text
stringlengths
0
3.78M
meta
dict
Q: Can I apply the same animation to multiple text fields? I'm creating a method that shakes my UITextField and use POP to do the heavy lifting. - (void)textFieldErrorAnimation { POPSpringAnimation *shake = [POPSpringAnimation animationWithPropertyNamed:kPOPLayerPositionX]; shake.springBounciness = 10; shake.velocity = @(2000); [self.value.layer pop_addAnimation:shake forKey:@"shakeValue"]; [self.year.layer pop_addAnimation:shake forKey:@"shakeYear"]; } It seems to be working when I apply the animation to the object "value" but not when it's applied to "value" and "year" at the same time. I know I can create a shake2, shake3 etc so basically one for each textField but it seems strange that i'd need to do that. Any ideas how I can reuse this animation? A: Of course you can. What I really do about, this kind of reusing animations is creating a method that returns the animation and setting the name and key values correctly. - (POPSpringAnimation *)popShakeAnimation { POPSpringAnimation *shakeAnimation = [POPSpringAnimation animationWithPropertyNamed:kPOPLayerPositionX]; shakeAnimation.velocity = @2000; shakeAnimation.springBounciness = 20; shakeAnimation.name = @"shakeAnimation"; return shakeAnimation; } and then whenever I need to shake any views I simply add them to the views' layer. [self.textfield001.layer pop_addAnimation:[self popShakeAnimation] forKey:@"shakeAnimation"]; [self.textfield002.layer pop_addAnimation:[self popShakeAnimation] forKey:@"shakeAnimation"]; [self.textfield003.layer pop_addAnimation:[self popShakeAnimation] forKey:@"shakeAnimation"]; Just remember to set key values to the name you've created with the animation in the first place.
{ "pile_set_name": "StackExchange" }
Raghavendra Chandrashekar Raghavendra Chandrashekar (born 9 July 1982) is an Indian cricket player, who played for Karnataka in first-class cricket between 2004 and 2006. References Category:1982 births Category:Living people
{ "pile_set_name": "Wikipedia (en)" }
- Skinny Dip are closing their store on the Hayes Arcade. Their final day trading will be May 8th. Designer watch brand Daniel Wellington are expected to open their 5th UK store from this unit (KLG04). This will be the brands first UK venture outside of London. - Yankee Candle are rumoured to be opening in unit LG91, which is the unit previously occupied by Crocs. I just read this. My opinion on marketing/comms people has taken a knock recently after seeing some shoddy work (not where I work incidentally). But this is pretty shocking given this is an asset worth upwards of £600 million. Here are some quotes: brochure wrote:A new train station has beenconfirmed for Bow Street, Wales anda total investment of £3.95m from theDepartment for Transport which is setto be complete by March 2020. First of all, that sentence isn't proper English. Second, why are they telling us about a small station in Ceredigion, around 100 miles or so from Cardiff? brochure wrote:Works are progressing on phasestwo and three of the 265,976 sq ftscheme which will include a new£120m headquarters for BBCCymru Wales, and are scheduledfor completion by 2018 Erm, what scheme? I know what it is, but the brochure just says this without saying the scheme... brochure wrote:After 10 years of deliberation, Cardiff’sbus station plans have been approvedand works are due to start in April 2018.The mixed use development is set toinclude a 14-stand bus station, retailspace as well as offices and apartments. Who on earth thought it would be good in a marketing brochure to talk about 10 years of deliberations being required for a bus station? Did noone at Intu spot this? Noone at St Davids management team? Its just shoddy and if I were an investor at Intu, I'd be disappointed. And a manager, ashamed. Following the successful arrival of Stradivarius, Inditex are opening their sixth UK Bershka store in Cardiff. At present Bershka currently operates four stores in London and one in Brighton. Bershka is one of Inditex's key facias in Europe and is most certainly a coup for Cardiff. A planning application has been submitted for the unit previously occupied by Mothercare (UG01/02). A great location for the brand directly opposite Stradivarius and alongside New Look & H&M! Sadly, Bershka will not be making use of the Mezzanine floor and therefore the store will be over one level. LandSec/Intu have done a great job developing their relationship with Inditex in order to secure these brands in Cardiff. It would be great to see a Zara Home store in one of the units outside John Lewis on the Upper Grand Arcade and potentially Pull & Bear in the unit once occupied by DV8. The lease for unit LG39 (Fossil) is currently being advertised. The unit comprises of 2,179 sq ft of retail space and there's 5 years left on the lease. The adjoining unit LG40 (which Godiva was once negotiating) is also still available.
{ "pile_set_name": "Pile-CC" }
Samhain Publishing On a hunt to save her sister, the last thing Beri O’Dell needs is love. Aren’t demons bad enough? Beri O’Dell is investigating paranormal creatures because she wants to know what she is. Taller and stronger than most men, she astral projects and can peel through dimensional layers to see the creatures and spirits beyond.he once helped her foster sister, Detective Elsa Remington, track down killers in Jacksonville, Florida, but stopped when a nasty fire elemental turned her strength against her. Now, she finds herself pulled back when something steals Elsa’s soul and puts her into a coma. With little time to spare, Beri searches for the reason behind her sister’s coma. She has help in her spirit guides Fred and Phro, but others come along for the ride, including a pyro-nervous witch, and an androgynous necromancer. The last thing Beri needs is to fall in love with a mysterious stranger. But the handsome Minoan warrior Nikolos knows what creature she’s after because he’s battled it before. It’s bad. Really, really bad. He calls it the Dweller on the Threshold. Warning: Contains a worried heroine with no time, a witch with fire problems, a pissed-off necromancer, a trapped goddess, and a damned sexy, but scary, warrior. Throw in bloody battles, mass-murderer history lessons and a bit of sexy time and you get the start of Beri’s new life. Review: After my success with Erica Hayes Redemption, I decided to dive into another Paranormal/UF book. Dweller on the Threshold looked like an interesting blend of creepy and magical, and it was. The romance is kept on the back burner, and instead the focus is on finding and taking down the dreaded Dweller on the Threshold. There are people dropping like flies as their souls are sucked out of their bodies, demon battles galore, and an ancient Minoan warrior who possesses both brawn and good-looks. I liked the Greek mythology that was incorporated into the story, as well as the concept of guardians, ghostly protectors who watch over their charges, usually invisible and undetected for normal people. Beri, the protagonist, isn’t normal. I found Beri an interesting protagonist. She knows that she’s different, but she doesn’t know why. She can see her guardians – the serious Fred, who was killed in a fire when he was on the cusp of manhood, and Phro, who claims to be the Goddess of Love. Yes, that Goddess of Love. Beri wonders what motivates both of them to stay with her, especially the beautiful Phro. Surely she has better things to do than follow a towering, streaky haired freak of a woman around year after year. I am still wondering what Fred’s deal is, because it’s obvious there is more to him being with Beri than meets the eye. Maybe we’ll find out what’s going on with him in the next book of the series? Where does he keep disappearing to, and can he be completely trusted? With so many dangers popping up to threaten her life, I believe these are questions that Beri needs to have answered stat. Beri has been searching for other answers for her entire life. Who is she? What is she? After being bounced around from foster home to foster home, she’s developed a thick skin, and she prefers to keep others at a safe distance. The only person she is close to is Elsa, whose parents took Beri in before weird things started happening and they became too terrified of her to keep her round. Now, the two women consider themselves sisters, and when Elsa interrupts a paranormal hunting trip in the swamp, Beri is obligated to help her sister, a police detective, with the case she’s working on. Even though things ended disastrously the last time she tried to help, and Beri ended up bathed in blood and detached body parts. Ugh. Back in the city, Beri learns that Elsa is in a coma, and things don’t look good. When she can’t see Elsa’s soul, Beri knows that she has to figure out what she was working on. As danger mounts, and more mysteries are revealed, Beri has no choice but to trust Blyth, a flaky witch, and Nikolas, an old, old being who is surrounded with the darkness of hundreds and hundreds of trapped souls. And, oh, yeah, even though he’s older than dirt, he’s a handsome, hulking warrior, and Beri can’t help but be attracted to him and all of his secrets. I loved Nicolas’ tragic past, and all of the references to Greek mythology. While some of the world-building was confusing or non-existent, there was enough demon slaying and demon attacking action to distract me from most of my hang-ups about the world Beri resides in. Just throw some magic, some ugly monsters, and a kick-ass heroine into the mix, and I’m a pretty happy camper. The action and the quest to find and defeat the Dweller drive this story, more so than the romance or any other element, and I didn’t mind one bit. What did kind of bug me? The non-ending! [Rinda Elliott] Let’s see, I’ve been married forever to my best friend. I’m crazy about my kids and I love to read above all things. I prefer genre fiction—mostly urban fantasy and romance. My other loves are movies and shows like The Walking Dead, Lost Girl, Veronica Mars, Buffy and Firefly. (Yeah, the last three are long gone, but I still miss them!) I love to cook and have a sincere respect for red wine. Hobbies? Making wine (I share the process in photographs on my website.) and sometimes playing video games. Last year, I took up gardening because of the cooking and my love for fresh vegetables. [Manga Maniac Cafe] Can you tell us a little about Dweller on the Threshold? [Rinda Elliott] Here’s the official blurb: Beri O’Dell is investigating paranormal creatures because she wants to know what she is. Taller and stronger than most men, she astral projects and can peel through dimensional layers to see the creatures and spirits beyond. She once helped her foster sister, Detective Elsa Remington, track down killers in Jacksonville, Florida, but stopped when a nasty fire elemental turned her strength against her. Now, she finds herself pulled back when something steals Elsa’s soul and puts her into a coma. With little time to spare, Beri searches for the reason behind her sister’s coma. She has help in her spirit guides Fred and Phro, but others come along for the ride, including a pyro-nervous witch, and an androgynous necromancer. The last thing Beri needs is to fall in love with a mysterious stranger. But the handsome Minoan warrior Nikolos knows what creature she’s after because he’s battled it before. It’s bad. Really, really bad. He calls it the Dweller on the Threshold. [Manga Maniac Cafe] How did you come up with the concept and the characters for the story? [Rinda Elliott] I started Dweller on the Threshold years ago. I had written quite a few romances and though editors seemed to like them, most told me my heroines were too strong. Beri, the heroine of Dweller on the Threshold, sort of stormed into my life. I started writing about her for fun and everything really gelled when I came upon this theosophical concept of the dweller on the threshold. People who follow theosophy believe that a person is reincarnated over and over until they learn all life lessons. When they reach their last incarnation, they can only discover true enlightenment when they vanquish the karmic gathering of all their past lives. I thought what if that karmic gathering came from many evil lifetimes and it found a way to physically manifest? Then, I thought about Beri and how she’d deal with such a thing. Dweller on the Threshold was born. [Manga Maniac Cafe] What three words best describe Beri? [Rinda Elliott] Unique, impatient, and caring. [Manga Maniac Cafe] Name one thing Nikolos is never without. [Rinda Elliott] I can name two. His ankh and his dagger. [Manga Maniac Cafe] What three things will you never find in Beri’s bedroom? [Rinda Elliott] She regrets losing control to a fire elemental and killing someone in a horrific manner. He was a bad guy, but knowing she’s capable of that kind of violence terrifies her. [Manga Maniac Cafe] What are your greatest creative influences? [Rinda Elliott] Other writers I admire, music and art. I make collages of images for every book. I also put together soundtracks. [Manga Maniac Cafe] What three things do you need in order to write? [Rinda Elliott] This one is tough. I was going to say laptop, but I can sometimes fill up notebooks. I was going to say music, but occasionally, quiet is best. I don’t have rituals because I believe it’s better to write whenever and wherever you can. Think this comes from being a mother. I do like to have a cup of coffee or tea somewhere close. Okay… and lip balm. I admit that’s weird, but dry lips bug me, so I keep a tube next to anyplace I might write. I also like lit candles. Doesn’t matter what time of day or year, I keep a bunch on my desk and love to have them flickering behind my laptop. [Manga Maniac Cafe] What is the last book that you read that knocked your socks off? [Rinda Elliott] I have to be honest. It was my critique partner’s latest project. I can’t say anything about it other than I loved it. She has several other series out people can read until this gem is available. Her name is Rachel Vincent and the series are Soul Screamers, Shifters and Unbound. [Manga Maniac Cafe] If you had to pick one book that turned you on to reading, which would it be? [Rinda Elliott] Just one? As a kid, I read everything. My earliest favorite book memory is Where the Wild Things Are by Maurice Sendak. I went on to devour all the Ramona books by Beverly Cleary. Then Judy Blume came into my life. Everything changed one summer when I was living in the Ozarks, bored out of my mind, and a nice woman gave me a box of Harlequin Presents novels. The first one I picked up was called Living with Adam by Anne Mather. My young heart went crazy and a love for romance novels was born. My husband tracked that book down for me again many years later and I reread it. Had to laugh. My taste in heroes and heroines has changed dramatically, but that book was the start. The start of my love for paranormal books? Wizard of Seattle by Kay Hooper. [Manga Maniac Cafe] What do you like to do when you aren’t writing? [Rinda Elliott] Hang out with my family, watch movies, make wine or read. Sometimes, I’m reading while doing all those other things. [Manga Maniac Cafe] How can readers connect with you? [Rinda Elliott] I have too many websites right now, but hope to streamline them soon. I have a Facebook, Twitter, Tumblr, etc, but the best place is http://relliott4.wordpress.com. I’m also a member of a group of fantastic writers called The Deadline Dames. You can check out all our books at http://www.deadlinedames.com . [Manga Maniac Café] Thank you! You can pre-order Dweller On The Threshold from your favorite bookseller or by clicking the link below: Rinda Elliott loves unusual stories and she credits growing up in a family of curious life-lovers who moved all over the country. Books and movies full of fantasy, science fiction and horror kept them amused, especially in some of the stranger places. For years, Rinda tried to separate her darker side with her humorous and romantic one. She published short fiction, but things really started happening when she gave in and mixed it up. When not lost in fiction, she loves making wine, collecting music, gaming and spending time with her husband and two children. Asprey Charles has always assumed he would one day take his place in the family art appraisal and insurance firm. “His place” meaning he plans to continue to enjoy his playboy lifestyle, lavish money on his Cessna, and shirk every responsibility that dares come his way. But when a life of crime is thrust upon him, he is just as happy to slip on a mask and cape and play a highwayman rogue. After all, life is one big game—and he excels at playing. Poppy Donovan vows that her recent release from jail will be her last—no more crime, no more cons. But when she learns that her grandmother lost her savings to a low-life financial advisor, she’s forced to do just one more job. It’s all going smoothly until the necklace she intends to pawn to fund her con is stolen by a handsome, mocking, white-collar thief. A thief who, it turns out, could take a whole lot more than money. If she’s not careful, this blue blood with no business on her side of the tracks could run off with the last thing she can afford to lose. Her heart. Warning: This book contains masked crusaders, a remorseless con woman, and plans to boost a ten-million-dollar painting. Expect high speeds and fast hands. Review: Confidence Tricks is a fun, fast-paced romance with a likable ex-con protagonist. I loved Poppy. She is different from most romance heroines, and she’s brutally honest about her prospects for the future. After she falls for rich guy Asprey, she understands the reality of their relationship, as in, there can’t be one. How can a guy who was born with a silver spoon in his mouth, who has never wanted for anything, understand that a future with Poppy, a poor girl who has been living on the edge for years, is out of the question? It was the difference in their social status that really attracted me to this story, and by the end of the book, I was convinced that Poppy and Asprey would find their HEA. It wouldn’t be easy, but, dang, they deserved to be happy! Together! The story starts out with Asprey completely at Poppy’s mercy. She’s got a stiletto heel jabbed against his throat, and she’s not afraid to use it! She’s already dislocated his shoulder, and she’s not going to hesitate to inflict more bodily harm. How dare he interfere with her mark? She has been hanging around with slimeball Todd for weeks, all in an effort to steal back the money he stole from her grandmother. How dare these amateur thieves try to steal her thunder. I enjoyed the power imbalance between Poppy and Asprey. She is hard as nails and can open a can of whoop ass on him without even thinking about it. Asprey, on the other hand, is like a genteel Robin Hood, stealing back jewelry and art from their owners so they can collect on insurance policies. Why? Because everything that he and his older brother are stealing are fakes. Oops! The cons are very convoluted in Confidence Tricks, and there were several times when I had to throw away everything I thought I knew was going on, because Tamara Morgan had me totally bamboozled. Clueless. It was fun watching as the web of deception unraveled, leaving the characters second guessing themselves. I was entertained by Asprey and Poppy’s unusual courtship. They try to steal an espresso machine in a bet for answers to the burning questions they have for each other. They don’t quite trust each other, but as they are thrown from one dangerous adventure to the next, they find that they don’t have anyone else to rely on but each other. When Poppy’s less than shining history is finally revealed, Asprey doesn’t seem phased at all. He can put her past mistakes in the past where they belong, though he constantly questions why she would act as she did by turning herself in. The romance is hot and flares quickly out of control, and I thought that the two made a great couple. Even better, Asprey’s older brother is disapproving and trying to find ways to drive the two apart. Stupid brothers! I did think that the action lagged during the poker games. Poppy and Asprey just can’t compete with Paul Newman and Robert Redford; I don’t think any characters could. How do you pull off a better sting than those guys? I don’t think you can, so these scenes didn’t work for me. The rest of the cons did, though, and I was caught up in the rest of the intrigue and suspense. And again, I loved the stark contrast between Poppy and Asprey’s backgrounds. If you enjoy suspense, danger, and cons in your romance, I think you will like Confidence Tricks. Not sure? Check back later today for the opportunity to win a copy for yourself. [Manga Maniac Café] Can you tell us a little about A Patch of Darkness? [Yolanda Sfetsos] A Patch of Darkness is the first book in my urban fantasy series about a spook catcher. It’s set in Sydney, but it’s an alternate version of our world, where ghosts are an accepted part of society and have certain rights. There are other supernatural creatures as well, but they’re still a secret—well, except for the people who know about them. [Manga Maniac Café] How did you come up with the concept and the characters for the story? [Yolanda Sfetsos] I’ve always loved ghost stories. They’re spooky, intriguing, and always make me wonder about what’s really out there. When I set out to write this story, I wanted to explore a world where everyone knew that ghosts exist, but only a select few can actually interact with them. I also wanted a large cast of characters with different backgrounds and problems, all forced to work together. Oh, and a complicated love life for the heroine. After I had all of those ingredients, the concept was born and the world was full of characters. [Manga Maniac Café] What was the most challenging aspect of writing the book? [Yolanda Sfetsos] The most challenging aspect was—and still is—keeping all the details consistent. There’s so much, and it’s easy for me to forget a small detail that can make a huge impact. So I keep a Sierra Fox Bible, where I write down as much info, research, and details as I can. [Manga Maniac Café] What are three things Sierra would never have in in her bedroom? [Yolanda Sfetsos] A jinxed amulet, demons and shadows. You’ll know exactly what I mean if you read the book. 😉 [Manga Maniac Café] What are your greatest creative influences? [Yolanda Sfetsos] The world around me is often my biggest creative influence. It doesn’t take much to get my mind wandering and eventually coming up with either a character and/or story. Then, when I’ve got something that fits into everyday life, I like to throw in the supernatural. I’m pretty obsessed with supernatural creatures and phenomena, and if I think about them often enough my muse starts buzzing. [Manga Maniac Café] What three things do you need in order to write? [Yolanda Sfetsos] I need my computer/laptop, story notes, as well as pen and paper. Oh, wait, isn’t that really four things? [Manga Maniac Café] If you had to pick one book that turned you on to reading, which would it be? [Yolanda Sfetsos] I would have to say Rumble Fish by S.E. Hinton. After I read that in school, I couldn’t get other books fast enough. [Manga Maniac Café] What do you like to do when you aren’t writing? [Yolanda Sfetsos] When I’m not writing I love spending time with my family. I also enjoy going for walks, and working out with my hubby. Oh, and watching my fave TV shows—especially Castle, The Walking Dead, and Jon Stewart. I also love to read. [Manga Maniac Café] What do you enjoy most about urban fantasy? [Yolanda Sfetsos] Definitely the freedom to include so much of what I love in storytelling—blending the supernatural into a contemporary existence, a touch of horror, complicated relationships, love triangles, mystery, suspense, monsters… that type of thing. 😉 A Patch of Darkness hits stores May 15. You can purchase A Patch of Darkness from your favorite bookseller, or by clicking the widget below: Synopsis: All it takes is one weak seam for everything to fall apart. Sierra Fox, Book 1 In a perfect world, Sierra Fox would have stayed away from the Council she left years ago. But in this world—where spirits have the right to walk among the living—it’s her job to round up troublesome spooks and bring them before that very same Council. Though her desk is piled high with open cases, she can’t resist an anonymous summons to a mysterious late-night meeting with a bunch of other hunters, each of whom seems to have a unique specialty. The news is dire: something is tearing at the fabric of the universe. If the hunters can’t find who or why in time, something’s going to give in a very messy way. As current cases, family secrets, new clues and her tangled love life slowly wind themselves into an impossible knot, Sierra finds herself the target of a power-sucking duo intent on stealing her mojo. And realizing she holds the key to the last hope of sealing the widening rift. Warning: Spook catching: may contain traces of ectoplasm and otherworldly nasties. Not recommended for those with allergies to ghosts, demons, and with boyfriends who think your power is theirs. While reading, avoid dark patches and stay to the light. [Manga Maniac Cafe] Can you tell us a little about Love is a Battlefield? [Tamara Morgan] Love is a Battlefield is a modern take on two of my favorite romance tropes: Regency England and Highlanders. Kate Simmons is a Jane Austen re-enactor with a love of history and romance. Julian Wallace is a professional Highland Games athlete who adheres to the time-honored traditions of Scotland. Sparks between them fly until they realize they both want the same plot of land for their annual conventions. Basically, it’s a land feud between re-enactment groups with a Renaissance fair, a wood-fired hot tub, and a rich Duke with his own agenda thrown into the mix. [Manga Maniac Cafe] How did you come up with the concept and the characters for the story? [Tamara Morgan] This book has been such a long process it’s hard to pinpoint exactly where everything came from. But I’m a total sucker for historical costumes, and my family goes every year to our city’s Highland Games event, Renaissance Fair, and Civil War re-enactment. I couldn’t think of anything better than to find a way to bring these types of characters to life, especially since it gave me an excuse to write modern-day men in kilts. Since I decided to play with romance tropes and timelines, I needed characters who would be just at home in a historical novel as a contemporary one. Kate is your typical feisty bluestocking, and Julian is the fierce Highland warrior out to protect his clan. [Manga Maniac Cafe] What was the most challenging aspect of writing the book? [Tamara Morgan] Walking that fine line between comedy and farce is something I’m continually working on improving. Humor is such a subjective thing, and I know my approach to romantic comedy isn’t for everyone. I did my best to create a fun, entertaining story that gets a few laughs but also tugs a few heartstrings. [Manga Maniac Cafe] What three words best describe Kate? [Tamara Morgan] Feminine, Romantic, Determined [Manga Maniac Cafe] What are three things Julian would never hide under his kilt? [Tamara Morgan] Defeat, Fear, Support Hose [Manga Maniac Cafe] What are your greatest creative influences? [Tamara Morgan] My husband definitely gets kudos for his sense of humor. Whether I’m borrowing stealing his jokes for my characters or relying on him to pull me out of a writerly funk, he can always be counted on to make me laugh. That’s probably why my characters are always laughing with each other—I consider it the foundation of any good, long-term relationship. [Manga Maniac Cafe] What three things do you need in order to write? [Tamara Morgan] COFFEE, my little pink netbook, Twitter [Manga Maniac Cafe] What is the last book that you read that knocked your socks off? [Tamara Morgan] Attachments by Rainbow Rowell. She’s got a good handle for humor, and I fell in love with her hero, Lincoln, almost immediately. It’s also a total geek book (Dungeons & Dragons! Information Technology!), which should never be underestimated. [Manga Maniac Cafe] If you had to pick one book that turned you on to reading, which would it be? [Tamara Morgan] You’d have to ask my aunt. Every year for Christmas, she would give me books specially designed to cultivate my tastes and turn me into a romance reader. Every year, she nailed my interests and tastes. The first one I remember (but not the first one I got) was Catherine, Called Birdy by Karen Cushman. Predictably, it features a thirteenth-century love story aimed at kids. I’ve always loved historicals! [Manga Maniac Cafe] What do you like to do when you aren’t writing? [Tamara Morgan] Read! People are always asking me what my hobbies are outside of reading and writing, but the truth is that I don’t have many. If I don’t have my computer in hand, I have my Kindle—and I rarely travel anywhere without them both. Every few years I try to blog, but I get very lazy at updating, so for now I have a plain old ordinary website at www.tamaramorgan.com. And if you want to spend more time with Julian, he’s in the (sort of) flesh and waiting for you to pick out his kilt. Love is a Battlefield is available now! You can order a copy from your favorite bookseller or by clicking the widget below: About Love is a Battlefield It takes a real man to wear a kilt. And a real woman to charm him out of it. It might be modern times, but Kate Simmons isn’t willing to live a life without at least the illusion of the perfect English romance. A proud member of the Jane Austen Regency Re-Enactment Society, Kate fulfills her passion for courtliness and high-waisted gowns in the company of a few women who share her love of all things heaving. Then she encounters Julian Wallace, a professional Highland Games athlete who could have stepped right off the covers of her favorite novels. He’s everything brooding, masculine, and, well, heaving. The perfect example of a man who knows just how to wear his high sense of honor—and his kilt. Confronted with a beautiful woman with a tongue as sharp as his sgian dubh, Julian and his band of merry men aren’t about to simply step aside and let Kate and her gaggle of tea-sippers use his land for their annual convention. Never mind that “his land” is a state park—Julian was here first, and he never backs down from a challenge. Unless that challenge is a woman unafraid to fight for what she wants…and whose wants are suddenly the only thing he can think about. Warning: The historical re-enactments in this story contain very little actual history. Battle chess and ninja stars may apply. About Tamara Morgan Tamara Morgan is a romance writer and unabashed lover of historical reenactments—the more elaborate and geeky the costume requirements, the better. In her quest for modern-day history and intrigue, she has taken fencing classes, forced her child into Highland dancing, and, of course, journeyed annually to the local Renaissance Fair. These feats are matched by a universal love of men in tights, of both the superhero and codpiece variety. Violet Winterbottom is a quiet girl. She speaks six languages, but seldom raises her voice. She endured bitter heartbreak in perfect silence. The gentlemen aren’t beating down her door. Until the night of the Spindle Cove Christmas ball, when a mysterious stranger crashes into the ballroom and collapses at Violet’s feet. His coarse attire and near-criminal good looks would put any sensible young lady on her guard. He’s wet, chilled, bleeding, and speaking in an unfamiliar tongue. Only Violet understands him. And she knows he’s not what he seems. She has one night to draw forth the secrets of this dangerously handsome rogue. Is he a smuggler? A fugitive? An enemy spy? She needs answers by sunrise, but her captive would rather seduce than confess. To learn his secrets, Violet must reveal hers—and open herself to adventure, passion, and the unthinkable… Love. Warning: The heroine packs a pistol, the hero curses in multiple languages, and together they steam up a cold winter’s night. Review: Once Upon a Winter’s Eve is the first Samhain title that I’ve read, and it’s also one of the growing number of novellas that I have read in. After recently discovering the appeal of shorter length stories, I have been snapping them up as I see recommendations from bloggers I follow. I can’t remember where I learned about this particular one, but I’m happy I gave it a try. At under a dollar, it was a fun read, and a great introduction to both Tessa Dare and Samhain. I’ll have to go back and read the first Spindle Cove book, A Night to Surrender (which is an Avon release, go figure). Violet Winterbottom has retreated to Spindle Cove, where she is nursing a broken heart. The love of her life, who she now refers to as The Disappointment, loved her and left her, with hardly a word. Ruined, she is trying to come to terms with her feelings, and is resigned to heed her parents’ demands to return to London. They are determined to find a match for her, unaware of Violet’s turmoil and her unrequited love for their young neighbor. When an injured stranger bursts into the Christmas Eve ball she is attending, she’s stunned when the man collapses at her feet. His incoherent babbling slowly begins to make sense to her. Gifted in several languages, Violet is tasked with quizzing the man – is he a spy? What is he doing in Spindle Cove? This is a fun, fast-paced read with an abundance of action and adventure. After Violet decides to assist the stranger, she is sent on the adventure of her life. She is an intelligent and capable young woman, and I quickly began to like her. And to dislike the man who kicked her to the curb and left her and her bruised heart to fend for themselves. When Violet is drawn into intrigue by the handsome stranger, she is given the spark that her life has lacked for the last few months. She embraces the danger and the adventure, and becomes a willing participant in the suspected spy’s attempts at escape. While there’s not a lot of depth to this story, there is a lot of fun, and for 79 cents, you can’t beat that.
{ "pile_set_name": "Pile-CC" }
Marin County Water District Pits Neighbors Against Each Other To See Who Uses Less Water During Drought Water pours out of a hose after a worker washes the sidewalk in front of a business in downtown Los Angeles, California, U.S. on Friday, July 18, 2014. The California State Water Resources Control Board passed an emergency measure that sets fines of as much as $500 a day on residential and business property owners if they overwater lawns to the point that runoff flows onto streets or sidewalks. Photographer: Kevork Djansezian/Bloomberg via Getty Images(Kevork Djansezian/Bloomberg via Getty Images) MILL VALLEY (KPIX 5) — Water wasters have faced warnings, fines, and even restrictions during California’s drought emergency. But, some residents in Marin County are going even further, competing against each other to see who uses the least water. 5,000 water customers picked at random are having their water use compared to their neighbors. The water district is working with Watersmart Software, which is monitoring homeowners and sending them a bi-monthly report. A sad-faced teardrop on the report is bad news. “We actually can compare notes and give the stink eye to somebody,” Marin Water District customer Natalie Carpenter said. The county wants to conserve the water they have, despite reservoirs being at 91-percent capacity. Still, residents are embracing the challenge. “It taps into the fundamental and dynamic of the human psyche, which is wanting essentially to compete, and outdo others,” Marin Water District customer Sam Keller. The water district is testing the program for one year before it decides whether to expand it to all 51,000 households.
{ "pile_set_name": "Pile-CC" }
Q: What is the explanation of this Medrash about Moshe entering Eretz Yisroel? The Medrash says that Moshe tells Hashem "it says in your Torah that if a slave says 'I love my master and children and I do not wish to go free' then he stays in his servitude, and I do both". Hashem answers him "do not continue to speak". What is the underlying conversation and explanation of this Medrash? A: The question is simple Moshe wants to go into Eretz Yisroel so he wants to stay in Hashem's servitude but the answer Hashem replies can only be understood in the context of the Gemara in Kiddushin (כב, א) there the Gemara explains that in order to enslave himself further he must make this statement twice. Therefore Hashem tells him do not continue to speak for if you do I will be forced to allow you into Eretz Yisroel
{ "pile_set_name": "StackExchange" }
Bircham Newton Bircham Newton is the smallest of the three villages that make up the civil parish of Bircham , in the west of the English county of Norfolk. The village is located about 1 km north of the larger village of Great Bircham, 20 km north-east of the town of King's Lynn, and 60 km north-west of the city of Norwich. Bircham Newton gave its name to an airfield, RAF Bircham Newton, that was in use through World War II and into the 1960s. Today the airfield is the home of the Construction Industry Training Board (now ConstructionSkills). References Ordnance Survey (2002). OS Explorer Map 250 - Norfolk Coast West. . External links . Information from Genuki Norfolk on Bircham Newton. The Hauntings of Bircham Newton Category:Villages in Norfolk Category:King's Lynn and West Norfolk
{ "pile_set_name": "Wikipedia (en)" }
Activities at Gateway Green How do you want to play today? Gateway Green will offer many different types of experiences to locals and visitors, from a natural play area for the very youngest park goers to an advanced jump line within the bike skills area for advanced cyclists. The park is now open. Hours are from 7:00 am to 10:00 pm, every day except Friday when it opens late (10:30 am) due to weekly maintenance. For information on how to get to the park, check out Park Access. Cycling Gateway Green will be Portland’s first desginated bike park! The park will offer fun and challenging environments for all levels of riders - from youngsters just learning bike skills to advanced riders and racers. Included in the current design of the bike park will be multi-use paved trails, unpaved singletrack trails, a bike skills area, a gravity area, and a cyclocross course. We envision the site becoming a major focal point of the local off-road riding scene! Running, Walking and Hiking Soft surface trails will wind through the site to allow for more intimate experience with the restored habitat. In addition, paved multi-use trails will allow people to access larger portions of the site and create regional connections to the existing 40-mile loop and future Sullivan’s Gulch Trail. Observing and Learning from Nature Interpretative signage about the site’s habitat restoration, stormwater management, the volcanic origins of Rocky Butte and the effects of the ice age floods will provide passive environmental education opportunities. In addition, area schools and nonprofit groups will have access to the park for environmental curriculum. A field shelter will be built for picnicking and to provide a gathering space for classes and groups. As the habitat enhancements mature, there will be increasing opportunities to observe plants and wildlife. Nature Play Area The nature play area will use natural materials to create a playground that stimulates children’s imaginations while teaching them about natural processes. Rocks, logs, sand, soil and plants will be integrated and available to be touched and manipulated. It will be located near the forested part of the site to take advantage of the existing and restored tree canopy allowing children to make their own adventures.
{ "pile_set_name": "Pile-CC" }
1. Field of Invention The present invention relates to a catalyst composition for selective catalytic reduction of exhaust gases and a process for its preparation. More specifically, such a catalyst composition may be used in catalyst application for the removal of NOx, especially in exhaust gas after treatment of diesel- and lean burn engines of automotive. In addition the catalyst composition may also be used in stationary applications (e.g. removal of NO in power plant stations). 2. Related Technology The most widely employed technology for removal of NOx out of exhaust gases is S(elective) C(atalytic) R(eduction), e.g. O. Kröcher, Chapter 9 in <<Past and Present in DeNOx Catalysis>>, edited by P. Granger et al., published by Elsevier 2007. Accordingly, NOx is removed by Ammonia into Nitrogen and water according to the reaction:4NO+4NH3+O2=4N2+6H2O For the stationary application mainly V2O5 doped TiO2/WO3 compositions are used commercially since 1970 to remove nitrogen oxide emissions of fossil fuel power plants. Already 15 years ago, the idea was discussed to apply SCR also on mobile diesel engines, which is now an emerging technology for the NOx reduction from heavy duty diesel vehicles, passenger cars and off road machines. A typical SCR system consists of a reduction catalyst, urea injection and dosing components, pipes and a storage tank. A huge number of modern catalysts are extruded substrates or coated substrates with Vanadium Pentaoxide (V2O5) as the catalytically active component. Catalytic coatings of zeolite based SCR are currently being developed because of the limited temperature stability of the vanadium catalysts and the fact that Vanadium Pentaoxide (V2O5) has been classified as a health risk in some countries. Increased temperature stability is especially important in SCR catalysts installed downstream a particulate filter since relatively high temperatures are generated during filter regeneration (M. Rice, R. Mueller at al., Development of an Integrated NOx and PM Reduction Aftertreatment System: SCRi for Advanced Diesel Engines, SAE technical paper 2008-01-132, SAE World Congress Detroit, Mich. Apr. 14-17, 2008) There are further reports on the commercially applied well known V2O5/WO3—TiO2 material for exhaust gas aftertreatment of automotives by O. Kröcher in Chapter 9, p. 267f in <<Past and Present in DeNOx Catalysis>>, edited by P. Granger et al. According to the presentation given by Dirk Vatareck (Catalysts Automotive Applications, Argillon) at the 3rd CTI Forum SCR Systems (Bonn 9 Apr. 2008) Titania-tungsten oxide based catalysts containing V2O5 as active component are applied for making automotive catalysts in a huge number (approx. 4 Mio. Catalysts/year). The preparation of V2O5 containing materials based on TiO2/WO3 which additionally may contain oxides out of transition metals, Rare Earths and other elements and the application in SCR is widely disclosed in numerous publications, patent applications and patents. For example GB 1 495 396 describes a catalyst composition containing as active ingredients oxides from titanium, at least one of molybdenum, tungsten, iron, vanadium, nickel, cobalt, copper, chromium and uranium, and as optional component(s) tin and/or at least one of silver, beryllium, magnesium, zinc, boron, aluminium, yttrium, rare earth metal, silicon, niobium, antimony, bismuth, manganese, thorium and zirconium, which oxides are present as an intimate mixture. EP 787 521 describes the preparation of several V-containing catalysts based on TiO2/WO3 containing additional dopants such as Y2O3, B2O3, PbO, SnO2 the vanadium being present as Vanadiumpentaoxide V2O5. U.S. Pat. No. 4,221,768 reports on V2O5 containing materials based on TiO2 as a support material and additional oxides out of transition metals as dopants. Additional SCR-Materials which contains V2O5 supported on TiO2 are also described in GB 1 430 730. V2O5 containing materials which contain TiO2, SiO2, S and Oxides of Ce, Sn, Mo and W are reported in UK Appl. GB 2 149 680. U.S. Pat. No. 4,466,947 describes V-containing denitration catalysts in which the vanadium is present in form of an oxide or a sulfate. EP 1 145 762 A1 describes a process for the preparation of a vanadia SCR-catalyst supported on titania. The main disadvantage of the V-based catalyst type is the limited stability at temperatures above 600° C. A report on the stability of a SCR system based on TiO2/WO3/V2O5 is given by Jan M T et al. in Chemical Engineering & Technology, Vol. 30, No 10, 1440-1444, 2007. Accordingly a deactivation of the catalyst occurs since V2O5 melts at approx. 650° C. A TiO2/WO3/V2O5 suitable SCR catalyst for NOx removal of Diesel-powered vehicles is described in U.S. Pat. No. 6,805,849 B1, column 2. Although such a catalyst has shown good performance it was found that sustained high temperature operation can cause catalyst deactivation. Heavy duty diesel engines, which are almost exclusively charged, can produce exhaust gases at greater than 500° C. Under conditions of high load and/or high speed, and such temperatures deactivation of the catalyst may occur. In the presentation of Dirk Vatareck (Catalysts Automotive Applications, Argillon) at the 3rd CTI Forum SCR Systems (Bonn 9 Apr. 2008) there were reported maximum operation temperatures for a TiO2/WO3/V2O5 catalyst of 550° C. and 580° C. for short term basis. In view of the application under EURO 6 an improvement in thermal stability of a V2O5 containing TiO2/WO3 based catalyst was reported in the presentation of Dirk Vatareck (Catalysts Automotive Applications, Argillon) at the 3rd CTI Forum SCR Systems (Bonn 9 Apr. 2008). Accordingly a catalyst containing V2O5 as active component and a support material consisting of TiO2/WO3 and additionally containing Si may be operated at max. temp. of 600° C. and 650° on a short term basis. Vanadium based systems with improved thermal stability are also reported by James. W. Girard et al., “Technical Advantages of Vanadium SCR Systems for Diesel NOx Control in Emerging Markets”, SAE technical paper 2008-01-132, SAE World Congress Detroit, Mich. Apr. 14-17, 2008. After ageing at 600° C./50 hrs the catalyst is still active. However, because of high exhaust gas temperatures possible during active Diesel Particulate Filter (DPF) regeneration, vanadium SCR catalysts are usually not considered for these applications. With increasingly stringent automobile exhaust emission regulations for Diesel vehicles (US 2010 and EURO 6 regulations) aftertreatment systems containing a Diesel Particulate Filter (DPF) as well as a SCR catalyst will be required in future. Such systems will demand a higher temperature stability of the SCR catalyst and V2O5 based systems are not considered to be viable for such an application as additionally to the problem of heat stability V2O5 may be exhausted also to the environment (J. Munch et al “Extruded Zeolite based Honeycomb Catalyst for NOx Removal from Diesel Exhaust, SAE Paper 2008-01-1024). Since the activity of SCR catalysts in the temperature range of 180-350° C. is important in the diesel application there have been established systems to improve catalytic activity in the low temperature range. For example with the aid of a diesel oxidation catalyst (DOC) attached in front of the SCR system (NO being present as a majority (=more than 90%) in the raw emission of the diesel engine) is oxidized to form NO2. The NO2 can be used to burn up particulates and to improve the low temperature activity (in the range 180-350° C.), see M. Rice, R. Mueller at al., Development of an Integrated NOx and PM Reduction Aftertreatment System: SCRi for Advanced Diesel Engines, SAE technical paper 2008-01-132, SAE World Congress Detroit, Mich. Apr. 14-17, 2008. In the same publication there are summarized the design parameters of two engine/aftertreatment scenarios for US 2010/Euro 6. One concept will lead to high particulate matters/low NOx with active regeneration of the PM-filter. The SCR catalyst proposed for the described scenario is a zeolite. Zeolites must be used since higher heat resistance of the SCR system is required due to the active regeneration of the PM filter. The second concept comprises an engine concept which will lead to low concentrations of PM and low NOx concentrations. The SCR catalyst may consist of a vanadium based material or a zeolite. Both concepts will use a diesel oxidation catalyst (DOC) prior to the SCR treatment. The problem of low temperature activity of SCR catalysts is also addressed in US 2008/0234126 A1. It is described a method for the preparation of a vanadium/titania based catalyst with enhanced low temperature activity for removing nitrogen oxides at a window of 300° C. and lower. However, US 2008/0234126 A1 does not address the problem of stability of the catalyst >600° C. An improvement in terms of the thermal stability of a V-containing TiO2/WO3/SiO2 “SCR catalyst” is reported in the WO 2005/046864 A1. According to a preferred embodiment the vanadium in the formulations based on TiO2/WO3/(SiO2) is present not in form of Vanadiumpentaoxide (V2O5) but in form of a Rare Earth Vanadate (REVO4). The Rare Earth vanadate may be introduced to the support material (TiO2/WO3/(SiO2)) as a powder by simple mixing route (of the support and the Rare Earth Vanadate) following by calcination of the mixture. Alternatively the Rare Earth Vanadates may be formed in the composition also in situ during the preparation (calcination) of the catalyst composition from precursors eg. Rare Earth acetate and Ammoniummetavanadate. The presence of the Rare Earth Vanadates in the catalyst is proved by XRD. The catalyst compositions referred in WO 2005/046864 A1 exhibit good NOx conversion activity after being heat treated at 750° C./10 hrs, whereas in contrast the reference material containing V2O5 on the TiO2/WO3/SiO2 support may be considered to be almost inactive after being heat treated (aged) at 750° C./10 hrs. However, WO 2005/046864 A1 does not describe any NOx conversion rates below 250° C., eg at 230° C. and 200° C. which is important for the automotive SCR systems. As shown in comparative example 2 an ErVO4 doped TiO2/WO3/SiO2 composition, which refers to Example 18, Table 2b in WO 2005/046864 A1, was subjected to NOx conversion test at temperatures at 200° C. and 230° C. NOx conversion was found to be zero at 200° and 230° C. and 25% at 250° C. for the “fresh” material. After heat treatment of the compound at 700° C./10 hrs there was found an increase of catalytic activity exhibiting a relatively low NOx conversion at 200° C. and 230° C. being 6% at and 20% respectively; at 250° C. there was measured a conversion rate of 55%. Comparative example 1 refers to a commercially available catalyst containing V2O5 supported on TiO2/WO3/SiO2 which is currently applied in heavy duty diesel SCR. After heat treatment at 650° C./2 hrs the material still exhibits activities. However the activity in the range 200-250° C. is already less than 50%; the activity drops significantly after heat treatment 700° C./10 hrs. In addition in comparative example 1.1 it is shown, that a TiO2/WO3/SiO2: V2O5 catalyst is almost inactive after being heat treated at 750° C./10 hrs. As a summary out of the state of the art review it may be concluded that RE-Vanadate doped TiO2/WO3/SiO2 materials are more heat stable compared to the V2O5 doped materials but show a weakness in NOx conversion at operating temperatures below 300° C. V2O5 containing TiO2/WO3/SiO2 materials seem to be operable up to 650° C. but loose already activity.
{ "pile_set_name": "USPTO Backgrounds" }
Introduction {#s1} ============ Osteoarthritis is a multifactorial disease characterized by destruction of the articular cartilage due to genetic, mechanical and environmental components [@pone.0003740-Spector1], affecting more than 20 million people in the US [@pone.0003740-Lawrence1]. Despite its high prevalence there are few studies concerning the molecular pathobiology and the involvement of genetic factors in the pathogenesis of osteoarthritis [@pone.0003740-Miyamoto1], [@pone.0003740-Kizawa1]. Several clinical studies have implicated the causative role of obesity in osteoarthritis development [@pone.0003740-Lohmander1], [@pone.0003740-Lementowski1], however there are few molecular studies correlating metabolism with osteoarthritis [@pone.0003740-Aspden1], [@pone.0003740-Ostalowska1]. Achieving a deeper understanding of osteoarthritis molecular mechanisms requires global strategies aimed at modelling the functional interrelationships between genes as complex interdependent networks. Lately, it has become evident that genetic alterations in non-coding genes can also contribute to the pathogenesis of human disease [@pone.0003740-McManus1]. A new class of small non-coding RNAs, named microRNAs, regulate gene expression by inhibition of translation or mRNA cleavage [@pone.0003740-EsquelaKerscher1]. MicroRNAs have been implicated in important cellular processes such as lipid metabolism [@pone.0003740-Esau1], apoptosis [@pone.0003740-He1], differentiation [@pone.0003740-Chen1] and organ development [@pone.0003740-Callis1]. Furthermore microRNAs expression signatures have been associated with well-defined clinicopathological features and disease outcome [@pone.0003740-Calin1]. It is known that microRNAs exert their biological functions through suppression of their target genes. Several bioinformatic algorithms have been constructed in order to predict microRNA gene targets. Most of these algorithms search for sequence complementarity between the microRNA and the 3′ UTR of the gene target. These algorithms predict hundreds of potential gene targets, which can not all be experimentally validated. Previous studies have tried to identify microRNA gene targets using cDNA microarray data [@pone.0003740-Huang1]. However, it has been shown that a microRNA (miR-10b) regulates gene expression only at the protein level, while mRNA levels were not affected [@pone.0003740-Ma1]. In addition, very recently Selbach et al, showed that a microRNA can repress the production of hundred of proteins [@pone.0003740-Selbach1]. Therefore, it becomes evident that proteomic data are needed in order to accurately detect microRNA gene targets. Up to now there are few studies trying to characterize the cartilage proteome. More specifically, recently Vincourt et al, performed a detailed two dimensional electrophoresis-based proteomic analysis of articular cartilage [@pone.0003740-Vincourt1]. In addition Wu et al. performed a comparative proteomic analysis of cartilage from healthy donors and osteoarthritis patients, however the number of samples used was very small [@pone.0003740-Wu1]. For all above reasons, we undertook to associate specific microRNAs and proteins with the development of osteoarthritis and clinicopathological parameters, in order to identify new signalling pathways involved in its pathogenesis. Here, we report a novel approach of studying multi-aetiological diseases and identifying new genes involved in the pathogenesis of a complex disease. Integration of microRNA microarray and proteomic analysis data together with computational approaches, such as microRNA gene target prediction algorithms and gene network construction, revealed the role of microRNAs in cartilage destruction and linked inflammatory and metabolic gene networks with cartilage homeostasis. Materials and Methods {#s2} ===================== Cartilage tissue samples {#s2a} ------------------------ Articular cartilage samples were obtained from femoral heads, femoral condyles and tibial plateaus of patients with primary osteoarthritis undergoing hip or knee replacement surgery at the Orthopaedics Department of University Hospital of Larissa. A total of 33 patients were included in this study (twenty eight females and five males; mean age 68.91±6.97 years, range 57--83; mean Body Mass Index (BMI) 30.51±5.23, range 22.67--43.96) who had undergone total knee replacement surgery. Each sample was categorized according to its gross morphology, as severely damaged and was taken from the main defective area of maximal load. Macroscopic findings were validated by histological studies performed on 5 mm serial sections of cartilage samples and graded using the Mankin score. Specimens with osteoarthritis had Mankin score 10--14. Normal cartilage was obtained from small free cartilaginous fragments from ten individuals (six females and four males; mean age 61.70±18.17, range 27--78; mean BMI 23.80±4.34, range 19.03--35.06) with 0 Mankin score, undergoing fracture repair surgery, with no history of joint disease. Both patients and healthy individual\'s cartilage samples were obtained upon individuals\' verbal informed consent. The method of obtaining verbal approval by all individuals was approved by Institutional Review Board of the University Hospital of Larissa. Also the protocol was approved by the local ethics committee of University Hospital of Larissa. Detection of microRNA expression {#s2b} -------------------------------- Expression levels of 365 microRNAs were evaluated with TaqMan microRNA microarray assays as previously described [@pone.0003740-Thum1]. Validation of these results was performed using the mirVana qRT--PCR miRNA Detection Kit and qRT--PCR Primer Sets, according to the manufacturer\'s instructions (Ambion Inc, TX, USA). The U6 small nuclear RNA was used as an internal control. MicroRNA Northern Blot Analysis {#s2c} ------------------------------- For microRNA Northern Blot Analysis, 10ug of RNA were separated on 12% denaturating polyacrylamide gels and transferred to GeneScreen Plus membrane (PerkinElmer, Waltham). MiRCURY LNA Probes for miR-483 and miR-22 (Exiqon, Denmark) were end-labeled with T4 polynucleotide kinase. Prehybridization of the filters was carried out in 50% formamide, 0.5% SDS, 5· SSPE, 5·Denhardt\'s solution and 20 mg/ml sheared, denatured salmon sperm DNA. Hybridizations were performed in the same solution at 42°C. The labeled probes were heated for 1 min at 95°C before addition to the filters in the prehybridization solution. After hybridization, the membranes were washed in 0.1 SSC, 0.1% SDS at 42°C twice for 10 min. Reverse-Phase protein microarray analysis {#s2d} ----------------------------------------- Chondrocyte cell lysates were boiled for 5 min and were loaded into 384-well plates in serial dilutions (neat, 1∶2, 1∶4, 1∶8, and 1∶16) with negative control wells containing only lysis buffer. These samples were printed in duplicate onto nitrocellulose-coated glass slides (Schleicher & Schuell Bioscience, Keene, NH) using a ring-and-pin robotic arrayer (GMS 417, Affymetrix, Santa Clara, CA). The arrays were stained as previously described [@pone.0003740-Sheehan1] on an autostainer (DAKO, Carpinteria, CA) using a biotinyl-linked catalyzed signal amplification system (DAKO). Specificity of each antibody was tested by western blot analysis. Statistical analysis {#s2e} -------------------- All calculations were performed on a Microsoft computer, using the SPSS software (version 12.0). Correlation of between microRNA and protein expression levels with BMI was identified by correlation coefficients, calculated by Pearson rank correlation (*r*) and Spearman rank correlation. Statistical methods regarding the proteomic analysis are described analytically in the suppl. [Methods](#s2){ref-type="sec"} section. Construction and statistical significance of gene networks was performed by Ingenuity pathway analysis. Statistical significant networks were considered those with p value higher than 10^−5^. In addition clustering of the protein data in functional groups was performed using DAVID NIH Bioinformatics Database with a p value cut-off of 10^−5^. Quantification of western blots was performed by standard densitometric analysis. All transfection experiments were performed in triplicate and the results were compared by student\'s t-test analysis. Additional methods {#s2f} ------------------ Detailed experimental methods are described in the supplemental methods section ([**Methods S1**](#pone.0003740.s001){ref-type="supplementary-material"}). Results {#s3} ======= MicroRNA gene signature of osteoarthritis {#s3a} ----------------------------------------- To identify microRNAs involved in osteoarthritis, we tested the expression of 365 microRNAs in articular cartilage obtained from patients with osteoarthritis undergoing knee replacement surgery and from normal individuals with no history of joint disease. We identified 16 microRNAs differentially expressed in osteoarthritic compared to normal cartilage ([**Figure 1A**](#pone-0003740-g001){ref-type="fig"}). Specifically we detected nine up-regulated and seven down-regulated microRNAs in osteoarthritic cartilage compared to normal ([**Table S1**](#pone.0003740.s002){ref-type="supplementary-material"}). Real-time PCR and Northern blot analysis ([**Figure 1B, C**](#pone-0003740-g001){ref-type="fig"} **;** [**Table S2**](#pone.0003740.s003){ref-type="supplementary-material"}) validated that this 16 microRNA gene signature was able to distinguish osteoarthritic from normal chondrocytes. ![MicroRNA gene signature in osteoarthritis and correlation with clinicopathological parameters.\ (A) Up-regulated (red color) and down-regulated (green color) microRNAs in 33 osteoarthritic and 10 normal cartilage samples assayed by TaqMan microRNAs assays. Included microRNAs were more than 2-fold deregulated. (B) Validation of previous results using Real-time SYBR Green microRNA detection assay. (C) Northern blot validation of microRNA microarray data. Representative examples of miR-483 and miR-22 expression in normal and osteoarthritic cartilage tissues (OA2, OA17, OA9). (D) MicroRNAs correlated with BMI (Body Mass Index) analyzed by SSPS version 12.0 statistical program.](pone.0003740.g001){#pone-0003740-g001} microRNA expression correlates with BMI {#s3b} --------------------------------------- Clinical characteristics of the patients and normal individuals ([**Table 1**](#pone-0003740-t001){ref-type="table"}) allowed us to study potential correlations between microRNAs expression and clinicopathological parameters. Very interestingly, we found five microRNAs to be statistically correlated with body mass index (BMI) ([**Figure 1C**](#pone-0003740-g001){ref-type="fig"}). miR-22 and miR-103 expression was positively correlated with BMI, while miR-25, miR-337 and miR-29a expression was inversely correlated, pointing towards the potential role of microRNAs in lipid metabolism and osteoarthritis pathogenesis. 10.1371/journal.pone.0003740.t001 ###### Clinicopathological characteristics of osteoarthritis patients and normal individuals ![](pone.0003740.t001){#pone-0003740-t001-1} OA Normal --------------------------- -------------- -------------- **Characteristic** **Female Sex -- no (%)** 28 (84.8%) 6 (60%) **Age at diagnosis -yr** Median 68.91±6.97 61.70±18.17 Range 57--83 27--78 **Body Mass Index (BMI)** Median 30.51±5.23 23.80±4.34 Range 22.67--43.96 19.03--35.06 Normal 4 6 Overweight 11 2 Obese 18 2 **Kellgrene-Lawrence** Median 3.72±0.51 0 Range 2--4 0 Proteomic analysis of articular cartilage {#s3c} ----------------------------------------- In order to identify deregulated proteins in osteoarthritic chondrocytes and study in detail whether obesity and osteoarthritis are correlated at a molecular level, we performed proteomic analysis in the same articular cartilage samples that we performed microRNA expression analysis. Specifically reverse-phase protein arrays were constructed [@pone.0003740-Gulmann1] ([**Figure S1A**](#pone.0003740.s006){ref-type="supplementary-material"}) and probed with antibodies to 214 proteins expressed in articular cartilage ([**Table S3**](#pone.0003740.s004){ref-type="supplementary-material"}). All antibodies were tested for their quality and specificity by Western blot analysis ([**Figure S1B**](#pone.0003740.s006){ref-type="supplementary-material"}) Arrays were scanned and dilution curves were used to quantify relative protein expression ([**Figure S1C**](#pone.0003740.s006){ref-type="supplementary-material"}). We detected that 76 proteins, (48 up-regulated and 28 down-regulated) were differentially expressed between osteoarthritic and normal chondrocytes ([**Figure 2A**](#pone-0003740-g002){ref-type="fig"}). These results were validated by western blot analysis ([**Figure 2B**](#pone-0003740-g002){ref-type="fig"}). We were able to identify for the first time deregulated proteins in osteoarthritic chondrocytes that were implicated in inflammatory and lipid metabolism pathways. More specifically, we detected up-regulation of proteins involved in inflammatory pathways such as IL1B, IL6 and CCR3, while proteins (PPARA, PPARG, ACOX1) involved in lipid metabolism mechanisms, were found highly down-regulated in osteoarthritic chondrocytes ([**Figure 2A, B**](#pone-0003740-g002){ref-type="fig"}). In addition we detected novel proteins that were deregulated in osteoarthritis, such as SOX11, FGF23, KLF6, WWOX and GDF15. ![Reverse phase protein arrays in osteoarthritic and normal cartilage tissues.\ (A) Differentially expressed proteins between osteoarthritic and normal chondrocytes. Up-regulated are shown with red color, while down-regulated with green color. (B) Representative western blot analysis in protein extracts from five osteoarthritic tissues in comparison with normal cartilage. (C) Sub-cellular localization of differentially expressed proteins. (D) Functional clustering analysis of differentially expressed proteins (using DAVID NIH Bioinformatic Database). (E) Correlation coefficient wheel between protein expression levels of differentially expressed proteins in osteoarthritic vs normal chondrocytes and body mass index (BMI). We identified 3 protein groups, which showed statistically significant correlations between protein expression and BMI, according to the coefficient correlation index (r^2^). More specifically, the first group with the highest correlation (r^2^\>0.900) consisted of PPARA, BMP7, IL1B, LEP (leptin) and SREBP1 proteins. The second group (0.600\>r^2^\>0.900) consisted of ITGA5, ADIPOQ (adiponectin), FGF23, MMP13, RETN (resistin) and SOX9. The third group (0.400\>r^2^\>0.600) consisted of 3 proteins (HADHA, ADAMTS5, PPARG) which had low degree of correlation with BMI. The rest of the proteins were not correlated with BMI.](pone.0003740.g002){#pone-0003740-g002} Around half of the deregulated proteins in osteoarthritic chondrocytes were located in the extracellular space (50.67%), while the rest had cytoplasmic (20%), plasma membrane (16%) and nuclear (13.33%) localization ([**Figure 2C**](#pone-0003740-g002){ref-type="fig"}). Functional clustering analysis categorized the differentially expressed proteins in nine statistically significant pathways. Specifically, 45.33% of the deregulated proteins were involved in cartilage homeostasis pathways ([**Figure 2D**](#pone-0003740-g002){ref-type="fig"}), while 18.67% and 9.33% were involved in lipid metabolism and inflammation pathways, respectively. Metabolism-related proteins correlate with BMI {#s3d} ---------------------------------------------- Furthermore, we tried to correlate the expression levels of differentially expressed proteins in osteoarthritic cartilage with clinicopathological parameters, such as Body Mass Index. A recent study suggested that BMI is a significant risk factor for knee osteoarthritis leading to arthroplasty, speculating that biomechanics and metabolic factors associated with adipose tissue contribute to this phenotype [@pone.0003740-Lohmander1]. We identified that PPARA, BMP7, IL1B, LEP, ITGA5 and SREBP1 protein levels in osteoarthritic chondrocytes were highly correlated with BMI ([**Figure 2E**](#pone-0003740-g002){ref-type="fig"}), suggesting the potential role of metabolic-related proteins in the development of osteoarthritis. Detection of microRNA gene targets {#s3e} ---------------------------------- Since microRNAs exert their biological functions through suppression of target genes, it is important to identify microRNA-target pairs. As the available bioinformatic algorithms predict hundreds of microRNA-gene target pairs, it is evident that experimental data are needed for verification of these pairs. However, as it is known that several microRNAs target gene expression only at the protein and not at the mRNA level, the integration of microRNA along with protein data sets could be considered more effective for microRNA-gene target verification. Recently Huang *et al.,* used microRNA with cDNA expression profiling data to identify human microRNA targets using Bayesian data analysis algorithm [@pone.0003740-Huang1]. In our study, we identified microRNA-gene target pairs by matching microRNA and protein data. Subsequently, we filtered these data through three different selection criteria ([**Figure S2**](#pone.0003740.s007){ref-type="supplementary-material"}) and revealed 17 microRNA-gene target pairs implicated in osteoarthritis pathogenesis ([**Table S4**](#pone.0003740.s005){ref-type="supplementary-material"}). More specifically, we found microRNA-gene target pairs potentially involved in cartilage homeostasis and structure (miR-377-CART1, miR-140-ADAMTS5, miR-483-ACAN, miR-23b-CRTAP, miR-16-TPM2, miR-223-GDF5, miR-509-SOX9, miR-26a-ASPN), in biomechanic pathways (miR-25-ITGA5), in apoptotic mechanisms (miR-373-CASP6, miR-210-CASP10) and in lipid metabolism pathways (miR-22-PPARA, miR-22-BMP7, miR-103-ACOX1, miR-337-RETN, miR-29a-LEP). Several of these target genes such as ADAMTS5, GDF5 and LEP have been previously correlated with osteoarthritis [@pone.0003740-Miyamoto1], [@pone.0003740-Glasson1], [@pone.0003740-Iliopoulos1]. Gene networks in osteoarthritis {#s3f} ------------------------------- It is becoming increasingly clear that most proteins interact in complex cellular networks, the properties of which might be altered in osteoarthritic compared to normal chondrocytes. Therefore, global strategies aimed at modeling the functional interrelationships between microRNA and proteins, as complex interdependent networks, are required. We integrated microRNA and protein data sets in order to generate a model of macromolecular network that is perturbed in osteoarthritis using Ingenuity program analysis [@pone.0003740-Tongbai1]. The resulting network contained 11 microRNAs, 58 proteins and 414 potential functional associations ([**Figure 3A**](#pone-0003740-g003){ref-type="fig"}). We were able to detect three sub-networks representing key functional units that make up the co-expression network. A metabolism-related, an inflammation and a cartilage homeostasis sub-network were found to be interrelated contributing all together to cartilage destruction and osteoarthritis development ([**Figure S3**](#pone.0003740.s008){ref-type="supplementary-material"}). ![Interactome network in osteoarthritis.\ (A) Construction of an interactome network (*p* = 10-^49^) by integrating microRNA and proteomic data using Ingenuity Pathway Analysis (IPA) (more information in suppl. methods). The *p* value indicates the likelihood of focus genes to belong to a network versus those obtained by chance. Around half of the microRNAs (mir-337, miR-29a, miR-22, miR-103-1, miR-25) regulate genes involved in the metabolic pathways. (B) Correlation coefficients between microRNA expression levels and their gene targets protein levels in osteoarthritic and normal chondrocytes. (C) Predicted duplex formation between PPARA and BMP7 3′UTR with miR-22. (D) BMP7 and PPARA protein levels after miR-22 or inhibitor of miR-22 (as-miR-22) treatment (50 nM) for 48 h in normal and osteoarthritic chondrocytes, respectively.](pone.0003740.g003){#pone-0003740-g003} miR-22 correlates with PPARA and BMP7 protein expression {#s3g} -------------------------------------------------------- The functional significance of our predicted "interactome" network was tested by experimental validation. Our finding that specific microRNAs and proteins were related to BMI, focused our interest in identifying functional microRNA-gene target pairs relating obesity with osteoarthritis pathogenesis mechanisms. Epidemiological studies have shown that the risk for knee osteoarthritis is increased by 36% for every 2 units of BMI (5 kg) of weight gain [@pone.0003740-March1]. At first we tried to identify which microRNA-gene target interactions have biological significance (inverse correlation in expression levels) in our network. According to our previous combined *in silico* and expression data analysis we identified 5 microRNAs (miR-22, miR-103, miR-337, miR-25, miR-29a) and their 6 targets (PPARA, BMP7, ACOX1, RETN, ITGA5, LEP) that were highly correlated with BMI ([**Figure 1C**](#pone-0003740-g001){ref-type="fig"} **,** [**Figure 2E**](#pone-0003740-g002){ref-type="fig"}). Correlation of microRNA-gene target expression levels revealed that miR-22 was highly inversely correlated with PPARA (r^2^ = 0.919) and BMP7 (r^2^ = 0.816). ([**Figure 3B**](#pone-0003740-g003){ref-type="fig"}), while we detected low correlation between miR-29a with LEP (r^2^ = 0.491), miR-25 and ITGA5 (r^2^ = 0.456), miR-337 and RETN (r^2^ = 0.385) and miR-103 and ACOX1 (r^2^ = 0.252). The above results suggested the potential functional relationship between miR-22, PPARA and BMP7. miR-22 regulates PPARA and BMP7 in normal and osteoarthritic chondrocytes {#s3h} ------------------------------------------------------------------------- In order to detect whether PPARA and BMP7 were direct targets of miR-22, we performed luciferase assay. We found that BMP7-encoded mRNA contains a 3′UTR element that is partially complementary to miR-22 ([**Figure 3C**](#pone-0003740-g003){ref-type="fig"}) and luciferase assay showed that BMP-7 is a direct target of miR-22 (69% reduction, p\<0.001, [**Figure S4A**](#pone.0003740.s009){ref-type="supplementary-material"}). Furthermore, miR-22 overexpression in chondrocytes reduced the activity of a luciferase reporter gene fused to the PPARA 3′UTR (52% reduction, p\<0.001, [**Figure S4B**](#pone.0003740.s009){ref-type="supplementary-material"}). Evaluation of BMP7 and PPARA mRNA expression levels after miR-22 expression revealed that only BMP7 mRNA levels were significantly down-regulated (p\<0.001), while PPARA were not (p = 0.492) ([**Figure S5**](#pone.0003740.s010){ref-type="supplementary-material"}). Western blot analysis revealed that miR-22 regulates both PPARA and BMP7 protein expression levels in normal and osteoarthritic chondrocytes ([**Figure 3D**](#pone-0003740-g003){ref-type="fig"}). Overexpression of miR-22 inhibited BMP-7 (76%) and PPARA (93%) protein expression in normal chondrocytes. Subsequently, inhibition of miR-22 in osteoarthritic chondrocytes by antisense miR-22 treatment, highly up-regulated BMP-7 (8.35 fold) and PPARA (12.55 fold) expression, suggesting that miR-22 is a strong regulator of BMP-7 and PPARA proteins. All above data suggest that miR-22 regulates BMP-7 at the mRNA level and PPARA at the protein level, revealing thus the advantage of using proteomic instead of cDNA microarray data for detecting microRNA gene targets. Metabolic, inflammatory and cartilage homeostasis networks are inter-related {#s3i} ---------------------------------------------------------------------------- Subsequently, we proceeded by investigating how these miR-22 target gene pairs are correlated with the rest of the proteins present in the "interactome" network. Specifically, PPARA belongs to the metabolism sub-network, which is connected with the inflammation sub-network through IL1B. A recent report suggested that PPARA is a receptor involved in inflammatory processes [@pone.0003740-Cuzzocrea1] and was recently found down-regulated in osteoarthritic cartilage [@pone.0003740-Watters1]. In our study, the inflammatory sub-network having IL1B and IL6 as central nodes is connected with MMP13, which is central node of the cartilage structure sub-network. To test this hypothesis predicted by the gene network of IL1B-MMP13 interaction, we treated normal and osteoarthritic chondrocytes with IL1B and examined MMP13 expression. We found that IL1B up-regulated MMP13 expression both at mRNA and protein levels ([**Figure 4A, B**](#pone-0003740-g004){ref-type="fig"}), verifying the correlation that we had previously described between IL1B and MMP13 expression levels in clinical samples [@pone.0003740-Simopoulou1]. In order to understand how IL1B affects not just MMP13 but cartilage homeostasis pathways, we over-expressed IL1B in normal chondrocytes and monitored the expression of the proteins involved in the cartilage network. IL1B over-expression pertubated the cartilage homeostasis sub-network by activation of metalloproteinases and aggrecanases and down-regulation of cartilage structural proteins. ([**Figure 4C**](#pone-0003740-g004){ref-type="fig"}), connecting thus inflammation and cartilage homeostasis sub-networks with osteoarthritis development. ![IL1B regulates important components of cartilage homeostasis network.\ (A) Treatment with IL1B (10 ng/ml) induces MMP-13 mRNA levels assessed by Real-time PCR analysis in normal and osteoarthritic chondrocytes. (B) ELISA assay detecting MMP-13 levels after IL-1b treatment of osteoarthritic chondrocytes. (C) Pertubation of IL1B affects important gene network components in normal chondrocytes. Treatment of normal chondrocytes with IL1B (10ng/ml) for 48 h affects the protein expression of cartilage structure related genes (red color shows up-regulation while green color down-regulation of protein expression). This experiment was performed in quadruplicate. Specifically there is activation of metalloproteinases 3 and 13 (MMP3, MMP13) and aggrecanases (ADAMTS4, ADAMTS5) leading to down-regulation of the cartilage structural proteins (ACAN, SPARC, COMP, TPM2, MATN3, COL2A1). In addition asporin (ASPN) is up-regulated which has been shown to inhibit TGF-beta and aggrecan synthesis (look ref 11). Furthermore SOX9, an important trascription factor implicated in chondrogenesis is highly down-regulated.](pone.0003740.g004){#pone-0003740-g004} PPARA and BMP7 regulate IL1B and MMP13 expression in chondrocytes {#s3j} ----------------------------------------------------------------- In order to delineate the PPARA-IL1B-MMP13 potential pathway we followed an RNA interference strategy. More specifically, siRNA inhibition of PPARA increased IL1B (2.5 fold) and MMP13 (3.5 fold) expression levels ([**Figure 5A**](#pone-0003740-g005){ref-type="fig"}). IL1B was found to be highly induced 24 h after siRNA PPARA treatment, while MMP13 was highly induced 48 h after siRNA treatment, suggesting a sequential activation of MMP13 by IL1B. ![PPARA and BMP7 signaling pathways in chondrocytes.\ (A) Assessment of IL1B and MMP13 mRNA levels after down-regulation of PPARA, 24 and 48 h after siRNA liposomal treatment into chondrocytes. (B) IL1B and MMP13 expression 24 and 48 h after BMP7 siRNA treatment. (C) Evaluation and correlation of BMP7 and ACAN (aggrecan) mRNA levels in normal and osteoarthritic chondrocytes assessed by real-time PCR analysis. (D) Aggrecan expression levels 48 h after BMP7 inhibition of expression using siRNA transferred by liposomes into normal chondrocytes. All experiments have been performed in triplicate.](pone.0003740.g005){#pone-0003740-g005} The second target of miR-22, BMP7, is frequently down-regulated in osteoarthritic cartilage, while BMP7 overexpression induces cartilage formation *in vitro* and *in vivo* [@pone.0003740-Im1]. It has been shown that IL1B and ACAN (aggrecan) [@pone.0003740-Yeh1] levels are regulated by BMP7 in osteoarthritic cartilage. These correlations were present in the cartilage homeostasis sub-network and in addition we found that siRNA against BMP7 resulted in increased IL1B and MMP13 (2 fold) expression in normal chondrocytes ([**Figure 5B**](#pone-0003740-g005){ref-type="fig"}). Furthermore, we detected high correlation between BMP7 and ACAN mRNA levels ([**Figure 5C**](#pone-0003740-g005){ref-type="fig"}) and found that BMP7 siRNA down-regulation blocked effectively ACAN expression ([**Figure 5D**](#pone-0003740-g005){ref-type="fig"}). miR-22 blocks MMP13 activity and inhibits cartilage destruction {#s3k} --------------------------------------------------------------- Overexpression of miR-22 in normal chondrocytes resulted in increased IL1B (5.8 fold) and MMP13 (8.1 fold) expression and decreased aggrecan (4.9 fold) expression ([**Figure 6A**](#pone-0003740-g006){ref-type="fig"}). These results point towards the implication of the combinatory effect in MMP13 up-regulation (8.1 fold instead of 3.5 and 2 fold) by miR-22 overexpression through PPARA and BMP7. Additionally, inhibition of miR-22 in osteoarthritic chondrocytes up-regulated PPARA (4.9 fold) and BMP7 (5.8 fold) expression, blocked the inflammatory process, through inhibition of IL1B (7.6 fold), inhibited catabolic changes such as MMP13 expression (7.9 fold) and activated the cartilage repair protein aggrecan (3.1 fold) ([**Figure 6B**](#pone-0003740-g006){ref-type="fig"}), suggesting the therapeutic potential of microRNA inhibition in osteoarthritis. Furthermore, Western blot, ELISA and immunofluorescence experiments revealed a high decrease of MMP13 expression in osteoarthritic chondrocytes after miR-22 inhibition ([**Figure 6 C--E**](#pone-0003740-g006){ref-type="fig"}). MMP13 is one of the major pathophysiological mediators of cartilage destruction, through degradation of type II collagen in osteoarthritis [@pone.0003740-Billinghurst1] and therefore its down-regulation is of great clinical importance. ![miR-22 regulates PPARA and BMP7 signaling pathways in human chondrocytes.\ (A) Evaluation by real-time PCR analysis of IL1B, MMP13 and ACAN mRNA expression levels 48 h after miR-22 (50 nM) liposomal transfection in normal chondrocytes. Real-time PCR analysis has been performed in triplicate. (B) Assessment of IL1B, MMP13 and ACAN mRNA levels after antisense-miR-22 transfection in osteoarthritic chondrocytes. As-miR-22 treatment affects very early (24 h) PPARA and BMP7 mRNA expression, while IL1B, MMP13 and ACAN expression is affected later (36--48 h) suggesting that there are secondary effects. Real-time PCR analysis has been performed in triplicate. (C, D) Western blot analysis and ELISA assay for MMP13 expression after as-miR-22 overexpression. In ELISA assay each sample has been loaded in quadruplicate and the assay has been performed in triplicate (average and standard deviation is shown). (E) MMP13 expression evaluated by immunofluorescence analysis of osteoarthritic chondrocytes after as-miR-22 liposomal transfection. In the bar graph is shown the average of MMP-13 expressing (green fluorescent) cells detected in 20 different fields in the microscope.](pone.0003740.g006){#pone-0003740-g006} Discussion {#s4} ========== We detected, for the first time to our knowledge, a 16 microRNA gene signature differentially expressed in osteoarthritis. The biological significance of microRNAs is determined by their gene targets which currently can be predicted computationally by prediction algorithms. In order to have experimental data for identification of microRNA gene targets, we performed proteomic analysis, using reverse-phase protein arrays, which revealed a 76 protein signature differentially expressed in osteoarthritis. This technology platform has been designed for quantitative multiplexed analysis of cellular proteins from a limited amount of sample [@pone.0003740-VanMeter1], offering thus a major advantage for protein quantification levels from tissues such as cartilage, where the material is frequently limited. Proteomic analysis was validated by detecting differentially expressed genes such as GDF5, that have been identified as osteoarthritis susceptibility genes by gene association studies [@pone.0003740-Miyamoto1]. Up to date most osteoarthritis molecular studies focus their interest in cartilage homeostasis mechanisms. However our global approach identified proteins related with osteoarthritis pathobiology, that are involved in lipid metabolism and inflammatory pathways, providing a new source of protein expression data that need to be explored in greater detail. For example, we identified novel proteins such as SOX11, CCR3, WWOX to be differentially expressed in osteoarthritic cartilage. Sock et al, have shown that SOX11 is an important transcription factor related with skeletal malformations [@pone.0003740-Sock1]. Similarly, recently Aqeilan et al showed that WWOX -/- mice develop metabolic bone disease [@pone.0003740-Aqeilan1]. In addition CCR3 has been found up-regulated in adipose tissue from obese individuals [@pone.0003740-Huber1]. All these studies suggest that these proteins are directly or indirectly related with osteoarthritis and their differential expression observed in our study in osteoarthritic chondrocytes supports the idea that these proteins are involved in cartilage destruction pathways. However, additional molecular studies are needed to clarify the role and importance of these proteins in osteoarthritis development. Comparison of proteomic and clinical data revealed metabolism-related proteins differentially expressed in osteoarthritic chondrocytes to be correlated with BMI. It has been described that mechanoreceptors are activated in knee chondrocytes due to excess of weight contributing to cartilage destruction. Very interestingly, our proteomic analysis revealed that ITGA5 mechanoreceptor protein was highly up-regulated in osteoarthritic chondrocytes and was correlated with BMI. Previous studies have described integrin-dependent signalling cascades in chondrocyte mechanotransduction. Furthermore Chowdhury et al., showed an integrin-mediated mechanotransduction in IL1B-stimulated chondrocytes, suggesting the relationship between cartilage structure and inflammatory pathways [@pone.0003740-Chowdhury1]. The present work has led to the identification of an "interactome" network involved in the pathogenesis of osteoarthritis. We have shown that integration of microRNA, protein expression and clinical data can be used to generate a network of potential functional associations with osteoarthritis. We were able to validate experimentally the interplay between metabolism genes, inflammatory molecules and cartilage homeostasis enzymes through microRNA mechanism of action. Specifically we found regulation of IL1B and MMP13 by PPARA and BMP7 through miR-22. Consistent with our studies, Watters *et al*, showed that PPARA expression is reduced in a STR/Ort osteoarthritis mouse model [@pone.0003740-Watters1]. IL1B is a central node in our network and perturbation of its expression (over-expression) contributes to cartilage destruction. Our molecular data are consistent with several clinical studies implicating the role of obesity and inflammation in cartilage destruction. Several clinical studies have suggested the effect of obesity in the development of osteoarthritis [@pone.0003740-Lementowski1], [@pone.0003740-Aspden1], however there are no extensive studies correlating lipid metabolism with osteoarthritis at the molecular level. Specifically, Lohmander et al., in a large population study revealed that body mass is a significant risk factor for osteoarthritis leading to arthroplasty [@pone.0003740-Lohmander1]. In addition Marks proposed that a high body mass is present in most adults with osteoarthritis [@pone.0003740-Marks1]. Gene network approaches provide new insights for elucidating the complexity of diseases such as osteoarthritis. Several genes consist the sub-networks that are interconnected creating large gene networks. Alterations in gene expression that are able to perturb a network have a causal relationship with disease [@pone.0003740-Sieberts1]. The integration of gene expression profiling and clinical data provides a detailed picture of how a network state is correlated with disease and furthermore leads to the development of new treatments that target the gene network as opposed to current therapeutic approaches focused on targeting one specific gene only. This strategy will help to improve the understanding of the pathogenesis of multifactorial diseases such as osteoarthritis and provide possible novel therapeutic targets. Supporting Information {#s5} ====================== ###### (0.04 MB DOC) ###### Click here for additional data file. ###### (0.07 MB PPT) ###### Click here for additional data file. ###### (0.07 MB PPT) ###### Click here for additional data file. ###### (0.13 MB PPT) ###### Click here for additional data file. ###### (0.07 MB PPT) ###### Click here for additional data file. ###### (0.16 MB PPT) ###### Click here for additional data file. ###### (0.12 MB PPT) ###### Click here for additional data file. ###### (0.68 MB PPT) ###### Click here for additional data file. ###### (0.14 MB PPT) ###### Click here for additional data file. ###### (0.14 MB PPT) ###### Click here for additional data file. **Competing Interests:**The authors have declared that no competing interests exist. **Funding:**Funding support was provided from Hellenic Association of Orthopaedic Surgery and Traumatology. Funding organizations did not have any role in study design, data collection, interpretation of the results, decision to publish, or preparation of the manuscript. [^1]: Conceived and designed the experiments: DI AT. Performed the experiments: DI PO. Analyzed the data: DI PO AT. Contributed reagents/materials/analysis tools: DI KNM AT. Wrote the paper: DI AT. [^2]: Current address: Department of Biological Chemistry and Molecular Pharmacology, Harvard Medical School, Boston, Massachusetts, United States of America
{ "pile_set_name": "PubMed Central" }
Plan a College Visit Why Visit a College? There’s no substitute for experiencing a college firsthand to discover if it’s the best fit for you. Schedule a college visit and see for yourself what it’s like to sit in a college classroom or try the food in the dining hall! You can also often set up meetings with coaches or professors to get a better idea of what you might experience as a student there. Need ideas for questions to ask on your visit?
{ "pile_set_name": "Pile-CC" }
 Microsoft Visual Studio Solution File, Format Version 11.00 # Visual Studio 2010 Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "ListViewTest", "SEImageListView\ListViewTest.csproj", "{0C74DAD0-CA29-48E0-8EEC-385308368A0C}" EndProject Global GlobalSection(SolutionConfigurationPlatforms) = preSolution Debug|x86 = Debug|x86 Release|x86 = Release|x86 EndGlobalSection GlobalSection(ProjectConfigurationPlatforms) = postSolution {0C74DAD0-CA29-48E0-8EEC-385308368A0C}.Debug|x86.ActiveCfg = Debug|x86 {0C74DAD0-CA29-48E0-8EEC-385308368A0C}.Debug|x86.Build.0 = Debug|x86 {0C74DAD0-CA29-48E0-8EEC-385308368A0C}.Release|x86.ActiveCfg = Release|x86 {0C74DAD0-CA29-48E0-8EEC-385308368A0C}.Release|x86.Build.0 = Release|x86 EndGlobalSection GlobalSection(SolutionProperties) = preSolution HideSolutionNode = FALSE EndGlobalSection EndGlobal
{ "pile_set_name": "Github" }
Gingrich Ponders Response to Negative Ads ATLANTIC, Iowa — Former House Speaker Newt Gingrich said Saturday that his campaign will have to take a more aggressive approach in combating the onslaught of negative ads that have deflated his poll numbers here. But with just three days until the Iowa caucuses, the strategy still appears to be a work-in-progress. “We haven’t figured out how to deal with the ads that are dishonest without doing anything stupid ourselves,” Mr. Gingrich told a town-hall audience at a Coca-Cola distributer’s warehouse here. He told reporters later, “We may go to a much more clear contrast, but we’re not going to respond in kind.” Mr. Gingrich said such a strategy shift would not come until after the Iowa caucuses, which he compared to the opening three minutes of the Super Bowl… This copy is for your personal, non-commercial use only. Distribution and use of this material are governed by our Subscriber Agreement and by copyright law. For non-personal use or to order multiple copies, please contact Dow Jones Reprints at 1-800-843-0008 or visit www.djreprints.com.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The present invention relates in general to an extruded film processing system, and in particular to control systems utilized in extruded film processing systems. 2. Description of the Prior Art Blown film extrusion lines are used to manufacture plastic bags and plastic sheets. A molten tube of plastic is extruded from an annular die, and then stretched and expanded to a larger diameter and a reduced radial thickness by the action of overhead nip rollers and internal air pressure. Typically, ambient air is entrained by one or more blowers. The ambient air provides a cooling medium, which absorbs heat from the molten material. This speeds up the change in state from a molten material back to a solid material. Additionally, the ambient air entrained by the blowers is used to provide air pressure, which is utilized to control the size and thickness of the film tube. One type of blown film extrusion line utilizes air flow on the exterior surface of the film tube in order to absorb heat. A different, and more modern, type of blown film extrusion line utilizes both an external flow of cooling air and an internal flow of cooling air in order to cool and size the film tube. Whether the blown film tube is cooled from the interior surface, the exterior surface, or some combination of the two, one common problem in blown film extrusion lines is that of obtaining precise control over the diameter of the extruded film tube. Tight control over the diameter ensures uniform product dimensions, which includes the size of the extruded product, as well as the thickness of the plastic material. Acoustic sensors may be utilized to gauge the diameter of the product. When such acoustic sensors are utilized, a feedback loop is established to alter dynamically one or more controllable variable of the process, such as blower speed, and/or temperature control over the cooling air stream.
{ "pile_set_name": "USPTO Backgrounds" }
Synod of Szabolcs The synod of Szabolcs was an assembly of the prelates of the Kingdom of Hungary which met at the fortress of Szabolcs on 21 May 1092. It was presided over by King Ladislaus I of Hungary. The synod passed decrees which regulated the life of both clergymen and laymen, several aspects of liturgy and Church administration and the relationships between Christians, Jews and Muslims. References Sources Category:History of Christianity in Hungary Category:1092 in Europe Category:11th-century Christian church councils Category:11th century in Hungary
{ "pile_set_name": "Wikipedia (en)" }
Impaired enteric degradation of pancreatic endopeptidases in antibiotic-treated rats. Conventional Sprague-Dawley rats were fed by gastric tube for 5 days with either benzylpenicillin, ampicillin, doxycycline, or clindamycin. In contrast to the pretreatment period fibrinolytic activity and active and immunoreactive trypsin and immunoreactive elastase were present in fecal extracts after 4 days of antibiotic administration. This is consistent with findings in germfree rats and represents an alteration in the intestinal microflora. The germfree characteristics persisted until a suspension of cecal contents from normal rats was administered by enema on the 26th day. In fecal extracts from the clindamycin-treated rats considerable amounts of active and immunoreactive enzymes were, however, still found 10 days after the enema. A possible explanation is that clindamycin or a metabolite remains in the intestinal tract for a long time. The pathophysiological significance of this finding is unknown.
{ "pile_set_name": "PubMed Abstracts" }
Q: Are contest-like questions fair game? https://philosophy.stackexchange.com/questions/25076/can-you-tell-me-plianly-what-is-the-difference-between-truth-and-fact As far as I can tell, the OP is looking for short answers (as in "number of words can be counted on fingers"). I'm not 100% confident on the value in such an answer, but the format is intriguing. This almost sounds like Philosophy SE's equivalent of code golf. As a community, would philosophy questions asked in this phrase be valuable? They'd certainly be fun, and that seems like it's worth something. A: Fortunately, the question you linked to is a pretty obvious duplicate, so we can close it for that reason. I think questions in this format are a bad idea, for many reasons: Answers to questions already are supposed to be as succinct as possible. Answers that are more succinct than possible are therefore (by definition) wrong. Answers that are on the order of few words are not likely to actually be philosophy, they are more likely to be the sort of thing that people put on a bumper sticker. Rather than opening up participants in the community to understand philosophy better, they are a way of shutting down conversations. The idea is incredibly presumptuous: I can tell the difference between fact and truth in six words, can you? Well, Plato, Cicero, Augustine, and so on either couldn't or decided not to. This question at least sounds more like a riddle than a search for wisdom. The original asker proposes his "six word solution"... and then needs to spend a whole paragraph explaining why his six word solution makes sense (that his answer itself is entirely just his own opinion is a whole other issue). Therefore, the actual length of his answer is not six words, it's a paragraph.
{ "pile_set_name": "StackExchange" }
Q: How to programmatically invoke zoom event in MatLab? I am using "plot_google_map.m" that uses the Google Maps API to plot a map in the background of the current figure. A figure generated with this auto-refreshes the map upon zooming event, and I added some codes to make it refresh data upon panning event, too. Now I would like to programmatically change the range of axes without using zoom or pan buttons, but the problem is map is not refreshed automatically. So, I am thinking of generating zooming or panning event programatically, but I haven't found a way to do that. Any idea on this? Let me elaborate my question. In the 'plot_google_map.m', there is subfunction which is a callback of zooming event. function plot_google_map % Listen to Zoom events h = figure(1); plot(1:10); hz = zoom(h); set(hz,'ActionPostCallback',@mypostcallback); function mypostcallback(obj,evd) disp('Refreshes map data'); What I want to do is, to call this subfunction outside the 'plot_google_map'. Any idea is welcomed, and thank you for your answers in advance! A: You heard about the zoom command? >> help zoom zoom Zoom in and out on a 2-D plot. Actually it seems that's how the program recognizes you zooming.
{ "pile_set_name": "StackExchange" }
Friday, November 20, 2009 A Preview of Google Chrome OS Google has released Chromium OS*, the open source precursor to their Chrome OS (which Google says will be “ready for users” in a year). Google in a blog post explains that the Chrome operating system will be all about web apps, not traditional apps, so the “entire experience” takes place within the browser. Additional focus in Chrome OS will be on speed, as well as security; “Every time you restart your computer the operating system verifies the integrity of its code,” Google promises. They also mention that they “benefited hugely from projects like GNU, the Linux Kernel, Moblin, Ubuntu, WebKit”, some of the layers of Chrome OS. Below video is giving an overview of the Chrome OS user interface: Expanding the app menu, linking to web apps such as Gmail, Hotmail or Google Calendar. Some windows remain always on top. [Thanks Fabio, Ricardo, Inferno, everyone! Screenshots from Google’s Chromium site via Chathurga.] >> More posts
{ "pile_set_name": "OpenWebText2" }
[A study of developmental order of secondary sexual characteristics in Beijing girls]. A six-year (1980-1986) study of the developmental status of the secondary sexual characteristics was made among 937 girls in Beijing. The mean age of the first appearance of the secondary sexual characteristics was breast 11.84 +/- 0.95 years, pubic hair 13.29 +/- 1.11 years, axillary hair 13.71 +/- 1.21 years; the average age of developmental maturation was breast 13.95 +/- 1.16 years, pubic hair 14.85 +/- 1.29 years, axillary hair 15.14 +/- 1.24 years. Their developmental order, as measured by the mean values of the groups, was breast, the first menarche (12.88 years), pubic hair, axillary hair. But when the individuals were examined only 22.85% was found to be in accord with the above order. The individual variation was very great. The course of development took about 3.5 years, but some needed one year to develop others six years. Some girls developed and finished at the same time, some finished earlier or later. Only a few girls have had no development of pubic hair and axillary hair until 18 years old.
{ "pile_set_name": "PubMed Abstracts" }
/** * @license Copyright (c) 2003-2020, CKSource - Frederico Knabben. All rights reserved. * For licensing, see LICENSE.md or https://ckeditor.com/legal/ckeditor-oss-license */ /* global document */ import testUtils from '@ckeditor/ckeditor5-core/tests/_utils/utils'; import EditorUIView from '../../src/editorui/editoruiview'; import ViewCollection from '../../src/viewcollection'; import Locale from '@ckeditor/ckeditor5-utils/src/locale'; describe( 'EditorUIView', () => { let view, locale; testUtils.createSinonSandbox(); beforeEach( () => { locale = new Locale(); view = new EditorUIView( locale ); view.render(); } ); afterEach( () => { view.destroy(); } ); describe( 'constructor()', () => { it( 'accepts locale', () => { expect( view.locale ).to.equal( locale ); } ); it( 'sets all the properties', () => { expect( view.body ).to.be.instanceof( ViewCollection ); } ); } ); describe( 'render()', () => { it( 'attach the body collection', () => { expect( view.body._bodyCollectionContainer.parentNode.classList.contains( 'ck-body-wrapper' ) ).to.be.true; expect( view.body._bodyCollectionContainer.parentNode.parentNode ).to.equal( document.body ); } ); } ); describe( 'destroy()', () => { it( 'detach the body collection', () => { const el = view.body._bodyCollectionContainer; view.destroy(); expect( el.parentNode ).to.be.null; } ); it( 'can be called multiple times', () => { expect( () => { view.destroy(); view.destroy(); } ).to.not.throw(); } ); } ); } );
{ "pile_set_name": "Github" }
The Blackhawks’ roster has changed a few times since the start of the season. Some players have left. Some have come in. With so many new arrivals, it seemed like a good time to update our series on why the Blackhawks wear their jersey numbers. Here’s the latest version: Duncan Keith, 2: That was the number I got when I had it in my stall in Norfolk (AHL) when I got sent down when I was 20. Stuck with me ever since. No idea. Connor Murphy, 5: There’s a couple. Nick Lidstrom was always my favorite player. And then my dad (Gord Murphy) wore No. 5. He played 14 years in the NHL and always wore it, so I followed that. Brent Seabrook, 7: I wore it as a kid. I always liked the No. 7. I was 77 and 27 in summer hockey. I always liked 7, and I was lucky enough to have it. I always just sort of stuck with it. It was the jersey they gave me in juniors, which I was pretty pumped about, and the jersey that they gave me here. It’s pretty...
{ "pile_set_name": "Pile-CC" }
Many people add a disclaimer that their beliefs do not reflect those of their agency. Mine do. I represent the Aurora (IL) Police Department and I strive to keep my values aligned. Here are some of my thoughts. Total Pageviews Monday, October 28, 2013 I got my @$$ handed to me in the boxing ring. Forgive the vulgarity, but it is the only way to adequately describe what occurred. When a sergeant from my department asked me if I would be interested in participating in an exhibition boxing match for charity against a female commander from another jurisdiction, I happily agreed. The words “charity” and “exhibition” drowned out the words “boxing match” in my head. I was expecting oversized clown gloves and putting on a fun show for the crowd. I couldn’t have been more wrong. I heard much trash talking from the other side of the county but I really thought it was just hype to generate ticket sales for the event. Since I’d never boxed before, I sought out a boxer, MMA fighter and overall “badass” to help me with some basics so I would, at the very least, punch and move properly. In hindsight, I should have trained much earlier than 2 weeks out because my opponent was doing just that. When I stepped into that ring, I was prepared to entertain the crowd.When she threw the first punch into my face, I knew it wasn’t for fun.Everyone has a plan until they get punched in the face, right?I don’t remember much from my bout.In fact, my trainer was apparently screaming from my corner telling me to “get out” and “block” and I can honestly say I didn’t hear a word.I never felt pain, either.I could see her fists coming at my face and I knew she was making contact, but it didn’t hurt at all in the moment.That’s the beauty of adrenaline. I’ve been fortunate enough to be able to talk myself out of a lot of fights over the course of my career. For the ones I couldn’t, the scenario always ended the same way: the bad guy ended up in handcuffs. If I started alone in a fight, I knew there were more of my brothers and sisters in blue on the way to assist. In the ring, I couldn’t call for back up. At one point, she hit me so hard that I reverted back to my police training and I instinctively turned to find cover. In a ring, there is nowhere to go but back into the fight. I held my own. I stayed on my feet. I endured 3 rounds. I lost by majority decision. But I learned a few things for which I am grateful. The first of which is to be prepared. I think if I’d have taken this bout as serious as my opponent, I might have prevailed in at least one of the rounds. I have no one to blame but myself for making the assumption that this was a game. Those who prepare don’t need luck. They win because they put in the time on the front end so they are ready for the moment. This isn’t as much about boxing as it is about life. For police officers, you can never know when you will find yourself in a dark alley with a bad guy who is ready to sacrifice it all to get away and hurt you in the process. You must train for those moments where life meets circumstance. Train for the unpredictable so you get to control the outcome. Those who are unprepared will find themselves wishing they’d have trained harder for the fight that really matters - if they live to tell about it. For those who don’t face criminals in dark alleys, life it still about preparation. It’s about committing yourself to constant self improvement. Take the classes you’ve been putting off, read the book that will make you better at what you do, start training your body. Take on a new challenge that moves you out of your comfort zone because when you come out on the other side, you will be better. Never miss an opportunity to improve yourself because you can never know when it will pay off. That was my second lesson. I had never boxed before and as the fight grew near, I was legitimately terrified. But I committed to the event and I asked myself the question I ask every time I get nervous about an upcoming challenge: “What is the worst thing that could happen?” I came up with the following answers: I could lose. I could get publicly humiliated in the process. I could actually get hurt. The funny part is that getting hurt played the least part in the equation. I’m not sure why but I’m not scared of getting injured or being in pain. I’ve endured pain before and I know it’s temporary. I wasn’t even particularly worried about losing. I knew going into this bout that my opponent was bigger and stronger and thus, I had no delusions or false confidence. So public humiliation was the only lingering barrier and I figured I could live with that! Once I formulated the answers to the questions and accepted the worst case scenario, I was able to move forward. I stepped far outside my comfort zone and in the moment, it really sucked. I wanted to revert back to my safe place. But I’m glad I stayed in and endured. And now that I’m on the other side, I’m better for having done it. Even with the loss and the humiliation. I’m better because I tried. Photo by Ed Corral Photography I couldn’t give up because it would render pointless every lesson I’ve ever taught my children about failure and resilience. Much of life is showing up and if you end up taking a beating, that’s okay as long as you get up again. It’s about perseverance and staying in the fight. And finally, I learned that the people in your corner are the ones who matter most of all. The actual fight is a blur to me but one thing I do recall is looking out to see the faces of my friends and family cheering me on.The ones who showed up are the ones who will still be there without a winning title and when the rest of the crowd goes away, they’re still in my corner. They don’t make trophies for that. Wednesday, October 23, 2013 I entered this profession in 1991 at a time when it was progressive enough that women in policing had already secured a place, but not progressive enough that women held leadership positions. In my state, we were accepted into the thin blue line but we would maintain our positions within that line for awhile and not out in front leading the line. By the very nature of human adaptation, we sought to “fit in” so much so that we bartered away our uniqueness for a place at the table. When I was a brand new police officer, I acted the way I thought I was supposed act and I emulated those around me. This was a stretch from the person I actually was. I was a chubby kid throughout my childhood and I’m kinda grateful for my parent’s lack of knowledge about nutrition because with every slice of pizza I shoved into my face, I learned to be funny to compensate for my husky waistline. The summer before my senior year of high school, I discovered exercise and health and lost the weight. But I was still funny. I was voted “Class Clown” by my fellow classmates because I had mastered quick-wit and humor as a way to draw others in. I was usually the loudest person in the room, and quite frankly, I don’t know how to be any other way. So when I fulfilled my dream of becoming a cop, I stifled that part of me and applied my proverbial mask that I dubbed my "street personality”. My small stature magnified my insecurity so I overcompensated by being over the top. I used to believe that this phenomenon was exclusive to women but I’ve since realized that it is not gender-specific. We all spend much of our time watching social cues and emulating others so we don’t stand out too much. We are innately designed so that we adapt to our environment. For the first year on the job, I was a poser. I pretended to be tough and I talked a big game. That is, until a criminal-type ran from me on a traffic stop. I got a much needed lesson that my skills and stature were nothing against a 6’3’” muscle-man. I gave chase but failed to consider my gift of being pretty fast when I needed to be. As the gap between he and I was closing, I recall having the semi-conscious thought: “What am I going to do when I catch him?” So I formulated a plan to to pounce and tackle him to the ground, then cuff him. I got within 3 feet and sprung on him with Tigger agility and grabbed his shoulders. But.he.didn’t.fall. His footing wasn’t in the least bit affected by my acrobatic feat. I didn’t have a “plan B” because it never occurred to me that my “plan A” would be thwarted by physics. I never made a conscious decision to hang on to him - it just happened. So as I was riding this guy’s back through the backyardsof a neighborhood on the east side of Aurora, my “tough guy” act fell away and I said to him: “We both know you could really hurt me if you wanted to. But you won’t -- because it won’t increase your street cred given my obvious proportion. And it certainly won’t help my reputation among my fellow officers. So let’s just end this and I’ll arrest you for your warrants which is inevitable sooner or later anyway. I won’t charge you with fleeing and we’ll call it a day.” He stopped. Just like that, he stopped abruptly. I slid down his back and handcuffed him with no issue whatsoever. He said, “Ma'am, no one has ever been real with me like that.” He also said, “You dropped something back there” which turned out to be my radio that had bounced out of it’s holder. So we walked together and he showed me where I dropped it (no kidding). I picked it up and said in my most confident voice over the air, “Subject in custody”. I ran into that guy many times throughout my career and he never gave me a problem. He gave other cops a problem -- but not me. After that incident, I started being me. I brought MY personality to my job and I started making great successes. I learned that when you treat people with dignity and respect and never look down on them (even when they are literally laying in the gutter), they will cooperate and even help you. I was a successful police officer because I stopped trying to be what I believed I was supposed to be and started being authentic. I diffused situations with humor and I didn’t withhold compassion like I thought I was supposed to do. I was me. Then I got promoted to sergeant and the same thing happened again. I started acting the way my bosses over the years acted because I thought that was how authority was supposed to look. Fortunately, I was conscious of it and I forced myself to remember the lesson I learned 9 years earlier. It’s a struggle to go against the “norm” and it’s much easier to attempt to live in the contrived notion of what others believe a Chief, a Captain, a Lieutenant, a President, a Board Member (insert any title here) should be. Whose template are we trying to fit? We should be more concerned with results. Are we getting the job done? That should be the litmus test and should matter more than anything else. What’s wrong with adding personality to the process? When it’s time to put our game faces on, we always do. It’s so counter-intuitive but the fact is that when we start using the skills and the gifts that are unique to us (humor, passion, compassion, creativity) -- when we begin being more of who we really are -- this authenticity makes us better at leading people. It does so because we aren’t borrowing power from our position. It does so because we don’t have to try and remember to be a different person at work. Humans aren’t built to compartmentalize the different facets of our lives. I’m always astounded when people tell me they are a different person at home than they are at work. That must be exhausting to try and remember who to be based on where you are! I know what stops us from being who we really are. We are worried what will "THEY" will think. What will EVERYONE think? The best moment of my life came after I finally asked myself, “Who is this THEY that I’m so worried about and why do I give them so much power?” The answer is actually really simple. I keep a list of the “they’s” in my life whose opinion really matters to me. I call them my “Personal Board of Directors” and they are comprised of my family, friends, and mentors with strong values and high expectations of me. When I begin to worry or the criticism starts to get to me, I refer to my list and as long as I’m doing right by them, the noise falls away. If there is a time where I know that my “THEY” would not be proud, I know that I have to make some changes. And if you find yourself on the other side as one of the critics or the one who stands in judgement, stop. Check yourself. Be introspective enough to question your own judgments of others and instead of criticizing, seek understanding. I have found that my biggest critics are usually people who don’t even know me. You are never going to satisfy all the critics (especially the higher you ascend in an organization). That’s okay -- that’s where COURAGE comes in. You could be the ripest, juiciest apple in the world, and there’s going to be someone out there who hates apples. There are those moments when I struggle and am tempted to fall prey to the criticism that suggests I don’t act (or even look) “Commanderly”. And then I think of the men and women in my department and the results they produce and the relationships I have with them that are based on mutual respect and I realize I’m doing something right. I’ve gotten this far in my career by being me and I’m proud of that. And I’m not going to change to fit someone else’s template. We all need to find the courage to be authentic and even vulnerable at times. Vulnerability is not for the weak -- it’s for the strong. It takes courage to stand out because it’s much easier (and safer) to fit in. You will have critics and people will judge you but as long as you are right with the “they” in your life and as long as you are doing the right thing, for the right reasons, and at the right time, you should be YOU as much as you possibly can. Thursday, October 10, 2013 Do you think leaders should be loved or feared? This leadership question has been debated over the years with different surveys and trends that reveal many opinions on the matter. Some believe that fear is a motivator and that people, when left to their own devices, will not perform without the threat of discipline or punishment. Instilling fear then, is a motivator unto itself. The fearful leader rules with an iron fist and order is achieved through the genuine belief that discomfort will result should they not perform. Police officers can sometimes fall back on their position of authority and use their badge to motivate through fear. Parents do this by using the “Because I said so” approach. The problem with being feared is that people don’t develop intrinsic motivation to perform (motivation that comes from within us). When people perform out of fear, they soon become resentful and that results in a revolt against authority over time. When a police officer instills fear when they could have used influence, defiance occurs. On the opposite end of the spectrum is the leader who is loved. This leader gains the admiration of his or her people based on affection. This leader typically craves being looked upon favorably by those they lead. A leader who is loved may become so accustom to the feeling of admiration that it clouds their thinking. It feels good to be loved and it’s easy to get caught up in the warm and fuzzy throes of positive emotion. As result, the loved leader will make decisions based on the need to hold onto that feeling and thus, will attempt to appease their people rather than risk upsetting them. The consequence is that these loved leaders will soon turn to others to make the tough decisions so they don’t have to be the “bad guy”. In parenthood, this results in being more of a friend than a parent. Many say that leaders should be both loved and feared. I disagree and argue that they should be neither. Instead, they should be respected. Respect is born out of high regard and is elicited by a persons abilities, qualities and achievements. It is an esteemed reverence for skill but the overarching characteristic for respecting a leader is based on reciprocity. That is, they genuinely hold their people in high regard and honor them for their contribution to the organization. Leaders who are respected follow a simple formula when making any decision -- whether it be about policy or personnel: Am I doing the the right thing, at the right time, and for the right reasons? If the answer to any component of this question is “no”, they re-evaluate and formulate a response that is in proper alignment. A respected leader will always be able to give transparent reasons for the decision they made and will never feel ambushed or insulted when asked to do so. A respected leader understands that they will not please everyone all of the time and makes peace with that concept because they have followed the formula. I firmly believe that you can buy a person’s back, but you cannot buy their heart. Quite simply, I can force someone to do what I want by threat of punishment (fear) and that method will be effective; but only in the short term. However, when the heart is fully engaged and people believe that they are valued and respected, they will perform because their purpose and their passion persuades them to do so. It takes time to build an environment where values and expectations are communicated clearly and where people are appreciated for their skills. This is no easy feat because it requires honest and open dialogue and transparent policies with constant communication. Perhaps we shouldn’t focus on the leaders at all. Maybe the answer is finding the “why” in what we do so that we perform not for someone but for something bigger than ourselves. About Me I am the Chief of the Aurora Police Department in Illinois. I hold a Bachelor’s Degree in Criminal Justice from Aurora University and a Master’s Degree in Criminal Justice Management from Boston University. I am a graduate of the Harvard Kennedy School of Government (Senior Executives in State and Local Government) and am a proud graduate of the FBI National Academy #249. I am currently pursuing a 2nd Master's Degree in Homeland Security and Defense at the CHDS Naval Postgraduate School. I've been with the Aurora Police Department since 1991 where I started as a police cadet. During my 20+ year career, I've worked in various divisions including Community Oriented Policing, Domestic Violence Reduction Unit, Field Training and Patrol. Prior to my promotion to Chief, I served as the Patrol Commander and the Investigations Commander. My passion is public speaking and teaching. I helped found "Blue Courage" which is a 2 day training course for police officers (see BlueCourage.com).
{ "pile_set_name": "Pile-CC" }
t one hundred thousand. 1200000 Let x = -10466778079010308.50000009 + 10466777905557599. Let f = -173452708 - x. Let q = 1.5 - f. Round q to seven decimal places. -0.0000001 Let n = -81.99 - -81.989992515. Round n to six dps. -0.000007 Suppose 0 = 60*x - 59*x + 6. Let l be 3 + (x/18)/(2/42). Let q = l - 34. What is q rounded to the nearest 10? -40 Let z = 29213.77 + -29366. Round z to the nearest ten. -150 Suppose 0 = -3*m + 3*b + 13371, 4*m - b = 3337 + 14494. Round m to the nearest one hundred. 4500 Let z be (-74)/4 - (-2)/4. Let r be ((-12)/z)/(2/9948). Suppose -2*h - 4*b - r = h, -3*b - 1112 = h. Round h to the nearest 1000. -1000 Let x = 0.54161862 + -0.5415. Round x to 5 decimal places. 0.00012 Let f = -1.72 - 42.28. Let s = f - -44.00000952. Round s to six decimal places. 0.00001 Let q = -127 + 194. Let o = 67.000044 - q. What is o rounded to five dps? 0.00004 Let p = 22 + 12. Let k = 654618.545 + -654584.5449999. Let g = p - k. Round g to six decimal places. 0 Let i = -375.3 + 375.31553. Round i to three dps. 0.016 Let u = -907.7721 - -912.12. Let s = 4.32 - u. Round s to two decimal places. -0.03 Let g = -0.15393 + -29.05107. What is g rounded to the nearest 10? -30 Let g = 6.2931 + 2771.6069. Round g to the nearest 10. 2780 Suppose 5*x + 1870 = 2*z, 2*z + 533 = -2*x - 215. Let n = -222 - x. Let f be (n/(-95) - 4/10) + 4. What is f rounded to the nearest integer? 2 Let y = 0.0351619 - 0.03509. What is y rounded to 5 decimal places? 0.00007 Let l = -60.513 - 0.487. Let f = 1.095 + 60.205. Let o = l + f. What is o rounded to the nearest integer? 0 Let l = -164092.24192 - -168239.2412258. Let s = l - 4147. What is s rounded to four dps? -0.0007 Let d = 0.0512746 + -0.0516. What is d rounded to five decimal places? -0.00033 Let i = 4934 - 4934.3164. Round i to 2 dps. -0.32 Let h(k) = 1246*k + 6. Let q be h(3). Suppose 2*d = 4*d - q. Let s = 12072 - d. What is s rounded to the nearest 1000? 10000 Let t = -450 + 840. Let j = t + -389.99999503. Round j to 7 dps. 0.000005 Let q = 199077 - 199182.147. What is q rounded to the nearest 10? -110 Let c = -28648 - -28648.24699. What is c rounded to three dps? 0.247 Let h = 6022.5000026989 - 6022.5. What is h rounded to six decimal places? 0.000003 Let i = 5065.6219 - 5066. Let f = -216.361 - -216. Let z = i - f. What is z rounded to 3 decimal places? -0.017 Suppose 0 = -67*y + 71*y + 16. Let i(r) = -r**2 + 3*r - 3. Let d be i(2). Let w be 4/y + -14 + d. What is w rounded to the nearest 10? -20 Let g be (-50*37871)/(-10) + (2 - 0). Let q = -278057 + g. Round q to the nearest ten thousand. -90000 Let j = -0.03122 - -0.05801. Round j to 3 decimal places. 0.027 Let a be (-7 - -9)*(-2 + 9). Suppose 0 = -16*b + a*b + 50156. Suppose 0 = 5*r - b - 114922. Round r to the nearest 100000. 0 Let j = 3.19 + -0.02. Let g = -12.67 + j. Round g to the nearest integer. -10 Let t = -135.016 - -5560.116. Round t to the nearest 100. 5400 Let l = -123.822553 - -10.820623. Let n = l - -113. What is n rounded to four decimal places? -0.0019 Let k(p) = -p + 11. Let w be k(7). Suppose -6*q + 4 = -w*q. Suppose -q*y - y = 153. Round y to the nearest ten. -50 Suppose -2*x - 5*z - 2956 + 25406 = 0, -56158 = -5*x + 4*z. What is x rounded to the nearest one hundred? 11200 Let p = 162 + -171.1. Let c = p + -5.1. Let v = c + 3.7. Round v to the nearest integer. -11 Let o = 190922704 + -178523084.9. Let v = -12399589.1000006 + o. Let f = v + -30. Round f to six dps. -0.000001 Let x(k) = -196798*k - 566. Let o be x(3). What is o rounded to the nearest ten thousand? -590000 Let c = -11264 + 11264.0000016386. What is c rounded to seven dps? 0.0000016 Let q = 1160730 + -795430. Round q to the nearest ten thousand. 370000 Suppose 82*o - 1588110 = 76*o. Let p = -59685 + o. Round p to the nearest one hundred thousand. 200000 Let c = 5.92 - 304.92. Let q = 220.5 + c. Round q to 0 dps. -79 Let o = -7.6436 + 7.64421231. What is o rounded to 4 dps? 0.0006 Let i = 0.26 - 1.76. Let h = -1.50000812 - i. What is h rounded to 6 decimal places? -0.000008 Let z = 76 - 75.946. Let u = z - 0.002. Let o = 0.0519687 - u. Round o to 5 dps. -0.00003 Let l = 24.2 + 225.8. Let i = l - 541. Let u = -290.99999743 - i. Round u to 6 dps. 0.000003 Let i = 4062 - 7636. Let k = -3573.9997119 - i. Round k to 5 dps. 0.00029 Let x = 147.4 - -57.8. Let f = -63.4 + x. Round f to the nearest ten. 140 Let y = -10726 + 10655.71. Let j = y - 45.73. Let z = 116 + j. What is z rounded to 1 dp? 0 Let p = 26 + 23. Let g = p - -18. Let c = -66.836 + g. Round c to two dps. 0.16 Let l = -26671.99983043 - -26672. Round l to five decimal places. 0.00017 Let b = 502 + -230. Let h = -271.999889 + b. Round h to 5 decimal places. 0.00011 Let v = -944.3 + 944.299997599. Round v to seven dps. -0.0000024 Suppose -250*c = -221*c + 69774000. What is c rounded to the nearest one hundred thousand? -2400000 Let s = -7429 - -7429.4143. Let c = s + -0.41428191. Round c to six dps. 0.000018 Let l = 1527.8 + -1698.51. Let n = -178.8 - l. What is n rounded to 1 dp? -8.1 Let u = -393.73 + -413.75. Let i = u - -816. What is i rounded to one dp? 8.5 Let p = -0.170872912 + -213.829072888. Let w = p + 214. What is w rounded to five decimal places? 0.00005 Let v(j) = 1978*j**3 + 7*j**2 - 3*j - 29. Let o be v(-3). Round o to the nearest 100. -53400 Let p = 17.87 + 4177.63. Round p to the nearest 1000. 4000 Let f = -129.439992789 + 129.44. Round f to 6 dps. 0.000007 Suppose -28854 + 92911 = -7*g. Let l = g + 3511. What is l rounded to the nearest one thousand? -6000 Let f = 491.4 - 490.2906. Round f to one dp. 1.1 Let v = -2795 - -3129.2. Let x = v + -287. What is x rounded to the nearest integer? 47 Suppose 4*b + b = 9*b. Suppose b = -w + 84884 + 23916. Round w to the nearest ten thousand. 110000 Let w = -122 - -126. Suppose 0 = w*h + h - 0*h. Suppose -4*u - 9855709 - 9104291 = h. Round u to the nearest one hundred thousand. -4700000 Suppose -k = 18 - 20. Let v be (1 + -3 - -34516) + -1 + k. Suppose 3*h + v + 2085 = 0. What is h rounded to the nearest 1000? -12000 Let m = -37 - -40. Let w(b) = b**2 + 2*b - 19. Let o be w(3). Let p be (m/(-1) - (o - 16)) + 3. Round p to the nearest one thousand. 0 Let o = -346 - -244. Let c = -53 - o. Let q = c + -49.000096. What is q rounded to 5 dps? -0.0001 Suppose 3*g = 7*g. Let b(q) = 2*q - 111. Let u be b(g). Let t be u + (2 + -2 - -2). Round t to the nearest ten. -110 Let m = 146 + -98. Let i = m - 48.0435. Round i to three decimal places. -0.044 Suppose -15*g + 8*g = -496391. Let i be -3 + -5 + (g - 5). Round i to the nearest 10000. 70000 Let m be (-878614)/3 + 105/(-63). Let v = m - 30127. Round v to the nearest 10000. -320000 Suppose 40988 = v - 0*n - 3*n, -n + 163900 = 4*v. Let r be 84*(-6284)/3*(-26)/52. Let f = v - r. Round f to the nearest ten thousand. -50000 Let j = 2 - -10. Let l = -11.85 + j. Let c = l - 0.15000055. Round c to seven decimal places. -0.0000006 Let u = -30298971787963.000113 + 30299070803813. Let v = u + -99015757. Let m = -93 + v. What is m rounded to 5 decimal places? -0.00011 Let k = -20015.49 + 20096. Let h = 75 - k. Round h to 1 decimal place. -5.5 Suppose 7459775 = 3*m + u - 8335229, 2*u - 10530008 = -2*m. What is m rounded to the nearest one million? 5000000 Let p = -5.6 - -5.7. Let f = p - -37.9. Let a = -37.9874 + f. What is a rounded to three dps? 0.013 Let w(g) = 45664*g - 16. Let s be (4/2 - 4) + (-10)/(-2). Let q be s/(27/(-6))*9. Let n be w(q). What is n rounded to the nearest ten thousand? -270000 Let p = -1.332 - -1394.332. Let f = -9662.903 + 8270.64. Let l = f + p. What is l rounded to one dp? 0.7 Let s = -446936 + 211786. Round s to the nearest 1000. -235000 Let o = 2536.99978016 - 2537. What is o rounded to 5 decimal places? -0.00022 Let o = 0.053721 + 2.538179. Round o to one decimal place. 2.6 Let a = -8770.1537086 - -0.0437086. Let l = 8815 + a. What is l rounded to the nearest integer? 45 Let t = -248885.1517 + 248901. Round t to 0 dps. 16 Let l = -663245805 - -663245874.0000046. Let r = 68.43 - -0.57. Let c = r - l. Round c to 6 dps. -0.000005 Let h = 1224725658 - 1224725657.320999483. Let d = -0.679 + h. What is d rounded to seven dps? 0.0000005 Suppose 0 = -2*s - 2*f - 810718, s - 317*f + 316*f + 405361 = 0.
{ "pile_set_name": "DM Mathematics" }
namespace ClassLib095 { public class Class045 { public static string Property => "ClassLib095"; } }
{ "pile_set_name": "Github" }
Brazilian President Jair Bolsonaro’s chief of staff Onyx Lorenzoni told reporters following a cabinet meeting Thursday that Bolsonaro intends to fire any “communists” who work for the government currently, contending that those holding opposing ideological views to the new government cannot properly execute its goals. Bolsonaro, who defeated the socialist Workers’ Party (PT) candidate Fernando Haddad in October’s run-off presidential election, ran a campaign vowing to eradicate Marxist thought from the government and from Brazil’s schools and spearhead a movement of small-government conservatives in Latin America who opposed the ideologies of the region’s dictatorships, Cuba, Venezuela, and Nicaragua. “Society said ‘enough’ to socialist and communist ideas which, in the past 30 years, brought us to the chaos were are living today,” Lorenzoni told reporters, explaining that this mandate made it necessary to remove Marxists from top positions in the government according to the Spanish news agency EFE. To accomplish this, the Bolsonaro administration will begin a review of some of the highest-ranking officials. Bolsonaro’s chief of staff said that at least 320 government employees were notified following the cabinet-level meeting that they would be “evaluated” to ensure that their work goals were compatible with what Bolsonaro was hoping to accomplish in office. These would face “dismissal” from the government if Lorenzoni concluded that they held far-left ideological beliefs in conflict with his administration. “It doesn’t make sense to have officials with antagonistic ideological orientations [working for us],” Lorenzoni asserted. “It is not reasonable to have socialists, communists, any of that stuff here.” Lorenzoni was careful to specify that the process will not be a “witch hunt” and, to that end, “first we dismiss, then we discuss,” and those who are found to be compatible workers for Bolsonaro’s government will return to their positions. The primary reason for this reevaluation, Lorenzoni explained, was that the PT had ruled the country for 14 years, most of the 21st century. While its two presidents fared poorly after their tenures – Luiz Inácio Lula da Silva is serving a 12-year sentence for corruption while president; Dilma Rousseff was impeached out of office and lost a senate bid last year – 14 years is over a decade of low-profile hires throughout the expansive Brazilian federal state infrastructure. Maintaining staff in key positions in agencies like the Foreign Ministry or the Ministry of Justice who oppose the reforms Bolsonaro campaigned on could make those reforms impossible. The removal of “communists” from the government is part of the first major effort of the Bolsonaro administration: reducing the prodigious size of the Brazilian government. Bolsonaro officials have suggested that as many as 3,100 government jobs are expected to be cut at the federal level. Brasilia will also move to sell as many as 700,000 government-owned properties back into private ownership. Bolsonaro made the eradication of Marxist thought from the government a priority as a candidate. In his inaugural address Tuesday, Bolsonaro declared his victory “the day in which the people began to free themselves of socialism, the inversion of values, state maximalism, and the politically correct.” “That is our flag, which will never be red. It will only be red if it is necessary for our blood to keep her green and yellow,” he concluded. “We cannot allow nefarious ideologies to come and divide Brazilians – ideologies that destroy our values and traditions, destroy our families, the foundations of our society.” Prior to assuming office, Bolsonaro also stated at a conservative conference that he would seek to create a global coalition against communism, particularly targeting the removal of toxic Marxist regimes in neighboring Cuba and Venezuela. All of Latin America “knows what the consequences of the left are. The clearest example is Cuba, and the nation that most clearly approximates that reality is Venezuela,” he said, stating that Brazil, as South America’s largest country, has an “obligation” to lead in the effort to restore freedom in those countries. Despite these declarations against communism, Bolsonaro held a friendly meeting with an envoy sent by the most powerful communist leader in the world, China’s Xi Jinping, relaying a message of cooperation to the Communist Party leader. China is Brazil’s largest trade partner as a product of a policy of distance from the West under Lula and Rousseff. Candidate Bolsonaro expressed concerns that “China is buying Brazil” and vowed to cut trade with Beijing down to a manageable level. The president also met with U.S. Secretary of State Mike Pompeo this week, expressing hope that Brasilia-Washington ties would thrive during his presidency. He told reporters that he would discuss the implementation of a U.S. military base in Brazil with American officials “in the future,” given growing military operations by Russia in neighboring Venezuela.
{ "pile_set_name": "OpenWebText2" }
What do you mean you don’t need the help of a web application company? If there is one direction our world is heading to nowadays – it’s digital. Everything is revolving around computers, the internet, and AI that practically everything we do is somehow becoming more and more automated as the days pass. Before we could only communicate through telephones. Now, we don’t just have wireless phones, we can even do video calls with them. With the rate we’re going, I wouldn’t be surprised to hear that hologram calls are the next big thing one of these days. And while they’re up to it, why don’t they just make the rest of the 1900’s kids’ fantasies come to life – flying cars, elevator roads, hovercrafts, and other stuff like that. ALSO READ: General Java Interview Questions Okay. My imagination’s gone off a little too far there. Quick rewind and we’re back to web applications. So we’ve already entered the technological age. Job hiring is now done online, pizza delivery is now placed online, shopping for food, clothes, heavy equipment, tickets, and even cars can now be done through online transactions. Add the fact that some form of online currency is becoming more and more mainstream as time goes by (see reference). If there is a better time to start taking your business online, it’s now. E-commerce is steadily rising. Surely, several hundreds of entrepreneurs join the online fiasco on a daily basis. And the numbers will just keep on getting higher. Setting up camp now, or striking while it’s still lukewarm may be the best decision you’ll ever make for your business. When the E-commerce fad hits the home run, there’s a good chance funding your own web application would be far more difficult and expensive than it is now. So if you plan to jump on the “web wagon” sometime soon anyway, why not now? Unless you’re a programmer, one major concern you should have about setting up your own web application is deciding who will do it for you? To a bystander, creating a web application from scratch is pure gibberish. Nothing makes sense. But in the hands of an expert, creating a web application – a winning one – can be as easy as 1-2-3! This is why it is very important that you choose who you deal your E-commerce venture to. To better guide you in selecting the right company, we have prepared this short guide for you. So without further ado, here are some signs you should look for in the web application company you’re about to deal with: Clean Background – When a web application company is fraudulent, scammy, or just plain bad, a word about it will definitely find its way to the internet’s information vine. You know you’ve got a clean company when (1) bad reviews range from few to none; (2) There are no negative associations pointing to the company in well-known information vines like Reddit and Quora, and (3) It shouldn’t be too clean. When we say clean background we do not mean BLANK. When there is no online information available on a company that claims they’re the “best web application developer,” there’s a good chance they’re just lying about it to rip you off – a complete fake. Because if they really were “the best,” the internet would at least have some record of their previous activities. Having no previous record is much more dangerous than having a bad one. Winning Portfolio – You know you’ve got a slaying web app developer when their portfolio can speak for themselves. In matters that concern the design, portfolios are very important references. People can’t just say they’re world-renowned artists without having any artwork to show for it. In the same way that a singer can’t say she’s a worldwide phenomenon when she doesn’t even have a single album on record. Portfolios become proof of your work. It also serves as a handy marketing tool. With a portfolio, a web application company can just go “Hey. This is our work. Do you want it or not?” Yes, portfolios make life this simple. If the E-commerce business you’re about to put up can be represented in a portfolio, you might as well start preparing one for yourself. Ability To Explain In Layman’s Terms – We get it. You’re a web application coding genius. But is it really necessary for you to talk in the coding language with your client? Your client is not a programming expert like you; there is absolutely no sense in using programming jargon to explain your point. Real programmers, the ones that know exactly what they are doing and why they are doing it, would know how to explain the entire web application building process in the simplest ways possible. Using heavy, convoluted words would only make people suspicious. Is this guy just trying to sell himself off as an expert, or what? Real experts know how to make common people understand the most complex processes – even something as complicated as web application development . Whenever people try to talk big with me, they often have something they don’t want me to find out. This is why I strongly suggest that you don’t trust developers who talk in their own language. They probably don’t understand themselves either. And that’s it. Three, totally noticeable signs to know whether your prospect web application developer is the real deal or not. When you decide to jump into the E-commerce train, make sure to keep yourself guarded at all times. The internet is a crazy place. There are a lot of smart people who would try to get the best of you if you don’t know how to play your cards right. One thing to remember, however, is that the best choices are often made after you have calmly assessed the reality of the situation. Do not go jumping on to any train without knowing where it is headed just because you saw a 70% off sign. Make your choices wisely and make them count. ALSO READ: Roadmap to become a web developer in 2018
{ "pile_set_name": "OpenWebText2" }
# # Author:: Kaustubh Deorukhkar (<[email protected]>) # Author:: Prabhu Das (<[email protected]>) # Author:: Isa Farnik (<[email protected]>) # Copyright:: Copyright (c) Chef Software Inc. # License:: Apache License, Version 2.0 # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Ohai.plugin(:Network) do require_relative "../../mixin/network_helper" provides "network", "counters/network", "macaddress" include Ohai::Mixin::NetworkHelper collect_data(:aix) do require "ipaddr" unless defined?(IPAddr) # Loads following information. # :default_interface, :default_gateway - route -n get 0 # :interfaces # => routes(netstat -nr | grep en0) # => addresses (ifconfig en0 or lsattr -El en0), macaddress (entstat -d en0 = Hardware Address: be:42:80:00:b0:05) # => flags (ifconfig en0) # => state up/down (ifconfig/lsattr) # => arp (arp -an) iface = Mash.new network Mash.new unless network network[:interfaces] ||= Mash.new # We unfortunately have to do things a bit different here, if ohai is running # within a WPAR. For instance, the WPAR isn't aware of some of its own networking # minutia such as default gateway/route. unless shell_out("uname -W").stdout.to_i > 0 # :default_interface, :default_gateway - route -n get 0 so = shell_out("netstat -rn |grep default") so.stdout.lines.each do |line| items = line.split(" ") if items[0] == "default" network[:default_gateway] = items[1] network[:default_interface] = items[5] end end end # Splits the ifconfig output to 1 line per interface if_so = shell_out("ifconfig -a") if_so.stdout.gsub(/\n(\w+\d+)/, '___\1').split("___").each do |intraface| splat = intraface.split(":") interface = splat[0] line = splat[1..-1][0] iface[interface] = Mash.new iface[interface][:state] = (line.include?("<UP,") ? "up" : "down") intraface.lines.each do |lin| case lin when /flags=\S+<(\S+)>/ iface[interface][:flags] = $1.split(",") iface[interface][:metric] = $1 if lin =~ /metric\s(\S+)/ else # We have key value pairs. if lin =~ %r{inet (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})(/(\d{1,2}))?} tmp_addr, tmp_prefix = $1, $3 if tmp_prefix.nil? netmask = hex_to_dec_netmask($1) if lin =~ /netmask\s0x(\S+)\s/ unless netmask tmp_prefix ||= "32" netmask = IPAddr.new("255.255.255.255").mask(tmp_prefix.to_i).to_s end else netmask = IPAddr.new("255.255.255.255").mask(tmp_prefix.to_i).to_s end iface[interface][:addresses] ||= Mash.new iface[interface][:addresses][tmp_addr] = { "family" => "inet", "prefixlen" => tmp_prefix } iface[interface][:addresses][tmp_addr][:netmask] = netmask if lin =~ /broadcast\s(\S+)\s/ iface[interface][:addresses][tmp_addr][:broadcast] = $1 end elsif lin =~ %r{inet6 ([a-f0-9\:]+)%?([\d]*)/?(\d*)?} # TODO do we have more properties on inet6 in aix? broadcast iface[interface][:addresses] ||= Mash.new iface[interface][:addresses][$1] = { "family" => "inet6", "zone_index" => $2, "prefixlen" => $3 } else # load all key-values, example "tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1" properties = lin.split n = properties.length / 2 - 1 (0..n).each do |i| iface[interface][properties[i * 2]] = properties[(i * 2 + 1)] end end end end # Query macaddress e_so = shell_out("entstat -d #{interface} | grep \"Hardware Address\"") iface[interface][:addresses] ||= Mash.new e_so.stdout.lines.each do |l| if l =~ /Hardware Address: (\S+)/ iface[interface][:addresses][$1.upcase] = { "family" => "lladdr" } macaddress $1.upcase unless shell_out("uname -W").stdout.to_i > 0 end end end # ifconfig stdout # Query routes information %w{inet inet6}.each do |family| so_n = shell_out("netstat -nrf #{family}") so_n.stdout.lines.each do |line| if line =~ /(\S+)\s+(\S+)\s+(\S+)\s+(\d+)\s+(\d+)\s+(\S+)/ interface = $6 iface[interface][:routes] = [] unless iface[interface][:routes] iface[interface][:routes] << Mash.new( destination: $1, family: family, via: $2, flags: $3) end end end # List the arp entries in system. so = shell_out("arp -an") count = 0 so.stdout.lines.each do |line| network[:arp] ||= Mash.new if line =~ /\s*(\S+) \((\S+)\) at ([a-fA-F0-9\:]+) \[(\w+)\] stored in bucket/ network[:arp][count] ||= Mash.new network[:arp][count][:remote_host] = $1 network[:arp][count][:remote_ip] = $2 network[:arp][count][:remote_mac] = $3.downcase count += 1 end end network["interfaces"] = iface end end
{ "pile_set_name": "Github" }
Q: Generic types comparison I have two objects of generic type T. T x , T y I want to be able to do comparison like: if (x >= y) Therefore I try to use the compareTo method which is missing until I add the constraint where T:IComparable. Only then I see it in the intellisence. Not sure why only then I see it and not before writing it. A: Not sure why only then I see it and not before writing it. Because until that constraint exists, the compiler has no idea what members are available on T, other than those which are present as part of object. You wouldn't expect to be able to write: object x = GetObjectFromSomewhere(); object y = GetObjectFromSomewhere(); int comparison = x.CompareTo(y); would you? C# is a statically typed language (aside from dynamic) - the compiler has to know which members you're talking about when you use them. As an aside, if the types you're interested in implement IComparable<T> rather than just the non-generic IComparable, that would be a better constraint. It performs better (because it can avoid boxing) and it's more type-safe (as it prevents you from trying to compare unrelated types).
{ "pile_set_name": "StackExchange" }
Single port VATS resection of a sessile solitary fibrous tumour of the visceral pleura. A case report. The solitary fibrous tumour of the visceral pleura is a rare neoplasm that derives from mesenchymal cells adjacent to the mesothelial tissue of pleura. Surgical resection is the treatment of choice in benign lesions and healing resulting in half of malignant. Local recurrence can occur in malignant cases, but it is very rare in solitary benign tumors. It may be a result of an incomplete or conservative surgery, lack of identification of a tumor during the operation or a growth of a synchronous neoplasm independent from that removed. Surgical resection is also burdened with some difficulty as the size of the tumor, the relationship with the adjacent structures and identification of the vascular peduncle. We report a case of 72 years-old male with a sessile left solitary fibrous tumour of the visceral pleura. The mass of 10 x 7 x 5 cm was attached, thanks to large planting base, to lateral basal segment of left lower lobe. The patient was treated by single port video assisted approach with a 4 cm skin incision. This case, in our knowledge, represents the first resection by single port VATS of a sessile SFTP with a large plating base and, more generally, the third SFTP resection treated by single portal access. Solitary fibrous tumour, Uniportal VATS.
{ "pile_set_name": "PubMed Abstracts" }
package pagination import ( "encoding/json" "io/ioutil" "net/http" "net/url" "strings" "github.com/gophercloud/gophercloud" ) // PageResult stores the HTTP response that returned the current page of results. type PageResult struct { gophercloud.Result url.URL } // PageResultFrom parses an HTTP response as JSON and returns a PageResult containing the // results, interpreting it as JSON if the content type indicates. func PageResultFrom(resp *http.Response) (PageResult, error) { var parsedBody interface{} defer resp.Body.Close() rawBody, err := ioutil.ReadAll(resp.Body) if err != nil { return PageResult{}, err } if strings.HasPrefix(resp.Header.Get("Content-Type"), "application/json") { err = json.Unmarshal(rawBody, &parsedBody) if err != nil { return PageResult{}, err } } else { parsedBody = rawBody } return PageResultFromParsed(resp, parsedBody), err } // PageResultFromParsed constructs a PageResult from an HTTP response that has already had its // body parsed as JSON (and closed). func PageResultFromParsed(resp *http.Response, body interface{}) PageResult { return PageResult{ Result: gophercloud.Result{ Body: body, Header: resp.Header, }, URL: *resp.Request.URL, } } // Request performs an HTTP request and extracts the http.Response from the result. func Request(client *gophercloud.ServiceClient, headers map[string]string, url string) (*http.Response, error) { return client.Get(url, nil, &gophercloud.RequestOpts{ MoreHeaders: headers, OkCodes: []int{200, 204, 300}, }) }
{ "pile_set_name": "Github" }
Acute Stimulant Treatment and Reinforcement Increase the Speed of Information Accumulation in Children with ADHD. The current studies utilized drift diffusion modeling (DDM) to examine how reinforcement and stimulant medication affect cognitive task performance in children with ADHD. In Study 1, children with (n = 25; 88 % male) and without ADHD (n = 33; 82 % male) completed a 2-choice discrimination task at baseline (100 trials) and again a week later under alternating reinforcement and no-reinforcement contingencies (400 trials total). In Study 2, participants with ADHD (n = 29; 72 % male) completed a double-blind, placebo-controlled trial of 0.3 and 0.6 mg/kg methylphenidate and completed the same task utilized in Study 1 at baseline (100 trials). Children with ADHD accumulated information at a much slower rate than controls, as evidenced by a lower drift rate. Groups were similar in nondecision time and boundary separation. Both reinforcement and stimulant medication markedly improved drift rate in children with ADHD (ds = 0.70 and 0.95 for reinforcement and methylphenidate, respectively); both treatments also reduced boundary separation (ds = 0.70 and 0.39). Reinforcement, which emphasized speeded accuracy, reduced nondecision time (d = 0.37), whereas stimulant medication increased nondecision time (d = 0.38). These studies provide initial evidence that frontline treatments for ADHD primarily impact cognitive performance in youth with ADHD by improving the speed/efficiency of information accumulation. Treatment effects on other DDM parameters may vary between treatments or interact with task parameters (number of trials, task difficulty). DDM, in conjunction with other approaches, may be helpful in clarifying the specific cognitive processes that are disrupted in ADHD, as well as the basic mechanisms that underlie the efficacy of ADHD treatments.
{ "pile_set_name": "PubMed Abstracts" }
TDG Amendment 7: Tanks, But No Tanks NIAGARA FALLS, New York—September 17, 2007—For those who transport dangerous goods by ground in Canada, cargo transport units such as highway tanks, portable tanks, cargo compartments, multi-unit tank car tanks and containers seem ordinary. Individuals who transport these dangerous goods have probably heard of the Transportation of Dangerous Goods (TDG) Regulations, and are somewhat familiar with its rules and regulations. But, how familiar are you with Transport Canada's latest amendment to the TDG Regulations, Amendment 7? CSA-B622, Selection and Use of Highway Tanks, Multi-Unit Tank Car Tanks, and Portable Tanks for the Transportation of Dangerous Goods, Class 2 Each of these CSA standards provides clarification of existing requirements, removes other requirements, and introduces retro-fit requirements. Special Requirement 23 is a new item and contains a grandfather provision for non-spec tanks for UN1999, TARS, LIQUID. Two other items, Special Requirement 54 and Special Requirement 73 require existing highway tanks and portable tanks for agricultural purposes to be brought into compliance. ICC Compliance Center offers consulting and training services in accordance to Canadian, US and international transport regulations. Companies and individuals involved with transporting dangerous goods are encouraged to receive consulting and training to increase safety awareness and accident prevention. At ICC Compliance Center, we specialize in transportation, health and safety consulting, and label printing. We offer a wide range of training and regulatory services, and transportation accessories to help industry comply with regulations. Contact our friendly customer relations center or ask a business development manager how we can help you stay in compliance.
{ "pile_set_name": "Pile-CC" }
/** * Prefixer (tools/_prefixer.scss) */ /* ----- Box sizing ----- */ @mixin box-sizing ($value) { -webkit-box-sizing: $value; -moz-box-sizing: $value; box-sizing: $value; } /* ----- Transform ----- */ // Rotate @mixin rotate ($deg) { -webkit-transform: rotate(#{$deg}deg); -moz-transform: rotate(#{$deg}deg); -ms-transform: rotate(#{$deg}deg); transform: rotate(#{$deg}deg); } // Translate @mixin translate ($x, $y) { -webkit-transform: translate($x, $y); -moz-transform: translate($x, $y); -ms-transform: translate($x, $y); transform: translate($x, $y); } // Translate 3D @mixin translate3d ($x, $y, $z) { -webkit-transform: translate3d($x, $y, $z); -moz-transform: translate3d($x, $y, $z); transform: translate3d($x, $y, $z); }
{ "pile_set_name": "Github" }
I'm so sorry that happened to you. It's regretful that it DOES happen on occasion, but good, quick thinking on your part. You probably would have been waiting forever in the ER, just for the same outcome. We're all still thinking of you and your family, so let us know how it's going.
{ "pile_set_name": "Pile-CC" }
Arrogant Princes POLITICAL relationships need to be nurtured and handled with care and affection. There is no place for arrogance. This dictum isn’t present in the books of the opposition leaders. Former Chief Minister of UP, Akhilesh Yadav and Congress’s Rahul Gandhi are out of power, but they behave like ruling princes. The duo went Bengaluru for the oath-taking ceremony of Chief Minister HD Kumaraswamy. The event should have brought them closer, but reports indicate that the gap between the two has widened. In fact, Tejashwi Yadav, Sitaram Yechury and Arvind Kejriwal were staying in the same hotel. Akhilesh personally held long discussions with them. Sources disclosed that Rahul’s man Friday, Kaushal Vidyarthi, called on Akhilesh and conveyed his boss’s wish for a meeting at the former’s hotel. Akhilesh, who normally controls his anger, was miffed: “Bhaiya (Rahul) wants to meet me and then issues an order. After all, I am also the President of my party, so why can’t Bhaiya come over to my hotel?” Rahul, who thinks he is the President of a larger, national party, could not digest such a reply from a junior partner. Since then, there is an eerie silence between the two leaders.
{ "pile_set_name": "Pile-CC" }
n two letters picked without replacement from uuuuuugguuug. 1/22 Two letters picked without replacement from {v: 5, g: 9}. Give prob of picking 2 v. 10/91 Four letters picked without replacement from txtstsxxxxstx. What is prob of picking 2 x, 1 t, and 1 s? 36/143 Three letters picked without replacement from {p: 3, l: 4, j: 4, o: 4}. What is prob of picking 1 o, 1 l, and 1 p? 48/455 What is prob of picking 1 c, 1 o, and 2 z when four letters picked without replacement from {f: 1, c: 1, z: 7, o: 5}? 15/143 Two letters picked without replacement from {f: 9, h: 11}. Give prob of picking 2 h. 11/38 What is prob of picking 2 o when two letters picked without replacement from ooio? 1/2 Two letters picked without replacement from {p: 7, e: 1, v: 4, u: 2}. Give prob of picking 2 u. 1/91 Calculate prob of picking 2 d when two letters picked without replacement from {d: 3, u: 7, g: 9}. 1/57 What is prob of picking 1 w and 1 b when two letters picked without replacement from vwbbbvwvwvbbv? 5/26 Three letters picked without replacement from sssrjjjs. Give prob of picking 2 j and 1 s. 3/14 What is prob of picking 1 n and 1 u when two letters picked without replacement from ukxusnp? 2/21 Three letters picked without replacement from ppppppp. What is prob of picking 3 p? 1 Calculate prob of picking 1 z and 1 g when two letters picked without replacement from ggggfzgffgzggfgf. 3/20 Three letters picked without replacement from {q: 2, z: 4, b: 2, h: 2, s: 3}. Give prob of picking 2 q and 1 b. 1/143 Calculate prob of picking 1 j and 1 h when two letters picked without replacement from jjjjjjjjjhjj. 1/6 Calculate prob of picking 1 c and 3 e when four letters picked without replacement from ptemeccpetec. 4/165 Four letters picked without replacement from {y: 4, l: 2, j: 2}. What is prob of picking 2 j and 2 l? 1/70 Three letters picked without replacement from rrrrryrrryynrryyr. Give prob of picking 1 y, 1 r, and 1 n. 11/136 Three letters picked without replacement from gddttdgtrrgdd. Give prob of picking 1 r, 1 d, and 1 t. 15/143 Three letters picked without replacement from {m: 2, w: 2, k: 2, l: 3}. What is prob of picking 3 m? 0 Calculate prob of picking 1 p, 1 i, 1 j, and 1 q when four letters picked without replacement from {b: 4, q: 5, p: 5, i: 1, j: 1}. 5/364 Calculate prob of picking 1 t and 1 v when two letters picked without replacement from vvxtx. 1/5 Two letters picked without replacement from {h: 6, c: 2, z: 4}. What is prob of picking 1 z and 1 c? 4/33 Two letters picked without replacement from ymmymmmmmm. Give prob of picking 2 m. 28/45 Calculate prob of picking 2 k when two letters picked without replacement from ukkkkkkkhkkkuk. 55/91 Two letters picked without replacement from icz. What is prob of picking 1 z and 1 c? 1/3 Calculate prob of picking 1 x and 3 e when four letters picked without replacement from zexzezzxzeezzezzzzzz. 4/969 What is prob of picking 1 s and 1 d when two letters picked without replacement from {d: 8, s: 5}? 20/39 Four letters picked without replacement from uqsqzlzvlslvszs. Give prob of picking 1 z, 2 q, and 1 l. 3/455 What is prob of picking 1 k and 1 d when two letters picked without replacement from {t: 1, d: 1, b: 2, m: 2, s: 1, k: 1}? 1/28 Calculate prob of picking 1 y, 1 o, and 1 b when three letters picked without replacement from ubyubyombbmybubbum. 7/272 Two letters picked without replacement from susuvhhhvuuzzhhhz. Give prob of picking 1 v and 1 z. 3/68 Two letters picked without replacement from {d: 1, s: 1, a: 4, r: 4, v: 3}. What is prob of picking 2 v? 1/26 What is prob of picking 1 m and 1 p when two letters picked without replacement from pppppmppmppp? 10/33 Two letters picked without replacement from {t: 2, h: 2, i: 1, m: 1, k: 1, b: 1}. Give prob of picking 1 i and 1 h. 1/14 Calculate prob of picking 2 k when two letters picked without replacement from {l: 4, s: 1, n: 1, k: 2}. 1/28 Four letters picked without replacement from {m: 1, i: 3, s: 2, c: 2, e: 4, z: 2}. Give prob of picking 2 c, 1 e, and 1 z. 8/1001 What is prob of picking 2 m when two letters picked without replacement from {d: 6, m: 4}? 2/15 Calculate prob of picking 1 i, 1 g, and 1 m when three letters picked without replacement from ijmigmxiig. 2/15 Three letters picked without replacement from yyiiiiiiyyi. What is prob of picking 2 i and 1 y? 28/55 Calculate prob of picking 2 m and 2 a when four letters picked without replacement from {m: 8, a: 5}. 56/143 Two letters picked without replacement from {j: 5, e: 1, r: 2, q: 1}. What is prob of picking 1 q and 1 r? 1/18 Calculate prob of picking 1 n, 1 s, and 1 x when three letters picked without replacement from snxsnssnsn. 1/6 Three letters picked without replacement from twwtwtzttwpjtwtj. What is prob of picking 1 j, 1 p, and 1 t? 1/40 Calculate prob of picking 1 y, 1 x, and 2 d when four letters picked without replacement from {y: 4, x: 2, d: 2}. 4/35 Calculate prob of picking 2 z and 2 g when four letters picked without replacement from {z: 12, g: 6}. 11/34 Three letters picked without replacement from {h: 3, c: 1, l: 4}. Give prob of picking 1 l and 2 h. 3/14 Three letters picked without replacement from hhhhphhhhhhhh. What is prob of picking 1 p and 2 h? 3/13 Four letters picked without replacement from {d: 5, r: 3}. What is prob of picking 3 d and 1 r? 3/7 Two letters picked without replacement from uyuyyuyys. Give prob of picking 2 u. 1/12 Three letters picked without replacement from {y: 2, e: 2, o: 1, n: 1, p: 4}. What is prob of picking 2 e and 1 o? 1/120 Two letters picked without replacement from {n: 5, f: 2, k: 4}. What is prob of picking 2 n? 2/11 Four letters picked without replacement from mimmii. Give prob of picking 2 i and 2 m. 3/5 Calculate prob of picking 1 l and 1 e when two letters picked without replacement from {e: 2, l: 4, k: 4, b: 6, m: 2, t: 1}. 8/171 Two letters picked without replacement from {i: 7, a: 4}. Give prob of picking 2 i. 21/55 Four letters picked without replacement from {x: 2, a: 2, j: 3, m: 2}. What is prob of picking 1 x, 1 j, and 2 a? 1/21 What is prob of picking 1 k and 1 p when two letters picked without replacement from wphztwwkwzpwkpkzpk? 16/153 What is prob of picking 2 g when two letters picked without replacement from gstgtgsmm? 1/12 Two letters picked without replacement from {g: 2, j: 1, z: 1, i: 5, r: 8}. Give prob of picking 1 g and 1 i. 5/68 Three letters picked without replacement from zzszzzs. Give prob of picking 1 z and 2 s. 1/7 Three letters picked without replacement from {i: 5, n: 1, u: 5, z: 1}. What is prob of picking 2 i and 1 u? 5/22 Calculate prob of picking 1 y, 1 z, and 1 p when three letters picked without replacement from {b: 4, y: 2, p: 1, z: 2, j: 5}. 1/91 Calculate prob of picking 4 i when four letters picked without replacement from {f: 4, i: 7, y: 2, e: 1}. 5/143 Calculate prob of picking 2 j and 1 q when three letters picked without replacement from {j: 4, q: 2, d: 3}. 1/7 Two letters picked without replacement from mzmmgtogmzmwz. Give prob of picking 1 z and 1 g. 1/13 Three letters picked without replacement from ozwbbbbx. Give prob of picking 1 w, 1 z, and 1 x. 1/56 Two letters picked without replacement from tnntnttt. Give prob of picking 2 n. 3/28 Four letters picked without replacement from bookllalbalblov. Give prob of picking 1 b, 1 l, and 2 o. 3/91 Calculate prob of picking 2 y when two letters picked without replacement from yyyyyyyyy. 1 Calculate prob of picking 1 a, 1 k, and 1 j when three letters picked without replacement from jxjjtajaataakaj. 6/91 Two letters picked without replacement from rrjrjj. What is prob of picking 1 j and 1 r? 3/5 Two letters picked without replacement from {o: 1, f: 1, n: 1, g: 4, m: 2}. Give prob of picking 2 g. 1/6 What is prob of picking 1 x and 3 u when four letters picked without replacement from uuuxuuuuxuuu? 16/33 Calculate prob of picking 2 f when two letters picked without replacement from fbbbsbbmbmmbmfbmbbms. 1/190 Calculate prob of picking 1 g, 1 e, and 2 f when four letters picked without replacement from axxeeffaaegxxxf. 3/455 Three letters picked without replacement from {z: 11, i: 3}. What is prob of picking 3 z? 165/364 What is prob of picking 1 l, 1
{ "pile_set_name": "DM Mathematics" }
2012 United States House of Representatives elections in Colorado The 2012 United States House of Representatives elections in Colorado were held on Tuesday, November 6, 2012 to elect the seven U.S. Representatives from the state, one from each of the state's seven congressional districts. The elections coincided with the elections of other federal and state offices, including a quadrennial presidential election. Primary elections were held on June 26, 2012. Overview Redistricting During the redistricting process, Republicans argued for minimal changes to the existing map while Democrats pushed for more competitive districts. After a committee of ten members of the Colorado General Assembly failed to draw a map, in November 2011 Judge Robert Hyatt ruled in favor of Democrats' proposals. In December 2011, the Colorado Supreme Court affirmed Hyatt's ruling. District 1 Colorado's 1st congressional district, which has been represented by Democrat Diana DeGette since 1997, was not significantly modified in redistricting and continues to be based in Denver. The new 1st district includes Ken Caryl and Cherry Hills Village. Democratic primary Primary results Republican primary Primary results General election Results District 2 In redistricting, Larimer County, home to Fort Collins, was added to Colorado's 2nd congressional district, which has been represented by Democrat Jared Polis since 2009 and is still based in Boulder. State senator Kevin Lundberg was the Republican nominee. Democratic primary Primary results Republican primary Primary results General election Results District 3 In redistricting, Colorado's 3rd congressional district, which stretches from Pueblo to Grand Junction, was made slightly more favorable to Democrats. Part of Eagle County was added to the district, while Las Animas County was removed from it. Democrat John Salazar, who represented the district from 2005 until 2011, said in December 2010 that he was considering seeking a rematch against Republican Scott Tipton, to whom he lost his seat in 2010. He commented "We're thinking that we might run again in two years, but who knows? I'm keeping all options open. We've been offered a possibility of serving at many other places, or there's a great possibility of going back to the ranch and raising cattle." In January 2011, Governor John Hickenlooper appointed Salazar to serve as Colorado Agriculture Commissioner. On May 19, 2011, Democratic state representative Sal Pace said he was "likely to put a campaign together", having met with U.S. House minority whip Steny Hoyer. On May 31, Pace declared his intention to challenge Tipton. Hoyer also suggested the name of Perry Haney, a surgeon, as a potential candidate; however Haney later formed an exploratory committee to run in the 6th district but withdrew from the race in February 2012. Tisha Casida, a businesswoman, ran as an independent candidate. Democratic primary Primary results Republican primary Primary results Libertarian primary Primary results General election Polling Results District 4 After redistricting, Colorado's 4th congressional district continued to strongly favor Republicans. It lost Fort Collins to the 2nd District; as a result, the largest city in the district is now Greeley. Republican incumbent Cory Gardner, who was first elected to represent Colorado's 4th congressional district in 2010, raised over $300,000 in the first quarter of 2011. Brandon Shaffer, the president of the Colorado Senate, sought the Democratic nomination to challenge Gardner. Betsy Markey, the Democrat who represented the 4th district from 2009 until 2011, is now the assistant secretary for intergovernmental affairs in the U.S. Department of Homeland Security, and said in February 2011 she would not run for Congress again in 2012. Democratic primary Primary results Republican primary Primary results Constitution primary Primary results General election Results District 5 Colorado's 5th congressional district, which has been represented by Republican Doug Lamborn since 2007, was not significantly modified in redistricting and is still centered in Colorado Springs. It is expected to continue to strongly favor Republicans. Lamborn was challenged in the Republican primary by Businessman Robert Blaha and Insurance Agent Doug Bergeron. The Republican candidate did not see a Democratic challenger, as Democratic candidate Bob Evans suspended his campaign. However, Jim Pirtle (Libertarian), Kenneth R. Harvell (American Constitution), and Dave Anderson (No Party Affiliation) all challenged the Republican Party nominee. Republican primary Primary results Constitution primary Primary results General election Results District 6 In redistricting, Colorado's 6th congressional district was made more favorable to Democrats. While the 6th has leaned Republican since its creation in 1983, the new 6th's population will be evenly split between Democrats, Republicans and unaffiliated voters. All of Aurora was added to the district. Republican Mike Coffman has represented the 6th district since 2009. Democrat Joe Miklosi, a state representative, challenged Coffman. Perry Haney, a chiropractor, who had formed an exploratory committee to seek the Democratic nomination, withdrew from the race in February 2012. State senator Morgan Carroll; John Morse, the majority leader of the state senate; Andrew Romanoff, a former speaker of the Colorado House of Representatives; and Brandon Shaffer, the president of the Colorado Senate (who will instead run in the 4th district), all decided against running. Democratic primary Primary results Republican primary Primary results General election Results District 7 Colorado's 7th congressional district, which has been represented by Democrat Ed Perlmutter since 2007, was modified in redistricting to include the more populated suburbs of Adams County. Joe Coors Jr., the brother of unsuccessful 2004 U.S. Senate candidate Pete Coors, became the Republican nominee to challenge Perlmutter. Democratic primary Primary results Republican primary Primary results Constitution primary Primary results General election References External links Elections & Voting from the Colorado Secretary of State United States House of Representatives elections in Colorado, 2012 at Ballotpedia Campaign contributions at OpenSecrets.org Outside spending at the Sunlight Foundation 2012 Colorado United States House of Representatives
{ "pile_set_name": "Wikipedia (en)" }
OMORE is only good for ice lollies and then its just simple. Not the best. 54Thrifty This is one of the best ice cream brands ever! It should be in the top 10! Thrifty Chocolate Chip Ice Cream is the best. It can be bought in Rite Aid drugstores.I once at an entire carton of it at on sitting and loved each and every bite!Once you try it you will absolutely love it.
{ "pile_set_name": "Pile-CC" }
A typical example of the flexible display includes a film which is made of a synthetic resin such as polyimide (hereinafter, referred to as “plastic film”), and elements supported by the plastic film, such as TFTs (Thin Film Transistors) and OLEDs (Organic Light Emitting Diodes). The plastic film functions as a flexible substrate. The flexible display is encapsulated with a gas barrier film (encapsulation film) because an organic semiconductor layer which is a constituent of the OLED is likely to deteriorate due to water vapor. Production of the above-described flexible display is carried out using a glass base on which a plastic film is formed over the upper surface. The glass base functions as a support (carrier) for keeping the shape of the plastic film flat during the production process. Elements such as TFTs and OLEDs, a gas barrier film, and the other constituents are formed on the plastic film, whereby the structure of a flexible OLED device is realized while it is supported by the glass base. Thereafter, the flexible OLED device is delaminated from the glass base and gains flexibility. The entirety of a portion in which elements such as TFTs and OLEDs are arrayed can be referred to as “functional layer region”. According to the prior art, a sheet-like structure including a plurality of flexible OLED devices is delaminated from a glass base, and thereafter, optical parts and other constituents are mounted to this sheet-like structure. Thereafter, the sheet-like structure is divided into a plurality of flexible devices. This dividing is realized by, for example, laser beam irradiation. Patent Document No. 1 discloses the method of irradiating the interface between each flexible OLED device and the glass base with laser light (lift-off light) in order to delaminate each flexible OLED device from the glass base (supporting substrate). According to the method disclosed in Patent Document No. 1, after irradiation with the lift-off light, respective flexible OLED devices are divided from one another, and each of the flexible OLED devices is delaminated from the glass base.
{ "pile_set_name": "USPTO Backgrounds" }
KEK-TH-1111\ [**Junji Hisano**]{}$^{(a)}$, [**Shigeki Matsumoto**]{}$^{(b)}$, [**Minoru Nagai**]{}$^{(a)}$, [**Osamu Saito**]{}$^{(a,b)}$, and [**Masato Senami**]{}$^{(a)}$ 0.15in [*$^{(a)}$[ICRR, University of Tokyo, Kashiwa 277-8582, Japan]{}\ $^{(b)}$[Theory Group, KEK, Oho 1-1 Tsukuba, Ibaraki 305-0801, Japan]{}\ *]{} Introduction ============ Precise measurements of cosmological parameters have achieved amazing progress in recent years. In particular, the observation of cosmic microwave background anisotropies by the Wilkinson Microwave Anisotropy Probe (WMAP) [@WMAP] confirmed that non-baryonic dark matter amounts to 20% of the energy of our universe. The existence of dark matter forces us to consider physics beyond the standard model (SM) for its constituent, because the SM has no candidate for the dark matter. Many models beyond the SM have been proposed for providing dark matter candidates. Models involving weakly interacting massive particles (WIMPs), such as supersymmetric models and universal extra dimension (UED) models [@UED; @UED2], have an advantage over other models, since the WIMPs can explain the observed abundance naturally in the thermal relic scenario [@UED2; @susydm; @UEDabundance]. Comparison of the predicted thermal abundance with observations is a powerful tool to constrain those models. It is now important for discussion of new physics signatures at collider experiments such as the LHC. In the thermal relic scenario, the annihilation cross sections of dark matter play a central role in evaluation of the abundance. Perturbative calculation of the cross sections is sufficient for it in usual cases. However, a non-perturbative effect on the cross sections has to be included, when dark matter particles are non-singlet under the SU(2)$_L$ interaction and much heavier than the weak gauge bosons. The weak interaction is not a short-distance force, but rather a long-distance one for non-relativistic two-bodies states of such heavy particles. The wave functions for the two-bodes states are modified from the plane waves by the interaction, and the annihilation cross sections are affected. The dark matter particles are non-relativistic at the freeze-out temperature. The attractive channels due to the weak force enhance the annihilation cross sections, compared with the perturbative ones. This effect is called the Sommerfeld enhancement, which was found in inelastic reactions between non-relativistic charged particles, historically. In this letter, we point out that the non-perturbative effect strongly alters the relic abundance of dark matter compared to that in perturbative calculation. We investigate the non-perturbative effect quantitatively in the wino-like neutralino dark matter as an example, and show that the abundance is reduced by 50% due to the effect. We also discuss non-perturbative effects on other dark matter candidates at the end of this letter. Sommerfeld enhancement in wino-like neutralino dark matter annihilation ======================================================================= Winos are the SU(2)$_L$ gauginos in the supersymmetric standard model, and they are an SU(2)$_L$ triplet. They are mixed with higgsinos, superpartners of the Higgs bosons, after the electroweak symmetry breaking. The neutral components in the mass eigenstates are called neutralino. The mixing with higgsinos is small for heavy winos, since it is suppressed by the electroweak scale. Thus, the wino-like neutralino ($\DM$) is highly degenerate with its charged SU(2)$_L$ partner ($\CP$) in mass when their masses are heavy enough. For the wino-like neutralino mass ($m$) of the order of 1 TeV, the mass difference between the neutralino and its SU(2)$_L$ partner is dominated by a radiative correction [@Hisano:2004ds]. It is calculated as $\delta m \simeq$ 0.17 GeV, which is used for numerical calculations in this letter. There are four processes related to the calculation of the wino-like neutralino relic abundance, and those are $\DM\DM$, $\CP\CPC$, $\DM\CP$, and $\CP\CP$ annihilation. We assume the CP conservation, and cross sections of $\DM\CPC$ and $\CPC\CPC$ annihilation are the same as those of $\DM\CP$ and $\CP\CP$, respectively. Furthermore, each process is decomposed into two ones with $S = 0$ and $S = 1$, where $S$ is the total spin of the two-bodies system at the initial state. In $\DM\DM$ and $\CP\CP$ annihilation, the $S = 1$ processes are forbidden at the $s$-wave annihilation. After all, processes we have to consider are $\DM\DM$, $\CP\CPC$, $\DM\CP$, $\CP\CP$ annihilation with $S = 0$, and those of $\CP\CPC$, $\DM\CP$ with $S = 1$. While gamma rays from the wino-like neutralino annihilation in the Galactic center [@Hisano:2004ds; @Hisano:2003ec] and anti-particles fluxes from that in Galactic Halo [@Hisano:2005ec] are evaluated including non-perturbative effects, the relic abundance of the neutralino have been calculated only within a perturbative method. However, as we will see later, the non-perturbative effect can significantly alter cross sections relevant to the abundance. Two-bodies effective Lagrangian, describing relative motion between two particles in the two-bodies system, is useful to evaluate the non-perturbative effect in the annihilation. The Lagrangian has a following form, $$\begin{aligned} {\cal L}_{\rm eff} = \int d^3 r~ \sum_{S_Z}\Phi^\dagger_{S_Z}(x,\vec{r}) \left[ i\partial_{x^0} + \frac{\nabla_x^2}{4m} + \frac{\nabla_r^2}{m} - V(r) + 2i \Gamma \delta(\vec{r}) \right] \Phi_{S_Z}(x,\vec{r})~, \label{twob}\end{aligned}$$ where $x$ is the center of mass coordinate for the two-bodies system, while the relative one is represented by $\vec{r}$. The index $S_Z$ is for the $z$-th component of the total spin $S$. The potential term $V(r)$ describes forces acting between two particles in the system. The absorptive part $\Gamma$ stands for the annihilation of the two-bodies system. For derivation of the effective Lagrangian and following evaluation of the annihilation cross section using it, see Ref. [@Hisano:2004ds]. In the $\CP\CP$ annihilation process with $S = 0$, the potential $V(r)$ and absorptive part $\Gamma$ in Eq. (\[twob\]) turn out to be $$\begin{aligned} V(r) = \frac{\alpha}{r} + \alpha_2 c_W^2 \frac{e^{-m_Z r}}{r}~, \quad \Gamma = \frac{\pi\alpha_2^2}{2m^2}~,\end{aligned}$$ where $\alpha$ is the fine structure constant, $\alpha_2 = g_2^2/4\pi$ is for the SU(2) gauge coupling constant, $m_Z$ is the $Z$ boson mass, and $c_W = \cos\theta_W$ is for the weak mixing angle $\theta_W$. The first term in the potential comes from the exchange of photons, while the second one is from the exchange of $Z$ bosons. In the calculation of $\Gamma$, we consider only the final states of SM particles, and neglect their masses, since they are light enough compared to the wino-like neutralino we are discussing. In both cases of the $\DM\CP$ annihilation processes with $S = 0$ and $1$, $V(r)$ is induced from the exchange of $W$ bosons, and both cases have the same form. On the other hand, the absorptive part $\Gamma$ is different each other. These are given by $$\begin{aligned} V(r) = - \alpha_2 \frac{e^{-m_W r}}{r}~, \quad \Gamma_{(S = 0)} = \frac{1}{2} \frac{\pi\alpha_2^2}{m^2}~, \quad \Gamma_{(S = 1)} = \frac{25}{24} \frac{\pi\alpha_2^2}{m^2}~,\end{aligned}$$ where $m_W$ is the $W$ boson mass. The potential and absorptive terms in the $\CP\CPC$ annihilation with $S = 1$ are $$\begin{aligned} V(r) = - \frac{\alpha}{r} - \alpha_2 c_W^2 \frac{e^{-m_Z r}}{r}~, \qquad \Gamma = \frac{25}{24} \frac{\pi \alpha_2^2}{m^2}~.\end{aligned}$$ The $\DM\DM$ two-bodies system is mixed with $\CP\CPC$ state with $S = 0$, in which mixing occurs through a $W$ boson exchange. Thus, the potential and absorptive terms are written by $2 \times 2$ matrices as $$\begin{aligned} {\bf V}(r) = \left( \begin{array}{cc} 2\delta m - \ds\frac{\alpha}{r} - \ds\alpha_2 c_W^2 \frac{e^{-m_Z r}}{r} & -\sqrt{2} \alpha_2 \ds\frac{e^{-m_W r}}{r} \\ -\sqrt{2} \alpha_2 \ds\frac{e^{-m_W r}}{r} & 0 \end{array} \right), ~ {\bf \Gamma} = \frac{\pi \alpha_2^2}{2 m^2} \left( \begin{array}{cc} 3 & \sqrt{2} \\ \sqrt{2} & 2 \end{array} \right).\end{aligned}$$ Off-diagonal elements describe the transition between $\CP\CPC$ and $\DM\DM$ systems. As seen in these potentials, all processes have attractive channels except for that of $\tilde \chi ^- \tilde \chi ^-$. The overlap between the wave functions of the incident particles are increased compared to the case without including the potentials, and it leads to enhancement of the annihilation cross sections. Once the two-bodies effective Lagrangian is obtained, annihilation cross sections including the non-perturbative effect can be calculated through the formula, $$\begin{aligned} \sigma v = c \Gamma |A|^2~, \qquad A \equiv \int d^3r~ e^{-i\vec{k}\cdot\vec{r}} \left( \frac{mv^2}{4} + \frac{\nabla^2}{m} \right) G(\vec{r},\vec{0})~, \label{formula}\end{aligned}$$ where $c = 2$ for an annihilation of identical particles, otherwise $c=1$. The relative velocity between incoming particles is denoted by $v$. The Green function $G$ satisfies the equation of motion of the effective Lagrangian, $$\begin{aligned} \left[ \frac{mv^2}{4} + \frac{\nabla^2}{m} - V(r) + 2i\Gamma\delta^3(\vec{r}) \right]G(\vec{r},\vec{r}') = \delta^3(\vec{r} - \vec{r}')~. \label{EOM}\end{aligned}$$ The boundary condition for the Green function is determined from following conditions. First, the Green function is analytic at any $\vec{r}$ and $\vec{r}'$ except the point $\vec{r} = \vec{r}'$. Second, only out-going waves survive at large $|\vec{r} - \vec{r}'|$. In $\DM\DM$ and $\CP\CPC$ annihilation processes with $S = 0$, the Green function has a $2\times2$ matrix form. For this case, it has been found in Ref. [@Hisano:2004ds; @Hisano:2003ec] that above formula is simply extended as $$\begin{aligned} \sigma_i v = c_i \sum_{j,j'} {\bf A}_{ij} {\bf \Gamma}_{jj'} {\bf A}^*_{ij'}~.\end{aligned}$$ The factor $|A|^2$ in Eq. (\[formula\]) is called the Sommerfeld enhancement factor, and it includes the non-perturbative effect due to the long-distance forces in $V(r)$. Note that if we neglect the non-perturbative effect, the enhancement factor becomes one and the annihilation cross section in Eq. (\[formula\]) coincides with the result in a usual perturbative method. Effect of Sommerfeld enhancement on dark matter abundance ========================================================= Now we evaluate the thermal relic abundance of the wino-like neutralino dark matter, including the non-perturbative effect. In the evaluation we have to include coannihilation processes in addition to the wino-like neutralino pair annihilation. We use the method developed in Ref. [@Griest:1990kh; @Gondolo:1990dk] for the calculation of the relic abundance including coannihilation effects. Under reasonable assumptions, the relic density obeys the following Boltzmann equation, $$\begin{aligned} \frac{dY}{dx} = -\frac{\langle\sigma_{\rm eff} v\rangle}{Hx} \left(1 - \frac{x}{3g_{*s}}\frac{dg_{*s}}{dx}\right) s\left(Y^2 - Y_{\rm eq}^2\right)~. \label{eq:Boltzmann}\end{aligned}$$ The yield of the dark matter, $Y$, is defined as $Y = n/s$, where $n$ is the sum of the number densities of $\DM$, $\CP$, and $\CPC$. The variable, $x = m/T$, is the scaled inverse temperature of the universe. The equilibrium abundance, $Y_{\rm eq}$, is given by $$\begin{aligned} Y_{\rm eq} = \frac{45}{2\pi^4} \left(\frac{\pi}{8}\right)^{1/2} \frac{g_{\rm eff}}{g_{*}} x^{3/2} e^{-x}~,\end{aligned}$$ where $g_{\rm eff}$ is the number of the effective degrees of freedom defined as $$\begin{aligned} g_{\rm eff}(x) = 2 + 4(1 + \delta m/m)^{3/2} e^{-x \delta m/m}~. \label{eq:geff}\end{aligned}$$ The entropy density $s$ and the Hubble parameter $H$ are given by $$\begin{aligned} s = \frac{2\pi^2}{45} g_{*s}\frac{m^3}{x^3}~, \qquad H = \left( \frac{g_*}{10} \right)^{1/2} \frac{\pi}{3 M_{\rm Pl}} \frac{m^2}{x^2} ~,\end{aligned}$$ where $M_{\rm Pl} = 2.4 \times 10^{18}$ GeV is the reduced Planck mass. The relativistic degrees of freedom of the thermal bath, $g_*$ and $g_{*s}$, should be treated as a function of the temperature for deriving the correct dark matter abundance in our calculation. The most important quantity to determine the abundance is the thermally averaged effective annihilation cross section $\langle\sigma_{\rm eff}v\rangle$ in Eq. (\[eq:Boltzmann\]), defined as $$\begin{aligned} \langle\sigma_{\rm eff}v\rangle &=& \sum_{i,j}\langle\sigma_{ij}v\rangle\frac{4}{g_{\rm eff}^2(x)} (1 + \Delta_i)^{3/2}(1 + \Delta_j)^{3/2} \exp[-x(\Delta_i + \Delta_j)]~, \nonumber \\ \langle\sigma_{ij}v\rangle &=& \left(\frac{m}{4\pi T}\right)^{3/2} \int 4\pi v^2dv~\left(\sigma_{ij}v\right) \exp\left(-\frac{mv^2}{4T}\right)~, \label{effective CS}\end{aligned}$$ where $i,j = \DM$, $\CP$ and $\CPC$, $\Delta_{\CP} = \Delta_{\CPC} = \delta m / m$, $\Delta_{\DM} = 0$, and $\sigma_{ij}$ is the annihilation cross section between $i$ and $j$. In Fig. \[CS\], the enhancement ratio of the averaged cross section, $\langle\sigma_{\rm eff}v\rangle$, to that in the perturbative calculation is shown as a function of $m$ with fixed $m/T = 20, ~200, ~2000$ (left figure) and as a function of $T$ with fixed $m = 2.8$ TeV (right figure). For comparison, the cross section in a perturbative calculation is also shown as a dotted line in the right figure. Note that the perturbative cross section is constant in time. The little drop at $x \sim 10^5$ is due to the decoupling of $\tilde \chi ^\pm$. In the calculation of the cross section, we used the running gauge coupling constant at the $m$ and $m_Z$ in the absorptive terms and the potentials, respectively. (-120,138)[$\langle \sigma_{\rm eff} \rangle / \langle \sigma_{\rm eff} \rangle_{\rm Tree}$]{} (-177,134)[Thermal averaged cross section, $\langle \sigma_{\rm eff} \rangle$]{} In these figures, large enhancement of the cross section is found due to the non-perturbative effect when $m$ is larger than $\sim 1$ TeV. A significant enhancement is shown at $m\sim$ 2.4 GeV. This originates in the bound state composed of $\DM\DM$ and $\CP\CPC$ pairs [@Hisano:2004ds; @Hisano:2003ec]. The enhancement by the non-perturbative effect is more significant for lower temperature. Since $\DM$ and $\CP$ are more non-relativistic for lower temperature, the long-range force acting between these particles strongly modifies their wave functions and alters the cross section significantly. (-115,136)[$Y / Y_{\rm Tree}$]{} (-165,136)[Thermal relic abundance, $\Omega_{\rm DM} h^2$]{} Since the averaged cross section depends on temperature in a non-trivial way as shown in Fig. \[CS\], we should integrate the Boltzmann equation numerically. After calculating the present value of the yield, $Y_0$, by the integration, we obtain the dark matter mass fraction in the current universe through the relation $\Omega_{DM} h^2 = m s_0 Y_0 h^2/\rho_c$, where $\rho_c$ is the critical density, $\rho_c = 1.05 \times 10^{-5} h^2 ~{\rm GeV cm}^{-3}$ ($h = 0.73^{+0.04}_{-0.03}$) [@PDG], and $s_0$ is the entropy density of the present universe. The result is shown in Fig. \[Omega\]. In the left figure, the ratio of the yield with the enhancement to one without the enhancement (perturbative result) is shown as a function of temperature. The mass of the wino-like neutralino is assumed $ m = 2.8$ TeV. The enhancement of the cross section at the departure from the equilibrium decreases the abundance by $20-30\%$, and it leads to quick deviation of the yield from the perturbative one after decoupling. Since the annihilation cross section is increased for lower temperature by the Sommerfeld enhancement, the sudden freeze-out phenomenon on the yield does not occur and the yield continues to be reduced by the non-perturbative effect even for $x > 100$ compared to the perturbative one. The resultant dark matter abundance is reduced by 50% compared to the perturbative result. In the right figure, the relic abundance of the dark matter in the present universe is shown as a function of $m$ in terms of $\Omega h^2$. The allowed regions by the WMAP at 1 and 2 $\sigma$ are also shown as shaded areas in this figure. We found that the mass in the wino-like neutralino dark matter consistent with the observation is shifted by 600 GeV due to the non-perturbative effect and the wino-like neutralino mass consistent with WMAP results turns out to be 2.7 TeV $\lesssim m \lesssim$ 3.0 TeV. Summary and discussion ====================== In this letter, we have pointed out the thermal relic abundance of dark matter, which is SU(2)$_L$ non-singlet and has a much larger mass than that of the weak gauge bosons, can be strongly reduced by the non-perturbative effect. We have investigated the non-perturbative effect on the relic abundance of wino-like neutralino as an example. Compared with the perturbative result, this effect reduces the abundance by about 50% and increases the mass of the wino-like neutralino dark matter consistent with the observation by about 600 GeV. As a result, the thermal relic abundance of the wino-like neutralino dark matter is consistent with observed abundances when 2.7 TeV $\lesssim m \lesssim$ 3.0 TeV. The non-perturbative effect can change relic abundances of other dark matter candidates with SU(2)$_L$ charge and heavy mass, such as higgsino-like neutralino. The non-perturbative effect on the thermal relic abundance of higgsino-like neutralino is expected to be roughly 10%, since winos are triplet under the SU(2)$_L$ gauge group, while higgsinos are SU(2)$_L$ doublet. Therefore, non-perturbative effect may change the abundance by O(10%) for other SU(2)$_L$ doublet candidates for the dark matter. A detailed analysis of this subject is studied elsewhere. The Sommerfeld enhancement occurs reasonably for particles with electric charge. In fact the non-perturbative effect through photon exchanges for charged particle annihilation can change the abundance by about 10%. Therefore, one may think that the relic abundance of dark matter will be changed in the stau coannihilation region or in the case that gravitino is the lightest supersymmetric particle and it is produced through decay of stau. However, the non-perturbative effect for stau does not change the dark matter abundance. In stau annihilation, $\sigma (\tilde \tau ^+ \tilde \tau ^-) \simeq \sigma (\tilde \tau ^+ \tilde \tau ^+)$ and the Sommerfeld enhancement is positive (negative) for the former (latter) process. Hence, the enhancement is almost canceled and the change of the abundance is 1% at most. Kaluza-Klein (KK) right-handed leptons ($E^{(1)}$) in UED models are highly degenerate with the lightest KK particle in mass and $\sigma(E^{(1)} \bar E ^{(1)}) > \sigma(E^{(1)} E ^{(1)})$ [@UED2; @Kakizaki:2005uy]. Hence, the enhancement could be expected to change the abundance of the KK dark matter. The change of the abundance is within 4% since $\sigma(E^{(1)} \bar E ^{(1)})$ contributes to the effective annihilation cross section by 40% at most. Finally, we comment on the non-perturbative effect of colored particles, such as gluino. The enhancement for colored particles are very effective [@Baer:1998pg]. However, it may be very complicated due to the existence of the QCD phase transition, which is discussed in Ref. [@Arvanitaki:2005fa]. Furthermore, colored particles can not be candidates for the dark matter and are not expected to be degenerate with a dark matter particle in mass due to large radiative corrections by the strong interaction. Hence, this subject is beyond the scope of this letter. Acknowledgments {#acknowledgments .unnumbered} =============== This work is supported in part by the Grant-in-Aid for Science Research, Ministry of Education, Science and Culture, Japan (No.1803422 and 15540255 for JH, 16081211 for SM and 18840011 for MS). Also, the work of MN is supported in part by JSPS. [99]{} C. L. Bennett [*et al.*]{}, Astrophys. J. Suppl.  [**148**]{}, 1 (2003); D. N. Spergel [*et al.*]{} \[WMAP Collaboration\], Astrophys. J. Suppl.  [**148**]{}, 175 (2003); D. N. Spergel [*et al.*]{}, arXiv:astro-ph/0603449. T. Appelquist, H. C. Cheng and B. A. Dobrescu, Phys. Rev. D [**64**]{}, 035002 (2001). G. Servant and T. M. P. Tait, Nucl. Phys. B [**650**]{}, 391 (2003); For reviews, see for instance, G. Jungman, M. Kamionkowski and K. Griest, Phys. Rept.  [**267**]{}, 195 (1996); L. Bergstrom, Rept. Prog. Phys.  [**63**]{}, 793 (2000); C. Munoz, Int. J. Mod. Phys. A [**19**]{}, 3093 (2004); G. Bertone, D. Hooper and J. Silk, Phys. Rept.  [**405**]{}, 279 (2005). M. Kakizaki, S. Matsumoto and M. Senami, Phys. Rev. D [**74**]{}, 023504 (2006). J. Hisano, S. Matsumoto, M. M. Nojiri and O. Saito, Phys. Rev. D [**71**]{}, 063528 (2005). J. Hisano, S. Matsumoto and M. M. Nojiri, Phys. Rev. Lett.  [**92**]{}, 031303 (2004). J. Hisano, S. Matsumoto, O. Saito and M. Senami, Phys. Rev. D [**73**]{}, 055004 (2006). K. Griest and D. Seckel, Phys. Rev. D [**43**]{}, 3191 (1991). P. Gondolo and G. Gelmini, Nucl. Phys. B [**360**]{}, 145 (1991). W. M. Yao [*et al.*]{} \[Particle Data Group\], J. Phys. G [**33**]{},1 (2006). M. Kakizaki, S. Matsumoto, Y. Sato and M. Senami, Nucl. Phys. B [**735**]{}, 84 (2006). H. Baer, K. m. Cheung and J. F. Gunion, Phys. Rev. D [**59**]{}, 075002 (1999). A. Arvanitaki, C. Davis, P. W. Graham, A. Pierce and J. G. Wacker, Phys. Rev. D [**72**]{}, 075011 (2005).
{ "pile_set_name": "ArXiv" }
Lens On: Jeremy Kost The photographer talks us through his new photobook, Like One of Your French Girls. His photographs of scantily clad men have gone down a storm on Insta – amassing nearly 300k followers of those seeking to soak up the male form – but for his latest project, US based photographer Jeremy Kost has put the lens on drag queens in all their unique and outlandish guises. Shooting his subjects on Polaroid and smearing the images with paint to serve up a unique textured effect, Kost has been photographing the stars of the drag scene since 2001, snapping some even before they became household names as a result of RuPaul induced fame. The result of this on-going project is Like One of Your French Girls, a perfectly produced photo book featuring archive imagery dating back to 2009 and featuring the likes of Sharon Needles, Detox Icunt and Alaska Thunderfuck, a.k.a. all your fave queens. Following the book’s London launch at The Edition, hosted by our fave UK queen Jodie Harsh, we caught up with Kost to talk about the creative process behind his latest work. What inspired you to create Like One of Your French Girls? It happened by mistake to be honest. I was working on a painting on the wall of my NYC place and took it too far. Out of frustration, I swiped a Polaroid of a dude through the oilstick on the canvas and loved the mistaken result! I’ve continued to refine the idea both in application and conceptual focus; I’m making progress all the time. With drag queens, there really is an amazing relationship between makeup and paint. In fact, queens often say that they’re “painting” their faces! It also has to do with masking, concealing, revealing, colour, mixing, contrast… It’s a perfect conceptual balance I think! And what led you to choose drag queens – as opposed to men, for example – as the subject for the book? To be honest, I’ve sort of been a bit burned out shooting dudes for the last year or so. I didn’t shoot anything else between fall of 2012 and spring of 2016 and have been looking for inspiration again; I found that in my return to drag queens and I’ve been making new work with them since. 90% of the Polaroids in this book are from my archives (largely between 2009 and 2012). They were either extra portraits made for a larger collage (earlier work) or a single Polaroid that I made for posterity, given that the iPhone camera wasn’t what it is today. This specific book came as a direct result of knowing that I wanted to make a book of the painted work with drag queens, and revisiting these images was a way to give it breadth and diversity of subject, place, and such. It also allowed me a golden opportunity to connect the dots between my older work and where I’m going with the new painted works I’m making in the studio now. You touched on it before, but can you talk to us specifically about the paint on the Polaroids? With this specific body of work, they were all individually considered. I’d mix different colours on palettes and then look at their relationship to each other. Once I was happy with a relationship and the way things felt, I’d find a Polaroid in the archive stacks that “worked” with the paint that I’d laid down. Sometimes it would work in an opposite direction… I knew I wanted to include a specific Polaroid in the body of work and I’d make something that felt right. The images of Amanda Lepore with Tommy are a perfect example of that sort of reverse process! Some of the images date back to 2009, was a book always in the pipeline? Not at all to be honest. They were things in my archives that I didn’t have any grand plans for. As I mentioned, they were made when I was making other works. They really are the perfect way of connecting the dots between where I’m going and the work I made previously in my career. Why do you think drag is important? After seeing things like DragCon in LA and The Mighty Hoopla in London, it’s amazing how the mainstreaming of drag has given people so much freedom. It’s incredible to see people more liberated than ever, with drag seemingly giving them license to express themselves much more confidently. It also has such an amazing historical reference to fashion, presentation, masking, layering… In a world that is so digitally led and focused on perfection, what attracts you to shooting on film? It really is amazing to see the difference between the interaction from fans on digital/iPhone images versus Polaroids on Instagram on both accounts… For me, the Polaroid is the more sophisticated part of what I do. The followers totally engage more with the digital image, but there is something to be said for being able to hold the moment in your hand, be it with paint or not! Shooting drag queens is quite a departure from the male portraits you usually shoot. How do the two compare? Well, lest you forget that I’ve been shooting drag queens since 2001! When my Instagram first started, it was a hybrid! So, I don’t think about this as much of a departure, but rather, a homecoming. And what direction do you see yourself taking in the future. I’m steadily working in LA on new paintings, along with new Polaroids of dudes and drag queens all over the world. I hope to work on another book of men to come out next fall and possibly a follow up to French Girls with all of the new work that I’ve been making as well. Like One of Your French Girls is available online here. Limited run of 400 copies, each with unique painted doodle on the back-cover.
{ "pile_set_name": "Pile-CC" }
Q: Deserialize JSON in Dictionary in Web Api: always empty string I have such JSON string: {"1":[1,3,5],"2":[2,5,6],"3":[5,6,8]} I want to send it to the Web Api Controller without changing using ajax request: $.ajax({ type: "POST", url: "Api/Serialize/Dict", data: JSON.stringify(sendedData), dataType: "json" }); In Web Api I have such method: [HttpPost] public object Dict(Dictionary<int, List<int>> sendedData) { var d1 = Request.Content.ReadAsStreamAsync().Result; var rawJson = new StreamReader(d1).ReadToEnd(); sendedData=Newtonsoft.Json.JsonConvert.DeserializeObject<Dictionary<int, List<string>>>(rawJson); return null; } But rawJson always is empty string. I don't understand why? But d1.Length is the same as in JSON string. I don't know how to get JSON string from d1... Thank you! A: use content type parameter instead of dataType when performing ajax call: $.ajax({ type: "POST", url: "Api/Serialize/Dict", contentType: "application/json; charset=utf-8", //! data: JSON.stringify(sendedData) });
{ "pile_set_name": "StackExchange" }
A conserved mechanism for replication origin recognition and binding in archaea. To date, methanogens are the only group within the archaea where firing DNA replication origins have not been demonstrated in vivo. In the present study we show that a previously identified cluster of ORB (origin recognition box) sequences do indeed function as an origin of replication in vivo in the archaeon Methanothermobacter thermautotrophicus. Although the consensus sequence of ORBs in M. thermautotrophicus is somewhat conserved when compared with ORB sequences in other archaea, the Cdc6-1 protein from M. thermautotrophicus (termed MthCdc6-1) displays sequence-specific binding that is selective for the MthORB sequence and does not recognize ORBs from other archaeal species. Stabilization of in vitro MthORB DNA binding by MthCdc6-1 requires additional conserved sequences 3' to those originally described for M. thermautotrophicus. By testing synthetic sequences bearing mutations in the MthORB consensus sequence, we show that Cdc6/ORB binding is critically dependent on the presence of an invariant guanine found in all archaeal ORB sequences. Mutation of a universally conserved arginine residue in the recognition helix of the winged helix domain of archaeal Cdc6-1 shows that specific origin sequence recognition is dependent on the interaction of this arginine residue with the invariant guanine. Recognition of a mutated origin sequence can be achieved by mutation of the conserved arginine residue to a lysine or glutamine residue. Thus despite a number of differences in protein and DNA sequences between species, the mechanism of origin recognition and binding appears to be conserved throughout the archaea.
{ "pile_set_name": "PubMed Abstracts" }
Two images from a fire truck dashboard camera show a firefighter pointing out the location of an Asiana plane crash victim and the same spot covered in firefighting foam. (SFFD via San Francisco Chronicle) SAN FRANCISCO (CBS SF) – A new report is challenging the conclusions about how a victim of the Asiana Airlines plane crash at San Francisco International Airport died. The report filed with the National Transportation Safety Board by San Francisco City Attorney Dennis Herrera and released Wednesday claims there is evidence that firefighters did not run over and kill a teenage crash victim, and that she was already dead from the crash. The report acknowledges the city’s firefighters ran over 16-year-old Ye Meng Yuan – twice – after she had been ejected from the plane in the crash on July 6. But the city attorney adamantly denies she was still alive at the time of those rollovers. The report disputes what the San Mateo County Coroner Robert Foucrault said previously, that she was alive at the time she received multiple blunt force injuries consistent with being run over by a motor vehicle. The city attorney report indicated Foucrault found “no dust, dirt, debris, or fire fighting foam in the trachea or lung tissues of the deceased.” If she were alive, according to the report, she would have breathed in one or more of those items. SF City Attorney: Asiana Plane Crash Victim Already Dead When Run Over The report also noted that she was ejected from the plane, just like two other passengers who were right next to her; both of whom died. Wednesday, Foucrault issued a statement to CBS News standing by his original report: ““This is the drama of litigation. It’s not surprising that the San Francisco City Attorney is taking this position. My office is independent, I don’t have a dog in this fight. My report was true and scientific; I am sure the attorneys for the passenger’s family will look at these reports and choose one, and the attorney for the city will choose the other.”
{ "pile_set_name": "Pile-CC" }
Computer numerical control or “CNC” milling machines often must be precisely “leveled” in a manner which causes the vertical orientations of support contact points upon the undersurface of the machine's base or chassis to coincide with a horizontal plane. Ideally, leveling procedures performed upon such machines eliminate any warping, deflection, or distortion of any of such support contact points away from the horizontal plane. Such machine leveling is known to be facilitated or accomplished by adapting a milling machine's floor contacting feet or pedestals to function as vertically extendable and retractable hydraulic cylinders. Operation of such cylinder pedestals through selective injections and ejections of hydraulic fluid to and from the cylinders' interior fluid filled volumes is known to align a machine's base with the horizontal plane. Where such cylinder pedestals are arranged beneath a heavy milling center machine in a support matrix, operation of the cylinder pedestals either individually or in groupings gives rise to significant difficulties, complexities, and challenges. In such leveling operations, various groupings of cylinder pedestals or individual cylinder pedestals are alternatively raised, lowered, locked against fluid flow, and opened for equipment “floating” interchange of fluid volumes. In any such equipment leveling task, a multitude of such alternative operations directed to the cylinder pedestals may be required to be performed. Known assemblies, machinery and equipment which facilitate such a operations are cumbersome in use and time consuming. The instant inventive assembly for hydraulic fluid actuated machine leveling solves or ameliorates such difficulties and challenges by providing and associating with a machine supporting matrix of hydraulic cylinder configured pedestals a specialized network of hydraulic fluid carrying conduits wherein hydraulic fluid flow and pressure is controlled by incorporation of a specialized combination of shutoff valves and a variable relief valve.
{ "pile_set_name": "USPTO Backgrounds" }
EXCEED THE SPACE PROVIDED. The proposed research is a continued study of mobile introns in bacteria. The mobile group I and group II introns are both self-splicing, but their RNA-splicing and DNA-mobility pathways are distinct. In each case, the intron typically transfers to an allelic intron-less site, in a homingprocess initiated by intron-encoded endonucleases. For group I intron homing, recombination events are strictly DNA-based whereas for group II intron homing, also termed retrohoming, RNA is involved at levels of both the intron template and the cleavage enzyme for mobility. Transposition to ectopic sites also occurs at low frequency, and is the process responsible for intron dissemination in nature. During the current funding period we showed the following: Homing of the group I td intron is regulated by the very endonuclease that promotes the process, by acting as an autorepressor. Also, retrohoming of group II introns is dependent on host polymerases in a way that suggests that intron movement is related to the cell's DNA damage response. Furthermore, group II intron retrotransposition occurs into single- or double-stranded DNAs in a host-dependent fashion. Additionally, transposed group II introns retain their ability to move, reflecting the high fidelity of the group II intron- encoded reverse transcriptase. Finally, in a study of a small regulatory RNA, DsrA, included in a non-intron- related specific ami, we showed not only that DsrA undergoes conformational changes to effect global regulation, but also that DsrA promotes acid tolerance in pathogenic bacteria, thereby enhancing virulence. In the upcoming funding period we will follow up on these findings using genetic studies in bacteria, as well as biochemical and structural approaches. Further, we will address exciting questions relating to intron evolution and the relationship of group II nitrons to spliceosomeal introns in yeast, all as described in the original application. Our overall goal of studying DNA- and RNA-based rearrangements of model introns remains unchanged. In addition to the innate mechanistic importance of these studies, the invasiveness of group II introns and their similarities to human retrotransposons and spliceosomal introns have great evolutionary, biotechnological and medical significance.
{ "pile_set_name": "NIH ExPorter" }
--- abstract: | A [*rack*]{} is a set equipped with a bijective, self-right-distributive binary operation, and a [*quandle*]{} is a rack which satisfies an idempotency condition. In this paper, we introduce a new definition of modules over a rack or quandle, and show that this definition includes the one studied by Etingof and Graña [@etingof/grana:orc] and the more general one given by Andruskiewitsch and Graña [@andr/grana:pointed-hopf]. We further show that this definition coincides with the appropriate specialisation of the definition developed by Beck [@beck:thesis], and hence that these objects form a suitable category of coefficient objects in which to develop homology and cohomology theories for racks and quandles. We then develop an Abelian extension theory for racks and quandles which contains the variants developed by Carter, Elhamdadi, Kamada and Saito [@carter/elhamdadi/saito:twisted; @carter/kamada/saito:diag] as special cases. address: | Mathematics Institute\ University of Warwick\ Coventry\ CV4 7AL\ United Kingdom author: - Nicholas Jackson title: Extensions of racks and quandles --- Introduction ============ A [*rack*]{} (or [*wrack*]{}) is a set $X$ equipped with a self-right-distributive binary operation (often written as exponentiation) satisfying the following two axioms: 1. For every $a,b \in X$ there is a unique $c \in X$ such that $c^b = a$. 2. For every $a,b,c \in X$, the [*rack identity*]{} holds: $$a^{bc} = a^{cb^c}$$ In the first of these axioms, the unique element $c$ is often denoted $a^{\overline{b}}$, although $\overline{b}$ should not itself be regarded as an element of the rack. Association of exponents should be understood to follow the usual conventions for exponential notation. In particular, the expressions $a^{bc}$ and $a^{cb^c}$ should be interpreted as $(a^b)^c$ and $(a^c)^{(b^c)}$ respectively. A rack which, in addition, satisfies the following idempotency criterion is said to be a [*quandle*]{}. 1. For every $a \in X$, $a^a = a$. There is an obvious notion of a [*homomorphism*]{} of racks: a function $f{\colon}X {\rightarrow}Y$ such that $f(a^b) = f(a)^{f(b)}$ for all $a,b \in X$. We may thus form the categories ${\mathsf{Rack}}$ and ${\mathsf{Quandle}}$. For any element $x \in X$ the map $\pi_x{\colon}a \mapsto a^x$ is a bijection. The subgroup of ${\operatorname{Sym}}X$ generated by $\{ \pi_x : x \in X \}$ is the [*operator group*]{} of $X$, denoted ${\operatorname{Op}}X$. This assignment is not functorial since there is not generally a well-defined group homomorphism ${\operatorname{Op}}f{\colon}{\operatorname{Op}}X {\rightarrow}{\operatorname{Op}}Y$ corresponding to an arbitrary rack homomorphism $f{\colon}X {\rightarrow}Y$. The group ${\operatorname{Op}}X$ acts on the rack $X$, and divides it into [*orbits*]{}. Two elements $x,y \in X$ are then said to be in the same orbit (denoted $x \sim y$ or $x \in [y]$) if there is a (not necessarily unique) word $w \in {\operatorname{Op}}X$ such that $y = x^w$. A rack with a single orbit is said to be [*transitive*]{}. The set of orbits of $X$ is denoted ${\operatorname{Orb}}X$. Given any group $G$, we may form the [*conjugation rack*]{} ${\operatorname{Conj}}G$ of $G$ by taking the underlying set of $G$ and defining the rack operation to be conjugation within the group, so $g^h := h^{-1}gh$ for all $g,h \in G$. This process determines a functor ${\operatorname{Conj}}{\colon}{\mathsf{Group}} {\rightarrow}{\mathsf{Rack}}$ which has a left adjoint, the [*associated group*]{} functor ${\operatorname{As}}{\colon}{\mathsf{Rack}} {\rightarrow}{\mathsf{Group}}$. For a given rack $X$, the associated group ${\operatorname{As}}X$ is the free group on the elements of $X$ modulo the relations $$a^b = b^{-1}ab$$ for all $a,b \in X$. Racks were first studied by Conway and Wraith [@conway/wraith:wracks] and later (under the name ‘automorphic sets’) by Brieskorn [@brieskorn:automorphic], while quandles were introduced by Joyce [@joyce:knot-quandle]. A detailed exposition may be found in the paper by Fenn and Rourke [@fenn/rourke:racks-links]. A [*trunk*]{} ${\mathsf{T}}$ is an object analogous to a category, and consists of a class of [*objects*]{} and, for each ordered pair $(A,B)$ of objects, a set ${\operatorname{Hom}}_{{\mathsf{T}}}(A,B)$ of [*morphisms*]{}. In addition, ${\mathsf{T}}$ has a number of [*preferred squares*]{} $$\bfig\square[A`B`C`D;f`g`h`k]\efig$$ of morphisms, a concept analogous to that of composition in a category. Morphism composition need not be associative, although it is in all the cases discussed in this paper, and particularly when the trunk in question is also a category. Given two arbitrary trunks ${\mathsf{S}}$ and ${\mathsf{T}}$, a [*trunk map*]{} or [*functor*]{} $F{\colon}{\mathsf{S}}{\rightarrow}{\mathsf{T}}$ is a map which assigns to every object $A$ of ${\mathsf{S}}$ an object $F(A)$ of ${\mathsf{T}}$, and to every morphism $f{\colon}A {\rightarrow}B$ of ${\mathsf{S}}$ a morphism $F(f){\colon}F(A) {\rightarrow}F(B)$ of ${\mathsf{T}}$ such that preferred squares are preserved: $$\bfig\square/>`>`>`>/<500,500>[F(A)`F(B)`F(C)`F(D);f_*`g_*`h_*`k_*]\efig$$ For any category ${\mathsf{C}}$ there is a well-defined trunk ${\operatorname{Trunk}({\mathsf{C}})}$ which has the same objects and morphisms as ${\mathsf{C}}$, and whose preferred squares are the commutative diagrams in ${\mathsf{C}}$. In particular, we will consider the case ${\operatorname{Trunk}({\mathsf{Ab}})}$, which we will denote ${\mathsf{Ab}}$ where there is no ambiguity. Trunks were first introduced and studied by Fenn, Rourke and Sanderson [@fenn/rourke/sanderson:trunks]. In this paper, we study extensions of racks and quandles in more generality than before, in the process describing a new, generalised notion of a module over a rack or quandle, which is shown to coincide with the general definition of a module devised by Beck [@beck:thesis]. Abelian groups ${\operatorname{Ext}}(X,{\mathcal{A}})$ and ${\operatorname{Ext}}_Q(X,{\mathcal{A}})$ are defined and shown to classify (respectively) Abelian rack and quandle extensions and to be generalisations of all known existing ${\operatorname{Ext}}$ groups for racks and quandles. This paper contains part of my doctoral thesis [@jackson:thesis]. I am grateful to my supervisor Colin Rourke, and to Alan Robinson, Ronald Brown, and Simona Paoli for many interesting discussions and much helpful advice over the past few years. I also thank the referees for their kind comments and helpful suggestions. Modules ======= Given a rack $X$ we define a trunk ${\mathsf{T}}(X)$ as follows: let ${\mathsf{T}}(X)$ have one object for each element $x \in X$, and for each ordered pair $(x,y)$ of elements of $X$, a morphism $\alpha_{x,y}{\colon}x {\rightarrow}x^y$ and a morphism $\beta_{y,x}{\colon}y {\rightarrow}y^x$ such that the squares $$\bfig\square/>`>`>`>/<1000,500>[x`x^y`x^z`x^{yz} = x^{zy^z}; \alpha_{x,y}`\alpha_{x,z}`\alpha_{x^y,z}`\alpha_{x^z,y^z}]\efig \qquad \bfig\square/>`>`>`>/<1000,500>[y`x^y`y^z`x^{yz} = x^{zy^z}; \beta_{y,x}`\alpha_{y,z}`\alpha_{x^y,z}`\beta_{y^z,x^z}]\efig$$ are preferred for all $x,y,z \in X$. Thus a trunk map $A{\colon}{\mathsf{T}}(X){\rightarrow}{\mathsf{Ab}}$, as defined in the previous section, determines Abelian groups $A_x$, and Abelian group homomorphisms $\phi_{x,y}{\colon}A_x {\rightarrow}A_{x^y}$ and $\psi_{y,x}{\colon}A_y {\rightarrow}A_{x^y}$, such that $$\begin{aligned} \phi_{x^y,z}\phi_{x,y} & = & \phi_{x^z,y^z}\phi_{x,z} \\ \mbox{and}\qquad \phi_{x^y,z}\psi_{y,x} & = & \psi_{y^z,x^z}\phi_{y,z}\end{aligned}$$ for all $x,y,z \in X$. It will occasionally be convenient to denote such a trunk map by a triple $(A,\phi,\psi)$. Rack modules ------------ Let $X$ be an arbitrary rack. Then a [*rack module*]{} over $X$ (or an [*$X$–module*]{}) is a trunk map ${\mathcal{A}} = (A,\phi,\psi){\colon}{\mathsf{T}}(X) {\rightarrow}{\mathsf{Ab}}$ such that each $\phi_{x,y}{\colon}A_x {\cong}A_{x^y}$ is an isomorphism, and $$\label{eqn:rmod} \psi_{z,x^y}(a) = \phi_{x^z,y^z}\psi_{z,x}(a) + \psi_{y^z,x^z}\psi_{z,y}(a)$$ for all $a \in A_z$ and $x,y,z \in X$. If $x,y$ lie in the same orbit of $X$ then this implies that $A_x {\cong}A_y$ (although the isomorphism is not necessarily unique). For racks with more than one orbit it follows that if $x \not\sim y$ then $A_x$ need not be isomorphic to $A_y$. Rack modules where the constituent groups are nevertheless all isomorphic are said to be [*homogeneous*]{}, and those where this is not the case are said to be [*heterogeneous*]{}. It is clear that modules over transitive racks must be homogeneous. An $X$–module ${\mathcal{A}}$ of the form $(A,{\operatorname{Id}},0)$ (so that $\phi_{x,y} = {\operatorname{Id}}{\colon}A_x {\rightarrow}A_{x^y}$ and $\psi_{y,x}$ is the zero map $A_y {\rightarrow}A_{x^y}$) is said to be [*trivial*]{}. \[exm:abgroup\] [Any Abelian group $A$ may be considered as a homogeneous trivial $X$–module ${\mathcal{A}}$, for any rack $X$, by setting $A_x = A, \phi_{x,y} = {\operatorname{Id}}_A$, and $\psi_{y,x} = 0_A$ for all $x,y \in X$.]{} \[exm:asx\] [Let $X$ be a rack, and let $A$ be an Abelian group equipped with an action of ${\operatorname{As}}X$. Then $A$ may be considered as a homogeneous $X$–module ${\mathcal{A}} = (A,\phi,\psi)$ by setting $A_x = A$, and defining $\phi_{x,y}(a) = a \cdot x$ and $\psi_{y,x}(a) = 0$ for all $a \in A$ and $x,y \in X$.]{} In particular, Etingof and Graña [@etingof/grana:orc] study a cohomology theory for racks, with ${\operatorname{As}}X$–modules as coefficient objects. \[exm:andr/grana\] In [@andr/grana:pointed-hopf], Andruskiewitsch and Graña define an [*$X$–module*]{} to be an Abelian group $A$ equipped with a family $\eta = \{\eta_{x,y} : x,y \in X\}$ of automorphisms of $A$ and another family $\tau = \{\tau_{x,y} : x,y \in X\}$ of endomorphisms of $A$ such that (after slight notational changes): $$\begin{aligned} \eta_{x^y,z}\eta_{x,y} & = & \eta_{x^z,y^z}\eta_{x,z} \\ \eta_{x^y,z}\tau_{y,x} & = & \tau_{y^z,x^z}\eta_{y,z} \\ \tau_{z,x^y} & = & \eta_{x^z,y^z}\tau_{z,x} + \tau_{y^z,x^z}\tau_{z,y}\end{aligned}$$ This may readily be seen to be a homogeneous $X$–module in the context of the current discussion. As a concrete example, let $X$ be $C_3=\{0,1,2\}$, the cyclic rack with three elements. This has rack structure given by $x^y = x+1 \pmod{3}$ for all $x,y \in X$. Let $A=\mathbb{Z}_5$ and define: $$\begin{aligned} &\eta_{x,y}{\colon}A {\rightarrow}A;\quad n \mapsto 2n\pmod{5}\\ &\tau_{y,x}{\colon}A {\rightarrow}A;\quad n \mapsto 4n\pmod{5}\end{aligned}$$ Then this satisfies Andruskiewitsch and Graña’s definition of a $C_3$–module, and (by setting $A_0=A_1=A_2=A=\mathbb{Z}_5$) is also a homogeneous $C_3$–module in the context of the current discussion. \[exm:alexander\] [Let $h = \{ h_i : i \in {\operatorname{Orb}}X \}$ be a family of Laurent polynomials in one variable $t$, one for each orbit of the rack $X$, and let $n = \{ n_i : i \in {\operatorname{Orb}}X \}$ be a set of positive integers, also one for each orbit. Then we may construct a (possibly heterogeneous) $X$–module ${\mathcal{A}} = (A,\phi,\psi)$ by setting $A_x = \mathbb{Z}_{n_{[x]}}[t,t^{-1}]/h_{[x]}(t)$, $\phi_{x,y}{\colon}a \mapsto ta$, and $\psi_{y,x}{\colon}b \mapsto (1-t)b$ for all $x,y \in X$, $a \in A_x$ and $b \in A_y$. The case where $A_x = \mathbb{Z}[t,t^{-1}]/h_{[x]}(t)$ for all $x$ in some orbit(s) of $X$ is also an $X$–module.]{} \[exm:dihedral\] [Let $n = \{ n_i : i \in {\operatorname{Orb}}X \}$ be a set of positive integers, one for each orbit of $X$. Then let ${\mathcal{D}} = (D,\phi,\psi)$ denote the (possibly heterogeneous) $X$–module where $D_x = \mathbb{Z}_{n_{[x]}}$, $\phi_{x,y}(a) = -a$, and $\psi_{y,x}(b) = 2b$ for all $x,y \in X$, $a \in A_x$ and $b \in A_y$. This module is isomorphic to the Alexander module where $h_i(t) = (1+t)$ for all $i \in {\operatorname{Orb}}X$. The case where $A_x = \mathbb{Z}$ for all $x$ in some orbit(s) of $X$, is also an $X$–module. The [*$n$th homogeneous dihedral $X$–module*]{} (where all the $n_i$ are equal to $n$) is denoted ${\mathcal{D}}_n$. The case where $D_x = \mathbb{Z}$ for all $x \in X$ is the [*infinite homogeneous dihedral $X$–module*]{} ${\mathcal{D}}_\infty$.]{} Given two $X$–modules ${\mathcal{A}} = (A,\phi,\psi)$ and ${\mathcal{B}} = (B,\chi,\omega)$, a [*homomorphism*]{} of $X$–modules, or an [*$X$–map*]{}, is a natural transformation $f{\colon}{\mathcal{A}} {\rightarrow}{\mathcal{B}}$ of trunk maps, that is, a collection $f = \{ f_x{\colon}A_x {\rightarrow}B_x : x \in X \}$ of Abelian group homomorphisms such that $$\begin{aligned} \phi_{x,y}f_x & = & f_{x^y}\phi_{x,y} \\ \mbox{and}\qquad\psi_{y,x}f_y & = & f_{x^y}\psi_{y,x}\end{aligned}$$ for all $x,y \in X$. We may thus form the category ${\mathsf{RMod}}_X$ whose objects are $X$–modules, and whose morphisms are $X$–maps. In his doctoral thesis [@beck:thesis], Beck gives a general definition of a ‘module’ in an arbitrary category. Given a category ${\mathsf{C}}$, and an object $X$ of ${\mathsf{C}}$, a [*Beck module*]{} over $X$ is an Abelian group object in the slice category ${\mathsf{C}}/X$. For any group $G$, the category ${\mathsf{Ab}}({\mathsf{Group}}/G)$, for example, is equivalent to the category of $G$–modules. Similar results hold for Lie algebras, associative algebras and commutative rings. The primary aim of this section is to demonstrate a categorical equivalence between the rack modules just defined, and the Beck modules in the category ${\mathsf{Rack}}$. For an arbitrary rack $X$ and an $X$–module ${\mathcal{A}} = (A,\phi,\psi)$, we define the [*semidirect product*]{} of ${\mathcal{A}}$ and $X$ to be the set $${\mathcal{A}} \rtimes X = \{ (a,x) : x \in X, a \in A_x \}$$ with rack operation given by $$(a,x)^{(b,y)} := \left(\phi_{x,y}(a) + \psi_{y,x}(b), x^y\right).$$ \[thm:semidirect-rack\] \[prp:semidirect-rack\] For any rack $X$ and $X$–module ${\mathcal{A}} = (A,\phi,\psi)$, the semidirect product ${\mathcal{A}} \rtimes X$ is a rack. For any three elements $(a,x), (b,y), (c,z) \in {\mathcal{A}} \rtimes X$, $$\begin{aligned} (a,x)^{(b,y)(c,z)}\! &= (\phi_{x,y}(a) + \psi_{y,x}(b),x^y)^{(c,z)} \\ &= (\phi_{x^y,z}\phi_{x,y}(a) + \phi_{x^y,z}\psi_{y,x}(b) + \psi_{z,x^y}(c),x^{yz}) \\ &= (\phi_{x^z,y^z}\phi_{x,z}(a) + \psi_{y^z,x^z}\phi_{y,z}(b) + \phi_{x^z,y^z}\psi_{z,x}(c) + \psi_{y^z,x^z}\psi_{z,y}(c), x^{zy^z}) \\ &= (\phi_{x,z}(a) + \psi_{z,x}(c),x^z)^{(\phi_{y,z}(b) + \psi_{z,y}(c),y^z)} \\ &= (a,x)^{(c,z)(b,y)^{(c,z)}}.\end{aligned}$$ Furthermore, for any two elements $(a,x), (b,y) \in {\mathcal{A}} \rtimes X$, there is a unique element $$(c,z) = (a,x)^{\overline{(b,y)}} = (\phi_{z,y}^{-1}(a - \psi_{y,z}(b)),x^{\overline{y}}) \in {\mathcal{A}} \rtimes X$$ such that $(c,z)^{(b,y)} = (a,x)$. Hence ${\mathcal{A}} \rtimes X$ satisfies the rack axioms. \[thm:rmod-beck\] For any rack $X$, the category ${\mathsf{RMod}}_X$ of $X$–modules is equivalent to the category ${\mathsf{Ab}}({\mathsf{Rack}}/X)$ of Abelian group objects over $X$. Given an $X$-module ${\mathcal{A}} = (A,\phi,\psi)$, let $T{\mathcal{A}}$ be the object $p{\colon}{\mathcal{A}} \rtimes X {\twoheadrightarrow}X$ in the slice category ${\mathsf{Rack}}/X$, where $p$ is defined as projection onto the second coordinate. Given an $X$–map $f{\colon}{\mathcal{A}}{\rightarrow}{\mathcal{B}}$, we obtain a slice morphism $Tf:{\mathcal{A}} \rtimes X {\rightarrow}{\mathcal{B}} \rtimes X$ defined by $T(f)(a,x) = (f_x(a),x)$ for all $a \in A_x$ and $x \in X$. This is functorial since, for any $X$–module homomorphism $g{\colon}{\mathcal{B}}{\rightarrow}{\mathcal{C}}$, $$\begin{aligned} T(fg)(a,x) &= ((fg)_x(a),x) \\ &= (f_xg_x(a),x) \\ &= T(f)(g_x(a),x) \\ &= T(f)T(g)(a,x)\end{aligned}$$ for all $a \in A_x$ and $x \in X$. We thus have a functor $T{\colon}{\mathsf{RMod}}_X{\rightarrow}{\mathsf{Rack}}/X$. Our aim is to show firstly that the image of $T$ is the subcategory ${\mathsf{Ab}}({\mathsf{Rack}}/X)$, and secondly that $T$ has a well-defined inverse. To show the first, that $T{\mathcal{A}}$ has a canonical structure as an Abelian group object, we must construct an appropriate section, and suitable multiplication and inverse morphisms. Let: $$\begin{aligned} & r{\colon}{\mathcal{A}} \rtimes X {\rightarrow}{\mathcal{A}} \rtimes X ; && (a,x) \mapsto (-a,x) \\ & m{\colon}({\mathcal{A}} \rtimes X)\times_X({\mathcal{A}} \rtimes X) {\rightarrow}{\mathcal{A}} \rtimes X ; && ((a_1,x),(a_2,x)) \mapsto (a_1+a_2,x) \\ & s{\colon}X {\rightarrow}{\mathcal{A}} \rtimes X ; && x \mapsto (0,x)\end{aligned}$$ The maps $r$ and $m$ both compose appropriately with the projection map $p$: $$\begin{aligned} &p(a,x) = x = p(-a,x) = p(r(a,x)) \\ &p(a_1,x) = p(a_2,x) = x = p(a_1+a_2,x) = p(m((a_1,x),(a_2,x))\end{aligned}$$ Furthermore, $ps = {\operatorname{Id}}_X$. Also $$\begin{aligned} m(m((a_1,x),(a_2,x)),(a_3,x)) &= m((a_1+a_2,x),(a_3,x)) \\ &= (a_1+a_2+a_3,x) \\ &= m((a_1,x),(a_2+a_3,x)) \\ &= m((a_1,x),m((a_2,x),(a_3,x))),\\ m(s(x),(a,x)) &= m((0,x),(a,x)) \\ &= (a,x) \\ &= m((a,x),(0,x)) \\ &= m((a,x),s(x)), \\ m((a_1,x),(a_2,x)) &= (a_1+a_2,x) \\ &= (a_2+a_1,x) \\ &= m((a_2,x),(a_1,x)),\end{aligned}$$ $$\begin{aligned} \mbox{and}\qquad m(r(a,x),(a,x)) &= m((-a,x),(a,x)) \\ &= (0,x) \\ &= m((a,x),(-a,x)) \\ &= m((a,x),r(a,x)),\end{aligned}$$ so $T{\mathcal{A}}$ is an Abelian group object in ${\mathsf{Rack}}/X$. Now, given an Abelian group object $p{\colon}R {\rightarrow}X$ in ${\mathsf{Rack}}/X$, with multiplication map $\mu$, inverse map $\nu$, and section $\sigma$, let $R_x$ be the preimage $p^{-1}(x)$ for each $x \in X$. Each of the $R_x$ has a canonical Abelian group structure defined in terms of the maps $\mu, \nu$, and $\sigma$: $\sigma(x)$ is the identity in $R_x$, and for any $u,v \in R_x$ let $u+v := \mu(u,v)$ and $-u := \nu(u)$. That the preimage $R_x$ is closed under addition and inversion follows immediately from the fact that $\mu$ and $\nu$ are rack homomorphisms over $X$. Next, we define maps $$\rho_{x,y}{\colon}R_x {\rightarrow}R_{x^y},\ \mbox{given by}\ u \mapsto u^{\sigma(y)},$$ for all $x,y \in X$ and $u \in R_x$. These are Abelian group homomorphisms, since $\rho_{x,y}\sigma(x) = \sigma(x)^{\sigma(y)} = \sigma(x^y)$ (which is the identity in $R_{x^y}$) and, for any $u_1,u_2 \in R_x$, $$\begin{aligned} \rho_{x,y}(u_1+u_2) &= \mu(u_1,u_2)^{\sigma(y)} \\ &= \mu(u_1,u_2)^{\mu(\sigma(y),\sigma(y))} \\ &= \mu(u_1^{\sigma(y)},u_2^{\sigma(y)}) \\ &= \rho_{x,y}(u_1) + \rho_{x,y}(u_2).\end{aligned}$$ It is also an isomorphism, since exponentiation by a fixed element of a rack is a bijection. Furthermore, for any $x,y,z \in X$ and any $u \in R_x$ $$\begin{aligned} \rho_{x^y,z}\rho_{x,y}(u) &= u^{\sigma(y)\sigma(z)} \\ &= u^{\sigma(z)\sigma(y)^{\sigma(z)}} \\ &= u^{\sigma(z)\sigma(y^z)} \\ &= \rho_{x^z,y^z}\rho_{x,z}(u).\end{aligned}$$ Now we define maps $$\lambda_{y,x}{\colon}R_y {\rightarrow}R_{x^y},\qquad \mbox{given by}\ v \mapsto \sigma(x)^v,$$ for all $x,y \in X$ and $v \in R_y$. These are also Abelian group homomorphisms since $$\lambda_{y,x}\sigma(y) = \sigma(x)^{\sigma(y)} = \sigma(x^y)$$ (which is the identity in $R_{x^y}$) and, for any $v_1,v_2 \in R_y$, $$\begin{aligned} \lambda_{y,x}(v_1+v_2) &= \sigma(x)^{\mu(v_1,v_2)} \\ &= \mu(\sigma(x),\sigma(x))^{\mu(v_1,v_2)} \\ &= \mu(\sigma(x)^{v_1},\sigma(x)^{v_2}) \\ &= \lambda_{y,x}(v_1) + \lambda_{y,x}(v_2).\end{aligned}$$ Also, for any $x,y,z \in X$, $v \in R_y$ and $w \in R_z$ $$\begin{aligned} \rho_{x^y,z}\lambda_{y,x}(v) &= \sigma(x)^{v\sigma(z)} \\ &= \sigma(x)^{\sigma(z)v^{\sigma(z)}} \\ &= \sigma(x^z)^{v^{\sigma(z)}} \\ &= \lambda_{y^z,x^z}\rho_{y,z}(v) \\ \mbox{and}\qquad\lambda_{z,x^y}(w) &= \sigma(x^y)^w \\ &= \sigma(x)^{\sigma(y)w} \\ &= \sigma(x)^{w\sigma(y)^w} \\ &= \mu(\sigma(x),\sigma(x))^{\mu(\sigma(z),w) \mu(\sigma(y),\sigma(y))^{\mu(w,\sigma(z))}} \\ &= \mu\left(\sigma(x)^{\sigma(z)\sigma(y)^w}, \sigma(x)^{w\sigma(y)^{\sigma(z)}}\right) \\ &= \sigma(x)^{\sigma(z)\sigma(y)^w} + \sigma(x)^{w\sigma(y)^{\sigma(z)}} \\ &= \sigma(x^z)^{\sigma(y)^w} + \sigma(x)^{w\sigma(y^z)} \\ &= \lambda_{y^z,x^z}\lambda_{z,y}(w) + \rho_{x^z,y^z}\lambda_{z,x}(w).\end{aligned}$$ Thus an Abelian group object $R {\rightarrow}X$ in ${\mathsf{Rack}}/X$ determines a unique rack module ${\mathcal{R}} = (R,\rho,\lambda)$ over $X$. For any two such Abelian group objects $p_1{\colon}R_1 {\rightarrow}X$ and $p_2{\colon}R_2 {\rightarrow}X$, together with a rack homomorphism $f_1{\colon}R_1 {\rightarrow}R_2$ over $X$, we may construct two $X$–modules ${\mathcal{R}}_1$ and ${\mathcal{R}}_2$ as described above, and an $X$–map $g_1{\colon}{\mathcal{R}}_1{\rightarrow}{\mathcal{R}}_2$ by setting $(g_1)_x(u) = f_1(u)$ for all $u \in (R_1)_x$ and $x \in X$. It may be seen that $(g_1)_x:(R_1)_x {\rightarrow}(R_2)_x$ since $f_1$ is a rack homomorphism over $X$. It may also be seen that $g_1$ is a natural transformation of trunk maps ${\mathsf{T}}(X) {\rightarrow}{\mathsf{Ab}}$ since $$\begin{aligned} (g_1)_{x^y}((\rho_1)_{x,y}(u)) &= f_1((\rho_1)_{x,y}(u)) \\ &= f_1(u^{\sigma_1(y)}) \\ &= f_1(u)^{f_1\sigma_1(y)} \\ &= f_1(u)^{\sigma_2(y)} \\ &= (\rho_2)_{x,y}(g_1)_x(u) \\ \mbox{and}\qquad(g_1)_{x^y}(\lambda_1)_{y,x}(v) &= f_1((\lambda_1)_{y,x}(v)) \\ &= f_1(\sigma_1(x)^v) \\ &= f_1\sigma_1(x)^{f_1(v)} \\ &= \sigma_2(x)^{f_1(v)} \\ &= (\lambda_2)_{y,x}(g_1)_x(v)\end{aligned}$$ for all $u \in R_x, v \in R_y$, and $x,y \in X$. Given a third Abelian group object $p_3{\colon}R_3 {\rightarrow}X$ together with another slice morphism $f_2{\colon}R_2 {\rightarrow}R_3$, we may construct another $X$–module ${\mathcal{R}}_3$ and $X$–map $g_2{\colon}{\mathcal{R}}_2 {\rightarrow}{\mathcal{R}}_3$. From the composition $f_2f_1$ we may similarly construct a unique $X$–map $g{\colon}{\mathcal{R}}_1{\rightarrow}{\mathcal{R}}_3$. Then $$g_x(u) = (f_2f_1)(u) = (g_2)_x(f_1(u)) = (g_2)_x(g_1)_x(u).$$ Hence this construction determines a functor $S{\colon}{\mathsf{Ab}}({\mathsf{Rack}}/X){\rightarrow}{\mathsf{RMod}}_X$, which is the inverse of the functor $T{\colon}{\mathsf{RMod}}_X{\rightarrow}{\mathsf{Ab}}({\mathsf{Rack}}/X)$ described earlier. \[cor:rmod-abelian\] \[thm:rmod-abelian\] The category ${\mathsf{RMod}}_X$ is Abelian. The category ${\mathsf{RMod}}_X$ is additive, as for any $X$–modules ${\mathcal{A}}$ and ${\mathcal{B}}$, the set ${\operatorname{Hom}}_{{\mathsf{RMod}}_X}({\mathcal{A}},{\mathcal{B}})$ has an Abelian group structure given by $(f+g)_x(a) = f_x(a) + g_x(a)$ for all $f,g{\colon}{\mathcal{A}}{\rightarrow}{\mathcal{B}}$, all $x \in X$ and all $a \in A_x$. Furthermore, composition of $X$–maps distributes over this addition operation. The $X$–module with trivial orbit groups and structure homomorphisms is the zero object in ${\mathsf{RMod}}_X$, and for any two $X$–modules ${\mathcal{A}} = (A,\alpha,{\varepsilon})$ and ${\mathcal{B}} = (B,\beta,\zeta)$, the Cartesian product ${\mathcal{A}}\times{\mathcal{B}} = (A \times B, \alpha\times\beta, {\varepsilon}\times\zeta)$ is also an $X$–module. Given an $X$–map $f{\colon}{\mathcal{B}} = (B,\beta,\zeta) {\rightarrow}{\mathcal{C}} = (C,\gamma,\eta)$ let ${\mathcal{A}} = (A,\alpha,{\varepsilon})$ such that $A_x = \{a \in B_x : f_x(a) = 0\}$, with $\alpha_{x,y} = \beta_{x,y}|_{A_x}$ and ${\varepsilon}_{y,x} = \zeta_{y,x}|_{A_y}$. Then ${\mathcal{A}}$ is a submodule of ${\mathcal{B}}$ and the inclusion $\iota{\colon}{\mathcal{A}}\hookrightarrow{\mathcal{B}}$ is the (categorical) kernel of $f$. Now define ${\mathcal{D}} = (D,\delta,\xi)$ where $D_x = C_x/{\operatorname{im}}f_x$, and $\delta_{x,y} =\gamma_{x,y}+{\operatorname{im}}f_x$ and $\xi_{y,x} = \eta_{y,x} + {\operatorname{im}}f_y$. Then ${\mathcal{D}}$ is a quotient of ${\mathcal{C}}$ and the canonical projection map $\pi{\colon}{\mathcal{C}}{\rightarrow}{\mathcal{D}}$ is the (categorical) cokernel of $f$. Let $\mu{\colon}{\mathcal{H}}{\rightarrow}{\mathcal{K}}$ be an $X$–monomorphism. Then the inclusion $\iota{\colon}{\operatorname{im}}\mu{\rightarrow}{\mathcal{K}}$ is a kernel of the quotient map $\pi{\colon}{\mathcal{K}}{\rightarrow}{\mathcal{K}}/{\operatorname{im}}\mu$. Since $\mu$ is injective, $\mu'{\colon}{\mathcal{H}}{\cong}{\operatorname{im}}\mu$ where $\mu'_x(a) = \mu_x(a)$ for all $x \in X$ and $a \in H_x$. But since kernels are unique up to composition with an isomorphism, and since $\mu = \iota\mu'$, it follows that $\mu$ is the kernel of its cokernel, the canonical quotient map $\pi$. Let $\nu{\colon}{\mathcal{H}}{\rightarrow}{\mathcal{K}}$ be an $X$–epimorphism. Then the inclusion map $\iota{\colon}\ker\nu\hookrightarrow{\mathcal{H}}$ is a kernel of $\nu$. Given another $X$–map $\kappa{\colon}{\mathcal{H}}{\rightarrow}{\mathcal{L}}$ such that $\kappa\iota = 0$, then $\ker\nu\subseteq\ker\kappa$ so that $\nu(a) = \nu(b)$ implies that $\kappa(a)=\kappa(b)$. But since $\nu$ is surjective we can define an $X$–map $\theta{\colon}{\mathcal{K}}{\rightarrow}{\mathcal{L}}$ by $\theta_x\nu_x(a) = \kappa_x(a)$ for all $a \in H_x$ and $x \in X$. Then $\theta\nu = \kappa$ and so $\nu$ is a cokernel of $\iota$. So, every $X$–map has a kernel and a cokernel, every monic $X$–map is the kernel of its cokernel, and every epic $X$–map is the cokernel of its kernel, and hence ${\mathsf{RMod}}_X$ is an Abelian category. These results justify the use of the term ‘rack module’ to describe the objects under consideration, and show that ${\mathsf{RMod}}_X$ is an appropriate category in which to develop homology theories for racks. Papers currently in preparation will investigate new homology theories for racks, based on the derived functor approach of Cartan and Eilenberg [@cartan/eilenberg:homalg] and the cotriple construction of Barr and Beck [@barr/beck:standard-constructions]. We now introduce a notational convenience which may serve to simplify matters in future. Let $X$ be a rack, ${\mathcal{A}} = (A,\phi,\psi)$ an $X$–module, and $w = y_1 y_2 \ldots y_n$ a word in ${\operatorname{As}}X$. Then we may denote the composition $$\phi_{x^{y_1 \ldots y_{n-1}},y_n} \phi_{x^{y_1 \ldots y_{n-2}},y_{n-1}} \ldots \phi_{x,y_1}$$ by $\phi_{x,w} = \phi_{x,y_1 \ldots y_n}$. This shorthand is well-defined as the following lemma shows: \[lem:asword\] \[thm:asword\] If $y_1 \ldots y_n$ and $z_1 \ldots z_m$ are two different representative words for the same element $w \in {\operatorname{As}}X$, then the compositions $$\begin{aligned} &\phi_{x^{y_1 \ldots y_{n-1}},y_n} \phi_{x^{y_1 \ldots y_{n-2}},y_{n-1}} \ldots \phi_{x,y_1} \\ \mbox{and}\qquad &\phi_{x^{z_1 \ldots z_{m-1}},z_m} \phi_{x^{z_1 \ldots z_{m-2}},z_{m-1}} \ldots \phi_{x,z_1}\end{aligned}$$ are equal, for all $x \in X$. Furthermore, $\phi_{x,1} = {\operatorname{Id}}_{A_x}$, where $1$ denotes the identity in ${\operatorname{As}}X$. Let $T{\colon}{\mathsf{RMod}}_X{\rightarrow}{\mathsf{Ab}}({\mathsf{Rack}}/X)$ be the functor constructed in the proof of Theorem \[thm:rmod-beck\], and recall that $R_x = T({\mathcal{A}})_x$ has an Abelian group structure. For any $x,y \in X$, the homomorphism $T(\phi_{x,y}){\colon}R_x {\rightarrow}R_{x^y}$ maps $u \mapsto u^{\sigma(y)}$, where $\sigma$ is the section of $T{\mathcal{A}}$. Then for any $u \in R_x$ $$\begin{aligned} T(\phi_{x^{y_1 \ldots y_{n-1}},y_n} \phi_{x^{y_1 \ldots y_{n-2}},y_{n-1}} \ldots &\phi_{x,y_1})(u) \\ &= u^{\sigma(y_1)\ldots\sigma(y_n)} \\ &= u^{\sigma(y_1 \ldots y_n)} \\ &= u^{\sigma(z_1 \ldots z_m)} \\ &= u^{\sigma(z_1)\ldots\sigma(z_m)} \\ &= T(\phi_{x^{z_1 \ldots z_{m-1}},z_m} \phi_{x^{z_1 \ldots z_{m-2}},z_{m-1}} \ldots \phi_{x,z_1})(u)\end{aligned}$$ where the equality in the second and third lines follows from the functoriality of the associated group. The final statement follows from the observation $$T(\phi_{x,1})(u) = u^1 = u = T({\operatorname{Id}}_{A_x})(u).$$ Hence this notation is well-defined. Quandle modules --------------- We now study the specialisation of rack modules to the subcategory ${\mathsf{Quandle}}$. A [*quandle module*]{} is a rack module ${\mathcal{A}} = (A,\phi,\psi)$ which satisfies the additional criterion $$\label{eqn:qmod} \psi_{x,x}(a) + \phi_{x,x}(a) = a$$ for all $a \in A_x$ and $x \in X$. Where the context is clear, we may refer to such objects as [*$X$–modules*]{}. There is an obvious notion of a [*homomorphism*]{} (or, in the absence of ambiguity, an [*$X$–map*]{}) of quandle modules, and thus we may form the category ${\mathsf{QMod}}_X$ of quandle modules over $X$. Similarly to example \[exm:andr/grana\], Andruskiewitsch and Graña’s definition of quandle modules coincides with the definition of a homogeneous quandle module in the sense of the current discussion. Examples \[exm:abgroup\], \[exm:alexander\], and \[exm:dihedral\] of the previous subsection, are also quandle modules. Example \[exm:asx\] is not, but the variant obtained by setting $\psi_{y,x} = {\operatorname{Id}}_{A} - \phi_{x,y}$, for all $x,y \in X$, is. \[exm:andr/grana-qmod\] [For an arbitrary quandle $X$, Andruskiewitsch and Graña [@andr/grana:pointed-hopf] further define a [*quandle $X$–module*]{} to be a rack module (as in example \[exm:andr/grana\]) which satisfies the additional condition $$\eta_{x,x} + \tau_{x,x} = {\operatorname{Id}}_A$$ for all $x \in X$. This may be seen to be a homogeneous quandle $X$–module in the context of the current discussion.]{} Given a quandle $X$ and a quandle $X$–module ${\mathcal{A}}$, the semidirect product ${\mathcal{A}} \rtimes X$ has the same definition as before. \[thm:semidirect-quandle\] \[prp:semidirect-quandle\] If $X$ is a quandle and ${\mathcal{A}} = (A,\phi,\psi)$ a quandle module over $X$, the semidirect product ${\mathcal{A}} \rtimes X$ is a quandle. By proposition \[prp:semidirect-rack\], ${\mathcal{A}} \rtimes X$ is a rack, so we need only verify the quandle axiom. For any element $(a,x) \in {\mathcal{A}} \rtimes X$, $$(a,x)^{(a,x)} = (\phi_{x,x}(a) + \psi_{x,x}(a),x^x) = (a,x)$$ and so ${\mathcal{A}} \rtimes X$ is a quandle. These objects coincide with the Beck modules in the category ${\mathsf{Quandle}}$. \[thm:qmod-beck\] For any quandle $X$, there is an equivalence of categories $${\mathsf{QMod}}_X {\cong}{\mathsf{Ab}}({\mathsf{Quandle}}/X)$$ As in the proof of Theorem \[thm:rmod-beck\], we identify the quandle module ${\mathcal{A}} = (A,\phi,\psi)$ with ${\mathcal{A}} \rtimes X {\rightarrow}X$ in the slice category ${\mathsf{Quandle}}/X$. Proposition \[prp:semidirect-quandle\] ensures that this object is indeed a quandle over $X$, and hence we obtain a well-defined functor $T{\colon}{\mathsf{QMod}}_X{\rightarrow}{\mathsf{Ab}}({\mathsf{Quandle}}/X)$. Conversely, suppose that $R{\rightarrow}X$ is an Abelian group object in ${\mathsf{Quandle}}/X$, with multiplication map $\mu$, inverse map $\nu$, and section $\sigma$. As before, we may construct a rack module ${\mathcal{R}} = (R,\rho,\lambda)$ over $X$. It remains only to show that this module satisfies the additional criterion (\[eqn:qmod\]) for it to be a quandle module over $X$. But $$\begin{aligned} \lambda_{x,x}(a) + \rho_{x,x}(a) &= \mu(\sigma(x)^a,a^{\sigma(x)}) \\ &= \mu(\sigma(x),a)^{\mu(a,\sigma(x))} \\ &= \mu(\sigma(x),a)^{\mu(\sigma(x),a)} \\ &= \mu(\sigma(x)^{\sigma(x)},a^a) = a\end{aligned}$$ and so ${\mathcal{R}}$ is indeed a quandle $X$–module. The category ${\mathsf{QMod}}_X$ is Abelian. This proof is exactly the same as the proof of Theorem \[cor:rmod-abelian\]. Analogously to the previous subsection, we may conclude that our use of the term ‘quandle module’ is justified, and that the category ${\mathsf{QMod}}_X$ is a suitable environment in which to study the homology and cohomology of quandles. Abelian extensions ================== Having characterised suitable module categories, we may now study extensions of racks and quandles by these objects. Rack extensions have been studied before, in particular by Ryder [@ryder:thesis] under the name ‘expansions’; the constructs which she dubs ‘extensions’ are in some sense racks formed by disjoint unions, whereby the original rack becomes a subrack of the ‘extended’ rack. Ryder’s notion of rack expansions is somewhat more general than the extensions studied here, as she investigates arbitrary congruences (equivalently, rack epimorphisms onto a quotient rack) whereas we will only examine certain classes of such objects. Abelian extensions of racks --------------------------- An [*extension*]{} of a rack $X$ by an $X$–module ${\mathcal{A}} = (A,\phi,\psi)$ consists of a rack $E$ together with an epimorphism $f{\colon}E {\twoheadrightarrow}X$ inducing a partition $E = \bigcup_{x \in X} E_x$ (where $E_x$ is the preimage $f^{-1}(x)$), and for each $x \in X$ a left $A_x$–action on $E_x$ satisfying the following three conditions: 1. The $A_x$–action on $E_x$ is simply transitive, which is to say that for any $u,v \in E_x$ there is a unique $a \in A_x$ such that $a \cdot u = v$. 2. For any $u \in E_x$, $a \in A_x$, and $v \in E_y$, $(a \cdot u)^v = \phi_{x,y}(a) \cdot (u^v)$. 3. For any $u \in E_y$, $b \in A_y$, and $v \in E_y$, $u^{(b \cdot v)} = \psi_{y,x}(b) \cdot (u^v)$. Two extensions $f_1{\colon}E_1 {\twoheadrightarrow}X$ and $f_2{\colon}E_2 {\twoheadrightarrow}X$ by the same $X$–module ${\mathcal{A}}$ are [*equivalent*]{} if there exists a rack isomorphism (an [*equivalence*]{}) $\theta{\colon}E_1 {\rightarrow}E_2$ which respects the projection maps and the group actions: 1. $f_2\theta(u) = f_1(u)$ for all $u \in E_1$ 2. $\theta(a \cdot u) = \theta(a) \cdot u$ for all $u \in E_x$, $a \in A_x$ and $x \in X$. Let $f{\colon}E {\twoheadrightarrow}X$ be an extension of $X$ by ${\mathcal{A}}$. Then a [*section*]{} of $E$ is a function (not necessarily a rack homomorphism) $s{\colon}X {\rightarrow}E$ such that $fs = {\operatorname{Id}}_X$. Since the $A_x$ act simply transitively on the $E_x$, there is a unique $x \in X$ and a unique $a \in A_x$ such that a given element $u \in E_x$ can be written as $u = a \cdot s(x)$. Since $f$ is a homomorphism, it follows that $s(x)^{s(y)} \in E_{x^y}$ and so there is a unique $\sigma_{x,y} \in A_{x^y}$ such that $s(x)^{s(y)} = \sigma_{x,y} \cdot s(x^y) $. The set $\sigma = \{ \sigma_{x,y} : x,y \in X \}$ is the [*factor set*]{} of the extension $E$ [*relative to*]{} the section $s$, and may be regarded as an obstruction to $s$ being a rack homomorphism. It follows that, for all $x,y \in X$, $a \in A_x$, and $b \in A_y$ $$\begin{aligned} (a \cdot s(x))^{(b \cdot s(y))} &= \phi_{x,y}(a) \cdot s(x)^{(b \cdot s(y))} \\ &= (\psi_{y,x}(b) + \phi_{x,y}(a)) \cdot s(x)^{s(y)} \\ &= (\psi_{y,x}(b) + \phi_{x,y}(a) + \sigma_{x,y}) \cdot s(x^y) \end{aligned}$$ Thus the rack structure on $E$ is determined completely by the factor set $\sigma$. The next result gives necessary and sufficient conditions on factor sets of arbitrary rack extensions. \[thm:rack-ext1\] \[prp:rack-ext1\] Let $X$ be a rack, and ${\mathcal{A}} = (A,\phi,\psi)$ be an $X$–module. Let $\sigma = \{ \sigma_{x,y} \in A_{x^y} : x,y \in X \}$ be a collection of group elements. Let $E[{\mathcal{A}},\sigma]$ be the set $\{ (a,x) : a \in A_x, x \in X \}$ with rack operation $$(a,x)^{(b,y)} = (\phi_{x,y}(a) + \sigma_{x,y} + \psi_{y,x}(b), x^y)$$ for all $a \in A_x$, $b \in A_y$, and $x,y \in X$. Then $E[{\mathcal{A}},\sigma]$ is an extension of $X$ by ${\mathcal{A}}$ with factor set $\sigma$ if $$\label{eqn:rack-ext1} \sigma_{x^y,z} + \phi_{x^y,z}(\sigma_{x,y}) = \phi_{x^z,y^z}(\sigma_{x,z}) + \sigma_{x^z,y^z} + \psi_{y^z,x^z}(\sigma_{y,z})$$ for all $x,y,z \in X$. Conversely, if $E$ is an extension of $X$ by ${\mathcal{A}}$ with factor set $\sigma$ then (\[eqn:rack-ext1\]) holds, and $E$ is equivalent to $E[{\mathcal{A}},\sigma]$. To prove the first part, we require that $E[{\mathcal{A}},\sigma]$ satisfy the rack axioms. Given $(a,x), (b,y) \in E[{\mathcal{A}},\sigma]$, there is a unique $(c,z) \in E[{\mathcal{A}},\sigma]$ such that $(c,z)^{(b,y)} = (a,x)$, given by $$(c,z) = (\phi_{x,y}^{-1}(a - \sigma_{x,y} - \psi_{y,x}(b)),x^{\overline{y}})$$ Also, for any $(a,x), (b,y), (c,z) \in E[{\mathcal{A}},\sigma]$, $$\begin{aligned} (a,x)^{(b,y)(c,z)} &= (\phi_{x,y}(a) + \sigma_{x,y} + \psi_{y,x}(b),x^y)^{(c,z)} \\ &= (\phi_{x^y,z}\phi_{x,y}(a) + \phi_{x^y,z}(\sigma_{x,y}) + \phi_{x^y,z}\psi_{y,x}(b) + \sigma_{x^y,z} + \psi_{z,x^y}(c), x^{yz})\end{aligned}$$ and $$\begin{aligned} (a,x)^{(c,z)(b,y)^{(c,z)}} &= (\phi_{x,z}(a) + \sigma_{x,z} + \psi_{z,x}(c),x^z)^{(\phi_{y,z}(b) + \sigma_{y,z} + \psi_{z,y}(c),y^z)} \\ &= (\phi_{x^z,y^z}\phi_{x,z}(a) + \phi_{x^z,y^z}(\sigma_{x,z}) + \phi_{x^z,y^z}\psi_{z,x}(c) + \sigma_{x^z,y^z} \\ &\qquad+ \psi_{y^z,x^z}\phi_{y,z}(b) + \psi_{y^z,x^z}(\sigma_{y,z}) + \psi_{y^z,x^z}\psi_{z,y}(c), x^{zy^z})\end{aligned}$$ are equal if (\[eqn:rack-ext1\]) holds, and so $E[{\mathcal{A}},\sigma]$ is a rack. Now define $f{\colon}E[{\mathcal{A}},\sigma] {\twoheadrightarrow}X$ to be projection onto the second coordinate, and let $A_x$ act on $E[{\mathcal{A}},\sigma]_x = f^{-1}(x)$ by $a_1 \cdot (a_2,x) := (a_1 + a_2,x)$ for each $a_1,a_2 \in A_x$ and all $x \in X$. These actions are simply transitive and satisfy the requirements $$\begin{aligned} (a_1 \cdot (a_2,x))^{(b,y)} = (a_1+a_2, x)^{(b,y)} &= (\phi_{x,y}(a_1+a_2) + \sigma_{x,y} + \psi_{y,x}(b),x^y) \\ &= (\phi_{x,y}(a_1) + \phi_{x,y}(a_2) + \sigma_{x,y} + \psi_{y,x}(b),x^y) \\ &= \phi_{x,y}(a_1) \cdot (\phi_{x,y}(a_2) + \sigma_{x,y} + \psi_{y,x}(b),x^y) \\ &= \phi_{x,y}(a_1) \cdot (a_2,x)^{(b,y)}\\ \mbox{and}\qquad(a,x)^{b_1 \cdot (b_2,y)} &= (a,x)^{(b_1+b_2,y)} \\ &= (\phi_{x,y}(a) + \sigma_{x,y} + \psi_{y,x}(b_1+b_2),x^y) \\ &= (\phi_{x,y}(a) + \sigma_{x,y} + \psi_{y,x}(b_1) + \psi_{y,x}(b_2),x^y) \\ &= \psi_{y,x}(b_1) \cdot (\phi_{x,y}(a) + \sigma_{x,y} + \psi_{y,x}(b_2),x^y) \\ &= \psi_{y,x}(b_1) \cdot (a,x)^{(b_2,y)}\end{aligned}$$ so $E[{\mathcal{A}},\sigma]$ is an extension of $X$ by ${\mathcal{A}}$. Now define $s{\colon}X {\twoheadrightarrow}E[{\mathcal{A}},\sigma]$ by $s(x) = (0,x)$ for all $x \in X$. This is clearly a section of this extension. Also, $$s(x)^{s(y)} = (0,x)^{(0,y)} = (\sigma_{x,y},x^y) = \sigma_{x,y} \cdot s(x^y)$$ so $\sigma$ is the factor set of this extension relative to the section $s$. Conversely, let $f{\colon}E {\twoheadrightarrow}X$ be an extension of $X$ by a given $X$–module ${\mathcal{A}}$, with factor set $\sigma$ relative to some extension $s{\colon}X {\rightarrow}E$. By the simple transitivity of the $A_x$–action on the $E_x = f^{-1}(x)$, the map $\theta{\colon}(a,x) \mapsto a \cdot s(x)$ is an isomorphism $E[{\mathcal{A}},\sigma] {\cong}E$. Since $E$ is a rack, the earlier part of the proof shows that (\[eqn:rack-ext1\]) holds, and so $E[{\mathcal{A}},\sigma]$ is another extension of $X$ by ${\mathcal{A}}$. Furthermore, $\theta$ respects the projection maps onto $X$, and $$\theta(a_1 \cdot (a_2,x)) = \theta(a_1+a_2,x) = (a_1+a_2) \cdot s(x) = a_1 \cdot (a_2 \cdot s(x)) = a_1 \cdot \theta(a_2,x)$$ so $\theta$ is an equivalence of extensions. Andruskiewitsch and Graña [@andr/grana:pointed-hopf] introduce the notion of an extension by a [*dynamical cocycle*]{}. Given an arbitrary rack $X$ and a non-empty set $S$, we select a function $\alpha{\colon}X \times X {\rightarrow}{\operatorname{Hom}}_{\mathsf{Set}}(S \times S,S)$ (which determines, for each ordered pair $x,y \in X$, a function $\alpha_{x,y}{\colon}S \times S {\rightarrow}S$) satisfying the criteria 1. $\alpha_{x,y}(s,-)$ is a bijection on $S$ 2. $\alpha_{x^y,z}(s,\alpha_{x,y}(t,u)) = \alpha_{x^z,y^z}(\alpha_{x,z}(s,t),\alpha_{x,y}(s,u))$ for all $x,y,z \in X$ and $s,t,u \in S$. Then we may define a rack structure on the set $X \times S$ by defining $(x,s)^{(y,t)} = (x^y,\alpha_{x,y}(s,t))$. This rack, denoted $X \times_\alpha S$, is the extension of $X$ by $\alpha$. In the case where $S$ is an Abelian group, and $\alpha_{x,y}(s,t) = \phi_{x,y}(s) + \sigma_{x,y} + \psi_{y,s}(t)$ for some suitably-chosen Abelian group homomorphisms $\phi_{x,y},\psi_{y,x}{\colon}S {\rightarrow}S$, and family $\sigma = \{ \sigma_{x,y} \in S : x,y \in X \}$ of elements of $S$, then this is equivalent to the construction $E[{\mathcal{A}},\sigma]$ just discussed, for a homogeneous $X$–module ${\mathcal{A}} = (A,\phi,\psi)$. \[thm:rack-ext2\] \[prp:rack-ext2\] Let $\sigma$ and $\tau$ be factor sets corresponding to extensions of a rack $X$ by an $X$–module ${\mathcal{A}}$. Then the following are equivalent: 1. $E[{\mathcal{A}},\sigma]$ and $E[{\mathcal{A}},\tau]$ are equivalent extensions of $X$ by ${\mathcal{A}}$ 2. there exists a family $\upsilon = \{ \upsilon_x \in A_x : x \in X \}$ such that $$\label{eqn:rack-ext2} \tau_{x,y} = \sigma_{x,y} + \phi_{x,y}(\upsilon_x) + \psi_{y,x}(\upsilon_y) - \upsilon_{x^y}$$ for $x,y \in X$. 3. $\sigma$ and $\tau$ are factor sets of the same extension of $X$ by ${\mathcal{A}}$, relative to different sections. Let $\theta{\colon}E[{\mathcal{A}},\tau] {\cong}E[{\mathcal{A}},\sigma]$ be the hypothesised equivalence. Then it follows that $\theta(0,x) = (\upsilon_x,x)$ for some $\upsilon_x \in A_x$ and, furthermore, $$\theta(a,x) = \theta(a \cdot (0,x)) = a \cdot \theta(0,x) = a \cdot (\upsilon_x,x) = (a + \upsilon_x,x)$$ for all $a \in A_x$, since $\theta$ preserves the $A_x$–actions. Then $$\begin{aligned} &\theta\bigl((a,x)^{(b,y)}\bigr) = (\phi_{x,y}(a) + \psi_{y,x}(b) + \tau_{x,y} + \upsilon_{x^y}, x^y) \\ \mbox{and}\qquad&\theta(a,x)^{\theta(b,y)} = (a + \upsilon_x,x)^{(b+\upsilon_y,y)} = (\phi_{x,y}(a+\upsilon_x) + \psi_{y,x}(b+\upsilon_y) + \sigma_{x,y},x^y)\end{aligned}$$ which are equal since $\theta$ is a rack homomorphism, and so (\[eqn:rack-ext2\]) holds. This argument is reversible, showing the equivalence of the first two statements. Now, given such an equivalence $\theta$, define a section $s{\colon}X {\rightarrow}E[{\mathcal{A}},\tau]$ by $x \mapsto (\upsilon_x,x)$. Then the above argument also shows that $$\begin{aligned} &s(x)^{b \cdot s(y)} = (\upsilon_x,x)^{(\upsilon_y+b,y)} = (\sigma_{x,y} + \psi_{y,x}(b)) \cdot s(x^y) \\ \mbox{and}\qquad &(a \cdot s(x))^{s(y)} = (\upsilon_x+a,x)^{(\upsilon_y,y)} = (\sigma_{x,y} + \phi_{x,y}(a)) \cdot s(x^y)\end{aligned}$$ so $\sigma$ is the factor set of $E[{\mathcal{A}},\tau]$ relative to the section $s$. This property holds for any extension equivalent to $E[{\mathcal{A}},\tau]$. Conversely, if $\sigma$ and $\tau$ are factor sets of some extension $E$ of $X$ by ${\mathcal{A}}$ relative to different sections $s,t{\colon}X {\rightarrow}E$ then $s(x) = \upsilon_x \cdot t(x)$ for some $\upsilon_x \in A_x$, and so the first and third conditions are equivalent. The following corollary justifies the earlier assertion that the factor set is in some sense the obstruction to a section being a rack homomorphism. \[thm:rack-ext3\] \[cor:rack-ext3\] For an extension $f{\colon}E {\twoheadrightarrow}X$ by an $X$–module ${\mathcal{A}} = (A,\phi,\psi)$, the following statements are equivalent: 1. There exists a rack homomorphism $s{\colon}X {\rightarrow}E$ such that $fs = {\operatorname{Id}}_X$ 2. Relative to some section, the factor set of $E {\twoheadrightarrow}X$ is trivial 3. Relative to any section there exists, for the factor set $\sigma$ of $E {\twoheadrightarrow}X$, a family $\upsilon = \{\upsilon_x \in A_x : x \in X \}$ such that for all $x,y \in X$ $$\label{eqn:rack-ext3} \sigma_{x,y} = \phi_{x,y}(\upsilon_x) - \upsilon_{x^y} + \psi_{y,x}(\upsilon_y)$$ Extensions of this type are said to be [*split*]{}. We are now able to classify rack extensions: \[thm:rack-ext4\] Let $X$ be a rack and ${\mathcal{A}} = (A,\phi,\psi)$ an $X$–module. Then there is an Abelian group ${\operatorname{Ext}}(X,{\mathcal{A}})$ whose elements are in bijective correspondence with extensions of $X$ by ${\mathcal{A}}$. Let the set $Z(X,{\mathcal{A}})$ consist of extensions of $X$ by ${\mathcal{A}}$. As shown above, these are determined by factor sets $\sigma$ satisfying (\[eqn:rack-ext1\]). Defining an addition operation by $(\sigma+\tau)_{x,y} := \sigma_{x,y} + \tau_{x,y}$ gives this an Abelian group structure with the trivial factor set as identity. A routine calculation confirms that the set $B(X,{\mathcal{A}})$ of split extensions (equivalently, factor sets satisfying (\[eqn:rack-ext3\])) forms an Abelian subgroup of $Z(X,{\mathcal{A}})$, and so we may define ${\operatorname{Ext}}(X,{\mathcal{A}}) := Z(X,{\mathcal{A}})/B(X,{\mathcal{A}})$. In the case where ${\mathcal{A}}$ is a trivial homogeneous $X$–module (equivalently, an Abelian group $A$) the group ${\operatorname{Ext}}(X,{\mathcal{A}})$ coincides with $H^2(BX;A)$, the second cohomology group of the rack space of $X$ as defined by Fenn, Rourke and Sanderson [@fenn/rourke/sanderson:trunks]. Abelian extensions of quandles ------------------------------ We now turn our attention to the case where $X$ is a quandle. Extensions of $X$ by a quandle $X$–module ${\mathcal{A}}$ and their corresponding factor sets are defined in an analogous manner. \[thm:quandle-ext1\] \[prp:quandle-ext1\] Let $X$ be a quandle and ${\mathcal{A}} = (A,\phi,\psi)$ be a quandle module over $X$. Then extensions $f{\colon}E {\twoheadrightarrow}X$ such that $E$ is also a quandle are in bijective correspondence with factor sets $\sigma$ satisfying hypothesis (\[eqn:rack-ext1\]) of proposition \[thm:rack-ext1\] together with the additional criterion $$\label{eqn:quandle-ext1} \sigma_{x,x} = 0$$ for all $x \in X$. Following the reasoning of proposition \[thm:rack-ext1\], for $E$ to be a quandle is equivalent to the requirement that $$(a,x)^{(a,x)} = (\phi_{x,x}(a) + \sigma_{x,x} + \psi_{x,x}(a),x^x) = (a,x)$$ for all $x \in X$ and $a \in A_x$. Since ${\mathcal{A}}$ is a quandle module, this is equivalent to the requirement that (\[eqn:quandle-ext1\]) holds. We may now classify quandle extensions of $X$ by ${\mathcal{A}}$: \[thm:quandle-ext2\] For any quandle $X$ and quandle $X$–module ${\mathcal{A}}$, there is an Abelian group ${\operatorname{Ext}}_Q(X,{\mathcal{A}})$ whose elements are in bijective correspondence with quandle extensions of $X$ by ${\mathcal{A}}$. We proceed similarly to the proof of Theorem \[thm:rack-ext4\]. Let $Z_Q(X,{\mathcal{A}})$ be the subgroup of $Z(X,{\mathcal{A}})$ consisting of factor sets satisfying the criterion (\[eqn:quandle-ext1\]), and let $B_Q(X,{\mathcal{A}}) = B(X,{\mathcal{A}})$. Then we define ${\operatorname{Ext}}_Q(X,{\mathcal{A}}) = Z_Q(X,{\mathcal{A}})/B_Q(X,{\mathcal{A}})$. In the case where ${\mathcal{A}}$ is trivial homogeneous (and hence equivalent to an Abelian group $A$), extensions of $X$ by ${\mathcal{A}}$ correspond to Abelian quandle extensions, in the sense of Carter, Saito and Kamada [@carter/kamada/saito:diag] and so ${\operatorname{Ext}}_Q(X,{\mathcal{A}}) = H^2_Q(X;A)$. If the module ${\mathcal{A}}$ is a homogeneous Alexander module as defined in example \[exm:alexander\], then extensions of $X$ by ${\mathcal{A}}$ are exactly the twisted quandle extensions described by Carter, Saito and Elhamdadi [@carter/elhamdadi/saito:twisted], and so ${\operatorname{Ext}}_Q(X,{\mathcal{A}}) = H^2_{TQ}(X;A)$. [99]{} , [Matías Graña]{}, *From racks to pointed Hopf algebras*, Advances in Mathematics **178** (2003) 177–243 , [Jonathan Beck]{}, *Homology and standard constructions*, from: “Seminar on Triples and Categorical Homology Theory”, volume 80 of Lecture Notes in Mathematics, Springer–Verlag (1969) 245–335 , *Triples, algebras and cohomology*, PhD thesis, Columbia University (1967). Republished as: Reprints in Theory and Applications of Categories **2** (2003) 1–59 , *Automorphic sets and singularities*, Contemporary Mathematics **78** (1988) 45–115 , [Samuel Eilenberg]{}, *Homological Algebra*, Princeton University Press (1999) , [Mohamed Elhamdadi]{}, [Masahico Saito]{}, *Twisted quandle homology theory and cocycle knot invariants*, Algebraic and Geometric Topology **2** (2002) 95–135 , [Seiichi Kamada]{}, [Masahico Saito]{}, *Diagrammatic computations for quandles and cocycle knot invariants*, from: “Diagrammatic morphisms and applications (San Francisco, CA, 2000)”, Contemporary Mathematics **318** (2003) 51–74 , [Gavin Wraith]{}, unpublished correspondence (1959) , [Matías Graña]{}, *On rack cohomology*, Journal of Pure and Applied Algebra **177** (2003) 49–59 , [Colin Rourke]{}, *Racks and links in codimension 2*, Journal of Knot Theory and its Ramifications **1** (1992) 343–406 , [Colin Rourke]{}, [Brian Sanderson]{}, *Trunks and classifying spaces*, Applied Categorical Structures **3** (1995) 321–356 , *Homological algebra of racks and quandles*, PhD thesis, Mathematics Institute, University of Warwick (2004) , *A classifying invariant of knots: the knot quandle*, Journal of Pure and Applied Algebra **23** (1982) 37–65 , *The structure of racks*, PhD thesis, Mathematics Institute, University of Warwick (1993)
{ "pile_set_name": "ArXiv" }
Category Archives: Business models Jisc is working in collaboration with publishers to make digital archival collections of primary source materials more affordable so researchers, teachers and learners can enjoy access to a wider range of resources and libraries can achieve further efficiencies. We are currently running phase two of the Digital Archival collections group purchasing pilot from November 2017 … Read more EBSCO has joined Adam Matthew Digital, Brill and ProQuest to offer over 70 digital archival collections to the higher education sector as part of the ‘Digital archival collections group purchasing pilot‘ phase two. As with the initial pilot, the project leverages institutions’ collective purchasing power to lower the cost of acquiring digital archival collections around … Read more Following on from the success of our initial pilot, Jisc has now launched phase two of ‘Digital archival collections group purchasing pilot.’ Phase two of the pilot begins on 20 November, 2017 and will run through to the end of the academic year, 31 July, 2018, offering institutions’ maximum opportunity to review the products on … Read more Between March and July 2017 Jisc ran the ‘Digital archival collections group purchasing pilot’ in collaboration with three publishers (Adam Matthew Digital, Brill and ProQuest) in order to make digital collections of primary source material more affordable for institutions to purchase, so that researchers, teachers and learners can enjoy access to an even wider range of resources. … Read more Jisc is working in collaboration with three publishers, ProQuest, Adam Matthew Digital and Brill, in order to make digital collections of primary source material more affordable for institutions to purchase, so that researchers, teachers and learners can enjoy access to an even wider range of resources. Digital collections of primary source material such as texts, … Read more At the event “Why pay for content?” organised by the Publishers Association, representatives from the publishing sector, JISC, and academics, put across opposing views on whether we should pay to access content on the internet or it should be freely and openly accessible to everybody. The content in question referred mainly to textbooks and research/reference … Read more Share and Enjoy Today Google announced that they are launching: “an initiative to make more old newspapers accessible and searchable online by partnering with newspaper publishers to digitize millions of pages of news archives.” This adds to the large amount of existing online newspaper content, by publications such as the New York Times and the Washington Post, that … Read more Share and Enjoy During a recent meeting on digitisation in the EU, the JISC Digitisation Programme came across this interesting digitisation model from the Rotterdam Central Record Library The library in Rotterdam owns 300,000 CDs (including mainstream stuff) They are digitising every CD CDs are then lent digitally, ie via Internet, to library users (for free) Users can … Read more Share and Enjoy Thanks to a public-private partnership between the Bodleian Library and ProQuest, thousands of images from one of the world’s most important collections of printed ephemera are being made freely available to all UK universities, further education institutions, schools and public libraries. The John Johnson Collection: An Archive of Printed Ephemera, part of the JISC Phase … Read more Share and Enjoy The JISC-funded 19th Century Newspapers digitisation project was highlighted in today’s Guardian as part of a growing number of online newspaper archives which constitute an invaluable resource for historians and researchers. Stephen Hoare commented: “The digitisation of the British Library’s 19th-century newspaper collection – the most comprehensive archive ever to go online – was launched … Read more Share and Enjoy Next week (6 December) will see the launch of the beta version of Electronic Ephemera: Digitised Selections from the John Johnson Collection at Online Information 2007, London. This new e-resource is part of the JISC Phase Two Digitisation Programme and features selections from the Bodleian Library’s John Johnson Collection, one of the most important collections … Read more Share and Enjoy More than 150 years of Guardian and Observer back copies have been made available online with the launch of the paper’s digital archive. The archive allows users to search for free the full text of the newspaper from 1821 to 1975 and the Observer from 1900 to 1975 (a second phase early next year will see … Read more Share and Enjoy Another National Archives/geneology.co.uk digitisation project makes the news today. The Guardian reports that the pension records of almost a million soldiers who served in the first world war have for the first time been made available on the internet, allowing descendants to access a wealth of information about anyone who was injured or discharged due … Read more
{ "pile_set_name": "Pile-CC" }
The gay dating app is moving from a 3,400-square-foot office in Hollywood to a 18,000-square-foot office in West Hollywood. It signed a long-term lease to move its headquarters into the 14th floor of developer Charles S. Cohen’s RedBuilding at Pacific Design Center at 8687 Melrose Avenue. Terms of the lease were not disclosed but asking rates at the RedBuilding place its value at roughly $1.1 million a year. The company will leave its office at 6725 West Sunset Boulevard behind in favor of the classier (and historically LGBT friendly) WeHo address. Ryan Harding of Newmark Knight Grubb Frank, who represented Grindr in the lease deal, said the move comes as Grindr plans to expand beyond its dating app functions to become more of a lifestyle brand. “It will always be a dating app but they are hoping to do more of what Playboy did…and expanding into other elements of pop culture that matter to the LGBT community,” Harding said. Grindr could not be reached for comment. The firm recently acquired the means to expand. Chinese firm Beijing Kunlun Tech bought a controlling stake in the startup for $93 million in a deal announced last week. “We are pleased to welcome Grindr to the RedBuilding where they join a prestigious roster of creative tenants,” Cohen said in a statement. “Our West Hollywood location puts Grindr at the center of the LA region’s thriving and creative epicenter.” The RedBuilding is becoming a media hub. Cohen recently signed Clique Media and Whalerock Industries, which makes Kim Kardashian’s app. Marc Horowitz of Cohen Brothers Realty represented Cohen in the lease deal, along will JLL’s team led by Josh Wrobel.
{ "pile_set_name": "Pile-CC" }
Students taking classes from the chemistry and biochemistry department may start paying less for course materials. Starting fall, the department will require instructors to provide students with no-cost alternatives to course materials and are required to state in their syllabuses whether they profit off the sale of any written course material. No-cost alternatives include online copies or hard copy library reserves of written course materials. Professors must explain how to access those alternatives in their syllabuses. Catherine Clarke, chair of the department of chemistry and biochemistry, said an email that Chancellor Gene Block forwarded her from a student’s mother first brought the problem of textbook prices to her attention. In the email, the mother said she was upset over the high cost of a course reader in an introductory chemistry class. “It came to my attention that this was a really inappropriately priced material and the mom felt very outraged that her son was required to buy this,” Clarke said. She said she met with the department about the issue of textbook costs and the faculty decided to create a committee to approve written materials that impose a cost on students. “All instructors that use course materials that impose a cost upon our students must submit these materials so that they can be reviewed and approved by the committee,” Clarke said. “(The committee) will only approve items that provide value in proportion to cost.” Clarke added because this policy is still new and fall quarter has not started yet, the department will do its best to ensure compliance. “We do have a pretty good idea of the kinds of written materials that instructors have used in the past,” Clarke said. “We’re particularly aware of which instructors have used these sorts of materials in the past and will follow up with them.” Clarke added she hopes every department will implement this policy. Divya Sharma, the Academic Affairs commissioner of the undergraduate student government, said he thinks it is problematic if professors try to profit off students since the university already pays them. He added he thinks providing downloadable copies of textbook materials is better than asking students to use library reserves. “I know having reserves in a library does become an issue if students are all trying to access (the same book) at a time,” Sharma said. “I hope (this is implemented) in conjunction instead of one or the other.” Sharma added his office is working to make sure other departments implement similar policies. For example, Sharma said humanities professors often make reading materials accessible online, even though their departments do not have official policies on controlling textbook prices. His office will lobby to make this policy explicitly official. Dawn Setzer, a UCLA Library spokesperson, said in a statement the library supports the policy and will work with instructors to align the UCLA Library’s collections with professors’ instructional needs. “We are fully supportive of the policy and provided the department with information we had gathered through our course materials initiative, our course reserves service, and ongoing partnership with the UCLA Store on course packs,” she said. Kahlo Baniadam, a third-year psychobiology student, said he thinks the policies will benefit students who are sometimes expected to pay hundreds of dollars in textbooks for chemistry-related classes. “Since the authors (of the textbooks) are definitely making money, the biggest thing for me is that there will be a free option,” Baniadam said. “(Having free alternatives) is the main thing that will solve all the problems, if the policy is enforceable.” Baniadam said in some classes, textbooks and course readers were strongly recommended and necessary for practice problems. He added students often had to buy the course readers brand-new because of frequent changes to the material, which he said he thinks caused financial burden to some. Baniadam added he thinks professors should post lecture notes online instead of requiring students to buy them as textbooks or course readers. Janet Song, a third-year biochemistry student, said she thinks the new policies increase transparency between students and faculty. “Textbooks are expensive,” Song said. “My financial situation wasn’t too bad, but I could see how it could be difficult for other people.”
{ "pile_set_name": "OpenWebText2" }
British legislators have rejected beleaguered Prime Minister Theresa May‘s Brexit deal, plunging the future of the UK’s bid to leave the European Union deeper into crisis and raising the possibility of a delayed departure. MPs in the lower chamber House of Commons on Tuesday voted 391 to 242 against May’s plan, fewer than 24 hours after she claimed to have won meaningful concessions from Brussels over the deal’s contentious so-called “backstop” clause. The result marked a second defeat within two months for the prime minister over her Brexit strategy after MPs overwhelmingly rejected the proposed withdrawal agreement by a margin of 230 in January. MPs are now set to vote on Wednesday on whether to leave the EU without a deal, as promised by May, 16 days before the UK is scheduled to depart the bloc on March 29. 181201182945771 If legislators opt against departing without an agreement on future relations, the government will hold another vote the following day on whether to request an extension to Article 50 – the exit clause in the EU’s constitution – from Brussels in a bid to buy more time as it seeks to strike a different divorce deal. Following the defeat on Tuesday, May said she was “passionate” about delivering Brexit. “But I equally passionately believe that the best way to do that is to leave in an orderly way with a deal,” she added. Leader of the main opposition Labour Party Jeremy Corbyn said the result meant May’s plan for leaving the EU was “dead” and called on the government to adopt his proposals for an alternative departure from the bloc. The EU has said no other terms of withdrawal are available to the UK other than the deal brokered with May during months of fractious back-and-forth negotiations, however. A spokesperson for European Council President Donald Tusk said MPs second rejection of the agreed withdrawal plan “significantly increased” the risk of a “no-deal” divorce. “Should there be a UK reasoned request for an extension, the EU27 will consider it and decide by unanimity,” the spokesperson added, citing the 27 members of the bloc minus the UK. The EU’s Brexit negotiator Michel Barnier, meanwhile, said the bloc had done “everything it can to help get the Withdrawal Agreement over the line”. “The impasse can only be solved in the UK. Our ‘no-deal’ preparations are now more important than ever before,” Barnier said in a tweet. Nearly 52 percent of Britons – more than 17 million people – voted in favour of quitting the 28-member EU during a June 2016 referendum. Turnout was 72 percent.
{ "pile_set_name": "OpenWebText2" }
Spontaneously occurring arrhythmogenic right ventricular cardiomyopathy in the domestic cat: A new animal model similar to the human disease. Arrhythmogenic right ventricular cardiomyopathy (ARVC) is a primary myocardial disease of incompletely resolved pathogenesis and is a largely unappreciated cause of sudden death in the young. Clinical features of 12 domestic cats with ARVC (7 male; 1 to 20 years old, mean 7.3+/-5.2 years) were right-sided congestive heart failure (n=8), supraventricular tachyarrhythmias (n=5), ventricular tachycardia (n=3), polymorphic ventricular arrhythmias (n=6), and right bundle-branch block (n=5). ARVC was suspected in all 8 cats examined with echocardiography by marked enlargement of the right ventricle (RV) and right atrium and tricuspid regurgitation. Eight died of cardiovascular disease and 4 died of noncardiac conditions. At autopsy, hearts of ARVC cats were characterized grossly by moderate-to-severe RV cavity enlargement and wall thinning (n=12) and apical aneurysm formation (n=6). Histology demonstrated pronounced RV lesions in all 12 ARVC cats, including marked myocardial injury (myocyte death and atrophy) and repair (fibrous and/or fatty replacement). Injury and repair were also evident in the left ventricle (LV) in 10 cats, and 2 had involvement of both atria. Myocarditis was present in 10 of the 12 ARVC cats. Apoptosis was detected in 9 ARVC cats (mean apoptotic index, 28+/-23% RV, 21+/-19% LV, and 17+/-15% ventricular septum) but not in controls. In the common domestic cat, we identified a clinically relevant cardiomyopathy that closely mimics ARVC in humans. This unique feline model of human disease will be relevant to defining pathogenesis and investigating mechanisms responsible for disease progression in ARVC.
{ "pile_set_name": "PubMed Abstracts" }
Q: Keep element always centered with side text to the left I need help to structure a page, i thought it was easy but it wasn't, at least not for me. Logo: always centered, of course. Element: For instance, an image, always centered. Image can be vertical or horizontal, but needs to be centered. Text: Next to the element/image. There are no boxes really, i saw other questions where they where trying to keep center box always centered, but in this case i just have one main box/container and then text/caption next to the image. What i cannot do is keeping image centered, because if i add text next to the image, will try to center the whole thing. Thanks! A: Horizontal and vertical centering is most easily solved with flexbox. Simply set the following on your container: display: flex; align-items: center; justify-content: center; flex-wrap: wrap; Note that you'll want a height too! I've gone with 100vh to occupy the full viewport. To centralise your element at the top just give it align-self: flex-start. From here it's just a matter of having a child which contains both the central item and offset item, both of which need position: absolute. The offset item will additionally want margin-left equal to the width of the centralised item, but it should only be applied inside of a media query. To drop the offset item below for mobile screens, you'll want a second media query which adds margin-top. This can be seen in the following (click Full page after Run code snippet to see the desktop view). body { margin: 0; } .container { display: flex; align-items: center; justify-content: center; flex-wrap: wrap; height: 100vh; } .top { border: 1px solid black; width: 50%; height: 10%; align-self: flex-start; } .inner-container { border: 1px solid black; width: 50%; height: 50% } .center, .off-center { position: absolute; } @media screen and (min-width: 769px) { .off-center { margin-left: 50%; } } @media screen and (max-width: 768px) { .off-center { margin-top: 50vh; } } <div class="container"> <div class="top">Logo</div> <div class="inner-container"> <div class="center">Center</div> <div class="off-center">Off-center</div> </div> </div>
{ "pile_set_name": "StackExchange" }
package com.aphidmobile.flip.demo.data; import java.util.ArrayList; import java.util.List; /* Copyright 2012 Aphid Mobile Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ public class Travels { public static final List<Data> IMG_DESCRIPTIONS = new ArrayList<Data>(); static { Travels.IMG_DESCRIPTIONS.add(new Travels.Data("Potala Palace", "potala_palace.jpg", "The <b>Potala Palace</b> is located in Lhasa, Tibet Autonomous Region, China. It is named after Mount Potalaka, the mythical abode of Chenresig or Avalokitesvara.", "China", "Lhasa", "http://en.wikipedia.org/wiki/Potala_Palace")); Travels.IMG_DESCRIPTIONS.add(new Travels.Data("Drepung Monastery", "drepung_monastery.jpg", "<b>Drepung Monastery</b>, located at the foot of Mount Gephel, is one of the \"great three\" Gelukpa university monasteries of Tibet.", "China", "Lhasa", "http://en.wikipedia.org/wiki/Drepung")); Travels.IMG_DESCRIPTIONS.add(new Travels.Data("Sera Monastery", "sera_monastery.jpg", "<b>Sera Monastery</b> is one of the 'great three' Gelukpa university monasteries of Tibet, located 1.25 miles (2.01 km) north of Lhasa.", "China", "Lhasa", "http://en.wikipedia.org/wiki/Sera_Monastery")); Travels.IMG_DESCRIPTIONS.add(new Travels.Data("Samye Monastery", "samye_monastery.jpg", "<b>Samye Monastery</b> is the first Buddhist monastery built in Tibet, was most probably first constructed between 775 and 779 CE.", "China", "Samye", "http://en.wikipedia.org/wiki/Samye")); Travels.IMG_DESCRIPTIONS.add( new Travels.Data("Tashilunpo Monastery", "tashilunpo_monastery.jpg", "<b>Tashilhunpo Monastery</b>, founded in 1447 by Gendun Drup, the First Dalai Lama, is a historic and culturally important monastery next to Shigatse, the second-largest city in Tibet.", "China", "Shigatse", "http://en.wikipedia.org/wiki/Tashilhunpo_Monastery")); Travels.IMG_DESCRIPTIONS.add(new Travels.Data("Zhangmu Port", "zhangmu_port.jpg", "<b>Zhangmu/Dram</b> is a customs town and port of entry located in Nyalam County on the Nepal-China border, just uphill and across the Bhote Koshi River from the Nepalese town of Kodari.", "China", "Zhangmu", "http://en.wikipedia.org/wiki/Zhangmu")); Travels.IMG_DESCRIPTIONS.add(new Travels.Data("Kathmandu", "kathmandu.jpg", "<b>Kathmandu</b> is the capital and, with more than one million inhabitants, the largest metropolitan city of Nepal.", "Nepal", "Kathmandu", "http://en.wikipedia.org/wiki/Kathmandu")); Travels.IMG_DESCRIPTIONS.add(new Travels.Data("Pokhara", "pokhara.jpg", "<b>Pokhara Sub-Metropolitan City</b> is the second largest city of Nepal with approximately 250,000 inhabitants and is situated about 200 km west of the capital Kathmandu.", "Nepal", "Pokhara", "http://en.wikipedia.org/wiki/Pokhara")); Travels.IMG_DESCRIPTIONS.add(new Travels.Data("Patan", "patan.jpg", "<b>Patan</b>, officially Lalitpur Sub-Metropolitan City, is one of the major cities of Nepal located in the south-central part of Kathmandu Valley.", "Nepal", "Patan", "http://en.wikipedia.org/wiki/Patan,_Nepal")); } public static final class Data { public final String title; public final String imageFilename; public final String description; public final String country; public final String city; public final String link; private Data(String title, String imageFilename, String description, String country, String city, String link) { this.title = title; this.imageFilename = imageFilename; this.description = description; this.country = country; this.city = city; this.link = link; } } }
{ "pile_set_name": "Github" }
Pearls symbolize purity, spiritual journey, charity, honesty, wisdom and integrity. They can also heighten our ability to receive spiritual guidance. They are undeniably sensual and feminine. I currently have some lovely white and gold pearls on-hand. I can order them in a variety of sizes, shapes and colors. I also feel similar energy from shell beads, and I have a variety of mother of pearl and oyster shell beads as well.
{ "pile_set_name": "Pile-CC" }
#!/bin/bash -e # # This script rebuilds the generated code for the protocol buffers. # To run this you will need protoc and goprotobuf installed; # see https://github.com/golang/protobuf for instructions. PKG=google.golang.org/appengine function die() { echo 1>&2 $* exit 1 } # Sanity check that the right tools are accessible. for tool in go protoc protoc-gen-go; do q=$(which $tool) || die "didn't find $tool" echo 1>&2 "$tool: $q" done echo -n 1>&2 "finding package dir... " pkgdir=$(go list -f '{{.Dir}}' $PKG) echo 1>&2 $pkgdir base=$(echo $pkgdir | sed "s,/$PKG\$,,") echo 1>&2 "base: $base" cd $base # Run protoc once per package. for dir in $(find $PKG/internal -name '*.proto' | xargs dirname | sort | uniq); do echo 1>&2 "* $dir" protoc --go_out=. $dir/*.proto done for f in $(find $PKG/internal -name '*.pb.go'); do # Remove proto.RegisterEnum calls. # These cause duplicate registration panics when these packages # are used on classic App Engine. proto.RegisterEnum only affects # parsing the text format; we don't care about that. # https://code.google.com/p/googleappengine/issues/detail?id=11670#c17 sed -i '/proto.RegisterEnum/d' $f done
{ "pile_set_name": "Github" }
Every Preacher Is A False Prophet? The acid test of a true prophet of God is this: He will never once get it wrong. If he does then we can know without doubt he is false. End of story. Since God is never wrong; it follows his spokesperson will not be wrong……ever. Never will he get it wrong. All the prophet needs to do is miss it just once and he is toast. Why? Because God vindicates his prophets. Prophets are special to God; very special. They are never wrong in what they preach or in what they predict. God is with them for sure. Prophets are his mouthpiece. He speaks through his prophets. They know the word of the Lord according to What Says the Scripture. Not according to impressions or feelings or imaginations. Everything God says through a prophet will agree with the written record: the Bible. Saying Thus saith the Lord and then speaking your own mind, then saying it is God is what many do. Not all speak for God as we can see when what they predict fails to come to pass. I was at a few sites where every preacher since the apostle Paul is a labeled a heretic. They are called false prophets and heretics. Other names also. The sites even have preacher photos there with the word HERETIC or FALSE PROPHET in big bold letters. You can scroll down and see photos of preacher after preacher. All of them are accused of being false or a heretic. Granted some are. But not all are false. There are among us true prophets of God. It cannot be that all of them are false. Anyone who asks constantly for money to give themselves outrageous salaries is a false prophet no doubt. God said he would do as he told us in Philippians 4:19supply all of our need. Since he already said he would why ask? Why continually beg for money when the Lord already said in his written word that he would meet your needs? Not your wants and desires to consume it upon your lusts. But he shall supply all your need according to his riches in glory.Not your riches but HIS riches. God is responsible to meet the need. The manna will fall be sure. But to call every minister false is false in itself. They are not all false. I laughed when scrolling down seeing photo after photo of smiling preachers and stamped across their face is HERETIC. I didn’t laugh because it is funny. I laughed because we laugh at the absurd. When one says to send money to buy a certain book that will show you HOW to open heaven’s windows to get money, then know you are listening to a false prophet. You don’t have to be a Christian to sell books on how to get rich. The Gospel is about salvation. It is about healing and restoration. It is all about Jesus and how to follow him. So that when he returns which will be soon, one will be ready to meet him in the air. i like your explanation about faulse prohet,lots of this pastors called themselve prophets.prophet is like a sacred word that many people use loosely,a prophet is never wrong,because God is never wrong,i agree with you that once a prophet is wrong, he’s disqualified to be a prophet,he should demote himself to a pastor,or evangelist,or reverend,because,all this titles give you room to make mistakes,but not a prophet,a prohet should always tell us the mind of God,and he’s supposed to be always,i mean always,and i say it again, “ALWAYS” right……Amen …..Joshua Sanusi. Yes a prophet cannot be wrong because God is never wrong. The scripture also says if the trumpet gives an uncertain sound who will prepare himself for battle? False prophecy is rampant as you know. They say God said such and such when in reality it was them who said such and such not God. Thanks for stopping by. Top Posts & Pages Prayer is the Key IT is time to pray for our families as never before. I have dedicated my life to praying for my family. Someone asked what would we do with the rest of our lives if we could choose only one thing to do. I answered PRAY for my family. Jesus REALLY is returning!
{ "pile_set_name": "Pile-CC" }
+ g*q(a). -3*a**3 + 1 Let c(r) = 8*r**2 + 7*r - 7. Suppose -7*f + 78 - 29 = 0. Let l(o) = 4*o**2 + 3*o - 3. Let z be (-8)/28 - (-38)/(-14). Give f*l(p) + z*c(p). 4*p**2 Let a(d) = -14*d - 16. Let o(p) = 5*p + 5. Give 5*a(u) + 16*o(u). 10*u Suppose 0 = -4*b - 0 + 12. Suppose -3 = b*n - 0*n. Let p(s) = -s + 1. Let y be -2 - (7 + -7) - (2 - (-1 - 1)). Let k(x) = 9*x - 5. What is n*k(t) + y*p(t)? -3*t - 1 Let w(x) = -x - 1. Let q be (-1)/(-6) - 225/54 - -3. Let c(g) = 6*g**2 - 4*g - 4. What is q*c(j) + 4*w(j)? -6*j**2 Let n(z) = -z + 1. Suppose 3*s + 85 = -4*r - r, 2*s - r = -35. Let t be (-6)/(24/s) + 0 + 1. Let h(l) = l**3 + 6*l - 9. Determine t*n(x) + h(x). x**3 - 3 Let j(f) = -2*f**2 + 4. Suppose -7*o = -27 - 1. Let u(z) = 5*z**2 - 11. Determine o*u(w) + 11*j(w). -2*w**2 Let o(q) = 61 + 2*q**3 - 3*q**2 + 5*q - 54 + 4*q**2. Let x(n) = 2*n**3 + n**2 + 4*n + 6. Give -4*o(l) + 5*x(l). 2*l**3 + l**2 + 2 Let m(n) = -6*n. Suppose 5*x - 12 = 3*x. Let h(s) = 2*s - x*s + s. Suppose -4*r - 30 = -3*f, -5*r - 61 = -2*f - 34. Determine f*m(b) - 11*h(b). -3*b Let j(m) = 7 + 7*m**2 + 0*m**3 + m**3 - 2*m**3 + 9*m - 3*m**3. Let w(f) = 2*f**3 - 3*f**2 - 4*f - 3. Calculate -4*j(i) - 9*w(i). -2*i**3 - i**2 - 1 Let c(k) = k - 1. Let l be 0/3 + 1 + 1. Let a(h) = -2 - 6 + 4 + 3*h + 2. Let g be 2/(-4) + 3/(-6). What is g*a(w) + l*c(w)? -w Let p(n) = n**2 - n - 1. Let c(v) = -23*v**2 + 87*v + 15. Let g(z) = 11*z**2 - 39*z - 7. Let w(m) = -4*c(m) - 9*g(m). Determine 3*p(q) + w(q). -4*q**2 Let t be (-57)/(-51) - 2 - 4/34. Let c(l) = 1 + 2*l**3 + 2*l**2 - l**2 - l**3. Let r(s) = 4*s**3 + 4 + 3*s**2 + 0*s**2 + s**3. Determine t*r(n) + 3*c(n). -2*n**3 - 1 Let k(w) = 21*w**2 - 4. Suppose -182 = 25*y - 32. Let u(b) = -11*b**2 + 2. Calculate y*k(i) - 11*u(i). -5*i**2 + 2 Let c(i) = i**3 - i**2 + 0*i**3 + 0*i**2 - i. Let v be (104/(-325)*(-25)/20)/(8/20). Let h(u) = -3*u**3 + u**2 - 2. Give v*h(y) + c(y). -2*y**3 - y - 2 Let x(i) = 8*i**3 + 2*i**2 + i + 2. Let v(y) = 9*y**3 + 2*y**2 + 2*y + 1. Give 2*v(z) - 3*x(z). -6*z**3 - 2*z**2 + z - 4 Let s(r) = 4*r + 1. Suppose 98 = -52*w + 3*w. Let v(p) = p**2 + 1. Calculate w*v(j) + s(j). -2*j**2 + 4*j - 1 Suppose 0 = 5*t + w + 32, -t - w - 10 = -2. Let m(k) = 489*k**3 - 494*k**3 - 2 + 8*k + 0. Let i(c) = 14*c**3 - 23*c + 6. What is t*i(h) - 17*m(h)? h**3 + 2*h - 2 Let p(l) = l + 1 + 2 - 1. Let o(t) = t + 3. Let m(w) = -23*w + 120. Let i be m(5). What is i*p(d) - 3*o(d)? 2*d + 1 Let t(x) = -16*x**3 - 30*x**2 + 24*x - 15. Let h(r) = 8*r**3 + 14*r**2 - 11*r + 7. What is 13*h(q) + 6*t(q)? 8*q**3 + 2*q**2 + q + 1 Let c(f) = -7 + f + 0 + 4. Let l(v) = 2. Let b(n) = 2*c(n) + 3*l(n). Let d(y) = -y**2 + y - 1. Let u be d(1). Let m(s) = -s. Determine u*b(w) - 4*m(w). 2*w Suppose -5*m - 31 = 24. Let o(v) = -193 + 197 - 11*v + 11*v**2 + 3*v**3 - 16*v**3. Let q(d) = -7*d**3 + 6*d**2 - 6*d + 2. What is m*q(f) + 6*o(f)? -f**3 + 2 Let q(d) = 13*d - 28. Let y(m) = 4*m - 9. What is 3*q(v) - 8*y(v)? 7*v - 12 Let t(l) = -3*l**3 + 44*l**2 + 5*l + 4. Let g(j) = 5*j**3 - 68*j**2 - 8*j - 6. Calculate -5*g(d) - 8*t(d). -d**3 - 12*d**2 - 2 Let y(l) be the second derivative of 91*l**3/2 - 192*l. Let v(u) = -26*u. Give -52*v(d) - 5*y(d). -13*d Let p(g) = 16*g**2 - 4. Let b be (-1952)/244*(-1)/2. Let q(r) = -31*r**2 + 9. Give b*q(u) + 9*p(u). 20*u**2 Let l(v) = -14*v**2 + 1. Let d be l(1). Let x(m) = 4*m + 13. Let g(y) = 40*y - 3. Let a(j) = 214*j - 14. Let c(s) = 3*a(s) - 16*g(s). Determine d*c(q) + 6*x(q). -2*q Let n be 24/30*15*(-3)/(-9). Let k(o) = o - 4. Suppose -l = -2*l + 2. Let p be l/7 - (-37)/(-7). Let g(q) = q - 3. Determine n*k(j) + p*g(j). -j - 1 Let j(m) = -m**2 + 3*m - 3. Suppose -3*g + 2 = -0*g - s, 0 = s - 1. Let q(d) = -d + 1. Determine g*j(f) + 4*q(f). -f**2 - f + 1 Let l(a) = -a**3 - 6*a**2 + 1. Let t(y) = y**3 - 1 + 13*y**2 - 25*y**2 + 0*y**3 + 17*y**2. Calculate -5*l(z) - 6*t(z). -z**3 + 1 Let p(y) be the second derivative of -y**3/2 - 7*y**2/2 - 2*y + 23. Let d(z) = 1. Let j(n) = -5*n**3 + n**2 - 1. Let m be j(-1). What is m*d(r) + p(r)? -3*r - 2 Let w(o) = 0 + 508*o**2 + 514*o**2 - 1024*o**2 + 2*o - 7. Let n(m) = -5*m**2 + 5*m - 15. What is 4*n(g) - 9*w(g)? -2*g**2 + 2*g + 3 Let s(y) be the first derivative of -2*y**2 + y - 1. Let w = 1742 - 1744. Let f(a) = a**2 - a - 1. What is w*f(g) + s(g)? -2*g**2 - 2*g + 3 Let n(p) = 3*p. Let o(k) = 32*k - 2. Determine -22*n(g) + 2*o(g). -2*g - 4 Let j(o) = -5 - 3*o + 32 + 4*o - 6*o. Let r(a) = a - 7. Give -2*j(u) - 9*r(u). u + 9 Let t(f) = -2*f**2 + 4*f + 8. Let v(s) = s**2 + s + 2. Determine t(w) - 3*v(w). -5*w**2 + w + 2 Let u(r) = 6*r**3 - 11*r**2 + 11*r + 11. Suppose -h + s = -s - 7, 35 = 3*h + s. Let q(n) = n**3 - 2*n**2 + 2*n + 2. Calculate h*q(l) - 2*u(l). -l**3 Let c(q) = -3*q**3 + 6*q**2 + 2*q - 12. Let o(h) = 4*h**3 - 7*h**2 - 2*h + 13. Determine -6*c(j) - 5*o(j). -2*j**3 - j**2 - 2*j + 7 Let n(m) = -2*m**3 + 58*m**2 + 7*m - 4. Let j(c) = c**2 + c - 1. Give 6*j(d) - n(d). 2*d**3 - 52*d**2 - d - 2 Let l = -139 - -137. Let c(d) = -6*d + 4. Let k(j) = -j + 1. Give l*c(m) + 10*k(m). 2*m + 2 Let o(l) = -2*l - 4. Suppose 0 = -j + 3*a + 5, -5*j + j + 2*a - 20 = 0. Let g(k) = -k - 5. Give j*o(w) + 6*g(w). 8*w - 2 Let y(g) = 7*g**2 - 5*g + 5. Let o(u) = 4*u**2 - 3*u + 3. Suppose l - 3*v = 6, 4*l + 1 = 2*v - 5. Give l*y(c) + 5*o(c). -c**2 Suppose -4*s - 148 = -124. Let b(x) = -x**2 - x + 31. Let q be b(s). Let p(o) = o + 2 + 3 - 6. Let g(l) = -12*l + 9. Determine q*g(r) + 9*p(r). -3*r Let j(o) = -11*o**2 - 4*o + 10. Let v(f) = 16*f**2 + 7*f - 15. What is 8*j(y) + 5*v(y)? -8*y**2 + 3*y + 5 Let k(g) = 133*g + 16. Let y(m) = 134*m + 21. Determine 4*k(q) - 3*y(q). 130*q + 1 Let z(a) = 9*a**2 + 4*a + 9. Let v be ((-5)/(-2))/((-3)/6). Let q(w) be the first derivative of 14*w**3/3 + 3*w**2 + 14*w - 54. Calculate v*q(k) + 8*z(k). 2*k**2 + 2*k + 2 Let c(u) = 4*u - 4*u + 0 + 3 + u. Let s(b) = 2. Suppose -3*j = -2*a + 4 + 7, 5*j - a + 16 = 0. What is j*s(m) + 2*c(m)? 2*m Let j(t) = 4*t**2 + 3*t + 16. Let w(x) = -20*x**2 - 20*x - 83. Let d(a) = -7*a**2 - 7*a - 29. Let z(h) = 17*d(h) - 6*w(h). Give 2*j(g) - 7*z(g). g**2 - g - 3 Let u(t) = -1. Let p(b) = -3. Let g(z) = 4*p(z) - 11*u(z). Let a(h) = -4*h + 12. Let q be 11/7 - (-44)/(-77). What is q*a(j) + 12*g(j)? -4*j Let u(j) = 4*j + 9. Let d(z) = -2 + 9*z + 11*z - 21*z. Let i = -32 + 22. Let k = 4 + i. Calculate k*u(q) - 26*d(q). 2*q - 2 Let y(v) = 49*v**2 - 11. Let q(n) = -26*n**2 + 6. Calculate -11*q(r) - 6*y(r). -8*r**2 Let s(n) = 37*n**3 - 6*n**2 + n + 3. Let i(u) = -19*u**3 + 3*u**2 - 1. Determine 5*i(w) + 2*s(w). -21*w**3 + 3*w**2 + 2*w + 1 Let b(q) = -q**2 - q + 1. Let h(o) = -o**3 + 6*o**2 + 4*o - 2. Let k = 0 + 4. Let t = 29 + -34. Let a be t/(-3) + 5/(15/(-2)). Calculate a*h(w) + k*b(w). -w**3 + 2*w**2 + 2 Let z(y) = -1798*y**3 - 5*y**2 + 30*y - 5. Let h(s) = -62930*s**3 - 174*s**2 + 1044*s - 174. Calculate -5*h(v) + 174*z(v). 1798*v**3 Let j(h) = -h**3. Let q(z) = 9*z**3. Let x(y) be the third derivative of -y**6/30 + y**5/60 - 21*y**2. Let k be x(-1). Calculate k*j(g) + q(g). 4*g**3 Let f(l) = 2*l - 3. Let d be (-4)/(-18) + (-86)/(-18). Let b(m) = -1 - 3*m + 0*m + 6 - 1. Give d*f(z) + 4*b(z). -2*z + 1 Let y(k) = 66*k**3 - 27*k**2 + 27. Let r(s) = 0*s**3 - 2*s**2 + 3*s**3 + 2*s**3 + 2. Let p = 73 + -46. Let m = -12426 - -12424. What is m*y(z) + p*r(z)? 3*z**3 Let z(y) = 3*y - 9. Let d(v) be the first derivative of 3*v**2/2 - 8*v - 91. Calculate -7*d(m) + 6*z(m). -3*m + 2 Let g(i) be the second derivative of 0 + 1/6*i**3 + 19*i + 1/4*i**4 - i**2. Let w(r) = -10*r**2 - 4*r + 6. Give 7*g(h) + 2*w(h). h**2 - h - 2 Let m(z) = -3*z**3 + 2*z**2 - 5. Let c(p) be the first derivative of 3*p**4/4 - 2*p**3/3 + 6*p + 51. Determine -5*c(v) - 6*m(v). 3*v**3 - 2*v**2 Let d(f) = -f**2 - 4*f. Let n(h) = -h**2 - h. Let g(i) = -d(i) + 4*n(i). Let b = -1332 + 1334. Let x(w) = w**3 + w**2 - w. What is b*x(r) + g(r)? 2*r**3 - r**2 - 2*r Let l(a) = 11*a**2 - 14*a + 3. Let d = -59 + 66. Let k(r) = -7 + 5 - 3*r - 6*r + d*r**2 + 4. What is 8*k(b) - 5*l(b)? b**2 - 2*b + 1 Let c(x) = 7*x**2 - 2*x - 3. Let s(n) = -37*n + 41*n - 3*n - 6*n**2 + 2. Calculate -3*c(o) - 4*s(o). 3*o**2 + 2*o + 1 Let c(o) = -o**3 + 6*o**2 + 2*o + 6. Let h = 98 + -59. Suppose 5*f - 2*f = -h. Let a(r)
{ "pile_set_name": "DM Mathematics" }
Extracorporeal shock-wave lithotripsy in horseshoe kidneys. Using the Dornier HM-3 lithotriptor, 10 patients (11 renal units) with calculi in horseshoe kidneys were treated with extracorporeal shock-wave lithotripsy (ESWL) and ancillary procedures. Six renal units (55%) underwent pre-ESWL manipulation consisting of a Double J stent, ureteral catheter, or percutaneous nephrostomy. The "blast path" was employed to treat five renal units which could not be positioned at F2. Good initial stone fragmentation was obtained in eight renal units (73%). There were two episodes of post-ESWL obstruction requiring intervention; both occurred in the same patient. A total of seven post-ESWL procedures were performed on two renal units. After all procedures, eight renal units (73%) were rendered stone-free, six (55%) with ESWL alone. The average follow-up interval was twelve months (range 1-28 months). ESWL can be used effectively to treat some patients with calculi in horseshoe kidneys. The ectopic location of these renal units may make it difficult to position calculi at F2, thus necessitating treatment on the blast path or placement of the patient in prone position. Multiple ancillary procedures may be necessary.
{ "pile_set_name": "PubMed Abstracts" }
<Map> <Bangs></Bangs> <Switches></Switches> <SliderCurves> <Mapping> <Widget> <WidgetName>color_hue</WidgetName> <WidgetID>25</WidgetID> <WidgetCanvasParent>SystemSettings</WidgetCanvasParent> </Widget> <Track></Track> </Mapping> </SliderCurves> <NumberDialerCurves></NumberDialerCurves> </Map>
{ "pile_set_name": "Github" }
Friday, July 28, 2017 I'm experimenting with a new style* for my portfolio this week. It's based on the painting process of three of the art for fun images I blogged about last week (umbrella boat, cats, and sheep and giraffe). Even though they're all very different, I used some of the same processes to make the picture (amazing how art can be so similar and yet turn out so different). Still working on how I want the new style to look, but I like the pieces this week better than the ones last week. Here's the progression of paintings: Finally, I painted a cow with a moo-stache for Colour Collective (the color this week is Portland Orange): So far I'm liking the new style, even if it's not completely there yet. I think it's getting close though (or at least I hope so)!What are you working on this week? Have you ever changed your art style? How did it go?*This is not the first time I've changed my art style. It's never easy, but hopefully in the end it will be worth it! It's always been worth it in the past for me. Fingers crossed it will be this time too! Friday, July 21, 2017 A: Art that's just for fun might be in a different style, use a different medium, or it could even be a doodle! Art for fun is just for you. It's not part of a project or for your portfolio (though it could be in the future. Q: Why is it important to take time away from other projects to make art that's just for fun? A: It can be hard to keep your creativity if you're schedule is full, or if you feel obligated to create only a certain type of art for a project, or your portfolio. Art for fun doesn't have an agenda, so there's no pressure. You can create what you want. It can help you stay creative (and avoid burnout) and the things you learn could help you make art for books or other projects. You never know what's going to happen when you make art without a plan*. * Not having a plan and doing it for fun doesn't mean you can't be inspired by an illustration prompt, or try new materials to change up your style. (If you've visited my blog before, you might have noticed that I do a lot of art for illustration prompts. This is why.) What it means is that nobody is expecting you to make the art. You can experiment! You can make mistakes!** ** Mistakes are part of the creative process, but sometimes it seems like we don't have room to make mistakes. You don't have to turn in art for fun, or show it to anyone, unless you want to. I don't show all the art for fun on my site, but it's fun to be able to show a few of the pieces I like.Q: Do you have any examples of art for fun? A: Yes! Here four pieces of art for fun I made this week (notice how different each of these pieces are). Two of them are for illustration prompts. If I were making these for my portfolio, I wouldn't feel like I could experiment with style and medium as much as I did with these: 2. The color for Colour Collective this week was a blue color - Pantone 292 C, to be exact, which is harder to create in traditional mediums when you can't "pick" the color like you can digitally. I experimented with watercolor, watercolor crayons, and sponge painting to come up with an umbrella boat with a bear and two birds, and lots of blue: 3. This image is a character study of 3 Cats meowing, but mostly it's another experiment in sponge painting (I love sponge painting, but I can't control it, which is part of the fun and also part of the frustration): 4. Last but not least, I experimented with not using black line for my giraffe and sheep (with a little sponge painting in the background): These are all very different, and I learned things from each one that will help me make art in the future, even if it's digital art. If I were only making art for a book or my portfolio, none of these images would exist. If I weren't making art for fun, I wouldn't grow as an artist, and eventually, that would catch up with me. Q: What does your regular art look like? A: If you're not familiar with my art, you might not realize how different this art is from what's in my portfolio. Here are my two latest pieces for comparison, one color, one black line:I. Roberta and Bailey (the robot) at the Beach: [Note - even this is different than the art for the book I illustrated (EWE AND AYE) - it's important to keep growing as an artist, IMO.] Author/illustrator Stephanie Ruble has been making art ever since she could hold a crayon, and making up stories since she learned to talk. She's currently working on new picture books, images for her portfolio, and drawing art for unusual holidays. Thanks for visiting! Picture Book: Ewe and Aye written by Candace Ryan, Illustrated by Stephanie Ruble - in bookstores now.
{ "pile_set_name": "Pile-CC" }
Blog Tuesday, January 24, 2017 As you know the spectrum requirements of plants change during their life cycle. The Kind LED K5 series gives you complete control of the exact spectrum and quantity of light your plants are going to receive. By understanding how best to tune your Kind LED grow light you can maximise your results while using the least amount of power possible. .. Thursday, August 06, 2015 The STASH awards have just been posted by High Times magazine. What does STASH stand for you ask? Significant Technological Achievements in Secretive Horticulture which is featured by High Times, it celebrates advances made by the cultivation community as well as tried-and-true products that have stood the test of time. These include lighting products, organic and hydroponic nutrients, new additives and practically anything else that helps increase yields or reduce hassles. .. Friday, May 22, 2015 Kind LED recently conducted a thorough examination of the major LED grow lighting companies’ products. They did this in order to create a Kind LED Comparison by obtaining scientific data regarding the PPFD (Photosynthetic Photon Flux Density) readings and spectral output at a variety of heights, distances, and positions below the fixtures. .. Friday, April 24, 2015 Vertical farming applications for LED grow lighting are rare and impressive. In many places around the world, space is very limited, and those are precisely the conditions in which food prices are highest. If a creative grower can take advantage of a vertical farming strategy, they can yield an incredible amount of produce per square foot on that land, for which they are paying only by the horizontal area. ..
{ "pile_set_name": "Pile-CC" }
SS Desabla The SS Desabla was built by Hawthorn Leslie & Co. Ltd at Newcastle upon Tyne in 1913 for Bank Line, Glasgow (Andrew Weir Shipping & Trading Co. Ltd). She was the first oil tanker to join the Bank Line fleet and was chartered and operated for approximately one year by General Petroleum Company along the Pacific coast of the United States, Chile and Canada. In 1914 she was re-chartered to the British Government to transport oil from Texas to the United Kingdom. In 1915 she was torpedoed and sunk by German submarine U-17 off the coast of Scotland. Known timeline Main source: shipping records available on Ancestry.com Sinking On 12 June 1915 she was carrying a cargo of linseed oil from Port Arthur, Texas bound for Hull under the command of Mr. Fred S. Cowley. She was chased and intercepted by German submarine U-17. While the crew escaped in lifeboats, she was shelled, torpedoed and finally had to be scuttled with charges placed in the hull to sink her. Excerpt from the Admiralty Report into the sinking: "This Admiralty Oiler Transport No.63 was steaming on course when the German Submarine U-17 was seen right astern, gaining rapidly on the Steamship. The Master endeavoured to keep the vessel astern making various violent changes of course, but the submarine was much faster and rapidly took up a position close to the ship. The Enemy commenced to shell the Desabla at 07:20 am and kept up a continual fire at her from a Deck Gun. Realising that escape was impossible, the master stopped his Engine and ordered all hands into the Boats, which were successfully lowered at 08:20 am, allowing all the Crew to escape safely. Shortly after the enemy fired a Torpedo into the Ship at 08:30 am, but as she did not sink immediately some members of the crew went aboard her, presumably to place explosive charges and to loot her. When last seen by the Master at 12:30 pm, his ship was sinking fast and the Submarine had submerged out of sight. The survivors were picked up by the Armed Trawlers at 3:30 pm and taken ashore." The wreck The official report stated the wreck was 10 miles from Tod Head, Scotland. Divers searched there for years. However, the wreck of the SS Desabla is actually 35 miles from Montrose, Scotland. After a number of attempts, she was located in 2010 by divers from Marine Quest based in Eyemouth, Berwickshire. References External links Bank Line Profile at shipnostalgia.com Details of the Wreck at wrecksite.eu Profile of Andrew Weir Shipping and Trading Co. Ltd. at red-duster.co.uk Profile of The Bank Line at theshipslist.com The Fatherland, Vol. 3 by George Sylvester Viereck Conversation thread at shipnostalgia.com Marine Quest Category:1913 ships Category:Ships built on the River Tyne Category:Tankers of the United Kingdom Category:Steamships of the United Kingdom Category:Merchant ships of the United Kingdom Category:World War I merchant ships of the United Kingdom Category:Ships sunk by German submarines in World War I Category:Shipwrecks of Scotland
{ "pile_set_name": "Wikipedia (en)" }
Moody's Investors Service has raised its rating outlook for Newark to positive from negative, citing ongoing development projects and improving financial management in New Jersey's largest city. Newark Mayor Ras Baraka said the change marked the first time in eight years that the city received a positive credit-rating outlook. Continue Reading Below Newark's credit rating for its general-obligation bonds remains unchanged at Baa3, Moody's lowest investment grade rating, although the positive outlook indicates an upgrade is possible in one to two years. The city has been downgraded four notches by Moody's since June 2010, when its credit-rating was A2 with a negative outlook. The city's finances and economy are still in a "challenged state" with poverty, crime and budget strains continuing to pose problems, Moody's said in a report published Thursday. Newark, the state's largest city with a population of more than 280,000, has long relied on state aid to stay afloat. But recent interest by developers seeking to capitalize on ample vacant land and easy access to New York City has helped the city's tax base, which expanded for two consecutive years for the first time since the recession and reached $16 billion in 2017, according to Moody's. "That was key to us, seeing the economic growth translate into tax base growth," said Orlie Prince, vice president and senior credit officer at Moody's. "There was no need to rely on short-term borrowing to get through the fiscal year, which for us was a telling sign that things were on the mend." Newark's Mr. Baraka said in a statement that Moody's outlook represented "confirmation of our progress in restoring the city's financial health" through efforts such as recruiting new businesses, hiring more police officers, expanding affordable housing and improving the city's roads. Newark's liquidity has improved from 2014, when it had a cash deficit by Moody's calculations. The city ended 2016 with $64.8 million in operating cash, representing 9.8% of revenues, Moody's said. The ratings firm said it will watch for continued improvements in budget management and sustained economic development in considering whether to upgrade the city's credit rating. Also on Thursday, New Jersey Gov. Chris Christie signed legislation authorizing a multi-billion dollar tax-incentive package for Amazon if it builds its second headquarters in New Jersey. Mr. Christie has proposed Newark as the ideal location, and the city has offered up to $2 billion in tax abatements and wage-tax waivers to lure the online retailer. The state, through its Economic Development Authority, has offered up to $5 billion in tax incentives over 20 years if Amazon creates 50,000 new jobs. Mr. Christie, a Republican, will leave office Tuesday after eight years in Trenton. He will be replaced by Gov.-elect Phil Murphy, a Democrat. Write to Kate King at [email protected] (END) Dow Jones Newswires January 11, 2018 17:37 ET (22:37 GMT)
{ "pile_set_name": "OpenWebText2" }
Q: how to prevent SQL Injection in a asp.net website For email entry in a text box by the user i am doing client side check, to find whether the email is valid or not string emailexist = "SELECT COUNT(DISTINCT UserID) as count FROM tbl_user WHERE Email=@Email "; <asp:RegularExpressionValidator ID="RegularExpressionValidator2" ValidationGroup="Login" ControlToValidate="txtUserName" ValidationExpression="\w+([-+.]\w+)*@\w+([-.]\w+)*\.\w+([-.]\w+)*" CssClass="Error" runat="server" /> is this regular expression good enough to prevent sql injection for email. Other Text: string groupExistQuery = "SELECT COUNT(DISTINCT GroupID) as count FROM tbl_group WHERE GroupName=@GroupName"; I am doing a query in server side to check whether the group name entered by the user is already available in the database, there is a strong possibility to perform sql injection here. How should I prevent from it. A: A regex is unrelated to SQL injection (blacklisting etc is never the strongest approach); however, the use of the parameter @Email means (assuming it remains parameterised) that is not susceptible to SQL injection. SQL injection relates to inappropriate concatenation of input; the main tool to fight it is parameters, which has already happened here. For example, if you did: var sql = "SELECT ...snip... WHERE Email='" + email + "'"; // BAD!!!!! then that is heavily susceptible to SQL injection. By using a parameter, the value is not treated as part of the query, so the attacker does not have at attack vector. A: If you use parameterised values, you are going to be fine regardless, you can not inject via parameters, only via concatenated values. A: You can prevent it by not using Direct SQL and using parameterised queries and/or Stored Procedures instead.
{ "pile_set_name": "StackExchange" }
Field of the Invention The present invention relates to a method and apparatus of video encoding/decoding, and more particularly, to a method that performs intra prediction by using interpolation filtering while encoding and decoding. Discussion of the Related Art In general, a residual signal is generated by using intra prediction and inter prediction while video coding. The reason for acquiring the residual signal is that when the residual signal is coded with the residual signal, the quantity of data is small and a data compression rate increases and as the prediction is better, a signal of the residual signal is small. In an intra prediction method, data of a current block is predicted by using contiguous pixels of the current block. A difference between an actual value and a prediction value is referred to as a residual signal block. In the case of HEVC, in the intra prediction method, 9 prediction modes used in the existing H.264/AVC increases to 35 predictions modes as illustrated in FIG. 1 to be more subdivided, and as a result, the prediction is performed (however, a planar prediction mode and a DC prediction mode are not shown in FIG. 1). In the case of the inter prediction method, the current block is compared with blocks in contiguous pictures to find a most similar block. In this case, positional information (Vx, Vy) of the found block is referred to as a motion vector. A difference of pixels in the block between the current block and the prediction block predicted by the motion vector is referred to as the residual signal block (motion-compensated residual block). As described above, a video encoding and decoding method is required, in which the intra prediction and the inter prediction are subdivided to decrease the quantity of data of the residual signal and a calculation quantity is small without degradation of codec performance by using efficient transform.
{ "pile_set_name": "USPTO Backgrounds" }
Featured Slideshow In a Dallas courtroom on Thursday, writer and activist Barrett Brown was sentenced to 63 months in prison and was ordered to pay a little more than $890,000 in restitution and fines, according to reports. Upcoming Live Events Be sure to stay tuned for breaking news on our 2015 conference and expo, which promises to deliver even more innovative programming and an enhanced showcase of the latest cyber security solutions you must see. In a security bulletin, Adobe said that all users of Flash Player version 9.0.124.0 and earlier should upgrade to version 10. Users can upgrade by running the auto-update in the program when prompted, or visit Adobe's Player Download Center. “Clickjacking is an issue in multiple web browsers that could allow an attacker to lure a web browser user into unknowingly clicking on a link or dialog,” Adobe said in its security advisory. “This update helps prevent a clickjacking attack on a Flash Player user's camera and microphone.” The update also addresses other security issues. It prevents privilege escalation attacks against web servers hosting Flash content and cross-domain policy files, fixes a potential port-scanning issue and prevents potential attacks to the clipboard API, Adobe said in its security advisory. "We recommend all users upgrade to Adobe Flash Player 10 in order to mitigate the potential issues as outlined in the Oct. 15 Security Bulletin," Brad Arkin, director, Product Security and Privacy at Adobe, told SCMagazineUS.com Thursday in an email. Customers who cannot upgrade immediately due to IT restrictions or other reasons can change their settings to mitigate the potential for falling victim to clickjacking exploits. The workaround is outlined in an older Adobe security advisory. Arkin said there will also be a security update for Flash Player 9 available next month. Jermiah Grossman, founder of WhiteHat Security and Robert Hansen, founder and CEO of SecTheory notified Adobe of the potential for clickjacking exploits against Flash Player last month. These two researchers had been researching clickjacking since the middle of the year. SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.
{ "pile_set_name": "Pile-CC" }
Log in to JacketFlap What is JacketFlap JacketFlap connects you to the work of more than 200,000 authors, illustrators, publishers and other creators of books for Children and Young Adults. The site is updated daily with information about every book, author, illustrator, and publisher in the children's / young adult book industry. Members include published authors and illustrators, librarians, agents, editors, publicists, booksellers, publishers and fans.Join now (it's free). JacketFlap Sponsors Bad Baby Average rating 5 out of 5 Based on 4 Ratings and 4 Reviews Book Description Jack was having another perfect day. In fact, you could say that his whole life was perfect, except that he wanted someone to share it with. That someone arrives in the form of a new baby sister who keeps growing...and growing...until she's about ten stories tall, wreaking havoc with every step she takes. Of course, Jack gets the blame. Full of the sly, raucous humor that marked Ross MacDonald's p... More Jack was having another perfect day. In fact, you could say that his whole life was perfect, except that he wanted someone to share it with. That someone arrives in the form of a new baby sister who keeps growing...and growing...until she's about ten stories tall, wreaking havoc with every step she takes. Of course, Jack gets the blame. Full of the sly, raucous humor that marked Ross MacDonald's previous books, this is the ultimate book about sibling rivalry, and one that will soon have readers young and old guffawing in recognition. About Ross Macdonald (Author, Illustrator) : Ross Macdonald is a published author and an illustrator of children's books. Some of the published credits of Ross Macdonald include Goodbye Look, Boys of Steel: The Creators of Superman, Bye-Bye, Cri... moreView Ross Macdonald's profile Videos You must be a member of JacketFlap to add a video to this page. Please Log In or Register.
{ "pile_set_name": "Pile-CC" }
Ulises Jaimes Ulises Ignacio Jaimes Huerta (born April 20, 1996 in Lázaro Cárdenas, Michoacán) is a professional Mexican footballer who currently plays for Tepatitlán de Morelos. References External links Category:1996 births Category:Living people Category:Mexican footballers Category:Association football forwards Category:Monarcas Morelia footballers Category:Monarcas Morelia Premier players Category:Club Atlético Zacatepec players Category:Loros UdeC footballers Category:Alacranes de Durango footballers Category:C.D. Tepatitlán de Morelos players Category:Ascenso MX players Category:Tercera División de México players Category:Footballers from Michoacán Category:People from Lázaro Cárdenas, Michoacán
{ "pile_set_name": "Wikipedia (en)" }
Pope Francis told mothers at a baptism ceremony in the Sistine Chapel to not be afraid to breastfeed their babies, if they started crying because they were hungry.
{ "pile_set_name": "OpenWebText2" }
A number of recent studies suggest that cognitive processes rely on spatial and temporal patterns of activity in extended neural networks. Optical imaging techniques can provide information on a microscopic level about the individual and collective behavior of cells involved in these processes. We propose to develop an advanced image probe and digital acquisition system designed for high performance functional neural imaging using intrinsic light scattering signals. The first goal of the project is to improve the image probe design for high sensitivity to small and rapid changes in light scattering. Two methods of reflectance mode illumination will be explored for fluorescence and polarized light measurements. The system will incorporate an electronically tunable filter to illuminate tissue with specific wavelengths for spectroscopic measurements, and an intensified detector for dynamic fluorescence measurements. The second goal is to implement hardware and software improvements to the data acquisition system. Application performance requirements and the need to integrate of a number of data modalities require that we develop custom data acquisition hardware; the proposed system will control CCD camera circuitry, and capture, process and archive 2000 frames per second, with 256 channels of concurrent electrophysiological data. We will integrate this hardware into inexpensive, multiple processor. Pentium computer systems, designed for distributing tasks across multiple processors. The third goal for the project is to apply the device to investigate the nature and origin of light scattering changes associated with neural activation. Our preliminary studies in the hippocampus and medulla have demonstrated several different optical changes associated with neural activation, including fast light scattering changes concurrent with neural swelling and electrical transmission, and slower changes in light absorbance associated with hemodynamic coupling to metabolic demand. We will examine the spectral nature of the optical signals, characterize the timing of at least four components that we have identified, and employ physical and physiological manipulations to identify and characterize underlying mechanisms.
{ "pile_set_name": "NIH ExPorter" }
Are current body mass index referenced pedometer step-count recommendations applicable to US youth? The purpose of this study was to cross-validate international BMI-referenced steps/d cut points for US girls (12,000 steps/d) and boys (15,000 steps/d) 6 to 12 years of age. Secondary pedometer-determined physical activity data from US children (N=1067; 633 girls and 434 boys, 6 to 12 years) were analyzed. Using international BMI classifications, cross-validation of the 12,000 and 15,000 steps/d cut points was examined by the classification precision, sensitivity, and specificity for each age-sex stratum. For girls (boys) 6 to 12 years, the 12,000 (15,000) steps/d cut points correctly classified 42% to 60% (38% to 67%) as meeting (achieved steps/d cut point and healthy weight) and failing (did not achieve steps/d cut point and overweight). Sensitivity ranged from 55% to 85% (64% to 100%); specificity ranged from 23% to 62% (19% to 50%). The utility of pedometer steps/d cut points was minimal in this sample given their inability to differentiate among children who failed to achieve the recommended steps/d and exhibited an unhealthy weight. Caution, therefore, should be used in applying previous steps/d cut points to US children.
{ "pile_set_name": "PubMed Abstracts" }
Q: Add multiple elements to a single var and detect if any of those are clicked? I have a page that can have one of three possible elements. I would like to assign whatever element exists to a var and then check if the var is clicked. I tried using the add(), but it has confused me: var testingVar = $('#element-one').find('.object').add('#element-two').find('.object').add('#element-three').find('.object'); $(testingVar ).click(function() { alert('works'); }); It seems to me that the add() overwrites the previous add()? if I am on a page that has #element-three, it works, if on a page with element-one or element-two, it doesn't. If I change the var to var testingVar = $('#element-one').find('.object'); Then a page with element-one works. Can someone help me understand how to use the add() properly in this case? Thanks A: I think what you're looking for is this: $('#element-one .object').add('#element-two .object').add('#element-three .object'); .find() returns a new jquery object. However, I think this would be easier in this case: $('#element-one .object, #element-two .object, #element-three .object'); Or even easier, if you can change markup, is to give each element you're currently selecting by id a common class, and do this: $('.common-class .object')
{ "pile_set_name": "StackExchange" }
(Carlo Allegri/Reuters) Will the New York Times apologize for its unconscionable attacks? In the annals of American political narratives, few were worse and more malicious than the notion that a young Muslim jihadist decided to shoot up a gay nightclub in Orlando because of an alleged “climate of hate” created by American Christians. This was no mere fringe view. Remember the astonishing piece by the New York Times editorial board on June 15, 2016 — published a mere three days after the attack? Here’s a taste: While the precise motivation for the rampage remains unclear, it is evident that Mr. Mateen was driven by hatred toward gays and lesbians. Hate crimes don’t happen in a vacuum. They occur where bigotry is allowed to fester, where minorities are vilified and where people are scapegoated for political gain. Tragically, this is the state of American politics, driven too often by Republican politicians who see prejudice as something to exploit, not extinguish. It then proceeded to name-check GOP politicians for their alleged homophobia, before ending with this unconscionable flourish: “The 49 people killed in Orlando were victims of a terrorist attack. But they also need to be remembered as casualties of a society where hate has deep roots.” It would be bad enough if it was “only” the editorial board of the nation’s most powerful newspaper attacking Christians after a Muslim terrorist attack, but remember this contentious Anderson Cooper interview where he incredibly asked if Pam Bondi, Republican attorney general of Florida, was a “hypocrite” for declaring that anyone who attacks the LGBT community would be “gone after with the full extent of the law.” And why was she a hypocrite? Because she defended the definition of marriage in Florida’s constitution. No, really. Watch: The examples could roll on and on. Progressive Christian celebrity Jen Hatmaker wrote a viral Facebook post arguing that Christian “anti-LGBTQ sentiment has paved a long runway to hate crimes.” The Washington Post published a piece arguing that “we can’t ignore America’s homegrown homophobia.” In a lengthy Vox interview, a prominent LGBT activist argued that it was “time to talk about America’s faith-based homophobia problem.” As I wrote at the time, the reasoning went something like this: “If you oppose same-sex marriage or mixed-gender bathrooms, then you not only can’t legitimately grieve the loss of gay lives, you’re partially responsible for the massacre in Orlando.” This reasoning was ridiculous on its own terms. It was based entirely on Mateen’s alleged homophobia combined with the completely unproven, totally unsupported notion that he was somehow influenced by American Republican rhetoric to attack a gay club. That was the entire basis for using a terrorist massacre to attack and shame fellow citizens. Well now, thanks to the trial of Omar Mateen’s wife, Noor Salman, the facts are in. As Melissa Jeltsen wrote in a well-reported piece for HuffPost, quite a few members of our media elite got the Pulse massacre story “completely wrong.” Oops: Salman’s trial cast doubt on everything we thought we knew about Mateen. There was no evidence he was a closeted gay man, no evidence that he was ever on Grindr. He looked at porn involving older women, but investigators who scoured Mateen’s electronic devices couldn’t find any internet history related to homosexuality. (There were daily, obsessive searches about ISIS, however.) Mateen had extramarital affairs with women, two of whom testified during the trial about his duplicitous ways. Double oops: As far as investigators could tell, Mateen had never been to Pulse before, whether as a patron or to case the nightclub. Even prosecutors acknowledged in their closing statement that Pulse was not his original target; it was the Disney Springs shopping and entertainment complex. They presented evidence demonstrating that Mateen chose Pulse randomly less than an hour before the attack. It is not clear he even knew it was a gay bar. A security guard recalled Mateen asking where all the women were, apparently in earnest, in the minutes before he began his slaughter. This was a terrorist attack, pure and simple. There’s no evidence it was an anti-gay hate crime. In fact, as Jeltsen notes, Florida’s 2016 hate-crimes report “does not include the 49 victims of the Pulse shooting in its official total.” The available evidence indicates that Mateen’s original target was Disney Springs and EVE Orlando, but he was deterred by “heavy, visible security.” He then googled “downtown Orlando nightclubs” before targeting Pulse. Mateen’s attack was a “crime of opportunity, the location chosen at random.” It’s fashionable to mock American Evangelicals for their alleged “persecution complex.” Scornful elites shake their heads and mock the decision of Evangelicals to vote for Donald Trump. Indeed, I’ve had my own issues (for very different reasons) with Evangelical hypocrisy in 2016 and beyond. But if you want to know why American Christians sometimes feel as if they’re under siege, realize this — at the highest levels of media and in the complete absence of evidence, influential people tried to make the case that Christian and Republican “hate” was partially responsible for the worst jihadist massacre since 9/11. Now that we know the facts, it’s time for accountability. This is not a case of “No harm, no foul. I was merely expressing my opinion.” There is much harm. This is a flagrant foul. Members of the mainstream media rightfully scorn fringe sites and online demagogues who leap to conclusions after each and every mass shooting, spreading conspiracy theories and using the wildest claims as a club to beat their political opponents. In this case, however, the “fringe site” was the New York Times. The online demagogues were people toasted in elite circles across the land. Their actions were inexcusable then, and they’re even more inexcusable now. An apology is necessary. A course correction is mandatory. But I’m not holding my breath. American polarization means never having to say you’re sorry. Moderation in opposition to the GOP is no virtue. Extremism in the fight against “homophobia” is no vice. And so you’re never really wrong if you attack the right enemies. After all, this is culture war, and in culture war there is no substitute for victory, facts and reason be damned.
{ "pile_set_name": "OpenWebText2" }
(Side note: This was intended to be more of a photographic essay pic. However, the generic dollar store bran AA batteries in my camera ran out of juice shortly into the first day. I didn't bother to check them before I left, nor did I think about getting new ones at any point. I have a degree.) To get to Warren Ballpark from any of the more populated bits of Arizona, you have to do quite a bit of rural highway driving. After leaving Interstate-10, you pass through Benson, Tombstone, St. David (where drivers are as adept at driving up to the Speed Limit as Barry Zito is adept as hitting 100 on his fastball.), and a whole bunch of desert and mountains before you get to Bisbee. However, it is not in the fashionable Old Bisbee that you'have probably heard about. It is southeast of there in the less cosmopolitan but easier to park in part of town known as Warren (hence the name.) From a quick glance, Warren Ballpark looks like any other smallish stadium in America. The infield seating only extends to the ends of each dugout, and is wooden and built not-unlike a Roman Amphitheater. The outfield seats are difficult to access and don't quite face the field like you would expect. However, Warren Ballpark first started playing professional baseball games in 1909. It has been home to pro, semi-pro, and high school games since then. As such, it purports to be the oldest continuously used Baseball field in the United States. Obviously, there is some dispute to that, but that is still a long time to be continuously playing baseball on one field. The list of players who have played on the field through its history is also impressive. You can find a pretty comprehensive book on the history of the park by Mike Anderson, who also plays Vintage Baseball and is a fountain of knowledge on the park and on Bisbee in general and is a genuinely nice guy. The Copper City Classic is in its fourth year. It takes teams from the Arizona Territories Vintage Baseball League and elsewhere and has each team play three games each for the entertainment of the viewing public. The proceeds from ticket and concession sales go to maintaining and restoring the park. For the past few years, the main aim has been to restore the bathrooms at the park, which can only be described as "harrowing." The entire locker room area underneath the stands does look like time has taken its toll. There is a certain charm to it, I suppose, and it's way fancier than any other place that I've played baseball. There is also an incongruous looking couch in the visitor's locker room. And I loves me an incongruous couch. The six teams participating in the Copper City Classic this year were the Bisbee Black Sox, The Bisbee Bees (who are from the valley, so it's confusing), The Glendale Gophers, The Phoenix Senators, The Tucson Saguaros (that's who I play for!), and The Colorado Territorial All-Stars. The ATVBBL uses 1860s baseball rules. Some of the main differences between those and modern rules, from their website: Most games in the ATVBBL use rules from 1860. Some of the differences between those rules and modern baseball include: Underhand pitching. If a ball is caught on one bounce, it's an out. If a ball is caught off a foul tip, either on the fly or one bounce, it's an out. Balls caught on the fly or one bounce by anybody (players from either team, spectators, etc.) are outs. If the ball is caught on the fly, you cannot tag up and advance. If a ball is caught on one bounce, runners may advance at will without tagging up. A ball is determined fair or foul based on where it first strikes the ground. It does not have to pass first or third base to be considered fair. Fouls are not strikes. No overrunning first base. If you overrun the base, you can be tagged out. No lead-offs or stealing. Balls and strikes were not usually called in 1860. The hurler's job is to pitch balls that the striker can hit. The defense is supposed to put out the striker, not the hurler. The umpire's word is the law! Only the team captain is permitted to speak to the umpire, who is always addressed as "sir." Any arguing with the umpire, profane language, or ungentlemanly conduct is punishable by a 25 cent fine. One fun aspect of vintage ball are the nicknames. Everyone is required to have an "Old Timey Soundin'" nickname (Like "Pop" or "Cracker Jack ") which can lead to a lot of fun. This year, I went simply by "Bag of Malarkey." You can get those under the boxed Malarkey at the Safeway for a cheaper price. I was the hurler for all 19 innings of play that Tucson played. With the soft Lemon Peal balls the league uses, I find that a circle change-up grip helps me get it over the plate. Just a pro tip. The first game of the tournament was between Tucson and the Black Sox. Tucson won 7-4 and I had two hits in the game, so that was nice. In the interim between games, I got to meet someone very cool. One of the honorees for the tournament was Earl Wilson, who pitched from 1959 to 1970 and threw a no-hitter for the Red Sox in 1962. He began his playing career in 1953 for the Bisbee-Douglas Copper Kings, who played in Warren. Wilson passed away in 2005, so his good friend Jim "Mudcat" Grant showed up to honor him, and he threw out the first pitch for the second game of the tournament. He also hung out and talked with anyone who wanted to. He was also around for the entire tournament, signing and selling merchandise, and talking about pitching to anyone interested. I only directly spoke to him briefly, but I listened to him talk about pitching for a good while. I didn't take notes (because, again, I'm smart.) but the two things I remember distinctly were: 1. He drew a 3x3 grid on a piece of paper and used it to show arm slot for various pitches, which I thought was cool. 2. He said that you should learn how to pitch a sinking fastball of some sort if you're able to. Before the second day of games he also sang the National Anthem, and he sounded pretty darn good. He's a very nice man, and it was an honor to meet him. He co-wrote a book that was published in 2007 called The Black Aces, which is about every African-American 20 game winner in MLB's history. I bought a photo autographed by him of him, Larry Doby, and Satchel Paige when they all were playing for the Cleveland Indians in 1958. via i753.photobucket.com The second game I played in pit the Saguaros against the Bisbee Bees. That one ended with a 5-4 walkoff win by the Saguaros, when "Knuckles" hit a game-winning double that drove home "Kid Missouri". "Bag of Malarkey" hit like one, going 0-4. The Saguaros played one game on the second day of the tournament, defeating the Colorado Territorial All-Stars 7-2, giving us a 3-0 record, and officially ending our season over .500 for the first time in our three year existence. I've had loads of fun every year I've played in the Copper City Classic, and I would suggest that if you have a day free the next time it comes around that you drive down and check it out. Check out Warren Ballpark in general if you're ever in Cochise County. The view of the mountains when you're standing in the batter's box is awesome, and it's worth checking out just because of its history. You can always donate to Friends of Warren Ballpark to help with restoration. And if you ever feel like playing Vintage Baseball here in Arizona, you should! The league is always looking for more players.
{ "pile_set_name": "OpenWebText2" }
The X-Kettle is a tiny addition to your kit collapsing to 35mm. A 1.0L safe boiling capacity is perfect for a cup of tea or cocoa on the trail. With the increasing popularity of freeze dried food the kettle is all you need for two warm meals in one boil. If you prefer fresh rice… The Sea to Summit X-Pot is a fully featured cooking pot that combines the heat-distribution of aluminum with the flexibility of silicone. The hard anodized aluminum base offers a fast boil time and the stainless steel ring embedded in the rim lends a rigidity to the silicone walls for easy lifting and stirring. Big when you need it and small when you don't. This is the ultimate bottle for the serious adventurer as well as the practically minded city dweller. Collapsible into three parts, the Pack-Up-Bottle is easy to fill up and clean. A standard-size neck allows you to add other accessories, such as a water filter, while… The 600 million left-handed people in the world now have a Spork to call their own. Spork lefty has the same sleek Scandinavian curves, ruggedness and versatility as the original Spork, only now specially designed to be used left-handed. The Delta Series by Sea to Summit is designed to be the ultimate expedition and/or outdoor dinnerware. Our patented Protex™ hex pattern base reduces surface heat so food and drink are never too hot to handle. The food grade, BPA free Nylon 66 material has an incredible strength to weight ratio. It is impervious to… The Delta Series by Sea to Summit is designed to be the ultimate expedition and/or outdoor dinnerware. Our patented Protex™ hex pattern base reduces surface heat so food and drink are never too hot to handle. The food grade, BPA free Nylon 66 material has an incredible strength to weight ratio. It is impervious to… Sea to Summit's X-Mug hold warm or cold liquids and are freestanding with flexible silicone sides. The X-Mug has a flat rigid ring around the rim to keep it sturdy and easy to drink from. The rigid ring maintains the shape of the X-Mug yet still allows it to be collapsed to a disk that… Designed with a unique roll top closure that accepts a disposable plastic garbage bag liner, the Trash Dry Sack is used as a soft garbage bin in the field or in your car. Roll the closure shut to prevent any liquids leaking out while transporting and open it up to throw your rubbish in. Fitted… Sea To Summit have now designed a Kitchen Sink light enough to carry on every bushwalk. The Ultra-Sil® Kitchen Sink is 63% lighter than their standard 10L Kitchen Sink! Ideal to uphold “Leave No Trace” ethics of washing dishes at least 100m away from water sources.
{ "pile_set_name": "Pile-CC" }
The present invention relates to an improved tarnish remover. More particularly this invention relates to a tarnish remover/metal polish containing as essential ingredients a metal iodide such as potassium iodide, an acid, and water. The tarnish removers/metal polishes of this invention are effective, safe, and low in cost. In the prior art many formulations have been proposed for removing tarnish and oxides from silver, copper, brass, and other metals. "Tarnish," as the term is used herein, embraces a film discoloration of the metal surface which occurs as a result of a chemical change in the metal as opposed to a mere physical soiling. An example is the formation of a sulfide or oxide film which is from all indications integral with the metal surface and similar to metal corrosion. The prior art formulations which have been proposed have been designed to either only remove the tarnish, etc., or to remove the tarnish, etc., and additionally repress the tendency of metal surfaces to re-tarnish or stain upon exposure to ordinary atmospheric conditions, thereby eliminating at least partially a periodic, time-consuming cleaning problem and to prevent a deterioration of the metal surfaces. The prior art tarnish removers or metal polishes designed primarily to remove tarnish and stain conventionally comprise an abrasive material and a carrier such as water, a hydrocarbon solvent, or glycerine, either with or without a soap or an emulsified agent. Tarnish removers and metal polishes designed to repress tarnish and stain have included a film-forming material in the compositions such as waxes and resins so as to leave behind a thin coating, and in addition the use of anti-tarnish components such as a mercaptan or thiourea for the prevention of retarnishing. Exemplary prior art tarnish removers or metal polishes include the compositions described in U.S. Pat. No. 2,628,199 which utilize thiourea in an acidic dip-type silver and copper cleaning composition; U.S. Pat. No. 2,691,593 which discloses silver cleaning compositions in paste or liquid form containing abrasives, an emulsifying agent, a hydrocarbon carrier and, if desired, a mercaptan or thiourea; and U.S. Pat. No. 2,841,501 which discloses a silver polish containing a mild abrasive and a long chain alkyl mercaptan as an anti-tarnishing agent. The mercaptan apparently forms a thin protective film upon the silver and prevents retarnishing. The aforesaid silver and copper cleaners and polishes are useful and have met with substantial approval. However, each has disadvantages and limitations. It has been found that certain of the acidic dip type formulations have a deleterious effect upon silverware, possibly resulting in more rapid retarnishing after the silver is again exposed to normal use and possibly causing removal of the silver surface. The compositions apparently function primarily as a cleaner and provide little or no protective coating. On the other hand, polishing compositions of the type described in U.S. Pat. No. 2,691,593, because of the hydrophobic carrier employed, are relatively difficult to wash off the silver after polishing. There is also an indication that the silver tarnishes more easily after initial cleaning. The rapid retarnishing may be a result of more exposed silver surface due to scratches on the silverware. Some polish-type formulations are believed to remove some of the metal surface when used. Additionally, a number of the prior art polishes or tarnish removers containing chemicals, such as thiourea, have toxic characteristics, some suspected to be carcinogenic, and for that reason are not well received.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Is std::move(*this) a good pattern? In order to make this code with C++11 reference qualifiers work as expected I have to introduce a std::move(*this) that doesn't sound right. #include<iostream> struct A{ void gun() const&{std::cout << "gun const&" << std::endl;} void gun() &&{std::cout << "gun&&" << std::endl;} void fun() const&{gun();} void fun() &&{std::move(*this).gun();} // <-- is this correct? or is there a better option }; int main(){ A a; a.fun(); // prints gun const& A().fun(); // prints gun&& } Something doesn't sound right about it. Is the std::move necessary? Is this a recommended use for it? For the moment if I don't use it I get gun const& in both cases which is not the expected result. (It seems that *this is implicit and lvalue reference always, which makes sense but then the only way to escape to use move) Tested with clang 3.4 and gcc 4.8.3. EDIT: This is what I understand from @hvd answer: 1) std::move(*this) is syntactically and conceptually correct 2) However, if gun is not part of the desired interface, there no reason to overload the lv-ref and rv-ref version of it. And two functions with different names can do the same job. After all the ref-qualifiers matters at the interface level, which is generally only the public part. struct A{ private: void gun() const{std::cout << "gun const&" << std::endl;} void gun_rv(){std::cout << "gun called from fun&&" << std::endl;} public: void fun() const&{gun();} void fun() &&{gun_rv();} // no need for `std::move(*this)`. }; But again, if gun is part of the (generic) interface then std::move(*this) is necessary, but only then. And also, even if gun is not part of the interface there readability advantages in not splitting the function gun as two differently named function and the cost of this is, well..., std::move(*this). EDIT 2: In retrospect this is similar to the C++98 case of const and no-const overload of the same function. In some cases it makes sense to use const_cast (another form of cast) to not repeat code and have the two functions with the same name (https://stackoverflow.com/a/124209/225186) A: Yes, *this is always an lvalue, no matter how a member function is called, so if you want the compiler to treat it as an rvalue, you need to use std::move or equivalent. It has to be, considering this class: struct A { void gun() &; // leaves object usable void gun() &&; // makes object unusable void fun() && { gun(); gun(); } }; Making *this an rvalue would suggest that fun's first call to gun can leave the object unusable. The second call would then fail, possibly badly. This is not something that should happen implicitly. This is the same reason why inside void f(T&& t), t is an lvalue. In that respect, *this is no different from any reference function parameter.
{ "pile_set_name": "StackExchange" }
Complex developmental processes that define organ morphology and cellular differentiation appear to be governed by only several signal transduction pathways, suggesting the likelihood of extensive interactions among those pathways. However, the mechanisms that coordinate the activity of different signaling cascades involved in this process remain ill defined. In this proposal, I wish to tackle this important issu by focusing on the interplay between two prominent signals that control development; the transcription coactivator Yes- associated protein (YAP), the prime target of the Hippo kinase cascade, and Sonic hedgehog (Shh) signaling. The main goals of this proposal are to 1) dissect the function of YAP in spinal cord development, and 2) define how the Shh and Hippo signaling pathways act in concert to control development in the vertebrate spinal cord. The overall hypothesis of this proposal is that YAP serves as a novel downstream effector of Shh during the control of NPC proliferation and specification of ventral cell fates in the CNS. Specifically, I postulate that the YAP-dependent signaling communicates with the Shh signaling pathway at multiple levels, providing an effective means of coordinating these two transduction cascades during neural development. I will test this hypothesis using an ensemble of molecular methods, chick embryos and mutant mice. The specific aims of this proposal are as follows: 1) to determine the role of YAP in cell-type specification during neural tube development and 2) to define how the Shh and Hippo signaling pathways act in concert to control development in the vertebrate spinal cord. Besides defining the basic mechanisms by which YAP and Shh signaling coordinate key aspects of normal CNS development, this study should also uncover important principles applicable to other signaling networks that regulate organogenesis.
{ "pile_set_name": "NIH ExPorter" }
Fish Tacos Fish tacos have never been more popular. In fact, among U.S. restaurants that serve tacos, fish is the 2nd most popular protein featured in the tacos¹ – beating out even beef and pork. How can you maximize your fish taco sales? It’s easier than you think: use wild-caught, sustainable seafood from Alaska in your fish tacos. And don’t forget to call it out! 94% of consumers say they are more likely to purchase a seafood item when the word “Alaska” is used as a menu descriptor¹, and consumers prefer wild-caught seafood to farmed by a 3-1 margin¹.
{ "pile_set_name": "Pile-CC" }
MLM System You need an MLM system for success in your network marketing business. If you’ve been struggling up to this point, I am glad you are here to learn the 4 key components of an MLM system. Without an MLM system, you don’t have a stable business. Do you agree? Is your home business where you want it to be? If not, ask yourself why. Usually, it’s because you don’t have an MLM system for success. In this article I give you the 4 key components that are the foundation for any thriving home business. For any Internet marketing business to succeed, you must learn a variety of skills like leadership, generating online leads, and how to stay accountable to you. CLICK HERE to learn about an MLM system that you can participate in regardless of which company you work with. Home Business MLM System Once you learn the foundation skills of an MLM system, you will be on your way to true success. Most of the time, our network marketing sponsor tells us to talk to a few people we know. That won’t create a profitable business for you and being stuck is not where you want to be. You need to go way beyond as described below: Mindset. Without a strong mindset, it will be difficult to build a successful network marketing business. It’s crucial that your MLM system includes personal development to help you get your mind in the right place. Only then will you have a greater chance of success. Many people ignore this and I guarantee that they don’t succeed or just quit. Be a winner in your business and develop the success mindset you need. Skill Development. Has your upline told you that your “WHY” is the most important thing you need for MLM success? Well, what if you have a strong WHY but no skills? How will you ever get to where you want to be? A success-oriented MLM system should provide you with a step-by-step blueprint of the skills you must development so you can profit for a long time. These skills include online marketing, prospecting, closing, and more. Tracking and Accountability. Going from employee to business owner is a big change! Don’t you agree? It can be a challenging transition because there is no one telling you what to do. That is why you need an MLM system that also provides you a way to track and be accountable. Results that are tracked can expand into bigger and better things. If you don’t track, how will you ever move forward? Partnership and Support. Have you ever felt alone in your home business? I know I did! It makes all the difference when you have people to partner with who are also facing the same online challenges as you. If you have any hope of success in your network marketing business, you need an MLM system formula that will help you master these 4 key components. The Biz Builder 100-day Challenge does just that. The best MLM marketing systems are not magic bullets, instead they should provide you with the true skills that will last a lifetime and create momentum in your home biz! This MLM system is a step-by-step blueprint that focuses on all this and more. Don’t take it from me, CLICK HERE and learn more about it. If you are tired being stuck without results, CLICK HERE for the same MLM system I use to give you the foundation you need for success. 7 Figure Earners Reader Interactions Comments Having a system is important, but it doesn’t have to be online and it doesn’t have to be complicated. A system might be calling 10 people a day, or having one people a week, or emailing 10 people a day. I used to be a big fan of systems, but I don’t believe in a one size fits all approach. People have different skills and personalities and you need to be able to offer a strategy that matches their personality and skills. Otherwise, they won’t do it. I appreciate your great article and hope you have a happy new year!
{ "pile_set_name": "Pile-CC" }
Ecuador Highway 15 Ecuador Highway 15 (E15) is the main coastal trunk highway of mainland Ecuador. Route description Esmeraldas Province E15 starts on the border with Colombia on a bridge over the Mataje River, in Esmeraldas Province. This section of the route is not near the coast. Near San Lorenzo, there is a connection with E10, which leads east towards Ibarra. Passing the San Lorenzo area, the trunk begins to skirt the coast through the city of Esmeraldas and the towns of Atacames and Sua. In Esmeraldas, the route links with the start of the Northern Transverse (E20), which connects with Santo Domingo in the Province of Santo Domingo de los Tsáchilas and the capital, Quito, in the province of Pichincha. At the height of the town of Shua, take the road heading south away momentarily from the coast to the town of Pedernales in the province of Manabi. Manabi Province From Cojimíes, in the province of Manabi, E15 returns to skirt the coast through the coastal town of Jama and the coastal cities of Bahia de Caraquez and Manta. In Manta, the backbone connects to the Central Cross (E30) linking it to Portoviejo, Manabi and Latacunga, Cotopaxi, the two east. South of Manta the path of the Core Pacific (E15) leads through the towns of Puerto Cayo Manabi and Puerto Lopez. Santa Elena Province Once in the Province of Santa Elena, E15 passes through a number of villages and seaside resorts of high attraction as Ayampe, Olon, Montañita, Ayangue Ballenita, etc. At the height of the city of Santa Elena, the trunk meets the Southern Cross (E40). The combined route, which carries the designation E15 / E40, extends southwest direction, culminating in the city of Salinas in the west of the Punta de Santa Elena (Point westernmost end Ecuador continental). 015
{ "pile_set_name": "Wikipedia (en)" }
DESCRIPTION (Directly taken from the application) Polycystic kidney disease (PKD) is characterized by proliferating epithelial cells, alterations in basement membrane composition, and aberrant localization of cell surface proteins. These cellular properties are consistent with a reversion of the renal epithelial cell to a more embryonic phenotype. Thus, genes regulating the differentiation and proliferation of the normal renal epithelium may be aberrantly affected in PKD and may directly contribute to the initiation and progression of the disease. This proposal will address the function of the transcription factor, Pax-2, in the development of normal and cystic renal epithelium. Pax-2 is required and sufficient for the conversion of the kidney mesenchyme to an epithelial phenotype by acting as a differentiation and proliferation stimulus. Pax-2 expression in the developing kidney is repressed as the normal epithelium matures, but is detected at higher levels in the cystic epithelium of experimental animals. The proposed experiments will determine the developmental expression pattern of Pax-2 in the cpk mouse, a well-characterized model for PKD. Furthermore, the cpk mutation will be crossed into the Krd mutant mouse that has one Pax-2 allele deleted. This genetic cross will test for modification of cpk by Pax-2 using gene dosage. If continued expression of Pax-2 in cpk mice is a proliferation stimulus, reducing the Pax-2 gene dosage may result in a slower progressing form of PKD. Additional experiments will address the regulation of the Pax-2 gene by identifying promoter elements required for tissue specific transcription. Finally, preliminary data indicates several cell adhesion molecules of the cadherin gene family may be regulated directly by Pax-2. The cadherin regulatory sequences will be cloned and tested for their ability to bind Pax-2 and mediate trans- activation. These experiments will elucidate basic molecular mechanisms of renal epithelial morphogenesis and may lead to a more complete understanding of the aberrant developmental events underlying PKD. Ultimately, understanding the regulation and function of transcription factors in renal diseases may lead to novel therapeutic interventions based on modulating gene expression.
{ "pile_set_name": "NIH ExPorter" }
* Ludendorff's police cars are based on the Albany Esperanto and the Declasse Rancher XL. The use of 1980s era police vehicles during the 2000s may indicate that Ludendorff's police force is severely underfunded. * Ludendorff's police cars are based on the Albany Esperanto and the Declasse Rancher XL. The use of 1980s era police vehicles during the 2000s may indicate that Ludendorff's police force is severely underfunded. Equipment Trivia Their Esperantos are the only ones seen in Grand Theft Auto V. Ludendorff's police cars are based on the Albany Esperanto and the Declasse Rancher XL. The use of 1980s era police vehicles during the 2000s may indicate that Ludendorff's police force is severely underfunded.
{ "pile_set_name": "Pile-CC" }
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>ADP2,1</key> <string>Developer Transition Kit</string> <key>MacBook1,1</key> <string>MacBook (Core Duo)</string> <key>MacBook2,1</key> <string>MacBook (Core 2 Duo)</string> <key>MacBook4,1</key> <string>MacBook (Core 2 Duo Feb 2008)</string> <key>MacBookAir1,1</key> <string>MacBook Air (January 2008)</string> <key>MacBookPro1,1</key> <string>MacBook Pro Core Duo (15-inch)</string> <key>MacBookPro1,2</key> <string>MacBook Pro Core Duo (17-inch)</string> <key>MacBookPro2,1</key> <string>MacBook Pro Core 2 Duo (17-inch)</string> <key>MacBookPro2,2</key> <string>MacBook Pro Core 2 Duo (15-inch)</string> <key>MacBookPro3,1</key> <string>MacBook Pro Core 2 Duo (15-inch LED, Core 2 Duo)</string> <key>MacBookPro3,2</key> <string>MacBook Pro Core 2 Duo (17-inch HD, Core 2 Duo)</string> <key>MacBookPro4,1</key> <string>MacBook Pro (Core 2 Duo Feb 2008)</string> <key>MacPro1,1</key> <string>Mac Pro (four-core)</string> <key>MacPro2,1</key> <string>Mac Pro (eight-core)</string> <key>MacPro3,1</key> <string>Mac Pro (January 2008 4- or 8- core "Harpertown")</string> <key>Macmini1,1</key> <string>Mac Mini (Core Solo/Duo)</string> <key>PowerBook1,1</key> <string>PowerBook G3</string> <key>PowerBook2,1</key> <string>iBook G3</string> <key>PowerBook2,2</key> <string>iBook G3 (FireWire)</string> <key>PowerBook2,3</key> <string>iBook G3</string> <key>PowerBook2,4</key> <string>iBook G3</string> <key>PowerBook3,1</key> <string>PowerBook G3 (FireWire)</string> <key>PowerBook3,2</key> <string>PowerBook G4</string> <key>PowerBook3,3</key> <string>PowerBook G4 (Gigabit Ethernet)</string> <key>PowerBook3,4</key> <string>PowerBook G4 (DVI)</string> <key>PowerBook3,5</key> <string>PowerBook G4 (1GHz / 867MHz)</string> <key>PowerBook4,1</key> <string>iBook G3 (Dual USB, Late 2001)</string> <key>PowerBook4,2</key> <string>iBook G3 (16MB VRAM)</string> <key>PowerBook4,3</key> <string>iBook G3 Opaque 16MB VRAM, 32MB VRAM, Early 2003)</string> <key>PowerBook5,1</key> <string>PowerBook G4 (17 inch)</string> <key>PowerBook5,2</key> <string>PowerBook G4 (15 inch FW 800)</string> <key>PowerBook5,3</key> <string>PowerBook G4 (17-inch 1.33GHz)</string> <key>PowerBook5,4</key> <string>PowerBook G4 (15 inch 1.5/1.33GHz)</string> <key>PowerBook5,5</key> <string>PowerBook G4 (17-inch 1.5GHz)</string> <key>PowerBook5,6</key> <string>PowerBook G4 (15 inch 1.67GHz/1.5GHz)</string> <key>PowerBook5,7</key> <string>PowerBook G4 (17-inch 1.67GHz)</string> <key>PowerBook5,8</key> <string>PowerBook G4 (Double layer SD, 15 inch)</string> <key>PowerBook5,9</key> <string>PowerBook G4 (Double layer SD, 17 inch)</string> <key>PowerBook6,1</key> <string>PowerBook G4 (12 inch)</string> <key>PowerBook6,2</key> <string>PowerBook G4 (12 inch, DVI)</string> <key>PowerBook6,3</key> <string>iBook G4</string> <key>PowerBook6,4</key> <string>PowerBook G4 (12 inch 1.33GHz)</string> <key>PowerBook6,5</key> <string>iBook G4 (Early-Late 2004)</string> <key>PowerBook6,7</key> <string>iBook G4 (Mid 2005)</string> <key>PowerBook6,8</key> <string>PowerBook G4 (12 inch 1.5GHz)</string> <key>PowerMac1,1</key> <string>Power Macintosh G3 (Blue &amp; White)</string> <key>PowerMac1,2</key> <string>Power Macintosh G4 (PCI Graphics)</string> <key>PowerMac10,1</key> <string>Mac Mini G4</string> <key>PowerMac10,2</key> <string>Mac Mini (Late 2005)</string> <key>PowerMac11,2</key> <string>Power Macintosh G5 (Late 2005)</string> <key>PowerMac12,1</key> <string>iMac G5 (iSight)</string> <key>PowerMac2,1</key> <string>iMac G3 (Slot-loading CD-ROM)</string> <key>PowerMac2,2</key> <string>iMac G3 (Summer 2000)</string> <key>PowerMac3,1</key> <string>Power Macintosh G4 (AGP Graphics)</string> <key>PowerMac3,2</key> <string>Power Macintosh G4 (AGP Graphics)</string> <key>PowerMac3,3</key> <string>Power Macintosh G4 (Gigabit Ethernet)</string> <key>PowerMac3,4</key> <string>Power Macintosh G4 (Digital Audio)</string> <key>PowerMac3,5</key> <string>Power Macintosh G4 (Quick Silver)</string> <key>PowerMac3,6</key> <string>Power Macintosh G4 (Mirrored Drive Door)</string> <key>PowerMac4,1</key> <string>iMac G3 (Early/Summer 2001)</string> <key>PowerMac4,2</key> <string>iMac G4 (Flat Panel)</string> <key>PowerMac4,4</key> <string>eMac</string> <key>PowerMac4,5</key> <string>iMac G4 (17-inch Flat Panel)</string> <key>PowerMac5,1</key> <string>Power Macintosh G4 Cube</string> <key>PowerMac6,1</key> <string>iMac G4 (USB 2.0)</string> <key>PowerMac6,3</key> <string>iMac G4 (20-inch Flat Panel)</string> <key>PowerMac6,4</key> <string>eMac (USB 2.0, 2005)</string> <key>PowerMac7,2</key> <string>Power Macintosh G5</string> <key>PowerMac7,3</key> <string>Power Macintosh G5</string> <key>PowerMac8,1</key> <string>iMac G5</string> <key>PowerMac8,2</key> <string>iMac G5 (Ambient Light Sensor)</string> <key>PowerMac9,1</key> <string>Power Macintosh G5 (Late 2005)</string> <key>RackMac1,1</key> <string>Xserve G4</string> <key>RackMac1,2</key> <string>Xserve G4 (slot-loading, cluster node)</string> <key>RackMac3,1</key> <string>Xserve G5</string> <key>Xserve1,1</key> <string>Xserve (Intel Xeon)</string> <key>Xserve2,1</key> <string>Xserve (January 2008 quad-core)</string> <key>iMac1,1</key> <string>iMac G3 (Rev A-D)</string> <key>iMac4,1</key> <string>iMac (Core Duo)</string> <key>iMac4,2</key> <string>iMac for Education (17-inch, Core Duo)</string> <key>iMac5,1</key> <string>iMac (Core 2 Duo, 17 or 20 inch, SuperDrive)</string> <key>iMac5,2</key> <string>iMac (Core 2 Duo, 17 inch, Combo Drive)</string> <key>iMac6,1</key> <string>iMac (Core 2 Duo, 24 inch, SuperDrive)</string> <key>iMac8,1</key> <string>iMac (April 2008)</string> </dict> </plist>
{ "pile_set_name": "Github" }
Nataliya Sherstneva Nataliya Sherstneva (born 3 March 1973) is a Ukrainian freestyle skier. She was born in Mykolaiv. She competed at the 1994 Winter Olympics in Lillehammer, where she placed fifth in women's aerials. References External links Category:1973 births Category:People from Mykolaiv Category:Living people Category:Ukrainian female freestyle skiers Category:Olympic freestyle skiers of Ukraine Category:Freestyle skiers at the 1994 Winter Olympics
{ "pile_set_name": "Wikipedia (en)" }
Q: Why does the domain of convergence change after this integration? So, while trying to derive the Taylor expansion for $\ln(x+1)$ around $x=0$, I started by using the well-known power series: $$\frac{1}{1-x}=1+x+x^2 +x^3 +... \qquad \text{when } \lvert x \rvert < 1$$ Letting $x \mapsto-x$, we get: $$\frac{1}{1+x}=1-x+x^2 -x^3 + ... \qquad \text{when } \lvert x \rvert < 1$$ So then perfoming this integration gives us: $$\begin{align*} \ln(1+x) = \int_0^x \frac{dt}{1+t} &=\int_0^x (1-t+t^2-t^3+...)dt \\ &= x-\frac{x^2}{2}+\frac{x^3}{3}- \frac{x^4}{4} +... \qquad \text{when } \vert x \rvert<1 \end{align*}$$ However, the real domain of convergence for this is $-1 < x \leq 1$ as $\ln(2) = 1- \frac{1}{2} +\frac{1}{3} - \frac{1}{4}+ ...$ So my question is why did the domain over which the original function converges in change after this integration and is there a way to predict when this happens given some power series, or should one always check the endpoints again? A: Writing $$\tag{*}\ln(1+x) = \int_0^x \frac{dt}{1+t} =\int_0^x (1-t+t^2-t^3+...)\,dt \\ = x-\frac{x^2}{2}+\frac{x^3}{3}- \frac{x^4}{4} + \ldots $$ is true for $x < 1$ because the power series converges uniformly on the compact interval $[0,x]$ (within the interval $(-1,1)$ bounded by the radius of convergence) and termwise integration is permissible. The series $1-t+t^2-t^3+...$ is neither pointwise convergent at $t=1$ nor uniformly convergent on $[0,1)$. As much as one might like to simply substitute $1$ for $x$ in (*) and conclude that $$\tag{**} \ln 2 = 1-\frac{1}{2}+\frac{1}{3}- \frac{1}{4} + \ldots ,$$ it cannot be justifed without further analysis, i.e. there are other examples of this type where it would be false. In this case, however, we can establish that the series on the RHS of (**) is convergent by the alternating series test and by Abel's theorem it follows that $$\ln 2 = \lim_{x \to 1-} \ln(1+x) = 1-\frac{1}{2}+\frac{1}{3}- \frac{1}{4} + \ldots $$ Again -- knowing only the radius of convergence is not enough information to establish this result.
{ "pile_set_name": "StackExchange" }
From Awe to Awful and Back — Advocacy for Animals is pleased this week to publish this article by M. David Feld, who is cofounder and National Program Director of GeesePeace, an international nonprofit organization dedicated to devising nonlethal and environmentally sound solutions to problems created by the presence of geese and other wildlife in human communities. From Awe Loyalty, fidelity, cooperation, heroism, and sacrifice: the mother goose and gander mate for life. They will never abandon their goslings, even under intense pressure and threats to their lives. If the parent geese do fly off, it is only a strategic ploy to allow the goslings to escape by taking advantage of their speed, agility, and ability to hide in small places. The parent geese always return. In the spring, migrating Canada geese in the Atlantic Flyway travel 1,000 or more miles to the Hudson Bay in Canada to nest in their birthplaces. It is a biological imperative that they cannot break, just as salmon must swim upstream to spawn. By April, most migrating geese are flying north. And then in October, they fly south before the northern water bodies freeze over. There are three other flyways in the United States for migratory birds like Canada geese: the Mississippi Flyway, the Central Flyway, and the Pacific Flyway. Canada geese fly in a V-formation. The lead goose in the formation reduces the air resistance for the rest and so expends more energy than the other birds. The geese change positions in the formation, taking turns at the lead so that all bear the burden of leadership. When a goose is injured or exhausted, its mate leaves the formation and stays with the injured or exhausted goose until it recovers or dies. On the migration south this may result in the mate’s own death, because a single goose will not have the advantage of flying in formation to conserve energy and therefore may not reach the temperate areas before the water bodies freeze over. In my hometown of Brooklyn, New York, migrating geese were the only noncaptive wildlife we ever saw. I remember waiting for the heralds of spring and winter each year: the sound of honking geese. Sometimes they flew low enough for me to hear the whoosh of their powerful wings as they passed overhead in magnificent V-formations, wave after wave. That was in 1956, the year the Brooklyn Dodgers finally won the World Series. To Awful Today some Canada geese are staying all year in urban and suburban areas. They seem never to migrate, and each year there are more of them. Many people in these areas consider Canada geese to be a pest. They fear that geese droppings are harmful to humans and that geese make parks, playgrounds, and beaches unusable. They believe that geese are aggressive and noisy and are destroying their lawns,sparks, and golf courses. It is a fact that they have become a danger to aircraft. What happened? Why are the resident geese not joining their migratory cousins in Canada during the great migrations? Are they just too lazy? Do they stay for the abundant sweet, freshly clipped grass and fresh water we provide in our parks and golf courses? Understanding what happened is the first step toward becoming an advocate for the Canada geese living in our urban and suburban areas. Today’s resident Canada geese are the descendants of migratory geese who were captured in the early 1900s. The flight feathers of these birds were clipped to keep them from escaping. Commercial hunters then used them as live decoys to increase their take of migratory geese. Because the captured geese were made flightless, their immediate offspring and later descendants never learned how to migrate (migratory behavior in geese is learned). Thus resident geese have no choice about whether or not to migrate—they are biologically trapped in the human communities in which they live. Some resident geese in urban and suburban communities are descended from geese that were resident in rural areas. The rural geese came to the towns and suburbs because people began to feed them or because some of them learned that they were safer in human communities than in the wild. Their goslings then treated the town or suburb (or nearby islands or marshes) as their refuge. After decades of hunting using live decoys, the migratory geese flocks were nearly gone. In the 1930s, however, the practice of using live decoys was made illegal in the United States, punishable by large fines and prison sentences. Still, by the mid 1960s, U.S. federal and state wildlife managers had become so alarmed by the continued failure of the flocks to recover that they joined conservationist, sportsman, and water-fowl groups in an extraordinary effort to increase the Canada goose population through artificial incubation of eggs in hatcheries, the use of nesting tubs to reduce predation of the nests, and relocating geese to better and safer breeding grounds. By 1990 this effort seemed to have been a great success, and wildlife managers were rightly proud of their accomplishment. Little did they know that the Canada goose would eventually be reviled as a “pest” species in some American communities. In some urban areas, where hunting is not an option (and for good reason), human residents have resorted to capturing geese and their goslings while they are flightless during the molting season (June and July) and killing them one by one by putting them in air-tight boxes which are then filled with carbon dioxide gas. This is not an acceptable way to treat innocent wildlife. And Back: The GeesePeace Approach Advocacy is not just wishful thinking. It is a process that begins with knowledge, empathy, and leadership. It ends with communities resolving the wildlife conflict and being happy about the way they did so. To advocate for Canada geese one must first understand why the Canada goose is revered by many people as a symbol of wildlife appreciation and protection. (The Canada goose is still the symbol of the US Fish and Wildlife Services Refuge System.) Then one must understand why some of these same geese are now resident all year in urban and suburban areas and coming into conflict with people. Then one must find a respectful and humane solution to the community’s problem. And then, finally, one must implement the solution in partnership with community leaders, people who wish to protect the geese, and people who find them a nuisance. This is the general approach developed by GeesePeace, a nonprofit organization that I cofounded in 1999 in my community of Lake Barcroft, Virginia, a lakeside suburb of Washington, DC. The specific elements of the GeesePeace program include: stabilizing the resident-goose population by oiling or addling goose eggs, thereby preventing them from hatching (this practice also makes it easier to flush out parent geese and other adults from nesting areas, since there are no goslings to protect); establishing a “geese-exclusion zone” by posting border collies on each body of water in an area where geese cannot be tolerated; enhancing the border collies’ effectiveness by planting tall grasses or other high vegetation, which the geese perceive as a hiding place for land predators; using chemical repellants for short periods to prevent geese from feeding in particularly sensitive areas; and establishing a no-feeding program, which may include the use of colorful and attractive signage that people are more likely to read. Collies are not used during molting season and from mid-November to mid-March, when the weather is cold, and from mid-March to mid-May, when geese are nesting. The GeesePeace solution will work in any community in which there are conflicts with urban wildlife. We simply take the “lethal option” off the table and at the same time commit ourselves to solving the problem for everyone involved, including the geese. In an instant, the negative energy of controversy is converted into the positive energy of cooperation, as everyone works together toward the same goal. In the 10 years since its founding, GeesePeace has become an organization of national and international scope. All GeesePeace programs are managed by local communities, some of which form partnerships to share resources and coordinate activities. In addition to its program for dealing with resident Canada geese, GeesePeace has also developed strategies that address the presence of deer in suburban communities and the very important problem of bird strikes with aircraft. Protecting geese from extinction is everyones obligation and protecting geese from themselves and over population is an added reponsibility. As noted, we have brought many geese back from possible extinction to “pest” status. Collies and oiling eggs are partial options that are not working in all areas. Where they do, they certainly should be employed. Fish and Game have been extremly sucessful in returning turkeys, coyotes, black bears, deer and geese and hunting is no longer working for them in keeping excess populations under control for various reasons. A bow hunter told me this week in Warren County, NJ he now sees more black bears then deer and there is virtually no limit on the number of deer that can be taken. Emotionally protecting excess animal populations does not make sense. The Govenor of NJ stopped bear hunting two years ago and a dangerous bear-people confrontation is now in the making, same as geese and airplanes. Until otherwise developed and implemented, hunting and listening to State and Federal Fish and Game authorities is our and the animals best option. commonsenseforanimals.org actually, you are incorrect about Geese never abandoning their young offspring. I was heart broken and did the wrong thing in trying to bring 3 (5-day old) gosslings back to their mom on at least 6 occasions in two days. She only wanted 2 offspring and began abandoning three right away. I was able to capture the three and return them to her, but what I saw in the next two days was terrible and I’m sorry I did not know more about what to do. I should have brought the ones she kept abandoning to a rehab center- but I didn’t know how to. Three of her goslings died within three days and I found one of them today. THey were beaten up by other geese they tried to bond with when their mom left them alone. I saw this with my own eyes and like I said, am heart broken that I didn’t figure out what to do sooner. That is sad. You did the very best you could, though, according to what you thought was right. There are a lot of wildlife rescue organizations that will help people deal with situations like this, so hopefully people reading this will learn from your sad experience. Thanks for trying, and thanks for helping increase awareness about the geese we might encounter in everyday life. We have 4 geese families on our property this year. One of the pairs only had 1 gosling. Now we are seeing a gosling all by itself and I haven’t seen the pair with the 1 gosling in a few days. The single gosling tries to join up with the other families but is chased off by an adult goose. Did the gosling’s parents abandon it? Is there something we should be doing for it? It is eating and growing normally but we feel so bad that it’s by itself. The other pairs have 8, 6, and 5 goslings so we have quite the crowd. We have a 4 acre pond and mow about 10 acres so they love it here. We have a Bird Sanctuary which protects birds in the summer. Today we found 2 goslings wandering around, shivering and calling for their mamas. Whenever they tried to find an adult momma she would chase them away and peck at them. No mamma ever showed up. We watched this for more than an hr. Then made a decision to take them to a wildlife rescue. It’s hard to know if one did the right thing. I feel that if “momma” was interested, she would have turned up. I would not have been able to sleep the night, had we not stepped in. I advocate for Canada geese in an area of Massachusetts. I need your opinion, please. Many Canada geese have made a big city park their home for about 15 years. I love them. Some people harass them and I keep defending them, contact park authorities about it, but it’s sometimes so heartbreaking to see the apathy to protect these amazing birds. I learned that park authorities want to use trained dogs to “relocate” the geese. How come can they do that if these geese don’t have the ability to migrate because they are urban Canada geese? Please, could you give me your opinion about this method to “relocate” the geese by making trained dogs to harass them for them supposedly to migrate? Is that possible? I’m concerned for these birds I am so fond of. Thanks in advance for your opinion Hi, Gonzalo, I found this information on the GeesePeace website. http://www.geesepeace.com/geesepeaceprogram/siteaversion.html They use border collies. Canada geese may not migrate, but that doesn’t mean they can’t move to a less contentious area if the dogs make it uncomfortable for them. It just means that they don’t move seasonally from one place to another. Thanks for caring about the geese, by the way. I looked at this site because I was wondering under what conditions goose parents would abandon their offspring. Last summer I captured an approximately 2-month-old gosling after it had been attacked by a snapping turtle and one of its feet and legs had been severely mangled. I took it home, as my iintention was to take it to a wildlife rehab clinic with which I was already familiar, but it was over an hour away and past closing time. I planned a trip there for the next morning. So I put it in a large box with water in a dark, quiet area of my house, but it died in my arms the next morning. This has been bothering me since. I am haunted by wondering if it would have somehow survived if I’d left it there at the pond, unable to walk, nearly unable to swim, and weeks away from flight. And why had it been abandoned by its family? I thought Canadian geese never abandoned their offspring.
{ "pile_set_name": "Pile-CC" }
[Infections in the elderly]. SPECIFIC EPIDEMIOLOGY: Respiratory infections predominate in the elderly; community acquired infections can be quite severe. In hospital, urinary infections predominate. Antibiotics must be prescribed without delay due to the less active immune response and the severe and rapid effect infection has on underlying diseases. Monitor renal function in order to adapt dosage and administration intervals to pharmacokinetic variations, notably concerning urinary excretion of many antibiotics; watch for drug interactions; beware of intolerance, more frequent than in younger patients. Wide interindividual variability suggests the need for clinical trials to study drug behavior, efficacy and tolerance in the elderly and to search for specific interaction or unexpected complications. The result would be better therapeutic options and dosages.
{ "pile_set_name": "PubMed Abstracts" }
Maria Danilova Associated Press Washington — Education Secretary Betsy DeVos’ school-choice agenda is getting a bit of a boost from the Republican tax bill, which would allow parents to use education savings accounts to pay tuition at private elementary and secondary schools. Yet some conservative groups favoring school choice say the tax bill doesn’t help low-income families. Expanding school choice — access to charter, private and other options besides neighborhood schools — has been a top priority of the Trump administration and DeVos, who has spent decades working on that front in her home state of Michigan. But nine months into her tenure, DeVos has yet to come forward with a major school choice initiative, which her supporters have been hoping for and her critics have feared. The tax proposal stops significantly short of the $20 billion school-choice project that President Donald Trump promised on the campaign trail. Under the GOP bill, parents would be able to use up to $10,000 per year from a 529 education savings account to pay for K-12 education; that account was previously restricted to college tuition and expenses. At the same time, the bill calls for phasing out the Coverdell savings account, which offered similar tools but capped the contributions at $2,000 annually, and rolling it into the 529. “This is a good step forward, reflecting that education should be an investment in individual students, not systems,” DeVos said in a statement. The American Federation for Children, a school choice advocacy group that DeVos used to head, praised the idea of expanding the 529 accounts to elementary and secondary schools students, but warned that low-income families have fallen through the cracks. John Schilling, CEO of the group, said in a statement that its members are “concerned about and focused on those families who do not have 529s, typically low-income families who aren’t able to put away those savings, who are looking for more and better educational options for their children.” Rick Hess, director of education policy at the conservative American Enterprise Institute, said that the change will have a “very modest impact,” since a 529 savings account is not tax-free and only exempts one from paying taxes on the return to investment. That, he said, doesn’t amount to much, unless the account has existed for many years. GOP revises tax bill A day after the GOP unveiled its plan promising middle-class relief, the House’s top tax-writer, Rep. Kevin Brady, released a revised version of the bill that would impose a new, lower-inflation “chained CPI” adjustment for tax brackets immediately instead of in 2023. That means more income would be taxed at higher rates over time — and less generous tax cuts for individuals and families. The change, posted on the website of the Ways and Means Committee, reduces the value of the tax cuts for ordinary Americans by $89 billion over 10 years compared with the legislation released with fanfare Thursday.
{ "pile_set_name": "OpenWebText2" }
16 The iconic face of a Red Army soldier at a war monument in Brest. Hurnievic says if Belarusians are dour, they have good reason to be. “[Belarus] is between Germany and Russia -- between two big empires -- so all our history is wars. So that’s why we want to be like a partisan in the forest, no smile, no happiness. Because we are afraid about ourselves.”
{ "pile_set_name": "OpenWebText2" }
Modulation by IBMX, fasting and experimental diabetes of glibenclamide-induced islet hormone release from the perfused rat pancreas. The impact of increased c-AMP levels, short-term fasting as well as experimental diabetes on glibenclamide-induced secretion of somatostatin, insulin and glucagon was studied in the isolated perfused rat pancreas. Dose-response curves revealed that 1 microgram/ml of glibenclamide (in the presence of 3.3 mmol/l of glucose) induced maximal stimulation of insulin and near maximal stimulation of somatostatin release, but did not significantly affect glucagon release. A combination of glibenclamide and the phosphodiesterase inhibitor IBMX synergistically and equally increased both B- and D-cell secretion. Fasting the rats for 24 h significantly suppressed the insulin and glucagon responses to glibenclamide while the concomitant somatostatin response was slightly enhanced. Rats injected with alloxan 3 days prior to perfusion were rendered either moderately diabetic or severely ill with ketoacidosis. Their insulin responses were poor or absent, respectively. In the moderately diabetic rats glibenclamide-induced somatostatin release was blunted while it was abolished in the ketotic rats. The results indicate that glibenclamide-induced B- and D-cell secretion are both modulated by c-AMP, that short-term fasting differentially affects B- and D-cell secretion and that D-cell secretion is inhibited in alloxan diabetes of short duration. It is concluded that the balance of effects by glibenclamide on hormones of the endocrine pancreas may depend on the nutritional and metabolic environment.
{ "pile_set_name": "PubMed Abstracts" }
2013's problems shredded in New York New Yorkers cast off the bad memories of 2013 by shredding them in Time Square during the annual 'Good Riddance Day' 3:09PM GMT 29 Dec 2013 The parents of a young boy stricken with cancer joined crowds of New Yorkers and visitors in Times Square in New York on Saturday to ceremoniously bid farewell to their bad memories of 2013. Bodey Johnson and his parents were hoping for good health in 2014, now that his tumour is in remission. They were among hundreds who had gathered by a shredding truck to destroy unwanted memories of 2013 ahead of News Year's eve on Tuesday. "Our son Bodey here was diagnosed last year with a tumour in his kidney and went through about seven months of chemotherapy and he's in remission now, so we were saying good riddance to cancer," said Bodey's mother Amy Johnson. The Johnson family were winners of a 'Good Riddance Day' contest, organised by Cintas document shredding company, who had installed one of their mobile shredding trucks in Times Square for the event.
{ "pile_set_name": "Pile-CC" }
Q: What's the command that Kirk gives when he turns over command? Which is correct, A or B? As he turns over the command, Kirk says A) 'You have the COM' [as in Command] or B) You have the CONN.' [as in ???] I've always assumed the former, A, is correct, but a recent television commercial for the new Star Trek app, claims B, which has left me thoroughly confused. A: The command is "you have the conn", as can be seen in this original screenplay from Star Trek: The Motion Picture KIRK: Mr. Decker, I'd like to see you in my quarters. (toward helm) You have the conn, Mr. Sulu. The term "conn" is a naval/nautical expression; One of the most important principles of ship handling is that there be no ambiguity as to who is controlling the movements of the ship. One person gives orders to the ship's engine, rudder, lines, and ground tackle. This person is said to have the "conn." — James Alden Barber, 2005, "Introduction", The Naval Shiphandler's Guide, p. 8. The etymology is lost, but it may have something to do with the conduct of the vessel.
{ "pile_set_name": "StackExchange" }
This application claims the benefit of the People's Republic of China Application No. 201110212538.5, filed on Jul. 22, 2011.
{ "pile_set_name": "USPTO Backgrounds" }
How about you call Student finance tomorrow morning? They will tell you about it. I don't think it would influence since it is based on your parents' income, but still don't take my word and call them up. (Original post by muffingg) How about you call Student finance tomorrow morning? They will tell you about it. I don't think it would influence since it is based on your parents' income, but still don't take my word and call them up. hmm.. i guess i'm just a bit worried at losing out on quite a large sum of money (Original post by Superman_Jr) Serious question guys. What day is it today? I have my phone, watch and laptop saying it's the 9th Saturday but my TV and TSR saying it's the 10th April? Sorry for hijacking this At least not on this planet. Everywhere on Earth it's either 10th or 11th April 2011. (Original post by Superman_Jr) Serious question guys. What day is it today? I have my phone, watch and laptop saying it's the 9th Saturday but my TV and TSR saying it's the 10th April? Sorry for hijacking this
{ "pile_set_name": "Pile-CC" }
LISD iViSiOn iPad Initiative iViSiON 1:1 Student iPad Program In an effort to provide students the opportunity to utilize technology as a tool for learning, Lackland ISD has made it a goal to offer students 24/7 accessibility to their learning with the 1:1 iPad program for 6th through 12th grades. As a district, we view this initiative as a way to move towards being more innovative in our classroom instruction, to integrate 21st century skills into our curriculum, and to provide inspiration and motivation to increase student engagement in and out of the classroom. Students and parents will need to sign and return the Responsible Use Guidelines/iPad Loss Loan Agreement prior to being issued an iPad. We also request that parents and students entering school after the initial parent orientation watch a 15 minute orientation video and answer some simple questions in an online course. Please email our Instructional Technologist, Lesley Denny (7-12) or Dana Kickler (PreK-6th), to receive the link to the course. If you have questions about the program, please call or email Ms. Denny. The 8 Worst Apps for Your Kids"Do you really know what your child is up to on the computer or smartphone? Technology, especially if you're a little behind the times, is deceptive; some of the worst apps and games appear as innocent ways to keep in touch with friends, but can turn into venues for inappropriate behavior." ~ www.education.com Students use texting and other forms or digital social media to communicate. Texting and online networks can be a positive experience when used appropriately. Students and parents need to understand the serious consequences that can result when digital technologies and devices are used inappropriately.
{ "pile_set_name": "Pile-CC" }
Leptomeningeal metastasis with urological presentation. The incidence of clinical leptomeningeal metastases from non-neurologic solid tumour is generally increasing as a result of better survival of systemic cancer with chemotherapy. Their presentation varies according to the neurological involvement. A case of leptomeningeal metastasis from an unknown primary source presenting with urinary incontinence as the sole complaint is reported. While urinary incontinence is common in the community and is often functional, neurogenic causes must also be considered. Urodynamic study and electrophysiological assessment are useful investigations in the exclusion of a neurogenic cause. An MRI of the spine will be required to define any anatomic lesion.
{ "pile_set_name": "PubMed Abstracts" }
Americo Sbigoli Americo (Amerigo) Sbigoli (died January 1822) was an Italian tenor. He is best known for the unusual manner of his death, as documented by the composer Giovanni Pacini. Singing the second tenor part in a performance of Pacini's opera Cesare in Egitto, Sbigoli took part in a vocal quintet with first tenor Domenico Donzelli. In the course of the quintet, Sbigoli's character was to sing a phrase "closely resembling one sung just previously by Donzelli". Attempting to match Donzelli's powerful voice, Sbigoli overstrained himself, burst a blood vessel in his neck, and died shortly thereafter. While tragic in and of itself, this incident also had a small but significant impact on the course of music history, as Sbigoli was scheduled to sing the role of Abenamet in the premiere of Gaetano Donizetti's opera Zoraida di Granata at the Teatro Argentina. No other tenors were available to replace Sbigoli, and the premiere was no more than a week or two thereafter, on January 28; thus, Donizetti had to hurriedly revise the opera, transforming the tenor Abenamet —a military general— into a newly created role for female contralto. Despite this last-minute revision, the opera was hugely acclaimed upon its premiere, and marked Donizetti's first major success, boosting his career immeasurably. According to the diary of Prince Agostino Chigi, the Teatro Argentina held a benefit on Feb. 15, 1822 for the widow and children of Americo Sbigoli, raising six thousand lire. References Category:Year of birth missing Category:1822 deaths Category:Italian operatic tenors Category:Musicians who died on stage Category:19th-century Italian opera singers Category:19th-century male singers
{ "pile_set_name": "Wikipedia (en)" }