text
stringlengths
0
2.82M
meta
dict
My Hero Academia Season 2- Episode 18 After last weeks episode, I was really curious what they had in store for us this week. How the heroes will come back to Earth after such a traumatic experience. And good thing for us, this episode is rightly named “The Aftermath of Hero Killer: Stain”. My Hero Academia- Funimation We open with Izuku, Iida, and Todoroki all in the hospital. They are all recovering from their tremendous fight. But also reflecting how lucky they are to be alive still. The door opens and we see Gran Torino and Pro Hero Manual. First thing Gran Torino does of course is scold Midoriya. But before Gran Torino goes full instructor on him, he tells the boys that they have a visitor. My Hero Academia- Funimation A tall figure turns the corner wearing a professional business suit. It’s Hosu’s chief of police, Kenji Tsuragamae. Who also happens to look like a dog (just go along with it I guess?). Kenji tells the boys that Stain is in custody and is being treated for several broken bones and serious burns. He also reminds them that what they have done was not okay on paper. Uncertified heroes using their Quirks against their instructors orders is highly frowned upon. But Todoroki is not taking it. He tells the chief that if Iida didn’t step in, then Pro Hero Native would have been killed. And the both of them would have been killed without Izuku’s help. But Gran Torino tells Todoroki to hear the chief out. Kenji tells them that the punishment would only happen if this was made public. And the people would applaud their efforts anyway. But if the police kept it quiet, no one gets punished, but the boys don’t get the praise they deserve. Instead Endeavor will get the praise from the masses. It would also explain Stain’s burn scars. So they choose to not be celebrated as heroes and apologize anyways. But Kenji tells them he respects what they did and he thanks them for protecting the peace. So it has hit the news that Endeavor has stopped hero killer Stain and the nomus from destroying Hosu City. It’s all anyone is talking about. Meanwhile, we get a look at how everyone else from Class 1-A is doing in their internship programs. First we look at Bakugo who is having a less than stellar time. The first thing he wants to do is go knock some heads around but his mentor is not allowing him and says it will be business as usual. Hopefully that could help Bakugo control his temper. Kirishima finds out the reason why Midoriya sent him his location. Apparently he also reported the incident last night. Go Kirishima! Momo debuted in a commercial with her mentor and it seems obvious modelling is not what she wants to be doing. But her mentor is letting her go on patrol like she has wanted since the start of their training together. My Hero Academia- Funimation And finally there is Uraraka who is on the phone with Midoriya. She tells him how glad she is that they are all safe. Midoriya of course apologizes for not contacting sooner but she understands. In the midst of the conversation, Uraraka’s mentor Gunhead reminds her that they are going to start their basic training. She then says bye to Midoriya and Gunhead asks in a very cute way, “Your boyfriend?”. And she immediately dismisses it. When Midoriya hangs up he gets all worked up that he talked to a girl on the phone. This scene was my favorite from this episode it had me busting up! We get back to the guys in the hospital and Iida comes out and tells the two that he may have long-term damage in his hand. But he reflects on his actions from that night and regrets them greatly. He shouldn’t have acted so swiftly and carelessly. But Midoriya doesn’t let Iida beat himself up too much. He agrees that him and Iida should get stronger together. My Hero Academia- Funimation We cut to U.A. with All Might in the staff room. He gets a phone call from Gran Torino. He tells All Might that he has had his teaching licence revoked for six months because of Midoriya’s actions but there was no way of avoiding that and that he has come to terms with it. But All Might is very ashamed of himself for letting down his former instructor. But this isn’t the reason Gran Torino called. He really wants to talk about Stain. He says in the few minutes he was with him, it had him trembling. It was because of how intimidating and obsessed he was on what he think a hero should be and what he will do to correct our society. Because this has hit so many news stations, Stains ideology and opinions will be put on blast. People will become influenced by Stain’s beliefs and become a plague. But All Might doesn’t believe it will be a problem because they will probably show up sporadically and they will be taken out 1 by 1. But this is where the League of Villains comes in. If they all combine their hatred and Shigaraki gives them an outlet to express and deal with their evil intentions, it will become a serious problem. Gran Torino then reminds All Might that he must tell Midoriya properly what is concerning him and One for All. Which I have no idea what that is all about. Apparently the quirk is “on the move”? I’m interested in what that might mean. This episode was mostly a lot of dialogue and context but it was needed after such a shift in the story. It was refreshing getting some insight on how everyone else is doing too. I’m hoping next time they elaborate on what is concerning All Might and what is happening with his quirk? Only time will tell.
{ "pile_set_name": "Pile-CC" }
This invention relates to a metal-cutting milling tool. Such tools are known that comprise a body rotatable around a central geometric axis, which body has a peripheral envelope surface extending between opposite end surfaces. In the envelope surface, recesses are provided which open outwards, each recess defined by a front wall, a rear wall and a bottom wall and has the purpose of receiving a machining element (e.g., a cassette which carries a cutting insert) as well as at least one clamping wedge arranged in the recess for fixing the machining element in place. The clamping wedge can be tightened by means of a clamping screw which enters a threaded hole formed in the bottom wall of the recess. The rear wall of the recess has first serrations arranged to co-operate with second serrations disposed on a rear side of the machining element, while the front wall is smooth in order to cooperate with a similar smooth front surface on the clamping wedge. A contact surface on the clamping wedge and a front contact surface on the machining element are both smooth in order to allow a substantially radial displacement of the clamping wedge in relation to the machining element during the clamping thereof.
{ "pile_set_name": "USPTO Backgrounds" }
The Effects of Event Rate on a Cognitive Vigilance Task. The present experiment sought to examine the effects of event rate on a cognitive vigilance task. Vigilance, or the ability to sustain attention, is an integral component of human factors research. Vigilance task difficulty has previously been manipulated through increasing event rate. However, most research in this paradigm has utilized a sensory-based task, whereas little work has focused on these effects in relation to a cognitive-based task. In sum, 84 participants completed a cognitive vigilance task that contained either 24 events per minute (low event rate condition) or 40 events per minute (high event rate condition). Performance was measured through the proportion of hits, false alarms, mean response time, and signal detection analyses (i.e., sensitivity and response bias). Additionally, measures of perceived workload and stress were collected. The results indicated that event rate significantly affected performance, such that participants who completed the low event rate task achieved significantly better performance in terms of correction detections and false alarms. Furthermore, the cognitive vigil utilized in the present study produced performance decrements comparable to traditional sensory vigilance tasks. Event rate affects cognitive vigilance tasks in a similar manner as traditional sensory vigilance tasks, such that a direct relation between performance and level of event rate was established. Cognitive researchers wishing to manipulate task difficulty in their experiments may use event rate presentation as one avenue to achieve this result.
{ "pile_set_name": "PubMed Abstracts" }
Located on the Kefalonia Island in Greece, this spectacular cave was lost for centuries until being rediscovered in 1951 by Giannis Petrocheilos. Take a look at this beautiful cave system and the island that it is part of. The famous Mytros Beach is also on this island. In Greek mythology it is believed that Nymph's used to live in these caves.
{ "pile_set_name": "Pile-CC" }
Vale de Lua – Moon Surface on Earth The valley terrain is all covered with rock formations and intricate labyrinths created by nature. In ancient times, there were deposits of quartz. But the noisy river San Miguel has streamed lots of passages over the years. Now, quartz rocks hang over the pond and the holes of different shapes remind those seen on the moon. Due to the different degrees of refraction of light water in some places seems to be dark blue, in other - clear and transparent. Dark brown and almost black, sometimes bluish-gray rocks vary in height and shape. Such miracle undoubtedly shows that the forces of nature are capable of creating the most unusual landscapes. In Brazil, Vale de Lua unusual relief appeared also due to the presence of sand. Gradually, layer after layer, it was brought there with river’s stream, settled on the coastal cliffs and formed numerous mounds an unusual shape. If looking a little closer you will notice that in some places the quartz rock thinned to such an extent that its thickness does not exceed the thickness of a sheet of paper. The magnificent landscape of small lakes is completed with waterfalls.
{ "pile_set_name": "Pile-CC" }
United States Court of Appeals For the Eighth Circuit ___________________________ No. 12-3842 ___________________________ Barbara Hager lllllllllllllllllllll Plaintiff - Appellee v. Arkansas Department of Health; Namvar Zohoori, individually and in his official capacity lllllllllllllllllllll Defendants - Appellants ____________ Appeal from United States District Court for the Eastern District of Arkansas - Little Rock ____________ Submitted: September 24, 2013 Filed: November 14, 2013 ____________ Before LOKEN, COLLOTON, and BENTON, Circuit Judges. ____________ BENTON, Circuit Judge. Barbara Hager was fired from the Arkansas Department of Health by her supervisor, Dr. Namvar Zohoori. Hager sued Dr. Zohoori and the Department for statutory and constitutional violations. The district court granted, in part, their motion to dismiss. They appeal. Having jurisdiction under 28 U.S.C. § 1291 over Dr. Zohoori’s appeal, this court reverses and remands. I. Hager claims that in May 2011, her branch chief and supervisor, Dr. Zohoori, instructed her to cancel a doctor’s appointment (necessary, she says, to prevent cataracts) in order to discuss a report. When she refused, she alleges Dr. Zohoori became irritated and falsely claimed she was insubordinate and disrespectful. Four days later, he terminated her without explanation. Hager sued Dr. Zohoori, in his individual and official capacities, and the Department alleging violations of Title VII of the Civil Rights Act of 1964, the Equal Protection and Due Process Clauses of the Constitution (§ 1983 claim), the Age Discrimination and Employment Act, the Rehabilitation Act, and the Family and Medical Leave Act (FMLA). Dr. Zohoori and the Department moved to dismiss for failure to state a claim and sovereign immunity. The district court denied their motion in part, allowing three claims against Dr. Zohoori in his individual capacity (§ 1983 gender discrimination, FMLA “interference,” and FMLA “retaliation”) and two claims against the Department (Title VII and Rehabilitation Act). They appeal. II. Hager objects to this court’s jurisdiction over Dr. Zohoori’s appeal, arguing it turns on issues of factual sufficiency. A denial of qualified immunity is an appealable “final decision” only “to the extent it turns on an issue of law.” Mitchell v. Forsyth, 472 U.S. 511, 530 (1985). Hager relies on cases reviewing a denial of summary judgment based on qualified immunity. See Johnson v. Jones, 515 U.S. 304, 313-14 (1995) (holding that where a district court’s summary judgment order on qualified immunity turns on the issue of evidence sufficiency—“which facts a party may, or -2- may not, be able to prove at trial”—the order is not appealable); Powell v. Johnson, 405 F.3d 652, 654-55 (8th Cir. 2005). In Ashcroft v. Iqbal, the Supreme Court determined the jurisdiction of a court of appeals in a case like Hager’s—denial of a motion to dismiss based on qualified immunity: As a general matter, the collateral-order doctrine may have expanded beyond the limits dictated by its internal logic and the strict application of the criteria set out in Cohen. But the applicability of the doctrine in the context of qualified-immunity claims is well established; and this Court has been careful to say that a district court’s order rejecting qualified immunity at the motion-to-dismiss stage of a proceeding is a “final decision” within the meaning of § 1291. Behrens, 516 U.S., at 307, 116 S. Ct. 834. Applying these principles, we conclude that the Court of Appeals had jurisdiction to hear petitioners’ appeal. The District Court’s order denying petitioners’ motion to dismiss turned on an issue of law and rejected the defense of qualified immunity. It was therefore a final decision “subject to immediate appeal.” Ibid. Respondent says that “a qualified immunity appeal based solely on the complaint’s failure to state a claim, and not on the ultimate issues relevant to the qualified immunity defense itself, is not a proper subject of interlocutory jurisdiction.” Brief for Respondent Iqbal 15 (hereinafter Iqbal Brief). In other words, respondent contends the Court of Appeals had jurisdiction to determine whether his complaint avers a clearly established constitutional violation but that it lacked jurisdiction to pass on the sufficiency of his pleadings. Our opinions, however, make clear that appellate jurisdiction is not so strictly confined. Iqbal, 556 U.S. 662, 672-73 (2009). -3- Here, Dr. Zohoori challenges the sufficiency of Hager’s pleadings to state § 1983, FMLA “interference,” and FMLA “retaliation” claims. This is an issue of law over which this court has jurisdiction. See id. at 672-74; Bradford v. Huckabee, 394 F.3d 1012, 1015 (8th Cir. 2005). See also Rondigo, L.L.C. v. Township of Richmond, 641 F.3d 673, 679 (6th Cir. 2011). III. This court reviews de novo the denial of a motion to dismiss on the basis of qualified immunity. Bradford, 394 F.3d at 1015. A complaint must “state a claim to relief that is plausible on its face.” Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 570 (2007). Under Federal Rule of Civil Procedure 12(b)(6), the factual allegations in the complaint are accepted as true and viewed most favorably to the plaintiff. Gross v. Weber, 186 F.3d 1089, 1090 (8th Cir. 1999). Courts must not presume the truth of legal conclusions couched as factual allegations. Papasan v. Allain, 478 U.S. 265, 286 (1986). Courts should dismiss complaints based on “labels and conclusions, and a formulaic recitation of the elements of a cause of action.” Twombly, 550 U.S. at 555. Under the doctrine of qualified immunity, a court must dismiss a complaint against a government official in his individual capacity that fails to state a claim for violation of “clearly established statutory or constitutional rights of which a reasonable person would have known.” Harlow v. Fitzgerald, 457 U.S. 800, 818 (1982). See also Iqbal, 556 U.S. at 685; Mitchell, 472 U.S. at 526 (“Unless the plaintiff’s allegations state a claim of violation of clearly established law, a defendant pleading qualified immunity is entitled to dismissal before the commencement of discovery.”). A court considers whether the plaintiff has stated a plausible claim for violation of a constitutional or statutory right and whether the right was clearly established at the time of the alleged infraction. Powell, 405 F.3d at 654-55. See Pearson v. Callahan, 555 U.S. 223, 236 (2009) (“[D]istrict courts and the courts of -4- appeals should be permitted to exercise their sound discretion in deciding which of the two prongs of the qualified immunity analysis should be addressed first in light of the circumstances in the particular case at hand.”). A. The § 1983 claim against Dr. Zohoori individually (Count I) alleges that Hager was “a victim of gender discrimination . . . and has been denied her right of equal protection of the law and due process of the law.” Specifically, she contends she “was discharged under circumstances summarily [sic] situated nondisabled males . . . were not.” “[T]he Equal Protection Clause requires that the government treat such similarly situated persons alike.” Keevan v. Smith, 100 F.3d 644, 648 (8th Cir. 1996), citing City of Cleburne v. Cleburne Living Ctr., Inc., 473 U.S. 432, 439 (1985); Klinger v. Department of Corrs., 31 F.3d 727, 731 (8th Cir. 1994). Absent evidence of direct discrimination, courts apply the McDonnell Douglas burden- shifting analysis to claims of employment discrimination under the Equal Protection Clause. Lockridge v. Board of Trs. of Univ. of Arkansas, 315 F.3d 1005, 1010 (8th Cir. 2003) (en banc). Under McDonnell Douglas, a prima facie case of discrimination requires that a plaintiff prove: “(1) membership in a protected group; (2) qualification for the job in question; (3) an adverse employment action; and (4) circumstances that support an inference of discrimination.” Swierkiewicz v. Sorema N. A., 534 U.S. 506, 510 (2002), citing McDonnell Douglas Corp. v. Green, 411 U.S. 792, 801 (1973). Dr. Zohoori argues that Hager does not state a § 1983 claim for gender discrimination because her allegation—that she “was discharged under circumstances summarily [sic] situated nondisabled males, younger people, or those that did not require leave or accommodation were not”—is a legal conclusion. Hager contends -5- her “similarly situated” allegation is sufficient because McDonnell Douglas is “an evidentiary standard, not a pleading requirement.” Swierkiewicz, 534 U.S. at 510; Ring v. First Interstate Mortg., 984 F.2d 924, 926 (8th Cir. 1993). Under Swierkiewicz, a plaintiff need not plead facts establishing a prima facie case of discrimination under McDonnell Douglas in order to defeat a motion to dismiss. Swierkiewicz, 534 U.S. at 510-11. The complaint “must contain only ‘a short and plain statement of the claim showing the pleader is entitled to relief.’” Id. at 508. “Such a statement must simply ‘give the defendant fair notice of what the plaintiff’s claim is and the grounds upon which it rests.’” Id. at 512, citing Conley v. Gibson, 355 U.S. 41, 47 (1957). In Twombly, the Supreme Court stated that Swierkiewicz did not change the law of pleading. Twombly, 550 U.S. at 569. Rather, courts need “not require heightened fact pleading of specifics, but only enough facts to state a claim to relief that is plausible on its face.” Id. at 570. “[L]egal conclusions can provide the framework of a complaint” but “must be supported by factual allegations,” Iqbal, 556 U.S. at 679, that “raise a right to relief above the speculative level.” Twombly, 550 U.S. at 555. Thus, this court applies “the ordinary rules for assessing the sufficiency of a complaint,” Swierkiewicz, 534 U.S. at 511, to consider whether Hager states a § 1983 claim for gender discrimination. See Twombly, 550 U.S. at 570. Hager relies primarily on Swierkiewicz. However, her complaint has far fewer factual allegations than the complaint there. In Swierkiewicz, the complaint for age and nationality discrimination alleged: the plaintiff was demoted and replaced by a younger employee of the employer’s nationality; the replacement was inexperienced; in promoting the younger, inexperienced employee, the employer wanted to “energize” the department; the employer excluded and isolated plaintiff from business decisions and meetings; plaintiff sent a memo outlining his grievances and tried to -6- meet with the employer to discuss his discontent; and plaintiff was fired. Swierkiewicz, 534 U.S. at 508-09. Hager makes only two conclusory allegations of gender discrimination: (1) she “is a victim of gender discrimination;” and (2) she “was discharged under circumstances summarily [sic] situated nondisabled males . . . were not.” She does not allege any gender-related comments or conduct before her termination. See Rondigo, 641 F.3d at 682 (granting qualified immunity in part because the complaint contained no allegations of gender-based discriminatory actions). She also does not allege facts showing that similarly situated employees were treated differently. See Coleman v. Maryland Court of Appeals, 626 F.3d 187, 190-91 (4th Cir. 2010) (plaintiff’s conclusory allegation that he “was treated differently as a result of his race than whites”—even where plaintiff identified an alleged comparator—was insufficient to sustain a Title VII claim because no factual allegations plausibly suggested the comparator was similarly situated). See also Keevan, 100 F.3d at 648 (“To establish a gender-based claim under the Equal Protection Clause, the appellants must, as a threshold matter, demonstrate that they have been treated differently by a state actor than others who are similarly situated simply because appellants belong to a particular protected class.”). In sum, Hager does not state a § 1983 claim for gender discrimination. Hager’s allegation that she is the victim of gender discrimination fails to give Dr. Zohoori fair notice of the claim and the grounds upon which it rests. See Swierkiewicz, 534 U.S. at 512. Hager’s conclusory assertion that she was discharged under circumstances similarly situated men were not imports legal language couched as a factual allegation and fails to raise a right to relief above the speculative level. See Twombly, 550 U.S. at 555. The district court erred in denying Dr. Zohoori’s motion to dismiss the § 1983 claim. -7- B. Hager alleges a claim for “interfering with exercise of Plaintiff’s rights under the FMLA.” Under the categorization in Pulczinski v. Trinity Structural Towers, Inc., 691 F.3d 996 (8th Cir. 2012), Hager’s “interference” claim is an entitlement claim. Pulczinski, 691 F.3d at 1005-06. “The FMLA entitles an employee to twelve workweeks of leave during any twelve-month period if he or she has a ‘serious health condition that makes the employee unable to perform the functions of the position of such employee.’” Sisk v. Picture People, Inc., 669 F.3d 896, 899 (8th Cir. 2012), quoting Wierman v. Casey’s Gen. Stores, 638 F.3d 984, 999 (8th Cir. 2011), quoting 29 U.S.C. § 2612(a)(1)(D). An FMLA entitlement claim arises when an employer denies or interferes with an employee’s substantive FMLA rights. Scobey v. Nucor Steel-Arkansas, 580 F.3d 781, 785 (8th Cir. 2009). An employee seeking FMLA leave must give the employer notice of the need for leave and indicate when she anticipates returning to work. Id. at 785-86. See also Rynders v. Williams, 650 F.3d 1188, 1196-97 (8th Cir. 2011) (plaintiff must prove she gave timely notice to defendant himself). Although the notice need not specifically invoke the FMLA, an employee “must provide information to suggest that [her] health condition could be serious.” Scobey, 580 F.3d at 786. When the leave is foreseeable, the employee must give at least thirty days notice. 29 C.F.R. § 825.302. When the leave is not foreseeable, “an employee must provide notice to the employer as soon as practicable under the facts and circumstances of the particular case.” 29 C.F.R. § 825.303. Hager alleges that she “saw a physician regularly for her cataracts,” but “[o]n May 13, 2011, [Dr. Zohoori] instructed her to cancel the doctor’s appointment so she and he could discuss a report.” She also avers that she explained “the reason she needed to go to the doctor,” that “she could not cancel the appointment,” and why she could not cancel. These allegations do not state an FMLA entitlement claim. While -8- Hager alleges that she provided information suggesting a serious health condition, she does not allege that she provided timely notice. Hager’s pleadings at best suggest Dr. Zohoori was aware of her leave request immediately prior to the appointment. They do not assert that she provided notice within thirty days or “as soon as practicable under the circumstances.” Nor do they assert that she indicated when she would return. See generally Bosley v. Cargill Meat Solutions Corp., 705 F.3d 777, 780 (8th Cir. 2013) (there is a “rigorous notice standard for employees seeking to use FMLA leave for absences”). The district court erred in denying Dr. Zohoori’s motion to dismiss the FMLA entitlement claim. C. Hager also alleges a claim for “retaliating against her.” Under the categorization in Pulczinski, Hager’s “retaliation” claim is a discrimination claim. Pulczinski, 691 F.3d at 1006. In a discrimination claim, “the employee alleges that the employer discriminated against her for exercising her FMLA rights.” Sisk, 669 F.3d at 899, quoting Wierman, 638 F.3d at 999. Absent direct evidence, an FMLA discrimination claim is analyzed under the McDonnell Douglas burden-shifting framework. Sisk, 669 F.3d at 899. The plaintiff must “show that she exercised rights afforded by the Act, that she suffered an adverse employment action, and that there was a causal connection between her exercise of rights and the adverse employment action.” Phillips v. Mathews, 547 F.3d 905, 912 (8th Cir. 2008), quoting Smith v. Allen Health Sys., Inc., 302 F.3d 827, 832 (8th Cir. 2002). This is an evidentiary, not a pleading, standard. Swierkiewicz, 534 U.S. at 510. Hager alleges that Dr. Zohoori discriminated against her—firing her—because she exercised her FMLA rights—tried to take leave for a doctor’s appointment, which was “necessary to insure that [her] condition did not develop into a serious health -9- condition, cataracts.” If Hager had properly alleged notice, these allegations would be sufficient. See Wehrley v. American Family Mut. Ins. Co., 513 Fed. Appx. 733, 742 (10th Cir. 2013) (“Three other circuits have concluded that notifying an employer of the intent to take FMLA leave is protected activity. . . . We are persuaded to follow these circuits.”), citing Pereda v. Brookdale Senior Living Communities, Inc., 666 F.3d 1269, 1276 (11th Cir. 2012); Erdman v. Nationwide Ins. Co., 582 F.3d 500, 509 (3d Cir. 2009); Skrjanc v. Great Lakes Power Serv. Co., 272 F.3d 309, 314 (6th Cir. 2001). However, because Hager failed to plead notice of intent to take FMLA leave, and that she was qualified for that leave, she has not sufficiently alleged that she exercised FMLA rights. See Nicholson v. Pulte Homes Corp., 690 F.3d 819, 828 (7th Cir. 2012) (“The district court held that because Nicholson did not provide sufficient notice of the need for FMLA-qualifying leave, she never engaged in any activity protected by the FMLA. For the reasons we have explained, we agree.”). The district court erred in denying Dr. Zohoori’s motion to dismiss the FMLA discrimination claim. IV. Although Hager did not move to amend the complaint in the district court—where the relevant pleadings were found sufficient—she requests remand to allow an amended complaint for any claims insufficiently pled. Hager should be no worse off, and no better off, than she would have been if the district court had granted the motion to dismiss. See Horras v. American Capital Strategies, Ltd., 729 F.3d 798, 804-05 (8th Cir. 2013) (evaluating standards applicable to post-judgment motions). This court remands for the district court to consider whether to allow Hager to amend her pleadings. See Zenith Radio Corp. v. Hazeltine Research, Inc., 401 U.S. 321, 330 (1971) (granting leave to amend is within the discretion of the district court). -10- V. The Arkansas Department of Health requests that this court exercise its pendent appellate jurisdiction to review the district court’s partial denial of its motion to dismiss. See Langford v. Norris, 614 F.3d 445, 457 (8th Cir. 2010) (“[W]hen an interlocutory appeal is before us . . . as to the defense of qualified immunity, we have jurisdiction also to decide closely related issues of law, i.e., pendent appellate claims.”) (internal quotation marks omitted), quoting Kincade v. City of Blue Springs, Mo., 64 F.3d 389, 394 (8th Cir. 1995). The Department maintains that Hager’s claims against it are inextricably intertwined with her claims against Dr. Zohoori. The Department reasons that if Hager’s “similarly situated” allegation does not sustain her § 1983 and FMLA discrimination claims against Dr. Zohoori, it cannot sustain her Title VII and Rehabilitation Act claims against the Department. “[A] pendent appellate claim can be regarded as inextricably intertwined with a properly reviewable claim on collateral appeal only if the pendent claim is coterminous with, or subsumed in, the claim before the court on interlocutory appeal—that is, when the appellate resolution of the collateral appeal necessarily resolves the pendent claim as well.” Kincade, 64 F.3d at 394, quoting Moore v. City of Wynnewood, 57 F.3d 924, 930 (10th Cir. 1995). See also Lockridge, 315 F.3d at 1012. Here, resolution of the “similarly situated” issue may illuminate the Department’s argument that Hager failed to state a claim against it. However, the Department’s claims are not coterminous with or subsumed in Dr. Zohoori’s claims. Hager sues under different statutes, and the Department cannot invoke qualified immunity. This court does not have jurisdiction to hear the Department’s appeal. ******* -11- The denial of Dr. Zohoori’s motion to dismiss the § 1983 claim, the FMLA entitlement claim, and the FMLA discrimination claim is reversed. This case is remanded for proceedings consistent with this opinion. ______________________________ -12-
{ "pile_set_name": "FreeLaw" }
Micro-Loan Program In order to promote economic development in the City of Alamo, the Alamo EDC established the Alamo Small Business Micro-Loan Program (MLP) with assistance from USDA – Rural Development. The MLP is a self-sustaining project that works by lending money to local businesses, with the money paid back plus interest being reused. The following documents must be submitted for a loan application: Application form. An executive summary with three years of financial projections. A project budget. A personal financial statement. Two years of income tax returns – business and/or personal (for the most current years). Year-end financial statement(s) from an existing organization. Balance sheet(s) (yearly). Profit and loss statement(s) (last quarter). A minimum of two bids from non-related third-party vendors/contractors. A credit report (to be conducted by AEDC), steps for loan process. Filling out the loan application: Must submit all documents to AEDC via mail or hand delivery. The AEDC begins the loan application review to determine eligibility. The applicant will be notified of eligibility status. If eligible, the loan application will be presented to the Loan Review Committee. A committee recommendation will be presented to the AEDC Board for final approval. The applicant will be notified of the board’s decision to approve or deny the loan application as well as loan-specific terms, when applicable.
{ "pile_set_name": "Pile-CC" }
Ability of MR cholangiography to reveal stent position and luminal diameter in patients with biliary endoprostheses: in vitro measurements and in vivo results in 30 patients. Our goal was to evaluate the ability of MR cholangiography to show stent position and luminal diameter in patients with biliary endoprostheses. Susceptibility artifacts were evaluated in vitro in three different stent systems (cobalt alloy-based, nitinol-based, and polyethylene) using two breath-hold sequences (rapid acquisition with relaxation enhancement, half-Fourier acquisition single-shot turbo spin echo) on a 1.5-T MR imaging system. The size of the stent-related artifact was measured, and the relative stent lumen was calculated. In vivo stent position and patency were determined in 30 patients (10 cobalt alloy-based stents, five nitinol-based stents, and 15 polyethylene stents). In vitro, the susceptibility artifact of the cobalt stent caused complete obliteration of the stent lumen. The relative stent lumens of the nitinol-based and polyethylene stents were 38-50% and 67-100%, respectively. In vivo, all stents were patent at the time of imaging. The position of the cobalt alloy-based stent could be determined in nine of 10 patients, but stent patency could not be evaluated. Stent position of nitinol stents could not be adequately evaluated in any of the five patients, and internal stent diameter could be visualized in only one patient. In nine of 15 patients, the fluid column within the implanted polyethylene stent was seen on MR cholangiography. The internal stent lumen could be visualized in most patients with an indwelling polyethylene stent, but not in patients with cobalt alloy- or nitinol-based stents.
{ "pile_set_name": "PubMed Abstracts" }
The Doom Generation (1995) October 25, 1995 FILM REVIEW;Gory Kitsch in a Parody of Teen-Age Road Movies By JANET MASLIN Published: October 25, 1995 Production notes for Gregg Araki's "Doom Generation" say it is "Araki's first big-budget feature and marks the end of his film adolescence." Well, not exactly. After a promising debut with "The Living End" followed by the angrier, more marginalized "Totally F***ed Up," Mr. Araki is still sounding a note of self-congratulatory teen-age rebellion in a film gruesome and obvious enough to make "Natural Born Killers" look like a model of restraint. It's not even much of a change to find "The Doom Generation" billed as "a heterosexual movie," since it shares the effective homoerotic energy of his earlier work. That this film includes a teen-age girl, Amy Blue (Rose McGowan), as part of its sexual menage only means one especially clear target of contempt ("Don't get your uterus all tied in a knot" is one of the more printable things anyone says to her) in a film overflowing with it. Amy's insolence and Anna Karina hairdo (like Uma Thurman's in "Pulp Fiction") may offer a touch of Godard. But this film's satire of teen-age-wasteland cinema is so coarsely exaggerated that any homage is beside the point. Using outlaw characters named Red, White and Blue to condemn all aspects of unhip America, Mr. Araki indulges in such broad parody that thinking it clumsy means failure to get the joke. Though visibly more polished than his earlier films, "The Doom Generation" clings to a midnight movie sensibility founded on deliberate kitsch. So Amy is a one-note, rude, sulky heroine, saying things like "Life is lonely, boring and dumb" while the two men she's sleeping with enjoy an obvious attraction to each other. Not content to leave this as subtext, Mr. Araki throws in the occasional bumper sticker: "Ditch the bitch. Make the switch." Voluptuous Xavier Red (Johnathon Schaech) is way ahead of charmingly dim Jordan White (James Duval) in getting the hint about this, but it doesn't matter: "The Doom Generation" leads them both to a gory demonstration of America's intolerance toward sexual nonconformists. Obscured by strobe lights and boosted by the alternative-rock soundtrack that's sure to help sell the movie, this already notorious castration sequence is one of several gross-out epiphanies here. Others include the severing of a head that still talks, and even vomits, after it is removed from a vein-spurting body, and a blink-of-the-eye cameo by Heidi Fleiss. The genuine enthusiasm Mr. Araki brings to this film's bedroom scenes, with their whimsical sets and jokey porn ambiance, is matched by the occasionally workable black humor in his screenplay. ("You murdered two people tonight. Doesn't that faze you at all?" "Yeah, I'm bummed. To the max.") But sledgehammer direction, heavy irony and the easiest imaginable targets hardly show talent off to good advantage. THE DOOM GENERATION Written, edited and directed by Gregg Araki; director of photography, Jim Fealy; music by the Jesus and Mary Chain, Nine Inch Nails, Showdive, Curve, Meat Beat Manifesto, Pizzicato Five, Cocteau Twins and others; production designer, Therese Deprez; produced by Andrea Sperling, Mr. Araki and Why Not Productions (France); released by Trimark Pictures. At the Angelika Film Center, Mercer and Houston Streets. Running time: 90 minutes. This film is not rated.
{ "pile_set_name": "Pile-CC" }
Rakestraw Rakestraw is a surname. Notable people with the surname include: Larry Rakestraw (born 1942), American football player Paulette Rakestraw (born 1967), American politician from the state of Georgia Wilbur Rakestraw (1928–2014), American racing driver W. Vincent Rakestraw (born 1940), Former Assistant Attorney General of the United States, Former Special Assistant to the Ambassador of India See also Rakestraw House, a historic home located near Garrett in Keyser Township, DeKalb County, Indiana. Category:English-language surnames
{ "pile_set_name": "Wikipedia (en)" }
Characterization of biofilm and encrustation on ureteric stents in vivo. To examine the relationship between encrustation and microbial biofilm formation on indwelling ureteric stents. Ureteric stents from 40 patients were examined for the presence of a microbial biofilm and encrustations. Bacteria in stent biofilms were isolated and identified. A profuse biofilm (> 10(4) c.f.u. cm-3) was identified on 11 (28%) stents. Enterococcus faecalis was the most common biofilm organism identified and Proteus spp. were not present. Encrustation was seen in 23 (58%) of stents and was not associated with the level of urinary calcium. The major risk factor for stent encrustation was the presence of urolithiasis. Importantly, there was no causative link between stent biofilm formation and encrustation. Both biofilm formation and encrustation increased with the duration of stenting. The results indicate that polyurethane is readily encrusted and colonized by bacteria in vivo despite antibiotic prophylaxis. Newer materials must be sought if effective long-term stenting is to be achieved.
{ "pile_set_name": "PubMed Abstracts" }
From typical sequences to typical genotypes. We demonstrate an application of a core notion of information theory, typical sequences and their related properties, to analysis of population genetic data. Based on the asymptotic equipartition property (AEP) for nonstationary discrete-time sources producing independent symbols, we introduce the concepts of typical genotypes and population entropy and cross entropy rate. We analyze three perspectives on typical genotypes: a set perspective on the interplay of typical sets of genotypes from two populations, a geometric perspective on their structure in high dimensional space, and a statistical learning perspective on the prospects of constructing typical-set based classifiers. In particular, we show that such classifiers have a surprising resilience to noise originating from small population samples, and highlight the potential for further links between inference and communication.
{ "pile_set_name": "PubMed Abstracts" }
It is a truism that modern cell phones feature a multitude of features that expand on the traditional cell phone functionality. For example, today cell phone users are able to use their phones to connect to the Internet, manage meetings, appointments, and other aspects of their every day lives, listen to music and watch videos, etc. In essence the cell phone—which began as a single-function communicator—has grown into a fully functioning multimedia device. However the fundamental function of a cell phone remains communication. It should be noted that cell phones are also sometimes referred to as mobile phones, which in the proper meaning of the word indicates that the user of that phone is mobile, and is supposedly always available for anyone who might want to contact him or her. The core functionality of mobile/cell phones has been basically the same since the first devices were made available to consumers. Although there has been a rapid expansion in the feature set of most cell phones, the core functionality has not seen a similar expansion. The reasons for the development discrepancy likely have to do with the fact that the core functionality is sufficient for most users and that there are not just that many ways of enhancing the person-to-person communication experience on a mobile device Arguably, the most important enhancement in the cell phone, at least as it relates to interpersonal communication, has been the development of the capability of sending short text messages from one phone to another. Otherwise, the main improvements in communications have been largely concerned with connectivity. For example, communications protocols such as infrared and Bluetooth have become de facto requirements for all but the most inexpensive phones. In addition advances have been made in connectivity to the Internet (for example) and now it is routine for users to be able to access their e-mail and browse the web via their phones. However, these improvements in connectivity, as welcome as they might be, do not expand on the one-to-one personal communication aspect of the phone. One thing that would be a leap forward in such communications would be the ability to quickly and easily assemble a multi-user communication session that is hardware independent and, further, does not require the user to purchase additional hardware. Although the prior art has provided multi-user communications in the form of, for example, conference calls—the present technology of conference calls is quite limiting to the user. For example, it is typically limited to a predetermined number of user connections (e.g., 5). Further, a start time must be communicated to each user so there is little opportunity for spontaneity. Further, adding more users to the session may be very difficult or impossible. Finally, the conference call will ultimately be limited to known users, i.e., those who are known to one of the participants and have been invited. Additionally, exchanging short messages between users is a time-delayed communication mode that typically involves a one-to-one communication. Even though some software providers have offered solutions that allow a user to send one short message to multiple participants, such is not the same as real time voice communication between these same users. Of course, such group messaging is a time-delayed communication mode too, in which at least one participant is always in a waiting position. Thus, this communication option also offers little in the way of spontaneity or flexibility to the user. As was mentioned previously, over the last few years several attempts have been made to enhance the communication options available to owners of mobile devices, for example infrared and Bluetooth have been added but they have been used so far mostly for communication with other devices, i.e. for data transfer—not for direct communication between users. Those of ordinary skill in the art will recognize that infrared is limited to communications over a relative short line-of-sight distance between potential communication partners. As a consequence, the infrared protocol has typically been implemented as a simple data exchange protocol which is useful, for example, in synchronizing data between a mobile phone and a personal computer. On the other hand, the Bluetooth protocol provides for the creation of networks, so called piconets, in which up to 255 participants can be combined, of which only 8 participants can be active simultaneously, these 8 participants consist of one so called “master” device and seven so-called “slave” or secondary devices. The master device controls the communication and assigns so-called “sendslots” to participants. Additionally, communications within a piconet are based on the client server principle, which imposes the restriction that the master (server) is needed for on-going communications. Thus, when a master device looses the connection the piconet ceases to exist until a new master is selected and re-establishes the piconet by starting the creation process at the beginning. Although a Bluetooth device can be registered in multiple piconets, it can only be registered as master in one piconet. Additionally, those of ordinary skill in the art will recognize that the term scatternet is often used to refer to a combination of up to 10 piconets in which each piconet is associated with a different identification frequency. However, the technical specifications of the Bluetooth communication protocol limit the functionality of that communication option. For example, those of ordinary skill in the art will recognize that a piconet can accommodate a maximum of 8 active participants. Further, a piconet will collapse if the server (master) looses the connection. Others have sought, with varying degrees of success, to deliver enhanced communication functionality despite the limitations of the Bluetooth protocol. For example, U.S. Pat. No. 6,674,995 teaches the creation of a virtual ball game that utilizes data that is passed between participants via Bluetooth, thereby delivering to them the illusion that they are playing a ball game. As another example, U.S. patent application No. 20020151320 describes a method of giving users in a user community additional functionality when using a software package in a community environment. That is, certain functions are provided to the users depending on the number of participants, with higher user numbers being associated with the unlocking of additional program functionality. However, these sorts of approaches are still fundamentally limited by the nature of the Bluetooth protocol. As an example of an alternative approach to the use of Bluetooth, consider U.S. patent application 2005/0063409 that teaches a method for allowing users to communicate across several scatternets. However, this invention utilizes multiple interconnected servers and is not suitable for users that wish to quickly arrange and participate in an ad hoc communications group. None of the prior art communication options, however, deliver a flexible way of communicating with an arbitrary number of individual users. In each case either the users are restricted by the technical limitations of the Bluetooth standard or the communication options necessary to create a group chat are too involved for the average user to accomplish. Note that for purposes of the instant disclosure, the term enhancement of the communication options will be taken to refer to any approach that allows a user to communicate with a mobile device in addition to the already existing communication options. Thus what is needed is a method that gives the user of a cell phone or users of mobile devices the ability to create multi-user communications on that device without a need for elaborate equipment configurations, planning, or installation and which is not bound by the technical limitations of a specific communication protocol. Preferably the method will extend an invitation to others to join a communications group and will automatically provide the appropriate software for use by new users who do not already have it. Preferably the method will use a commonly available wireless protocol such as Bluetooth or Wi-Fi. Accordingly it should now be recognized, as was recognized by the present inventors, that there exists, and has existed for some time, a very real need for a system and method that would address and solve the above-described problems. Before proceeding to a description of the present invention, however, it should be noted and remembered that the description of the invention which follows, together with the accompanying drawings, should not be construed as limiting the invention to the examples (or preferred embodiments) shown and described. This is so because those skilled in the art to which the invention pertains will be able to devise other forms of the invention within the ambit of the appended claims.
{ "pile_set_name": "USPTO Backgrounds" }
Udzungwa red colobus The Uzungwa red colobus (Piliocolobus gordonorum), also known as the Udzungwa red colobus or Iringa red colobus, is a species of primate in the family Cercopithecidae. It is endemic to riverine and montane forest in the Udzungwa Mountains in Tanzania. It is threatened by habitat loss. References Uzungwa red colobus Category:Endemic fauna of Tanzania Category:Mammals of Tanzania Category:Endangered fauna of Africa Uzungwa red colobus Category:Taxonomy articles created by Polbot Category:Primates of Africa
{ "pile_set_name": "Wikipedia (en)" }
Serial imaging and SWAN sequence of developmental venous anomaly thrombosis with hematoma: Diagnosis and follow-up. Developmental venous anomalies (DVAs) are usually asymptomatic. We report a case of DVA thrombosis with recurrent tiny frontal hematoma in a 24-year-old man. The contribution of T2-GRE and SWAN sequences are discussed. Follow-up attested complete recanalization after anticoagulation.
{ "pile_set_name": "PubMed Abstracts" }
--- abstract: 'The purpose of this article is to study the problem of finding sharp lower bounds for the norm of the product of polynomials in the ultraproducts of Banach spaces $(X_i)_{\mathfrak U}$. We show that, under certain hypotheses, there is a strong relation between this problem and the same problem for the spaces $X_i$.' address: 'IMAS-CONICET' author: - Jorge Tomás Rodríguez title: On the norm of products of polynomials on ultraproducts of Banach spaces --- Introduction ============ In this article we study the factor problem in the context of ultraproducts of Banach spaces. This problem can be stated as follows: for a Banach space $X$ over a field ${\mathbb K}$ (with ${\mathbb K}={\mathbb R}$ or ${\mathbb K}={\mathbb C}$) and natural numbers $k_1,\cdots, k_n$ find the optimal constant $M$ such that, given any set of continuous scalar polynomials $P_1,\cdots,P_n:X\rightarrow {\mathbb K}$, of degrees $k_1,\cdots,k_n$; the inequality $$\label{problema} M \Vert P_1 \cdots P_n\Vert \ge \, \Vert P_1 \Vert \cdots \Vert P_n \Vert$$ holds, where $\Vert P \Vert = \sup_{\Vert x \Vert_X=1} \vert P(x)\vert$. We also study a variant of the problem in which we require the polynomials to be homogeneous. Recall that a function $P:X\rightarrow {\mathbb K}$ is a continuous $k-$homogeneous polynomial if there is a continuous $k-$linear function $T:X^k\rightarrow {\mathbb K}$ for which $P(x)=T(x,\cdots,x)$. A function $Q:X\rightarrow {\mathbb K}$ is a continuous polynomial of degree $k$ if $Q=\sum_{l=0}^k Q_l$ with $Q_0$ a constant, $Q_l$ ($1\leq l \leq k$) an $l-$homogeneous polynomial and $Q_k \neq 0$ . The factor problem has been studied by several authors. In [@BST], C. Benítez, Y. Sarantopoulos and A. Tonge proved that, for continuous polynomials, inequality (\[problema\]) holds with constant $$M=\frac{(k_1+\cdots + k_n)^{(k_1+\cdots +k_n)}}{k_1^{k_1} \cdots k_n^{k_n}}$$ for any complex Banach space. The authors also showed that this is the best universal constant, since there are polynomials on $\ell_1$ for which equality prevails. For complex Hilbert spaces and homogeneous polynomials, D. Pinasco proved in [@P] that the optimal constant is $$\nonumber M=\sqrt{\frac{(k_1+\cdots + k_n)^{(k_1+\cdots +k_n)}}{k_1^{k_1} \cdots k_n^{k_n}}}.$$ This is a generalization of the result for linear functions obtained by Arias-de-Reyna in [@A]. In [@CPR], also for homogeneous polynomials, D. Carando, D. Pinasco and the author proved that for any complex $L_p(\mu)$ space, with $dim(L_p(\mu))\geq n$ and $1<p<2$, the optimal constant is $$\nonumber M=\sqrt[p]{\frac{(k_1+\cdots + k_n)^{(k_1+\cdots +k_n)}}{k_1^{k_1} \cdots k_n^{k_n}}}.$$ This article is partially motivated by the work of M. Lindström and R. A. Ryan in [@LR]. In that article they studied, among other things, a problem similar to (\[problema\]): finding the so called polarization constant of a Banach space. They found a relation between the polarization constant of the ultraproduct $(X_i)_{\mathfrak U}$ and the polarization constant of each of the spaces $X_i$. Our objective is to do an analogous analysis for our problem (\[problema\]). That is, to find a relation between the factor problem for the space $(X_i)_{\mathfrak U}$ and the factor problem for the spaces $X_i$. In Section 2 we give some basic definitions and results of ultraproducts needed for our discussion. In Section 3 we state and prove the main result of this paper, involving ultraproducts, and a similar result on biduals. Ultraproducts ============= We begin with some definitions, notations and basic results on filters, ultrafilters and ultraproducts. Most of the content presented in this section, as well as an exhaustive exposition on ultraproducts, can be found in Heinrich’s article [@H]. A filter ${\mathfrak U}$ on a family $I$ is a collection of non empty subsets of $I$ closed by finite intersections and inclusions. An ultrafilter is maximal filter. In order to define the ultraproduct of Banach spaces, we are going to need some topological results first. Let ${\mathfrak U}$ be an ultrafilter on $I$ and $X$ a topological space. We say that the limit of $(x_i)_{i\in I} \subseteq X$ respect of ${\mathfrak U}$ is $x$ if for every open neighborhood $U$ of $x$ the set $\{i\in I: x_i \in U\}$ is an element of ${\mathfrak U}$. We denote $$\displaystyle\lim_{i,{\mathfrak U}} x_i = x.$$ The following is Proposition 1.5 from [@H]. \[buenadef\] Let ${\mathfrak U}$ be an ultrafilter on $I$, $X$ a compact Hausdorff space and $(x_i)_{i\in I} \subseteq X$. Then, the limit of $(x_i)_{i\in I}$ respect of ${\mathfrak U}$ exists and is unique. Later on, we are going to need the next basic Lemma about limits of ultraproducts, whose proof is an easy exercise of basic topology and ultrafilters. \[lemlimit\] Let ${\mathfrak U}$ be an ultrafilter on $I$ and $\{x_i\}_{i\in I}$ a family of real numbers. Assume that the limit of $(x_i)_{i\in I} \subseteq {\mathbb R}$ respect of ${\mathfrak U}$ exists and let $r$ be a real number such that there is a subset $U$ of $\{i: r<x_i\}$ with $U\in {\mathfrak U}$. Then $$r \leq \displaystyle\lim_{i,{\mathfrak U}} x_i.$$ We are now able to define the ultraproduct of Banach spaces. Given an ultrafilter ${\mathfrak U}$ on $I$ and a family of Banach spaces $(X_i)_{i\in I}$, take the Banach space $\ell_\infty(I,X_i)$ of norm bounded families $(x_i)_{i\in I}$ with $x_i \in X_i$ and norm $$\Vert (x_i)_{i\in I} \Vert = \sup_{i\in I} \Vert x_i \Vert.$$ The ultraproduct $(X_i)_{\mathfrak U}$ is defined as the quotient space $\ell_\infty(I,X_i)/ \sim $ where $$(x_i)_{i\in I}\sim (y_i)_{i\in I} \Leftrightarrow \displaystyle\lim_{i,{\mathfrak U}} \Vert x_i - y_i \Vert = 0.$$ Observe that Proposition \[buenadef\] assures us that this limit exists for every pair $(x_i)_{i\in I}, (y_i)_{i\in I}\in \ell_\infty(I,X_i)$. We denote the class of $(x_i)_{i\in I}$ in $(X_i)_{\mathfrak U}$ by $(x_i)_{\mathfrak U}$. The following result is the polynomial version of Definition 2.2 from [@H] (see also Proposition 2.3 from [@LR]). The reasoning behind is almost the same. \[pollim\] Given two ultraproducts $(X_i)_{\mathfrak U}$, $(Y_i)_{\mathfrak U}$ and a family of continuous homogeneous polynomials $\{P_i\}_{i\in I}$ of degree $k$ with $$\displaystyle\sup_{i\in I} \Vert P_i \Vert < \infty,$$ the map $P:(X_i)_{\mathfrak U}\longrightarrow (Y_i)_{\mathfrak U}$ defined by $P((x_i)_{\mathfrak U})=(P_i(x_i))_{\mathfrak U}$ is a continuous homogeneous polynomial of degree $k$. Moreover $\Vert P \Vert = \displaystyle\lim_{i,{\mathfrak U}} \Vert P_i \Vert$. If ${\mathbb K}={\mathbb C}$, the hypothesis of homogeneity can be omitted, but in this case the degree of $P$ can be lower than $k$. Let us start with the homogeneous case. Write $P_i(x)=T_i(x,\cdots,x)$ with $T_i$ a $k-$linear continuous function. Define $T:(X_i)_{\mathfrak U}^k \longrightarrow (Y_i)_{\mathfrak U}$ by $$T((x^1_i)_{\mathfrak U},\cdots,(x^k_i)_{\mathfrak U})=(T_i(x^1_i,\cdots ,x^k_i))_{\mathfrak U}.$$ $T$ is well defined since, by the polarization formula, $ \displaystyle\sup_{i\in I} \Vert T_i \Vert \leq \displaystyle\sup_{i\in I} \frac{k^k}{k!}\Vert P_i \Vert< \infty$. Seeing that for each coordinate the maps $T_i$ are linear, the map $T$ is linear in each coordinate, and thus it is a $k-$linear function. Given that $$P((x_i)_{\mathfrak U})=(P_i(x_i))_{\mathfrak U}=(T_i(x_i,\cdots,x_i))_{\mathfrak U}=T((x_i)_{\mathfrak U},\cdots,(x_i)_{\mathfrak U})$$ we conclude that $P$ is a $k-$homogeneous polynomial. To see the equality of the norms for every $i$ choose a norm $1$ element $x_i\in X_i$ where $P_i$ almost attains its norm, and from there is easy to deduce that $\Vert P \Vert \geq \displaystyle\lim_{i,{\mathfrak U}} \Vert P_i \Vert$. For the other inequality we use that $$|P((x_i)_{\mathfrak U})|= \displaystyle\lim_{i,{\mathfrak U}}|P_i(x_i)| \leq \displaystyle\lim_{i,{\mathfrak U}}\Vert P_i \Vert \Vert x_i \Vert^k = \left(\displaystyle\lim_{i,{\mathfrak U}}\Vert P_i \Vert \right)\Vert (x_i)_{\mathfrak U}\Vert^k .$$ Now we treat the non homogeneous case. For each $i\in I$ we write $P_i=\sum_{l=0}^kP_{i,l}$, with $P_{i,0}$ a constant and $P_{i,l}$ ($1\leq l \leq k$) an $l-$homogeneous polynomial. Take the direct sum $X_i \oplus_\infty {\mathbb C}$ of $X_i$ and ${\mathbb C}$, endowed with the norm $\Vert (x,\lambda) \Vert =\max \{ \Vert x \Vert, | \lambda| \}$. Consider the polynomial $\tilde{P_i}:X_i \oplus_\infty {\mathbb C}\rightarrow Y_i$ defined by $\tilde{P}_i(x,\lambda)=\sum_{l=0}^k P_{i,l}(x)\lambda^{k-l}$. The polynomial $\tilde{P}_i$ is an homogeneous polynomial of degree $k$ and, using the maximum modulus principle, it is easy to see that $\Vert P_i \Vert = \Vert \tilde{P_i} \Vert $. Then, by the homogeneous case, we have that the polynomial $\tilde{P}:(X_i \oplus_\infty {\mathbb C})_{\mathfrak U}\rightarrow (Y_i)_{\mathfrak U}$ defined as $\tilde{P}((x_i,\lambda_i)_{\mathfrak U})=(\tilde{P}_i(x_i,\lambda_i))_{\mathfrak U}$ is a continuous homogeneous polynomial of degree $k$ and $\Vert \tilde{P} \Vert =\displaystyle\lim_{i,{\mathfrak U}} \Vert \tilde{P}_i \Vert =\displaystyle\lim_{i,{\mathfrak U}} \Vert P_i \Vert$. Via the identification $(X_i \oplus_\infty {\mathbb C})_{\mathfrak U}=(X_i)_{\mathfrak U}\oplus_\infty {\mathbb C}$ given by $(x_i,\lambda_i)_{\mathfrak U}=((x_i)_{\mathfrak U},\displaystyle\lim_{i,{\mathfrak U}} \lambda_i)$ we have that the polynomial $Q:(X_i)_{\mathfrak U}\oplus_\infty {\mathbb C}\rightarrow {\mathbb C}$ defined as $Q((x_i)_{\mathfrak U},\lambda)=\tilde{P}((x_i,\lambda)_{\mathfrak U})$ is a continuous homogeneous polynomial of degree $k$ and $\Vert Q\Vert =\Vert \tilde{P}\Vert$. Then, the polynomial $P((x_i)_{\mathfrak U})=Q((x_i)_{\mathfrak U},1)$ is a continuous polynomial of degree at most $k$ and $\Vert P\Vert =\Vert Q\Vert =\displaystyle\lim_{i,{\mathfrak U}} \Vert P_i \Vert$. If $\displaystyle\lim_{i,{\mathfrak U}} \Vert P_{i,k} \Vert =0 $ then the degree of $P$ is lower than $k$. Note that, in the last proof, we can take the same approach used for non homogeneous polynomials in the real case, but we would not have the same control over the norms. Main result ============= This section contains our main result. As mentioned above, this result is partially motivated by Theorem 3.2 from [@LR]. We follow similar ideas for the proof. First, let us fix some notation that will be used throughout this section. In this section, all polynomials considered are continuous scalar polynomials. Given a Banach space $X$, $B_X$ and $S_X$ denote the unit ball and the unit sphere of $X$ respectively, and $X^*$ is the dual of $X$. Given a polynomial $P$ on $X$, $deg(P)$ stands for the degree of $P$. For a Banach space $X$ let $D(X,k_1,\cdots,k_n)$ denote the smallest constant that satisfies (\[problema\]) for polynomials of degree $k_1,\cdots,k_n$. We also define $C(X,k_1,\cdots,k_n)$ as the smallest constant that satisfies (\[problema\]) for homogeneous polynomials of degree $k_1,\cdots,k_n$. Throughout this section most of the results will have two parts. The first involving the constant $C(X,k_1,\cdots,k_n)$ for homogeneous polynomials and the second involving the constant $D(X,k_1,\cdots,k_n)$ for arbitrary polynomials. Given that the proof of both parts are almost equal, we will limit to prove only the second part of the results. Recall that a space $X$ has the $1 +$ uniform approximation property if for all $n\in {\mathbb N}$, exists $m=m(n)$ such that for every subspace $M\subset X$ with $dim(M)=n$ and every $\varepsilon > 0$ there is an operator $T\in \mathcal{L}(X,X)$ with $T|_M=id$, $rg(T)\leq m$ and $\Vert T\Vert \leq 1 + \varepsilon$ (i.e. for every $\varepsilon > 0$ $X$ has the $1+\varepsilon$ uniform approximation property). \[main thm\] If ${\mathfrak U}$ is an ultrafilter on a family $I$ and $(X_i)_{\mathfrak U}$ is an ultraproduct of complex Banach spaces then 1. $C((X_i)_{\mathfrak U},k_1,\cdots,k_n) \geq \displaystyle\lim_{i,{\mathfrak U}}(C(X_i,k_1,\cdots,k_n)).$ 2. $D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \geq \displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n)).$ Moreover, if each $X_i$ has the $1+$ uniform approximation property, equality holds in both cases. In order to prove this Theorem some auxiliary lemmas are going to be needed. The first one is due to Heinrich [@H]. \[aprox\] Given an ultraproduct of Banach spaces $(X_i)_{\mathfrak U}$, if each $X_i$ has the $1+$ uniform approximation property then $(X_i)_{\mathfrak U}$ has the metric approximation property. When working with the constants $C(X,k_1,\cdots,k_n)$ and $D(X,k_1,\cdots,k_n)$, the following characterization may result handy. \[alternat\] a) The constant $C(X,k_1,\cdots,k_n)$ is the biggest constant $M$ such that given any $\varepsilon >0$ there exist a set of homogeneous continuous polynomials $\{P_j\}_{j=1}^n$ with $deg(P_j)\leq k_j$ such that $$\label{condition} M\left \Vert \prod_{j=1}^{n} P_j \right \Vert \leq (1+\varepsilon) \prod_{j=1}^{n} \Vert P_j \Vert.$$ b\) The constant $D(X,k_1,\cdots,k_n)$ is the biggest constant satisfying the same for arbitrary polynomials. To prove this Lemma it is enough to see that $D(X,k_1,\cdots,k_n)$ is decreasing as a function of the degrees $k_1,\cdots, k_n$ and use that the infimum is the greatest lower bound. \[rmkalternat\] It is clear that in Lemma \[alternat\] we can take the polynomials $\{P_j\}_{j=1}^n$ with $deg(P_j)= k_j$ instead of $deg(P_j)\leq k_j$. Later on we will use both versions of the Lemma. One last lemma is needed for the proof of the Main Theorem. \[normas\] Let $P$ be a (not necessarily homogeneous) polynomial on a complex Banach space $X$ with $deg(P)=k$. For any point $x\in X$ $$|P(x)|\leq \max\{\Vert x \Vert, 1\}^k \Vert P\Vert . \nonumber$$ If $P$ is homogeneous the result is rather obvious since we have the inequality $$|P(x)|\leq \Vert x \Vert^k \Vert P\Vert . \nonumber$$ Suppose that $P=\sum_{l=0}^k P_l$ with $P_l$ an $l-$homogeneous polynomial. Consider the space $X \oplus_\infty {\mathbb C}$ and the polynomial $\tilde{P}:X \oplus_\infty {\mathbb C}\rightarrow {\mathbb C}$ defined by $\tilde{P}(x,\lambda)=\sum_{l=0}^k P_l(x)\lambda^{k-l}$. The polynomial $\tilde{P}$ is homogeneous of degree $k$ and $\Vert P \Vert = \Vert \tilde{P} \Vert $. Then, using that $\tilde{P}$ is homogeneous we have $$|P(x)|=|\tilde{P} (x,1)| \leq \Vert (x,1) \Vert^k \Vert \tilde{P} \Vert = \max\{\Vert x \Vert, 1\}^k \Vert P\Vert . \nonumber$$ We are now able to prove our main result. Throughout this proof we regard the space $({\mathbb C})_{\mathfrak U}$ as ${\mathbb C}$ via the identification $(\lambda_i)_{\mathfrak U}=\displaystyle\lim_{i,{\mathfrak U}} \lambda_i$. First, we are going to see that $D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \geq \displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n))$. To do this we only need to prove that $\displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n))$ satisfies (\[condition\]). Given $\varepsilon >0$ we need to find a set of polynomials $\{P_{j}\}_{j=1}^n$ on $(X_i)_{\mathfrak U}$ with $deg(P_{j})\leq k_j$ such that $$\displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n)) \left \Vert \prod_{j=1}^{n} P_j \right \Vert \leq (1+\varepsilon) \prod_{j=1}^{n} \left \Vert P_j \right \Vert .$$ By Remark \[rmkalternat\] we know that for each $i\in I$ there is a set of polynomials $\{P_{i,j}\}_{j=1}^n$ on $X_i$ with $deg(P_{i,j})=k_j$ such that $$D(X_i,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} P_{i,j} \right \Vert \leq (1 +\varepsilon)\prod_{j=1}^{n} \left \Vert P_{i,j} \right \Vert.$$ Replacing $P_{i,j}$ with $P_{i,j}/\Vert P_{i,j} \Vert$ we may assume that $\Vert P_{i,j} \Vert =1$. Define the polynomials $\{P_j\}_{j=1}^n$ on $(X_i)_{\mathfrak U}$ by $P_j((x_i)_{\mathfrak U})=(P_{i,j}(x_i))_{\mathfrak U}$. Then, by Proposition \[pollim\], $deg(P_j)\leq k_j$ and $$\begin{aligned} \displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n)) \left \Vert \prod_{j=1}^{n} P_{j} \right \Vert &=& \displaystyle\lim_{i,{\mathfrak U}} \left(D(X_i,k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} P_{i,j} \right \Vert \right) \nonumber \\ &\leq& \displaystyle\lim_{i,{\mathfrak U}}\left((1+\varepsilon)\prod_{j=1}^{n}\Vert P_{i,j} \Vert \right)\nonumber \\ &=& (1+\varepsilon)\prod_{j=1}^{n} \Vert P_{j} \Vert \nonumber \nonumber \end{aligned}$$ as desired. To prove that $D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \leq \displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n))$ if each $X_i$ has the $1+$ uniform approximation property is not as straightforward. Given $\varepsilon >0$, let $\{P_j\}_{j=1}^n$ be a set of polynomials on $(X_i)_{\mathfrak U}$ with $deg(P_j)=k_j$ such that $$D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} P_j \right \Vert \leq (1+\varepsilon)\prod_{j=1}^{n} \Vert P_j \Vert .$$ Let $K\subseteq B_{(X_i)_{\mathfrak U}}$ be the finite set $K=\{x_1,\cdots, x_n\}$ where $ x_j$ is such that $$|P_j(x_j)| > \Vert P_j\Vert (1- \varepsilon) \mbox{ for }j=1,\cdots, n.$$ Being that each $X_i$ has the $1+$ uniform approximation property, then, by Lemma \[aprox\], $(X_i)_{\mathfrak U}$ has the metric approximation property. Therefore, exist a finite rank operator $S:(X_i)_{\mathfrak U}\rightarrow (X_i)_{\mathfrak U}$ such that $\Vert S\Vert \leq 1 $ and $$\Vert P_j - P_j \circ S \Vert_K< |P_j(x_j)|\varepsilon \mbox{ for }j=1,\cdots, n.$$ Now, define the polynomials $Q_1,\cdots, Q_n$ on $(X_i)_{\mathfrak U}$ as $Q_j=P_j\circ S$. Then $$\left\Vert \prod_{j=1}^n Q_j \right\Vert \leq \left\Vert \prod_{j=1}^n P_j \right\Vert$$ $$\Vert Q_j\Vert_K > | P_j(x_j)|-\varepsilon | P_j(x_j)| =| P_j(x_j)| (1-\varepsilon) \geq \Vert P_j \Vert(1-\varepsilon)^2.$$ The construction of this polynomials is a slight variation of Lemma 3.1 from [@LR]. We have the next inequality for the product of the polynomials $\{Q_j\}_{j=1}^n$ $$\begin{aligned} D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} Q_{j} \right \Vert &\leq& D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} P_{j} \right \Vert \nonumber \\ &\leq& (1+\varepsilon) \prod_{j=1}^{n} \left \Vert P_{j} \right \Vert . \label{desq}\end{aligned}$$ Since $S$ is a finite rank operator, the polynomials $\{ Q_j\}_{j=1}^n$ have the advantage that are finite type polynomials. This will allow us to construct polynomials on $(X_i)_{\mathfrak U}$ which are limit of polynomials on the spaces $X_i$. For each $j$ write $Q_j=\sum_{t=1}^{m_j}(\psi_{j,t})^{r_{j,t}}$ with $\psi_{j,t}\in (X_i)_{\mathfrak U}^*$, and consider the spaces $N=\rm{span} \{x_1,\cdots,x_n\}\subset (X_i)_{\mathfrak U}$ and $M=\rm{span} \{\psi_{j,t} \}\subset (X_i)_{\mathfrak U}^*$. By the local duality of ultraproducts (see Theorem 7.3 from [@H]) exist $T:M\rightarrow (X_i^*)_{\mathfrak U}$ an $(1+\varepsilon)-$isomorphism such that $$JT(\psi)(x)=\psi(x) \mbox{ } \forall x\in N, \mbox{ } \forall \psi\in M$$ where $J:(X_i^*)_{\mathfrak U}\rightarrow (X_i)_{\mathfrak U}^*$ is the canonical embedding. Let $\phi_{j,t}=JT(\psi_{j,t})$ and consider the polynomials $\bar{Q}_1,\cdots, \bar{Q}_n$ on $(X_i)_{\mathfrak U}$ with $\bar{Q}_j=\sum_{t=1}^{m_j}(\phi_{j,t})^{r_{j,t}}$. Clearly $\bar{Q}_j$ is equal to $Q_j$ in $N$ and $K\subseteq N$, therefore we have the following lower bound for the norm of each polynomial $$\Vert \bar{Q}_j \Vert \geq \Vert \bar{Q}_j \Vert_K = \Vert Q_j \Vert_K >\Vert P_j \Vert(1-\varepsilon)^2 \label{desbarq}$$ Now, let us find an upper bound for the norm of the product $\Vert \prod_{j=1}^n \bar{Q}_j \Vert$. Let $x=(x_i)_{\mathfrak U}$ be any point in $B_{(X_i)_{\mathfrak U}}$. Then, we have $$\begin{aligned} \left|\prod_{j=1}^n \bar{Q}_j(x)\right| &=& \left|\prod_{j=1}^n \sum_{t=1}^{m_j}(\phi_{j,t} (x))^{r_{j,t}}\right|=\left|\prod_{j=1}^n \sum_{t=1}^{m_j} (JT\psi_{j,t}(x))^{r_{j,t}} \right| \nonumber \\ &=& \left|\prod_{j=1}^n \sum_{t=1}^{m_j}((JT)^*\hat{x}(\psi_{j,t}))^{r_{j,t}}\right|\nonumber\end{aligned}$$ Since $(JT)^*\hat{x}\in M^*$, $\Vert (JT)^*\hat{x}\Vert =\Vert JT \Vert \Vert x \Vert \leq \Vert J \Vert \Vert T \Vert \Vert x \Vert< 1 + \varepsilon$ and $M^*=\frac{(X_i)_{\mathfrak U}^{**}}{M^{\bot}}$, we can chose $z^{**}\in (X_i)_{\mathfrak U}^{**}$ with $\Vert z^{**} \Vert < \Vert (JT)^*\hat{x}\Vert+\varepsilon < 1+2\varepsilon$, such that $\prod_{j=1}^n \sum_{t=1}^{m_j} ((JT)^*\hat{x}(\psi_{j,t}))^{r_{j,t}}= \prod_{j=1}^n \sum_{t=1}^{m_j} (z^{**}(\psi_{j,t}))^{r_{j,t}}$. By Goldstine’s Theorem exist a net $\{z_\alpha\} \subseteq (X_i)_{\mathfrak U}$ $w^*-$convergent to $z$ in $(X_i)_{\mathfrak U}^{**}$ with $\Vert z_\alpha \Vert = \Vert z^{**}\Vert$. In particular, $ \psi_{j,t}(z_\alpha)$ converges to $z^{**}(\psi_{j,t})$. If we call ${\mathbf k}= \sum k_j$, since $\Vert z_\alpha \Vert< (1+2\varepsilon)$, by Lemma \[normas\], we have $$\left \Vert \prod_{j=1}^{n} Q_j \right \Vert (1+2\varepsilon)^{\mathbf k}\geq \left|\prod_{j=1}^n Q_j(z_\alpha)\right| = \left|\prod_{j=1}^n \sum_{t=1}^{m_j} ((\psi_{j,t})(z_\alpha))^{r_{j,t}}\right| . \label{usecomplex}$$ Combining this with the fact that $$\begin{aligned} \left|\prod_{j=1}^{n} \sum_{t=1}^{m_j} ((\psi_{j,t})(z_\alpha))^{r_{j,t}}\right| &\longrightarrow& \left|\prod_{j=1}^{n} \sum_{t=1}^{m_j} (z^{**}(\psi_{j,t}))^{r_{j,t}}\right|\nonumber\\ &=& \left|\prod_{j=1}^{n} \sum_{t=1}^{m_j} ((JT)^*\hat{x}(\psi_{j,t}))^{r_{j,t}}\right| = \left|\prod_{j=1}^{n} \bar{Q}_j(x)\right|\nonumber\end{aligned}$$ we conclude that $\left \Vert \prod_{j=1}^{n} Q_j \right \Vert (1+2\varepsilon)^{\mathbf k}\geq |\prod_{j=1}^{n} \bar{Q}_j(x)|$. Since the choice of $x$ was arbitrary we arrive to the next inequality $$\begin{aligned} D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} \bar{Q}_j \right \Vert &\leq& (1+2\varepsilon)^{\mathbf k}D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} Q_j \right \Vert \nonumber \\ &\leq& (1+2\varepsilon)^{\mathbf k}(1+\varepsilon) \prod_{j=1}^{n} \left \Vert P_{j} \right \Vert \label{desbarq2} \\ &<& (1+2\varepsilon)^{\mathbf k}(1+\varepsilon) \frac{\prod_{j=1}^{n} \Vert \bar{Q}_j \Vert }{(1-\varepsilon)^{2n}} .\label{desbarq3} \\end{aligned}$$ In (\[desbarq2\]) and (\[desbarq3\]) we use (\[desq\]) and (\[desbarq\]) respectively. The polynomials $\bar{Q}_j$ are not only of finite type, these polynomials are also generated by elements of $(X_i^*)_{\mathfrak U}$. This will allow us to write them as limits of polynomials in $X_i$. For any $i$, consider the polynomials $\bar{Q}_{i,1},\cdots,\bar{Q}_{i,n}$ on $X_i$ defined by $\bar{Q}_{i,j}= \displaystyle\sum_{t=1}^{m_j} (\phi_{i,j,t})^{r_{j,t}}$, where the functionals $\phi_{i,j,t}\in X_i^*$ are such that $(\phi_{i,j,t})_{\mathfrak U}=\phi_{j,t}$. Then $\bar{Q}_j(x)=\displaystyle\lim_{i,{\mathfrak U}} \bar{Q}_{i,j}(x)$ $\forall x \in (X_i)_{\mathfrak U}$ and, by Proposition \[pollim\], $\Vert \bar{Q}_j \Vert = \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert$. Therefore $$\begin{aligned} D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \displaystyle\lim_{i,{\mathfrak U}} \left \Vert \prod_{j=1}^{n} \bar{Q}_{i,j} \right \Vert &=& D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} \bar{Q}_{j} \right \Vert \nonumber \\ &<& \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} \prod_{j=1}^{n} \Vert \bar{Q}_{j} \Vert \nonumber \\ &=& \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} \prod_{j=1}^{n} \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert . \nonumber \end{aligned}$$ To simplify the notation let us call $\lambda = \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} $. Take $L>0$ such that $$D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \displaystyle\lim_{i,{\mathfrak U}} \left \Vert \prod_{j=1}^{n} \bar{Q}_{i,j} \right \Vert < L < \lambda \prod_{j=1}^{n} \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert . \nonumber$$ Since $(-\infty, \frac{L}{D((X_i)_{\mathfrak U},k_1,\cdots,k_n)})$ and $(\frac{L}{\lambda},+\infty)$ are neighborhoods of $\displaystyle\lim_{i,{\mathfrak U}} \left \Vert \prod_{j=1}^{n} \bar{Q}_{i,j} \right \Vert$ and $\prod_{j=1}^{n} \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert$ respectively, and $\prod_{j=1}^{n} \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert= \displaystyle\lim_{i,{\mathfrak U}} \prod_{j=1}^{n} \Vert \bar{Q}_{i,j} \Vert$, by definition of $\displaystyle\lim_{i,{\mathfrak U}}$, the sets $$A=\{i_0: D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} \bar{Q}_{i_0,j} \right \Vert <L\} \mbox{ and }B=\{i_0: \lambda \prod_{j=1}^{n} \Vert \bar{Q}_{i_0,j} \Vert > L \}$$ are elements of ${\mathfrak U}$. Since ${\mathfrak U}$ is closed by finite intersections $A\cap B\in {\mathfrak U}$. If we take any element $i_0 \in A\cap B$ then, for any $\delta >0$, we have that $$D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} \bar{Q}_{i_0,j} \right \Vert \frac{1}{\lambda}\leq \frac{L}{\lambda} \leq \prod_{j=1}^{n} \Vert \bar{Q}_{i_0,j} \Vert < (1+ \delta)\prod_{j= 1}^{n} \Vert \bar{Q}_{i_0,j} \Vert \nonumber$$ Then, since $\delta$ is arbitrary, the constant $D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\frac{1}{\lambda}$ satisfy (\[condition\]) for the space $X_{i_0}$ and therefore, by Lemma \[alternat\], $$\frac{1}{\lambda}D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \leq D(X_{i_0},k_1,\cdots,k_n). \nonumber$$ This holds true for any $i_0$ in $A\cap B$. Since $A\cap B \in {\mathfrak U}$, by Lemma \[lemlimit\], $\frac{1}{\lambda}D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\leq \displaystyle\lim_{i,{\mathfrak U}} D(X_i,k_1,\cdots,k_n) $. Using that $\lambda \rightarrow 1$ when $\varepsilon \rightarrow 0$ we conclude that $D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\leq \displaystyle\lim_{i,{\mathfrak U}} D(X_i,k_1,\cdots,k_n).$ Similar to Corollary 3.3 from [@LR], a straightforward corollary of our main result is that for any complex Banach space $X$ with $1+$ uniform approximation property $C(X,k_1,\cdots,k_n)=C(X^{**},k_1,\cdots,k_n)$ and $D(X,k_1,\cdots,k_n)=D(X^{**},k_1,\cdots,k_n)$ . Using that $X^{**}$ is $1-$complemented in some adequate ultrafilter $(X)_{{\mathfrak U}}$ the result is rather obvious. For a construction of the adequate ultrafilter see [@LR]. But following the previous proof, and using the principle of local reflexivity applied to $X^*$ instead of the local duality of ultraproducts, we can prove the next stronger result. Let $X$ be a complex Banach space. Then 1. $C(X^{**},k_1,\cdots,k_n)\geq C(X,k_1,\cdots,k_n).$ 2. $D(X^{**},k_1,\cdots,k_n \geq D(X,k_1,\cdots,k_n)).$ Moreover, if $X^{**}$ has the metric approximation property, equality holds in both cases. The inequality $D(X^{**},k_1,\cdots,k_n) \geq D(X,k_1,\cdots,k_n)$ is a corollary of Theorem \[main thm\] (using the adequate ultrafilter mentioned above). Let us prove that if $X^{**}$ has the metric approximation property then $D((X^{**},k_1,\cdots,k_n)\geq D(X,k_1,\cdots,k_n)$. Given $\varepsilon >0$, let $\{P_j\}_{j=1}^n$ be a set of polynomials on $X^{**}$ with $deg(P_j)=k_j$ such that $$D(X^{**},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} P_{j} \right \Vert \leq (1+\varepsilon)\prod_{j=1}^{n} \left \Vert P_{j} \right \Vert .\nonumber$$ Analogous to the proof of Theorem \[main thm\], since $X^{**}$ has the metric approximation, we can construct finite type polynomials $Q_1,\cdots,Q_n$ on $X^{**}$ with $deg(Q_j)=k_j$, $\Vert Q_j \Vert_K \geq \Vert P_j \Vert (1-\varepsilon)^2$ for some finite set $K\subseteq B_{X^{**}}$ and that $$D(X^{**},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} Q_{j} \right \Vert < (1+\varepsilon)\prod_{j=1}^{n} \left \Vert P_{j} \right \Vert . \nonumber$$ Suppose that $Q_j=\sum_{t=1}^{m_j}(\psi_{j,t})^{r_{j,t}}$ and consider the spaces $N=\rm{span} \{K\}$ and $M=\rm{span} \{\psi_{j,t} \}$. By the principle of local reflexivity (see [@D]), applied to $X^*$ (thinking $N$ as a subspaces of $(X^*)^*$ and $M$ as a subspaces of $(X^*)^{**}$), there is an $(1+\varepsilon)-$isomorphism $T:M\rightarrow X^*$ such that $$JT(\psi)(x)=\psi(x) \mbox{ } \forall x\in N, \mbox{ } \forall \psi\in M\cap X^*=M,$$ where $J:X^*\rightarrow X^{***}$ is the canonical embedding. Let $\phi_{j,t}=JT(\psi_{j,t})$ and consider the polynomials $\bar{Q}_1,\cdots, \bar{Q}_n$ on $X^{**}$ defined by $\bar{Q}_j=\sum_{t=1}^{m_j}(\phi_{j,t})^{r_{j,t}}$. Following the proof of the Main Theorem, one arrives to the inequation $$D(X^{**},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} \bar{Q_j} \right \Vert < (1+ \delta) \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} \prod_{j=1}^{n} \Vert \bar{Q_j} \Vert \nonumber$$ for every $\delta >0$. Since each $\bar{Q}_j$ is generated by elements of $J(X^*)$, by Goldstine’s Theorem, the restriction of $\bar{Q}_j$ to $X$ has the same norm and the same is true for $\prod_{j=1}^{n} \bar{Q_j}$. Then $$D(X^{**},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} \left.\bar{Q_j}\right|_X \right \Vert < (1+ \delta) \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} \prod_{j=1}^{n} \Vert \left.\bar{Q_j}\right|_X \Vert \nonumber$$ By Lemma \[alternat\] we conclude that $$\frac{(1-\varepsilon)^{2n}}{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}D(X^{**},k_1,\cdots,k_n)\leq D(X,k_1,\cdots,k_n).$$ Given that the choice of $\varepsilon$ is arbitrary and that $\frac{(1-\varepsilon)^{2n}}{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}} $ tends to $1$ when $\varepsilon$ tends to $0$ we conclude that $D(X^{**},k_1,\cdots,k_n)\leq D(X,k_1,\cdots,k_n)$. Note that in the proof of the Main Theorem the only parts where we need the spaces to be complex Banach spaces are at the beginning, where we use Proposition \[pollim\], and in the inequality (\[usecomplex\]), where we use Lemma \[normas\]. But both results holds true for homogeneous polynomials on a real Banach space. Then, copying the proof of the Main Theorem we obtain the following result for real spaces. If ${\mathfrak U}$ is an ultrafilter on a family $I$ and $(X_i)_{\mathfrak U}$ is an ultraproduct of real Banach spaces then $$C((X_i)_{\mathfrak U},k_1,\cdots,k_n) \geq \displaystyle\lim_{i,{\mathfrak U}}(C(X_i,k_1,\cdots,k_n)).$$ If in addition each $X_i$ has the $1+$ uniform approximation property, the equality holds. Also we can get a similar result for the bidual of a real space. Let $X$ be a real Banach space. Then 1. $C(X^{**},k_1,\cdots,k_n)\geq C(X,k_1,\cdots,k_n).$ 2. $D(X^{**},k_1,\cdots,k_n) \geq D(X,k_1,\cdots,k_n).$ If $X^{**}$ has the metric approximation property, equality holds in $(a)$. The proof of item $(a)$ is the same that in the complex case, so we limit to prove $D(X^{**},k_1,\cdots,k_n) \geq D(X,k_1,\cdots,k_n))$. To do this we will show that given an arbitrary $\varepsilon >0$, there is a set of polynomials $\{P_{j}\}_{j=1}^n$ on $X^{**}$ with $deg(P_{j})\leq k_j$ such that $$D(X,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} P_j \right \Vert \leq (1+\varepsilon) \prod_{j=1}^{n} \left \Vert P_j \right \Vert .$$ Take $\{Q_{j}\}_{j=1}^n$ a set of polynomials on $X$ with $deg(Q_j)=k_j$ such that $$D(X,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} Q_{j} \right \Vert \leq (1 +\varepsilon)\prod_{j=1}^{n} \left \Vert Q_{j} \right \Vert.$$ Consider now the polynomials $P_j=AB(Q_j)$, where $AB(Q_j)$ is the Aron Berner extension of $Q_j$ (for details on this extension see [@AB] or [@Z]). Since $AB\left( \prod_{j=1}^n P_j \right)=\prod_{j=1}^n AB(P_j)$, using that the Aror Berner extension preserves norm (see [@DG]) we have $$\begin{aligned} D(X,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} P_{j} \right \Vert &=& D(X,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} Q_{j} \right \Vert\nonumber \\ &\leq& (1 +\varepsilon)\prod_{j=1}^{n} \left\Vert Q_{j} \right\Vert \nonumber \\ &=& (1 +\varepsilon)\prod_{j=1}^{n} \left \Vert P_{j} \right \Vert \nonumber \end{aligned}$$ as desired. As a final remark, we mention two types of spaces for which the results on this section can be applied. Corollary 9.2 from [@H] states that any Orlicz space $L_\Phi(\mu)$, with $\mu$ a finite measure and $\Phi$ an Orlicz function with regular variation at $\infty$, has the $1+$ uniform projection property, which is stronger than the $1+$ uniform approximation property. In [@PeR] Section two, A. Pełczyński and H. Rosenthal proved that any ${\mathcal L}_{p,\lambda}-$space ($1\leq \lambda < \infty$) has the $1+\varepsilon-$uniform projection property for every $\varepsilon>0$ (which is stronger than the $1+\varepsilon-$uniform approximation property), therefore, any ${\mathcal L}_{p,\lambda}-$space has the $1+$ uniform approximation property. Acknowledgment {#acknowledgment .unnumbered} ============== I would like to thank Professor Daniel Carando for both encouraging me to write this article, and for his comments and remarks which improved its presentation and content. [HD]{} R. M. J. Arias-de-Reyna. *Gaussian variables, polynomials and permanents*. Linear Algebra Appl. 285 (1998), 107–114. R. M. Aron and P. D. Berner. *A Hahn-Banach extension theorem for analytic mapping*. Bull. Soc. Math. France 106 (1978), 3–24. C. Benítez, Y. Sarantopoulos and A. Tonge. *Lower bounds for norms of products of polynomials*. Math. Proc. Cambridge Philos. Soc. 124 (1998), 395–408. D. Carando, D. Pinasco y J.T. Rodríguez. *Lower bounds for norms of products of polynomials on $L_p$ spaces*. Studia Math. 214 (2013), 157–166. A. M. Davie and T. W. Gamelin. *A theorem on polynomial-star approximation*. Proc. Amer. Math. Soc. 106 (1989) 351–356. D. W. Dean. *The equation $L(E,X^{**})=L(E,X)^{**}$ and the principle of local reflexivity*. Proceedings of the American Mathematical Society. 40 (1973), 146-148. S. Heinrich. *Ultraproducts in Banach space theory*. J. Reine Angew. Math. 313 (1980), 72–104. M. Lindström and R. A. Ryan. *Applications of ultraproducts to infinite dimensional holomorphy*. Math. Scand. 71 (1992), 229–242. A. Pełczyński and H. Rosenthal. *Localization techniques in $L_p$ spaces*. Studia Math. 52 (1975), 265–289. D. Pinasco. *Lower bounds for norms of products of polynomials via Bombieri inequality*. Trans. Amer. Math. Soc. 364 (2012), 3993–4010. I. Zalduendo. *Extending polynomials on Banach Spaces - A survey*. Rev. Un. Mat. Argentina 46 (2005), 45–72.
{ "pile_set_name": "ArXiv" }
Q: How to create a navbar with 2 collapse menu? My codes are working fine on mobile view but on desktop right side Links are getting out of nav-bar. i am trying to create nav bar with Brand in center, search bar on left and links on right. and how to move hambuger bar on left and search on right side on mobile view .. (sorry for my english) .navbar-brand { position: absolute; width: 100%; left: 0; top: 0; text-align: center; margin: auto; } .navbar-toggle { z-index:3; } <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script> <script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js"></script> <link href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet"/> <nav class="navbar navbar-default navbar-fixed-top" role="navigation"> <div class="navbar-header"> <button type="button" class="navbar-toggle" data-toggle="collapse" data-target="#navbar-collapse-2"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#">Brand</a> <button type="button" class="navbar-toggle" data-toggle="collapse" data-target="#navbar-collapse-1"><span class="glyphicon glyphicon-search" aria-hidden="true"> </span> </button> </div> <div class="collapse navbar-collapse navbar-left" id="navbar-collapse-1"> <form class="navbar-form navbar-left" role="search"> <div class="form-group"> <input type="text" class="form-control" placeholder="Search"> </div> <button type="submit" class="btn btn-default">Submit</button> </form> </div> <div class="collapse navbar-collapse" id="navbar-collapse-2"> <ul class="nav navbar-nav navbar-right"> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> </ul> </div> </nav> A: add menu-1 class or call it whatever you want to the button <button type="button" class="navbar-toggle menu-1" data-toggle="collapse" data-target="#navbar-collapse-2"> then add this to your css: .menu-1 { float: left; margin-left: 10px; } Update: to handle search issue remove width: 100 and increase left for .navbar-brand like this: .navbar-brand { position: absolute; /*width: 100%;*/ left: 50%; top: 0; text-align: center; margin: auto; } and add this css also: @media (max-width:767px){ a.navbar-brand { left: 45%; } } check the updated Jsfiddle
{ "pile_set_name": "StackExchange" }
Q: Issue with jquery remove method on IE7? <table class="myCustomers"> <tbody> <tr> <td> <ul id="salesCustomers"> <li title="cust 1"><a id="cust_1" >customer 1</a></li> <li title="cust 2"></li> </ul> </td> </tr> </tbody> when i do on below on IE 7, DOM element corresponding to "customer 1" gets removed from container "salesCustomers" but "salesCustomers" container does get adjusted(i mean IE 7 displays empty space in place of it) after removal of element $('#cust_1').remove(); It works fine on IE8,9,firefox,chrome but not on IE 7? Updated:- CSS part is table.myCustomers li { margin: 8px; } table.myCustomers li a { text-decoration: none; } a { color: #000000; margin: 3px; } A: The empty space may be since the li is still there. (as pointed out by Jayraj) If you want to remove the li corresponding to the #cust_1 as well, You have a couple of ways to do it, $("[title='cust 1']").remove(); $("#cust_1").parents("li").remove(); //this will remove the child element as well Test link
{ "pile_set_name": "StackExchange" }
On January 1, 2018, the most significant overhaul to the Internal Revenue Code in decades took effect. High-income taxpayers stand to benefit from lower tax brackets, higher estate tax exemptions and a less stringent alternative minimum tax. However, high-income earners face new limitations on some favored deductions and notable revisions in charitable write-offs. Some of the most noteworthy changes are…
{ "pile_set_name": "Pile-CC" }
Jake Jones James Murrell "Jake" Jones (November 23, 1920 – December 13, 2000) was a first baseman in Major League Baseball who played between and for the Chicago White Sox (1941–42, 1946–47) and Boston Red Sox (1947–48). Listed at 6'3", 197 lb., Jones batted and threw right-handed. He was born in Epps, Louisiana. Career Jones was a highly decorated World War II veteran. He played 10 games in the American League for Chicago, in part of two seasons, before enlisting in the United States Navy right after Pearl Harbor attack. He joined the service on June 30, 1942, becoming an aviator. In November 1943 he was assigned to the unit on the USS Yorktown (CV-10), flying Grumman F6F Hellcat fighters. Between November and December 1944, Jones destroyed two Japanese A6M Zero and damaged one of them. On February 1, 1945, he shot down another three Zeroes while serving on a mission at northeast of Tokyo, to give him five confirmed victories. A day later, he annihilated other Zero and a Nakajima Ki-43. Then, on February 25 he received a half-share of a probable Ki-43. For his heroic action, Jones was awarded the Silver Star, two Distinguished Flying Cross and four Air Medals. Following his service discharge, Jones returned to play for Chicago in 1946. During the 1947 midseason he was dealt to the Boston Red Sox in exchange for Rudy York, batting a combined .237 with 19 home runs and 96 RBI that season. He hit .200 in 36 games for Boston in 1948, his last major league season, and finished his baseball career in 1949, dividing his playing time between the Texas League and American Association. Jones died in his hometown of Epps, Louisiana at age 80. References Baseball in Wartime Baseball Reference BR Bullpen Category:Boston Red Sox players Category:Chicago White Sox players Category:Major League Baseball first basemen Category:Recipients of the Distinguished Flying Cross (United States) Category:Recipients of the Silver Star Category:Baseball players from Louisiana Category:People from West Carroll Parish, Louisiana Category:1920 births Category:2000 deaths Category:United States Navy pilots of World War II Category:United States Navy officers Category:Recipients of the Air Medal
{ "pile_set_name": "Wikipedia (en)" }
1. Field of the Invention The present invention relates to multi-chamber process equipments for fabricating semiconductor devices. 2. Description of the Prior Art In recent years, the advance in device miniaturization and IC complexity is increasing the need for more accurate and more complicated processes, and wafers of larger diameters. Accordingly, much attention is focused on multi-chamber process equipments (or systems) in view of increase of complex precesses, and enhancement of throughput in an individual wafer processing system. FIG. 14 shows one conventional example. A multi-chamber process equipment of this example includes a wafer transfer chamber 1, a plurality of process chambers 3 connected with the transfer chamber 1 through respective gate valves 2, a load lock chamber (preliminary evacuation chamber) 5 connected with the transfer chamber 1 through a gate valve 4, and a wafer load chamber 7 connected with the load lock chamber 5 through a gate valve 6. In the wafer transfer chamber 1 and the load lock chamber 5, there are provided wafer transfer arms 9 and 10 for carrying a wafer 8, as shown in FIG. 14. The transfer arm 10 is designed to take each wafer 8 from wafer cassettes 11, 11 placed in the wafer load chamber 7, through the gate valve 6, and bring the wafer into the wafer transfer chamber 1. The transfer arm 9 is arranged to receive the wafer 8 from the arm 10, and insert the wafer through one of the gate valves 2 into a predetermined one of the process chambers. The wafer 8 is shifted from one process chamber to another by the transfer arm 10 according to the sequence of processes. Another conventional example is shown in "NIKKEI MICRODEVICES", May, 1990, page 47. A multi-chamber process equipment of this example includes a wafer transfer chamber, a plurality of parallel PVD or other process chambers connected with the transfer chamber, a cooling chamber, a preclean chamber, a buffer chamber, and RTP/etching/CVD chamber (or chambers), a load lock chamber, and other chambers. The pressure of each chamber is held at a predetermined degree of vacuum (base pressure) according to the object of the chamber. For example, the wafer transfer chamber is held at 10.sup.-8 Torr (1.3.times.10.sup.-6 Pa), the PVD chamber is held at 10.sup.-9 Torr (1.3.times.10.sup.-7 Pa), and the load lock chamber is held at 10.sup.-5 Torr (1.3.times.10.sup.-3 Pa). Japanese Patent Provisional Publication (TOKKAI) No. 61-55926 shows still another conventional example. In these equipments, the pressures of the different chambers are determined so as to ensure the clean wafer processing environment. In general, the pressures are made closer to the atmospheric pressure in the following order; (Process chamber)&lt;(Wafer transfer chamber)&lt;(Load lock chamber). In the conventional process equipments, however, a wafer is readily affected by dew condensation especially in a low temperature etching chamber which is cooled to -20.degree. C..about.-70.degree. C. if the chamber is not evacuated sufficiently before loading of the wafer. Therefore, it is required to reduce the pressure in the chamber below a base pressure of the chamber (10.sup.-6 Torr, for example). Moreover, the degree of vacuum of the wafer transfer chamber is lower (that is, the pressure is higher) than that of the process chamber. Therefore, when the process chamber is opened, there arises a flow of residual water content from the wafer transfer chamber to the process chamber, resulting in the dew condensation. The conventional equipments cannot prevent condensation satisfactorily even if the pressure of the process chamber is decreased sufficiently below the base pressure. On the other hand, cross contamination is caused by a flow of residual gases from a process chamber for heat treatment or photo-assisted CVD, to the wafer transfer chamber if the degree of vacuum in the wafer transfer chamber is too high. Furthermore, the conventional equipments cannot sufficiently reduce variations of wafer properties such as sheet resistance from wafer to wafer, especially when the wafers are processed in a high temperature silicide CVD chamber. It is possible to reduce the variations of the sheet resistance by decreasing the pressure in the load lock chamber below the above-mentioned level. However, the pumping operation must be continued for three hours or more.
{ "pile_set_name": "USPTO Backgrounds" }
.theme-dusk,.theme-midnight { .hljs { display: block; overflow-x: auto; background: #232323; color: #e6e1dc; } .hljs-comment, .hljs-quote { color: #bc9458; font-style: italic; } .hljs-keyword, .hljs-selector-tag { color: #c26230; } .hljs-string, .hljs-number, .hljs-regexp, .hljs-variable, .hljs-template-variable { color: #a5c261; } .hljs-subst { color: #519f50; } .hljs-tag, .hljs-name { color: #e8bf6a; } .hljs-type { color: #da4939; } .hljs-symbol, .hljs-bullet, .hljs-built_in, .hljs-builtin-name, .hljs-attr, .hljs-link { color: #6d9cbe; } .hljs-params { color: #d0d0ff; } .hljs-attribute { color: #cda869; } .hljs-meta { color: #9b859d; } .hljs-title, .hljs-section { color: #ffc66d; } .hljs-addition { background-color: #144212; color: #e6e1dc; display: inline-block; width: 100%; } .hljs-deletion { background-color: #600; color: #e6e1dc; display: inline-block; width: 100%; } .hljs-selector-class { color: #9b703f; } .hljs-selector-id { color: #8b98ab; } .hljs-emphasis { font-style: italic; } .hljs-strong { font-weight: bold; } .hljs-link { text-decoration: underline; } }
{ "pile_set_name": "Github" }
58 Cal.App.3d 439 (1976) 129 Cal. Rptr. 797 L. GENE ALLARD, Plaintiff, Cross-defendant and Respondent, v. CHURCH OF SCIENTOLOGY OF CALIFORNIA, Defendant, Cross-complainant and Appellant. Docket No. 45562. Court of Appeals of California, Second District, Division Two. May 18, 1976. *443 COUNSEL Morgan, Wenzel & McNicholas, John P. McNicholas, Gerald E. Agnew, Jr., and Charles B. O'Reilly for Plaintiff, Cross-defendant and Respondent. Levine & Krom, Meldon E. Levine, Murchison, Cumming, Baker & Velpmen, Murchison, Cumming & Baker, Michael B. Lawler, Tobias C. Tolzmann and Joel Kreiner for Defendant, Cross-complainant and Appellant. OPINION BEACH, J. L. Gene Allard sued the Church of Scientology for malicious prosecution. Defendant cross-complained for conversion. A jury verdict and judgment were entered for Allard on the complaint for $50,000 in compensatory damages and $250,000 in punitive damages. Judgment was entered for Allard and against the Church of Scientology on the cross-complaint. Defendant-cross complainant appeals from the judgment. FACTS: The evidence in the instant case is very conflicting. We relate those facts supporting the successful party and disregard the contrary showing. (Nestle v. City of Santa Monica, 6 Cal.3d 920, 925-926 [101 Cal. Rptr. 568, 496 P.2d 480].) In March 1969, L. Gene Allard became involved with the Church of Scientology in Texas. He joined Sea Org in Los Angeles and was sent to San Diego for training. While there, he signed a billion-year contract agreeing to do anything to help Scientology and to help clear the planet of the "reactive people." During this period he learned about written policy directives that were the "policy" of the church, emanating from L. Ron Hubbard, the founder of the Church of Scientology.[1] After training on the ship, respondent was assigned to the Advanced Organization in Los Angeles, where he became the director of disbursements. He later became the Flag Banking Officer. *444 Alan Boughton, Flag Banking Officer International, was respondent's superior. Only respondent and Boughton knew the combination to the safe kept in respondent's office. Respondent handled foreign currency, American cash, and various travelers' checks as part of his job. In May or June 1969, respondent told Boughton that he wanted to leave the church. Boughton asked him to reconsider. Respondent wrote a memo and later a note; he spoke to the various executive officers. They told him that the only way he could get out of Sea Org was to go through "auditing" and to get direct permission from L. Ron Hubbard. Respondent wrote to Hubbard. A chaplain of the church came to see him. Lawrence Krieger, the highest ranking justice official of the church in California, told respondent that if he left without permission, he would be fair game and "You know we'll come and find you and we'll bring you back, and we'll deal with you in whatever way is necessary." On the night of June 7 or early morning of June 8, 1969, respondent went to his office at the Church of Scientology and took several documents from the safe. These documents were taken by him to the Internal Revenue Service in Kansas City; he used them to allege improper changes in the records of the church. He denies that any Swiss francs were in the safe that night or that he took such Swiss francs. Furthermore, respondent denies the allegation that he stole various travelers' checks from the safe. He admitted that some travelers' checks had his signature as an endorsement, but maintains that he deposited those checks into an open account of the Church of Scientology. There is independent evidence that tends to corroborate that statement. Respondent, having borrowed his roommate's car, drove to the airport and flew to Kansas City, where he turned over the documents to the Internal Revenue Service. Respondent was arrested in Florida upon a charge of grand theft. Boughton had called the Los Angeles Police Department to report that $23,000 in Swiss francs was missing. Respondent was arrested in Florida; he waived extradition and was in jail for 21 days. Eventually, the charge was dismissed. The deputy district attorney in Los Angeles recommended a dismissal in the interests of justice.[2] *445 CONTENTIONS ON APPEAL: 1. Respondent's trial counsel engaged in flagrant misconduct throughout the proceedings below and thereby deprived appellant of a fair trial. 2. The verdict below was reached as a result of (a) counsel's ascription to appellant of a religious belief and practices it did not have and (b) the distortion and disparagement of its religious character, and was not based upon the merits of this case. To allow a judgment thereby achieved to stand would constitute a violation of appellant's free exercise of religion. 3. Respondent failed to prove that appellant maliciously prosecuted him and therefore the judgment notwithstanding the verdict should have been granted. 4. The refusal of the trial court to ask or permit voir dire questions of prospective jurors pertaining to their religious prejudices or attitudes deprived appellant of a fair trial. 5. It was prejudicial error to direct the jury, in its assessment of the malicious prosecution claim, to disregard evidence that respondent stole appellant's Australian and American Express travelers' checks. 6. The order of the trial court in denying to appellant discovery of the factual basis for the obtaining of a dismissal by the district attorney of the criminal case People v. Allard was an abuse of discretion and a new trial should be granted and proper discovery permitted. 7. Respondent presented insufficient evidence to support the award of $50,000 in compensatory damages which must have been awarded because of prejudice against appellant. 8. Respondent failed to establish corporate direction or ratification and also failed to establish knowing falsity and is therefore not entitled to any punitive damages. 9. Even if the award of punitive damages was proper in this case, the size of the instant reward, which would deprive appellant church of more *446 than 40 percent of its net worth, is grossly excessive on the facts of this case. 10. There was lack of proper instruction regarding probable cause.[3] DISCUSSION: 1. There was no prejudicial misconduct by respondent's trial counsel, and appellant was not deprived of a fair trial. Appellant claims that it was denied a fair trial through the statements, questioning, and introduction of certain evidence by respondent's trial counsel. Love v. Wolf, 226 Cal. App.2d 378 [38 Cal. Rptr. 183], is cited as authority. We have reviewed the entire record and find appellant's contentions to be without merit. Several of counsel's individual statements and questions were inappropriate. However, there often were no objections by counsel for appellant where an objection and subsequent admonition would have cured any defect; or there was an objection, and the trial court judiciously admonished the jury to disregard the comment. Except for these minor and infrequent aberrations, the record reveals an exceptionally well-conducted and dispassionate trial based on the evidence presented. As in Stevens v. Parke, Davis & Co., 9 Cal.3d 51, 72 [107 Cal. Rptr. 45, 507 P.2d 653], a motion for a new trial was made, based in part upon the alleged misconduct of opposing counsel at trial. (1) What was said in Stevens applies to the instant case. "`A trial judge is in a better position than an appellate court to determine whether a verdict resulted wholly, or in part, from the asserted misconduct of counsel and his conclusion in the matter will not be disturbed unless, under all the circumstances, it is plainly wrong.' [Citation.] From our review of the instant record, we agree with the trial judge's assessment of the conduct of plaintiff's counsel and for the reasons stated above, we are of the opinion that defendant has failed to demonstrate prejudicial misconduct on the part of such counsel." (Stevens v. Parke, Davis & Co., supra, 9 Cal.3d at p. 72.) 2. The procedure and verdict below does not constitute a violation of appellant's First Amendment free exercise of religion. *447 (2) Appellant contends that various references to practices of the Church of Scientology were not supported by the evidence, were not legally relevant, and were unduly prejudicial. The claim is made that the trial became one of determining the validity of a religion rather than the commission of a tort. The references to which appellant now objects were to such practices as "E-meters," tin cans used as E-meters, the creation of religious doctrine purportedly to "get" dissidents, and insinuations that the Church of Scientology was a great money making business rather than a religion. The principal issue in this trial was one of credibility. If one believed defendant's witnesses, then there was indeed conversion by respondent. However, the opposite result, that reached by the jury, would naturally follow if one believed the evidence introduced by respondent. Appellant repeatedly argues that the introduction of the policy statements of the church was prejudicial error. However, those policy statements went directly to the issue of credibility. Scientologists were allowed to trick, sue, lie to, or destroy "enemies." (Exhibit 1.) If, as he claims, respondent was considered to be an enemy, that policy was indeed relevant to the issues of this case. That evidence well supports the jury's implied conclusion that respondent had not taken the property of the church, that he had merely attempted to leave the church with the documents for the Internal Revenue Service, and that those witnesses who were Scientologists or had been Scientologists were following the policy of the church and lying to, suing and attempting to destroy respondent. Evidence of such policy statements were damaging to appellant, but they were entirely relevant. They were not prejudicial. A party whose reprehensible acts are the cause of harm to another and the reason for the lawsuit by the other cannot be heard to complain that its conduct is so bad that it should not be disclosed. The relevance of appellant's conduct far outweighs any claimed prejudice.[4] We find the introduction of evidence of the policy statements and other peripheral mention of practices of the Church of Scientology not to be error. In the few instances where mention of religious practices may have been slightly less germane than the policy statements regarding fair game, they were nonetheless relevant and there was no prejudice to appellant by the introduction of such evidence. *448 3. The trial court properly denied the motion for judgment notwithstanding the verdict. (3) Appellant claimed that it had probable cause to file suit against respondent. The claim is made that even if Alan Boughton did take the checks from the safe, knowledge of that act should not be imputed to appellant church. Based on the policy statements of appellant that were introduced in evidence, a jury could infer that Boughton was within the scope of his employment when he stole the francs from the safe or lied about respondent's alleged theft. Inferences can be drawn that the church, through its agents, was carrying out its own policy of fair game in its actions against respondent. Given that view of the evidence, which as a reviewing court we must accept, there is substantial evidence proving that appellant maliciously prosecuted respondent. Therefore, the trial court did not err in denying the motion for the judgment notwithstanding the verdict. 4. The trial court performed proper voir dire of prospective jurors. (4) Appellant claims that the trial court refused to ask or permit voir dire questions of prospective jurors pertaining to their religious prejudices or attitudes. The record does not so indicate. Each juror was asked if he or she had any belief or feeling toward any of the parties that might be regarded as a bias or prejudice for or against any of them. Each juror was also asked if he or she had ever heard of the Church of Scientology. If the juror answered affirmatively, he or she was further questioned as to the extent of knowledge regarding Scientology and whether such knowledge would hinder the rendering of an impartial decision. One juror was excused when she explained that her husband is a clergyman and that she knows a couple that was split over the Church of Scientology. (5) The trial court's thorough questioning served the purpose of voir dire, which is to select a fair and impartial jury, not to educate the jurors or to determine the exercise of peremptory challenges. (Rousseau v. West Coast House Movers, 256 Cal. App.2d 878, 882 [64 Cal. Rptr. 655].) 5. It was not prejudicial error to direct the jury, in its assessment of the malicious prosecution claim, to disregard evidence that respondent stole appellant's Australian and American Express travelers' checks. *449 (6) Appellant submits that evidence of respondent's purported theft of the Australian and American Express travelers' checks should have been admitted as to the issue of malicious prosecution as well as the cross-complaint as to conversion. If there were any error in this regard, it could not possibly be prejudicial since the jury found for respondent on the cross-complaint. It is evident that the jury did not believe that respondent stole the travelers' checks; therefore, there could be no prejudice to appellant by the court's ruling. 6. Appellant suffered no prejudice by the trial court's denial of discovery of the factual basis for obtaining of the dismissal by the district attorney. (7) Prior to trial, appellant apparently sought to discover the reasons underlying the dismissal of the criminal charges against respondent. This was relevant to the instant case since one of the elements of a cause of action for malicious prosecution is that the criminal prosecution against the plaintiff shall have been favorably terminated. (Jaffe v. Stone, 18 Cal.2d 146 [114 P.2d 335, 135 A.L.R. 775].) Whether or not the lower court was justified in making such an order, the denial of discovery along these lines could not be prejudicial. During the trial, counsel for all parties stipulated that the criminal proceedings against Allard were terminated in his favor by a dismissal by a judge of that court upon the recommendation of the district attorney. In addition, there was a hearing outside the presence of the jury in which the trial court inquired of the deputy district attorney as to the reasons for the dismissal. It was apparent at that time that the prospective witnesses for the Church of Scientology were considered to be evasive. There was no prejudice to appellant since the deputy district attorney was available at trial. Earlier knowledge of the information produced would not have helped defendant. We find no prejudicial error in the denial of this discovery motion. 7. The award of $50,000 compensatory damages was proper. Appellant contends that based upon the evidence presented at trial, the compensatory damage award is excessive. In addition, appellant contends that the trial court erred in not allowing appellant to introduce evidence of respondent's prior bad reputation. *450 (8a) There was some discussion at trial as to whether respondent was going to claim damaged reputation as part of general damages. The trial court's initial reaction was to allow evidence only of distress or emotional disturbance; in return for no evidence of damaged reputation, appellant would not be able to introduce evidence of prior bad reputation. The court, however, relying on the case of Clay v. Lagiss, 143 Cal. App.2d 441 [299 P.2d 1025], held that lack of damage to reputation is not admissible. Therefore, respondent was allowed to claim damage to reputation without allowing appellant to introduce evidence of his prior bad reputation. In matters of slander that are libelous per se, for example the charging of a crime, general damages have been presumed as a matter of law. (Douglas v. Janis, 43 Cal. App.3d 931, 940 [4] [118 Cal. Rptr. 280], citing Clay v. Lagiss, supra, 143 Cal. App.2d at p. 448. Compare Gertz v. Robert Welch, Inc., 418 U.S. 323 [41 L.Ed.2d 789, 94 S.Ct. 2997].)[5] (9) Damages in malicious prosecution actions are similar to those in defamation. Therefore, damage to one's reputation can be presumed from a charge, such as that in the instant case that a person committed the crime of theft. (8b) In any event, as the trial court in the instant case noted, there was no offer of proof regarding respondent's prior bad reputation; any refusal to allow possible evidence on that subject has not been shown to be error, much less prejudicial error. (10) Appellant further contends that the amount of compensatory damages awarded was excessive and that the jury was improperly instructed regarding compensatory damages. The following modified version of BAJI Nos. 14.00 and 14.13 was given: "If, under the court's instructions, you find that plaintiff is entitled to a verdict against defendant, you must then award plaintiff damages in an amount that will reasonably compensate him for each of the following elements of loss or harm, which in this case are presumed to flow from *451 the defendant's conduct without any proof of such harm or loss: damage to reputation, humiliation and emotional distress. "No definite standard or method of calculation is prescribed by law to fix reasonable compensation for these presumed elements of damage. Nor is the opinion of any witness required as to the amount of such reasonable compensation. Furthermore, the argument of counsel as to the amount of damages is not evidence of reasonable compensation. In making an award for damage to reputation, humiliation and emotional distress, you shall exercise your authority with calm and reasonable judgment, and the damages you find shall be just and reasonable." The following instruction was requested by defendant and was rejected by the trial court: "The amount of compensatory damages should compensate plaintiff for actual injury suffered. The law will not put the plaintiff in a better position than he would be in had the wrong not been done." Accompanying the request for that motion is a citation to Staub v. Muller, 7 Cal.2d 221 [60 P.2d 283], and Basin Oil Co. v. Baash-Ross Tool Co., 125 Cal. App.2d 578 [271 P.2d 122]. The Supreme Court has recognized that "Damages potentially recoverable in a malicious prosecution action are substantial. They include out-of-pocket expenditures, such as attorney's and other legal fees ...; business losses ...; general harm to reputation, social standing and credit ...; mental and bodily harm ...; and exemplary damages where malice is shown...." (Babb v. Superior Court, 3 Cal.3d 841, 848, fn. 4 [92 Cal. Rptr. 179, 479 P.2d 379].) While these damages are compensable, it is the determination of the damages by the jury with which we are concerned. Appellant seems to contend that the jury must have actual evidence of the damages suffered and the monetary amount thereof. "`The determination of the jury on the issue of damages is conclusive on appeal unless the amount thereof is so grossly excessive that it can be reasonably imputed solely to passion or prejudice in the jury. [Citations.]'" (Douglas v. Janis, supra, 43 Cal. App.3d at p. 940.) The presumed damage to respondent's reputation from an unfounded charge of theft, along with imprisonment for 21 days, and the mental and emotional anguish that must have followed are such that we cannot say that the jury's finding of $50,000 in compensatory damages is unjustified. *452 That amount does not alone demonstrate that it was the result of passion and prejudice. 8. Respondent is entitled to punitive damages. (11) Appellant cites the general rule that although an employer may be held liable for an employee's tort under the doctrine of respondeat superior, ordinarily he cannot be made to pay punitive damages where he neither authorized nor ratified the act. (4 Witkin, Summary of Cal. Law. (8th ed.) § 855, p. 3147.)[6] Appellant claims that the Church of Scientology, which is the corporate defendant herein, never either authorized or ratified the malicious prosecution. The finding of authorization may be based on many grounds in the instant case. For example, the fair game policy itself was initiated by L. Ron Hubbard, the founder and chief official in the church. (Exhibit 1.) It was an official authorization to treat "enemies" in the manner in which respondent herein was treated by the Church of Scientology. Furthermore, all the officials of the church to whom respondent relayed his desire to leave were important managerial employees of the corporation. (See 4 Witkin, Summary of Cal. Law (8th ed.) supra, § 857, p. 3148.) The trier of fact certainly could have found authorization by the corporation of the act involved herein. 9. The award of punitive damages. (12) Any party whose tenets include lying and cheating in order to attack its "enemies" deserves the results of the risk which such conduct entails. On the other hand, this conduct may have so enraged the jury that the award of punitive damages may have been more the result of *453 feelings of animosity, rather than a dispassionate determination of an amount necessary to assess defendant in order to deter it from similar conduct in the future. In our view the disparity between the compensatory damages ($50,000) and the punitive damages ($250,000) suggests that animosity was the deciding factor. Our reading of the decisional authority compels us to conclude that we should reduce the punitive damages. We find $50,000 to be a reasonable amount to which the punitive damages should be reduced. We perceive this duty, and have so modified the punitive damages award not with any belief that a reviewing court more ably may perform it.[7] (13) Simply stated the decisional authority seems to indicate that the reviewing court should examine punitive damages and where necessary modify the amount in order to do justice. (Cunningham v. Simpson, 1 Cal.3d 301 [81 Cal. Rptr. 855, 461 P.2d 39]; Forte v. Nolfi, 25 Cal. App.3d 656 [102 Cal. Rptr. 455]; Shroeder v. Auto Driveaway Company, 11 Cal.3d 908 [114 Cal. Rptr. 622, 523 P.2d 662]; Livesey v. Stock, 208 Cal. 315, 322 [281 P. 70].) 10. Instruction on probable cause. Appellant requested an instruction stating: "Where it is proven that a judge has had a preliminary hearing and determined that the facts and evidence show probable cause to believe the plaintiff guilty of the offense charged therefore, ordering the plaintiff to answer a criminal complaint, this is prima facie evidence of the existence of probable cause." The trial court gave the following instruction: "The fact that plaintiff was held to answer the charge of grand theft after a preliminary hearing is evidence tending to show that the initiator of the charge had probable cause. This fact is to be considered by you along with all the other evidence tending to show probable cause or the lack thereof."[8] Appellant claimed for the first time in its reply brief that the trial court's lack of proper instruction regarding probable cause was prejudicial error. Since this issue was raised for the first time in appellant's reply brief, we decline to review the issue.[9] *454 The judgment is modified by reducing the award of punitive damages only, from $250,000 to the sum of $50,000. As modified the judgment is in all other respects affirmed. Costs on appeal are awarded to respondent Allard. Roth, P.J., and Fleming, J., concurred. A petition for a rehearing was denied June 17, 1976, and the petitions of both parties for a hearing by the Supreme Court were denied July 15, 1976. NOTES [1] One such policy, to be enforced against "enemies" or "suppressive persons" was that formerly titled "fair game." That person "[m]ay be deprived of property or injured by any means by any Scientologist without any discipline of the Scientologist. May be tricked, sued or lied to or destroyed." (Exhibit 1.) [2] Leonard J. Shaffer, the deputy district attorney, testified outside the presence of the jury that members of the church were evasive in answering his questions. He testified that the reasons for the dismissal were set forth in his recommendation; the dismissal was not part of a plea bargain or procedural or jurisdictional issue. [3] This issue is raised for the first time in appellant's reply brief. [4] The trial court gave appellant almost the entire trial within which to produce evidence that the fair game policy had been repealed. Appellant failed to do so, and the trial court thereafter permitted the admission of Exhibit 1 into evidence. [5] The Supreme Court held in Gertz v. Robert Welch, Inc., supra, 418 U.S. 323, 349 [41 L.Ed.2d 789, 810], an action for defamation, that "the States may not permit recovery of presumed or punitive damages, at least when liability is not based on a showing of knowledge of falsity or reckless disregard for the truth." (Italics added.) The instant case is distinguishable from Gertz. Initially, the interests protected by a suit for malicious prosecution include misuse of the judicial system itself; a party should not be able to claim First Amendment protection maliciously to prosecute another person. Secondly, the jury in the instant case must have found "knowledge of falsity or reckless disregard for the truth" in order to award punitive damages herein. Therefore, even under Gertz, a finding of presumed damages is not unconstitutional. [6] We again note that Gertz v. Robert Welch, Inc., supra, precludes the award of punitive damages in defamation actions "at least when liability is not based on a showing of knowledge of falsity or reckless disregard for the truth." The facts of the instant case fall within that categorization, so a finding of punitive damages was proper. Moreover, as we noted above, an egregious case of malicious prosecution subjects the judicial system itself to abuse, thereby interfering with the constitutional rights of all litigants. Punitive damages may therefore be more easily justified in cases of malicious prosecution than in cases of defamation. The societal interests competing with First Amendment considerations are more compelling in the former case. [7] See dissent in Cunningham v. Simpson, 1 Cal.3d 301 [81 Cal. Rptr. 855, 461 P.2d 39]. [8] This instruction was given on the court's own motion. [9] We note that given the circumstances of the instant case, the juror could have easily been misled by the requested instruction. If the evidence showed that the agents and employees of appellant were lying, then the preliminary hearing at which they also testified would not be valid. While the jurors may of course consider that the magistrate at the preliminary hearing found probable cause, that should be in no way conclusive in the jury's determination of probable cause.
{ "pile_set_name": "FreeLaw" }
Q: Django ModelForm not showing up in template I've been using django for a couple of days now and I'm trying to create a small app to learn the whole stuff. I've read about the ModelForms and I wanted to use it in my app, but I can't get it to render in my template and I can't find the problem, so I was hoping you guys could help me out. Here's my code: models.py from django.db import models class Kiss(models.Model): latitude = models.FloatField() longitude = models.FloatField() person1 = models.CharField(max_length = 255) person2 = models.CharField(max_length = 255) cdate = models.DateTimeField(auto_now_add=True) def __unicode__(self): return self.person1 views.py from django.views.generic.list import ListView from project.models import Kiss from project.forms import KissForm from django.http import HttpResponseRedirect class KissListView(ListView): template_name = 'project/home.html' model = Kiss form = KissForm urls.py (only the relevant part) urlpatterns += patterns('', url(r'^$', KissListView.as_view(), name='home'), ) forms.py from django import forms from project.models import Kiss class KissForm(forms.ModelForm): class Meta: model = Kiss and the template <form action="" method="POST"> {% csrf_token %} {{form.as_p}} <button>Send</button> </form> Thanks in advance for your help. J A: class KissListView(ListView): ... You are using ListView which does not require form and will not give you form in the template context. You may want to use CreateView instead.
{ "pile_set_name": "StackExchange" }
Social deprivation and primary hyperparathyroidism. To investigate the potential relationship between social status or deprivation and the prevalence of primary hyperparathyroidism (PHPT). We retrospectively identified a cohort of patients diagnosed as having PHPT between 1981 and 2007 from the Scottish Morbidity Records database. The Scottish Index of Multiple Deprivation (SIMD) 2006 quintiles were derived for these patients by using the postal codes. The distribution of the SIMD quintiles was examined to determine the possible influence of deprivation on the incidence of PHPT. In Scotland between 1981 and 2007, 3,039 patients were diagnosed as having PHPT, in accordance with the International Classification of Diseases code for PHPT. The distribution of the PHPT cohort across the SIMD 2006 quintiles was significantly different from that expected, with a higher representation (27.2%) among the most deprived and a lower representation (14.5%) in the least deprived quintile, in comparison with the 20% expected in each quintile (P<.0001). The findings in this study suggest that socioeconomic deprivation is associated with an increased risk of developing PHPT.
{ "pile_set_name": "PubMed Abstracts" }
Alexander Bell Donald Alexander Bell Donald (18 August 1842–7 March 1922) was a New Zealand seaman, sailmaker, merchant and ship owner. He was born in Inverkeithing, Fife, Scotland on 18 August 1842. References Category:1842 births Category:1922 deaths Category:Scottish emigrants to New Zealand Category:People from Inverkeithing
{ "pile_set_name": "Wikipedia (en)" }
4 ideas for improving your e-commerce ​website 2019 is here, and the new year provides an excellent opportunity to refresh your e-commerce website, by adding new features and updating content. Adding web banners Web banners are a great way to keep your e-commerce website homepage looking fresh, and making viewers aware of the latest news about products and offers. They can be easily modified to serve a range of purposes, are potentially eye-catching if they are placed in the appropriate area and are a good way of promoting a specific product or offer on a homepage while also retaining the core brand visuals elsewhere. The image below is an example of a web banner in development. We’ve put together a handy guide for creating your banners – click here. Adding new features New features on your e-commerce website can add value through improved functionality, which in turn enhances the usability for customers and users. Features that allow for easy modification to products that they wish to purchase, such as different colours or quantities, or a social login function that enables users to create an account through their Facebook credentials. Such responsive features make the e-commerce process as painless and easy-to-use as possible, limiting the barriers between browsing and purchase, in turn improving conversion rates and the chances of customers returning for more in the future. A positive experience can often leave the customer wanting more, and it’s the websites job to ensure that their features and functionality are kept updated and fit for purpose, in response to the ever-changing demands of the modern e-commerce customer. For example, one of the new features we’ve recently added from Amasty is the Social Login, which allows users to set up their account using login credentials from Facebook. To find out more about this feature, click here. Improve optimisation While you’re reading this, grab a smartphone or tablet and have a browse around your website. How does it look? Are the images stacked or overlapping, or is there text missing? These issues mean your website has not been optimised for mobile devices, making it unusable for a large percentage of potential customers browsing with their iPhones or Samsungs. Users are extremely unlikely to want to fight through images and texts to find the products they want, and will quickly become frustrated and depart for a different site. Don’t neglect these customers! Get your site optimised for different devices to reach as wide an audience as possible. Data from 2018, shown below in the graph, from Statista.com, shows that 52.2% of all browsing online was done on a mobile device, a trend which has grown exponentially year-upon-year. This graph underlines the importance of ensuring that your website is fit for use for all potential users. You’re potentially missing out on reaching these customers if your site doesn’t meet their demands, and, with the trend of mobile browsing only set to rise, optimising your website to ensure it’s fit for use is quickly become a necessity for online retailers. Our Liquidshop e-commerce platform is designed to provide the best user experience for your customers, though responsive e-commerce. Optimisation on devices of all sizes allows your website to be user-friendly for as many potential visitors as possible, expanding your reach and enhancing the user experience, leading to increased sales as part of the smooth and responsive overall e-commerce experience. Keeping branding updated and consistent There are few things more off-putting when navigating onto an e-commerce website that a poorly designed logo at the top of the page, or old, pixilated imagery taking up the homepage. A consistent brand image across the pages improves brand recognition for customers and gives the impression of a modern, well designed and cared for website and business as a whole. You can also create special themed logos for holiday times such as Christmas or winter, like we did with our logo below. What’s most important is too put time and effort into keeping your website updated. Whether that’s imagery, information or branding, putting the time into maintaining an attractive and cohesive e-commerce site means you keep your customers, and new visitors engaged and ensure that there as few barriers as possible between browsing and purchase. Magento is ending support for version 1 in June 2020. After initially announcing that November 2018 would be the cut-off point, this was revised to the later date, to allow for the vast amount of v1 websites around the world to be upgraded and rebuilt in v2. What... We closely monitor all areas of e-commerce, always on the lookout for developments that offer additional functionality and improved performance for our Liquidshop clients and their customers. One development that is a growing concern throughout the industry is... In case you missed the news last week, Liquidshop has become an official partner of Magento feature developer Amasty. Liquidshop has been recognised by Amasty as a company who have significant expertise and skills in Magento web development. This underlines the...
{ "pile_set_name": "Pile-CC" }
Update: Sree Narasimha Jayanthi – May 17th 2019 This day signifies the appearance of Lord Narasimha on the planet. Lord Narasimha is the fourth and the greatest incarnation of Lord Vishnu. He is believed to have appeared to protect his devotee, Prahlada, from his father Hiranyakashyapu . If you listen to the song ” Narashima Nembo davana” posted on youtube, there is a paragraph which explains how Lord Narashima came from the pillar. Hiranyakashyapu pointed out at a pillar in his palace and asked Prahalada whether Lord Vishnu was present in it pillar. Prahalada who was a great devotee said yes. Next, you know Hiranyakashyapu uses his Gadha and broke open the pillar and there emerged our Lord Narasimha who than slained Hiranyakashyapu using his sharp paws. The day signifies the triumph of good over evil and the eagerness of the lord to protect his devotees from evil. When my Parents visited us last year, my Father recited the “Bhagavatha Purana” for three weeks at my place. The way my Dad explained this part of the Purana, brings tears to my eyes every time I listen “Narashima Nembo Devana”. The greatest mistake I made was to not record the purana. Hopefully will record the next time my Father visits us. About Narasimha Jayanthi: Ms. Lakshmi’s write up summary from the book “ಭಾರತೀಯ ಹಬ್ಬ ಹರಿದಿನಗಳು” by ಶ್ರೀ ಶ್ರೀ ರಂಗಪ್ರಿಯ ಮಹಾದೇಷಿಕ ಸ್ವಾಮಿಗಳು. “The pillar in evil Hiranyakashipu’s royal court, signifies the ṃērusthambha, the central backbone system. Through the central nervous system called ṣuśumna, the brilliant light emanated. The energy associated came out in its full fierce glory as Narasimha and later transformed into the peaceful form after the destruction of evil force.” When is Narasimha Jayanthi celebrated? Narasimha Jayanthi is one of the important festivals of Vaiśnavas. It is celebrated in the vaiśāka māsam,on ṣukla pakśa chaturdaśi, after akśhaya thrithēya, svāti nakśatra, siddha Yōga, vanija karanam. The date is determined according to chāndramāna system. Since the inception of this avatāram is in the evening, the worship is done in the evening. It is considered to be more auspicious if this day coincides with sōmavasarē, Monday or ṣanivasarē, Saturday. It is a sacred day to remember Lord Narasimha’s sarva vyāpakatva- all pervading – spiritual knowledge, wealth, strength, valor, splendor, and compassion toward His devotees. Which are the major manifestations of Lord Narasimha? There are three major forms of Lord Narasimha. 1. Ugra-Narasimha – His fierce form: In this form He has conch – ṣanka, discus – chakra, mace – gada, bow – chāpa, bells – ghanta-, trident like – ankuśa, and his two hands ready to chisel the demon heart, as His āyudhams – weapons. This form is worshipped in the evenings. 2. Lakshmi Narasimha: In this form he is very peaceful – ṣanta – with His consort – Sri Lakshmi sitting on his left lap, with ādiseṣa on his head as umbrella, and Prahallāda standing in his front praying with his folded hands. This manifestation is followed after his fierce form– as a result, he is worshipped in the morning. 3. Yoga Narasimha – meditative: Here, He is in his Meditative form for those who aspire for results of Yoga. – Incense, lamplight, flowers and ṣrigandha or perfume.- tuḻasi or Holy Basil — Since he has the element of both viśnu and rudra- kamalam – Lotus, bilva daḻam – leaves of stone apple, japākusumam- red hibiscus can be offered to the Lord. What kinds of food can be offered to Lord Narasimha? Athirasa – fried cake made with jaggery and rice flour. Pāyasa – milk puddings made out of any of moong dal, channa dal, and – – – Pānaka – typically made with jaggery water and pepper, or fruit juice like lemonade. Any sātvik food can be offered with great devotion by chanting the Narasimha Mantra. sātvik food is that food creates an internal calmness and balance, when one consumes it. The lord graciously accepts devotees’ service and reverence. All worship should be followed by distribution of Prasāda or food offered to God. How do we worship Lord Narasimha? Lord Narasimha can be worshipped in two ways. The first is detailed below: Along with firm faith, worship of Narasimha is associated with rigid criteria. This is explained in detail below 1. ācharana ṣuddhi – Requires strict adherence to performance. 2. Cleanliness of ḍravya- physical things like utensils, lamps, ingredients. 3. Inner sanctity of five senses – body, intellect, mind, place, and act of worship 4. Chastity of Mind, speech and deeds unification, compassion, calmness of virtuous soul within. These are to prevent any glitches that might distract the mind while doing the worship. 5. Taking bath and starting with daily routine worship followed by pūja sankalpa-declaration to do worship, and completion without break with little or no food intake till then. 6. Bodily calmness in turn calms the mind. This helps to open up the channel that leads to internal visualization and realization of Narasimha. These are things that keep body, mind and intellect in balance to further the pursuit of (worship til)attaining perfection. 7. Those who seek Salvation, do fasting till worship is over in the evening.Those who seek all types of desire fulfillment do fasting till the next day morning worship and follow with chanting of Narasimha mantra. 8. To do further, people could do hōma – oblation and read “Nrsimhatāpini ” upaniśad. 9. An idol of Narasimha can be donated to someone who has great respect and potential to worship the idol. The second means of worship is detailed for those who find it difficult to adhere to the above strict rules, can do the following steps 1. ḍhyāna or meditation – along with imagining the worship of Narasimha with the above said flowers etc. 2. Acts of mind and soul offered to God is also oblation. This is equivalent to hōmam. 3.Various purifying actions performed during puja a. snānha – ablution, pāna – intake of water and food offered to God b. pādya – chant with clean and clear heart and intellect c. arghya – water offered with respect from the river of faith d. āchamana – water used for sipping same river e. abhiśeka – for the lord f. Mind filled with the flow of thoughts of God from the river of faith, ṣraddha – as the water for cleansing. 4. ātma – Offer sacred soul which is inside the body. 5. bow and perform salutation with state of equanimity 6. ṣaranāgati– self surrender to the Lord With pure mind and internal contemplation there is no need for external rituals to be performed. Pāramārthika or worship of realizing supreme alone with internal purity surpasses all other forms of worship. That is, true worship with internal purity is more powerful than the external rituals. As part of worship, singing, listening to discourse is recommended at the end of the worship. Insight about this incarnation of ṣri mahāviśnu: The brilliant form of Narasimha is described as comprising of three entities. 1. Brahma from feet to naval, 2. Vishnu–naval to neck 3. Rudra–neck unto head., From there onwards– it is the supreme Godhead, Parabrahma. Narasimha is personification of truth–perceived and experienced by those who are in the state of union with divine, and that, which is beyond senses – Yoga Samādhi. The brilliant form of Narasimha is also considered and viewed as an internal phenomenon. Dear Smt.Meera Raghu, Thanks for giving us a very comprehensive information on Narasimha Jayanti. Your efforts are always excellent, perfect and highly useful to all in Madhwa community.Rayaru will keep you and your family always happy hale and healthy to continue this sacred service. I just thought of sharing a very sacred stotra on Narasimha which I learnt from somebody (I dont remeber right now.) and chanting this stotra 5 time at any distressful/critical situation will clear the situation with wonderful solution to the problem causing the distress/crisis. I have reproduced this stotra below for the benefit of everyone Hare Krsna dear Meera Mataji! Dandavat pranaam! Thank you for the wonderful article but the word “Idol” is completely wrong, it is to be mentioned as “Deity”. The word Idol, which means “an object of false worship”, was introduced by the British to destroy our Vedic Culture. Thank you 🙂 About Narasimha Jayanthi: Here is my write up summary from the book “ಭಾರತೀಯ ಹಬ್ಬ ಹರಿದಿನಗಳು” by ಶ್ರೀ ಶ್ರೀ ರಂಗಪ್ರಿಯ ಮಹಾದೇಷಿಕ ಸ್ವಾಮಿಗಳು “The pillar in evil Hiranyakashipu’s royal court, signifies the ṃērusthambha, the central backbone system. Through the central nervous system called ṣuśumna, the brilliant light emanated. The energy associated came out in its full fierce glory as Narasimha and later transformed into the peaceful form after the destruction of evil force.” When is Narasimha Jayanthi celebrated? Narasimha Jayanthi is one of the important festivals of Vaiśnavas. It is celebrated in the vaiśāka māsam,on ṣukla pakśa chaturdaśi, after akśhaya thrithēya, svāti nakśatra, siddha Yōga, vanija karanam. The date is determined according to chāndramāna system. Since the inception of this avatāram is in the evening, the worship is done in the evening. It is considered to be more auspicious if this day coincides with sōmavasarē, Monday or ṣanivasarē, Saturday. It is a sacred day to remember Lord Narasimha’s sarva vyāpakatva- all pervading – spiritual knowledge, wealth, strength, valor, splendor, and compassion toward His devotees. Which are the major manifestations of Lord Narasimha? There are three major forms of Lord Narasimha. 1. Ugra-Narasimha – His fierce form: In this form He has conch – ṣanka, discus – chakra, mace – gada, bow – chāpa, bells – ghanta-, trident like – ankuśa, and his two hands ready to chisel the demon heart, as His āyudhams – weapons. This form is worshipped in the evenings. 2. Lakshmi Narasimha: In this form he is very peaceful – ṣanta – with His consort – Sri Lakshmi sitting on his left lap, with ādiseṣa on his head as umbrella, and Prahallāda standing in his front praying with his folded hands. This manifestation is followed after his fierce form– as a result, he is worshipped in the morning. 3. Yoga Narasimha – meditative: Here, He is in his Meditative form for those who aspire for results of Yoga. – Incense, lamplight, flowers and ṣrigandha or perfume.- tuḻasi or Holy Basil — Since he has the element of both viśnu and rudra- kamalam – Lotus, bilva daḻam – leaves of stone apple, japākusumam- red hibiscus can be offered to the Lord. What kinds of food can be offered to Lord Narasimha? Athirasa – fried cake made with jaggery and rice flour. Pāyasa – milk puddings made out of any of moong dal, channa dal, and – – – Pānaka – typically made with jaggery water and pepper, or fruit juice like lemonade. Any sātvik food can be offered with great devotion by chanting the Narasimha Mantra. sātvik food is that food creates an internal calmness and balance, when one consumes it. The lord graciously accepts devotees’ service and reverence. All worship should be followed by distribution of Prasāda or food offered to God. How do we worship Lord Narasimha? Lord Narasimha can be worshipped in two ways. The first is detailed below: Along with firm faith, worship of Narasimha is associated with rigid criteria. This is explained in detail below 1. ācharana ṣuddhi – Requires strict adherence to performance. 2. Cleanliness of ḍravya- physical things like utensils, lamps, ingredients. 3. Inner sanctity of five senses – body, intellect, mind, place, and act of worship 4. Chastity of Mind, speech and deeds unification, compassion, calmness of virtuous soul within. These are to prevent any glitches that might distract the mind while doing the worship. 5. Taking bath and starting with daily routine worship followed by pūja sankalpa-declaration to do worship, and completion without break with little or no food intake till then. 6. Bodily calmness in turn calms the mind. This helps to open up the channel that leads to internal visualization and realization of Narasimha. These are things that keep body, mind and intellect in balance to further the pursuit of (worship til)attaining perfection. 7. Those who seek Salvation, do fasting till worship is over in the evening.Those who seek all types of desire fulfillment do fasting till the next day morning worship and follow with chanting of Narasimha mantra. 8. To do further, people could do hōma – oblation and read “Nrsimhatāpini ” upaniśad. 9. An idol of Narasimha can be donated to someone who has great respect and potential to worship the idol. The second means of worship is detailed for those who find it difficult to adhere to the above strict rules, can do the following steps 1. ḍhyāna or meditation – along with imagining the worship of Narasimha with the above said flowers etc. 2. Acts of mind and soul offered to God is also oblation. This is equivalent to hōmam. 3.Various purifying actions performed during puja a. snānha – ablution, pāna – intake of water and food offered to God b. pādya – chant with clean and clear heart and intellect c. arghya – water offered with respect from the river of faith d. āchamana – water used for sipping same river e. abhiśeka – for the lord f. Mind filled with the flow of thoughts of God from the river of faith, ṣraddha – as the water for cleansing. 4. ātma – Offer sacred soul which is inside the body. 5. bow and perform salutation with state of equanimity 6. ṣaranāgati– self surrender to the Lord With pure mind and internal contemplation there is no need for external rituals to be performed. Pāramārthika or worship of realizing supreme alone with internal purity surpasses all other forms of worship. That is, true worship with internal purity is more powerful than the external rituals. As part of worship, singing, listening to discourse is recommended at the end of the worship. Insight about this incarnation of ṣri mahāviśnu: The brilliant form of Narasimha is described as comprising of three entities. 1. Brahma from feet to naval, 2. Vishnu–naval to neck 3. Rudra–neck unto head., From there onwards– it is the supreme Godhead, Parabrahma. Narasimha is personification of truth–perceived and experienced by those who are in the state of union with divine, and that, which is beyond senses – Yoga Samādhi. The brilliant form of Narasimha is also considered and viewed as an internal phenomenon.
{ "pile_set_name": "Pile-CC" }
XEMS-AM XEMS (branded as Radio Mexicana) is a Regional Mexican radio station that serves the Brownsville, Texas (United States) / Matamoros, Tamaulipas (Mexico) border area. History XEMS began broadcasting on 1500 kHz in 1952. It soon moved to 1490. External links radioavanzado.com raiostationworld.com; Radio stations in the Rio Grande Valley References Category:Spanish-language radio stations Category:Radio stations in Matamoros
{ "pile_set_name": "Wikipedia (en)" }
Q: Assembly in Visual Studio 2013 not building even after enabling Microsoft Macro Assembler I'm trying to run a pretty basic assembly file to do a little math and print the output, nothing challenging. I've followed the steps given from places such as here but my build still fails and there are errors on every single line about syntax. Errors such as: 1>c:\users\damian\documents\visual studio 2013\projects\test345\test345\source.asm(22): error C2061: syntax error : identifier 'dword' 1>c:\users\damian\documents\visual studio 2013\projects\test345\test345\source.asm(24): error C2061: syntax error : identifier 'add' 1>c:\users\damian\documents\visual studio 2013\projects\test345\test345\source.asm(27): error C2061: syntax error : identifier 'pop' 1>c:\users\damian\documents\visual studio 2013\projects\test345\test345\source.asm(12): error C2061: syntax error : identifier 'main' The code I'm trying to run is here. I've tried changing from cpp to c compiling, I've tried setting an entry point in the linker, and I've tried right clicking on project->Build Dependencies->Build Customizations and checking masm but none of those made any difference at all. Is there something else I'm missing? A: The code you tried to assemble uses NASM syntax. You need to configure Visual Studio to use NASM instead. 1) Install NASM and add it's path to the PATH environment variable. 2) Right click on your asm file and then choose Properties->General and then choose Custom Build Tool for the Item Type field. 3) Click on Apply. 4) On the Custom Build Tool page set nasm -f win32 -o "$(ProjectDir)$(IntDir)%(Filename).obj" "%(FullPath)" for the Command Line field. 5) Set the Outputs field to $(IntermediateOutputPath)%(Filename).obj This will make NASM assemble your assembly source file into visual studio compatible object file. We are not done yet though, you need to make some changes to the assembly file before you can link it using MSVC's linker. 1) MSVC's linker requires your functions to start with an underscore so main becomes _main. 2) The naming convention when declaring imported APIs is different too. So extern printf becomes extern __imp__printf 3) Call instructions to imported APIs are different too. call printf becomes call [__imp__printf]. The address of printf will be stored in an import table entry and our instruction dereferences it to find the address of printf and calls it. Trying to link this will also result in an error (error LNK2001: unresolved external symbol _mainCRTStartup). The way I beat this is including a c file with a dummy function that does nothing. That way, the CRT startup stub gets linked. (If there is a better method, suggest it in the comments).
{ "pile_set_name": "StackExchange" }
Comment by Loreanadruid Arguably Inferior Socket for Paladin PvE Gems for the most part, but Superior for PvP.A side-grade to t6, but an upgrade for almost anything pre-Sunwell. Comment by mikititan Anyone knows if this schematic will be buyable from the trainer or will it drop (raid/heroic)? -thanks Comment by gennym This item, and all the other engineering helm upgrades, are sunwell trash drops. So since people need to start farming the instance to begin with and there will be people in the raids who need it you probably won't see this on the AH for quite some time depending on the server. Comment by mbg98 I wouldn't call this a side grade at all, considering that Sunwell requires paladins to spam Holy Light a lot more than Flash of Light, making their mana regen come mostly from Illumination/holy crit (great for pallies with the 2 piece t6 crit bonus to HL) and being in a group with a Shadow Priest. The upgrades here are where it matters most - a 20 crit increase over t6 (more than 1 % - thats fantastic in a single piece!) and plus 9 healing. Armor? lol - what are you going to do, tank in holy gear in Sunwell? You'll need the stam for the boss fights consdering the dots that Kalecgos does, for starters. Int doesnt matter so much since your mana regen and your +heal are really the major factors in post BT/MH content. Comment by natto My server has pug groups for sunwell trush run. BoP/BoE recipes usually drops from 1 to 5 and lots of epic-stones. You do not have to wear BT/Hyjal geared, Kara/SSC/TK gears are fine for trush run. It usually goes 4k-5k on my server. It is a good resource of money, and you can call ppl when your guild does not have scheduled raid. However, you will need 5-6 mages for trush run. Comment by Altoid Dropped for me tonight on Garithos-US on the last pull before the first stairs in the instance. My guild's been running Sunwell since 2.4 release and the patterns are extremely rare. We've only had 4 patterns drop, ever, and two of them were the Sunfire Robe (both dropped the day before this Schematic). I was seriously beginning to believe I'd never get my hands on this because of its extreme rarity. I'm reasonably certain it's the only Sunwell Schematic to have dropped on my server as of yet. I've been passing on T6 helms for months in hopes of getting this and was going to give in and pick one up this week, then this baby swooped in! Comment by alexiel Can only be learned by Paladins. Comment by DELMistrzu Can I learn this Schematic as a Rogue ? Comment by Entilzha2161 You can only learn this on a pally and it's supposed to only drop for pallies, but it dropped for my DK today (maybe since there were no DKs when Sunwell was released?) My engineer is a druid and cannot use it but I hope some Paladin buys it as the sell price looks pretty high.
{ "pile_set_name": "Pile-CC" }
#ifndef CREATE_EMPTY_DIRECTED_GRAPH_WITH_GRAPH_NAME_H #define CREATE_EMPTY_DIRECTED_GRAPH_WITH_GRAPH_NAME_H #include <boost/graph/adjacency_list.hpp> boost::adjacency_list<boost::vecS, boost::vecS, boost::directedS, boost::no_property, boost::no_property, boost::property<boost::graph_name_t, std::string>> create_empty_directed_graph_with_graph_name() noexcept; #endif // CREATE_EMPTY_DIRECTED_GRAPH_WITH_GRAPH_NAME_H
{ "pile_set_name": "Github" }
Q: Send user to edit page without inserting the record I currently have an Apex class that pulls the data from a record of one custom object 'property__c' and uses it to create a record of another object 'proposal__c' and then redirects the user to this new record's edit view. However, there's a problem with this. On the edit page, if the user hits "cancel," the record is still inserted. This is because in order to direct the user to the edit view of the new record, we have to first insert that record so that we can pull its id. Outside of making a custom edit view for this object, is it possible to send the user to the edit view without inserting the record first? This would ideally behave the same as if the user simply hit the "new" button and then "cancel." The only difference is, we want some of the fields of the record to be pre-populated. Here is the code. You can see where it redirects the user at the bottom of the convert method. public class ControllerCreateProposalView { public Id propertyId; public ControllerCreateProposalView(ApexPages.StandardController stdController){ propertyId = ApexPages.CurrentPage().getParameters().get('id'); } public PageReference convert(){ PageReference pref; Property__c property = [ select Id, Name, OwnerId, Primary_Contact__c, from Property__c where Id = :propertyId limit 1 ]; Proposal__c proposal = new Proposal__c( Name = property.Name, OwnerId = property.ownerid, Property__c = property.Id, Client__c = property.Primary_Contact__c, ); insert proposal; String sServerName = ApexPages.currentPage().getHeaders().get('Host'); sServerName = 'https://'+sServerName+'/'; String editName='/e?retURL=%2F'+proposal.Id; pref = new PageReference(sServerName + proposal.Id+editName); pref.setRedirect(true); return pref; } public PageReference back(){ PageReference pref = new PageReference('/' + propertyId); pref.setRedirect(true); return pref; } } EDIT: I can send the user to the default edit page, which is /xxxx.salesforce.com/a0r/e?retURL=%2Fa0r%2Fo and I can even pass in values for standard fields, such as "name" /xxxx.salesforce.com/a0r/e?name=TEST&retURL=%2Fa0r%2Fo But I cannot pass custom fields. If I could pass custom fields in using this method, I believe I could achieve what I want to do. A: As you've mentioned in your edit, you can pass fields in the URL string, but only if you use the Field ID, a concept known as "Salesforce URL hacking". You can read more about that if wanted on this other Salesforce Stack: How do I prepopulate fields on a Standard layout? Keep in mind that, while it is possible to pre-populate standard and custom fields using this method, the implementation is difficult since there is no guarantee that your field IDs will be identical across different environments (sandboxes, dev orgs, production). If for example my Custom_Field__c has an ID of 00NJ00000022gx0 in my sandbox, it is not guaranteed to have that same ID in production. This could result in your custom links/buttons/logic not inserting the correct data if you accidentally overwrote a 'working' button with a button from another org with different hard coded IDs. You could probably create a custom setting that holds all of the correct IDs for the fields in each org, and then code your button to pull from that custom setting, but depending on how many fields you're pulling it could become a burden to maintain/update. Because of this, I wouldn't recommend this approach. Beyond that hack, I think the answer to your question is ultimately no. You can't edit a record until it has been committed, and you can't roll back the commit on cancel since it has already occurred and no triggers or workflows will fire on the cancel action. As a roundabout alternative, you could consider something like this: Create Boolean field (Default True) on Object being inserted that you want to 'roll back' Create WFR that sets that Boolean to FALSE (if it is currently TRUE) on successful edit of the record Using a relatively simple scheduled Apex job, you could query every hour for all object records that still have the Boolean value set to TRUE that were created more than an hour ago. Then delete all of those records. This approach wouldn't result in an instant delete when pressing cancel, but would provide for a way for the platform to 'clean' itself hour by hour to get rid of the unwanted records.
{ "pile_set_name": "StackExchange" }
Free peritoneal tumour cells are an independent prognostic factor in curatively resected stage IB gastric carcinoma. Several studies have shown that the cytological detection of free peritoneal tumour cells (FPTCs) in patients with gastric cancer indicates the presence of metastatic disease. The immunocytochemical detection of FPTCs, especially in early-stage tumours, has not been examined comprehensively. Peritoneal lavage was performed in 351 patients before curative resection of a gastric carcinoma between 1987 and 2001, and an adequate sample was obtained from 346 patients. FPTCs were detected immunocytochemically using Ber-EP4 antibody. Median follow-up time was 70 months. FPTCs were detected in the lavage fluid of 74 patients (21.4 per cent) and correlated with increasing pathological tumour depth (pT) and lymph node (pN) status (P < 0.001). The 5-year overall survival of patients with FPTCs was significantly worse than that of patients without FPTCs (35 versus 71.9 per cent; P < 0.001). FPTCs were present in 14 (8.5 per cent) of 164 patients with stage IA or IB tumours. Although the detection of FPTCs had no prognostic significance for stage IA tumours, the presence of FPTCs in those with stage IB tumours was associated with a worse prognosis (P < 0.001). Multivariate analysis identified the presence of FPTCs as an independent prognostic factor in the whole cohort and in the stage IB subgroup. Detection of FPTCs is associated with poor prognosis even in patients with early-stage gastric cancer and should be used for risk-group stratification.
{ "pile_set_name": "PubMed Abstracts" }
(a) Field Embodiments of the present system and method relate to a stereoscopic image display device, and more particularly, to a stereoscopic image display device with an enhanced display quality. (b) Description of the Related Art In general, a display device that can display a three-dimensional (3D) image expresses a 3D effect of objects by using binocular parallax. That is, different 2D images are displayed to the left eye and the right eye of a user viewing the display. When the image displayed to the left eye (hereafter referred to as “left-eye image”) and the image displayed to the right eye (hereafter referred to as “right-eye image”) are processed by the user's brain, the brain recognizes the combination of the left-eye image and the right-eye image as a three-dimensional image having depth perception. A display device capable of displaying 3D images using binocular parallax is generally referred to as a stereoscopic 3D image display device. Some stereoscopic 3D image display devices may require the user to wear special headgear or eye glasses (e.g., shutter glasses and polarized glasses). Other stereoscopic 3D image display devices, referred to as autostereoscopic 3D image display devices, however, do not require the user to wear special head gear or eye glasses. An autostereoscopic 3D image display device generally includes an optical system (e.g., a lenticular lens and a parallax barrier having a plurality of openings) in the display device itself that divides a 3D image into several viewpoints so as to realize a 3D image.
{ "pile_set_name": "USPTO Backgrounds" }
Sony Bravia KDL-40HX803 review Summary Our Score 8/10 User Score Review Price £898.95 Sony’s first 3D TV is finally here, in the 40in shape of the KDL-40HX803. And to be honest, we’re not expecting very much. For whenever we’ve seen Sony 3D TVs in action at big shows, they just haven’t looked as good as those of some rivals. So let’s hope the Japanese brand has managed to cram in plenty of last minute improvements! Rather surprisingly, the 40HX803 doesn’t wear Sony’s new and rather stylish Monolith design. Instead you get a straightforward but sleek black bezel for the top, right and left sides, with a slightly proud metallic strip along the bottom edge. The set still looks nice, though, for all its non-Monolithic approach. It doesn’t do the 40HX803‘s aesthetic impact any harm, either, that it employs edge LED lighting to deliver a reasonably slender profile. Though it’s nothing like as slim as Samsung’s edge LED icons. What’s more, its edge LED system is a dynamic one, meaning that sections of the edge lighting can be independently controlled for a hopefully more impressive contrast performance than you usually get with a standard edge LED-lit LCD TV. Slightly surprisingly for such a slim screen, Sony has left most of its connections facing straight out of the TV’s rear, rather than using the side access approach that would suit wall hanging. But at least the number and variety of these connections is pretty prodigious. For instance, it has four HDMIs, all built to the v1.4 specification, so that they’re compatible with 3D sources. Also of note are a USB input, an Ethernet port, and a 3D Sync terminal, which we’ll look at in turn. The USB can play music, video and photo files directly into the TV, but also allows you to add Wi-Fi to the 40HX803 via an optional USB dongle. It’s a touch disappointing that the 40HX803 doesn’t carry built-in Wi-Fi for its money, but it’s hardly alone in preferring the optional upgrade route. The Ethernet socket, meanwhile, has three uses. First, it supports the set’s built-in Freeview HD tuner, to deliver potential future interactive services like the BBC iPlayer. Second, it provides a wired means of importing files stored on a DLNA PC. Finally, it allows you to take the TV online to experience Sony’s Bravia Internet Video platform, which we’ll return to in a minute. But first we’ve got to discuss the 3D Sync terminal. This is there because the 40HX803 doesn’t have a built-in 3D transmitter, unlike the Samsung and Panasonic 3D TVs we’ve tested. In fact, the 40HX803 doesn’t have 3D facilities at all in its standard form. You have to add an optional extra transmitter and optional pairs of active shutter glasses, with the transmitter costing £50 and the glasses setting you back £99 per pair. This effectively makes the 40HX803 £1,887 if you want 3D with two pairs of glasses. We do understand Sony’s idea with this, to be fair. For it helps keep the 40HX803’s up-front price down, allowing people to add 3D later as their finances allow. But there’s no getting round the fact that once you’ve 3Ded it up, the 40HX803 hits a similar price level to Samsung’s 40C8000 integrated 3D TV. In other words, 3D continues to be very much a premium technology.
{ "pile_set_name": "Pile-CC" }
Sequencing of the cholesteryl ester transfer protein 5' regulatory region using artificial transposons. We have isolated and sequenced genomic clones encompassing more than 5 kb of the 5' flanking region of the cholesteryl ester transfer protein gene. This region contains multiple Alu repeats, a Mermaid repeat, and an extensive GA repeat, which made sequencing exceedingly difficult. To circumvent the problems that these repeats posed to traditional sequencing methodologies, we employed a novel transposon-facilitated technique, which greatly simplified sequencing of regions that had been difficult to accomplish otherwise. We utilized the artificial transposon, AT-2, a Bluescript derivative containing the dhfr gene and unique primer sites at both ends of the insertion DNA. Integration of the transposon occurred efficiently and covered the entire region of interest. Analysis of the sequence indicates a number of potential regulatory factor binding sites upstream of the previously characterized minimal promoter. The 5.7-kb regulatory region confers significant transcriptional activation in a conditionally transformed mouse hepatocyte line as compared to a minimal 137-bp promoter fragment. In addition, a tetranucleotide repeat of variable length that may provide a useful genetic marker has been identified 2 kb upstream of the CETP transcriptional start site.
{ "pile_set_name": "PubMed Abstracts" }
Rentz RVs Inc. (RRV) 1. A stock is expected to pay a year-end dividend of $2.00, i.e., D1 = $2.00. The dividend is expected to decline at a rate of 5% a year forever (g = -5%). If the company’s expected and required rate of return is 15%, which of the following statements is CORRECT? a. The company’s current stock price is $20. b. The company’s dividend yield 5 years from now is expected to be 10%. c. The constant growth model cannot be used because the growth rate is negative. d. The company’s expected capital gains yield is 5%. e. The company’s stock price next year is expected to be $9.50. 2. A share of common stock has just paid a dividend of $2.00. If the expected long-run growth rate for this stock is 2.0%, and if investors' required rate of return is 10.5%, what is the stock’s intrinsic value? 3. E. M. Roussakis Inc.'s stock currently sells for $50 per share. The stock’s dividend is projected to increase at a constant rate of 4% per year. The required rate of return on the stock, rs, is 15.50%. What is Roussakis' expected price 5 years from now? 4. Carter's preferred stock pays a dividend of $2.00 per quarter. If the price of the stock is $60.00, what is its nominal (not effective) annual expected rate of return? 5. Schnusenberg Corporation just paid a dividend of $1.25 per share, and that dividend is expected to grow at a constant rate of 7.00% per year in the future. The company's beta is 1.35, the required return on the market is 10.50%, and the risk-free rate is 4.00%. What is the intrinsic value for Schnusenberg’s stock? 6. Rentz RVs Inc. (RRV) is presently enjoying relatively high growth because of a surge in the demand for recreational vehicles. Management expects earnings and dividends to grow at a rate of 30% for the next 4 years, after which high gas prices will probably reduce the growth rate in earnings and dividends to zero, i.e., g = 0. The company’s last dividend, D0, was $1.25. RRV’s beta is 1.20, the market risk premium is 5.25%, and the risk-free rate is 3.00%. What is the intrinsic value of RRV’s common stock? 7. Using the information on Rentz RVs Inc. from problem 6, what is the dividend yield expected for the next year? 8. The Wei Company's last paid dividend was $2.75. The dividend growth rate is expected to be constant at 2.50% for 2 years, after which dividends are expected to grow at a rate of 8.00% forever. Wei’s required return (rs) is 12.00%. What is the intrinsic value of Wei's stock? 9. Using the information on Wei Company from problem 8, what should be the price of Wei’s stock at the end of Year 5 10. You are an analyst studying Beranek Technologies, which was founded 10 years ago. It has been profitable for the last 5 years, but it has needed all of its earnings to support growth and thus has never paid a dividend. Management has indicated that it plans to pay a $0.50 dividend 3 years from today, then to increase it at a relatively rapid rate for 2 years with 50% dividend growth in year 4 and 25% dividend growth in year 5, and then to increase its dividend at a constant growth rate of 6.00% per year thereafter. Assuming a required return of 15.00%, what is your estimate of the intrinsic value of Beranek's stock?
{ "pile_set_name": "Pile-CC" }
Instead of attaching a complete file, could you please create a diff of your changes against the original file? If possible we'd also prefer it submitted as a commit change to our gerrit instance, see https://wiki.documentfoundation.org/Development/gerrit but that's not strictly necessary if you're not familiar with git and develop tools and such. In any case we'll need your license agreement, apparently we don't have it on file, could you please send us a blanket statement that you contribute all your past and future patches under the MPLv2 and LGPLv3+ licenses? Best on the dev mailing list [email protected] so we can link to it from https://wiki.documentfoundation.org/Development/Developers Something like this does nicely: All of my past & future contributions to LibreOffice may be licensed under the MPLv2/LGPLv3+ dual license. Best use Subject: <your full name> license statement Sorry for the inconvenience and thank you for cooperating :-) (In reply to kinfe from comment #0) > this is modified VCL.xcu file including my language,Tigrigna, default fonts Hi kinfe/Eike, Any update regarding these files? In the past year have we merged any default fonts for Tigrigna language (these files or others) ? As this bug has been dormant for over a year, I'll toss it into NEEDINFO and await further info. If the underlying issue has been resolved, let's close this bug. Dear Bug Submitter, This bug has been in NEEDINFO status with no change for at least 6 months. Please provide the requested information as soon as possible and mark the bug as UNCONFIRMED. Due to regular bug tracker maintenance, if the bug is still in NEEDINFO status with no change in 30 days the QA team will close the bug as INSUFFICIENTDATA due to lack of needed information. For more information about our NEEDINFO policy please read the wiki located here: https://wiki.documentfoundation.org/QA/Bugzilla/Fields/Status/NEEDINFO If you have already provided the requested information, please mark the bug as UNCONFIRMED so that the QA team knows that the bug is ready to be confirmed. Thank you for helping us make LibreOffice even better for everyone! Warm Regards, QA Team MassPing-NeedInfo-Ping-20170131 Dear Bug Submitter, Please read this message in its entirety before proceeding. Your bug report is being closed as INSUFFICIENTDATA due to inactivity and a lack of information which is needed in order to accurately reproduce and confirm the problem. We encourage you to retest your bug against the latest release. If the issue is still present in the latest stable release, we need the following information (please ignore any that you've already provided): a) Provide details of your system including your operating system and the latest version of LibreOffice that you have confirmed the bug to be present b) Provide easy to reproduce steps – the simpler the better c) Provide any test case(s) which will help us confirm the problem d) Provide screenshots of the problem if you think it might help e) Read all comments and provide any requested information Once all of this is done, please set the bug back to UNCONFIRMED and we will attempt to reproduce the issue. Please do not: a) respond via email b) update the version field in the bug or any of the other details on the top section of our bug tracker Warm Regards, QA Team MassPing-NeedInfo-20170328
{ "pile_set_name": "Pile-CC" }
#1 Free Stationery Download Site Kathy and I would like to formally welcome you to our new free holiday and special occasion stationery website. We are working hard to add as many new stationery papers as we can as quickly as we can. We are adding new paper designs at least weekly when possible. We add them in Microsoft Word, PDF and a JPG format so that you can use them with just about any word processor, office suite or journaling program. Just as a note, our digital stationery papers can also be used as free scrapbook background papers too. Registration is FREE to leave comments (Required to keep out SPAM) and it doesn't put you on any lists of any kind. So, one more time... tell us what you think! What's on The #1 FREE-Stationery Download Site: Here, you'll have access to the best FREE digital computer stationery or scrapbook background paper site around with literally hundreds of free digital downloadable holiday, letter, special occasion, business, newsletter and every other kind of stationeries and templates you can think of. No registration or other info needed... We also NOW have the tutorial for how to create your own stationeries with MS Word. Along with the OpenOffice Suite digital stationery training, that we already had for you, you can now learn to create your own digital stationeries with MS Office (Microsoft Word (TM)) software. Tired of paying high prices for the same stationery that everyone else has? Now you don't have to. Just download any of our high quality stationeries and print as many as you need anytime you like. Try our new revolutionary way to get quality stationery. No storing blank sheets of stationery in a desk drawer or box taking up valuable space. Instead, save it directly onto your computer. You can also use our stationery papers as free scrapbook background papers? You get to download many quality stationeries whenever you want, all for FREE! New stationery added regularly, so book mark and check back often... Printable PDF Stationery Our FREE PDF Stationery formats are perfect for those that want to add that personal touch to letters, notes, flyers or even sales letters. Just pick the file and download it. After you have downloaded the file all you have to do is print it out and start handwriting on the page(s). You can even put it back in the printer and use any text editor or word processor to print your correspondence right on your newly created stationery... just set the margins to stay inside the borders. Save money Save that valuable storage space in the house Never run out of stationery pages Perfect way to personalize and make memorable Print and handwrite your letter Printable on any printer like any pre-printed stationery you get in the stores. Visit our Services Page to see a few examples of our PDF and Word templates. Just select examples to see what we did with a few of them and then try them out for yourself. You can also print our free pdf stationery papers and use them as free background scrapbook papers. Printable Microsoft Word Stationery Our Microsoft Word (MS Word) templates are perfect for those of you that like to type your letters and other correspondence directly on your computer. Simply open the template right inside Microsoft Word (tm) or most other office compatible programs that can read Microsoft Office (tm) files. Then just start typing. The text will automatically stay within the stationery borders and even go around any special graphics on the page. Now all you have to do is to print it out. Save 30% or more over the cost of pre-printed stationery Save that valuable Storage space in the house and office Never run out of stationery pages when you need them most Always legible and ready for the copier See what flyers and letter looks like before you hit print Typo or error, just fix it then reprint - no hassles Visit our Services Page to see a few examples of our PDF and Word templates in action. See some of the things we found to do with them. Just select the example you want to see and then try it out for yourself. OpenOffice Suite Templates FREE-Stationery.com is your first stop to turn those plain boring letters into a fun, personal and memorable way to communicate with friends, family and business relations. Create your own FREE Custom Stationery for use with OpenOffice (OOo) 2.0 and better. FREE Tutorial on how to make that happen is just moments away here on the site.
{ "pile_set_name": "Pile-CC" }
Education Week reporter Ben Herold explores how technology is shaping teaching and learning and the management of schools. Join the discussion as he analyzes the latest developments. Gates Foundation, Chan Zuckerberg Team Up to Seek 'State of the Art' Ideas for Schools By Benjamin Herold on May 8, 2018 1:31 PM The Bill & Melinda Gates Foundation and the Chan Zuckerberg Initiative are teaming up on a new research-and-development initiative aimed at identifying "state-of-the-art" educational strategies and bringing them to the classroom. The focus is on spurring development of new measures, new ways of teaching, and new technologies for tracking and supporting students' writing ability, math skills, and "executive functions," such as self-control and attention. In a new Request for Information released today, the groups wrote that researchers from fields as diverse as education, neuroscience, cognitive psychology, and technology are generating exciting new ideas about how people actually learn—but that information "has not yet been translated effectively into methods and tools for teachers and students to use in the classroom every day." Such "research insights must inform ongoing development of tools and instructional approaches that will enable students to overcome math, literacy, and other learning challenges and at scale, in order to reach millions, if not billions, of students," the document reads. The focus of the new efforts is on identifying promising new developments and ideas in three main areas: Improving students' writing (especially non-fiction)."The skills connected to writing—evaluation of arguments and evidence, critical and creative thinking about solutions and sources, identifying support for a key idea or process, clear and evocative argument-making—are frequently cited as 21st century skills in high demand by employers," the Request for Information states. "Yet, the majority of high school graduates are not prepared for the demands of postsecondary and workplace writing." Among the areas where the groups hope to see improvements: comprehensive writing solutions, new metrics for measuring student progress and proficiency in writing, and new tools to promote more collaboration and better feedback. Improving students' mathematical understanding, application, and related mindsets.Here, the language of the personalized-learning movement (which both organizations support) is clear: There already exist promising approaches that "help teachers to address individual students' needs by mirroring the same personalized approaches used by the best 1:1 tutors," the document states. "Highly personalized learning experiences and tools have the potential to analyze student responses to understand barriers to student learning, provide immediate feedback, and apply immediate and effective remediation to students when needed." Among other things, the organizations are specifically looking for tools that can further personalize math instruction via a focus on the "whole student"—including children's mindsets, beliefs, attention, and "affective" or emotional states. Measuring and improving students' executive function."Student success in academics and in future careers is associated with their ability to wrestle with multiple ideas at once, think flexibly, and regulate their action and thoughts," the Request for Information states. "There is much to be done to track and improve students' progress on [executive function] development and connect it to real-world benefits, especially for those who are most at-risk." Areas of focus here include advances in techniques for tracking children's development of these skills and abilities, interventions (including "technology-enhanced programs in or outside of school") designed to improve desired behaviors, and supports for teachers. The Gates Foundation is a traditional charitable foundation, chaired by Microsoft founder Bill Gates. Over the last decade-plus, the group has dedicated hundreds of millions of dollars a year to such education-related causes as promoting small high schools, changing the way teachers are evaluated, and supporting development of the Common Core State Standards. Last October, the Gates Foundation announced a strategic shift in focus, including a new emphasis on "locally-driven solutions" and "innovative research." The Chan Zuckerberg Initiative, meanwhile, is a newer entity, founded and led by Facebook CEO Mark Zuckerberg and his wife, pediatrician Priscilla Chan. Structured as a limited-liability corporation, CZI is free to make charitable donations, invest in for-profit companies, and engage in political lobbying and advocacy, with minimal disclosure requirements. The venture-philanthropy group has announced that it will give hundreds of millions of dollars annually to support a vision of "whole-child personalized learning" that aims to customize each child's educational experience based on their academic, social, emotional, and physical strengths, needs, and preferences. Last June, the two groups announced their first substantive collaboration: a $12 million joint award to an intermediary organization known as New Profit, which in turns supports organizations working to promote personalized learning. In their new Request for Information, the Gates Foundation and CZI said that technology is not the focus of what they hope to spur, but it is expected to play a role. The groups also emphasized that their new plan is currently in draft stage. Individuals, nonprofit groups, universities, private companies, and government-sponsored labs are invited to respond, with the expectation that those groups' input will in turn shape the foundations' funding plans moving forward. No decision has yet been made as to how much money the groups will ultimately invest in the new R&D effort. Why this new partnership, and why now? "The reason our two philanthropies have decided to join hands in this effort is simple: We believe the scope and importance of this work exceeds what any single organization can or should undertake alone," wrote CZI president of education Jim Shelton and Gates Foundation director of K-12 education Bob Hughes in an op-ed published today by Fast Company. "The purpose of the initiative is not to mandate anything. It's to learn from the work that's currently happening in classrooms, universities, entrepreneurial efforts, and research centers throughout the country." Photos: Bill Gates, Microsoft co-founder and director at Berkshire Hathaway, is interviewed by Liz Claman of the Fox Business Network in Omaha, Neb., May 8. Photo by Nati Harnik/AP Facebook CEO and Harvard dropout Mark Zuckerberg delivers the commencement address at Harvard University commencement exercises on May 25, in Cambridge, Mass. Photo by Steven Senne/AP Categories: Tags: Notice: We recently upgraded our comments. (Learn more here.) If you are logged in as a subscriber or registered user and already have a Display Name on edweek.org, you can post comments. If you do not already have a Display Name, please create one here. Ground Rules for Posting We encourage lively debate, but please be respectful of others. Profanity and personal attacks are prohibited. By commenting, you are agreeing to abide by our user agreement. All comments are public.
{ "pile_set_name": "Pile-CC" }
Oh lawd oh lawd! I'm tired and weary of pain Please lawd! please lawd! forgive me if I complain Up in the mornin' out on the job work like the devil for my pay But that lucky old sun has nothin' to do but roll around heaven all day Fuss with my woman toil for my kids Sweat 'til I'm wrinkled and gray While that lucky old sun has nothin' to do But roll around heaven all day Good lawd above, can't you know I'm pinin', tears all in my eyes; Send down that cloud with a silver linin', lift me to paradise Show me that river take me across and wash all my trou-bles away. Like that lucky old sun, give me nothin' to do But roll around heaven all day
{ "pile_set_name": "Pile-CC" }
Q: Query returns wrong result Possible Duplicate: Why are my SEDE results inaccurate/obsolete/incorrect/outdated? I've run the following query, just to see if it actually works, but I'm getting no results even though I have dozens of posts: select q.Id from Posts q where q.OwnerUserId = 1525840 What's going wrong? I'm executing the query here. A: SEDE data isn't live, it comes from periodic data dumps. You can see on the homepage that the most recent data is from June 26th; your first post wasn't made until July 14th
{ "pile_set_name": "StackExchange" }
Senior Precision Rotary Microtome (latest Spencer 320 Type) which we trade, supply, export and manufacture is used for precise sectioning of tissues up to the thickness of 1 micron. Its interior mechanism rests on a heavy cast iron base that is covered with a full swing protective cover for easy cleaning and lubrication.Senior Precision Rotary Microtome (latest Spencer 320 Type) is known for independent feed mechanism with automatic safety device, universal knife holder with lateral movements permitting use of the entire knife edge and universal vice type object holder for accurate centering of the specimer. It is fabricated using fine grain steel tested for micro-structure, heat treated for optimum rigidity and sharpness and has a long service life.
{ "pile_set_name": "Pile-CC" }
No other appliance company has a wider scope of solutions, nor the experience to back them up, than Electrolux. Our long presence in people’s homes around the world means that no other appliance company ... Read more ... Easy-Flo vacuums including parts and bags. Findlay's also offers sales and service for all makes and models of sewing machines and vacuums. Please contact us for more information about our products and services. Read more ... house. The value of a property increases with the addition of a hydraulic elevator, electric home elevator, vacuum elevator or high end wheelchair lift. Hybrid Elevator Inc. makes residential elevators that look amazing in an ... Read more
{ "pile_set_name": "Pile-CC" }
Modulatory effects of PLG and its peptidomimetics on haloperidol-induced catalepsy in rats. A behavioral model of dopaminergic function in the rat was used to examine the anticataleptic effects of L-prolyl-L-leucyl-glycinamide (PLG) and peptidomimetic analogs of PLG. Administration of 1 mg/kg PLG intraperitoneally significantly attenuated haloperidol (1 mg/kg)-induced catalepsy (as measured by the standard horizontal bar test), whereas doses of 0.1 and 10 mg/kg PLG did not. Eight synthetic PLG peptidomimetics (Calpha, alpha-dialkylated glycyl residues with lactam bridge constraint [1-4] and without [5-8]) were tested in the same manner (at a dose of 1 microg/kg) and categorized according to their activity, i.e. very active (5), moderately active (2, 3, 4, and 6), and inactive (1, 7, and 8). The catalepsy-reversal action of the diethylglycine-substituted peptidomimetic 5 was examined further and found to exhibit a U-shaped dose-response effect with an optimal dose of 1 microg/kg. The similarity between the effects of PLG and the synthetic peptidomimetics suggests a common mechanism of action. Finally, the synthetic peptidomimetics examined here, particularly peptidomimetic 5, were more effective than PLG in attenuating haloperidol-induced catalepsy.
{ "pile_set_name": "PubMed Abstracts" }
/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.stanbol.entityhub.web.reader; import java.io.IOException; import java.io.InputStream; import java.lang.annotation.Annotation; import java.lang.reflect.Type; import java.util.Arrays; import java.util.Collections; import java.util.HashMap; import java.util.HashSet; import java.util.Iterator; import java.util.List; import java.util.Map; import java.util.Set; import javax.servlet.ServletContext; import javax.ws.rs.Consumes; import javax.ws.rs.WebApplicationException; import javax.ws.rs.core.Context; import javax.ws.rs.core.HttpHeaders; import javax.ws.rs.core.MediaType; import javax.ws.rs.core.MultivaluedMap; import javax.ws.rs.core.Response; import javax.ws.rs.core.Response.Status; import javax.ws.rs.ext.MessageBodyReader; import javax.ws.rs.ext.Provider; import org.apache.clerezza.commons.rdf.Graph; import org.apache.clerezza.commons.rdf.BlankNodeOrIRI; import org.apache.clerezza.commons.rdf.Triple; import org.apache.clerezza.commons.rdf.IRI; import org.apache.clerezza.rdf.core.serializedform.Parser; import org.apache.clerezza.rdf.core.serializedform.SupportedFormat; import org.apache.clerezza.rdf.core.serializedform.UnsupportedParsingFormatException; import org.apache.felix.scr.annotations.Component; import org.apache.felix.scr.annotations.Property; import org.apache.felix.scr.annotations.Reference; import org.apache.felix.scr.annotations.Service; import org.apache.stanbol.commons.indexedgraph.IndexedGraph; import org.apache.stanbol.entityhub.jersey.utils.JerseyUtils; import org.apache.stanbol.entityhub.jersey.utils.MessageBodyReaderUtils; import org.apache.stanbol.entityhub.jersey.utils.MessageBodyReaderUtils.RequestData; import org.apache.stanbol.entityhub.model.clerezza.RdfValueFactory; import org.apache.stanbol.entityhub.servicesapi.model.Representation; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Provides support for reading Representation form Requests. This implementation * supports all RDF supports as well as {@link MediaType#APPLICATION_FORM_URLENCODED} * - in case the data are sent from an HTML form - and * {@link MediaType#MULTIPART_FORM_DATA} - mime encoded data. * In case of an HTML form the encoding need to be specified by the parameter * "encoding" for the entity data the parameters "entity" or "content" can be * used. * @author Rupert Westenthaler * */ @Component @Service(Object.class) @Property(name="javax.ws.rs", boolValue=true) @Provider @Consumes({ //First the data types directly supported for parsing representations MediaType.APPLICATION_JSON, SupportedFormat.N3, SupportedFormat.N_TRIPLE, SupportedFormat.RDF_XML, SupportedFormat.TURTLE, SupportedFormat.X_TURTLE, SupportedFormat.RDF_JSON, //finally this also supports sending the data as form and mime multipart MediaType.APPLICATION_FORM_URLENCODED, MediaType.MULTIPART_FORM_DATA}) public class RepresentationReader implements MessageBodyReader<Map<String,Representation>> { private static final Logger log = LoggerFactory.getLogger(RepresentationReader.class); public static final Set<String> supportedMediaTypes; private static final MediaType DEFAULT_ACCEPTED_MEDIA_TYPE = MediaType.TEXT_PLAIN_TYPE; static { Set<String> types = new HashSet<String>(); //ensure everything is lower case types.add(MediaType.APPLICATION_JSON.toLowerCase()); types.add(SupportedFormat.N3.toLowerCase()); types.add(SupportedFormat.N_TRIPLE.toLowerCase()); types.add(SupportedFormat.RDF_JSON.toLowerCase()); types.add(SupportedFormat.RDF_XML.toLowerCase()); types.add(SupportedFormat.TURTLE.toLowerCase()); types.add(SupportedFormat.X_TURTLE.toLowerCase()); supportedMediaTypes = Collections.unmodifiableSet(types); } @Reference private Parser parser; @Override public boolean isReadable(Class<?> type, Type genericType, Annotation[] annotations, MediaType mediaType) { String mediaTypeWithoutParameter = mediaType.getType().toLowerCase()+'/'+ mediaType.getSubtype().toLowerCase(); log.debug("isreadable: [genericType: {}| mediaType {}]", genericType,mediaTypeWithoutParameter); //second the media type boolean mediaTypeOK = (//the MimeTypes of Representations supportedMediaTypes.contains(mediaTypeWithoutParameter) || //as well as URL encoded MediaType.APPLICATION_FORM_URLENCODED.equals(mediaTypeWithoutParameter) || //and mime multipart MediaType.MULTIPART_FORM_DATA.equals(mediaTypeWithoutParameter)); boolean typeOk = JerseyUtils.testParameterizedType(Map.class, new Class[]{String.class,Representation.class}, genericType); log.debug("type is {} for {} against Map<String,Representation>", typeOk ? "compatible" : "incompatible" ,genericType); return typeOk && mediaTypeOK; } @Override public Map<String,Representation> readFrom(Class<Map<String,Representation>> type, Type genericType, Annotation[] annotations, MediaType mediaType, MultivaluedMap<String,String> httpHeaders, InputStream entityStream) throws IOException, WebApplicationException { log.info("Read Representations from Request Data"); long start = System.currentTimeMillis(); //(1) get the charset and the acceptedMediaType String charset = "UTF-8"; if(mediaType.getParameters().containsKey("charset")){ charset = mediaType.getParameters().get("charset"); } MediaType acceptedMediaType = getAcceptedMediaType(httpHeaders); log.info("readFrom: mediaType {} | accepted {} | charset {}", new Object[]{mediaType,acceptedMediaType,charset}); // (2) read the Content from the request (this needs to deal with // MediaType.APPLICATION_FORM_URLENCODED_TYPE and // MediaType.MULTIPART_FORM_DATA_TYPE requests! RequestData content; if(mediaType.isCompatible(MediaType.APPLICATION_FORM_URLENCODED_TYPE)) { try { content = MessageBodyReaderUtils.formForm(entityStream, charset, "encoding",Arrays.asList("entity","content")); } catch (IllegalArgumentException e) { log.info("Bad Request: {}",e); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(e.toString()). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } if(content.getMediaType() == null){ String message = String.format( "Missing parameter %s used to specify the media type" + "(supported values: %s", "encoding",supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } if(!isSupported(content.getMediaType())){ String message = String.format( "Unsupported Content-Type specified by parameter " + "encoding=%s (supported: %s)", content.getMediaType().toString(),supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } } else if(mediaType.isCompatible(MediaType.MULTIPART_FORM_DATA_TYPE)){ log.info("read from MimeMultipart"); List<RequestData> contents; try { contents = MessageBodyReaderUtils.fromMultipart(entityStream, mediaType); } catch (IllegalArgumentException e) { log.info("Bad Request: {}",e.toString()); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(e.toString()). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } if(contents.isEmpty()){ String message = "Request does not contain any Mime BodyParts."; log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } else if(contents.size()>1){ //print warnings about ignored parts log.warn("{} Request contains more than one Parts: others than " + "the first will be ignored", MediaType.MULTIPART_FORM_DATA_TYPE); for(int i=1;i<contents.size();i++){ RequestData ignored = contents.get(i); log.warn(" ignore Content {}: Name {}| MediaType {}", new Object[] {i+1,ignored.getName(),ignored.getMediaType()}); } } content = contents.get(0); if(content.getMediaType() == null){ String message = String.format( "MediaType not specified for mime body part for file %s. " + "The media type must be one of the supported values: %s", content.getName(), supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } if(!isSupported(content.getMediaType())){ String message = String.format( "Unsupported Content-Type %s specified for mime body part " + "for file %s (supported: %s)", content.getMediaType(),content.getName(),supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } } else { content = new RequestData(mediaType, null, entityStream); } long readingCompleted = System.currentTimeMillis(); log.info(" ... reading request data {}ms",readingCompleted-start); Map<String,Representation> parsed = parseFromContent(content,acceptedMediaType); long parsingCompleted = System.currentTimeMillis(); log.info(" ... parsing data {}ms",parsingCompleted-readingCompleted); return parsed; } public Map<String,Representation> parseFromContent(RequestData content, MediaType acceptedMediaType){ // (3) Parse the Representtion(s) form the entity stream if(content.getMediaType().isCompatible(MediaType.APPLICATION_JSON_TYPE)){ //parse from json throw new UnsupportedOperationException("Parsing of JSON not yet implemented :("); } else if(isSupported(content.getMediaType())){ //from RDF serialisation RdfValueFactory valueFactory = RdfValueFactory.getInstance(); Map<String,Representation> representations = new HashMap<String,Representation>(); Set<BlankNodeOrIRI> processed = new HashSet<BlankNodeOrIRI>(); Graph graph = new IndexedGraph(); try { parser.parse(graph,content.getEntityStream(), content.getMediaType().toString()); } catch (UnsupportedParsingFormatException e) { //String acceptedMediaType = httpHeaders.getFirst("Accept"); //throw an internal server Error, because we check in //isReadable(..) for supported types and still we get here a //unsupported format -> therefore it looks like an configuration //error the server (e.g. a missing Bundle with the required bundle) String message = "Unable to create the Parser for the supported format" +content.getMediaType()+" ("+e+")"; log.error(message,e); throw new WebApplicationException( Response.status(Status.INTERNAL_SERVER_ERROR). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } catch (RuntimeException e){ //NOTE: Clerezza seams not to provide specific exceptions on // parsing errors. Hence the catch for all RuntimeException String message = "Unable to parse the provided RDF data (format: " +content.getMediaType()+", message: "+e.getMessage()+")"; log.error(message,e); throw new WebApplicationException( Response.status(Status.BAD_REQUEST). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } for(Iterator<Triple> st = graph.iterator();st.hasNext();){ BlankNodeOrIRI resource = st.next().getSubject(); if(resource instanceof IRI && processed.add(resource)){ //build a new representation representations.put(((IRI)resource).getUnicodeString(), valueFactory.createRdfRepresentation((IRI)resource, graph)); } } return representations; } else { //unsupported media type String message = String.format( "Parsed Content-Type '%s' is not one of the supported %s", content.getMediaType(),supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } } /** * Internally used to get the accepted media type used when returning * {@link WebApplicationException}s. * @param httpHeaders * @param acceptedMediaType * @return */ private static MediaType getAcceptedMediaType(MultivaluedMap<String,String> httpHeaders) { MediaType acceptedMediaType; String acceptedMediaTypeString = httpHeaders.getFirst("Accept"); if(acceptedMediaTypeString != null){ try { acceptedMediaType = MediaType.valueOf(acceptedMediaTypeString); if(acceptedMediaType.isWildcardType()){ acceptedMediaType = DEFAULT_ACCEPTED_MEDIA_TYPE; } } catch (IllegalArgumentException e) { acceptedMediaType = DEFAULT_ACCEPTED_MEDIA_TYPE; } } else { acceptedMediaType = DEFAULT_ACCEPTED_MEDIA_TYPE; } return acceptedMediaType; } /** * Converts the type and the subtype of the parsed media type to the * string representation as stored in {@link #supportedMediaTypes} and than * checks if the parsed media type is contained in this list. * @param mediaType the MediaType instance to check * @return <code>true</code> if the parsed media type is not * <code>null</code> and supported. */ private boolean isSupported(MediaType mediaType){ return mediaType == null ? false : supportedMediaTypes.contains( mediaType.getType().toLowerCase()+'/'+ mediaType.getSubtype().toLowerCase()); } }
{ "pile_set_name": "Github" }
Q: Listbox returns System.Data.DataRowView instead of values I am doing a project for my school, where I have to make a C# Windows Forms application that lets me interact with my PostgreSQL database. I have made a listbox, which is supposed to get the names of the tables from my database, and when I select these names, data from that table is show in the datagridview object in the form. The problem is, however, all my listbox values are System.Data.DataRowView, and datagridview only displays values from the first table in the list. The code: DataTable tabulusaraksts = new DataTable(); DataTable tabula = new DataTable(); NpgsqlDataAdapter adapter = new NpgsqlDataAdapter(); NpgsqlDataAdapter adapter2 = new NpgsqlDataAdapter(); string tab; public datubaze() { InitializeComponent(); string connectionstring = "Server=localhost;Port=5432;UserId=postgres;Password=students;Database=retrospeles;"; //string connectionstring = String.Format("Server={0};Port={1};" + // "User Id={2};Password={3};Database={4};", // serveris.ToString(), port.ToString(), user.ToString(), // password.ToString(), database.ToString()); NpgsqlConnection ncon = new NpgsqlConnection(connectionstring); NpgsqlCommand listfill = new NpgsqlCommand("select table_name from INFORMATION_SCHEMA.tables WHERE table_schema = ANY (current_schemas(false));", ncon); adapter.SelectCommand = listfill; adapter.Fill(tabulusaraksts); listBox1.DataSource = tabulusaraksts; listBox1.DisplayMember = "table_name"; NpgsqlCommand showtable = new NpgsqlCommand("select * from " + tab +";" , ncon); adapter2.SelectCommand = showtable; } public void listBox1_SelectedIndexChanged(object sender, EventArgs e) { tab = listBox1.GetItemText(listBox1.SelectedItem); adapter2.Fill(tabula); dataGridView1.DataSource = tabula; } A: That code should work. I tried it with some test data and ListBox was filled with correct values. To be sure, try to also set ValueMember like listBox1.DisplayMember = "table_name"; I think the best approach is to add DataTable rows to your ListBox using loop or Linq list. After filling tabulusaraksts iterate through DataRows and add them as items to ListBox, without setting DataSource Something like this (Linq): adapter.SelectCommand = listfill; adapter.Fill(tabulusaraksts); listBox1.Items.AddRange(tabulusaraksts.AsEnumerable().Select(row => row[0].ToString()).ToArray()); NpgsqlCommand showtable = new NpgsqlCommand("select * from " + tab +";" , ncon); adapter2.SelectCommand = showtable; or, using foreach loop adapter.SelectCommand = listfill; adapter.Fill(tabulusaraksts); listBox1.Items.Clear(); foreach (DataRow row in tabulusaraksts.Rows) { listBox1.Items.add(tabulusaraksts[0].ToString()); } NpgsqlCommand showtable = new NpgsqlCommand("select * from " + tab +";" , ncon); adapter2.SelectCommand = showtable;
{ "pile_set_name": "StackExchange" }
Friday, June 1, 2012 Song Story: 'Glory Hallelujah' Unity is huge. It's not just huge in sports teams and in successful businesses. It's not just huge in committees or even families. Unity is huge to God. It's huge in churches, from the leadership all the way to the last attender and even more it's huge in terms of the Church with a big 'C'... the collective Christ-followers and the churches in which they worship throughout our nation and world. The verses in God's Word that discuss the importance of unity are prolific and the urgency with which the concept is discussed is palpable. All that said, I wanted to write a worship song that, at it's core, could help unify the congregation singing it. I used 'we' language on this one--something I haven't used a ton in the past--because the lyric and theme begged for it, and I searched for words that could articulate the depth of unity that I believe God desires from us. I think the lyric I'm most proud of in this particular song kicks off the second verse: All of our brothers and sisters through time have sung of the blood of the same sacrifice This lyrics speaks to the beautiful truth that singing of His love and sacrifice for us binds believers together in a way that transcends even time. No matter what melody is being sung, no matter what chords are being played by what instruments, believers have been uniting together for centuries singing about the truths of Christ's glorious death and resurrection and all that they imply. To me that's an amazing reality, and one worth giving some serious real estate in our church services! As for the song-writing fodder I promised... this one was fun to play around with as I wrote it. I used a hemiola passage in the verse (played quietly with a wurlitzer) and bridge (a little more apparent from an electric guitar) with three notes being repeated all the way through large 4/4 phrases. I also truncated all of the phrases in the bridge--all of them 3 bars instead of four--just to add to the urgency of the concept sung there. One of the things I think is most fun, though, about this tune is that the chords in the second verse are quite different than in the first even though the melody is identical... capped off with a 2sus chord replacing the typical 5 in the first verse. Yup... theory geek stuff for sure! Hope that gives you some insight into the first song on the project! Come back and visit soon as I'll be discussing my first single next time... track #2, entitled 'Here With You.' AVAILABLE NOW!!! Subscribe To who's Mark Roach? I'm a Christ-following husband, father, songwriter, worship leader and St. Louis Blues fan. It's worth noting that, while I am the Worship Arts Director at MSC, all the stuff found here is me... just me... and shouldn't be taken to represent MSC or any other entity, really... beyond just me. :)
{ "pile_set_name": "Pile-CC" }
Q: ssh authentication failure with public/private keys I'm setting up a Continuous Deployment pipeline on gitlab. Unfortunately, when trying to ssh from the pipeline to the target server, the authentication fails. I am asking the question here because I am fairly sure the problem is unix related and not gitlab. Here is the setup: Using ssh-keygen I created a key pair. I added the public key in ~/.ssh/authorized_keys on the server. The private key is export in an env var 'SSH_PRIVATE_KEY' on the client server. permissions on the server: ~/.ssh 700, ~/.ssh/authorized_keys 600 sshd configs on the server are all defaults. On commit, gitlab spins up a docker executor (docker image node:11.2). Then, those commands are executed inside the container: 'which ssh-agent || ( apt-get update -y && apt-get install openssh-client -y )' eval $(ssh-agent -s) ## ## Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent store ## We're using tr to fix line endings which makes ed25519 keys work ## without extra base64 encoding. ## https://gitlab.com/gitlab-examples/ssh-private-key/issues/1#note_48526556 ## echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add - > /dev/null mkdir -p ~/.ssh chmod 700 ~/.ssh echo "$SSH_PRIVATE_KEY" > ~/.ssh/known_hosts chmod 644 ~/.ssh/known_hosts ssh -vvv user@server I followed the instructions here: https://docs.gitlab.com/ce/ci/ssh_keys/ Here is the output of my execution: Running with gitlab-runner 11.5.0 (3afdaba6) on Runner2 7eb17b67 Using Docker executor with image node:11.2 ... Pulling docker image node:11.2 ... Using docker image sha256:e9737a5f718d8364a4bde8d82751bf0d2bace3d1b6492f6c16f1526b6e73cfa4 for node:11.2 ... Running on runner-7eb17b67-project-40-concurrent-0 via server... Fetching changes... Removing node_modules/ HEAD is now at aa4a605 removing bugged command line Checking out aa4a6054 as integrate_cd... Skipping Git submodules setup Checking cache for default... No URL provided, cache will be not downloaded from shared cache server. Instead a local version of cache will be extracted. Successfully extracted cache $ which ssh-agent || ( apt-get update -y && apt-get install openssh-client -y ) /usr/bin/ssh-agent $ eval $(ssh-agent -s) Agent pid 14 $ echo "$SSH_PRIV_KEY" | ssh-add - > /dev/null Identity added: (stdin) ((stdin)) $ mkdir -p ~/.ssh $ chmod 700 ~/.ssh $ echo "$SSH_KNOWNHOST_KEY" > ~/.ssh/known_hosts $ chmod 644 ~/.ssh/known_hosts $ ssh -p 5555 -vvv user@server OpenSSH_7.4p1 Debian-10+deb9u4, OpenSSL 1.0.2l 25 May 2017 debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 19: Applying options for * Pseudo-terminal will not be allocated because stdin is not a terminal. debug2: resolving "server" port 22 debug2: ssh_connect_direct: needpriv 0 debug1: Connecting to servee[x.x.x.x] port 22 debug1: Connection established. debug1: permanently_set_uid: 0/0 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_rsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_rsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_dsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_dsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ecdsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ecdsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ed25519 type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ed25519-cert type -1 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u4 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.2 debug1: match: OpenSSH_7.2 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to server:22 as 'user' debug3: put_host_port: [server]:22 debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:2 debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:4 debug3: record_hostkey: found key type ED25519 in file /root/.ssh/known_hosts:6 debug3: load_hostkeys: loaded 3 keys from [server]:22 debug3: order_hostkeyalgs: prefer hostkeyalgs: [email protected],[email protected],[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c debug2: host key algorithms: [email protected],[email protected],[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,[email protected],zlib debug2: compression stoc: none,[email protected],zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected] debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected] debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,[email protected] debug2: compression stoc: none,[email protected] debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: [email protected] debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: [email protected] MAC: <implicit> compression: none debug1: kex: client->server cipher: [email protected] MAC: <implicit> compression: none debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: Server host key: ecdsa-sha2-nistp256 SHA256:1MfReEPXf/ResuMnmG/nEgimB5TxF1AcA2j4LBHBbTU debug3: put_host_port: [x.x.x.x]:22 debug3: put_host_port: [server]:22 debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:2 debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:4 debug3: record_hostkey: found key type ED25519 in file /root/.ssh/known_hosts:6 debug3: load_hostkeys: loaded 3 keys from [server]:22 debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" debug1: Host '[server]:22' is known and matches the ECDSA host key. debug1: Found key in /root/.ssh/known_hosts:4 Warning: Permanently added the ECDSA host key for IP address '[x.x.x.x]:22' to the list of known hosts. debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey after 134217728 blocks debug2: key: (stdin) (0x55ff2d56d630), agent debug2: key: /root/.ssh/id_rsa ((nil)) debug2: key: /root/.ssh/id_dsa ((nil)) debug2: key: /root/.ssh/id_ecdsa ((nil)) debug2: key: /root/.ssh/id_ed25519 ((nil)) debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug3: start over, passed a different list publickey,keyboard-interactive debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: (stdin) debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug1: Trying private key: /root/.ssh/id_rsa debug3: no such identity: /root/.ssh/id_rsa: No such file or directory debug1: Trying private key: /root/.ssh/id_dsa debug3: no such identity: /root/.ssh/id_dsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ecdsa debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ed25519 debug3: no such identity: /root/.ssh/id_ed25519: No such file or directory debug2: we did not send a packet, disable method debug3: authmethod_lookup keyboard-interactive debug3: remaining preferred: password debug3: authmethod_is_enabled keyboard-interactive debug1: Next authentication method: keyboard-interactive debug2: userauth_kbdint debug3: send packet: type 50 debug2: we sent a keyboard-interactive packet, wait for reply debug3: receive packet: type 60 debug2: input_userauth_info_req debug2: input_userauth_info_req: num_prompts 1 debug1: read_passphrase: can't open /dev/tty: No such device or address debug3: send packet: type 61 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug2: userauth_kbdint debug3: send packet: type 50 debug2: we sent a keyboard-interactive packet, wait for reply debug3: receive packet: type 60 debug2: input_userauth_info_req debug2: input_userauth_info_req: num_prompts 1 debug1: read_passphrase: can't open /dev/tty: No such device or address debug3: send packet: type 61 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug2: userauth_kbdint debug3: send packet: type 50 debug2: we sent a keyboard-interactive packet, wait for reply debug3: receive packet: type 60 debug2: input_userauth_info_req debug2: input_userauth_info_req: num_prompts 1 debug1: read_passphrase: can't open /dev/tty: No such device or address debug3: send packet: type 61 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug2: we did not send a packet, disable method debug1: No more authentication methods to try. Permission denied (publickey,keyboard-interactive). ERROR: Job failed: exit code 1 I think the ssh interesting part is this: debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: (stdin) debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug1: Trying private key: /root/.ssh/id_rsa debug3: no such identity: /root/.ssh/id_rsa: No such file or directory debug1: Trying private key: /root/.ssh/id_dsa debug3: no such identity: /root/.ssh/id_dsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ecdsa debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ed25519 debug3: no such identity: /root/.ssh/id_ed25519: No such file or directory debug2: we did not send a packet, disable method debug3: authmethod_lookup keyboard-interactive debug3: remaining preferred: password It tries to authenticate debug2: we sent a publickey packet, wait for reply But failed with SSH_MSG_USERAUTH_FAILURE right after debug3: receive packet: type 51 Then it tries a couple public keys that do not exists on the runner. What is happening? What can cause SSH_MSG_USERAUTH_FAILURE? Thank you. A: Found the answer. I got my hand on the logs from the server I was trying to connect too: sshd[40354]: Authentication refused: bad ownership or modes for directory /web Turns out the user had more rights that supposed on his home repository. Fixed it to drwxr-xr-x resolved the issue. So it seems that ssh validates the modes for .ssh/ .ssh/authorized_keys the user HOME repository
{ "pile_set_name": "StackExchange" }
[Plantar-palmar erythrodysesthesia. A new and relatively frequent side effect in antineoplastic treatment]. Palmar-plantar erythrodysesthesia (PPE, hand-foot syndrome) is a relatively frequent cutaneous toxicity related to antineoplastic treatment with e.g. fluorouracil, capecitabine, and liposomal doxorubicin. It usually presents as paresthesia and painful erythema of the palms and soles and may lead to ulceration of the skin. The symptoms are dose-dependent, and the condition may be dose-limiting. Two cases of chemotherapy-associated PPE are presented.
{ "pile_set_name": "PubMed Abstracts" }
San Francisco is a city of rich history and culture, and as anyone planning a visit to the City by the Bay realizes, it can be difficult to narrow down all the places to visit and thing to do while there. Aside from the usual tourist spots like the Golden Gate Bridge, Alcatraz, and Fisherman's Wharf, San Francisco also offers historic architecture on nearly every corner, a serene Japanese Tea Gardens, the glorious Golden Gate Park, alongside countless cultural and artistic institutions. Need help fitting it all into one vacation? You might need an app for your smartphone (or tablet) to serve as your guide. Getting Around & Accommodations Left: MobileMuni - Right: TripAdvisor MobileMuni What's a trip to San Francisco that doesn't include a ride on the infamous cable car going down Powell Street? MobileMuni is a complete guide to getting around San Franciscos transit service that lets you know when busses or street cars will be arriving as well as assisting you in getting around the city. Free Available for iOS ($2) / Android / Windows Phone TripAdvisorWhen researching your vacation, Trip Advisor has probably appeared multiple times. This popular service is an all in one guide for flights, restaurants, points of interests and most helpful, hotel reviews. TripAdvisor delivers intuitive options to take the stress out of finding a hotel room in any given city with reviews, prices, detail breakdowns and photos. FreeAvailable for iOS / Android / Windows Phone City Maps & Shopping Guide Left: Tourist Eye - Right: ShopNear.me Tourist EyeThose who plan out their trips beforehand will more than likely get the most out of their time, for those Tourist Eye is an absolute must download. Featuring offline map download ability, you can also pin point places you want to visit beforehand, journal every part of your day and flawlessly execute a preplanned itinerary. For those occasions when the unforeseeable gets in the way Tourist Eye will help find restaurants, tourist sites and more on the fly. FreeAlso available for Android ShopNear.meThis app was designed for trendy shoppers and at the moment features the best places to get your shop on in the city by the bay with promise for more cities in the future. You can search either by item (shoes, blouses, dresses and more) or by shop and use the sale tab to find savings nearby. Fashionistas who live or are visiting San Francisco will find ShopNear.me an essential part of their app library. Free Tourist Attractions Left: San Francisco Guide - Right: San Francisco Travel Guide San Francisco GuideSan Francisco Guide from mTrips gives us an app with an incredible UI. Although the priciest on this list, it manages to fit in a trip planner, offline map, nightlife guide as well but most incredible is the offline augmented reality function. You can see shops, restaurants, hotels and more around you by holding up your smartphone like a camera and seeing points of interest closest to you. $6Also available for iOS San Francisco Travel GuideAn app that neatly wraps up the must see locations of San Francisco is Triposos own travel guide. Although it has an offline map, weather info, nightlife and restaurant locales like some of the others on this list, it's the rich background information behind sites, museums and San Francisco itself that makes it fantastic for sightseeing. A unique ability SFTG possesses is a mini guide for day trips to optimize the full potential of a 24 hour vacation. FreeAlso available for iOS Wine and Dine Left: MenuPages - Right: Top 100 Bay Area Restaurants MenuPagesAre you in the mood for Japanese? Or maybe you'd like to try something vegan? Are you looking for a kid friendly place to eat? MenuPages will help find the perfect eatery for any meals of the day whatever the situation. Armed with menus for 30,000 restaurants in 8 major cities, it's easy to pick and choose your next meal with broad search criteria, user reviews, prices, hours of operation and current location at your fingertips. FreeAlso available for Android Top 100 Bay Area RestaurantsWhen travelling it's understandable to try the best of what a new location has to offer. The San Francisco Chronicler has compiled 100 of the best of eateries in San Francisco. Each restaurant entry includes a brief synopsis, prices, specialities, parking and noise level to tantalize your taste buds. FreeAlso available for iOS City Guides, Nightlife, and Traveling Necessities The Bold Italic: the most difficult task in visiting a city so rich in culture like San Francisco is cutting through the layers of tourist-y spots and experiencing the SF the locals enjoy on a day to day basis. The Bold Italic is all about local discovery...for locals, written by locals (Bold Locals), spotlighting the best and most relevant people and spots in San Francisco on a daily basis. This app is like having a good friend who lives in SF to guide you to all the best spots all the others might overlook or miss.iOS (Free) Left: San Francisco Hot List - Right: WeatherBug San Francisco Hot List Whether you're looking for a night of dancing or are looking to soak in the evenings atmosphere over drinks, San Francisco Hot List has your number. Supporting a robust list of 150 of the best bars, nightclubs, restaurants and handouts, you're guaranteed nothing but the creme de la creme of San Franciscan nightlife. Additional features include search criteria based on tidbits such as the best Bloody Mary in town or best Rooftop bar and up to date guides on weekly special events. $3 Also available for iOS WeatherbugWhat's worse than getting caught in the rain? Getting caught in the rain while on vacation. While we can't control the weather we can at least anticipate it's ups and downs before leaving the sanctuary of our hotel rooms. Weatherbug is a fantastic lightweight weather app that neatly wraps up daily weather forecasts so you'll know weather or not to dress warm or to take that umbrella along just in case. FreeAvailable for iOS / Android / Windows Phone
{ "pile_set_name": "Pile-CC" }
Sultan Abdulhamid II by kirbydog13 | March 27th, 2012 I was searching for a photo Sultan Abdulhamid II and recognized he was wearing a Fez on his head. Compared to the headpiece of the Qizilbash, it is similar. Perhaps it has a historical purpose or perhaps it is just a coincidence.
{ "pile_set_name": "Pile-CC" }
Perinatal outcome with the modified biophysical profile. Our purpose was to evaluate perinatal outcomes in high-risk pregnancies monitored with a modified biophysical profile. All non-insulin-dependent patients referred for antepartum fetal surveillance received a modified biophysical profile biweekly. A modified biophysical profile is a combination of a nonstress test and an amniotic fluid index. Patients with a singleton gestation and intact membranes were entered into a protocol of randomized backup testing for an abnormal modified biophysical profile. Those patients having a nonreactive fetal heart rate, significant variable decelerations, late decelerations, or an amniotic fluid index < or = 5.0 cm received either a contraction stress test or a biophysical profile immediately. Once randomized, a patient received the same backup test, when indicated, with subsequent testing. A total of 2774 patients had 17,429 tests with an uncorrected perinatal mortality rate of 2.9 per 1000. The overall incidence of an adverse perinatal outcome (i.e., perinatal death or nursery death before infant hospital discharge, cesarean delivery for fetal distress within the first 2 hours of labor, 5-minute Apgar score < 7, neonatal seizures or grade III or IV central nervous system hemorrhage) was 7.0%. When compared with patients having persistently normal modified biophysical profile, patients requiring a backup test had a significantly greater incidence of adverse perinatal outcome (9.3% vs 4.9%, p < 0.001, odds ratio 2.0, 95% confidence interval 1.5 to 2.7) and small-for-gestational-age infants (5.2% vs 2.4%, p < 0.001, odds ratio 2.2, 95% confidence interval 1.5 to 3.5). No differences in outcomes between patients randomized to a contraction stress test versus a biophysical profile could be identified either overall or in limiting the analysis to outcome after a negative last test. However, patients having contraction stress test as a backup test had a significantly higher rate of intervention for an abnormal test result than did those having a biophysical profile backup test (23.7% vs 16.6%, p < 0.002, odds ratio 1.6, 95% confidence interval 1.2 to 2.1). The modified biophysical profile is an excellent means of fetal surveillance and identifies a group of patients at increased risk for adverse perinatal outcome and small-for-gestational-age infants. There does not appear to be a significant benefit with the contraction stress test compared with the biophysical profile as a backup test. Further, the contraction stress test is associated with a higher rate of intervention for an abnormal test than is the biophysical profile.
{ "pile_set_name": "PubMed Abstracts" }
Tag Archive for interact Question by Jon: What is the best way to interact with or select job recruiters? I work primarily as a front end web developer and get calls from multiple recruitment firms. I do a fair bit of project work, so this is a recurring thing for me. Currently, if they have a position that I’m a fit for I reflexively ask them to present me for that position. Is that an optimal strategy? If one company submits me, another cannot, so I want to be submitted by the best company. Should I therefore be taking steps to identify which recruiting firms are the most effective, give preference to local firms, find which firms ask the target employer for a smaller fee, select (somehow) for firms that have a better relationship with the target client, check out a firm’s reputation online before submittal, etc. Or is all of that wasted work? I’m looking for things that are efficient yet effective. Thanks for any tips! Yes, I know I can work with several agencies for different jobs. However I CAN’T work with several agencies for the SAME JOB. Not in California, in any case. Double submissions get thrown out, or else the second agency to submit is rejected. Best answer: Answer by BillAs a freelancer you can usually work “through” several agencies. This creates competition between them to find you more work. Good Luck
{ "pile_set_name": "Pile-CC" }
CIA bought an encryption company and used it to spy on clients and countries - edu https://www.businessinsider.com/cia-secretly-bought-encryption-company-crypto-ag-spy-countries-report-2020-2 ====== ekimekim Original Washington Post article discussed here: [https://news.ycombinator.com/item?id=22297963](https://news.ycombinator.com/item?id=22297963) ------ cryptos The same could happen with Threema. As much as I like and want to trust Threema, but the story could be repeated, even if I think, that it is not used by governments or military large-scale. Essentially every closed source crypto application isn't trustworthy. Same is true for operating systems. ~~~ bangboombang Exactly my first thought. I like Threema and one of the reasons I was an early adopter is that the founder worked on m0n0wall before, an OSS firewall that I used for a long time, in contrast to it being just some guy I never heard of. It made me accept the closed source nature. Another big factor was that I indeed consider Switzerland to be a more trustworthy/neutral party in general when it comes to global politics, but this obviously doesn't have to apply to every single individual in that country. ~~~ _-___________-_ Why use Threema when there are alternatives that are not closed-source? You had to begin to use Threema, which presumably carries the same difficulty as beginning to use something which isn't as questionable. ~~~ mmPzf A big plus for me was the option of using it without mapping the user account to a phone number, something that e.g. Signal doesn't allow. ------ fit2rule The free world needs to realise that no matter what systems of enormous value to the world we build, others will attempt to usurp that power for their own needs. It happens with all technology. The reason is, all technology can be weaponised. Some simple facts .. The institutions covered by Crypto AG's technology products, were attempting to maintain their own secrecy. They were, thus, usurped by their own technology - and the CIA merely exploited this fact. This case with the CIA directly addresses the lynchpin in the military- industrial-surveillance states' armour - the ability to keep secrets. From a certain perspective, one might say that .. the Vaticans .. inability to keep secrets is a blessing and a curse. This is also true of many of the other clients. Would that we had access to all the things the CIA knows, as a world people, mmm.. These groups weaponised their own technology, against themselves, by using it to keep secrets. It also happens to be the spooks' biggest weakness too: the light of truth melts any and all justification for these peoples existence, and it whither them. Let us try a thought experiment: If the Vatican applied its vast resources to providing a "Peoples Internet" a la Starlink, instead of using its billions to hide heinous secrets, would the technology of communication have been so easily weaponised? All secrets are weapons, because you cannot have a secret without technology - and all technology can be weaponised. So this is a foot-bullet on the part of Crypto AG, the Vatican et al., and a big win for the CIA - because it means these institutions will now be making _more_ commitment, alas not less - to the keeping of secrets. ------ jo-m A lot of this has been known for 25 years: [https://www.spiegel.de/spiegel/print/d-9088423.html](https://www.spiegel.de/spiegel/print/d-9088423.html) ------ lallysingh Is this why US export encryption had to be 40 bits? To push countries to a vendor that was compromised? ------ jokoon Is the leak coming from wikileaks? I've heard Assange will soon go to trial. I was still wondering about that "dead's man switch", although I'm not sure it will activate if he get convicted. ~~~ _-___________-_ I read about this quite a while ago, and while it's a revelation, it doesn't seem big enough to be Assange's dead man's switch. Most people are just going to shrug at this. ~~~ fit2rule I have heard it from the crypto cognoscenti circles I know, that this is the calm before the storm and that there will be many, many more leaks to come during the actual trial period. The idea is to point out to the world that Julian isn't the only leaker. This terrifies the spook establishment, and they are therefore preparing for their own campaign of controlled releases, designed to dull the general publics' appetite for the subject. I mean, this is all conjecture and hearsay, but it sure is an interesting time to be watching the show. I do believe we are seeing a cyberwar, like legitimately, underneath all the battle reports ..
{ "pile_set_name": "HackerNews" }
798 So.2d 646 (2001) Charles SHARRIEF and Millie Sharrief as personal representatives of Quanetta M. Buchannon, deceased v. Rebecca GERLACH, M.D. 1991732. Supreme Court of Alabama. April 20, 2001. *648 Sherryl Snodgrass Caffey, Huntsville, for appellants. John S. Key and Jenny L. McLeroy of Eyster, Key, Tubb, Weaver & Roth, L.L.P., Decatur, for appellee. HARWOOD, Justice. Charles Sharrief and Millie Sharrief, as administrators of the estate of Quanetta M. Buchannon, deceased, sued Dr. Rebecca Gerlach, Dr. Charles Giddens, and Jackson County Hospital, seeking compensatory and punitive damages on allegations of a wrongful death, in the defendants' providing medical care to Buchannon. The trial court entered an "Order of Referral to Mediation." During mediation, the plaintiffs' settled their claims against Dr. Giddens and Jackson County Hospital; the court dismissed those defendants pursuant to a motion and joint stipulation for *649 dismissal. Although he was no longer a party to this case, Dr. Giddens was later a witness at trial. Trial of the plaintiffs' claims against Dr. Gerlach began on September 27, 1999. When Dr. Gerlach was called by the plaintiffs as their first witness, she ran out of the courtroom. The trial judge offered the plaintiffs the option of continuing the trial in Dr. Gerlach's absence, but they declined to do so. The trial court then declared a mistrial. The plaintiffs then made a motion to tax costs to the defendant, but the trial court denied the motion, on the rationale that the plaintiffs had refused to proceed with the trial in the defendant's absence. A second trial began on January 24, 2000. On January 27, 2000, the jury returned a verdict for Dr. Gerlach. The trial court entered a judgment based on that verdict. The plaintiffs, without first informing the trial court, subpoenaed the jurors for depositions, based on a suspicion that juror misconduct had occurred during the trial. When the trial court became aware of the subpoenas, it entered an order quashing them. The plaintiffs then filed a "Motion to Alter, Amend, or Vacate" the order quashing the subpoenas, or in the alternative, a "Motion to Take Depositions of Jurors" and a "Motion for Enlargement of Time." The plaintiffs also filed a "Motion to Vacate the Judgment," a "Motion for a New Trial," a "Motion for Post Judgment Hearing," and a "Renewal of Motion to Take Deposition Testimony of Jurors." In response, Dr. Gerlach filed a "Motion for Protective Order" and a "Motion to Strike Affidavits of Mr. Sharrief and Jurors." The trial court heard arguments on all the motions at the same time; it denied all of the plaintiffs' motions, and granted all of Dr. Gerlach's motions. The plaintiffs appealed. They make a number of disparate arguments; we summarize them into four basic arguments: (1) that the trial court erred in denying their motion to vacate the judgment, or, in the alternative, for a new trial, because, they contend, the jury verdict was plainly and palpably wrong; (2) that the trial court committed reversible error by denying the plaintiffs' posttrial motions concerning discovery regarding jury deliberations; (3) that the trial court committed reversible errors during the trial; and (4) that the trial court erred in denying their motion to tax costs to Dr. Gerlach after the first trial had ended.[1] The record shows that Buchannon, age 19, was brought to the Jackson County Hospital emergency room at 9:05 p.m. on July 2, 1993. She had been suffering from vomiting, nausea, and diarrhea for three days. Dr. Gerlach, an emergency-room physician, obtained Buchannon's medical history and examined her. Buchannon's medical history showed that she had delivered a child by cesarean section on June 27, 1993, at Hellen Keller Hospital in Muscle Shoals. The baby had been delivered by Dr. Jenny Gapultoes. (Dr. Gapultoes and Hellen Keller Hospital were not involved in this case.) Dr. Gerlach's examination indicated that Buchannon was suffering from endometritis, an infection of the uterus, resulting from the cesarean section performed five days earlier. Dr. Gerlach then telephoned Dr. Giddens, the obstetrician-gynecologist ("Ob/Gyn") on call for Jackson County Hospital that *650 night, to discuss the case. Dr. Giddens had also been Buchannon's Ob/Gyn up until two weeks before the delivery, but because Dr. Gapultoes had delivered Buchannon's baby, Dr. Giddens was no longer considered her attending physician. Dr. Gerlach informed Dr. Giddens of Buchannon's condition and of her test results, informed him that Buchannon had requested that he be present, and asked him to come in on Buchannon's behalf. Dr. Giddens declined to come to the emergency room. Dr. Gerlach then advised Dr. Giddens that her recommended course of treatment would include a shot of Rocephin,[2] 1 gram, by intramuscular injection, and a prescription of Doxycycline.[3] Dr. Giddens concurred with the recommended course of treatment. Dr. Gerlach further proposed that Buchannon be released and that she follow up with an Ob/Gyn within a few days. Dr. Gerlach then asked Dr. Giddens to do a "follow-up" examination with Buchannon in 2-4 days, but he declined that request, recommending instead that Buchannon be instructed to return to the physician who had delivered her baby. Dr. Giddens then approved Dr. Gerlach's recommendations for treatment, and that treatment was administered. Buchannon was released from the hospital at 10:45 p.m. The next morning, Buchannon became unconscious and unresponsive; she was rushed by ambulance to Scottsboro Medical Center. On July 3, 1993 at 7:17 a.m., Buchannon was pronounced dead. The official cause of her death was septic shock due to endometritis due to cesarean section. I. The Verdict and the Denial of the Plaintiffs' Postjudgment Motions We first consider whether the trial court erred in denying the plaintiffs' motion for a new trial. The plaintiffs based that motion on the argument that the jury's verdict was not supported by the evidence. "[W]hen the evidence meets the `sufficiency' test, jury verdicts are presumed correct, and this presumption is strengthened by the trial court's denial of a motion for new trial. Therefore, a judgment based upon a jury verdict and sustained by the denial of a post-judgment motion for a new trial, will not be reversed on a weight-of-the-evidence ground unless it is `plainly and palpably' wrong. Ashbee v. Brock, 510 So.2d 214 (Ala.1987). See, also, Jawad v. Granade, 497 So.2d 471 (Ala.1986)." Alpine Bay Resorts, Inc. v. Wyatt, 539 So.2d 160, 162-63 (Ala.1988). Thus, this Court will reverse the trial court's denial of the plaintiffs' motion for a new trial only if this Court concludes that the verdict was plainly and palpably wrong. Generally, in order to prove liability in a medical-malpractice case, the plaintiff must show (1) the appropriate standard of care for the treatment supplied by the defendant health-care provider, (2) a deviation from that standard of care by the defendant, and (3) a proximate causal connection between the injury alleged by the plaintiff and the defendant's breach of the standard of care. Looney v. Davis, 721 So.2d 152 (Ala.1998). The plaintiffs presented the testimony of Dr. William E. Garrett, assistant professor of surgery at Meharry Medical College. Dr. Garrett testified that Dr. Gerlach's examination and treatment of Buchannon was below the standard of care. However, Dr. Sherry *651 Squires, associate medical director of the emergency department at Huntsville Hospital, testifying as an expert on behalf of Dr. Gerlach, stated that Dr. Gerlach's treatment of Buchannon met the standard of care. The resolution of conflicts in the evidence rests solely with the trier of fact, in this case, the jury. Jones v. Baltazar, 658 So.2d 420 (Ala.1995); James v. Woolley, 523 So.2d 110, 112 (Ala.1988). The record contains substantial evidence to support the jury verdict; thus, we must conclude that the verdict was not plainly and palpably wrong. Stokes v. Long-Lewis Ford, Inc., 549 So.2d 51, 52 (Ala.1989); Merrell v. Joe Bullard Oldsmobile, Inc., 529 So.2d 943, 946 (Ala.1988). The trial court did not err in denying the plaintiffs' motion for a new trial. II. Posttrial Motions Concerning Discovery Regarding Jury Deliberations We next consider the plaintiffs' argument that the trial court erred in denying their posttrial motions seeking discovery regarding the jury's deliberations. These motions included a motion to subpoena jurors, a motion to vacate the order quashing the juror subpoenas, a motion to take juror depositions, a motion for enlargement of time to take juror depositions, and a motion renewing the plaintiffs' motion to take depositions, affidavits, and oral testimony of jurors. Matters concerning discovery pending appeal are within the trial court's discretion. Rule 27(b), Ala. R. Civ. P. "[R]elief under Rule 27 is discretionary with the trial court, and a trial court's ruling on a Rule 27 petition will not be reversed in the absence of an abuse of discretion." Ex parte Anderson, 644 So.2d 961, 964 (Ala.1994). Even if this Court viewed these subpoena requests as coming within the ambit of Rule 30, Ala. R. Civ. P., the abuse-of-discretion standard would still apply. Home Ins. Co. v. Rice, 585 So.2d 859, 862 (Ala.1991). After the trial, the plaintiffs had the trial-court clerk issue subpoenas to the jurors, without having gotten the approval of the trial court. In pertinent part, the trial court's order quashing the subpoenas stated: "The plaintiffs' attorney failed to comply with Rule 27 of the Alabama Rules of Civil Procedure for the taking of the depositions of witnesses pending appeal or before the taking of an appeal if the time therefor has not expired. The plaintiffs filed no motion with the court for authorization to take the depositions. Furthermore, the witnesses subpoenaed by the plaintiffs were jurors and the court is mindful of the special rules of law that apply to the testimony of jurors and policy considerations for these rules of law." All of the plaintiffs' arguments concerning posttrial discovery regarding the jury's deliberations are based on three affidavits that had been taken before the trial court quashed the subpoenas. The first was the affidavit of Charles Sharrief, Buchannon's father (who also is one of the plaintiffs). Sharrief's affidavit contains a list of statements made to him by some of the jurors after the trial. The trial court found that Mr. Sharrief's affidavit was comprised completely of "hearsay," as that term is defined by Rule 802, Ala. R. Evid. The Court notes that the plaintiffs have not directly challenged, by citation to any authority, the propriety of the trial court's order striking the affidavit of Sharrief on the basis that it contained nothing but hearsay. See Rule 28(a)(5) Ala. R.App. P. Hearsay evidence is not admissible in support of a motion for a new trial, and a new trial will not be granted on the basis of such evidence. Jefferson County v. Kellum, 630 So.2d 426, 427 (Ala.1993). We *652 conclude that the trial court did not abuse its discretion by refusing to allow Charles Sharrief's affidavit to support the issuance of subpoenas to individual jurors. Affidavits were also obtained from two of the jurors, S. and H. Their affidavits contain accounts of some jurors' discussions during deliberations. Rule 606(b), Ala. R. Evid., reads: "(b) Inquiry Into Validity of Verdict or Indictment. Upon an inquiry into the validity of a verdict or indictment, a juror may not testify in impeachment of the verdict or indictment as to any matter or statement occurring during the course of the jury's deliberations or to the effect of anything upon that or any other juror's mind or emotions as influencing the juror to assent to or dissent from the verdict or indictment or concerning the juror's mental processes in connection therewith, except that a juror may testify on the question whether extraneous prejudicial information was improperly brought to the jury's attention or whether any outside influence was improperly brought to bear upon any juror. Nor may a juror's affidavit or evidence of any statement by the juror concerning a matter about which the juror would be precluded from testifying be received for these purposes. Nothing herein precludes a juror from testifying in support of a verdict or indictment." This Court has stated: "Generally, affidavits are inadmissible to impeach a jury's verdict. An affidavit showing that extraneous facts influenced the jury's deliberations is admissible; however, affidavits concerning `the debates and discussions of the case by the jury while deliberating thereon' do not fall with this exception." HealthTrust, Inc. v. Cantrell, 689 So.2d 822, 828 (Ala.1997). See also Ala. R. Evid. 606(b); this rule is substantially similar to Rule 606(b), Fed.R.Evid. In Peveto v. Sears, Roebuck & Co., 807 F.2d 486, 489 (5th Cir.1987), the United States Court of Appeals for the Fifth Circuit held that "by implementing Rule 606(b), Congress has made the policy decision that the social costs of such error are outweighed by the need for finality to litigation." The Seventh Circuit has held that Rule 606(b) is designed "to protect the judicial process from efforts to undermine verdicts by scrutinizing the jurors' thoughts and deliberations." United States v. Ford, 840 F.2d 460, 465 (7th Cir.1988). Other courts of appeals for the federal circuits have stated that Rule 606(b) promotes "free and uninhibited discourse during deliberations." Attridge v. Cencorp Div. of Dover Techs. Int'l, Inc., 836 F.2d 113, 116 (2d Cir.1987); Maldonado v. Missouri Pac. Ry., 798 F.2d 764 (5th Cir.1986). The plaintiffs misconceive the distinction, under Alabama law, between "extraneous facts," the consideration of which by a jury or jurors may be sufficient to impeach a verdict, and the "debates and discussions of the jury," which are protected from inquiry. This Court's cases provide examples of extraneous facts. This Court has determined that it is impermissible for jurors to define terms, particularly legal terms, by using a dictionary or encyclopedia. See Fulton v. Callahan, 621 So.2d 1235 (Ala.1993); Pearson v. Fomby, 688 So.2d 239 (Ala.1997). Another example of juror misconduct leading to the introduction of extraneous facts sufficient to impeach a jury verdict is an unauthorized visit by jurors to the scene of an automobile accident, Whitten v. Allstate Ins. Co., 447 So.2d 655 (Ala.1984), or to the scene of a crime, Dawson v. State, 710 So.2d 472 (Ala.1997). The problem characteristic in each of these cases is the extraneous nature *653 of the fact introduced to or considered by the jury. The improper matter someone argues the jury considered must have been obtained by the jury or introduced to it by some process outside the scope of the trial. Otherwise, matters that the jurors bring up in their deliberations are simply not improper under Alabama law, because the law protects debates and discussions of jurors and statements they make while deliberating their decision. CSX Transp. v. Dansby, 659 So.2d 35 (Ala.1995). This Court has also noted that the debates and discussions of the jury, without regard to their propriety or lack thereof, are not extraneous facts that would provide an exception to the general rule of exclusion of juror affidavits to impeach the verdict. Weekley v. Horn, 263 Ala. 364, 82 So.2d 341 (1955). Nothing contained in the affidavits indicates the jury considered any extraneous facts. All the statements in the affidavits relate to evidence that was presented at trial or to information that was otherwise brought to the attention of the jury during the trial. The affidavits provide no evidence that the jury consulted any outside sources of information regarding the definition of "standard of care," or regarding any other matter. Nothing in either of the affidavits indicates that the jury, or any particular juror, was influenced by any outside source. The trial court did not abuse its discretion in denying the plaintiffs' posttrial motions seeking discovery regarding the jury's deliberations. HealthTrust, Inc. v. Cantrell, 689 So.2d 822 (Ala.1997). III. Alleged Errors During Trial The plaintiffs argue that the trial court erred in overruling their objection made pursuant to Batson v. Kentucky, 476 U.S. 79, 106 S.Ct. 1712, 90 L.Ed.2d 69, (1986), to the defendant's striking all but three of the women on the venire. The plaintiffs' also argue that they made an objection to the composition of the jury and a Batson objection to the striking of the one black member of the venire, but we have found no such objections in the record. We first address the plaintiffs' claim that Dr. Gerlach violated the principles of Batson by using 7 of her 10 peremptory strikes against women. Because the plaintiffs did not object to the striking of the sole black juror, no other Batson argument has been preserved for our review. Cone Bldrs., Inc. v. Kulesus, 585 So.2d 1284 (Ala.1991); Bruner v. Cawthon, 681 So.2d 161 (Ala.Civ.App.1995). A trial court's ruling on a Batson objection is entitled to great deference, and we will not reverse a judgment because of such a ruling unless it is clearly erroneous. Ex parte Branch, 526 So.2d 609 (Ala.1987). In Batson, the United States Supreme Court held that the Equal Protection Clause of the Fourteenth Amendment to the United States Constitution prohibits a prosecutor in a criminal case from exercising peremptory strikes to remove black potential jurors from a black defendant's jury solely on the basis of their race. In Edmonson v. Leesville Concrete Co., 500 U.S. 614, 111 S.Ct. 2077, 114 L.Ed.2d 660 (1991), the United States Supreme Court extended the Batson principles to civil cases. "The burden of persuasion is initially on the party alleging a discriminatory use of peremptory challenges to establish a prima facie case of discrimination." Thomas v. Diversified Contractors, Inc., 578 So.2d 1254, 1255 (Ala.1991). In J.E.B. v. Alabama, 511 U.S. 127, 114 S.Ct. 1419, 128 L.Ed.2d 89 (1994), the United States Supreme Court further extended Batson to gender-based strikes. "Only after a prima facie showing of discrimination has been established is a trial court under a duty to require an opposing party to provide *654 [gender-]neutral reasons for his peremptory strikes. Thomas at 1255. The following exchange took place at trial: MS. CAFFEY: "Your Honor, according to my calculations of the thirty-six potential jurors, Plaintiffs are left with either two or three women; and we would submit for the Court's consideration that three female jurors—that the striking of the women was done in a sexually biased manner in order to exclude mothers from the jury, and they struck some women but was based upon responses that were given during the jury voir dire [sic]; and we showed that they might be biased in the case, such as, the inability to award a large sum of money, and two or three of them indicated—well, one indicated that she would not be able to follow the Court's jury instructions and other indications like that. And, also, the Plaintiffs struck two jurors who indicated a knowledge and relationship with Dr. Gerlach as a result of their employment with the Jackson County Hospital, and considering that there would be some information involving the Jackson County Hospital and the fact that they were a Defendant in this case, those jurors were struck because of their potential bias. And that would be jurors V. and M. Juror W. indicated—well, we didn't strike M., that would be V., but Juror W. indicated that—I believe she indicated that she did not believe that she could be unbiased in this case, and we contend that the three jurors—well, first of all, that women are a representative group in the Jackson County community and that three female jurors out of a potential thirty-six would certainly constitute less than the percentage of women in the community, and also, it's less than a reasonable percentage of jurors that are left on the jury; and that's one-third of the jury. MR. KEY [defense attorney]: "Is that a prima facie case, Your Honor? THE COURT: "Are you saying it is? MR. KEY: "I'm saying it is not. THE COURT: "Well, what are your grounds in that regard? MR. KEY: "Judge, we can give a reason for every strike that we made, but the point is that we had ten strikes, and how many women are left on the jury? THE COURT: "Three. MR. KEY: "Well, I'll say this. It's very unusual because it seems like that the last forty cases that I've tried, it's been about eight to three female; but, you know, there's no—I just don't see that there's any prima facie case here based on—you do have three women on the jury; and unless we're called to show gender-neutral reasons, then that's as far as I can go because I just don't see it. MS. CAFFEY: "Well, you struck seven of the female jurors, none of whom gave any indication of being connected with any of the parties. MR. KEY: "Well, for instance, the last strike, she indicated that she had been treated for diarrhea and vomiting and throwing up and had been put on IVs within four hours; and that's what they're saying that we should've done, and we've got reasons. And if we're forced to go back and reconstruct them, then we can, but— THE COURT: "Well, the Court rules that the Plaintiff [sic] has not made a prima facie case of discrimination in regard to gender. All right; anything further? MS. CAFFEY: "Your honor, my understanding of the law is that I would have to show that the group would be a representative *655 group in the community and that the defendants abused strikes in a manner ... which left the number of jurors on the jury in this representative group less than the percentage of that group in the community; and I've clearly shown that. I have also offered the Court an explanation insofar as the striking of female jurors by the Plaintiffs and have shown sex-neutral reasons; and the Defendant has indicated that they would have to put together some reasons for the striking, and— THE COURT: "Well, that was not my understanding of the statement made by defense counsel. All right; that's my ruling. Do you have anything further? MS. CAFFEY: "No, Your Honor." The plaintiffs' only objection regarding the defendant's strikes of women, if it can be characterized as an objection, was to the fact that only three women were left on the jury. However, "`"[I]t is important that the defendant come forward with facts, not just numbers alone, when asking the [trial] court to find a prima facie case"' of ... discrimination." McElemore v. State, 798 So.2d 693, 696 (Ala.Crim.App. 2000) (quoting Mitchell v. State, 579 So.2d 45, 48 (Ala.Crim.App.1991), in turn quoting United States v. Moore, 895 F.2d 484, 485 (8th Cir.1990)). Based on the record, we conclude that the plaintiffs did not present a prima facie case of improper strikes on the basis of gender. In Ex parte Trawick, 698 So.2d 162 (Ala.1997), this Court reasoned: "Trawick has offered no evidence that the female veniremembers shared only the characteristics of gender, that anything in the type or manner of the prosecutor's statements or questions during the extensive voir dire indicated an intent to discriminate against female jurors, that there was a lack of meaningful voir dire directed at the female jurors, or that female jurors and male jurors were treated differently. He has offered no evidence that the prosecutor had a history of using peremptory challenges in a manner that discriminated against veniremembers of either gender. Instead, Trawick has merely emphasized that the State used many of its strikes to remove women from the venire. Without more, we do not find that the number of strikes this prosecutor used to remove women from the venire is sufficient to establish a prima facie case of gender discrimination." 698 So.2d at 168. The reasoning of Trawick applies here. We have reviewed the trial transcript, and our review indicates the plaintiffs presented nothing to show a prima facie case of gender discrimination. Therefore, the trial court was not required to have the defense provide gender-neutral reasons for its peremptory strikes. We conclude that the trial court acted within its discretion in denying the plaintiffs' Batson motion. The plaintiffs also argue that the trial court erred in excluding their Exhibit 5 ("Defendant's Medical Record" annotated by Dr. William Garrett during trial) and their Exhibit 7 (pamphlets on Rocephin and Doxycycline). However, the plaintiffs made no objections at trial to the exclusion of these exhibits, and this Court will not consider objections to the exclusion of evidence that were not raised at trial. Zielke v. AmSouth Bank, N.A., 703 So.2d 354, 361 (Ala.Civ.App.1996); Bolen v. Hoven, 143 Ala. 652, 39 So. 379 (1905). We note further that the plaintiffs' brief contains no citations to authority supporting their contentions. See Rule 28(a)(5), Ala. R.App. P.; McLemore v. Fleming, 604 So.2d 353 (Ala.1992). *656 The judgment of the trial court is affirmed. AFFIRMED. MOORE, C.J., and SEE, BROWN, and STUART, JJ., concur. NOTES [1] The Court will not address this fourth issue, because the plaintiffs' brief contains no citations to authority supporting their contentions. Rule 28(a)(5), Ala.R.App.P., specifically requires an appellant to present the appellate court with citations to authorities supporting the appellant's contentions. When an appellant fails to comply with Rule 28(a)(5), Ala. R.App. P., this Court may affirm the ruling the appellant is complaining of. McLemore v. Fleming, 604 So.2d 353 (Ala.1992). [2] Rocephin is a sterile, semisynthetic, broadspectrum cephalosporin antibiotic for intravenous or intramuscular administration. Physicians' Desk Reference 2765 (55th ed.2001). [3] Doxycycline is a broad-spectrum tetracycline antibiotic used against a wide variety of bacterial infections. Physicians' Desk Reference 2254 (55th ed.2001).
{ "pile_set_name": "FreeLaw" }
Taraboura Taraboura (Greek: Ταραμπούρα) is a neighbourhood in the city of Patras. It is named after one of the Albanians in which he lived and had his house in his area. Until 1990, it had a tall for the entrance and exit for carriage wheels and vehicles in Patras. Residential housing arrived in 1980. Taraboura features a closed arena where Olympiada Patras plays. It is located at 24 Tisonas Street with the postcode 26623. Its capacity is 2,500 people. References ''The first version of the article is translated and is based from the article at the Greek Wikipedia (el:Main Page) Category:Neighborhoods in Patras
{ "pile_set_name": "Wikipedia (en)" }
Bareback BF Videos Pay Pal Get your discount membership to Bareback BF Videos using the image above…or try the free Bareback BF Videos logins below, and get member access to Barebackbfvideos without paying. Download tons of quality Unreleased Footage and Really High Resolution Pics. This barebackbfvideos.com deal is a limited offer, Don’t miss out!
{ "pile_set_name": "Pile-CC" }
29656? 337 Calculate the greatest common divisor of 83361 and 16095. 111 What is the highest common factor of 25494 and 1806? 42 What is the highest common factor of 117741 and 39? 39 Calculate the highest common factor of 609 and 6069. 21 Calculate the greatest common factor of 29154 and 678. 678 Calculate the greatest common divisor of 13864 and 2504. 8 Calculate the highest common factor of 17670 and 190. 190 Calculate the greatest common factor of 1368789 and 51. 51 What is the highest common factor of 15621 and 615? 123 What is the greatest common divisor of 383 and 3893961? 383 Calculate the greatest common factor of 168 and 560. 56 Calculate the highest common divisor of 3347 and 7. 1 What is the highest common factor of 268 and 338752? 268 Calculate the highest common factor of 690 and 32545. 115 What is the highest common divisor of 82242 and 576? 18 What is the highest common factor of 480555 and 156645? 2655 What is the highest common divisor of 99676 and 20? 4 What is the greatest common factor of 21684 and 3588? 156 What is the greatest common factor of 21952 and 1064? 56 Calculate the highest common divisor of 78678 and 4836. 186 What is the greatest common factor of 756 and 13860? 252 What is the highest common divisor of 1275 and 493? 17 What is the highest common divisor of 23343 and 651? 93 What is the highest common factor of 8141 and 28? 7 Calculate the highest common divisor of 19 and 109117. 19 What is the highest common factor of 43763 and 7362? 409 Calculate the greatest common factor of 112495 and 20385. 755 Calculate the highest common divisor of 4346 and 12349. 53 Calculate the greatest common divisor of 2180 and 237838. 218 Calculate the highest common divisor of 11748 and 2508. 132 What is the greatest common divisor of 3625 and 8555? 145 Calculate the greatest common factor of 1242 and 4374. 54 Calculate the highest common divisor of 289445 and 2379. 793 Calculate the highest common factor of 1657113 and 669. 669 Calculate the greatest common factor of 205040 and 45. 5 What is the highest common divisor of 7472 and 1600? 16 Calculate the greatest common factor of 44 and 61402. 22 What is the highest common divisor of 421 and 2032167? 421 Calculate the greatest common factor of 1290 and 18570. 30 Calculate the highest common divisor of 110398 and 382. 382 Calculate the highest common divisor of 80414 and 6696. 62 Calculate the greatest common factor of 14701 and 4331. 61 Calculate the greatest common factor of 181443 and 93. 93 Calculate the greatest common factor of 49293 and 630. 9 What is the greatest common factor of 5181 and 528? 33 Calculate the greatest common divisor of 819 and 14976. 117 Calculate the greatest common factor of 75 and 3584150. 25 Calculate the greatest common factor of 203 and 2807. 7 What is the greatest common factor of 174985 and 1580? 395 What is the greatest common divisor of 4114 and 60379? 121 What is the highest common factor of 603140 and 159? 53 Calculate the greatest common factor of 31700 and 30. 10 What is the greatest common divisor of 1022044 and 4? 4 Calculate the highest common factor of 92 and 467708. 4 Calculate the greatest common factor of 15240 and 10287. 381 What is the greatest common factor of 204 and 38454? 102 What is the highest common divisor of 294 and 190659? 147 What is the greatest common divisor of 17999 and 151016? 439 What is the highest common factor of 80869 and 103649? 1139 Calculate the highest common divisor of 12376 and 1071. 119 Calculate the greatest common divisor of 368 and 309764. 92 What is the highest common divisor of 878 and 1456163? 439 What is the highest common factor of 798 and 6042? 114 What is the highest common factor of 57656 and 224? 8 What is the highest common divisor of 2520 and 5985? 315 Calculate the greatest common divisor of 119600 and 500. 100 Calculate the greatest common factor of 10 and 5862. 2 Calculate the highest common divisor of 168 and 2031. 3 What is the greatest common divisor of 134 and 321734? 134 Calculate the highest common factor of 1329731 and 156. 13 Calculate the highest common factor of 9200 and 1800. 200 What is the greatest common divisor of 76 and 29280? 4 Calculate the greatest common divisor of 399 and 4503. 57 Calculate the highest common factor of 674272 and 608. 608 Calculate the greatest common divisor of 15 and 46335. 15 What is the highest common divisor of 291920 and 86920? 1640 Calculate the highest common factor of 7879 and 2. 1 Calculate the highest common divisor of 29 and 1752905. 29 What is the highest common factor of 189937 and 3751? 341 Calculate the greatest common divisor of 86 and 149167. 43 What is the highest common divisor of 272251 and 665? 133 What is the highest common divisor of 59 and 3127? 59 Calculate the greatest common factor of 510 and 2690. 10 What is the greatest common factor of 9 and 179919? 9 What is the greatest common divisor of 3 and 2111? 1 Calculate the highest common factor of 142584 and 936. 312 Calculate the highest common factor of 960133 and 213. 71 What is the highest common divisor of 3455491 and 13? 13 Calculate the greatest common divisor of 102 and 5423034. 102 What is the greatest common divisor of 43368 and 7800? 312 What is the greatest common factor of 59 and 179537? 59 What is the greatest common factor of 4977 and 2142? 63 What is the greatest common factor of 191233 and 4821? 1607 Calculate the greatest common divisor of 1473 and 440918. 491 What is the greatest common divisor of 70 and 9205? 35 Calculate the highest common factor of 247 and 5694091. 247 Calculate the greatest common divisor of 62196 and 18176. 284 What is the highest common factor of 13 and 25336909? 13 Calculate the highest common divisor of 5549 and 8153. 31 Calculate the greatest common factor of 4650 and 2238. 6 Calculate the highest common divisor of 2 and 1774. 2 What is the highest common factor of 51894 and 351? 27 Calculate the greatest common factor of 5609252 and 1496. 748 Calculate the highest common factor of 20 and 36494. 2 Calculate the greatest common factor of 56 and 952. 56 What is the highest common factor of 1014 and 375687? 507 Calculate the greatest common factor of 100 and 302940. 20 What is the highest common factor of 12 and 202155? 3 Calculate the greatest common divisor of 2502 and 1386. 18 What is the highest common divisor of 17721 and 165? 33 Calculate the highest common divisor of 6 and 6019110. 6 What is the greatest common divisor of 58280 and 1175? 235 Calculate the highest common divisor of 619844 and 249. 83 Calculate the highest common divisor of 89262 and 2755. 551 Calculate the greatest common factor of 1443275 and 25. 25 Calculate the greatest common divisor of 1980 and 2645610. 330 What is the greatest common factor of 2468 and 215333? 617 Calculate the greatest common factor of 1596 and 20622. 42 What is the greatest common factor of 55 and 150755? 55 Calculate the greatest common factor of 7936 and 6882. 62 What is the greatest common divisor of 24320 and 280? 40 What is the greatest common divisor of 23037 and 2667? 21 What is the highest common factor of 8092 and 1836? 68 What is the greatest common factor of 28 and 140966? 14 What is the highest common divisor of 110 and 916322? 22 What is the highest common factor of 28448 and 448? 224 Calculate the greatest common factor of 383 and 340487. 383 What is the highest common factor of 357 and 217770? 357 What is the highest common factor of 2149161 and 3045? 609 What is the greatest common divisor of 1303472 and 246? 82 What is the highest common divisor of 92 and 434838? 46 What is the highest common divisor of 686 and 182? 14 Calculate the highest common factor of 21879 and 76687. 221 What is the highest common divisor of 1196 and 243776? 52 Calculate the highest common divisor of 1818118 and 734. 734 What is the highest common divisor of 3232 and 1120? 32 What is the greatest common factor of 206 and 897439? 103 What is the greatest common divisor of 34936 and 11264? 88 What is the greatest common divisor of 81326 and 518? 518 What is the highest common factor of 15488 and 15246? 242 What is the greatest common factor of 496 and 54529? 31 Calculate the greatest common divi
{ "pile_set_name": "DM Mathematics" }
The effect of a traditional dance training program on the physical fitness of adults with hearing loss. The purpose of this study was to evaluate the effect of a traditional dance training program on aerobic capacity and muscle strength of adults with hearing loss. Twenty-three adults with hearing loss were separated into 2 groups. Thirteen subjects (6 men, 7 women, mean age, 25.7 +/- 3.9 years) constituted the intervention group, whereas 10 subjects (5 men, 5 women, mean age, 26.4 +/- 5.9 years) formed the control group. Pretraining and posttraining treadmill tests were performed to determine heart rate (HR peak), peak minute ventilation (VE peak), peak oxygen consumption (VO2 peak, absolute and relative), and time to exhaustion (min). Peak torque of hamstring and quadriceps muscles at angular velocities of 60 degrees /s, 180 degrees /s, and 300 degrees /s was also measured. The intervention group followed a 12-week traditional dance training program, whereas the control group received no training during this period. Repeated measures of multiple analyses of variance were used to test mean differences between the values of both groups. A paired t-test was used to compare the values within each group prior and after program participation. A significance level of 0.05 was used for all tests. Following the 12-week training program, significant improvements in peak physiological parameters were seen for the intervention group for peak minute ventilation, peak oxygen consumption (both absolute and relative), time to exhaustion, and peak torque values between the 2 measurements (initial and final). No significant improvements in peak physiological parameters and peak torque were noticed in the control group. In conclusion, adults with hearing loss can improve their physical fitness levels with the application of a systematic and well-designed traditional dance training program.
{ "pile_set_name": "PubMed Abstracts" }
Q: Where is the Registry running I can create a container running a registry: docker run -d -p 5000:5000 --restart=always --name registry registry:2 But docker has a default registry, I can see that the registry is at Registry: https://index.docker.io/v1/ and it must be local, but where is it - do you know? It is correct that if using a browser and go to: https://index.docker.io/v1/ it will take you to docker hub: https://index.docker.io/v1/ But all my local images is local on my machine, so there must be some where the registry is running. You can see the registry if you do: docker system info Containers: 32 Running: 29 Paused: 0 Stopped: 3 Images: 205 Server Version: 18.06.0-ce Storage Driver: overlay2 Backing Filesystem: extfs Supports d_type: true Native Overlay Diff: true Logging Driver: json-file Cgroup Driver: cgroupfs Plugins: Volume: local Network: bridge host ipvlan macvlan null overlay Log: awslogs fluentd gcplogs gelf journald json-file logentries splunk syslog Swarm: inactive Runtimes: runc Default Runtime: runc Init Binary: docker-init containerd version: d64c661f1d51c48782c9cec8fda7604785f93587 runc version: 69663f0bd4b60df09991c08812a60108003fa340 init version: fec3683 Security Options: seccomp Profile: default Kernel Version: 4.9.93-linuxkit-aufs Operating System: Docker for Mac OSType: linux Architecture: x86_64 CPUs: 2 Total Memory: 2.934GiB Name: linuxkit-025000000001 ID: Q6IO:V5CP:OHJL:4KJP:ZG2X:GV5W:YHMM:2WCK:4V4O:O6T3:A4E4:BJHM Docker Root Dir: /var/lib/docker Debug Mode (client): false Debug Mode (server): true File Descriptors: 206 Goroutines: 223 System Time: 2018-08-29T11:56:34.8224409Z EventsListeners: 2 HTTP Proxy: gateway.docker.internal:3128 HTTPS Proxy: gateway.docker.internal:3129 Registry: https://index.docker.io/v1/ Labels: Experimental: true Insecure Registries: 127.0.0.0/8 Live Restore Enabled: false A: That is the default registry which is dockerhub: https://hub.docker.com/ Also see: https://github.com/moby/moby/issues/7203 You cannot change the default registry (which is dockerhub). What you can do is push and pull using your registry as a prefix. For example: docker push localhost:5000/yourimage docker pull localhost:5000/yourimage As per my comment below - this registry runs locally and with docker ps | grep registry:2 you can see it running. You can then use it's id to get the logs where you will see the activity. You can also make use of the api by doing a call to: curl -X GET http://localhost:5000/v2/_catalog This will list all the images you have pushed to your local registry.
{ "pile_set_name": "StackExchange" }
Milestones to recovery: preliminary validation of a framework to promote recovery and map progress through the medium secure inpatient pathway. Forensic mental health care in the UK has undergone a rapid expansion since the late 1990s. In medium secure units (MSUs), there is growing emphasis on developing care pathways without much theoretical underpinning. We developed a concept of 'Milestones to Recovery' (MTR) to measure progress through the MSU pathway. Our aim was to validate the MTR framework. Our hypotheses were that patients scoring higher on the MTR Scale would be more likely to be aggressive to others in the following 6 months and resident in the acute areas of the unit and that those scoring lower would be more likely to be discharged within 6 months of the assessment. An MTR scale was developed to enable the investigation of the validity of the MTR framework and evaluated with staff evaluations of 80 resident patients using a prospective, longitudinal and naturalistic design. The results suggest that the MTR framework is valid in discriminating between different stages on the MSU pathway. Therapeutic engagement was particularly important in terms of progress through the MSU, whereas current behaviour was important in predicting future aggression. Further research is required to test the MTR framework across different levels of security, with larger samples and within different populations. Provides a framework to map progress through the service. Identifies key factors that influence recovery and rehabilitation. Potential to promote dialogue between patients and staff, and enhance motivation.
{ "pile_set_name": "PubMed Abstracts" }
/// /// Massively by HTML5 UP /// html5up.net | @ajlkn /// Free for personal and commercial use under the CCA 3.0 license (html5up.net/license) /// /* Wrapper */ #wrapper { @include vendor('transition', 'opacity #{_duration(menu)} ease'); position: relative; z-index: 1; overflow: hidden; > .bg { position: absolute; top: 0; left: 0; width: 100%; height: 100%; background-color: _palette(wrapper-bg); background-image: url('../../images/overlay.png'), linear-gradient(0deg, rgba(0,0,0,0.1), rgba(0,0,0,0.1)), url('../../images/bg.jpg'); background-size: auto, auto, 100% auto; background-position: center, center, top center; background-repeat: repeat, no-repeat, no-repeat; background-attachment: scroll, scroll, scroll; z-index: -1; &.fixed { position: fixed; width: 100vw; height: 100vh; } } &.fade-in { &:before { @include vendor('pointer-events', 'none'); @include vendor('transition', 'opacity 1s ease-in-out'); @include vendor('transition-delay', '0.75s'); background: _palette(invert, bg); content: ''; display: block; height: 100%; left: 0; opacity: 0; position: fixed; top: 0; width: 100%; } body.is-loading & { &:before { opacity: 1; } } } @include orientation(portrait) { > .bg { background-size: auto, auto, auto 175%; } } }
{ "pile_set_name": "Github" }
Q: Bootstrap tree-view: Tree doesn't show up I'm new to tree-view, I'm trying to show a basic tree but it doesn't work and I don't know where I made the mistake. I made test.html that follow the same structure of my basic.html (I'm sparing you code of the navbar, alerts, etc). I have other js functions in functions.js that work fine. test.html: {% csrf_token %} {% load groupfilter %} {% load staticfiles %} <!DOCTYPE html> <html lang="en"> <head> <meta name="viewport" content="width=device-width, initial-scale=1" charset="utf-8"> <link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css" integrity="sha384-ggOyR0iXCbMQv3Xipma34MD+dH/1fQ784/j6cY/iJTQUOhcWr7x9JvoRxT2MZw1T" crossorigin="anonymous"> <link rel="stylesheet" href="{% static 'bootstrap-treeview.min.css' %}"> <script src="{% static 'bootstrap-treeview.min.js' %}"></script> <script src="https://code.jquery.com/jquery-3.3.1.slim.min.js" integrity="sha384-q8i/X+965DzO0rT7abK41JStQIAqVgRVzpbzo5smXKp4YfRvH+8abtTE1Pi6jizo" crossorigin="anonymous"></script> <script src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.7/umd/popper.min.js" integrity="sha384-UO2eT0CpHqdSJQ6hJty5KVphtPhzWj9WO1clHTMGa3JDZwrnQq4sF86dIHNDz0W1" crossorigin="anonymous"></script> <script src="https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/js/bootstrap.min.js" integrity="sha384-JjSmVgyd0p3pXB1rRibZUAYoIIy6OrQ6VrjIEaFf/nJGzIxFDsf4x0xIM+B07jRM" crossorigin="anonymous"></script> <title>Test</title> </head> <body> <div class="container"> <div id="tree"></div> </div> <!-- JavaScript functions --> <script src="{% static 'functions.js' %}"></script> </body> </html> extract of functions.js: $(function(){ var mytree = [ { text: "Parent 1", nodes: [ { text: "Child 1", nodes: [ { text: "Grandchild 1" }, { text: "Grandchild 2" } ] }, { text: "Child 2" } ] }, { text: "Parent 2" } ]; $('#tree').treeview({data: mytree}); }); A: Can you share sample link that you are following? It seems like you are importing Twitter Bootstrap 4.3.1 But as I know, Offical Bootstrap still not provide TreeView on their document.
{ "pile_set_name": "StackExchange" }
In the Community Nearby Schools 3208 Perdot Avenue, Rosamond, CA 93560 (MLS# SR16727560) is a Single Family property with 4 bedrooms, 2 full bathrooms and 1 partial bathroom. 3208 Perdot Avenue is currently listed for $294,990 and was received on October 17, 2016. Want to learn more about 3208 Perdot Avenue? Do you have questions about finding other Single Family real estate for sale in Rosamond? You can browse all Rosamond real estate or contact a Coldwell Banker agent to request more information.
{ "pile_set_name": "Pile-CC" }
Exclusive Collection Of Rear View Cameras From TVC-Mall.com A car rear view camera is a special type of video camera that is produced specifically for the purpose of being attached to the rear of a vehicle to aid in backing up, and to alleviate the rear blind spot. TVC-Mall.com’s rear view cameras are well-known for the powerful functions and premium quality materials. Recently, TVC-Mall.com has released its new models, and launched a rear view cameras promotion. Anyone who want to buy wholesale rear view cameras can visit TVC-Mall.com for more details. TVC-Mall.com is a leader in cell phone accessories and other electronic accessories. Its rear view cameras are well-known for the powerful functions and premium quality materials. The new collection consists of many different designs. From IR night vision rear view cameras, to 2.4G wireless car rear view camera systems, TVC-Mall.com has everything to ensure customer satisfaction. “We are excited to launch this promotion, and we encourage wholesalers and retailers to keep coming back to our store to see what new products are available. Those who want to buy wireless car rear view camera systems should visit our online store as soon as possible, because the promotion is for a limited time only,” says a sales manager of the company. “We have the global reach, expertise and infrastructure necessary to guarantee our customers that their data is secure.” In addition, TVC-Mall.com’s online store features attractive low prices on its a hundred thousand of different styles ofelectronics and related accessories. Superior customer service, high-quality, speedy delivery, and affordable prices, are the reasons to choose TVC-Mall.com About The TVC Mall (TVC-Mall.com) Launched in 2008, TVC Mall has a sensitive marketing sense and it has established strong relationships with many original manufacturers of Apple products (iPhone, iPad, iWatch, etc.). Some Apple accessories used to have been sold at TVC-Mall.com before their official launch. The business used to be widely reported by some top media (like BusinessInsider.com, AppleInsider.com, CNET.com, etc.). Please visit http://www.tvc-mall.com or subscribe its newsletter for the best deals, special prices, rebate savings, exclusive bundles and more.
{ "pile_set_name": "Pile-CC" }
Q: XML Schema for analysis in C# Is it possible to use a XML Schema to check against the contents of a XML file? For instance, in ASP.NET web.config, can I create a schema to check that <customErrors mode = "On">? This will ultimately be used in a C# app, the C# app should take in the XML document and the XML Schema and check if the XML Document violates any of the "rules" listed in the XML schema, i.e. <customErrors mode = "Off"> Is it possible to do the checking without any boundary to the structure of the XML file? i.e. the attribute <customErrors> can be within any part of the XML document and the schema will still work. A: Possible: Yes, in XML Schema 1.1 using assertions. Practical or recommended: No. XML Schema is intended to be used to validate the "structure of the XML file," as you anticipate in your question. You can skip much of that via xsd:any and then use assertions to express the sort of spot-checks that you describe via XPath expressions. However, it'd be more natural to just apply XPath expressions directly to your XML from within C#, or using Schematron, which is a standard for applying XPath expressions to do validation.
{ "pile_set_name": "StackExchange" }
Eochrysis, a new replacement name for the fossil Protochrysis Bischoff, 1916 (Insecta: Hymenoptera: Chrysididae) nec Pascher, 1911 (Protista: Cryptomonada). The genus Protochrysis (type species P. succinalis Bischoff, 1916, by monotypy) was established by Bischoff (1916: 139) for distinctive fossil insect remains of Eocene (Lutetian) age from the former Königsberg outskirts of East Prussia (now Kalinigrad, Russian Federation), referred at present to the Chrysididae (Hymenoptera) (Brues 1933; Carpenter 1985, 1992). However, an identical generic name Protochrysis had previously been proposed by Pascher (1911: 191) for a living protist (Cryptomonada). Bischoff's (1916) name is therefore an invalid junior homonym. Carpenter (1985: 577) proposed a new replacement name for the fossil genus, but overlooked the fact that his newly proposed generic name Protochrysidis was also preoccupied, again by the name of another protist genus, Protochrysidis [Protista: Chrysomonada] described by Skvortzov (1969: 346) from Harbin (China). In fact, the protistan genus Protochrysidis had initially been published as chrysophyte algae following the International Code of Nomenclature for Algae, Fungi, and Plants (McNeill et al. 2012) by Skvortzov (1961: 4) who had failed to designate holotype of the species, but later fulfilled all conditions for valid publication in 1969 by providing necessary typification and reference to formerly published description and illustrations. At present chrysophyte algae are still maintained as Chrysomonada in protozoology due to a continued somewhat archaic tradition (Preisig & Anderson 2002). Protochrysidis Skvortzov, 1969 remained little studied since the time of its first description and is currently treated as an incertae sedis protistan taxon.
{ "pile_set_name": "PubMed Abstracts" }
# frozen_string_literal: true require File.expand_path('lib/jekyll-last-modified-at/version.rb', __dir__) Gem::Specification.new do |s| s.name = 'jekyll-last-modified-at' s.version = Jekyll::LastModifiedAt::VERSION s.summary = 'A liquid tag for Jekyll to indicate the last time a file was modified.' s.authors = 'Garen J. Torikian' s.homepage = 'https://github.com/gjtorikian/jekyll-last-modified-at' s.license = 'MIT' s.files = Dir['lib/**/*.rb'] s.add_dependency 'jekyll', '>= 3.7', ' < 5.0' s.add_dependency 'posix-spawn', '~> 0.3.9' s.add_development_dependency 'rake' s.add_development_dependency 'rspec', '~> 3.4' s.add_development_dependency 'rubocop' s.add_development_dependency 'rubocop-performance' s.add_development_dependency 'rubocop-standard' s.add_development_dependency 'spork' end
{ "pile_set_name": "Github" }
Florida National Cemetery Florida National Cemetery is a United States National Cemetery located near the city of Bushnell in Sumter County, Florida. Administered by the United States Department of Veterans Affairs it encompasses and began interments in 1988. It is now one of the busiest cemeteries in the United States. History Florida National Cemetery is located in the Withlacoochee State Forest, approximately north of Tampa. The forest was acquired by the federal government from private landowners between 1936 and 1939 under the provisions of the U.S. Land Resettlement Administration. The United States Forest Service managed the property until a lease-purchase agreement transferred it to the Florida Board of Forestry in 1958. Currently, Withlacoochee State Forest is the second-largest state forest in Florida, divided into eight distinct tracts of land. In 1842, Congress encouraged settlement here by establishing the Armed Occupation Act. The law granted a patent for to any man who kept a gun and ammunition, built a house, cultivated of the land and remained there for at least five years. Settlers moved in to take advantage of the generous offer. The area contained abundant timber and suitable farmland, appealing attributes to frontiersmen. In 1845 Florida was granted statehood. During the Civil War, a sugar mill on the Homosassa River supplied sugar to the Confederacy. A robust citrus-growing industry developed in the eastern part of the area and became a focus of intense economic expansion soon after the war. In 1980, the Department of Veterans Affairs (VA) announced that it would establish a new national cemetery in Florida, its fourth. Two major locations for the cemetery were studied: property near the Cross Florida Barge Canal and the Withlacoochee State Forest. The Withlacoochee site, though more environmentally sensitive, was supported by government officials. In February 1983, the state transferred land to the VA for the development of a Florida National Cemetery. The first burial was in 1988 and a columbarium was opened in November 2001. In 1999, federal officials asked the Florida Cabinet to grant land for the expansion of the Florida National Cemetery, providing 65,000 to 100,000 grave sites for veterans in the state. Environmentalists argued that Florida Department of Agriculture and Consumer Services Forestry Division officials did not state whether the 179 acres of land within the Withlacoochee State Forest was surplus in accordance to a Florida constitutional amendment concerning the acquisition of land for conservation. Before the Florida Cabinet meeting on October 26, the Department Veterans Affairs and the Florida Cabinet agreed that 42 acres would be removed as they served as the habitat for several endangered species. Florida governor Jeb Bush and the Florida Cabinet voted 7-0 in favor of selling 137 acres of land to the Department of Veterans Affairs for the cemetery's expansion. Notable interments Medal of Honor recipients Master Chief Hospital Corpsman William R. Charette, U.S. Navy, for action with the Marine Corps in the Korean War. Master Sergeant James R. Hendrix, U.S. Army, for action with the 4th Armored Division at the Battle of the Bulge in World War II. Sergeant Major Franklin D. Miller, U.S. Army Special Forces, for action in the Vietnam War. Others Frank Baker, professional baseball player Philip J. Corso, U.S. Army lieutenant colonel Raymond Fernandez, aka "Hercules Hernandez", professional wrestler. Scott Helvenston, film trainer-stuntman and former Navy SEAL. Lieutenant Commander Mike Holovak, A U.S. Navy, skipper of PT boat in the South Pacific credited with sinking nine Japanese ships in World War II. Hal Jeffcoat, Major League Baseball pitcher and outfielder Major David Moniac, veteran of the Second Seminole War, first Native American graduate of United States Military Academy. Blackjack Mulligan, professional wrestler, author and football player Ernie Oravetz, Major League Baseball outfielder Colonel Leonard T. Schroeder Jr., the first soldier ashore in the Normandy Landings on D-Day, June 6, 1944, during World War II. Frank Stanley, cinematographer for Clint Eastwood films such as Breezy (1973), Magnum Force (1973), Thunderbolt and Lightfoot (1974) and The Eiger Sanction (1975) Champ Summers, Major League Baseball outfielder Notable monuments A carillon was constructed by the World War II AMVETS organization in an open area adjacent to the first administration building. It was dedicated on October 9, 1993. The cemetery contains a Memorial Pathway that in 2003 featured 47 plaques, statues, monuments, etc., honoring America's soldiers from 20th-century conflicts. References External links National Cemetery Administration Florida National Cemetery Category:Cemeteries in Florida Category:Protected areas of Sumter County, Florida Category:United States national cemeteries Category:1988 establishments in Florida
{ "pile_set_name": "Wikipedia (en)" }
Debbie Gregory DNP, RN Dr. Debbie Gregory is a national leader in healthcare design, innovation, and transformation. As a nurse executive and interior designer, Dr. Gregory is passionate about “Intentional Design” that aligns People, Place, and Process. She creates and transforms environments into functional ecosystems using complex systems science and strategic thinking. Dr. Gregory has Doctorate of Nursing Practice in Health Innovation and Leadership from the University of Minnesota and a bachelors in nursing from Vanderbilt University. Currently, she serves as Senior Clinical Consultant for the Technology Planning Group at Smith, Seckman, Reid, Inc., a national engineering firm. In today’s healthcare environment, clinical transformation and innovation are essential in navigating and reengineering the care delivery model of the future. She serves as a liaison and visionary between the clinical community, the design and construction community, and the IT/engineering community to interpret and enhance the clinical operations and functionality of the healthcare environment. She develops strategies for operational and financial improvements designed to advance clinical excellence, improve quality of care, patient experience, and overall patient outcomes. She is a frequent presenter at national conferences and has authored many articles in national publications. Dr. Gregory provides educational summits that bring healthcare leaders, technology experts, and visionaries together to discuss the future of the healthcare delivery model and the integration of technology. She is the co-founder and past president of the Nursing Institute for Healthcare Design (NIHD) and current President of the Nursing Institute for Healthcare Design Foundation. NIHD is an international not for profit organization created from a need, an idea, and a passion to engage and include clinicians at the design table to improve the healthcare environment.
{ "pile_set_name": "Pile-CC" }
Teen angel Keisha Grey cant hide her large natural mangos under her tiny t-shirt counting up as Johnny Sins cant hide his large cock in his pants. That babe gets apropos on her knees to take his pistol in her hawt mouth
{ "pile_set_name": "Pile-CC" }
Medical Designers Save Time, Parts With Software HIGH STRESS: The sensor in Tensys’ new blood-pressure monitor floats within a rigid frame attached to a serpentine arm designed to flex. Engineers used SolidWorks and COSMOSWORKS to design the arm and see how it would perform under real-world flexing, saving prototypes. “Faster, cheaper, better” is a phrase that may have its genesis in the aerospace industry, but it has launched breakthrough designs in other industries as well. Case in point: the medical industry, where device manufacturers have used CAD and FEA to give flight to new design ideas while slashing product-development time. Two recent examples, one in the U.S. and one in the U.K., show the improvements and time/cost savings engineers have realized from their use of engineering software. In Camberly, U.K., the design team at reseller Williams Medical Supplies set up a new technical development department to design medical products and settled on Solid Edge (UGS) as its core design tool. “Our aim is to take a routine surgical instrument and bring something new to the design that will provide significant benefit,” says Robert Steele, technical development director. Among their projects: the Opmaster Series 4 surgery operating table. The enhanced design allows a patient to be examined, operated on, and recover on the same table. Using Solid Edge, the team modeled parts and ran collision and interference analyses and motion simulation. “We were able to sit with sales and marketing during the initial design stage and get feedback,” says Steele. “Engineers don’t always get it right, but with the software we could rehearse the design and minimize the risk of getting it wrong.” The result was a major time savings, largely the result of not doing many prototypes. “In fact, we were almost able to dispense with the prototyping phase and go straight to manufacturing,” Steele asserts. Working with different software and on a vastly different product line, engineers at San Diego-based Tensys Medical, Inc. had similar results. Using SolidWorks for CAD and COSMOSWorks for FEA (both from Dassault Systemes, Inc.) the engineering team developed the T-Line[R] Tensymeter, a non-invasive arterial blood-pressure management system for use in surgery. Their goal was to replace the traditional cuff-based monitors that provide only intermittent measurements every few minutes. That kind of irregular monitoring can delay recognition of rapid changes in blood pressure. The design concept uses an actuator to move a sensor over the patient’s wrist to find the best position for producing a continuous waveform. “The sensor has to float within a rigid frame attached to a serpentine arm that’s designed to flex. The team used COSMOSWORKS to identify areas of high stress for the olefin-based serpentine arm and used the analysis results to make design modifications. Among those modifications, says Senior Engineer Russ Hempstead: “We removed the stress risers, added radii, and added thickening sections.” He and the engineering team didn’t expect to see the stress risers, but when they did they put static flexing on part of the serpentine arm so they could move it the way it would move in the real world. The software enabled the team to shorten the design cycle by 60 percent. They cut manufacturing time by four percent, material costs by three percent, and labor costs by three-four percent. In all, engineers did seven or eight analysis studies in just a couple of days. Hempstead says the team cut the number of parts by putting as much functionality in a part as possible. It’s a strategy he recommends to others. “It may complicate tooling, but it still eases manufacturing,” he says. “We got rid of four components.” Industrial workplaces are governed by OSHA rules, but this isn’t to say that rules are always followed. While injuries happen on production floors for a variety of reasons, of the top 10 OSHA rules that are most often ignored in industrial settings, two directly involve machine design: lockout/tagout procedures (LO/TO) and machine guarding. Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
{ "pile_set_name": "Pile-CC" }
I listened to this one, narrated by Justine Eyre. It was about 12 hours long, but it passed by quickly with this fun read. It's not particularly deep or magical and it doesn't call life as we know it into question. It's a nice read/listen, light and intriguing for anyone in the mood for a little escape from the disappointments that have been abounding. Funny enough, the only problems with the book are also reasons why I liked it. Lily Kaiser's journey is a little too convenient throughout the book but that can be just perfect sometimes. It can be exactly what I need to read or listen in order to balance out the pressure of the world. So, yes, the book is a little too neat. The story a little too beautiful and coincidental and works a little too well, but I didn't mind it at all. Mostly because it was also written incredibly well. It moves between times, giving insight into Rose Gallway's life that Lily doesn't readily have and let's the reader piece some of it together on our own. I do enjoy that. And then the author lays it all out and it's just perfect. A little too perfect, like in one of those rom-coms that we watch to feel good but that we all know aren't the way the world works. I really loved that about it. It's going to be one of my comfort books, to peruse when I'm down, maybe listen to when I wanna revel in new beginnings, like the mood I re-watch Stardust in. If you've read a few too many mysteries lately, or too many books that ripped your heart out (like I have recently), than this is the perfect book to recover with. It's comforting and sweet and romantic and doesn't take itself too seriously. But it's not the book for that serious deep read. Don't expect it to be.
{ "pile_set_name": "Pile-CC" }
My new global trends book is out now: The Future of Almost Everything. But it takes at least 20 years to evaluate how good a trends analyst was / is – so what about forecasts made by me in previous books, about what to expect over the following decade or two or three? How did those forecasts measure up? I had to answer that question for myself by re-reading what I wrote in the past about the future, before writing my latest book. Read FREE SAMPLE of The Truth about Almost Everything. So you can judge for yourself, here are loads of predictions I made in the past - and the book in which they were made plus date. Every one of these is already a reality or looks like it soon could be, as of August 2015....And yes I got some things wrong - not many fortunately. I am going to publish the entire text of Futurewise 1998 edition on this website for a complete picture - but of course on this site already are hundreds of posts and videos going back in some cases over 20 years. Here's one I got wrong: I thought video streaming would take off - but with more use of live video using smartphones that we have actually seen. Most personal video streaming is of course things like YouTube clips. Most forecasting errors in my experience are not over WHAT is going to happen as the trend is usually fairly obvious, but by WHEN with questions about real impact. So here goes: how did I see the future of banking, global economy, mobile, smartphones, Internet of Things, Big Data and so on...? Banking Banking as it is in 1998 will never survive and will fall in profitability. 1998 - Futurewise Internet of Things and Smart Homes All new homes in developed nations will be intelligent by 2010, Smart homes will boast 15-20% energy savings. 1998 - Futurewise Every device with a power socket will be online. Washing machine will call engineer. Garage doors will open automatically, alarm will be turned off, lights will go on, coffee machine will begin to pour a coffee and so on. 1998 - Futurewise Power generation in many homes from solar cells and wind in rural areas 1998 – Futurewise Retail and e-commerce Basic shopping will be done online and the rest will become a recreational activity – so shopping centres will have to learn from theme parks to reinvent themselves as a leisure experience. 1998 - Futurewise Loss of millions of small retailers by 2005 as huge chains expand market share, These global chains will increase own brand sales from 15% to 30% by 2010. However many corner shops will survive because of convenience, parking restrictions and so on. We will see a big reversal of the trend to build more out of town superstores, with rapid growth of smaller outlets of the same chains. 1998 - Futurewise Millions of people will buy and sell from each other directly at cut throat prices for new and second-hand goods, by posting information online, with instant matching of buyers and sellers, creating virtual “street markets”. 1998 – Futurewise Europe and global economy Major economic disruptions will occur affecting many nations from a series of very low probability but very high impact events, with combined impact. 1998 - Futurewise Expect increasingly complicated financial instruments to be developed, which will add to risks of economic instability. 1998 – Futurewise The next global economic shock is likely to be triggered by events relating to complex financial products (derivatives) and hedge funds, overwhelming markets and governments - 2003 Futurewise Speed of change will be a fundamental and rapidly growing global risk, with sudden collapse of economies in different nations, related to loss of market confidence. 1998 – Futurewise Massive future economic tensions in Eurozone in next two decades, which may threaten the Euro project. 1998 – Futurewise Expect more rioting on the streets as workers untie to vent their anger and frustration at leaders, global institutions and wealthy ethnic minorities. 1998 – Futurewise Interest rate targeting set at 2% will turn out to be too low because no room to manage the deflationary economic shocks that we are going to see, without risk of tipping over into deflation. Expect central banks to begin relaxing such low targets – 2003 Futurewise 2nd edition Expect a growing backlash against globalization, blamed by workers in many nations for lack of jobs and economic decline. 1998 – Futurewise Expect growing anger and resentment against market speculators, blamed for price instabilities of commodities and currencies, and for destabilizing entire nations by over-trading complex financial products, which very few people fully understand. 1998 – Futurewise More governments will take refuge in larger trading blocs, with more grouped, linked of fused economies by 2020, particularly in Asia, but it will not be entirely effective as speculators also grow rapidly in global power. ASEAN will become stronger as part of this process. 1998 – Futurewise Outsourcing of manufacturing and service jobs to China and India will go into reverse, as inflation in Asia wipes out the economic argument for doing so, and as companies look to become more agile and reduce risk. 2003 - Futurewise Many people will be surprised at how rapidly China overtakes the US as the world’s largest economy. Futurewise 1998 Health AIDS will become a global pandemic which will require massive community mobilization over more than 20 years. Prevention programmes will prove effective, but a vaccine will be almost impossible to make, and certainly will not be developed before 2003. 1987 – Truth about AIDS Life expectancy will go on increasing rapidly with official forecasts revised every 12 months, over the next two decades and beyond, each of which will create added pressures on pension fund solvency. 1998 - Futurewise Viruses will be used to treat or prevent diseases such as cancer or cystic fibrosis. Viruses will be used to infect cancer cells and teach them to manufacture chemotherapy agents to poison cancer cells directly – 1993 Genetic Revolution We will repair damaged tissue using a person’s own cells, grown in the laboratory. – 1993 Genetic Revolution GM foods – new crops and improved animals - will be important and widely grown. – 1993 Genetic Revolution Genetically engineered animal and human cells will be used to manufacture next-generation pharma products including new types of vaccines. – 1993 Genetic Revolution Huge numbers of human genes will be linked to patterns of disease, enabling very accurate predictions to be made about future medical problems in an individual. – 1993 Genetic Revolution Monoclonal antibodies will become a very important treatment in future for cancer and other conditions. – 1993 Genetic Revolution Technology to create human cloned embryos in the laboratory for research purposes will become routine. 1993 – Genetic Revolution We will see many new virus threats emerge around the world by 2020, of which several will trigger global containment efforts. 1998 – Futurewise= Pensions crisis Pensions crisis will hit Germany and Italy, while France will be shaken by riots and demonstrations on the streets when governments try to increase retirement age. 1998 – Futurewise In 20 years time, many older people will carry on working to 75, or 85, or until they drop, with virtually no pension. 1998 – Futurewise Calls to legalise euthanasis will grow far stronger, with many high profile cases where doctors or family have taken the law into their own hands. 1998 – Futurewise Personal pension plans and investment funds will be growth markets for those approaching retirement, with increasing questions about charges and performance of actively managed funds. 1998 – Futurewise Future of Europe Eurozone will not be sustainable without huge pain. Economic conditions that enable some countries to swim will cause other economies to drown. 1998 - Futurewise Tribalism will be the downfall of Europe and will feed terrorism. 1998 - Futurewise Many former Eastern Bloc nations will not stabilize economically until beyond 2008, and even then there will still be a huge gap compared to Western Europe. 1998 - Futurewise It will take until beyond 2018 for new democratic traditions to take root in former Soviet bloc nations. Economic crisis in these nations may lead to riots, civil disobedience, internal military action or worse. Expect the EU to try to reduce these risks by early inclusion into an enlarged community. 1998 - Futurewise Enlarging the EU from15 to 25 nations will change it forever, adding to paralysis in decision-making. 1998 - Futurewise People tribes will sometimes be very hostile to the emerging mega-state. 1998 - Futurewise One of the final destructions of the United States of Europe will be high unemployment caused by rapidly changing economic conditions and labour force immobility. 1998 - Futurewise However Europe will benefit in the short term from instability elsewhere. 1998 – Futurewise Future of the UK UK will continue to disintegrate in the final death pangs of the English imperialistic dream. Scots will look to Europe as a way of staying together in a broader alliance, rather than close rule from London. 1998 - Futurewise The English will become increasingly resentful of rulings imposed by the EU. 1998 - Futurewise As Scotland asserts its own right to govern itself, the English will become more strident about being English. 1998 - Futurewise UK home ownership will prove a good long term investment, despite market collapse and many pundits claiming the end of the sector as a sound investment. Web posts 2007-2008 on globalchange.com and YouTube. London will remain very popular and powerful London will continue to be one of the most popular cities in the world for the next 30 years, and will continue to be dominated by financial service despite aggressive global competition. 1998 - Futurewise The City will keep top position or near top in cross-border lending, and will fight to remain the largest global centre for Forex. 1998 - Futurewise Cities will be popular places to live Hundreds of millions will migrate to large cities: city life will be increasingly popular, despite forecasts by some that cities will decay and die as wealthy people move out to escape crime, congestion, pollution and chaos. 1998 - Futurewise Politics, tribalism, new patterns of war and rapid rise of new terrorist groups Political whirlwinds will affect whole continents. 1998 – Futurewise Rise of new, sinister radical people movements, which are totally convinced of their moral cause and use tribalism, social networking and terrorism – these groups will seize great powers. 1998 – Futurewise Terrorist groups will multiply rapidly in the third millennium, taking advantage of new technologies to frighten, sabotage and attack for the sake of a cause. 1998 – Futurewise Security forces will use ever more sophisticated tools for surveillance, violating privacy of hundreds of millions. 1998 – Futurewise Traditional left-right political divides will be swept away in many nations by polarized debates over things like sustainability, or the application of Islamic laws, or whether a nation should be in or out of the Eurozone. 1998 - Futurewise Ever present video cameras will make large-scale traditional wars harder to fight, because horrors will be seen very clearly. 1998 – Futurewise World military spending will fall and then rise – with investment in drones, cruise missiles etc but experience show that wars are won by house to house fighting not by remote control smart weapons. 1998 – Futurewise Sustainability and single issues Left-right politics will give way to single issue politics eg should we be in or out of the Eurozone, or become independent from the UK, or spend more on carbon taxes. 1998 - Futurewise The environment will be the number 1 dominant single issue for decades to come. 1998 - Futurewise Marriage and children Marriage will become less fashionable but the dominant household pattern for middle aged people will still be having children and bringing them up together. 1998 - Futurewise A new generation of teenagers will emerge in the early Third Millennium, the M Generation: more conservative than in the past – less sex, less drunkenness, less drugs, more study, more concerned about issues like environment. They will still follow traditional romantic dreams… of one day finding a wonderful partner for a very long term relationship. 1998 - Futurewise Drugs and smoking We will see widespread drug testing – at work and in prisons, greater investment in drug rehab. 1998 - Futurewise We will see progressive criminalisation of smoking with ever stricter regulations on tobacco, and a bitter fight in some nations over decriminalization of cannabis. 1998 - Futurewise We will see hundreds of new designer drugs that fall outside government legal powers, of which some will enhance memory and intelligence, becoming widely abused by students. 1998 - Futurewise Feminisation Feminisation of workplace and wider society with men in retreat, labeled as testosterone addicts, dangerous, ill-behaved variants of human species prone to violence and sexual predatory acts. 1998 – Futurewise
{ "pile_set_name": "Pile-CC" }
Sandusky Sent Down River After a Commonwealth of Pennsylvania Corrections Department review, convicted child molester and former Penn State assistant coach Jerry Sandusky has been sent to the Greene State Prison, where he will serve out his sentence (and probably, his life) in protective custody. He’s still pursuing appeals, which no one expects to go anywhere. Greene is a maximum security prison, classified as a “Supermax“, which contains a Death Row. Lifers there include Philadelphia serial killer Juan Covington, and three convicts await execution. This is one tough place. “We make individual decisions based on facts,” Corrections Secretary John Wetzel said in a written statement. “Given the high-profile nature of this individual, coupled with the nature of his crimes, this makes him very vulnerable in a prison setting.” Noooo kidding, John! (We all know from watching TV crime dramas what happens to guys like Jer in da Big House.) Just how effective will the security measures be? Better be Biohazard Level 5 containment for Ol’ Jer. He will not have a cellmate and will be subjected to heightened supervision and an escort when not in his cell. He will get an hour of individual exercise five days a week and three showers a week — alone, save for the escort. He will eat meals in his cell. All other services, including religion, medications, and treatment programming will be conducted in his cell. All visits will be non-contact. No touching of or by the Tickle Monster. Sandusky’s legal representations did not return phone calls. This is close to home for “Jer”. His home town of “Little Washington” is a half-hour north on I-79. A further half-hour north lies the thriving, post-ferrous metropolis of Pittsburgh. The State Correctional Institution at Greene, as it is formally known, is a maximum-security prison that houses a total of 1,800 inmates and employs 700 people. Friends' Blogs Whodat Turkey? The Nittany Turkey is a retired techno-geek who thinks he knows something about Penn State football and everything else in the world. If there's a topic, we have an opinion on it, and you know what "they" say about opinions! Most of what is posted here involves a heavy dose of hip-shooting conjecture, but unlike some other blogs, we don't represent it as fact. Read More…
{ "pile_set_name": "Pile-CC" }
Life at depth: Photobacterium profundum genome sequence and expression analysis. Deep-sea life requires adaptation to high pressure, an extreme yet common condition given that oceans cover 70% of Earth's surface and have an average depth of 3800 meters. Survival at such depths requires specific adaptation but, compared with other extreme conditions, high pressure has received little attention. Recently, Photobacterium profundum strain SS9 has been adopted as a model for piezophily. Here we report its genome sequence (6.4 megabase pairs) and transcriptome analysis. The results provide a first glimpse into the molecular basis for life in the largest portion of the biosphere, revealing high metabolic versatility.
{ "pile_set_name": "PubMed Abstracts" }
Araucaria clonal forestry: types of cuttings and mother tree sex in field survival and growth Resumo: Araucaria angustifolia (Bert.) O Kuntze (Paraná pine or Araucaria) is a potential forestry native species for Brazilian silviculture. However, a number of challenges and technical restraints persist, hindering its silvicultural expansion, among which are the lack of cloning technologies of superior genetic materials and their assessment under field conditions. Thus, we evaluated the potential use of araucaria plants derived from cuttings and seeds for timber production, by assessing field survival, growth and strobilus production using cuttings from male and female plants, collected from different positions, compared with those produced by sexual reproduction. Clones of male and female trees from different types of cuttings and seedlings were planted in 3 x 3 m spacing. The experiment was conducted in a completely randomized design of one tree plot with three treatments. Female clones and apical cuttings showed higher growth in diameter at breast height (6.4 cm) and total height (3.6 m) 74 months after planting, followed by seedlings and other clones, with similar results. We conclude that cuttings technique is potential for araucaria propagation for wood production purposes, and it is favored by the use of apical cuttings from female mother trees.
{ "pile_set_name": "Pile-CC" }
Historical conceptualizations of depression =========================================== There is a long tradition in phenomenologlcal psychopathology that stresses basic bodily alterations as core features of depressive states. Thus, Wernicke used the term "vital feelings" to describe certain somatic symptoms occurring in affective psychoses.^[@ref1]^ Vital feelings refer to the close relationship of the body to the awareness of self. They determine the way we experience our body and the impression we assume our physical presence makes on other people. Vital feelings are somatic affects localized In different parts of the body. Whereas vital feelings constitute the bodily background of our normal experiences, they may move to the fore In a depressive mood. For example, depressed patients very often complain of a headache which is described not exactly as an ordinary pain, but more as an unbearable pressure "like a band around the head." Other disturbed vital feelings affect the chest or the abdomen, and mediate unpleasant sensations of weight, tension, heaviness, or Inhibition, totally absorbing the focus of attention. In quite a similar way Dupré speaks of "coenestopathic states" which mean a distressing, qualitative change of normal physical feeling In certain areas of the body during an episode of depressive mood. It Is a global loss of vitality In which all bodily parts and functions may be altered, and all their performances depressed.^[@ref2]^ Kurt Schneider considered these disturbances of vital feelings to be the core of cyclothymic depression. In his psychopathologlcal assessment they were of paramount diagnostic significance In depressive Illness, more or less equivalent to the first-rank symptoms In schizophrenia.^[@ref3]^ Huber discriminated between vital disturbances on the one hand and vegetative symptoms In depression on the other.^[@ref4]^ Vital disturbances refer to the vital feelings just mentioned. They comprise a loss of general vital tone of the body, a prevailing fatigue or exhaustibility, and various forms of somatic dysesthesia, typically of a static, more localized character affecting head, chest, heart region, or abdomen. All-pervasive sensations of anesthesia, stiffness, and alienation of the total body may characterize a somatopsychic depersonalization in depression which may appear as a Cotard\'s syndrome in its extreme form. If the vital disturbances take on a peculiar form that is difficult to describe in ordinary everyday words, Huber speaks of a "coenesthetic" depression which must be typologically differentiated from the bizarre states of coenesthetic schizophrenia. Vegetative symptoms are closely associated with these vital disturbances and coenesthesias in depression. Disturbances of sleep, appetite, and digestion are most frequent. However, there may be many other vegetative symptoms in depression such as disordered salivation, transpiration and lacrimation, cardiac arrhythmias and dyspnea, loss of libido and various sexual dysfunctions, dys- or amen? orrhea, loss of or increase in body weight, decreased turgor of the skin, loss of hair, decrease in body temperature, nausea, vomiting, meteorism, dizziness, sweating, or sensations of coldness. Both vital disturbances, coenesthesias and vegetative symptoms, are typically coexistent with the well-known affective, behavioral, and cognitive symptoms of depression. With respect to the different settings of medical care, however, these psychological symptoms of depression may be masked by a dominant reporting of somatic symptoms. M. Bleuler addressed the point in his book *Depressions in Primary Care,* in 1943: *"It is a common and frequent observation that depressive patients with single somatic complaints come to the consulting room of the general practitioner, internal specialist, and even the surgeon, gynecologist, ophthalmologist, urologist and other medical specialists, and spontaneously, they only speak of somatic phenomena while concealing their state of depressive mood. They report palpitations, tightness of the chest, loss of appetite, obstipation, pollakiuria, amenorrhea and many others. Only when one looks at their psychic state does one discover that they report numerous hypochondriac ideas also in other areas, that in addition they produce depressive ideas of impoverishment and sin, that beyond that their whole stream of thoughts is inhibited, that the depression manifests itself not only in the somatic complaints reported, but in various other bodily expressions."^[@ref5]^* In spite of this long-standing psychopathological view on the somatic foundation of depressive mood, at least in moderate and severe clinical states, it is bewildering that the official psychiatric classification systems of the *Diagnostic and Statistical Manual of Mental Disorders,* 4th edition *(DSM-IV)* and the *ICD-10* *Classification of Mental and Behavioral Disorders. Clinical Descriptions and Diagnostic guidelines (ICD-10)* only marginally appreciate somatic symptoms as diagnostic criteria for depressive disorders while focussing on the psychological symptoms of affect and cognition. So, *DSM-IV* lists only three criteria of somatic symptoms for major depressive disorder: sleep disturbance, appetite disturbance, and fatigue or loss of energy. And correspondingly, in *ICD-10,* disturbances of sleep and appetite, loss of libido, and amenorrhea are the only somatic symptoms considered to be of diagnostic significance for major depression. Beyond this short list of predominantly vegetative symptoms, no painful physical symptoms are mentioned in either the *DSM-IV* or *ICD-10.* There seems to be a major shift In diagnostic practice, however; the second version of the *Diagnostic and Statistical Manual of Mental Disorders,* 4th edition, Text Revision *(DSM-IV TR)* now Includes new criteria referring to "excessive worry over physical health and complaints of pain (eg, headaches or joint, abdominal, or other pains)."^[@ref6]^ This supplement of diagnostic criteria Is Indicative of an againIncreasing awareness of the importance of somatic symptoms in depression. What is meant by "somatic" in somatic symptoms of depression? ============================================================= In the literature there are many terms used to describe somatic symptoms in depression: somatic, somatlzed, physical, bodily, somatoform, painful, psychosomatic, vegetative, medically unexplained, masked, etc.^[@ref7]^ These diverse terms refer to different theoretical or diagnostic concepts. For states of depressive mood the neutral term "somatic" is preferred, comprising various bodily sensations that a depressed individual perceives as unpleasant or worrisome. These dysesthesias are very often localized In certain body parts or organs, or may affect the whole body In Its vital condition, as In the case of fatigue or loss of energy. Several basic physical dysfunctions, such as those of sleep, appetite, or digestion, are also to be included in the term "somatic." In addition, It may be clinically relevant to differentiate between painful and nonpalnful somatic symptoms of depression. From a diagnostic perspective one has to keep in mind that somatic symptoms play a significant role both in primary psychiatric disorders, first and foremost depressive and anxiety disorders, and in somatoform disorders. And In differential diagnosis, somatic symptoms must be considered as possibly even Indicative of underlying somatic diseases. A diagnostic challenge may be seen In the well-known fact that depressive, anxiety, somatoform disorders, and medical conditions are frequently coexistent, or Interact In the Individual patient.^[@ref8]-[@ref10]^ Regarding the assessment of somatic symptoms, Kroenke correctly points out that diagnosis very often is more approximative than precise. Presented somatic symptoms may be either clearly attributed to a distinct medical disorder or be placed into one of the following heuristic categories: somatoform disorder, another primary psychiatric disorder (often depression and/or anxiety), functional somatic syndrome (eg, irritable bowel syndrome, fibromyalgia, chronic fatigue syndrome), "symptom-only" diagnosis (eg, low back pain, idiopathic dizziness) or only partially explained by a defined medical disorder (eg, many states of chronic pain).^[@ref11]^ Epidemiological studies may provide an illuminating survey of the prevalence of somatic symptoms in depressive disorders, especially those encountered in primary care, and the prognostic value of somatic symptoms regarding their development in the further course of illness. Somatic symptoms of depressive disorders in inpatient care and primary care =========================================================================== In a clinical study, Hamilton reported that somatic symptoms prevailed in a great majority of depressed patients.^[@ref12]^ Somatic symptoms, particularly somatic anxiety and fatigue, were documented in up to 80% of a sample of 260 women and 239 men suffering from major depression. These somatic symptoms very frequently had an underlying psychopathologically relevant hypochondriasis, both in women and men. This study confirmed earlier studies showing that depressive disorders with predominantly somatic presentation were likely to be the most common form of depression, both in inpatient and outpatient care.^[@ref13],[@ref14]^ Hagnell and Rorsman stressed the Indicative significance of somatic symptoms in depressed primary care patients regarding their risk of suicide.^[@ref15]^ Epidemiological studies designed to establish prevalence figures for depressive disorders In primary care during recent years have uniformly demonstrated that depressive disorders are highly prevalent at this level of medical care.^[@ref16]-[@ref19]^ For the great majority of depressed patients seeking professional help in the official health care system, general practitioners and internists are the decisive interface for diagnosis and treatment of depression.^[@ref20]^ Primary-care patients with depression very often present with somatic complaints. This seems to be more the rule than the exception worldwide.^[@ref21],[@ref22]^ Two of the three most common symptoms reported during a current depressive episode were somatic (tlred/no energy/listless: 73%, broken sleep/decreased sleep: 63%) as shown by the European Study Society study (DEPRES II).^[@ref23]^ This study, however, also underlined that 65% of the depressed primary care patients suffered from a concomitant medical condition pointing to some likely difficulties In differential diagnosis. The multlcenter International study (n =1146) conducted by the World Health Organization (WHO) confirmed that two thirds of the patients presented their depressive mood with somatic symptoms exclusively, and more than half complained of multiple medically unexplained somatic symptoms.^[@ref24]^ In another primary care study, Kirmayer et al arrived at a similar finding of patients presenting their depressive or anxiety disorders exclusively with somatic symptoms in an overwhelming majority (73%). The identified somatic symptoms were the main reason for the initial visit to the primary care physician.^[@ref25]^ In a US study in 573 patients with the diagnosis of major depression, two thirds (69%) complained of general aches and pains, hinting at a close relationship between pain symptoms and depression.^[@ref26]^ The diagnostic situation In primary care frequently manifests Itself, however, as somewhat more complicated. Many patients present only with a single or a few somatic symptoms which remain medically unexplained and do not fulfill the affective and cognitive criteria for a discrete depressive or anxiety disorder at the end of the clinical interview. Single somatic symptoms are the primary reason for more than 50% of patients visiting a general practitioner or an outpatient clinic. In some 20% to 25%, these somatic symptoms are recurrent or chronic. Somatic symptoms that remain unexplained after a careful medical assessment generally bear a high risk for psychiatric morbidity, regardless of the type of symptoms.^[@ref27]-[@ref29]^ Up to two thirds of these patients develop a depressive disorder in the medium term, and between 40% to 50% fulfill the criteria for an anxiety disorder.^[@ref30]-[@ref33]^ In a cross-sectional study in 1042 primary care patients, Gerber et al investigated the differential relationship between specific somatic complaints and underlying depressive symptoms. Some somatic symptoms showed a high positive predictive value (PPV) for depression: Sleep disturbances (PPV: 61%), fatigue (PPV: 60%), three or more complaints (PPV: 56%), nonspecific musculoskeletal complaints (PPV: 43%), back pain (PPV: 39%), amplified complaints (PPV: 39%), vaguely stated complaints (PPV: 37 %).^[@ref34]^ Some somatic symptoms are typically covarlant In the patients\' complaints without having received the nosological status of a discrete medical condition. These clusters of symptoms are instead considered as functional somatic syndromes and termed according to the diagnostic standards of the various medical disciplines, eg, fibromyalgia, chronic fatigue syndrome, and irritable bowel syndrome, etc. For some authors in psychiatry these functional somatic syndromes represent typical variants of somatoform disorders. There is still a controversial dispute in the medical literature, however, as to whether to assemble all these functional somatic syndromes within one general category of somatization,^[@ref35],[@ref36]^ or to split them up into separate clinical entities.^[@ref37]^ From an empirical standpoint, it is remarkable that among these syndromes there is a significant overlap on the level of symptoms and a strong association with depressive and anxiety disorders.^[@ref38]-[@ref41]^ A close relationship between states of depressive mood and symptoms of pain, especially of chronic pain, has been impressively established in many empirical studies.^[@ref26],[@ref42]-[@ref44]^ Depression and painful symptoms commonly occur together. As both conditions are highly prevalent in the general population, their frequent co-occurrence might be due to mere statistical coincidence.^[@ref45],[@ref46]^ From an empirical standpoint, however, the prevalence figures of coexistence are far beyond statistical expectation. In a meta-analytical survey, Bair et al demonstrated that around two thirds of all depressed patients treated in primary, secondary, and tertiary centers, both in outpatient and inpatient settings, report distressing painful somatic symptoms.^[@ref26]^ Conversely, the prevalence rate of major depression in patients with various pain syndromes is about 50%. There seem to be higher rates in clinical states characterized by multiple diffuse pain symptoms than by more defined types of pain. The risk of major depression is considered to be dependent on the severity, frequency, persistence, and number of pain symptoms.^[@ref47],[@ref48]^ From the perspective of primary care an epidemiological study assessing the predictive power of chronic pain for depressive morbidity showed that the prevalence rate of at least one chronic painful physical condition (CPPC) in the general population was 17.1%. At least one depressive symptom was present in 16.5% of subjects; 27.6% of these subjects had at least one CPPC. Major depression was diagnosed in 4% of subjects, and 43.4% of these subjects had at least one CPPC, which was 4 times more often than in subjects without depressive disorder.^[@ref49]^ This significant Interrelationship of CPPC and depression confirmed the earlier clinical advice of Katon, suggesting that if all patients with painful physical conditions were systematically assessed regarding a possible underlying depression, some 60% of all states of depression could be detected in primary care.^[@ref50]^ Generally, one has to keep in mind that, both from a cross-sectional and a longitudinal perspective, there is a relevant overlap of depressive, anxiety, and somatoform disorders, especially chronic painful physical conditions, among primary care patients presenting with medically unexplained symptoms.^[@ref51]-[@ref58]^ It is an important clinical finding that, with an increasing number of medically unexplained symptoms, the risk of an underlying depressive disorder increases in an impressive dose-response relationship. In a study which included 1000 adults and another study comprising 500 patients with a chief complaint of somatic symptoms, the presence of any somatic symptom increased the likelihood of a mood or anxiety disorder by two- or threefold. Only 2% of patients with no or only one somatic symptom had a mood disorder, but 60% of those patients presented nine or more somatic symptoms.^[@ref31],[@ref59]^ Patients with multiple medically unexplained somatic symptoms also show a greater amount of associated other psychiatric comorbidity.^[@ref60],[@ref61]^ Somatic symptoms in depression and rates of diagnostic recognition within primary care ====================================================================================== The typical form of presenting a depression In primary care Is via somatization. This form of somatic presentation, however, is considered to be one of the main reasons for low rates of recognition of depression In this sector of the medical care system.^[@ref20],[@ref62]^ It must be acknowledged that the alarmingly low figures of diagnosed and consecutively treated depressive disorders in only 25% to 33% of affected patients found in epidemiological studies during the early 1990s have increased up to some 60%. ^[@ref17],[@ref19]^ From a perspective of primary care, general practitioners are consulted by two groups of depressed patients who may pose a diagnostic challenge. Patients suffering from a medical condition have a frequent depressive comorbidity^[@ref23],[@ref63]^ These associated depressions often remain undetected, as the diagnostic focus of the primary care physicians is led by a dominant model of somatic disease.^[@ref64]^ Indeed, certain somatic symptoms such as sleep disturbances, diffuse bodily pains and aches, fatigue, changes of appetite, etc, may characterize both the pathophysiological process of a discrete medical condition and a depressive disorder as well. The differential diagnosis may be difficult. The role and significance of somatic symptoms for the diagnosis of depression in medically ill patients have been a controversial issue in the scientific literature. Meanwhile, a clinically reasonable consensus has been arrived at that the *DSM-IV* criteria for major depression do not require significant modification for patients with medical comorbidities.^[@ref65]-[@ref67]^ Somatic symptoms can positively contribute to a diagnosis if they are assessed in line with typical concomitant affective, behavioral, and cognitive symptoms of depression.^[@ref9]^ For a primary care physician It Is Important to know that at least 20% to 30% of patients with chronic medical conditions suffer from a coexisting depression.^[@ref68]^ It must be assumed that, even In those patients being diagnosed with an acute somatic disease for the first time, depression coexists In a significant percentage.^[@ref69]^ All In all, patients with medical conditions are to be considered as a risk group for nonrecognitlon of concomitant depression.^[@ref70]^ This especially applies to elderly medically ill patients.^[@ref71]^ In the other major group of depressed primary care patients, the somatic symptoms complained of very often remain medically unexplained. If one focuses on the mode of presentation, about 50% of the patients report somatic symptoms exclusively, and a minor percentage of some 20% present their depressive disorder with prevailing psychological, ie, affective and cognitive symptoms.^[@ref7],[@ref21],[@ref72],[@ref73]^ There is not, however, a categorical split between a somatic mode of presentation on the one hand and a psychological mode on the other. Rather, a broad spectrum of transition must be assumed, and the grading of somatization has an impact on the probability of recognition of an underlying depression.^[@ref25]^ As a rule, primary care physicians do not recognize a depression with an individual patient better when he or she is complaining of many actual medically unexplained somatic symptoms (here they rather prefer a diagnostic standpoint of wait and see), but when the patient returns again and again to consult because of these symptoms.^[@ref74]^ In addition, the extent of hypochondriacal worries and health anxieties facilitate, a correct diagnosis of depression.^[@ref75],[@ref76]^ Patients with somatic complaints that are not explained medically in an adequate way, however, do not represent a uniform group regarding diagnostic categorization. Besides depressive disorders, which in primary care manifest themselves according to the traditional concept of an endogenous type only in minority but instead show many atypical features,^[@ref77]-[@ref79]^ one must consider various anxiety and somatoform disorders in differential diagnosis.^[@ref60],[@ref61],[@ref80]-[@ref82]^ Again as a rule, there exists an Impressive overlap on the level of symptoms among all these diagnostic categories.^[@ref10]^ Aspects facilitating somatic symptoms in depression =================================================== Many factors may contribute to the form and extent to which a depression is presented in somatic symptoms. Female gender has been confirmed to be closely associated with somatization in many studies covering differential aspects on various theoretical levels.^[@ref83]^ In a gender differential analysis, Sllversteln draws some Interesting conclusions from the epidemiological data of the National Comorblty Survey.^[@ref84],[@ref85]^ By dividing respondents Into those who met overall criteria for major depression and exhibited fatigue, appetite, and sleep disturbances ("somatic depression") and those who met overall criteria without these somatic symptoms ("pure depression") she demonstrated gender differences only for "somatic depression" but not for "pure depression." The higher prevalence of "somatic depression" In females was strongly associated with a high frequency of anxiety disorders. Interestingly, this type of "somatic depression" among female patients already had Its onset during early adolescent years with predominantly bodily pains and aches. Wenzel et al attributed the higher prevalence of "somatic depression" in women largely to changes in appetite.^[@ref86]^ Gender differences can also be found in primary care. Women consistently reported most typical somatic symptoms at least 50% more often than men. Although mental disorders, above all depressive and anxiety disorders, were found to be correlated with this mode of somatic presentation, there was also an independent female gender effect on somatic symptom reporting.^[@ref87]^ In a later study Jackson et al found that among primary care patients with somatic symptoms, on the whole, women were younger, more likely to report stress, endorsed more "other, currently bothersome" symptoms, were more likely to have a mental disorder, and were less likely to be satisfied with the care.^[@ref88]^ A greater susceptibility of women, both to psychosocial stress and somatic illness stress, was held responsible for this higher prevalence of depressive and anxiety disorders in female patients.^[@ref89]^ A greater vulnerability to depressive and anxiety disorders on the one hand, and a strong neurobiological association to defined functional somatic syndromes (eg, fibromyalgia, irritable bowel syndrome, chronic fatigue syndrome) on the other may further increase the extent of this gender difference.^[@ref40],[@ref90]^ The disposition both to somatization and to depressive and anxiety disorder may be intermingled in various ways. Thus, a depressive mood may trigger the immediate illness behavior to enter the medical care system and to report somatized problems caused otherwise.^[@ref91]^ The very high frequency of somatic anxiety symptoms in patients with major depression may be interpreted by the idea that anxiety appears to be a major source of bodily distress and consecutive hypochondriasis, thus fostering somatization behavior.^[@ref12]^ Indeed, specific effects of depression, panic, and somatic symptoms on illness behavior must be considered.^[@ref92]^ Various causal illness interpretations, a tendency to amplify somatic distress, and difficulties In Identifying and communicating emotional distress, all have an impact on the form and extent of a somatic mode of presentation.^[@ref93]-[@ref95]^ Again, regarding the course of Illness, depressive and anxiety disorders following somatoform disorders may significantly contribute to the chronlflcatlon and complication of the latter.^[@ref39],[@ref96]^ From a perspective of etiologically relevant risk factors It Is a well-established epidemiological finding that the extent and severity of early adverse events, especially manifold traumatic experiences, are tightly connected with the mental and somatic state of adults. This general disposition may be detected In a series of psychiatric disorders, as In conversion and somatization syndromes,^[@ref97]-[@ref103]^ several chronic pain conditions,^[@ref104]-[@ref106]^ hypochondriacal attitudes,^[@ref107]^ factitious disorders,^[@ref98]^ and depressive, anxiety, and substance disorders.^[@ref108]-[@ref110]^ One can draw a basic conclusion from many epldemiologlcally designed longitudinal studies that the more a person has been exposed to severe and early trauma, the higher the risk will be that she/he will suffering from recurrent or chronic depression with pronounced suicidality, multiple medically unexplained somatic symptoms, especially chronic physical pain conditions with an onset already during adolescence or young adulthood, the more her/his psychic and somatic state as a whole will be negatively affected, and the more she/he will demonstrate abnormal illness behavior.^[@ref61],[@ref111]^ Culture and society are other factors that may have an important impact on the way a depressive mood is presented in a predominantly somatic way.^[@ref25]^ Interestingly, the comprehensive international WHO study on depression in primary care, conducted in 12 countries on different continents, was not able to identify clear cultural influences on the somatic mode of presenting a depression. A somatic presentation was much more common at centers where patients lacked an ongoing relationship with a primary care physician than at centers where most patients had a personal physician. This variable had a robustly differentiating effect beyond the various cultural settings.^[@ref24]^ Besides gender, culture, and type of patient-physician relationship, there may be many other factors influencing a more somatic mode of presentation, such as different ages in life cycle, association with medical conditions, earning a lower income, and imprisonment.^[@ref7],[@ref112]^ Burden of somatic symptoms in depression ======================================== Most patients who are psychopharmacologically treated for depression fail to reach full remission.^[@ref113]-[@ref114]^ A majority of patients may respond to antidepressants (by definition a reduction of symptoms by some 50% or more), but still suffer from residual symptoms. These residual symptoms are often somatic in nature. Symptoms of somatic anxiety and various painful conditions seem be especially common in states of incomplete remission.^[@ref115]^ Residual symptoms which are not treated must effectively be considered as a negative risk factor with respect to earlier relapse, and a more severe and chronic future course of illness.^[@ref116]-[@ref119]^ The clinical significance of somatic symptoms in depression may best be illustrated with the relationship between depression and painful physical conditions. In general, the worse the painful somatic symptoms, the more severe and the longer a depressive episode persists. In their general population-based study, Ohayon and Schatzberg found that depressed patients with chronic pain symptoms reported a longer duration of depressive mood (19.0 months) than those without chronic pain (13.3 months). In addition, a chronic physical pain condition in persons with at least one key symptom of depression was associated with an elevated rate of suicidal thoughts.^[@ref49]^ Fishbain considered chronic pain as a major suicide risk factor in depression.^[@ref120]^ Von Korff and Simon demonstrated a significant correlation between the intensity of pain symptoms and a worse outcome of depressive disorders. This worse outcome included more pain-related functional impairments, a worse state of general health, higher rates of unemployment, use of more opiates, more frequent polypharmacy, and more intensive utilization of medical services due to pain complaints. ^[@ref121]^ Although both painful and nonpainful somatic symptoms improve with antidepressant treatment, It Is the Intensity and extent of pain symptoms at baseline that significantly contribute to a less favorable response to medication, and to a longer duration of treatment necessary for a satisfying result, if at all.^[@ref122]-[@ref124]^ If one asssembles painful and nonpainful somatic symptoms of depression into a single dimension of somatization, It is this factor that must be correlated with an impressively increased overall use of health care services,^[@ref125]-[@ref127]^ to significant treatment nonadherence and a resulting higher risk of relapse and more chronic course of illness.^[@ref128]^ Again, a recurrent or chronic depression includes a higher risk of suicide^[@ref129]^ and an increased morbidity and mortality due to Illness-inherent factors or associated natural causes.^[@ref130]-[@ref132]^ All in all, it must be concluded that: when somatic symptoms, above all painful physical conditions, accompany the already debilitating psychiatric and behavioral symptoms of depression, the economic burden that ensues for patients and their employers increases considerably,^[@ref133]-[@ref134]^ the functional status may be hampered signifiacantly,^[@ref135]^ and the health-related quality of life is lowered dramatically^[@ref136]^ Neurobiological underpinnings of somatic symptoms in depression =============================================================== Various psychosocial and biological stressors may trigger a depression. Neurobiological processes underlying any depressive illness are manifold; this applies to the different somatic symptoms in particular. A strong heritable disposition, polygenetic in nature, seems to be established, but maladaptive neurobiological stress response systems already acquired by stressful and traumatic experiences during early development may play a major role in the pathophysiology of depression as well.^[@ref137]^ Dysfunctions in the serotonergic, noradrenergic, and dopaminergic neurotransmitter systems have been considered as relevant for quite a long time. Drawing from the neuroanatomical serotonergic tracts, starting in the midbrain raphe cell bodies and projecting to the frontal cortex, basal ganglia, limbic system, and hypothalamus on the one hand, of noradrenergic pathways originating in the locus ceruleus of the brain stem and projecting again to the same regions of the frontal cortex, limbic areas, and hypothalamus, but also uniquely to other parts of the frontal cortex and to the cerebellum on the other, Stahl stressed that deficiencies in the activity of specific pathways of serotonin and norepinephrine might account for the differential clinical phenomenology in depression. This seems to be true both for the typical psychological and somatic symptoms. Regarding somatic symptoms, especially vegetative symptoms such as changes in appetite or weight, lack of pleasure and sexual appetence, and sleep abnormalities, dysfunctional hypothalamic and sleep centers may be of paramount importance, all influenced by both serotonin and norepinephrine.^[@ref138]^ Fatigue, exhaustibility, or loss of energy, common distressing symptoms during a depressive episode, but also obstinate residual symptoms, may be mediated by different malfunctioning neuronal circuits that are regulated by multiple neurotransmitters.^[@ref139]^ Fatigue can be experienced as reduction in either mental or more physical vital feeling. Likely candidates for the neuronal structures that may mediate physical fatigue refer to brain areas regulating motor functions, such as striatum or cerebellum, but also to certain spinal pathways transferring sensory input from the body and thus modulating the perception of physical tiredness. In addition to serotonin and norepinephrine, dopamine may be involved in this process. Mental tiredness, on the other hand, may be mediated by diffuse cortical circuits and be influenced by cholinergic, histaminergic, noradrenergic, and dopaminergic neurotransmitters. The various painful somatic symptoms in depression may essentially be associated with serotonergic and noradrenergic pathways descending from brain stem centers to the spinal cord. An imbalance in these neurotransmitters, normally serving to inhibit the sensory input from the intestines, musculoskeletal system, and other body regions, may accentuate pain sensitivity.^[@ref26],[@ref140]^ As a matter of course, neither psychological nor somatic symptoms in depression can be explained by dysfunctional neurotransmitters exclusively. Many other neurobiological processes are involved in the pathophysiology of depression, such as an abnormal HPA axis with a disordered feedback mechanism of the corticotropin-releasing factor (CRF) -adrenocorticotropic hormone (ACTH) - Cortisol stress response, a reduced secretion of the neuropeptide hypocretin thus contributing to a desynchronization of the sleep-wake cycle, various abnormalities in the inflammatory system with an increased production of certain proinflammatory cytokines, a resulting depletion of the serotonin system, sickness behavior and depressive mood, reduced concentrations of various neurotrophlns such as brain-derived neurotropic factor (BDNF) causing Impaired neuroplastlcity, cell resistance, and neurogenesis.^[@ref137],[@ref141]-[@ref147]^ The intricate pathophysiological interplay of neuroendocrine stress response, inflammation, and neurotransmitter systems, both centrally and peripherally, may perhaps best be illustrated by the relationship between chronic pain conditions and depressive mood states (succinctly summarized in refs 148-150). In short, chronic stress evoked by chronic pain leads to a loss of negative glucocorticoid feedback in the (hypothalamic-pituitary-adrenocortical (HPA) axis and downregulation of the glucocorticoid receptors within the brain and the body periphery. Inflammation and nerve injury stimulate nociresponsive neurons within the dorsal horn of the spinal cord, and the relay of the nociceptive information ascends to the brain stem to be gated within the thalamus, prior to its cognitive appraisal within the somatosensory cortex. Monoamlnergic neurons In the brain stem normally descend to the spinal cord to act as a "brake" on nociceptive transmission. During chronic pain, loss of serotonergic and noradrenergic tone In response to glucocortlcold-lnduced monoamlnergic depletion may lead to descending Inhibitory Impulses to the spinal cord to effect an enhancement of pain sensation. Loss of glucocorticoid Inhibition of proinflammatory cytokines leads to proliferation of peripheral inflammatory events, contributing to pain sensitization. Although acute stress may be analgesic, implying an inhibitory circuitry between the limbic and somatosensory cortices, chronic stress evoked by chronic pain, leads to downregulation of glucocorticoid-mediated activity of this inhibitory connection, causing enhanced pain perception. Similarly, although acute pain may be mood-enhancing via both sympathetic and glucocorticoid routes (implying an excitatory reciprocal link between the somatosensory and limbic cortices), chronic pain-Induced downregulation of glucocorticoid modulation of this link may lead to depressed mood. Psychopharmacological implications for the treatment of somatic symptoms in depression ====================================================================================== Numerous trials with antidepressants have demonstrated that full remission of the psychological, and especially of the somatic, symptoms in depression can be achieved only by a minority group of depressed patients within a usual 6- to 8-week treatment period.^[@ref62],[@ref151],[@ref152]^ These sobering facts are reflected by a higher risk of relapse, a worse course of illness with many associated psychosocial disabilities, and a hampered health-related quality of life. Therefore, achieving a state of symptomatic remission must be a treatment goal of utmost clinical importance. Targeting both serotonin and norepinephrine in those neuronal circuits that mediate somatic symptoms is the most widely employed strategy to reduce painful and nonpainful somatic symptoms in depression.^[@ref90]^ In comparison with selective serotonin reuptake inhibitors, antidepressants with a dual action on both the serotonin and norepinephrine system were significantly superior in alleviating these somatic symptoms and achieving full symptomatic remission of depression. This may be a promising approach, even to treating chronic pain conditions, eg, fibromyalgia, without prevailing depressive symptoms.^[@ref153],[@ref154]^ This seems to have been well established In clinical trials with venlafaxlne,^[@ref155]-[@ref159]^ duloxetlne,^[@ref160]-[@ref163]^ mllnaclpran,^[@ref164]^ or mlrtazaplne.^[@ref165]^ In order to Improve distressing symptoms of fatigue, the use of psychostimulants, modafinil, bupropion, or selective norepinephrine reuptake inhibitors such as reboxetine or atomoxetine may be recommended.^[@ref166]^ As a rule, psychopharmacological efforts to treat severe states of depression or states of depression with prominent somatic symptoms effectively must be guided by a perspective of a longer duration than usual. Higher dosages of a selected antidepressant have to be used very often. Sometimes shifts within or between pharmacological classes of antidepressants or an augmentation with, eg, lithium or tri-iodthyronine, are necessary to arrive at the desired aim. From a pragmatic standpoint, clinically rational algorithms may favorably guide this endeavor.^[@ref167]^ Finally, it must be stressed that a reasonable combination of pharmacological and psychotherapeutic approaches can improve the treatment results in many depressed patients.^[@ref168],[@ref169]^
{ "pile_set_name": "PubMed Central" }
Q: Cell should contain example input value for user to see I want to create automated cells in Excel which will show the type of data to be entered in that cells. I want to create cells which will show "Enter Username here", " Enter DOB here" same as that which shows in fb and Gmail login page. I don't want to save any credentials. I had created multiple dropdown lists and people are not understanding that there is a dropdown until they click on that cell. So I want to create automated cells which will show the type of data to be entered into it. It should disappear when I click on that cell and should appear if I erase the contents from that cell which I anyone had entered. A: Look into the change selection event: Private Sub Worksheet_SelectionChange(ByVal Target As Range) if target.address = "$A$1" then target.value = "" else Dim value as string value = range("$A$1").value if value="" then 'Note: It'd be better to check here if the user input is correct! range("$A$1").value = "Enter DOB here" end if end if End Sub Edit to user's comments: Private Sub Worksheet_SelectionChange(ByVal Target As Range) if target.address = "$A$1" then if target.value = "Enter DOB here" target.value = "" end if else Dim value as string value = range("$A$1").value if value="" then 'Note: It'd be better to check here if the user input is correct! range("$A$1").value = "Enter DOB here" end if end if End Sub
{ "pile_set_name": "StackExchange" }
#if !defined(BOOST_PP_IS_ITERATING) ///// header body #ifndef BOOST_MPL_AUX778076_ADVANCE_BACKWARD_HPP_INCLUDED #define BOOST_MPL_AUX778076_ADVANCE_BACKWARD_HPP_INCLUDED // Copyright Aleksey Gurtovoy 2000-2004 // // Distributed under the Boost Software License, Version 1.0. // (See accompanying file LICENSE_1_0.txt or copy at // http://www.boost.org/LICENSE_1_0.txt) // // See http://www.boost.org/libs/mpl for documentation. // $Id$ // $Date$ // $Revision$ #if !defined(BOOST_MPL_PREPROCESSING_MODE) # include <boost/mpl/prior.hpp> # include <boost/mpl/apply_wrap.hpp> #endif #include <boost/mpl/aux_/config/use_preprocessed.hpp> #if !defined(BOOST_MPL_CFG_NO_PREPROCESSED_HEADERS) \ && !defined(BOOST_MPL_PREPROCESSING_MODE) # define BOOST_MPL_PREPROCESSED_HEADER advance_backward.hpp # include <boost/mpl/aux_/include_preprocessed.hpp> #else # include <boost/mpl/limits/unrolling.hpp> # include <boost/mpl/aux_/nttp_decl.hpp> # include <boost/mpl/aux_/config/eti.hpp> # include <boost/preprocessor/iterate.hpp> # include <boost/preprocessor/cat.hpp> # include <boost/preprocessor/inc.hpp> namespace boost { namespace mpl { namespace aux { // forward declaration template< BOOST_MPL_AUX_NTTP_DECL(long, N) > struct advance_backward; # define BOOST_PP_ITERATION_PARAMS_1 \ (3,(0, BOOST_MPL_LIMIT_UNROLLING, <boost/mpl/aux_/advance_backward.hpp>)) # include BOOST_PP_ITERATE() // implementation for N that exceeds BOOST_MPL_LIMIT_UNROLLING template< BOOST_MPL_AUX_NTTP_DECL(long, N) > struct advance_backward { template< typename Iterator > struct apply { typedef typename apply_wrap1< advance_backward<BOOST_MPL_LIMIT_UNROLLING> , Iterator >::type chunk_result_; typedef typename apply_wrap1< advance_backward<( (N - BOOST_MPL_LIMIT_UNROLLING) < 0 ? 0 : N - BOOST_MPL_LIMIT_UNROLLING )> , chunk_result_ >::type type; }; }; }}} #endif // BOOST_MPL_CFG_NO_PREPROCESSED_HEADERS #endif // BOOST_MPL_AUX778076_ADVANCE_BACKWARD_HPP_INCLUDED ///// iteration, depth == 1 // For gcc 4.4 compatability, we must include the // BOOST_PP_ITERATION_DEPTH test inside an #else clause. #else // BOOST_PP_IS_ITERATING #if BOOST_PP_ITERATION_DEPTH() == 1 #define i_ BOOST_PP_FRAME_ITERATION(1) template<> struct advance_backward< BOOST_PP_FRAME_ITERATION(1) > { template< typename Iterator > struct apply { typedef Iterator iter0; #if i_ > 0 # define BOOST_PP_ITERATION_PARAMS_2 \ (3,(1, BOOST_PP_FRAME_ITERATION(1), <boost/mpl/aux_/advance_backward.hpp>)) # include BOOST_PP_ITERATE() #endif typedef BOOST_PP_CAT(iter,BOOST_PP_FRAME_ITERATION(1)) type; }; #if defined(BOOST_MPL_CFG_MSVC_60_ETI_BUG) /// ETI workaround template<> struct apply<int> { typedef int type; }; #endif }; #undef i_ ///// iteration, depth == 2 #elif BOOST_PP_ITERATION_DEPTH() == 2 # define AUX778076_ITER_0 BOOST_PP_CAT(iter,BOOST_PP_DEC(BOOST_PP_FRAME_ITERATION(2))) # define AUX778076_ITER_1 BOOST_PP_CAT(iter,BOOST_PP_FRAME_ITERATION(2)) typedef typename prior<AUX778076_ITER_0>::type AUX778076_ITER_1; # undef AUX778076_ITER_1 # undef AUX778076_ITER_0 #endif // BOOST_PP_ITERATION_DEPTH() #endif // BOOST_PP_IS_ITERATING
{ "pile_set_name": "Github" }
Purchase either a combined Buildings & Contents Home Insurance policy, or separate Buildings or Contents Home Insurance Policy online at Littlewoods.com between 1st and 31st August 2017 to qualify for a free Amazon Echo Dot. New Littlewoods Home Insurance customers only. Provided your policy is still active and your premiums are up to date, we'll email you 4 weeks post-purchase to explain how you claim your free Amazon Echo Dot. If you return your item due to a fault, where possible, a replacement item will be provided. Own it! this summerwith £20 back! 1 - Spend £50 or more in one order before 30.06.172 - Enter code LAMJA at checkout3 - £20 will be credited to your original method of payment - simple! Offer excludes sale items, Apple products, Financial Services products and delivery/installation charges. Valid for one use only, this code cannot be used in conjunction with any other offer code.If you return items from your order, the credit will be reversed if the order value falls below the minimum required. Sat Navs at Littlewoods Make finding your way around easy with a sat nav from our fab range at Littlewoods. We’ve got a great selection of top brands like Garmin, TomTom and Kenwood, so there’ll be no chance of getting lost. Take a look at essential features to make journeys that little bit easier, like local area guides highlighting points of interest and useful info like the nearest petrol station or hotel. Choose from state-of-the-art designs with 3D map formats, or pick a bird’s-eye view. And we have accessories too, including travel cases for safe and stylish storage. In-car Entertainment Range If you like listening to music while you’re driving, have a look at our in-car entertainment range. Choose from a wide selection of multi-functional products with high-quality sound and easy-to-use controls. We've got state-of-the-art touch screen options with high-res graphics, and you can stream music with AppRadio Mode, CarPlay or via Bluetooth technology. If you prefer to play songs from your phone, opt for a USB connection, and sing along to those classic road-trip tunes. And if you’re all about that bass then check out our subwoofers for an immersive experience. Picking the Right Sat Nav If international travel is on your agenda, pick one of our sat navs with road maps for up to 152 different countries and get ready to explore. Keep up to date on recent road changes with a sat nav that comes with a lifetime supply of maps, meaning you'll always have access to the quickest routes available. For all the latest info and live traffic updates, choose a model with a data plan and SIM – they're particularly useful if you take a busy commuter route. We’ve got styles with handy reverse cameras too, for those who want a little extra help parking. Buy Now Pay Later (BNPL) allows you to delay payment for 12 months. The payment free period starts when you place your order (including items which are purchased on pre-order and/or are not ready for immediate dispatch). Select BNPL at checkout and the repayment period of either 104 or 156 weeks. This is the repayment period you will pay over, once the payment free period (12 months) has ended. The interest rate typically used to calculate BNPL interest is 44.9% per annum. Your interest rate will be detailed in checkout. The interest is calculated on the payment free period and the repayment period. You can avoid interest by paying the cash price in full within the payment free period. Delivery charges and other Financial Services products are not available on Buy Now Pay Later and will appear on your next statement. Please note, if you have non BNPL purchases on your account you will still need to make at least your minimum payment as detailed on your statement. Buy Now Pay Later (BNPL) allows you to delay payment for 12 months. The payment free period starts when you place your order (including items which are purchased on pre-order and/or are not ready for immediate dispatch). Select BNPL at checkout and the repayment period of either 104 or 156 weeks. This is the repayment period you will pay over, once the payment free period (12 months) has ended. The interest rate typically used to calculate BNPL interest is 44.9% per annum. Your interest rate will be detailed in checkout. The interest is calculated on the payment free period and the repayment period. You can avoid interest by paying the cash price in full within the payment free period. Delivery charges and other Financial Services products are not available on Buy Now Pay Later and will appear on your next statement. Please note, if you have non BNPL purchases on your account you will still need to make at least your minimum payment as detailed on your statement. Buy Now Pay Later (BNPL) allows you to delay payment for 12 months. The payment free period starts when you place your order (including items which are purchased on pre-order and/or are not ready for immediate dispatch). Select BNPL at checkout and the repayment period of either 104 or 156 weeks. This is the repayment period you will pay over, once the payment free period (12 months) has ended. Your interest rate will be detailed in checkout. The interest is calculated on the payment free period and the repayment period. You can avoid interest by paying the cash price in full within the payment free period. Delivery charges and other Financial Services products are not available on Buy Now Pay Later and will appear on your next statement. Please note, if you have non BNPL purchases on your account you will still need to make at least your minimum payment as detailed on your statement.
{ "pile_set_name": "Pile-CC" }
Julia Kogan Julia Kogan is an American-French operatic coloratura soprano, writer, and presenter of Ukrainian ancestry. Biography Kogan's opera roles have included Queen of the Night in Die Zauberflöte, Zerbinetta in Ariadne auf Naxos, Blonde in Die Entführung, Madame Herz in Der Schauspieldirektor, Greta Fiorentino in Street Scene, and Fiordiligi Cosi fan tutte at the opera houses of Avignon, Indianapolis, Limoges, Manitoba, Toulon, Toulouse and in Oxford. She has been described as "a lively actress" with "a warm voice, round, elegant and expressive phrasing, and a remarkable knack for coloratura passages", "up to the challenge of a stratospheric soprano line". Kogan has concertized with repertoire ranging from Baroque to contemporary in Europe, North and South America, and Africa, including such venues as Carnegie Hall, Alice Tully Hall at the Lincoln Center, St. Petersburg's Glinka Hall, the Hôtel de Ville in Paris, the Alcazar Palace in Seville, the Library of Congress in Washington D.C., and collaborated with Chamber Orchestra Kremlin, Ensemble Calliopée, Figueiredo Consort, Junge Philharmonie Wien, Les Passions, The Little Orchestra Society, the Oxford Philharmonic, the Newcastle Baroque Orchestra, Saint Petersburg Chamber Philharmonic, Toulon Opera Orchestra, and Ukrainian National Symphony, among others. Julia Kogan wrote and presented the BBC Radio 4 documentary "The Lost Songs of Hollywood", which aired on 12 November 2015. It was chosen "Pick of the Week" on BBC radio. Releases Kogan's first solo album, "Vivaldi Fioritura" (2010), was recorded with Chamber Orchestra Kremlin under Misha Rachlevsky. Her second solo album, Troika (2011), was recorded with the St. Petersburg Chamber Philharmonic under Jeffery Meyer. Both albums were released on Rideau Rouge Records with distribution by Harmonia Mundi. References External links Official website http://www.bbc.co.uk/programmes/b06nrqvk Category:American operatic sopranos Category:Living people Category:Ukrainian emigrants to the United States Category:Year of birth missing (living people)
{ "pile_set_name": "Wikipedia (en)" }
Perirhinal and hippocampal contributions to visual recognition memory can be distinguished from those of occipito-temporal structures based on conscious awareness of prior occurrence. The ability of humans to distinguish consciously between new and previously encountered objects can be probed with visual recognition memory tasks that require explicit old-new discriminations. Medial temporal-lobe (MTL) lesions impair performance on such tasks. Within the MTL, both perirhinal cortex and the hippocampus have been implicated. Cognitive processes can also be affected by past object encounters in the absence of conscious recognition, as in repetition priming tasks. Past functional neuroimaging findings in healthy individuals suggest that even in tasks that require conscious recognition decisions for visual stimuli, posterior cortical structures in the ventral visual pathway distinguish between old and new objects at a nonconscious level. Conclusive evidence that differentiates the neural underpinnings of conscious from nonconscious processes in recognition memory, however, is still missing. In particular, functional magnetic resonance imaging (fMRI) findings for the MTL have been inconsistent towards this end. In the present fMRI study, we tested whether perirhinal and hippocampal contributions to recognition memory can be distinguished from those of occipito-temporal structures in the ventral visual pathway based on the participants' reported conscious awareness of prior occurrence. Images of objects with a large degree of feature overlap served as stimuli; they were selected to ensure an involvement of perirhinal cortex in the present recognition task, based on evidence from past lesion-based research. We found that both perirhinal cortex and occipito-temporal cortex showed a differential old-new response that reflected a repetition-related decrease in activity (i.e., new > old). Whereas in perirhinal cortex this decrease was observed with respect to whether subjects reported objects to be old or new, irrespective of the true item status, in occipito-temporal cortex it occurred in relation to whether objects were truly old or new, irrespective of the participants' conscious reports. Hippocampal responses differed in their exact pattern from those of perirhinal cortex, but were also related to the conscious recognition reports. These results indicate that both perirhinal and hippocampal contributions can be distinguished from those of occipito-temporal structures in the ventral visual pathway based on the participants' reported conscious awareness of prior occurrence.
{ "pile_set_name": "PubMed Abstracts" }
Hey Everyone, This is my first post on the board, and I'm glad to see there is a section specifically on Spanish wines as they've always been a favorite of mine! I recently drank the wine mentioned in the tile and absoultely loved it. The only problem is that I bought it in Sevilla, and haven't been able to find the exact wine at the local wine superstores. Any advice on how to find if this wine is imported and how to get it. Welcome to the board, MrB. A Website we commonly use when looking for an elusive bottle is wine-searcher.com, but unfortunately it turned up a no-find. Also checked my regional benchmark, Spec's in Houston, with the same result. You may need to settle for a reasonable sub. Despite all you see in the stores, both Spain and Italy (the largest wine producers in the world) only export a relatively small number of wines to the U.S. or anyone else. Find something you like in Chi-town and enjoy.
{ "pile_set_name": "Pile-CC" }
Breech position, delivery route and congenital hip dislocation. The purpose of this study was to investigate whether the mode of delivery for fetuses in breech presentation in any way influenced the frequency of congenital hip dislocation. In 13,559 singleton births 583 fetuses were in breech position, and the cesarean section rate was 39.1%. Eighty-three infants were born with congenital hip dislocation, 11 of whom had been in breech position. Of these 11, cesarean section was required in 5 cases. There was no difference in frequency of congenital hip dislocation between fetuses in breech presentation delivered by cesarean section vs. by the vaginal route. The frequency of breech presentation in congenital hip dislocation was 13.3%. Including 7 external versions, the rate was 21.7%. Female to male ratio was 4:1. The frequency of congenital hip dislocations in infants born in vertex presentation was 5.5 per mille and for infants born in breech presentation it was 18.9 per mille.
{ "pile_set_name": "PubMed Abstracts" }
Q: Is a low number of members in a class considered a code smell? I am currently making a simple to-do list program using the MVC pattern, and thus have a model class for the Notebook. However, something feels "off" as it has a very low number of members. The Notebook is composed of categories, which are composed of To-do lists, which are composed of Items. What I cannot place is whether this is a case poor analysis (e.g. there are more members and responsibilities I am just missing them..) or perhaps a code smell that the class is not needed (in that case I'm not sure what to do as I could just have a list of categories in that controller, but then I don't have a notebook entity modelled which seems wrong as well). Below is the very simple class I have: class Notebook { private String title; private List<Category> categories; public Notebook(String title, List<Category> categories) { } public void setCategories(List<Category> categories) { } public List<Category> getCategories() { } } I often have this issue where it feels like I am making classes for the sake of it and they have a very number of members/responsibilities, so it would be nice to know whether I am stressing for no reason or not. A: Not necessarily, there is the concept in Domain Driven Design of what is called a "Standard Type". Which is really a basic primitive wrapped in an object class. The idea is that the primitive contains no information about what information it contains, it's just a string/int/whatever. So by having say an object that surrounds the primitive and ensures that it is always valid ensures that the object has a meaning far beyond just the primitive it contains e.g. a Name is not just a string, it's a Name. Here's an example taken from the comments of Velocity public class Velocity { private readonly decimal _velocityInKPH; public static Velocity VelocityFromMPH(decimal mph) { return new Velocity(toKph(mph)); } private Velocity(decimal kph) { this._velocityInKPH = kph; } public decimal Kph { get{ return this._velocityInKPH; } } public decimal Mph { get{ return toMph(this._velocityInKPH); } } // equals addition subtraction operators etc. private static decimal ToMph(decimal kph){ // conversion code } private static decimal ToKph(decimal mph){ // conversion code } }
{ "pile_set_name": "StackExchange" }
<UIView; frame = (0 0; 1112 834); autoresize = W+H; layer = <CALayer>> | <UILabel; frame = (528.333 20; 55.6667 20.3333); text = 'What's'; userInteractionEnabled = NO; layer = <_UILabelLayer>> | <UILabel; frame = (0 417; 25 20.3333); text = 'the'; userInteractionEnabled = NO; layer = <_UILabelLayer>> | <UILabel; frame = (1073 417; 39 20.3333); text = 'point'; userInteractionEnabled = NO; layer = <_UILabelLayer>> | <UILabel; frame = (552.333 816; 7.66667 18); text = '?'; userInteractionEnabled = NO; layer = <_UILabelLayer>>
{ "pile_set_name": "Github" }
Q: Is it focus or depth of field? I was trying to shoot a group of people standing clumped but at different distances, quite close to me, think disorganized portrait. I have a Nikon d750, and was not able to get everyone into focus. If I brought the people closer to me in focus, then the background were blurred and vice versa. I pushed the aperture all the way to f18 or so and it didn't bring the whole scene into focus. Was I shooting from too close .... Or this makes me wonder is this about AF-S vs AF-A instead of aperture and the camera choosing one point to focus upon instead of the area? How would you compose a group shot like this to all be in focus? Thanks! A: It sounds like depth of field. If (with an APS crop sensor, 30 mm lens, f/4), if you focus at say 6 feet you might have about 2 feet of DOF span, like from 5 feet to 7 feet (coarse approximations). If your subject is distributed at say 6 to 8 feet, this 5-7 DOF zone does not include the far ones. If you focus far, you miss the near ones. Which is your description. If you focus on the near ones, or on the far ones, you have wasted half of your DOF range in empty space where there is no one. There are DOF calculators which compute these numbers. Normal procedure would be to focus more near the middle depth of the group (or slightly in front of the middle), to put the zone more centered on your group. So yes, you do chose your point of focus too. And of course, stopping down the f/stop, like from f/4 to f/8 or f/11, could greatly increase the span of DOF, so that the zone size is double or more. DOF is rather vague, and is NOT a critically precise number. If the calculator say DOF is 5 to 7 feet, then 7.02 feet is no different than 6.98 feet, both are at the limit of acceptability. These 5 to 7 feet numbers are considered the extremes of acceptability, and the actual focused distance will of course always be the sharpest point.
{ "pile_set_name": "StackExchange" }
I admit I never thought I’d do any analytical work on Resident Evil 4. Don’t get me wrong; it’s one of my favorite games. Being extremely fun to play, and a having a wonderfully creepy aesthetic are just a few of the game’s strengths. But it’s a silly game in a lot of ways. There aren’t larger messages and meanings to glean from it. And at some moments, the game mechanics and the overall story don’t match up very well. I’d like to discuss one of those moments: Luis’s famous death in castle. I’ll use this example to discuss the elements of motivation and capacity in video games. You may recall from my previous article a discussion of a player’s motivation and capacity while playing a video game. Although I mentioned these terms, I never adequately defined them, so I’ll do so now. A player’s motivation is the reason he or she cares about playing the game and effecting some kind of difference in the world and story in which he or she is immersed. This element is present in other mediums—it’s the reason we continue to read/watch the story. A player’s capacity, unlike motivation, is intrinsically tied to game mechanics; it consists of the things that the player is able to do in the game world. The analogue of capacity in other media is simply the reader’s ability to continue to watch or read the story. There are further complexities in games, however, including that a player’s degree of capacity can effect his or her motivation, but that is a discussion for another time (probably focusing on Deus Ex). For now, recall my claim that in order for a game to be truly impactful, both of these elements must exist (or noticeably not exist, as I’ll discuss in my next article). Note also that the capacity element is harder and more important to make present, since it’s the element that video games have introduced to storytelling. So let’s see whether both motivation and capacity exist in the case of Luis’s death. For those who haven’t played the game, you can watch a video of the moment below. [youtube https://www.youtube.com/watch?v=NsfebZKsp94&w=420&h=315] I’ll summarize the scene: Luis was attempting to help you get a “sample” of great value from the game’s primary villain, Saddler. But Saddler kills Luis, taking back the sample (classic). As Luis lies dying before you, he gives you a temporary antidote to the parasite that you are infected with, and tells you to stop Saddler. When he finally passes away, Leon yells out him name in anguish. So this moment most certainly provides the player with motivation. And there are multiple reasons for this. In his final moments, Luis literally gives the player the primary plot incentive for the remainder of the game: stop Saddler and get the sample back. On top of that, finding out that Leon isn’t doomed to die at the hands of his parasite energies the player with a new sense of hope. But, most importantly, the player’s motivation is an extension of Leon’s grief. If the player empathizes with Leon (hopefully they do if they’ve gotten this far in the game), when Leon cries out in agony over the death of his friend, the player, too, is motivated seek justice for a lost friend. This is the opposite of Link’s silence that I discussed in my last article. Unlike Link, who leaves you to form your experience for yourself, Leon hands you his grief, and in this way motivates you to action. This is good storytelling. Clearly Resident Evil 4 has nailed the motivational aspect of making a powerful narrative in a game. But at this point there’s no particular reason story-wise to play the game instead of just watching it. So let’s think about capacity. Capacity is the additional element that makes a video game unique as opposed to movies or books. And the extent of what video games can do with capacity hasn’t been fully explored. So, even though it’s not necessary for a game to use dynamics of capacity in order to tell a good story, ignoring this element is missing an opportunity for better storytelling. Since capacity is unique to games, if there’s no interesting storytelling or fun mechanics, there’s no reason to play the game instead of just watch it. Now, in order to discuss capacity in the case of death, capacity takes on a slight nuance. When a character dies in a game, the key aspect of capacity is actually the change in capacity. It doesn’t matter so much what the capacity level is in general, it just matters if there is a difference before and after a character’s death. This provides meaning for the death within the structure of the game mechanics. For example, if a character dies in a game but is immediately replaced by an almost identical analogue, their death has little visceral impact for the player, who can’t feel the impact of the character’s death on the gameplay. This actually does happen: in Legend of The Dragoon, when one of your party members, Lavitz, dies, Albert, who literally takes on the stats of Lavitz, almost immediately replaces him. Even more notably, Cait Sith dies in Final Fantasy VII, but is quite literally replaced by an entirely identical avatar called “Cait Sith 2”. In these situations the player’s capacity has not changed, and thus the deaths have lost some of their potential narrative impact. That’s kind of what it feels like when Luis dies in Resident Evil 4. Although he helps you out as a non-player character (NPC) at various points in the game, it’s not as though he’s the only character who does this. And there’s nothing to distinguish him mechanics-wise from the other characters you meet and team up with. What’s more, you continue to have access to other NPCs you can get help from after he dies. So, in terms of how it feels to play the game, you don’t even notice he’s gone. As far as the player’s capacity to team up with others in order to stay alive, very little changes after Luis’s death. The player’s capacity thus changes very little when he dies, and though the player grieves with Leon, it’s difficult to feel a real sense of loss. To sum up, although the story of Luis’s death in Resident Evil is well told in terms of movies and books, the developers missed the opportunity to tell this story through the game mechanics in terms of a change in player capacity. Luis was not a unique character mechanically, and other characters that Leon meets effectively replace his avatar. The death is meaningful to watch, but far less meaningful to play. Nathan Randall - Video Game Analyst Nathan Randall is a Master’s candidate in game design at FIEA. He analyzes how gameplay mechanics and design impact the storytelling of video games. Learn more here. With a Terrible Fate is dedicated to developing the best video game analysis anywhere, without any ads or sponsored content. If you liked what you just read, please consider supporting us by leaving a one-time tip or becoming a contributor on Patreon.
{ "pile_set_name": "Pile-CC" }
Confederación Revolucionaria de Obreros y Campesinos The Confederación Revolucionaria de Obreros y Campesinos (CROC) is a Mexican trade union confederation. It is one of the most important and influential trade unions in the History of Mexico. It was founded in April 1952. during a congress made by four workers centrals. Until 1980 the CROC had 750 000 workers inside the union, in only 17 of the 31 states and the Federal District (Mexico City); in this year the statements change in order to change the organization of the union by changing the presidency of the union, that was rotative and with only one year of duration to a presidency headed by a National Secretary General (Secretario General del Comité Ejecutivo Nacional). It currently has 4.5 million worker members throughout the 32 states in the country having also 17 National Industrial Confederacies; also 3.600 unions with 15 000 collective contracts. External links History of the Confederación Revolucionaria de Obreros y Campesinos (Campesinos an Workers Revolutionary Confederacy) Category:National trade union centers of Mexico Category:World Federation of Trade Unions Category:1952 establishments in Mexico Category:Trade unions established in 1952
{ "pile_set_name": "Wikipedia (en)" }
Q: ¿Cuál es el valor primitivo de [] con base en ECMAScript 2016 (versión 7)? Para escribir una respuesta a ¿Cómo funciona el condicional if (!+[]+!+[] == 2) en JavaScript? me aventuré a utilizar https://www.ecma-international.org/ecma-262/7.0/index.html para las referencias. En ToPrimitive se explica el procedimiento para convertir una valor en un valor primitivo pero no he logrado asimilarlo para el caso de []. Sé que [] es un objeto y que es equivalente a new Array() También sé que un array es un objeto exótico, así que uno o más de sus métodos internos esenciales no tiene comportamiento predeterminado. Notas: Comentario de Paul Vargas (chat) Revisar Array objects (sección de ECMAScript 2016) Otras pregunta relacionadas: ¿Por qué _=$=+[],++_+''+$ es igual a 10? A: Respuesta corta El valor primitivo de [] es '' (cadena de texto vacía). Explicación Finalmente me decidí a googlear y encontré esta respuesta a Why does ++[[]][+[]]+[+[]] return the string “10”?1, la cual es similar a mi respuesta a ¿Cómo funciona el condicional if (!+[]+!+[] == 2) en JavaScript? en cuando a que hace referencia a una especificación ECMASCript sólo que aquella no especifica a cual versión se refieren las citas, sin embargo, me ha sido útil para llenar el "hueco" que derivó en esta pregunta. Mas abajo incluyo un par de extractos los cuales se pueden resumir como document.write([].join() === '') // Resultado true Extractos de la ECMAScript 2016 (versión 7) 12.2.5Array Initializer NOTE An ArrayLiteral is an expression describing the initialization of an Array > object, using a list, of zero or more expressions each of which represents an array element, enclosed in square brackets. The elements need not be literals; they are evaluated each time the array initializer is evaluated. Array elements may be elided at the beginning, middle or end of the element list. Whenever a comma in the element list is not preceded by an AssignmentExpression (i.e., a comma at the beginning or after another comma), the missing array element contributes to the length of the Array and increases the index of subsequent elements. Elided array elements are not defined. If an element is elided at the end of an array, that element does not contribute to the length of the Array. 7.1.1 ToPrimitive ( input [ , PreferredType ] ) The abstract operation ToPrimitive takes an input argument and an optional argument PreferredType. The abstract operation ToPrimitive converts its input argument to a non-Object type. If an object is capable of converting to more than one primitive type, it may use the optional hint PreferredType to favour that type. Conversion occurs according to Table 9: Table 9: ToPrimitive Conversions Input Type Result Undefined Return input. Null Return input. Boolean Return input. Number Return input. String Return input. Symbol Return input. Object Perform the steps following this table. When Type(input) is Object, the following steps are taken: If PreferredType was not passed, let hint be "default". Else if PreferredType is hint String, let hint be "string". Else PreferredType is hint Number, let hint be "number". Let exoticToPrim be ? GetMethod(input, @@toPrimitive). If exoticToPrim is not undefined, then Let result be ? Call(exoticToPrim, input, « hint »). If Type(result) is not Object, return result. Throw a TypeError exception. If hint is "default", let hint be "number". Return ? OrdinaryToPrimitive(input, hint). When the abstract operation OrdinaryToPrimitive is called with arguments O and hint, the following steps are taken: Assert: Type(O) is Object. Assert: Type(hint) is String and its value is either "string" or "number". If hint is "string", then Let methodNames be « "toString", "valueOf" ». Else, Let methodNames be « "valueOf", "toString" ». For each name in methodNames in List order, do Let method be ? Get(O, name). If IsCallable(method) is true, then Let result be ? Call(method, O). If Type(result) is not Object, return result. Throw a TypeError exception. NOTE When ToPrimitive is called with no hint, then it generally behaves as if the hint were Number. However, objects may over-ride this behaviour by defining a @@toPrimitive method. Of the objects defined in this specification only Date objects (see 20.3.4.45) and Symbol objects (see 19.4.3.4) over-ride the default ToPrimitive behaviour. Date objects treat no hint as if the hint were String. En el caso de un objeto de tipo Array, el método para determinar el valor primitivo es join() de acuerdo a lo siguiente: 22.1.3.28 Array.prototype.toString ( ) When the toString method is called, the following steps are taken: Let array be ? ToObject(this value). Let func be ? Get(array, "join"). If IsCallable(func) is false, let func be the intrinsic function %ObjProto_toString%. Return ? Call(func, array). NOTE The toString function is intentionally generic; it does not require that its this value be an Array object. Therefore it can be transferred to other kinds of objects for use as a method.
{ "pile_set_name": "StackExchange" }
Q: Modoboa 1.1.1 Deployment Errors I tried to install modoboa follow this steps: http://modoboa.readthedocs.org/en/latest/getting_started/install.html I installed modoboa with pip install modoboa: Traceback (most recent call last): File "manage.py", line 10, in <module> execute_from_command_line(sys.argv) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 453, in execute_from_command_line utility.execute() File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 392, in execute self.fetch_command(subcommand).run_from_argv(self.argv) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 272, in fetch_command klass = load_command_class(app_name, subcommand) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 77, in load_command_class module = import_module('%s.management.commands.%s' % (app_name, name)) File "/usr/local/lib/python2.7/dist-packages/django/utils/importlib.py", line 35, in import_module __import__(name) File "/usr/local/lib/python2.7/dist-packages/django/core/management/commands/syncdb.py", line 8, in <module> from django.core.management.sql import custom_sql_for_model, emit_post_sync_signal File "/usr/local/lib/python2.7/dist-packages/django/core/management/sql.py", line 9, in <module> from django.db import models File "/usr/local/lib/python2.7/dist-packages/django/db/__init__.py", line 40, in <module> backend = load_backend(connection.settings_dict['ENGINE']) File "/usr/local/lib/python2.7/dist-packages/django/db/__init__.py", line 34, in __getattr__ return getattr(connections[DEFAULT_DB_ALIAS], item) File "/usr/local/lib/python2.7/dist-packages/django/db/utils.py", line 93, in __getitem__ backend = load_backend(db['ENGINE']) File "/usr/local/lib/python2.7/dist-packages/django/db/utils.py", line 27, in load_backend return import_module('.base', backend_name) File "/usr/local/lib/python2.7/dist-packages/django/utils/importlib.py", line 35, in import_module __import__(name) File "/usr/local/lib/python2.7/dist-packages/django/db/backends/mysql/base.py", line 17, in <module> raise ImproperlyConfigured("Error loading MySQLdb module: %s" % e) django.core.exceptions.ImproperlyConfigured: Error loading MySQLdb module: No module named MySQLdb python manage.py syncdb --noinput failed, check your configuration Traceback (most recent call last): File "manage.py", line 10, in <module> execute_from_command_line(sys.argv) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 453, in execute_from_command_line utility.execute() File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 392, in execute self.fetch_command(subcommand).run_from_argv(self.argv) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 272, in fetch_command klass = load_command_class(app_name, subcommand) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 77, in load_command_class module = import_module('%s.management.commands.%s' % (app_name, name)) File "/usr/local/lib/python2.7/dist-packages/django/utils/importlib.py", line 35, in import_module __import__(name) File "/usr/local/lib/python2.7/dist-packages/django/core/management/commands/syncdb.py", line 8, in <module> from django.core.management.sql import custom_sql_for_model, emit_post_sync_signal File "/usr/local/lib/python2.7/dist-packages/django/core/management/sql.py", line 9, in <module> from django.db import models File "/usr/local/lib/python2.7/dist-packages/django/db/__init__.py", line 40, in <module> backend = load_backend(connection.settings_dict['ENGINE']) File "/usr/local/lib/python2.7/dist-packages/django/db/__init__.py", line 34, in __getattr__ return getattr(connections[DEFAULT_DB_ALIAS], item) File "/usr/local/lib/python2.7/dist-packages/django/db/utils.py", line 93, in __getitem__ backend = load_backend(db['ENGINE']) File "/usr/local/lib/python2.7/dist-packages/django/db/utils.py", line 27, in load_backend return import_module('.base', backend_name) File "/usr/local/lib/python2.7/dist-packages/django/utils/importlib.py", line 35, in import_module __import__(name) File "/usr/local/lib/python2.7/dist-packages/django/db/backends/mysql/base.py", line 17, in <module> raise ImproperlyConfigured("Error loading MySQLdb module: %s" % e) django.core.exceptions.ImproperlyConfigured: Error loading MySQLdb module: No module named MySQLdb python manage.py syncdb failed, check your configuration Unknown command: 'migrate' Type 'manage.py help' for usage. python manage.py migrate --fake failed, check your configuration Traceback (most recent call last): File "manage.py", line 10, in <module> execute_from_command_line(sys.argv) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 453, in execute_from_command_line utility.execute() File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 392, in execute self.fetch_command(subcommand).run_from_argv(self.argv) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 272, in fetch_command klass = load_command_class(app_name, subcommand) File "/usr/local/lib/python2.7/dist-packages/django/core/management/__init__.py", line 77, in load_command_class module = import_module('%s.management.commands.%s' % (app_name, name)) File "/usr/local/lib/python2.7/dist-packages/django/utils/importlib.py", line 35, in import_module __import__(name) File "/usr/local/lib/python2.7/dist-packages/django/core/management/commands/loaddata.py", line 11, in <module> from django.core import serializers File "/usr/local/lib/python2.7/dist-packages/django/core/serializers/__init__.py", line 22, in <module> from django.core.serializers.base import SerializerDoesNotExist File "/usr/local/lib/python2.7/dist-packages/django/core/serializers/base.py", line 5, in <module> from django.db import models File "/usr/local/lib/python2.7/dist-packages/django/db/__init__.py", line 40, in <module> backend = load_backend(connection.settings_dict['ENGINE']) File "/usr/local/lib/python2.7/dist-packages/django/db/__init__.py", line 34, in __getattr__ return getattr(connections[DEFAULT_DB_ALIAS], item) File "/usr/local/lib/python2.7/dist-packages/django/db/utils.py", line 93, in __getitem__ backend = load_backend(db['ENGINE']) File "/usr/local/lib/python2.7/dist-packages/django/db/utils.py", line 27, in load_backend return import_module('.base', backend_name) File "/usr/local/lib/python2.7/dist-packages/django/utils/importlib.py", line 35, in import_module __import__(name) File "/usr/local/lib/python2.7/dist-packages/django/db/backends/mysql/base.py", line 17, in <module> raise ImproperlyConfigured("Error loading MySQLdb module: %s" % e) django.core.exceptions.ImproperlyConfigured: Error loading MySQLdb module: No module named MySQLdb python manage.py loaddata initial_users.json failed, check your configuration Unknown command: 'collectstatic' Type 'manage.py help' for usage. python manage.py collectstatic --noinput failed, check your configuration I tried to install pip install MySQL-python but I received this error: Downloading/unpacking MySQL-python Downloading MySQL-python-1.2.5.zip (108kB): 108kB downloaded Running setup.py egg_info for package MySQL-python sh: mysql_config: orden no encontrada Traceback (most recent call last): File "<string>", line 16, in <module> File "/tmp/pip_build_root/MySQL-python/setup.py", line 17, in <module> metadata, options = get_config() File "setup_posix.py", line 43, in get_config libs = mysql_config("libs_r") File "setup_posix.py", line 25, in mysql_config raise EnvironmentError("%s not found" % (mysql_config.path,)) EnvironmentError: mysql_config not found Complete output from command python setup.py egg_info: sh: mysql_config: orden no encontrada Traceback (most recent call last): File "<string>", line 16, in <module> File "/tmp/pip_build_root/MySQL-python/setup.py", line 17, in <module> metadata, options = get_config() File "setup_posix.py", line 43, in get_config libs = mysql_config("libs_r") File "setup_posix.py", line 25, in mysql_config raise EnvironmentError("%s not found" % (mysql_config.path,)) EnvironmentError: mysql_config not found ---------------------------------------- Cleaning up... Command python setup.py egg_info failed with error code 1 in /tmp/pip_build_root/MySQL-python Storing complete log in /root/.pip/pip.log Seems that error is caused by MySQL module but I don't know how to resolve it. A: You should install the python mysqldb package provided with your distribution. On a debian/ubuntu one: $ apt-get install python-mysqldb
{ "pile_set_name": "StackExchange" }
A small city in Iowa has taken an action to save the bees from extinction. Acres of land were donated to increase the local habitats of the bees. Over the past decade, bees are steadily disappearing. Worker bees disappear and leaving behind the queen. With a few nursing bees to take care of the immature bees, a colo… Read More To stay updated with the latest in the apiculture industry to can visit our beekeeping latest news. On the other hand if you are starting beekeeping and would like to begin professional beekeeping today download a copy of our beekeeping for beginners ebook. Beekeeping can be a full-time profession or a hobby that is simple. Nonetheless, more often than not, what started as a hobby would turn into a profession. But you cannot simply tell and decide yourself you will start to do beekeeping. Before starting on any avocation or profession, you need to have understanding and satisfactory knowledge on the subject that you are going to enter. If you’ve been putting off your interest in beekeeping for quite a while, then it’s about time to indulge yourself in your line of interest. Bee farming may seem simple; learning the basic beekeeping lessons can enable you to get away to a good start. What does a beekeeper need to understand? On beekeeping to start at the right foot you should have interest that is complete. You need to spend time taking care of your colonies of bees. You should have also agreed to share your home space with the bees. There are potential risks in beekeeping that can harm not only you but your family also. Your focus is not only to make money by selling honey; a good beekeeper should have passion and a keen interest in rearing bees. An apiarist should know the right place for the beehives. You have to make sure beekeeping is allowed in your area, if you decide to place your beehives at your backyard. There are several places restricted to beekeeping; you have to get permission concerning this. Beekeepers must know whether beekeeping supplies are available in the area where the beehives are situated. When you must go to a neighborhood beekeeping shop you may never understand; it is best that a nearby beekeeping store is reachable. Equipment and protective tools are also very important to beekeepers to know. Know the right kind of suit to choose to keep you from any possible danger in beekeeping. If you’re incapable to harvest honey from your bees all the efforts that are beekeeping would be futile. A beekeeper should know the methods in gathering the honey from the comb; beeswax is also part of the returns in beekeeping.
{ "pile_set_name": "Pile-CC" }
Defending champion Reilly Opelka and 2018 champ Kevin Anderson headline a stacked field of singles players committed to compete in this year’s New York Open men’s tennis tournament, which takes place Feb. 9-16 on the unique black courts at NYCB LIVE’s Nassau Veterans Memorial Coliseum. more The Kumon Method was founded in Japan in 1954. Toru Kumon, a high school math teacher, was trying to help his own child. Convinced that his second-grade son could be taught the necessary skills to understand advanced mathematics, he created . . . more After a number of residents urged the city to install mats on the barrier island’s beaches so that those with mobility issues can easily access Long Beach’s iconic shoreline, the city last week released a plan to do just that. more
{ "pile_set_name": "Pile-CC" }
Comparison of pulpal sensitivity between a conventional and two resin-modified glass ionomer luting cements. This clinical study compared handling and any short-term tooth sensitivity associated with using one conventional and two resin-modified glass ionomer cements marketed for luting gold and ceramometal crowns. The patient's response to a 10-second blast of air applied to the vital tooth was scored pre-operatively and again within a one-to-four week post-cementation recall period. A score was also recorded for any sensitivity present at the time of cementation of the crown on the unanesthetized tooth. All three cements were easy to mix and place. Most of the teeth had no response to pulpal stimulation pre-operatively, associated with the cementation procedure or post-cementation, and there were no instances of severe sensitivity recorded. For all cements, the level of post-cementation tooth sensitivity was similar, and less than that found pre-operatively.
{ "pile_set_name": "PubMed Abstracts" }
? True Is 48 a factor of 270397? False Does 108 divide 172051? False Is 1346978 a multiple of 229? True Is 594602 a multiple of 92? False Is 196370 a multiple of 147? False Is 18 a factor of 8147788? False Does 427 divide 545789? False Is 271 a factor of 94908? False Is 818034 a multiple of 42? True Is 153164 a multiple of 59? True Is 105105 a multiple of 11? True Does 54 divide 3425478? False Is 662245 a multiple of 75? False Is 67 a factor of 52461? True Does 9 divide 204787? False Is 10811988 a multiple of 423? False Does 16 divide 261456? True Is 4 a factor of 136588? True Is 14 a factor of 597958? False Does 62 divide 4814? False Is 29 a factor of 336110? True Is 9865210 a multiple of 694? True Does 964 divide 445107? False Does 23 divide 25691? True Is 1090352 a multiple of 201? False Does 1187 divide 984117? False Does 12 divide 77624? False Is 145 a factor of 304490? False Does 106 divide 3479874? True Is 36 a factor of 436938? False Does 6 divide 1757635? False Is 26 a factor of 125450? True Is 613223 a multiple of 107? False Is 91773 a multiple of 33? True Does 60 divide 536100? True Does 15 divide 85890? True Does 23 divide 186172? False Is 222 a factor of 145854? True Is 6534019 a multiple of 9? False Is 30 a factor of 79560? True Is 13034290 a multiple of 12? False Does 70 divide 2320850? True Is 385236 a multiple of 82? True Is 23591987 a multiple of 353? False Does 109 divide 875161? True Is 2851036 a multiple of 68? True Is 176 a factor of 381610? False Is 117725 a multiple of 25? True Does 84 divide 13225968? True Is 19 a factor of 12541? False Does 11 divide 137874? True Is 1019 a factor of 6954675? True Is 11000882 a multiple of 71? True Is 726584 a multiple of 400? False Is 15 a factor of 3595830? True Is 4 a factor of 698120? True Is 759330 a multiple of 330? True Is 694302 a multiple of 542? True Does 34 divide 1038224? True Is 4 a factor of 6161288? True Is 557 a factor of 303326? False Does 50 divide 110950? True Is 98 a factor of 6476624? True Does 20 divide 87793? False Is 2242465 a multiple of 53? False Is 30063 a multiple of 33? True Does 8 divide 135447? False Is 52 a factor of 77480? True Is 601137 a multiple of 375? False Is 127 a factor of 12065? True Is 24 a factor of 669711? False Does 239 divide 371406? True Does 50 divide 6939400? True Is 2209425 a multiple of 30? False Is 279 a factor of 152055? True Is 866185 a multiple of 178? False Is 665855 a multiple of 4? False Does 119 divide 74494? True Does 246 divide 130368? False Does 71 divide 1928264? False Is 1445862 a multiple of 4? False Is 1663 a factor of 3480659? True Is 4742952 a multiple of 12? True Does 115 divide 35190? True Is 149377 a multiple of 68? False Is 405 a factor of 1769040? True Is 6914512 a multiple of 187? True Is 29445 a multiple of 39? True Is 232 a factor of 42224? True Is 164 a factor of 724264? False Is 57 a factor of 284430? True Does 20 divide 792940? True Is 212730 a multiple of 70? True Does 260 divide 105300? True Does 14 divide 6948368? True Is 9904479 a multiple of 66? False Is 927 a factor of 8458121? False Does 9 divide 170451? True Is 997836 a multiple of 588? True Is 130 a factor of 790530? True Is 2366360 a multiple of 219? False Does 5 divide 657025? True Does 39 divide 120354? True Is 3502320 a multiple of 80? True Is 28 a factor of 107352? True Is 2217 a multiple of 132? False Is 649059 a multiple of 30? False Does 83 divide 2813588? False Does 3 divide 5677? False Is 23 a factor of 108675? True Is 214053 a multiple of 117? False Is 2 a factor of 111755? False Is 324 a multiple of 146? False Is 105 a factor of 2876072? False Is 1228924 a multiple of 79? True Does 7 divide 2690301? False Does 259 divide 228689? False Is 12963099 a multiple of 1049? False Is 770 a factor of 619080? True Is 25 a factor of 1750375? True Is 10836493 a multiple of 2098? False Is 712368 a multiple of 51? True Is 25865348 a multiple of 978? False Is 16 a factor of 2254528? True Does 7 divide 957559? False Does 15 divide 483964? False Is 1045561 a multiple of 11? True Does 65 divide 76440? True Is 115429 a multiple of 13? False Is 655210 a multiple of 56? False Is 6191492 a multiple of 33? False Is 21 a factor of 1274155? False Is 93888 a multiple of 83? False Does 29 divide 19919? False Is 203009 a multiple of 15? False Is 10 a factor of 1620958? False Is 21 a factor of 701059? False Does 145 divide 12749125? True Is 20 a factor of 381689? False Is 352 a factor of 7330752? True Is 4344 a multiple of 26? False Is 70650 a multiple of 18? True Is 3 a factor of 63510? True Is 2579616 a multiple of 32? True Is 203 a factor of 106778? True Is 647 a factor of 26557409? True Is 2645328 a multiple of 56? True Is 162951 a multiple of 10? False Does 1420 divide 3791400? True Is 4564320 a multiple of 514? True Is 1978417 a multiple of 959? True Is 175 a factor of 308700? True Is 410350 a multiple of 179? False Does 14 divide 230809? False Does 63 divide 15115968? True Is 135830 a multiple of 465? False Is 76 a factor of 4626120? True Is 214 a factor of 1303688? True Does 526 divide 1676395? False Does 4 divide 857098? False Is 7514 a multiple of 4? False Is 14403180 a multiple of 1529? True Is 107874 a multiple of 117? True Is 518 a factor of 21929? False Is 14273973 a multiple of 19? False Is 131430 a multiple of 224? False Does 19 divide 947473? True Does 37 divide 1421284? False Is 218029 a multiple of 13? False Is 638 a factor of 2123902? True Is 240 a factor of 794640? True Is 42554281 a multiple of 3553? True Does 69 divide 9246? True Does 16 divide 10451696? True Is 9993002 a multiple of 16? False Is 6 a factor of 136290? True Is 60599 a multiple of 77? True Is 17329094 a multiple of 387? False Is 114 a factor of 192432? True Is 348155 a multiple of 389? True Does 9 divide 13925? False Does 380 divide 2453660? True Is 3773750 a multiple of 131? False Is 949 a factor of 2021370? True Does 55 divide 266038? False Is 337238 a multiple of 22? True Does 9 divide 68772? False Does 14 divide 434714? True Is 5 a factor of 5948? False Does 9 divide 7368750? True Is 8625071 a multiple of 91? True Is 202 a factor of 1486769? False Is 90 a factor of 4099219? False Is 201 a factor of 110664? False Is 5 a factor of 2398275? True Is 120 a factor of 1749819? False Is 12 a factor of 607187? False Does 70 divide 17080? True Is 15 a factor of 113049? False Does 439 divide 206369? False Is 80100 a multiple of 150? True Does 52 divide 34802768? True Is 22 a factor of 260458? True Is 17 a factor of 33436212? True Is 248327 a multiple of 25? False Does 5 divide 479292? False Is 29 a factor of 4689455? False Does 6 divide 6924820? False Does 21 divide 55658? False Is 12 a factor of 59060? False Is 63745 a multiple of 39? False Is 39317 a multiple of 17? False Is 1719356 a multiple of 79? True Is 28 a factor of 283640? True Is 99426 a multiple of 21? False Is 163 a factor of 1863090? True Does 177 divide 92254? False Is 13 a factor of 12299676? False Does 600 divide 82800? True Is 16 a factor of 20339367? False Is 3630580 a multiple of 60? False Is 474 a factor of 315210? True Is 12760 a multiple of 232? True Is 3486550 a multiple of 9? False Is 7824140 a multiple of 233? True Is 2231034 a multiple of 39? True Does 11 divide 16719275? False Is 56028 a multiple of 13? False Is 33 a factor of 137766? False Is 2121314 a multiple of 13? True Is 37 a factor of 243778? False Does 14 divide 21238? True Does 1659 divide 5260689? True Is 18 a factor of 397962? True Does 9 divide 47509? False Is 2101785 a multiple of 25? False Is 113 a factor of 6804697? False Does 27 divide 361916? False Does 13 divide 40612? True Does 118 divide 230949? False Does 8 divide 23127? False Is 367217 a multiple of 18? False Is 58 a factor of 2784? True Is 24 a factor of 21341? False Is 281436 a multiple of 94? True Does 11 divide 444058? False Is 3866850 a multiple of 116? False Is 6170 a multiple of 2? True Is 1747090 a multiple of 86? True Does 10 divide 19253? False Is 23 a factor of 176410? True Is 333 a factor of 4797998? False Is 332636 a multiple of 39? False Is 359499 a multiple of 17? True Is 394 a factor of 979637? False Is 28080 a multiple of 60? True Is 11 a factor of 87670? True Does
{ "pile_set_name": "DM Mathematics" }
--- abstract: 'Dark Matter detectors with directional sensitivity have the potential of yielding an unambiguous positive observation of WIMPs as well as discriminating between galactic Dark Matter halo models. In this article, we introduce the motivation for directional detectors, discuss the experimental techniques that make directional detection possible, and review the status of the experimental effort in this field.' address: - 'Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, MA 02139, USA' - 'Temple University, 1900 N. 13-th Street, Philadelphia, PA 19122, USA' author: - G Sciolla - C J Martoff bibliography: - 'all\_DM.bib' title: Gaseous Dark Matter Detectors --- Introduction ============ Astronomical and cosmological observations have recently shown that Dark Matter (DM) is responsible for 23% of the energy budget of the Universe and 83% of its mass [@Hinshaw2008]. The most promising candidate for Dark Matter is the so-called Weakly Interacting Massive Particle (WIMP). The existence of WIMPs is independently suggested by considerations of Big Bang cosmology and theoretical supersymmetric particle phenomenology [@LeeWeinberg; @Weinberg82; @Jungman1996]. Over the years, many direct detection experiments have been performed to search for nuclear recoils due to elastic scattering of WIMPs off the nuclei in the active volume of the detector. The main challenge for these experiments is to suppress the backgrounds that mimic WIMP-induced nuclear recoils. Today’s leading experiments have achieved excellent rejection of electromagnetic backgrounds, i.e., photons, electrons and alpha particles, that have a distinct signature in the detector. However, there are sources of background for which the detector response is nearly identical to that of a WIMP-induced recoil, such as the coherent scattering of neutrinos from the sun [@Monroe2007], or the elastic scattering of neutrons produced either by natural radioactivity or by high-energy cosmic rays. While neutron and neutrino interactions do not limit today’s experiments, they are expected to become dangerous sources of background when the scale of DM experiments grows to fiducial masses of several tons. In traditional counting experiments, the presence of such backgrounds could undermine the unambiguous identification of a Dark Matter signal because neutrinos are impossible to suppress by shielding and underground neutron backgrounds are notoriously difficult to predict [@Mei2006]. An unambiguous positive identification of a Dark Matter signal even in presence of unknown amounts of irreducible backgrounds could still be achieved if one could correlate the observation of a nuclear recoil in the detector with some unique astrophysical signature which no background could mimic. This is the idea that motivates directional detection of Dark Matter. The Dark Matter Wind --------------------- The observed rotation curve of our Galaxy suggests that at the galactic radius of the sun the galactic potential has a significant contribution from Dark Matter. The Dark Matter distribution in our Galaxy, however, is poorly constrained. A commonly used DM distribution, the standard dark halo model [@SmithLewin1990], assumes a non-rotating, isothermal sphere extending out to 50 kpc from the galactic center. The DM velocity is described by a Maxwell-Boltzmann distribution with dispersion $\sigma_v=155$ km/s. Concentric with the DM halo is the galactic disk of luminous ordinary matter, rotating with respect to the halo, with an average orbital velocity of about 220 km/s at the radius of the solar system. Therefore in this model, an observer on Earth would see a wind of DM particles with average velocity of 220 km/s. The Dark Matter wind creates two observable effects. The first was pointed out in 1986 by Drukier, Freese, and Spergel [@Drukier1986] who predicted that the Earth’s motion relative to the galactic halo leads to an annual modulation of the rates of interactions observed above a certain threshold in direct detection experiments. In its annual rotation around the sun, the Earth’s orbital velocity has a component that is anti-parallel to the DM wind during the summer, and parallel to it during the winter. As a result, the apparent velocity of the DM wind will increase (decrease) by about 10% in summer (winter), leading to a corresponding increase (decrease) of the observed rates in DM detectors. Unfortunately, this effect is difficult to detect because the seasonal modulation is expected to be small (a few %) and very hard to disentangle from other systematic effects, such as the seasonal dependence of background rates. These experimental difficulties cast a shadow on the recent claimed observation of the yearly asymmetry by the DAMA/LIBRA collaboration [@Bernabei2008]. A larger modulation of the WIMP signal was pointed out by Spergel [@Spergel] in 1988. The Earth spins around its axis with a period of 24 sidereal hours. Because its rotation axis is oriented at 48$^\circ$ with respect to the direction of the DM wind, an observer on Earth sees the average direction of the WIMPs change by 96$^\circ$ every 12 sidereal hours. This modulation in arrival direction should be resolvable by a Dark Matter directional detector, e.g., a detector able to determine the direction of the DM particles. Most importantly, no known background is correlated with the direction of the DM wind. Therefore, a directional detector could hold the key to the unambiguous observation of Dark Matter. In addition to background rejection, the determination of the direction of the arrival of Dark Matter particles can discriminate [@Copi1999; @Vergados2003; @Morgan2004; @Freese2005; @Alenazi2008] between various DM halo distributions including the standard dark halo model, models with streams of WIMPs, the Sikivie late-infall halo model [@Sikivie1999; @Tkachev1997; @Sikivie1995], and other anisotropic models. The discrimination power is further enhanced if a determination of the sense as well as the direction of WIMPs is possible [@Green2007]. This capability makes directional detectors unique observatories for underground WIMP astronomy. Directional Dark Matter Detection ----------------------------------- When Dark Matter particles interact with regular matter, they scatter elastically off the atoms and generate nuclear recoils with typical energies $E_R$ of a few tens of keV, as explained in more detail in section \[NuclearRecoils\]. The direction of the recoiling nucleus encodes the direction of the incoming DM particle. To observe the daily modulation in the direction of the DM wind, an angular resolution of 20–30 degrees in the reconstruction of the recoil nucleus is sufficient, because the intrinsic spread in direction of the DM wind is $\approx$ 45 degrees. Assuming that sub-millimeter tracking resolution can be achieved, the length of a recoil track has to be of at least 1–2 mm, which can be obtained by using a very dilute gas as a target material. An ideal directional detector should provide a 3-D vector reconstruction of the recoil track with a spatial resolution of a few hundred microns in each coordinate, and combine a very low energy threshold with an excellent background rejection capability. Such a detector would be able to reject isotropy of the recoil direction, and hence identify the signature of a WIMP wind, with just a handful of events [@Morgan2004]. More recently, Green and Morgan [@Green2007] studied how the number of events necessary to detect the WIMP wind depends on the detector performance in terms of energy threshold, background rates, 2-D versus 3-D reconstruction of the nuclear recoil, and ability to determine the sense of the direction by discriminating between the “head” and “tail” of the recoil track. The default configuration used for this study assumes a CS$_2$ gaseous TPC running at 0.05 bar using 200 $\mu$m pixel readout providing 3-D reconstruction of the nuclear recoil and “head-tail” discrimination. The energy threshold is assumed to be 20 keV, with perfect background rejection. In such a configuration, 7 events would be sufficient to establish observation of the WIMP wind at 90% C.L.. In presence of background with S/N=1, the number of events necessary to reject isotropy would increase by a factor 2. If only 2D reconstruction is available, the required number of events doubles compared to the default configuration. “Head-tail” discrimination turns out to be the most important capability: if the sense cannot be measured, the number of events necessary to observe the effects of the WIMP wind increases by one order of magnitude. Nuclear Recoils in Gaseous Detectors {#NuclearRecoils} ==================================== To optimize the design of gaseous detectors for directional detection of Dark Matter one must be able to calculate the recoil atom energy spectrum expected for a range of WIMP parameters and halo models. The detector response in the relevant energy range must also be predictable. The response will be governed first and foremost by the track length and characteristics (multiple scattering) as a function of recoil atom type and energy. Since gas detectors require ionization for detection, design also requires knowledge of the ionization yield in gas and its distribution along the track as a function of recoil atom type and energy, and possibly electric field. The large momentum transfer necessary to produce a detectable recoil in gas implies that the scattering atom can be treated as a free particle, making calculations of the recoil spectrum essentially independent of whether the target is a solid, liquid, or gas. An estimate of the maximum Dark Matter recoil energy for simple halo models is given by the kinematically allowed energy transfer from an infinitely heavy halo WIMP with velocity equal to the galactic escape speed. This speed is locally about 500-600 km/sec [@rave]; WIMPS with higher velocities than this would not be gravitationally bound in the halo and would presumably be rare. The corresponding maximum energy transfer amounts to $<$ 10 keV/nucleon. The integrated rate will be concentrated at lower energies than this, at least in halo models such as the isothermal sphere. For that model, the recoil energy ($E_R$) distribution [@SmithLewin1990] is proportional to $\exp(-E_R/E_I)$, with $E_I$ a constant that depends on the target and WIMP masses and the halo model. For a 100 GeV WIMP and the isothermal halo model parameters of Ref. [@SmithLewin1990], $E_I / A$ varies from 1.05 to 0.2 keV/nucleon for target mass numbers from 1 to 131. These are very low energy particles, well below the Bragg Peak at $\sim$200–800 keV/A. In this regime dE/dx [*decreases*]{} with decreasing energy, and the efficiency of ionization is significantly reduced. Lindhard Model for Low-Energy Stopping -------------------------------------- The stopping process for such low energy particles in homoatomic[^1] substances was treated by Lindhard, Scharff, and Schiott [@Lindhard1963; @Lindhard-int] (LSS). This treatment has stood the test of time and experiment, making it worthwhile to summarize the results here. As is now well-known, the primary energy loss mechanisms for low energy particles in matter can be divided into “nuclear stopping”, due to atom-atom scattering, and “electronic stopping”, due to atom-electron scattering. These mechanisms refer only to the initial interaction causing the incident particle to lose energy. Nuclear stopping eventually contributes to electronic excitations and ionization, and electronic stopping eventually contributes to thermal excitations [@Lindhard-int]. In Ref. [@Lindhard1963] the stopping is described using a Thomas-Fermi atom model to obtain numerical results for universal stopping-power curves in terms of two variables, the scaled energy $\epsilon=E_R/E_{TF}$, and the scaled range $\rho=R/R_{TF}$, where $E_R$ and $R$ are respectively the energy and the stopping distance of the recoil, and $E_{TF}$ and $R_{TF}$ are scale factors[^2]. In Ref. [@Lindhard1963] it was shown that nuclear stopping dominates in the energy range where most of the rate for Dark Matter detection lies. This can be seen as follows. The scaled variables $\epsilon$ and $\rho$ depend algebraically on the atomic numbers and mass numbers of the incident and target particles. The scale factor $E_{TF}$ corresponds to 0.45 keV/nucleon for homoatomic recoils in Carbon, 1.7 keV/nucleon for Ar in Ar and 6.9 keV/nucleon for Xe in Xe. Nuclear stopping $\frac{d\epsilon_n}{d\rho}$ was found to be larger than the electronic stopping $\frac{d\epsilon_e}{d\rho}$ for $\epsilon < 1.6$, which covers the energy range $0 < E_R < E_I$ where most of the Dark Matter recoil rate can be expected. Because of the dominance of nuclear stopping, detectors can be expected to respond differently to Dark Matter recoils than to radiations such as x-rays or even $\alpha$ particles, for which electronic stopping dominates. Nuclear stopping yields less ionization and electronic excitation per unit energy loss than does electronic stopping, implying that the W factor, defined as the energy loss required to create one ionization electron, will be larger for nuclear recoils. Reference [@Lindhard-int] presents calculations of the ultimate energy loss partitioning between electronic and atomic motion. Experimenters use empirical “quenching factors" to describe the variation of energy per unit of ionization (the “W" parameter) compared to that from x-rays. The different microscopic distribution of ionization in tracks dominated by nuclear stopping can also lead to unexpected changes in the interactions of ionized and electronically excited target atoms (e.g., dimer formation, recombination). Such interactions are important for particle identification signatures such as the quantity and pulse shape of scintillation light output, the variation of scintillation pulse shape with applied electric field, and the field variation of ionization charge collection efficiency. Such effects are observed in gases [@White2007; @Martin2009], and even more strongly in liquid and solid targets [@Aprile2006]. Electronic stopping [@Lindhard1963] was found to vary as $\frac{d\epsilon_e}{d\rho} = k \sqrt{\epsilon}$ with the parameter $k$ varying only from 0.13 to 0.17 for homonuclear recoils in A=1 to 131[^3]. Let us define the total stopping as $\frac{d\epsilon}{d\rho}= \frac{d\epsilon_n}{d\rho} + \frac{d\epsilon_e}{d\rho}$ and the total scaled range as $\rho_o = \int _0 ^\epsilon \frac{d\epsilon}{(\frac{d\epsilon}{d\rho})}$. The relatively small contribution of electronic stopping and the small variation in $k$ for homoatomic recoils, makes the total scaled range for this case depend on the target and projectile almost entirely through $E_{TF}$. Predictions for the actual range of homoatomic recoils can be obtained from the nearly-universal scaled range curve as follows. Numerically integrating the stopping curves of Ref. [@Lindhard1963] with $k$ set to 0.15 gives a scaled range curve that fits the surprisingly simple expression $$\rho_o \stackrel{.}{=} 2.04 \epsilon + 0.04 \label{eq:range}$$ with accuracy better than 10% for $0.12 < \epsilon < 10 $. According to the formula given earlier, the scale factor $R_{TF}$ lies between 1 and 4 $\times$ 10$^{17}$ atoms/cm$^2$ for homoatomic recoils in targets with $12 \leq A \leq 131$. Thus the model predicts ranges of several times 10$^{17}$ atoms/cm$^2$ at $E_R = E_I$. This is of the order of a few mm for a monoatomic gas at 0.05 bar. As a consequence, tracking devices for Dark Matter detection must provide accurate reconstruction of tracks with typical lengths between 1 and a few mm while operating at pressures of a small fraction of an atmosphere. When comparing LSS predictions with experimental results, two correction factors must be considered. First, the widely-used program SRIM [@SRIM] produces range-energy tables which contain the “projected range", while LSS calculate the path length along the track. On the other hand, many older experiments report “extrapolated ranges", which are closer in magnitude to the path length than to the “projected range". To compare the SRIM tables with LSS, the projected range should be multiplied by a factor [@Lindhard1963] $(1+\frac{M_T}{3M_P})$ where $M_T$ and $M_P$ are the target and projectile masses. This correction has generally been applied in the next section, where experimental data are discussed. In addition, it must be noted that the LSS calculations described above were obtained for solids. Therefore, one should consider a gas-solid correction in ranges and stopping powers, as discussed by Bohr, Lindhard and Dan [@BLD]. In condensed phases, the higher collision frequency results in a higher probability for stripping of excited electrons before they can relax, which leads to a higher energy loss rate than for gases. This correction is rather uncertain and has generally not been applied in the following section of this paper. Finally, numerical calculations to extend the LSS model to the case of targets of mixed atomic number are given in Ref. [@Hitachi2008]. Experimental Data on Low Energy Stopping in Gases ------------------------------------------------- The literature of energy loss and stopping of fast particles in matter is vast and still growing [@Ziegler1985; @Sigmund1998]. However, there is not a lot of experimental data available for particle ranges and ionization yields in gas at the very low energies typical of Dark Matter recoils, where E/A $\sim$ 1 keV per nucleon. Comprehensive collections of citations for all energies are available [@SRIM; @MSTAR], upon which the widely-used theory-guided-fitting computer programs SRIM and MSTAR [@MSTAR] are based. Several older references [@Evans1953; @Lassen1964; @Cano1968] still appear representative of the available direct measurements at very low energy. More recent studies [@SnowdenIfft2003] provide indirect information based on large detector simulations. Both references [@Evans1953] and [@Lassen1964] used accelerated beams of He, N, Ne, Ar and $^{24}$Na, $^{66}$Ga, and $^{198}$Au in differentially pumped gas target chambers filled with pure-element gases. In [@Evans1953] the particles were detected with an ionization chamber, while in [@Lassen1964] radioactive beams were used. The stopped particles were collected on segmented walls of the target chamber and later counted. Typical results were ranges of 2(3.2) $\times$ 10$^{17}$ atoms/cm$^2$ for 26(40) keV Ar$^+$ in Argon. The fit to LSS theory given above predicts ranges that are shorter than the experimental results by 10-40%, which is consistent with experimental comparisons given by LSS. Accuracy of agreement with the prediction from the SRIM code is about the same. As in all other cases discussed below, the direction of the deviation from LSS is as expected from the gas-solid effect mentioned in the previous section. In Ref. [@SnowdenIfft2003] nuclear recoils from $^{252}$Cf neutrons were recorded by a Negative Ion Time Projection Chamber (NITPC) filled with 40 Torr CS$_2$. The device was simulated fitting the observed pulse height and event size distributions. The best fit range curves given for C and S recoils in the gas are 10-20% higher at 25-100 keV than LSS predictions computed by the present authors by assuming simple additivity of stopping powers for the constituent atoms of the polyatomic gas target. Ionization Yields ----------------- Tracking readouts in gas TPC detectors are sensitive only to ionization of the gas. As noted above, both nuclear and electronic stopping eventually contribute to both electronic excitations (including ionization) and to kinetic energy of target atoms, as primary and subsequent generations of collision products interact further with the medium. Some guidance useful for design purposes is available from Ref. [@Lindhard-int], where the energy cascade was treated numerically using integral equations. In terms of the scaled energy $\epsilon$ and the electronic stopping coefficient $k$ introduced above, the (scaled) energy $\eta$ ultimately transferred to electrons was found to be well approximated [@SmithLewin1996] by $\eta = \frac{\epsilon}{1+\frac{1}{k\dot g(\epsilon)}}$ with $g(\epsilon)= \epsilon + 3 \epsilon^{0.15} + 0.7 \epsilon^{0.6}$. This function interpolates smoothly from $\eta = 0$ at $\epsilon = 0$ to $\eta = \epsilon$ for $\epsilon \rightarrow \infty$, giving $\eta = 0.4$ at $\epsilon = 1$. In other words, this theory predicts only about 40% as much ionization per unit of energy deposited by Dark Matter recoils as by low LET radiation such as electrons ejected by x-rays. Several direct measurements of total ionization by very low energy particles are available in literature. Many of these results are for recoil nuclei from alpha decays [@Cano1965; @Cano1968; @Stone1957]. These $\sim$ 100 keV, A $\sim$ 200 recoils are of interest as backgrounds in Dark Matter experiments, but their scaled energy $\epsilon \cong 0.07$ is below the range of interest for most WIMP recoils. Measured ionization yield parameters W were typically 100-120 eV/ion pair, in good agreement with the approximate formula for $\eta$ given above. Data more applicable to Dark Matter recoils are given in Refs. [@Phipps1964; @Boring1965; @McDonald1969; @Price1993]. Some representative results from these works include [@Boring1965] W = 91 (65) eV/IP for 25 (100) keV Ar in Ar, both values about 20% higher than would be predicted by the preceding approximate LSS expression. Higher W for gases than for condensed media is expected [@BLD] as mentioned above. Ref. [@McDonald1969] measured total ionization from particles with 1 $<$ Z $<22$ in methane. While in principle the LSS treatment does not apply to heteroatomic gases, using the LSS prescription to predict the W factor for a carbon target (rather than methane) yields a value that is 15% lower than the experimental results. The authors of Ref. [@SnowdenIfft2003] also fit their data to derive W-values for C and S recoils. Their best-fit values are again 10-25% higher than an LSS-based estimate by the present author using additivity. To summarize, most of the Dark Matter recoils expected from an isothermal galactic halo have very low energies, and therefore nuclear stopping plays an important role. The sparse available experimental data on track lengths and ionization yields agrees at the $\sim$20% level with simple approximate formulas based on the Lindhard model. Without applying any gas-phase correction, LSS-based estimates for range tend to be slightly longer than those experimentally measured in gases. The predicted ionization parameter W also tends to be slightly lower than the experimental data. This situation is adequate for initial design of detectors, but with the present literature base, each individual experiment will require its own dedicated calibration measurements. Considerations for Directional Detector Design ============================================== Detector Architecture --------------------- From the range-energy discussion in the previous section, we infer that track lengths of typical Dark Matter recoils will be only of the order of 0.1 $\mu$m in condensed matter, while track lengths of up to a few millimeters are expected in gas at a tenth of the atmospheric pressure. Several techniques relevant to direction-sensitive detection using condensed matter targets have been reported, including track-etch analysis of ancient mica [@Bander1995], bolometric detection of surface sputtered atoms [@Martoff1996], and use of nuclear emulsions [@Natsume2007]. The ancient mica etch pit technique was actually used to obtain Dark Matter limits. However, recently the focus of directional Dark Matter detection has shifted to low-pressure gas targets, and that is the topic of the present review. The TPC [@NygrenTPC; @Fancher1979] is the natural detector architecture for gaseous direction-sensitive Dark Matter detectors, and essentially all experiments use this configuration. The active target volume contains only the active gas, free of background-producing material. Only one wall of the active volume requires a readout system, leading to favorable cost-volume scaling. TPCs with nearly 100 m$^3$ of active volume have been built for high energy physics, showing the possibility of large active masses. Background Rejection Capabilities ---------------------------------- Gaseous DM detectors have excellent background rejection capability for different kinds of backgrounds. First and foremost, direction sensitivity gives gas detectors the capability of statistically rejecting neutron and neutrino backgrounds. In addition, tracking also leads to extremely effective discrimination against x-ray and $\gamma$-ray backgrounds [@Snowden-Ifft:PRD2000; @Sciolla:2009fb]. The energy loss rates for recoils discussed in the previous section are hundreds of times larger than those of electrons with comparable total energy. The resulting much longer electron tracks are easily identified and rejected in any direction-sensitive detector. Finally, the measured rejection factors for gamma rays vs. nuclear recoils varies between 10$^4$ and 10$^6$ depending on the experiment [@Miuchi2007-58; @SnowdenIfft2003; @Dujmic2008-58]. Choice of Pressure ------------------ It can be shown that there is an optimum pressure for operation of any given direction sensitive WIMP recoil detector. This optimum pressure depends on the fill gas, the halo parameter set and WIMP mass, and the expected track length threshold for direction measurement. The total sensitive mass, and hence the total number of expected events, increases proportionally to the product of the pressure $P$ and the active volume $V$. Equation \[eq:range\] above shows that the range in atoms/cm$^2$ for WIMP recoils is approximately proportional to their energy. Since the corresponding range in cm is inversely proportional to the pressure ($R \propto E_r/P$), the energy threshold imposed by a particular minimum track length $E_{r,min}$ will scale down linearly with decreasing pressure, $E_{r,min} \propto R_{min} P$, where $R_{min}$ is the shortest detectable track length. For the exponentially falling recoil energy spectrum of the isothermal halo [@SmithLewin1996] the fraction of recoils above a given energy threshold is proportional to $\exp(-E_{min}/E_0 r)$. Hence the rate of tracks longer than the tracking threshold R$_{min}$ will scale as $N \propto PV \exp(-\xi R_{min}P)$, with $\xi$ a track length factor depending on the target gas, WIMP mass, halo model, etc., and the track length threshold $R_{min}$ depending on the readout technology and the drift distance. This expression has a maximum at $P_{opt} = 1/[\xi R_{min}]$, which shows that the highest event rate is obtained by taking advantage of improvement in tracking threshold to run at higher target pressure. Operating at this optimum pressure, the track-able event rate still scales as $P_{opt}V$, which increases linearly as the tracking threshold decreases. Achieving the shortest possible tracking threshold $R_{min}$ is seen to be the key to sensitive experiments of this type. Tracking Limit due to Diffusion ------------------------------- Diffusion of track charge during its drift to the readout plane sets the ultimate limit on how short a track can be measured in a TPC. Diffusion in gases has a rich phenomenology for which only a simplified discussion is given here. More complete discussion with references to the literature is given by Rolandi and Blum [@RnB]. For low values of electric fields, elementary kinetic theory arguments predict equal transverse and longitudinal diffusion to the drift field $E_d$, with the rms diffusion spread $\delta$ given by $$\label{eq:diff} \delta = \sqrt{\frac{2kTL}{eE_d}} = 0.7 mm \sqrt{\frac{[L/1m]}{[E_d/1 kV/cm]}}.$$ Here $k$ is the Boltzmann constant, $T$ the gas temperature, and $L$ the drift distance. No pressure or gas dependence appears in this equation. The diffusion decreases inversely as the square root of the applied drift field. Increasing the drift field would appear to allow diffusion to be reduced as much as desired, allowing large detectors to be built while preserving good tracking resolution. However, in reality diffusion is not so easily controlled. The low-field approximation given by Equation \[eq:diff\] holds only below a certain maximum drift field value $E_d^{max}$, which depends on the pressure and target gas. The drift field must not violate the condition $eE_d^{max} \lambda << kT$, where the effective mean free path $\lambda = 1/f n \sigma$ decreases inversely as the pressure. Here $\sigma$ is the average total cross section for scattering of the drifting species on the fill gas molecules, $n$ is the number density of molecules, and $f$ is an energy-exchange-efficiency factor for the scattering of charge carriers from gas molecules. This condition amounts to requiring that the work done by the drift field on a charge carrier between collisions and not lost to collisions, must be much smaller than the carrier’s thermal energy. If this condition is fulfilled it will ensure that the drifting carriers’ random (thermal) velocity remains consistent with the bulk gas temperature. A larger scattering cross section $\sigma$ or a more effective energy exchange due to strong inelastic scattering processes will lead to a shorter effective mean free path and a larger value of $E_d^{max}$. Importantly, $E_d^{max}$ for electrons in a given gas generally scales inversely as the pressure, as would be expected from the presence of the mean free path in the “low field" condition. If the drift field exceeds $E_d^{max}$, the energy gained from the drift field becomes non-negligible. The average energy of drifting charge carriers begins to increase appreciably, giving them an effective temperature $T_{eff}$ which can be orders of magnitude larger than that of the bulk gas. Under these conditions, the kinetic theory arguments underlying equation \[eq:diff\] remain approximately valid if the gas temperature $T$ is replaced by $T_{eff}$. Diffusion stops dropping with increasing drift field and may rapidly [ *increase*]{} in this regime, with longitudinal diffusion increasing more rapidly than transverse. Values of $E_d^{max}/P$ for electrons drifting in various gases and gas mixtures vary from $\sim$0.1–1 V/cm/Torr at 300 K [@SauliBible; @Caldwell]. With drift fields limited to this range and a gas pressure of $\sim$ 50 Torr, the rms diffusion for a 1 meter drift distance would be several mm, severely degrading the tracking resolution. Effects of diffusion can be significantly reduced by drifting negative ions instead of electrons [@Martoff2000; @Martoff2009; @Ohnuki:NIMA2001]. Electronegative vapors have been found which, when mixed into detector gases, reversibly capture primary ionization electrons within $\sim$ 100 $\mu$m of their creation. The resulting negative ions drift to the gain region of the chamber, where collisional processes free the electrons and initiate normal Townsend avalanches [@Dion2009]. Ions have E$_d^{max}$ values corresponding to E/P = 20 V/cm Torr and higher. This is because the ions’ masses are comparable to the gas molecules, so the energy-exchange-efficiency factor $f$ which determines $E_d^{max}$ is much larger than for electrons. Ion-molecule scattering cross sections also tend to be larger than electron-molecule cross sections. The use of negative ion drift in TPCs would allow sub-millimeter rms diffusion for drift distances of 1 meter or larger, although total drift voltage differences in the neighborhood of 100 kV would be required. The above outline shows that diffusion places serious constraints on the design of detectors with large sensitive mass and millimeter track resolution, particularly when using a conventional electron drift TPC. Challenges of Directional Detection ------------------------------------ The current limits on spin-independent interactions of WIMPs in the 60 GeV/c$^2$ mass range have been set using 300-400 kg-day exposures, for example by the XENON10 [@XENON2008] and CDMS [@CDMS2009] experiments. Next generation non-directional experiments are being planned to achieve zero background with hundreds or thousands of times larger exposures [@Arisaka2009]. To be competitive, directional detectors should be able to use comparable exposures. However, integrating large exposures is particularly difficult for low-pressure gaseous detectors. A fiducial mass of a few tons will be necessary to observe DM-induced nuclear recoils for much of the theoretically-favored range of parameter space [@Jungman1996]. This mass of low-pressure gas would occupy thousands of cubic meters. It is, therefore, key to the success of the directional DM program to develop detectors with a low cost per unit volume. Since for standard gaseous detectors the largest expense is represented by the cost of the readout electronics, it follows that a low-cost read-out is essential to make DM directional detectors financially viable. Dark Matter TPC Experiments =========================== Early History of Direction-Sensitive WIMP Detectors --------------------------------------------------- As early as 1990, Gerbier [*et al.*]{} [@Gerbier1990] discussed using a hydrogen-filled TPC at 0.02 bar, drifting electrons in a 0.1 T magnetic field to detect proton recoils from Dark Matter collisions. This proposal was made in the context of the “cosmion", a then-current WIMP candidate with very large (10$^{-36}$ cm$^2$) cross section for scattering on protons. These authors explicitly considered the directional signature, but they did not publish any experimental findings. A few years later, the UCSD group led by Masek [@Buckland1994] published results of early trials of the first detector system specifically designed for a direction-sensitive Dark Matter search. This pioneering work used optical readout of light produced in a parallel plate avalanche counter (PPAC) located at the readout plane of a low-pressure TPC. The minimum discernible track length was about 5 mm. Electron diffusion at low pressures and its importance for the performance of gas detectors was also studied [@MattDiff]. This early work presaged some of the most recent developments in the field, described in section \[DMTPC\]. DRIFT ----- The DRIFT-I collaboration [@Snowden-Ifft:PRD2000] mounted the first underground experiment designed for direction sensitive WIMP recoil detection [@Alner2004]. Re-designed detectors were built and further characterization measurements were performed by the DRIFT-II [@Lawson2005] collaboration. Both DRIFT detectors were cubical 1 m$^3$ negative-ion-drifting TPCs with two back-to-back 0.5 m drift spaces. To minimize material possibly contributing radioactive backgrounds, the central drift cathode was designed as a plane of 20 micron wires on 2 mm pitch. The endcap MWPCs used 20 $\mu$m anode wires on 2 mm-pitch, read out with transient digitizers. In DRIFT-II the induced signals on grid wires between the MWPC anode and the drift space were also digitized. DRIFT-I had an amplifier- and digitizer-per-wire readout, while DRIFT-II signals were cyclically grouped onto a small number of amplifiers and digitizers. Both detectors used the negative ion drift gas CS$_2$ at nominally 40 Torr, about one eighth of the atmospheric pressure. The 1 m$^3$ volume gave approximately 170 grams of target mass per TPC. The CS$_2$ gas fill allowed diffusion suppression by running with very high drift fields despite the low pressure. DRIFT-II used drift fields up to 624 V/cm (16 V/cm/Torr). The detectors were calibrated with alpha particles, $^{55}$Fe x-rays and $^{252}$Cf neutrons. Alpha particle Bragg peaks and neutron recoil events from sources were quickly seen after turn-on of DRIFT-I underground in 2001. Neutron exposures gave energy spectra in agreement with simulations when the energy per ion pair W was adjusted in accordance with the discussion of ionization yields given above. Simulations of DRIFT-II showed that the detector and software analysis chain had about 94% efficiency for detection of those $^{252}$Cf neutron recoils producing between 1000 and 6000 primary ion pairs, and a $^{60}$Co gamma-ray rejection ratio better than a few times 10$^{-6} $ [@drift_II_n]. A study of the direction sensitivity of DRIFT-II for neutron recoils [@driftIIfb] showed that a statistical signal distinguishing the beginning and end of Sulfur recoil tracks (“head-tail discrimination") was available, though its energy range and statistical power was limited by the 2 mm readout pitch. At present two 1 m$^3$ DRIFT-II modules are operating underground. Backgrounds due to radon daughters implanted in the internal surfaces of the detector [@drift_II_n] are under study and methods for their mitigation are being developed. The absence of nonzero spin nuclides in the CS$_2$ will require a very large increase in target mass or a change of gas fill in order to detect WIMPs with this device. Dark Matter Searches Using Micropattern Gas-Gain Devices -------------------------------------------------------- It was shown above that the event rate and therefore the sensitivity of an optimized tracking detector improves linearly as the track length threshold gets smaller. In recent years there has been widespread development of gas detectors achieving very high spatial resolution by using micropatterned gain elements in place of wires. For a recent overview of micropattern detector activity, see Ref. [@pos-sens]. These devices typically have 2-D arrays of individual gain elements on a pitch of $\sim$ 0.1 mm. Rows of elements [@Black2007] or individual gain elements can be read out by suitable arrangements of pickup electrodes separate from the gain structures, or by amplifier-per-pixel electronics integrated with the gain structure [@medipix]. Gain-producing structures known as GEM (Gas Electron Multiplier [@gem]) and MicroMegas (MICRO-MEsh GAseous Structure [@Giomataris1996]) have found particularly wide application. The gas CF$_4$ also figures prominently in recent micropattern Dark Matter search proposals. This gas was used for low background work in the MUNU experiment [@munu] and has the advantage of high $E_d^{max}$, allowing relatively low diffusion for electron drift at high drift field and reduced pressure [@Dujmic2008-327; @Christo1996; @Caldwell], though it does not approach negative ions in this regard. Containing the odd-proton nuclide $^{19}$F is also an advantage since it confers sensitivity to purely spin-coupled WIMPs [@Ellis1991], allowing smaller active mass experiments to be competitive. Another attractive feature of CF$_4$ is that its Townsend avalanches copiously emit visible and near infrared light [@Pansky1995; @Kaboth2008; @Fraga2003], allowing optical readout as in the DMTPC detector discussed in section \[DMTPC\]. The ultraviolet part of the spectrum may also be seen by making use of a wavelength shifter. Finally, CF$_4$ is non-flammable and non-toxic, and, therefore, safe to operate underground. The NEWAGE project is a current Dark Matter search program led by a Kyoto University group. This group has recently published the first limit on Dark Matter interactions derived from the absence of a directional modulation during a 0.15 kg-day exposure [@Miuchi2007-58]. NEWAGE uses CF$_4$-filled TPCs with a microwell gain structure [@Miuchi2003; @Tanimori2004; @Miuchi2007-43]. The detector had an active volume of 23 x 28 x 30 cm$^3$ and contained CF$_4$ at 150 Torr. Operation at higher-than-optimal gas pressure was chosen to enhance the HV stability of the gain structure. The chamber was read out by a single detector board referred to as a “$\mu$-PIC", preceded by a GEM for extra gas gain. The $\mu$-PIC has a micro-well gain structure produced using multi-layer printed circuit board technology. It is read out on two orthogonal, 400 micron-pitch arrays of strips. One array is connected to the central anode dots of the micro-well gain structure, and the other array to the surrounding cathodes. The strip amplifiers and position decoding electronics are on-board with the gain structures themselves, using an 8 layer PCB structure. The detector was calibrated with a $^{252}$Cf neutron source. Nuclear recoils were detected and compared to a simulation, giving a detection efficiency rising from zero at 50 keV to 90% near 250 keV. For comparison, the maximum energy of a $^{19}$F recoil from an infinitely heavy WIMP with the galactic escape speed is about 180 keV. The measured rejection factor for $^{137}$Cs gamma rays was about 10$^{-4}$. The angular resolution was reported as 25$^{\circ}$ HWHM. Measurement of the forward/backward sense of the tracks (“head-tail" discrimination) was not reported. Another gaseous Dark Matter search collaboration known as MIMAC [@santos2006] is led by a group at IPN Grenoble, and has reported work toward an electronically read-out direction sensitive detector. They proposed the use of $^3$He mixtures with isobutane near 1 bar, and also CF$_4$ gas fills to check the dependence on the atomic number A of any candidate Dark Matter signal. The advantages claimed for $^3$He as a Dark Matter search target include nonzero nuclear spin, low mass and hence sensitivity to low WIMP masses, and a very low Compton cross section which suppresses backgrounds from gamma rays. The characteristic (n,p) capture interaction with slow neutrons gives a strong signature for the presence of slow neutrons. The ionization efficiency of $\sim$ 1 keV $^3$He recoils is also expected to be very high, allowing efficient detection of the small energy releases expected for this target and for light WIMPs. A micropattern TPC with $\sim$ 350 $\mu$m anode pitch was proposed to obtain the desired electron rejection factor at a few keV. The MIMAC collaboration uses an ion source to generate monoenergetic $^3$He and F ions for measuring the ionization yield in their gas mixtures [@Guillaudin:2009fp]. DMTPC {#DMTPC} ----- The Dark Matter Time Projection Chamber (DMTPC) collaboration has developed a new detector concept [@Sciolla:2009fb] that addresses the issue of scalability of directional Dark Matter detectors by using optical readout, a potentially very inexpensive readout solution. The DMTPC detector [@Sciolla:2008ak; @Sciolla:2008mpla] is a low-pressure TPC filled with CF$_4$ at a nominal pressure of 50 torr. The detector is read out by an array of CCD cameras and photomultipliers (PMTs) mounted outside the vessel to reduce the amount of radioactive material in the active volume. The CCD cameras image the visible and near infrared photons that are produced by the avalanche process in the amplification region, providing a projection of the 3-D nuclear recoil on the 2-D amplification plane. The 3-D track length and direction of the recoiling nucleus is reconstructed by combining the measurement of the projection along the amplification plane (from pattern recognition in the CCD) with the projection along the direction of drift, determined from the waveform of the signal from the PMTs. The sense of the recoil track is determined by measuring dE/dx along the length of the track. The correlation between the energy of the recoil, proportional to the number of photons collected in the CCD, and the length of the recoil track provides an excellent rejection of all electromagnetic backgrounds. Several alternative implementations of the amplification region [@Dujmic2008-58] were developed. In a first design, the amplification was obtained by applying a large potential difference ($\Delta$V = 0.6–1.1 kV) between a copper plate and a conductive woven mesh kept at a uniform distance of 0.5 mm. The copper or stainless steel mesh was made of 28 $\mu$m wire with a pitch of 256 $\mu$m. In a second design the copper plate was replaced with two additional woven meshes. This design has the advantage of creating a transparent amplification region, which allows a substantial cost reduction since a single CCD camera can image tracks originating in two drift regions located on either side of a single amplification region. The current DMTPC prototype [@dujmicICHEP] consists of two optically independent regions contained in one stainless steel vessel. Each region is a cylinder with 30 cm diameter and 20 cm height contained inside a field cage. Gas gain is obtained using the mesh-plate design described above. The detector is read out by two CCD cameras, each imaging one drift region. Two f/1.2 55 mm Nikon photographic lenses focus light onto two commercial Apogee U6 CCD cameras equipped with Kodak 1001E CCD chips. Because the total area imaged is $16\times16$ cm$^2$, the detector has an active volume of about 10 liters. For WIMP-induced nuclear recoils of 50 keV, the energy and angular resolutions obtained with the CCD readout were estimated to be $\approx$ 15% and 25$^{\circ}$, respectively. This apparatus is currently being operated above ground with the goal of characterizing the detector response and understanding its backgrounds. A second 10-liter module is being constructed for underground operations at the Waste Isolation Pilot Plant (WIPP) in New Mexico. A 5.5 MeV alpha source from $^{241}$Am is used to study the gain of the detector as a function of the voltage and gas pressure, as well as to measure the resolution as a function of the drift distance of the primary electrons to quantify the effect of the transverse diffusion. These studies [@Dujmic2008-327; @Caldwell] show that the transverse diffusion allows for a sub-millimeter spatial resolution in the reconstruction of the recoil track for drift distances up to 20–25 cm. The gamma ray rejection factor, measured using a $^{137}$Cs source, is better than 2 parts per million [@Dujmic2008-327]. The performance of the DMTPC detector in determining the sense and direction of nuclear recoils has been evaluated by studying the recoil of fluorine nuclei in interaction with low-energy neutrons. The initial measurements were obtained running the chamber at 280 Torr and using 14 MeV neutrons from a deuteron-triton generator and a $^{252}$Cf source. The “head-tail” effect was clearly observed [@Dujmic2008-327; @Dujmic:2008iq] for nuclear recoils with energy between 200 and 800 keV. Better sensitivity to lower energy thresholds was achieved by using higher gains and lowering the CF$_4$ pressure to 75 torr. These measurements demonstrated [@Dujmic2008-58] “head-tail” discrimination for recoils above 100 keV, and reported a good agreement with the predictions of the SRIM [@SRIM] simulation. “Head-tail” discrimination is expected to extend to recoils above 50 keV when the detector is operated at a pressure of 50 torr. To evaluate the event-by-event “head-tail” capability of the detector as a function of the energy of the recoil, the DMTPC collaboration introduced a quality factor $Q(E_R) = \epsilon(E_R) \times (1 - 2 w(E_R))^2$, where $\epsilon$ is the recoil reconstruction efficiency and $w$ is the fraction of wrong “head-tail” assignments. The $Q$ factor represents the effective fraction of reconstructed recoils with “head-tail” information, and the error on the “head-tail” asymmetry scales as $1/\sqrt(Q)$. Early measurements demonstrated a $Q$ factor of 20% at 100 keV and 80% at 200 keV [@Dujmic2008-58]. The DMTPC collaboration is currently designing a 1-m$^3$ detector. The apparatus consists of a stainless steel vessel of 1.3 m diameter and 1.2 m height. Nine CCD cameras and nine PMTs are mounted on each of the top and bottom plates of the vessel, separated from the active volume of the detector by an acrylic window. The detector consists of two optically separated regions. Each of these regions is equipped with a triple-mesh amplification device, located between two symmetric drift regions. Each drift region has a diameter of 1.2 m and a height of 25 cm, for a total active volume of 1 m$^3$. A field cage made of stainless steel rings keeps the uniformity of the electric field within 1% in the fiducial volume. A gas system recirculates and purifies the CF$_4$. When operating the detector at a pressure of 50 torr, a 1 m$^3$ module will contain 250 g of CF$_4$. Assuming a detector threshold of 30 keVee (electron-equivalent energy, corresponding to nuclear recoil energy threshold $\sim$ 50 keV), and an overall data-taking efficiency of 50%, a one-year underground run will yield an exposure of 45 kg-days. Assuming negligible backgrounds, such an exposure will allow the DMTPC collaboration to improve the current limits on spin-dependent interactions on protons by about a factor of 50 [@Dujmic2008-58]. Conclusion ============ Directional detectors can provide an unambiguous positive observation of Dark Matter particles even in presence of insidious backgrounds, such as neutrons or neutrinos. Moreover, the dynamics of the galactic Dark Matter halo will be revealed by measuring the direction of the incoming WIMPs, opening the path to WIMP astronomy. In the past decade, several groups have investigated new ideas to develop directional Dark Matter detectors. Low-pressure TPCs are best suited for this purpose if an accurate (sub-millimeter) 3-D reconstruction of the nuclear recoil can be achieved. A good tracking resolution also allows for an effective rejection of all electromagnetic backgrounds, in addition to statistical discrimination against neutrinos and neutrons based on the directional signature. The choice of different gaseous targets makes these detectors well suited for the study of both spin-dependent (CS$_2$) or spin-independent (CF$_4$ and $^3$He) interactions. A vigorous R&D program has explored both electronic and optical readout solutions, demonstrating that both technologies can effectively and efficiently reconstruct the energy and vector direction of the nuclear recoils expected from Dark Matter interactions. The challenge for the field of directional Dark Matter detection is now to develop and deploy very sensitive and yet inexpensive readout solutions, which will make large directional detectors financially viable. Acknowledgments {#acknowledgments .unnumbered} =============== The authors are grateful to D. Dujmic and M. Morii for useful discussions and for proofreading the manuscript. G. S. is supported by the M.I.T. Physics Department and the U.S. Department of Energy (contract number DE-FG02-05ER41360). C. J. M. is supported by Fermilab and Temple University. References {#references .unnumbered} ========== [^1]: A homoatomic molecular entity is a molecular entity consisting of one or more atoms of the same element. [^2]: The scale factors are (in cgs-Gaussian units): $E_{TF} = \frac{e^2}{a} Z_i Z_T \frac{M_i +M_T}{M_T}$, $R_{TF} = \frac{1}{4 \pi a^2 N} \frac{(M_i + M_T)^2}{M_i M_T}$. Here, $N$= number density of target atoms, subscripts i and T refer to the incident particle and the target substance, and $a = a_0 \frac{.8853}{\sqrt{Z_i ^{2/3} + Z_T ^{2/3}}} $, with $a_0$ the Bohr radius. [^3]: The parameter $k \stackrel{.}{=} \frac{0.0793Z_1^{1/6}}{(Z_1^{2/3} + Z_2^{2/3})^{3/4}} \left[\frac{Z_1Z_2(A_1+A_2)^3}{A_1^3A_2}\right] ^{1/2}$ becomes substantially larger only for light recoils in heavy targets.
{ "pile_set_name": "ArXiv" }
GREATER ....a study of the book of Hebrews A sermon series by Jay Lovelace....beginning February 18, 2018 ANNOUNCEMENTS AND HAPPENINGS... This week and next... AWANA...February 21 - Regular Night! Begins at 6:30 p.m.Small Groups…The Friday Small Groups will meet on February 23 at 6:30 p.m.; the Lovelace group at the Wilson’s home and the Barker group at the church. AWANA Grand Prix Garage...Kids, if you want advice on your race car for the Grand Prix or time to test the ride, come to the church at 9:00 a.m. on Saturday, February 24. Volunteers will be there to help you with any finishing touches. (Note: the Grand Prix will be held on Saturday, March 3, beginning at 10:00 a.m.). Prayer Meeting...February 25 at 4:30 p.m. at the church Defending Your Faith...Join Marty Engel on Monday, February 26 for discussion time about everyday questions that Christians are asked of nonbelievers. Mark your calendars!
{ "pile_set_name": "Pile-CC" }