667135193944, 0.0005508436588570476, 0.0030287462286651134, 0.001013335888274014, 0.0006011271034367383, 0.0021375217474997044, 0.001013335888274014, 0.0006011271034367383, 0.0006579426699317992, 0.0005665022181347013, 0.0006224291864782572, 0.0021375217474997044, 0.0005665022181347013, 0.0006224291864782572, 0.001310044783167541, 0.0011850952869281173, 0.000533715239726007, 0.000525852432474494, 0.0006071722600609064, 0.0005648340447805822, 0.0006648735725320876, 0.0007351751555688679, 0.0006242382223717868, 0.0012138427700847387, 0.008715275675058365, 0.001231565373018384, 0.0029375425074249506, 0.0007934448076412082, 0.000842639128677547, 0.0005701537593267858, 0.0008803793461993337, 0.0006220825598575175, 0.0008237090078182518, 0.001716639962978661 ]
0.001577
215