text
stringlengths
4
3.53M
meta
dict
India, China not responsible for oil price rise: Deora New Delhi, July 3 (IANS) Blaming India and China for the oil price hike is “completely devoid of merit”, Indian petroleum minister Murli Deora told the World Petroleum Congress in Madrid Thursday. Oil prices again broke another record Thursday with Brent crude, sourced from the North Sea, rising over $146 a barrel in London. Oil prices are now more than five times their level seven years ago. “A small section of the oil analysts has been ascribing the relentless rise in crude prices in recent months to the spurt in demand for oil from India and China. I wish to take this opportunity to set the record straight,” Deora said. The minister said while the two Asian giants accounted for one-third of the world’s population, their combined oil consumption is less than one-eighth of global consumption. “And, with steadily declining energy intensity, both our countries are registering rapid economic growth with less than proportionate increase in oil demand,” Deora said, adding that the high rate of growth in the two countries was a “significant factor in ensuring stable and orderly growth of world economy”. Further, he noted, India’s surplus refining capacity has a “sobering effect” on prices of refined oil products as it reduced the imbalance between demand and supply. “Given these facts, we are of the firm view that attribution of high crude prices to rising demand from India and China is completely devoid of merit and misses the wood for the trees,” he said. Deora also justified India’s subsidy on motor and cooking fuels, saying the current volatility of the market made it imperative for states to have a buffer. “While we agree that fuel subsidies may have a negative impact on the energy market in the long run, the current volatility in international oil prices and its potential for destabilizing emerging economies makes state intervention in pricing of life-line fuels inevitable,” he said. At the same time, he said, subsidising prices of “life-line fuels” was important to protect the weaker sections of society. Last month, the government had increased fuel prices of petrol and diesel by Rs.5 and Rs.3 a litre, respectively. This had had been greeted by protests from opposition parties. Truckers in India are also on an indefinite strike to protest against this hike. Deora said the government had a five-pronged strategy to enhance energy security and maintain an economic growth of 9 to 10 percent. These five steps are increasing domestic exploration and production activities, acquiring oil and gas assets abroad, developing alternate sources of oil and gas, oil conservation and implementation of environment-friendly policies, and establishing a strategic storage of crude oil.
{ "pile_set_name": "Pile-CC" }
The second one doesn't like right imo, the contrast of a simple 2d image with a 3d background isn't workin for me. The first and last one are nice tho. Can someone explain to me what Android is? I've kinda been living in a cave (not literally) lately. The second one doesn't like right imo, the contrast of a simple 2d image with a 3d background isn't workin for me. The first and last one are nice tho. Can someone explain to me what Android is? I've kinda been living in a cave (not literally) lately. The second one doesn't like right imo, the contrast of a simple 2d image with a 3d background isn't workin for me. The first and last one are nice tho. Can someone explain to me what Android is? I've kinda been living in a cave (not literally) lately. Click to expand... its google mobile OS, the equivalent of windows mobile or the iphone OS
{ "pile_set_name": "Pile-CC" }
Geneva is a minimalist personal or corporate vCard template based on nine tiles. Each tile is a separate page, including typical descriptive pages like about, services or testimonials, portfolio pages with image … Go Green and save the world. This slogan represents a modern minimalistic and clean Wordpress Theme. Coming with a shortcode generator you`re able to present your business, private portfolio, artwork or photography … Gridlocked is a grid-based, post-format supporting, layout-shuffling, minimalistic theme for creatives. It is both a cl*ssic portfolio for showcasing your work and a modern tumblr-style blogging system. A truly … WordPress Halo Theme is a brand new timeless Portfolio Theme with some really stunning Features but still as clean and minimalistic as possible, concentrating the focus of Your Visitors absolutely on Your Work. … HomeBuilder is a Premium Real Estate WordPress Themes with clean and simple interface. Theme is very simple to use and and get up running with just a click of button. It allow you to create dynamic listing of your … Hoon is a unique theme with a simple design packed with a variety of advanced features. Built with HTML5, Hoon features a custom audio player with playlist capabilities to play on all devices, desktop to mobile. … Huraga is a beautifully minimalistic HTML5 template for any backend, user interface or administration, both for desktop and mobile users. Built on latest Twitter Bootstrap and powered with LESS , Huraga will save … Imperia is Premium Html Template Designed with Minimal yet Professional Approach. It comes with Unique Fullscreen Layout with Fixed Header & Footer. The Minimalistic Design is Perfect for Personal Portfolio …
{ "pile_set_name": "Pile-CC" }
Network changes starting Jeffrey Hsu and Matt Dillon’s network changes are being committed – the first third is in, according to a commit by Matt. Matt describes the plan thusly: “Basically the goal of this work is to isolate and serialize PCBs in specific threads in order to (A) not have to lock them and (B) improve cache locality for ISR processing loops as well as for data. Isolating a network PCB means dealing with the points where the PCB talks to other parts of the system. There are three points where this happens: incoming packets go through preprocessing (e.g. IP) before being routed to the target protocol & PCB (e.g. TCP and UDP). One Reply to “Network changes starting” Each socket’s protocol state is maintained in a data structure called a Protocol Control Block (PCB). TCP maintains a table of the active PCBs in the system. A PCB is created when a socket is created, either as a result of a system call, or as a result of a new connection being established.
{ "pile_set_name": "Pile-CC" }
menu "Android" config ANDROID bool "Android Drivers" default N ---help--- Enable support for various drivers needed on the Android platform if ANDROID config ANDROID_BINDER_IPC bool "Android Binder IPC Driver" default n config ASHMEM bool "Enable the Anonymous Shared Memory Subsystem" default n depends on SHMEM || TINY_SHMEM help The ashmem subsystem is a new shared memory allocator, similar to POSIX SHM but with different behavior and sporting a simpler file-based API. config ANDROID_LOGGER tristate "Android log driver" default n config LOGCAT_SIZE int "Adjust android log buffer sizes" default 256 depends on ANDROID_LOGGER help Set logger buffer size. Enter a number greater than zero. Any value less than 256 is recommended. Reduce value to save kernel static memory size. config ANDROID_PERSISTENT_RAM bool depends on HAVE_MEMBLOCK select REED_SOLOMON select REED_SOLOMON_ENC8 select REED_SOLOMON_DEC8 config ANDROID_RAM_CONSOLE bool "Android RAM buffer console" depends on !S390 && !UML && HAVE_MEMBLOCK select ANDROID_PERSISTENT_RAM default n config ANDROID_PERSISTENT_RAM_EXT_BUF bool "Allow printing to old persistent ram" default n depends on ANDROID_RAM_CONSOLE && ANDROID_PERSISTENT_RAM help Adding function which can print to old persistent ram. It accepts similar parameters as printk. Content printed will be visible in last_kmsg. If unsure, say N. config PERSISTENT_TRACER bool "Persistent function tracer" depends on HAVE_FUNCTION_TRACER select FUNCTION_TRACER select ANDROID_PERSISTENT_RAM help persistent_trace traces function calls into a persistent ram buffer that can be decoded and dumped after reboot through /sys/kernel/debug/persistent_trace. It can be used to determine what function was last called before a reset or panic. If unsure, say N. config ANDROID_TIMED_OUTPUT bool "Timed output class driver" default y config ANDROID_TIMED_GPIO tristate "Android timed gpio driver" depends on GENERIC_GPIO && ANDROID_TIMED_OUTPUT default n config ANDROID_LOW_MEMORY_KILLER bool "Android Low Memory Killer" default N ---help--- Register processes to be killed when memory is low config ANDROID_LOW_MEMORY_KILLER_AUTODETECT_OOM_ADJ_VALUES bool "Android Low Memory Killer: detect oom_adj values" depends on ANDROID_LOW_MEMORY_KILLER default y ---help--- Detect oom_adj values written to /sys/module/lowmemorykiller/parameters/adj and convert them to oom_score_adj values. source "drivers/staging/android/switch/Kconfig" config ANDROID_INTF_ALARM_DEV bool "Android alarm driver" depends on RTC_CLASS default n help Provides non-wakeup and rtc backed wakeup alarms based on rtc or elapsed realtime, and a non-wakeup alarm on the monotonic clock. Also exports the alarm interface to user-space. config ANDROID_DEBUG_FD_LEAK bool "Android file descriptor leak debugger" default n ---help--- This Motorola Android extension helps debugging file descriptor leak bugs by dumping the backtrace of the culprit thread which is either creating a big file descriptor or injecting a big file descriptor into another process. A file descriptor is big when it is no less than CONFIG_ANDROID_BIG_FD. In Motorola Android platform, this feature is enabled in eng and userdebug build, and disabled in user build, same as the helsmond feature which is controlled by the HELSMON_INCL build variable. config ANDROID_BIG_FD int "Minimum value of a big file descriptor" depends on ANDROID_DEBUG_FD_LEAK default 512 ---help--- Set this value to one that is unlikely reached by well-behaved processes which have no file descriptor leak bugs, but likely reached by the processes which do leak file descriptors. If this value is undefined but CONFIG_ANDROID_DEBUG_FD_LEAK is enabled, the value (__FD_SETSIZE / 2) will be assumed. config ANDROID_LMK_ADJ_RBTREE bool "Use RBTREE for Android Low Memory Killer" depends on ANDROID_LOW_MEMORY_KILLER default N ---help--- Use oom_score_adj rbtree to select the best proecss to kill when system in low memory status. config ANDROID_BG_SCAN_MEM bool "SCAN free memory more frequently" depends on ANDROID_LOW_MEMORY_KILLER && ANDROID_LMK_ADJ_RBTREE && CGROUP_SCHED default N ---help--- Add more free-memory check point. Such as, when a task is moved to background task groups, we can trigger low memory killer to scan memory and decide whether it needs to reclaim memory by killing tasks. endif # if ANDROID endmenu
{ "pile_set_name": "Github" }
[Effect of bafilomycin A1 on proliferation and oxaliplatin sensitivity in gastric cancer MGC-803 cells]. To investigate the effect of bafilomycin A1 (BAF) on the cell proliferation, invasiveness, apoptosis, and oxaliplatin sensitivity in gastric cancer MGC-803 cells. MGC-803 cells were divided into control group, BAF group, oxaliplatin group, and BAFµ oxaliplatin group. MTT assay and plate clone formation assay were used to assess the viability and colony forming ability of the cells after the treatments. The expression of nucleosomes in the cells was examined with ELISA. The cell migration and invasion after the treatments were evaluated. Western blotting was performed to detect the expression of Bcl-2 and Bax in the treated cells, and scanning electron microscopy, immunohistochemistry and Western blotting were employed to to observe the cell autophagy. Compared with the control cells, the cells treated with BAF showed a substantial decrease in autophagosome accumulation with attenuated cell proliferation, migration and invasion. Compared with cells treated with oxaliplatin alone, the cells treated with both BAF and oxaliplatin showed significantly lowered autophagosome accumulation, suppressed cell proliferation, migration and invasion, increased cell apoptosis, increased Bax expression and lowered Bcl-2 expression. BAF can inhibit the proliferation and invasiveness of MGC-803 cells, promote cell apoptosis by inhibiting autophagy, and enhances the sensitivity of the cells to oxaliplatin.
{ "pile_set_name": "PubMed Abstracts" }
Foundation reinforcement in Stockholm Central station Download the Case Study as PDF-files: The Stockholm Central station has been sinking 1 mm per year and needed reinforcement of the foundation. This was done by drilling and setting casing all the way down to the bedrock. Niches were cut out from the side of the existing foundation walls, big enough to allow access for a small drill rig. Wassaras water-powered DTH hammer was prescribed for the project as the environment was sensitive in several ways. Foundation reinforcement The landlord Jernhusen hired the construction and project management company Forsenprojekt for the reinforcement project. The contractor Lemminkäinen was awarded the contract for the later part of the foundation works. This part of the project included the installation of 428 steel piles, placed every second meter in the foundation wall and down into the bedrock. The sensitive environment demanded as benign drilling as possible. No noisy machinery or dust in the air was allowed. Any vibrations must be kept at a minimum. The water-powered drilling with Wassara is the only percussion drilling technology that meets these demands. A project with many particular demands As parts of the building are listed as a National Heritage, strict national laws applies; the building must not be damaged. The available workspace for the operation was quite cramped, due to bulky foundation walls. To further complicate the works, multiple parallel construction projects were running at the same time. As the public area was in full operation, some 200 000 commuters were passing very close to the drill site every day. This pushed the environmental aspects with low noise even further. It also made the moving of drill rigs and other machinery limited to off-peak hours. Drilling inside the foundation walls Niches were cut out from the side of the foundation walls, big enough to allow access for a small drill rig. The drilling and casing advancing was done all the way down to the bedrock, an average of 16 meters. The formation was full of oak logs that had to be drilled through. After the casing was set, arrangements were made in the walls to enable the support of the new pillars. This was repeated every second meter of the wall. Creating new space The Central station’s lower hall accommodates several stores and small shops. In order to create more space, the number of the rather bulky foundation walls needed to be minimized in this area. Some 3 600 m2 of new area has been created in the lower hall. This was achieved by excavation of new areas and lowering of the floor level, as well as replacing bulky walls with supporting steel pillars. Pleased contractor: The drilling went as planned, he says. When drilling indoors, we arranged for the return water to be collected and pumped away. The oak logs didn’t cause too much of a problem. Our biggest challenge was the logistics; working so close to the 200 000 commuters that walked by every day as it demanded special arrangements for our machinery and hoses. Oskar Nillsson Site manager, Lemminkäinen The new pillars (in the bottom) are now supporting the foundation. The niche is ready to be closed and filled with concrete. (Photo courtesy of Lemminkäinen) Setting up for the next casing, indoors under the Central Station. (Photo courtesy of Lemminkäinen)
{ "pile_set_name": "Pile-CC" }
Tag Challenge The Tag Challenge is a social gaming competition, with a US$5,000 reward, in which participants were invited to find five "suspects" in a simulated law enforcement search in five different cities throughout North America and Europe on March 31, 2012. It aimed to determine whether and how social media can be used to accomplish a realistic, time-sensitive, international law enforcement objective. The challenge was won by a team that located 3 of the 5 suspects. Challenge description The objective of the challenge was to be the first to locate and photograph five volunteer "suspects" in five different cities: Washington DC, New York City, London, Stockholm and Bratislava in Slovakia. At 8:00am local time, the organizers posted on their website a mug shot of each suspect on the day of the event. Each suspect wore a shirt bearing the event logo. The suspect’s face, dress, and the contest logo were clearly visible in each of the mug shots. Contestants used only this photograph and a brief description provided on the event website to identify each suspect. The photos would be verified through a unique code on both the front and back of the shirt, which was not revealed in a suspect’s mug shot but known only to the organizers. Participants had to make sure that the code phrase is clearly visible in each submission. The winning team or individual would receive up to US$5,000 in reward. The challenge was created by an international group of graduate students from six countries, led by George Washington University graduate student J.R. deLara. The challenge is advertised as an "independent, nonprofit event," but it is being sponsored by the US State Department and the US Embassy in Prague. Role of Social Media The scale of the challenge means that no single person or group of friends can tackle it on their own. Instead, winning was likely to rely on the ability to assemble a very large, ad hoc team of spotters. As such, the Tag Challenge is an example of crowdsourcing, an approach to accomplishing tasks by opening them to the public. It is similar to the DARPA Network Challenge, in which teams competed to locate 10 red weather balloons placed at random locations all over the United States. However, the Tag Challenge was expected to be significantly harder, due to the international distribution of the targets over so many countries and, more importantly, the fact that they were mobile. Teams Given the scale and geographical distribution of the challenge, the most likely winner was going to be a team rather than an individual. CrowdScanner: Organized by computer scientists from UCSD, Masdar Institute, and University of Southampton and led by Iyad Rahwan, this team included one of the winners of the DARPA Network Challenge. The strategy, based on the DARPA Network Challenge winning strategy, was as follows: "You receive $500 if you upload an image of a suspect that is accepted by the challenge organizers. If a friend you invited using your individualized referral link uploads an acceptable image of a suspect, YOU also get $100. Furthermore, recruiters of the first 2000 recruits who signed up by referral get $1 for each recruit they refer to sign up with us (using the individualized referral link)." TagTeam_: The Tag Teamgroup was run by a diverse group of individuals with backgrounds including international relations from the University of Chicago, statistics from Georgetown University, and computer science from the Massachusetts Institute of Technology and George Washington University. Their strategy was to promise to distribute whatever winnings they receive to local charities, the individuals who locate the suspects, and those who provide a reference to a person to locates the suspects. Outcome The challenge took place on March 31, 2012. Entries were accepted until noon, 12:00 pm, EST on April 1, 2012. The organizers announced the winning team to be CrowdScanner, having located 3 among the 5 targets. Analysis The winning team subsequently published extensive analysis of the data from their social media campaign. It was found that during the challenge, people were "able to consistently route information in a targeted fashion even under increasing time pressure." Using a model of social-media fueled global mobilization, the authors estimated that during the most time-critical portion of the challenge, one in three social messages were geographically targeted. A blog on MIT Technology Review dubbed this ability "12 hours of separation" in homage to the Six degrees of separation theory. References External links Tag Challenge Official Website GreenTagTeam Website Team Rave Website Tag Team Website Crowdscanner Team Website Category:Crowdsourcing
{ "pile_set_name": "Wikipedia (en)" }
Q: How to get user_authenticatedID in Application Insights for Azure Functions App? I have been going through several different resources to add this but it does not seem to be working. I would like to record the authenticated user as a request is made to my Azure function. I can obtain the authenticated user from the claims principal. I followed the docs to inject the Telemetry Configuration and instantiate the TelemetryClient with the configuration. I check the claims to see if they are null and if not I set TelemetryClient.Context.User.AuthenticatedId = claimsPrincipal.Identity.Name. However in the logs I am unable to see the field being populated. class{ private readonly TelemetryClient tc; public classConstructor(TelemetryConfiguration config){ tc = new TelemetryClient(congig) } public async Task<IActionResult> Run([HttpTrigger(AuthorizationLevel.Anonymous, "Get", Route = "user/session")] HttpRequest req, ILogger log, ClaimsPrincipal claimsPrincipal){ //null check on claimsprincipal tc.Context.User.UserAuthenticatedId = claimsPrincipal?.Identity?.Name; } startup class{ builder.Services.AddSingleton<TelemetryConfiguration>(provider => var telemetryConfiguration = new TelemetryConfiguration(); telemetryConfiguration.instrumentationKey = "key" return telemetryConfiguration; } A: I'm not sure where you want to show TelemetryClient.Context.User.AuthenticatedId. If you want to see it in Logs, you need to add: log.LogInformation(tc.Context.User.AuthenticatedUserId); If you want to see it in application insights, you need to use TrackTrace or TrackEvent: tc.TrackEvent("---------track-event" + tc.Context.User.AuthenticatedUserId); tc.TrackTrace("---------track-trace" + tc.Context.User.AuthenticatedUserId); Then you can see them in application insights(shown as below screenshot) Here provide my code for your reference: using System; using System.IO; using System.Threading.Tasks; using Microsoft.AspNetCore.Mvc; using Microsoft.Azure.WebJobs; using Microsoft.Azure.WebJobs.Extensions.Http; using Microsoft.AspNetCore.Http; using Microsoft.Extensions.Logging; using Newtonsoft.Json; using Microsoft.ApplicationInsights; using Microsoft.ApplicationInsights.Extensibility; using System.Security.Claims; using ikvm.runtime; using Microsoft.Azure.WebJobs.Hosting; using System.Linq; using Microsoft.Extensions.DependencyInjection; namespace FunctionApp6 { public class Function1 { private readonly TelemetryClient tc; public Function1(TelemetryConfiguration config) { this.tc = new TelemetryClient(config); } [FunctionName("Function1")] public async Task<IActionResult> Run( [HttpTrigger(AuthorizationLevel.Function, "get", "post", Route = null)] HttpRequest req, ILogger log, ClaimsPrincipal claimsPrincipal) { tc.Context.User.AuthenticatedUserId = "---userid---"; log.LogInformation(tc.Context.User.AuthenticatedUserId); tc.TrackEvent("---------track-event" + tc.Context.User.AuthenticatedUserId); tc.TrackTrace("---------track-trace" + tc.Context.User.AuthenticatedUserId); string responseMessage = "This HTTP triggered function executed successfully"; return new OkObjectResult(responseMessage); } public class MyStartup : IWebJobsStartup { public void Configure(IWebJobsBuilder builder) { var configDescriptor = builder.Services.SingleOrDefault(tc => tc.ServiceType == typeof(TelemetryConfiguration)); if (configDescriptor?.ImplementationFactory != null) { var implFactory = configDescriptor.ImplementationFactory; builder.Services.Remove(configDescriptor); builder.Services.AddSingleton(provider => { if (implFactory.Invoke(provider) is TelemetryConfiguration config) { var newConfig = TelemetryConfiguration.CreateDefault(); newConfig.ApplicationIdProvider = config.ApplicationIdProvider; newConfig.InstrumentationKey = config.InstrumentationKey; return newConfig; } return null; }); } } } } }
{ "pile_set_name": "StackExchange" }
Tuesday, June 11, 2013 We have been sick and eating nothing accept porridge for the past two weeks for each and every meal! Luckily the kids don't complain.... that much. I try to make a variety of porridge so that they don't get too bored. Adding just a little of this and taking out just a little bit of that gives the porridge a whole new distinct flavor. Hubby likes to have his porridge with marmite. I like it too but I find the taste so strong it kills off all of the other flavors within! Hopefully we will all recover soon and go back to our regular diet. I must say that all that porridge for two whole weeks did one thing for sure. It helped us all lose weight! Pin It Guide to Healthy Living Be Health Aware is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com
{ "pile_set_name": "Pile-CC" }
The Scariest Day Of My Life i just had my 4th child. finally a girl. i had 3 boys before her. she was so tiny when i had her. she only weighed 5 pounds when i took her home from the hospital. when she 6 weeks old i noticed she had this twitch in her legs. i took her to the docter and they said to just keep an eye on her. she maybe having seizures. about a week after that she started running a fever. i took her back to the docter and her oxygen level was really low. the gave her a breathing treatment and told me to take her to a childrens hospital in the city. wich is like 60 miles from where i live. i made it bout 20 miles and she started getting really pale and her lips was turning blue. i was speeding to try to get pulled over. i had to stop at the first fire station i came to. they took her and stopped at the 1st hospital they came to. by the time they got there, her fever was 104.5 and she was going into shock. they did a spinal tap on her and nuthin came back. they got her stabalized enough to take her the rest of the way to the children's hospital. for 2 days they couldn't figure out what was wrong with her. she kept getting worse. i couldn't even hold her because she hurt so bad when someone touched her. she was swelling up. her head, arms,legs , everything. then finally, they figured it out. she had kidney reflux. the worst grade of it is a 5 and she had it. 3 weeks in the icu she spent. the scariest moment of it all was when the priest came in and asked me if i wanted him to baptise her. for 3 years she had problems. it took 3 surgeries to fix it. i think there was an angel watchin over her cuz i would get these dreams a couple of days before she got sick every month. Would you dance of I asked you to dance? Would you run and never looked back? Would you cry if you saw me crying ? Would you save my soul tonight... Please tell me this? Hold me in your arms tonight. Would you lie would you run and hide Have I lost my mind I can kiss...
{ "pile_set_name": "Pile-CC" }
/***************************************************************************/ /* */ /* afscript.h */ /* */ /* Auto-fitter scripts (specification only). */ /* */ /* Copyright 2013, 2014 by */ /* David Turner, Robert Wilhelm, and Werner Lemberg. */ /* */ /* This file is part of the FreeType project, and may only be used, */ /* modified, and distributed under the terms of the FreeType project */ /* license, LICENSE.TXT. By continuing to use, modify, or distribute */ /* this file you indicate that you have read the license and */ /* understand and accept it fully. */ /* */ /***************************************************************************/ /* The following part can be included multiple times. */ /* Define `SCRIPT' as needed. */ /* Add new scripts here. The first and second arguments are the */ /* script name in lowercase and uppercase, respectively, followed */ /* by a description string. Then comes the corresponding HarfBuzz */ /* script name tag, followed by a string of standard characters (to */ /* derive the standard width and height of stems). */ SCRIPT( cyrl, CYRL, "Cyrillic", HB_SCRIPT_CYRILLIC, 0x43E, 0x41E, 0x0 ) /* оО */ SCRIPT( deva, DEVA, "Devanagari", HB_SCRIPT_DEVANAGARI, 0x920, 0x935, 0x91F ) /* ठ व ट */ SCRIPT( grek, GREK, "Greek", HB_SCRIPT_GREEK, 0x3BF, 0x39F, 0x0 ) /* οΟ */ SCRIPT( hebr, HEBR, "Hebrew", HB_SCRIPT_HEBREW, 0x5DD, 0x0, 0x0 ) /* ם */ SCRIPT( latn, LATN, "Latin", HB_SCRIPT_LATIN, 'o', 'O', '0' ) SCRIPT( none, NONE, "no script", HB_SCRIPT_INVALID, 0x0, 0x0, 0x0 ) /* there are no simple forms for letters; we thus use two digit shapes */ SCRIPT( telu, TELU, "Telugu", HB_SCRIPT_TELUGU, 0xC66, 0xC67, 0x0 ) /* ౦ ౧ */ #ifdef AF_CONFIG_OPTION_INDIC SCRIPT( beng, BENG, "Bengali", HB_SCRIPT_BENGALI, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( gujr, GUJR, "Gujarati", HB_SCRIPT_GUJARATI, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( guru, GURU, "Gurmukhi", HB_SCRIPT_GURMUKHI, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( knda, KNDA, "Kannada", HB_SCRIPT_KANNADA, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( limb, LIMB, "Limbu", HB_SCRIPT_LIMBU, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( mlym, MLYM, "Malayalam", HB_SCRIPT_MALAYALAM, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( orya, ORYA, "Oriya", HB_SCRIPT_ORIYA, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( sinh, SINH, "Sinhala", HB_SCRIPT_SINHALA, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( sund, SUND, "Sundanese", HB_SCRIPT_SUNDANESE, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( sylo, SYLO, "Syloti Nagri", HB_SCRIPT_SYLOTI_NAGRI, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( taml, TAML, "Tamil", HB_SCRIPT_TAMIL, 'o', 0x0, 0x0 ) /* XXX */ SCRIPT( tibt, TIBT, "Tibetan", HB_SCRIPT_TIBETAN, 'o', 0x0, 0x0 ) /* XXX */ #endif /* AF_CONFIG_OPTION_INDIC */ #ifdef AF_CONFIG_OPTION_CJK SCRIPT( hani, HANI, "CJKV ideographs", HB_SCRIPT_HAN, 0x7530, 0x56D7, 0x0 ) /* 田囗 */ #endif /* AF_CONFIG_OPTION_CJK */ /* END */
{ "pile_set_name": "Github" }
Arizona GOP Senate Candidate Robocalls Democrats And Tells Them To Vote In The Wrong Place According to a report by Phoenix, Arizona’s NBC affiliate, Rep. Jeff Flake’s (R-AZ) U.S. Senate campaign called Democratic voters telling them to vote in the wrong precinct — in some cases as much as 11 miles away from their actual polling place. After telling the Democratic voters to vote in the wrong place, the calls also encourage the voter to “vote Flake for U.S. Senate.” Watch the report: It’s unclear whether these calls were made accidentally or as part of an intentional strategy to depress the Democratic vote.
{ "pile_set_name": "Pile-CC" }
Trial designed with crowd input gets FDA signoff What's been called the first clinical study protocol developed using crowdsourcing methods received the FDA's imprimatur earlier this month. The agency approved Transparency Life Sciences' IND for a clinical trial designed to test a generic blood-pressure medication, ACE inhibitor lisinopril, in patients with relapsing remitting multiple sclerosis. “We believe that we are the first clinical protocol cleared by the FDA that included input from patients as well as physicians and researchers,” Tomasz Sablinski, MD, PhD (pictured below), founder and CEO of Transparency Life Sciences, told MM&M in an e-mail. Data will be collected directly from subjects in the yearlong, 150-180-patient placebo-controlled study with the help of remote-monitoring technology from another firm, Advanced Monitored Caregiving, making it a so-called virtual trial as well. Sablinski said he hopes the firm's crowdsourced protocol design raises awareness of the trial among MS patients and physicians and facilitates recruitment and retention. If so, it could pave the way for what he sees as “a fresh approach” to making drug development more sustainable. The high cost of running clinical trials, recruiting patients for them, and designing them in such a way as to yield the data required by regulators, payers and marketers are all challenges with which drug developers wrestle, as is the slow, some would say anemic, yield from drug pipelines (recent numbers suggest R&D productivity may be picking up). Sablinski's firm wants to make the process more efficient. Its business model includes re-purposing generic drugs and testing them in clinical trials that derive their protocols from a global crowd's input, which TLS says can help ensure that the protocols have greater relevance to clinical practice and to patient needs. For instance, TLS used a web-based tool to elicit insights from patients and healthcare experts, with the responses factoring into primary and secondary endpoints, inclusion/exclusion criteria and remote-monitoring strategies for its Phase IIa lisinopril protocol. In addition, TLS says it practices full data transparency. “We plan to post all data (raw and final) on our website (with patient identifiers removed) for everyone to see and analyze,” added Sablinski. Asked about the TLS study, an FDA spokesperson said the agency does not comment on ongoing clinical trials. “We are aware of studies that have tried to elicit data online, and even do informed consent online,” noted the spokesperson, Chris Kelly, in an e-mail. “There is tremendous interest in moving trials into healthcare settings and using patient records to seek potential participants, among other initiatives.” However, trying to introduce such initiatives into clinical research has been a mixed bag. One such effort, Pfizer's 2011 Phase IV REMOTE trial involving overactive bladder drug Detrol LA, was said to be the first to recruit and communicate with patients entirely via web-based telemonitoring techniques. But the drugmaker halted the study earlier this year after it ran into problems attracting enough volunteers. At the same time, the REMOTE trial proved that some new efficiencies could be worked into the trials process: online consent delivery and testing, in-home patient follow-up, expanded use of mobile, and at-home drug delivery. Pfizer's head of clinical innovation, Craig Lipset, said in a blog post that the drugmaker is working to integrate those tools into new trials. To prevent similar roadblocks, TLS is collaborating with MS researchers at Stanford Medical School to conduct its trial and expects that their participation will facilitate patient recruitment, Sablinski said. That strategy, and remote monitoring of subjects, could also cut costs. Sablinski said he wants to learn from previous efforts. If TLS's mid-stage trial confirms what preclinical testing has found, it could prove not only the value of lisinopril as a new therapeutic option for patients with MS, but also help the drug developer—and others—realize the promise of crowdsourcing and virtual trials to make R&D more viable.
{ "pile_set_name": "Pile-CC" }
Mingjiao Temple Mingjiao Temple (), may refer to: Mingjiao Temple (Anhui), in Hefei, Anhui, China Mingjiao Temple (Shandong), in Heze, Shandong, China Mingjiao Temple (Zhejiang), in Zhuji, Zhejiang, China
{ "pile_set_name": "Wikipedia (en)" }
Elimination of both cell-free and cell-associated HIV infectivity in plasma by a filtration/methylene blue photoinactivation system. Methylene blue phototreatment effectively inactivates cell-free viruses in plasma while maintaining coagulation activities. However, this treatment is considered to be less effective for cell-associated virus inactivation. This report describes a new virus elimination system designed to eliminate cell-associated viruses with a cell-removal filter followed by methylene blue photoinactivation of cell-free viruses in plasma. Fresh plasma was inoculated with HIV or HIV-infected Molt4 cells (Molt4(IIIB)). The plasma was transferred to a bag containing methylene blue by passing it through a cell-removal filter and was irradiated with white fluorescent light. HIV infectivity was detected by indirect fluorescence assay. In parallel studies, coagulation activities in identically treated plasma were measured during 1 year of storage at -80 degrees C. Initial cell-free HIV titer of 10(6.2) TCID(50) per 0.1 mL dropped to 10(-0. 3) and <10(-0.5) TCID(50) per 0.1 mL after 10 or 20 J per cm(2) radiation, respectively. Cellular components were not detectable in plasma after filtration. The cell-free state of the plasma was ascertained from the observation that the DNase-resistant beta-globin gene, as a marker of intact WBCs, was not detected in the filtrates by PCR. The infectivity of Molt4(IIIB) was reduced to below the detection limit after filtration and radiation, and proviral HIV DNA was not detected in the filtrates by PCR. Coagulation activities including factor VIII in the treated plasma were maintained at more than 76 percent compared with the percentage in untreated plasma after 1 year of storage. The filtration/methylene blue photoinactivation system eliminated both cell-free and cell-associated HIV infectivities from plasma while maintaining coagulation activities for 1 year at -80 degrees C storage.
{ "pile_set_name": "PubMed Abstracts" }
The Combating Terrorism Sentinel has an extremely interesting and well-informed piece entitled The JRTN Movement and Iraq’s Next Insurgency. It’s well worth the reading time invested in it, and it explains why we no longer need to be in Iraq at all without significant changes to the Status of Forces Agreement where we would be allowed to operate more autonomously than we currently are. I’ll leave the balance of the report to the reader, but the money quote (for the point I’m trying to make) is this. JRTN’s branding and messaging has yielded a number of significant advantages for the group. One private security analyst with access to U.S. and Iraqi Security Force officers stated: “At the operational level, JRTN’s appearance of a religious connection gives it credibility in the eyes of the population and therefore increases the support offered and reduces the interference by the local population.” The analyst noted that JRTN’s stated “policy of only attacking the ‘occupiers’ and not the local population (whatever their ethnic or religious group) makes it one of the least ‘interfered with’ terrorist groupings. The population turned its back on many of the foreign fighters but JRTN are still seen as Iraqis first.” In areas along the federal-Kurdish line of control, JRTN’s anti-Kurdish agitation may have assisted its penetration of Sunni security forces. Kurdish factions recently accused JRTN of influencing the 12th Iraqi Army division in southern Kirkuk and flying JRTN’s flag on Iraqi Army vehicles during anti-Kurdish protests. Through sympathizers in the security forces, JRTN is assumed by U.S. officers to have at least some basic insight into the workings of joint U.S.-Iraqi operations centers, including Unmanned Aerial Vehicle and signals intelligence. The apparent focus on U.S. forces (plus its capacity to intimidate local judges and call upon tribal support) has earned the movement sympathetic treatment by some parts of the Iraqi security forces and judiciary. One intelligence officer from Diyala noted that his Iraqi counterparts “rarely stated in public that JRTN was much of a threat and every time we detained a JRTN leader, we had to fight tooth and nail to keep them detained. In other words they did not accept that JRTN was a serious risk to the [government of Iraq], only to Americans.” JRTN appears to have successfully used loopholes in Iraqi law that means “resistance activities” are not treated as seriously as crimes with Iraqi victims. According to one analyst, this legal aspect “is one reason that [JRTN] is deliberately not leaving a trail of evidence and claims connecting it to car bombings or assassinations that target Iraqis.” The Iraqis want our logistical capabilities, our MEDEVAC capabilities, our stability, our discipline, and so on. They don’t want us to operate in such a manner that we quell an insurgency, or target Iranian forces who destabilize Iraq. We should be killing insurgents, and instead we are still tipping our hat to incarceration of insurgents, which we have demonstrated is never a successful strategy in counterinsurgency (kill them or let them go – prisons are counterproductive in COIN). And with the current state of affairs in Iraq, we can’t even do that against favored insurgent groups. So be it. It’s time for the Iraqis to go it alone. Our military forces shouldn’t play second fiddle to anyone. Terrorist/insurrectionist operations under the flag of Naqshabandi Sufism is a trademark of the Caucasian islamists movement. The administrative and support system for this movement is in Turkey and operates in the open. In fact, the PM of Turkey, Erdogan, is a noted Naqshabandi. It is not much of a leap to speculate that what this involves is an alliance between the militant Naqshabandi insurrectionist movement and the government of Turkey’s effort to supress the Kurdish independence movement. The dominant political party in Turkey, AKP, is largly composed of members who support the idea of the creation of a new Islamist Caliphate.
{ "pile_set_name": "Pile-CC" }
[Minimally invasive surgical treatment for lumbar degenerative disease with IsoC-3D navigation under Mast Quadrant system]. To evaluate the effects of surgical treatment of IsoC-3D navigation assisted percutaneous pedicle screw fixation,vertebral canal decompression and interbody fusion using Mast Quadrant system in patients with lumbar degenerative disease. From January 2009 to February 2010,21 patients with lumbar degenerative disease were treated with IsoC-3D navigation under Mast Quadrant system. There were 12 males and 9 females, with an average age of 50.2 years (ranged,36 to 72 years). All patients underwent discectomy,vertebral canal decompression, cage implantation using Mast Quadrant system and IsoC-3D navigation assisted sextant lumbar fixation. Clinical outcomes were evaluated with Oswestry disability index (ODI), Visual analog scale (VAS) and degree of satisfaction of patients. Eighteen patients (85.7%) were followed up from 6 to 18 months with an average of 10 months. No surgery-related complications were found. The preoperative, postoperative ODI scores was 49.6 +/- 12.2 and 17.2 +/- 9.2, respectively (P < 0.01); VAS score of leg pain decreased from preoperative 75.2 +/- 10.0 to 12.2 +/- 11.8 at final follow-up (P < 0.01); VAS score of lumbago decreased from preoperative 59.9 +/- 17.3 to 16.6 +/- 11.5 at final follow-up (P < 0.01). Sixteen patients obtained satisfactory results. IsoC-3D navigation assisted percutaneous pedicle screw fixation,vertebral canal decompression and interbody fusion using Mast Quadrant system could achieve satisfactory clinical results in treating lumbar degenerative disease and may be a better alternative to conventional surgical procedures. It has advantages such as limited tissue damage, less blood loss, short time in hospital.
{ "pile_set_name": "PubMed Abstracts" }
Male genital system and spermiogenesis of Nanorchestes amphibius (Acari: Endeostigmata: Nanorchestidae): anatomy, histology, and evolutionary implications. In the present article the anatomy and histology of the male genital system of an endeostigmatid mite are described for the first time. The Endeostigmata probably are a paraphyletic group supposed to include the most primitive actinotrichid mites. In Nanorchestes amphibius, the testis comprises a paired germinal region connected with an unpaired glandular region. In the germinal region, spermiogenesis takes place in cysts of a somatic cell containing germ cells representing the same developmental stage. In the lumen of the glandular region, the spermatozoa are stored together with secretions of the glandular epithelium. These secretions are probably involved in the formation of spermatophores. From the glandular region, spermatozoa and secretions are released into the vasa deferentia that histologically can be divided into three sections, beginning with a short paired region with strong circular muscles serving as a sphincter, continuing with a paired proximal zone, followed by a short unpaired distal section. The distal vas deferens leads into the chitinous, unpaired ductus ejaculatorius which is followed by the progenital chamber. The ductus ejaculatorius is composed of a proximal section and a proximal, central, and anterior chamber. It is accompanied by a complex system of muscles and sclerites probably involved in the formation and ejaculation of the spermatophore. A similar organization can also be found in Prostigmata, but not in Oribatida. Anterior to the progenital chamber is located a paired accessory gland that probably produces a lipid secretion. Spermiogenesis is characterized by disintegration of the nuclear envelope, condensation of chromatin, and extensive reduction of the amount of sperm cell cytoplasm. The mature aflagellate, U-shaped spermatozoa are simple in structure and lack mitochondria and an acrosome complex. The results do not support the current view that Nanorchestidae are more closely related to Sarcoptiformes, i.e., Oribatida and Astigmata, than to Prostigmata.
{ "pile_set_name": "PubMed Abstracts" }
32 CFR 1901.61 - Purpose and authority. Purpose of exemptions. This part sets forth those systems of records or portions of systems of records which the Director of Central Intelligence has determined to exempt from the procedures established by this regulation and from certain provisions of the Privacy Act: (a) The purpose of the following specified general exemption of polygraph records is to prevent access and review of records which intimately reveal CIA operational methods. The purpose of the general exemption from the provisions of sections (c)(3) and (e)(3) (A)-(D) of the Privacy Act is to avoid disclosures that may adversely affect ongoing operational relationships with other intelligence and related organizations and thus reveal or jeopardize intelligence sources and methods or risk exposure of intelligence sources and methods in the processing of covert employment applications. (b) The purpose of the general exemption from sections (d), (e)(4)(G), (f)(1), and (g) of the Privacy Act is to protect only those portions of systems of records which if revealed would risk exposure of intelligence sources and methods or hamper the ability of the CIA to effectively use information received from other agencies or foreign governments. (c) It should be noted that by subjecting information which would consist of, reveal, or pertain to intelligence sources and methods to separate determinations by the Director of Central Intelligence under the provision entitled “General exemptions,”32 CFR 1901.62 regarding access and notice, an intent is established to apply the exemption from access and notice only in those cases where notice in itself would constitute a revelation of intelligence sources and methods; in all cases where only access to information would reveal such source or method, notice will be given upon request. (d) The purpose of the general exemption for records that consist of, pertain to, or would otherwise reveal the identities of employees who provide information to the Office of the Inspector General is to implement section 17 of the CIA Act of 1949, as amended, 50 U.S.C. 403q(e)(3), and to ensure that no action constituting a reprisal or threat of reprisal is taken because an employee has cooperated with the Office of Inspector General. (e) The purpose of the specific exemptions provided for under section (k) of the Privacy Act is to exempt only those portions of systems of records which would consist of, reveal, or pertain to that information which is enumerated in that section of the Act. (f) In each case, the Director of Central Intelligence currently or then in office has determined that the enumerated classes of information should be exempt in order to comply with dealing with the proper classification of national defense or foreign policy information; protect the identification of persons who provide information to the CIA Inspector General; protect the privacy of other persons who supplied information under an implied or express grant of confidentiality in the case of law enforcement or employment and security suitability investigations (or promotion material in the case of the armed services); protect information used in connection with protective services under 18 U.S.C. 3056; protect the efficacy of testing materials; and protect information which is required by statute to be maintained and used solely as statistical records. Title 32 published on 2014-07-01. No entries appear in the Federal Register after this date, for 32 CFR Part 1901. This is a list of United States Code sections, Statutes at Large, Public Laws, and Presidential Documents, which provide rulemaking authority for this CFR Part.
{ "pile_set_name": "Pile-CC" }
Hierarchical structures of fine fibrils on insect's feet induce strong molecular forces and provide extraordinary adhesive strength, enabling them to support large loads. Such dry adhesion allows, for example, the gecko's locomotion on slippery surfaces against gravity as well as firmly attach onto and detach with ease from rough substrates. Presently, polymer micro/nano fibrillar dry adhesives are known to be made using micro/nano fabrication processes. These techniques are common in microfabrication and often require expensive equipment and are costly to implement on a commercial scale. This invention makes use of a drastically different approach to manufacture flexible, fibrillar, and adhesive microprotrusion and adhesive laid-flat membranes by scalable nozzle-free electrospinning, which presents novel approaches to fabricating dry, removable, reusable adhesives on substrates. The invention differs drastically from other disclosed technologies, which are based on the use of aligned carbon nanotubes, photolithography, chemical etching, and time-consuming batch micro/nano molding processes. The new methodology offers advantages of significantly lower costs and easier scale-up, which will replace the more expensive approaches such as micro/nano fabrication process. Introduction of nozzleless electrospinning polymer blending and equal-channel angular pressing will combine processing stages such as solution preparation, spinning and spin-finish in one production line, significantly reducing processing time and costs. Although some of these spinning methodologies are known in the art, one of the inventors, Shing-Chung Wong, led the first group to examine electrospun nanofibers and membranes for their adhesion strength and energy and thus their applications as dry adhesives. Measurement of Adhesion Work of Electrospun Polymer Membrane by Shaft-Loaded Blister Test, Langmuir Vol. 28 (2012) 6677-6683; A Nano-Cheese-Cutter to Directly Measure Interfacial Adhesion of Freestanding Nano-Fibers, Journal of Applied Physics Vol. 111, (2012); Mechanism of Adhesion Between Polymer Fibers at Nanoscale Contacts, Langmuir Vol. 28 (2012) 4663-4671; and Do Electrospun Polymer Fibers Stick?, Langmuir, Vol. 26 (2010) 14188-14193. An adhesive is a kind of material that can bond items together. Adhesives are typically liquid or semi-liquid, with the earliest adhesives being made of natural materials, such as tree sap, beeswax, tar and etc. Advances in the science and understanding of adhesive mechanisms have led to more and more adhesive formulations. Today's adhesives can be classified in many different ways, generally by their bonding mechanism, with three major categories including: physically hardening adhesives, chemically curing adhesives and pressure sensitive adhesives. Physically hardening adhesives are non-reactive adhesives, and they are in their final chemical state before applying to surface. Only polymers that can be liquefied, either melt or dissolved, can be used for physical hardening adhesives. Physically hardening adhesives provide a wide range of adhesive properties, generally good bond flexibility, and are used in a variety of applications. There are three major types of hardening adhesives: (i) hot melts, (ii) solvent based adhesives and (iii) polymer dispersion adhesives. Most of the hot melt adhesives are thermoplastics, which can be applied in molten form in the range of 65° C.-180° C. They can be solidified in room temperature to form strong bonding with various materials. Ethylene-vinyl acetate (EVA) is a particularly common hot melt adhesive. EVA possesses good physical properties, such as good clarity, low-temperature toughness, stress-crack resistance, water resistance, UV resistance etc. Solvent based adhesives build strength through the evaporation of the solvent. The performance of solvent-based adhesives is largely determined by the polymer system in the formulation. The choice of adhesive type depends on the specific substrates and environmental resistance needed—temperature resistance, oil and plasticizer resistance, etc. Polymer dispersion adhesives are typically formulated from compounds including vinyl acetate polymers and copolymers (PVAC), ethylene vinyl acetate (EVA), acrylics, styrene-butadiene rubber (SBR), natural rubber latex and synthetic elastomers, and polyurethane (PUR). These adhesives are heterogeneous systems comprising a solid polymer phase dispersed in an aqueous phase. One of the major advantages is the absence of VOC's. For many water based adhesives, it is a requirement that at least one of the substrates be permeable to allow water to escape from the system. It is not surprising, then, that these materials have found wide use in bonding wood, paper, fabrics, leather and other porous substrates. Chemically curing adhesives are reactive materials that require chemical reaction to convert them from liquid to solid. Generally they can be classified in to single component adhesives and two component adhesives. Single component adhesives have pre-mixed adhesive components which are blocked normally. Only when the required condition was met, they will activate the hardener. These conditions could be heat, moisture, radiation, etc. Two component adhesives have two reactive components which can form solid systems after mixing them. The most widely used two component adhesives include epoxies, methyl methacrylates (MMA), silicones, etc. Cyanoacrylates are known for their “instant” bonding to most surfaces. When a drop of cyanoacrylate adhesive is put on the surface of a part, the acid stabilizer molecules react with the water molecules present on the surface of the part from the relative humidity in the air. The reaction of the water and acid causes the acid stabilizer to be neutralized. The cyanoacrylate molecules then react with each other and form polymer chains without cross-linking. Cyanoacrylates can bond most types of glass, plastics and metals, and has broad application in optics, microelectronics, transportations and medical industries, etc. Single-component epoxy adhesives include solvent-free liquid resins, solutions in solvent, liquid resin pastes, fusible powders, sticks, pellets and paste, supported and unsupported films, and preformed shapes to fit a particular joint. Two-component epoxy adhesives are usually composed of the resin and the curing agent, which are mixed just prior to use. The components may be liquids, putties, or liquid and hardener powder. They may also contain plasticizers, reactive diluents, fillers, and resinous modifiers. The processing conditions are determined by the curing agent employed. Typical cure conditions range from 3 h at 60° C. to 20 min at 100° C. Epoxy adhesives form strong bonds to most materials, in addition to excellent cohesive strength, but are not reusable and irremovable, and residue is left on cohesively fractured surfaces. Epoxies yield good to excellent bonds to steel, aluminum, brass, copper, and most other metals but are brittle and fracture usually with cohesive failure mode. Pressure sensitive adhesives (PSA's) are most used in tape and label industry. PSA's are typically formulated from natural rubber, certain synthetic rubbers, and polyacrylates. PSA's form a bond simply by the application of pressure to marry the adhesive with the adherend. Once the adhesive and the adherend are in proximity, there are also molecular interactions such as van der Waals forces involved in the bond, which contribute significantly to the ultimate bond strength. PSA's exhibit viscoelastic (viscous and elastic) properties, both of which are used for proper bonding. Pressure sensitive adhesives are designed with a balance between flow and resistance to flow. The bond forms because the adhesive is soft enough to flow the adherend. The bond has strength because the adhesive is hard enough to resist flow when stress is applied to the bond. Since these adhesives are not true solids, the strength of pressure sensitive adhesives decreases when the temperature is increased. PSA's also exhibit a tendency to undergo creep when subjected to loads. There is a growing demand in the art of removable, reusable and dry adhesives. Typically, dry reusable adhesives produce substantial shear adhesion strengths but significantly lower normal lifting forces, giving rise to high anisotropic adhesion properties. Dry adhesives with anisotropic force distribution may find potential use in several applications such as tapes, fasteners, treads of wall-climbing robots, wall-climbing suits, microelectronics, and medical and space applications. Dry adhesives have been fabricated using polymers, which has resulted in high shear adhesion strength, by forming tens of millions of contact points between adhesive and adherend. Carbon nanotube (CNT) based arrays possess a shear adhesion strength as high as 100 N/cm2 on a glass slide. These arrays have high aspect ratios and mechanical strengths. However, a significant normal preload of 50 N/cm2 is required to achieve this shear adhesion force. CNT arrays have considerable limitations including being electrically conductive for applications necessitating electrically insulating adhesives. These arrays also possess a low ratio of shear adhesion strength to normal detachment strength (V) which limits their range of applications. Hierarchical pillars have been fabricated in polydimethysiloxane where the top rounded pillars are 10 μm in diameter with aspect ratios ranging between 0.5 and 2. The base pillars are 200 μm in length and 50 μm in diameter. Hierarchical nanofiber-based structures have been developed using polymethylmethacrylate by chronologically employing two porous alumina templates. The adhesion strength in this hierarchical structure is also severely low. The heavily packed pillars cause clumping in the structure, which is suggested to lead to this deteriorated adhesion. None of the prior art made use of fiber spinning methodologies to form the adhesives. High aspect ratio (AR) structures exhibit significant shear adhesion strength compared to ones with low AR's. Various techniques have been employed to fabricate moderate AR structures including nanomolding, e-beam lithography, and replication of nanoporous membranes with polymers. The methodologies are costly to be scaled up for mass production. Thus, there is a need in the art for improved methods of forming dry adhesives from electrospinning spinnable materials. There is also a need in the art for dry adhesives with high shear adhesion strength and low normal detachment.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Display WordPress Shortcode as Plain Text Is there any way to display WordPress shortcode as a plain text on the post? For example to show [gallery] just as this. Thank you A: I think the easiest way is to double the brackets, but you could also replace the brackets as following: [ with &#91; ] with &#93;
{ "pile_set_name": "StackExchange" }
Article: Lance Moore Becoming One Of The Best Wide Receivers In The NFL User Name Remember Me? Password Lance Moore Becoming One Of The Best Wide Receivers In The NFL this is a discussion within the Saints Community Forum; Moore has shown that he can be a deep threat and at the same time has shown that he can pick up the important yards. Of Moore’s 28 receptions this season 26 of them have resulted in first down conversions ... Moore has shown that he can be a deep threat and at the same time has shown that he can pick up the important yards. Of Moore’s 28 receptions this season 26 of them have resulted in first down conversions which means that 92.9 percent of his receptions have been for first downs. Out of all the receivers in the NFL that have made at least 25 receptions this season Moore is first in first down percentage. Its funny , I must have fought 50 threads over the years at saints report .Where the prevailing thinking was that he was to short and we should trade him.,lol. We only really needed Moore,Colston, and Henderson, Meachum was a luxury , and I thought took to much time from Moore. With Morgan in the rotation, I actually think the WR core is better than it was, because Moore is a master at getting open, and runs the best routes. Hes always trailed welker in catch %, and thats not even fair because he didn't have near the play time of welker. The New Orleans Saints have one of the best receiving corps in the NFL and part of the reason is the play of wide receiver Lance Moore. Moore has been very consistent this season and has become a big part of the Saints’ dynamic offense. For the season Moore has made 28 receptions for 408 yards and two touchdowns. Furthermore, Moore averages 81.6 yards a game, which is good enough for 14th in the NFL. In the Saints’ 35-28 victory against the Tampa Bay Buccaneers Moore had season highs in receptions (9) and receiving yards (121). Moore has shown that he can be a deep threat and at the same time has shown that he can pick up the important yards. Of Moore’s 28 receptions this season 26 of them have resulted in first down conversions which means that 92.9 percent of his receptions have been for first downs. Out of all the receivers in the NFL that have made at least 25 receptions this season Moore is first in first down percentage. However, looking at the numbers alone does not do justice to Moore. Moore has been a very efficient and reliable receiver this season but looking at what he is working with makes it all the more impressive. Moore is putting up big numbers but he is not one of the “big” receivers in the NFL, literally and figuratively. Moore only stands at 5’9″ 190 pounds but he is a fearless football player and deserves to be in the conversation as one of the best wide receivers in the NFL. For now, Moore is fine with flying under the radar and he will continue to play big and help the Saints turn their season around. Our offense is finely tuned to exploit the various talents of each player. Some of them we are figuring out how to fit, but others are unique and nearly irreplaceable: -Drew -Pierre -Jahri -Darren -Marques -Jimmy -Lance -Devery (There are players who could do what he does, maybe better, but not at the price we have him at, and few if any that block the screen as well as he does.)
{ "pile_set_name": "Pile-CC" }
Pete Wilcox Peter Jonathan Wilcox (born 1961) is a British Anglican bishop. Since June 2017, he has been the Bishop of Sheffield in the Church of England. He was previously the Dean of Liverpool from 2012 to 2017. Early life and education Wilcox was born in 1961 and attended Worksop College in north Nottinghamshire before studying at Durham University where he was a member of St John's College. He graduated from Durham with a Bachelor of Arts (BA) degree in 1984. He then attended Ridley Hall, Cambridge, where he trained for ordination and graduated from the University of Cambridge with a BA degree in theology in 1986. Later, he returned to Durham for post-graduate study and completed a Master of Arts (MA) degree in 1991. He then attended St John's College, Oxford, and completed a Doctor of Philosophy (DPhil) degree in 1993. His doctoral thesis was titled "Restoration, Reformation and the progress of the kingdom of Christ : evangelisation in the thought and practice of John Calvin, 1555–1564". Ordained ministry He was ordained a deacon at Petertide (28 June) 1987 and a priest the next Petertide (26 June 1988) — both times by David Jenkins, Bishop of Durham, at Durham Cathedral; his first post was a curacy in Preston-on-Tees. From 1990 to 1993, while undertaking post-graduate study, he was a non-stipendiary minister at St Giles' Church, Oxford and St Margaret's Church, Oxford. He was Team Vicar of Gateshead from 1993 to 1998 when he became the Director of the Urban Mission Centre, Cranmer Hall, Durham. He was priest in charge of St Paul's Walsall from 1998 before becoming Canon Chancellor of Lichfield Cathedral in 2006. He was installed as Dean of Liverpool Cathedral on 15 September 2012. Episcopal ministry On 7 April 2017, it was announced that Wilcox was to become the next Bishop of Sheffield, to be consecrated on 22 June and take up the role in autumn 2017. He was elected to the See by the College of Canons of Sheffield Cathedral on 5 May 2017 and his election confirmed at York Minster on 5 June 2017. On 22 June 2017, he was consecrated a bishop by John Sentamu, Archbishop of York, at York Minster. On 23 September 2017, he was installed as the 8th Bishop of Sheffield during a service at Sheffield Cathedral. Personal life Wilcox is married to Catherine Fox, a writer and a lecturer at Manchester Metropolitan University. They have two children. Styles The Reverend Pete Wilcox (1988–1993) The Reverend Doctor Pete Wilcox (1993–2006) The Reverend Canon Doctor Pete Wilcox (2006–2012) The Very Reverend Doctor Pete Wilcox (20125 June 2017) The Reverend Doctor Pete Wilcox (5 June 201722 June 2017) The Right Reverend Doctor Pete Wilcox (22 June 2017present) References External links a lecture given in 2019 Category:1961 births Category:Living people Category:20th-century English Anglican priests Category:21st-century Anglican bishops Category:21st-century English Anglican priests Category:Alumni of St John's College, Durham Category:Alumni of St John's College, Oxford Category:Bishops of Sheffield Category:Staff of Cranmer Hall, Durham
{ "pile_set_name": "Wikipedia (en)" }
Town Clerk/Tax Collector's office is now located in the Town Hall Building, 1812 Co. Hwy. 34 (across the road from its previous location). ALL Town Clerk & Tax Collector business will be conducted at the new location. Hours : Thursday 5-8PM, and Saturday 2PM-5PM OR by appointment by calling (607)638-5165 or email westford@oecblue.com ** IF THESE HOURS ARE INCONVENIENT FOR YOU PLEASE CONTACT ME AND WE CAN ARRANGE A TIME THAT IS BETTER FOR YOU!! Please Note: In 2013, a Local Law was passed that ALL Town of Westford Residents (tax payers & rentees) MUST have a Town authorized permit to dispose of garbage. Permits are free to Town Residents and available at the Town Clerk's office. Proof of residency (tax bill, utility bill, etc. - with your physical address (not mailing address) is required. Non-Residents may use the facility at a fee of $3.00 per bag. Click on the Documents banner above to view the Town of Westford Local Laws. ALL dogs MUST be licensed. Click on the Documents banner above for a description of the DOG CONTROL LAW or click on the Town Clerk/Tax Collector banner and scroll to ISSUANCE OF DOG LICENSES for instructions to license your pet. As a convenience to you, Debit and Credit Cards are now accepted for payment of fees made at the Town Clerk/Tax Collector Office (in-office only). The following convenience fees will be charged to your card by your card company: Westford is located in the foothills of the Catskill Mountains, in the eastern portion of Otsego County. The nestled in the rolling hills is a community of agricultural enterprises, small hamlets, scattered rural residences, and a variety of small and home-based businesses. The Town has a strong agricultural tradition. Modern dairy farms, organic beef and vegetable farms, and sugar maple farms continue that tradition. These enterprises contribute greatly to the town's rural character and open spaces. DO YOU KNOW HOW MANY BUSINESSES THERE ARE IN THE TOWN OF WESTFORD? Some of them can be found by clicking on the "links" banner above. About the Community According to the latest Census, Westford is home to approximately 870 people. Westford enjoys one of the fastest growth rates in the county, with a population increase of nearly 100% since 1970 when the population was 435. The population centers are the hamlets of Westford, in the center of town, and Westville, on the western boundary with the Town of Middlefield. The Town has three active churches, the Methodist Church and Episcopal Church located in the hamlet of Westford and the Methodist Church in the hamlet of Westville. The Town Hall and Westford Methodist Church serve as community centers for various activities. Most of the children in Westford attend Schenevus Central School in the neighboring Town of Maryland. Some of the children also attend neighboring Worcester, Milford and Cherry Valley schools. The Westford Community Association provides opportunties for social events and activities for children. These events include the Westford Christmas Pageant, the Easter Egg Hunt, and the Halloween Costume Party. The Association also hosts the Alumni luncheon for former graduates of the Westford School. Town Ammenities & Attractions (see our Links page to visit webpages) The Town Hall and Fire Department is located at 1812 County Highway 34 in the old Westford school. The Town Hall serves as the meeting place for several local organizations, including the Planning Board, the Westford Community Association, Fire Department and it's Auxiliary. Town Clerk Office and Town Court are also in the Town Hall. The Westford Post Office is located in the center of the hamlet at 1743 County Highway 34. The Lobby is opened for access to mail boxes Monday thru Friday 8:00 a.m. - 5:30 p.m. and Saturday 8 a.m. - 11:45 a.m.. Window service is available Monday thru Friday 9 a.m. to 1 p.m. and Saturday 8 a.m. to 11:45 a.m. Families enjoy recreation at Gopher Field, Busacher Park and Wilbur and Betty Davis State Park. Gopher Field includes a youth soccer field and Little League field. Busacher Park boasts a pavillion avalable for picnics located next to the Town Hall/Fire Department. The State Park includes hiking trails, catch and release fishing, a playground, and events pavilion. Six lovely log cabins are available for lodging at the State Park. Many of our agricultural enterprises are either open to the public or provide direct services to the public, for instance: .............Breezie Maples is the largest organic maple syrup producer in the state of New York. Breezie Maples won the Cooking Light 2010 Taste Test Award. In the Spring, visit Breezie Maples on their open house day to tour the facility, taste the syrup and take home a bit of Westford! ............Willie's Farm and Cider Mill is open seasonally in the Autumn, feature custom cider pressing, local crafts, baked goods, special events and lots of fun activities for families including wagon rides and a corn maze.
{ "pile_set_name": "Pile-CC" }
Inasmuch as fast room temperature curing, single component sealants and adhesives are desirable and useful, particularly in original equipment manufacturing, it is not surprising that a number of one component elastomeric sealants are now available in the marketplace. Such sealants include various polymer bases such as polysulfides, mercaptan terminated polyethers, polysiloxames and polyurethanes. Certain industries need elastomeric adhesives or sealants which cure by exposure to ambient conditions and which will develop a high tensile strength. Applications of this type include sealing automobile windshields which are often intended as structural components in design. For these applications the elastomeric sealant or adhesive must not only have high tensile strength but should achieve such strength in a matter of a few hours so that the automobile may be safely driven shortly after installation of the windshield. Of the various liquid elastomers available today, cured polyurethanes, in general, have the highest mechanical strength and therefore are the polymers of choice as a windshield sealant or adhesive provided that the adhesive or sealant can cure rapidly under ambient conditions without exhibiting other problems such as foaming, storage instability, depolymerization, etc.. An example of a one component, room temperature, moisture curing polyurethane sealant is disclosed in U.S. Pat. No. 3,779,794 wherein a polyurethane sealant in combination with a particular type of silane primer is disclosed. In that patent, the polyurethane sealant is an isocyanate terminated polyethylene ether diol-polypropylene ether triol combination having from 1.2 to 1.5% free isocyanate terminals. These terminals are blocked with a volatile blocking agent which, when exposed to air, evaporates and the moisture in the air cures the polyurethane. The polyurethane sealant disclosed in this patent in combination with the silane primer cures, according to the patent, to a tensile strength of 40-60 pounds per square inch (psi) after 6 hours exposure at 77.degree. F. and 30% relative humidity. Although such sealants are satisfactory in terms of ultimate elongation characteristics and the like, nevertheless, there is a need for the development of a sealant having higher early strength, i.e. 100 psi or more in a six hour period of time, with equivalent ultimate elongation.
{ "pile_set_name": "USPTO Backgrounds" }
Dreams About Us About This Site Welcome! This site is continuously being created by students of Dr. William C. Dement's Sleep And Dreams course at Stanford University. We made this site as a call to action for people all over the world to live healthier, happier, safer, and more productive lives by learning about their own sleep. We have faith that reading the information provided on this site will motivate you to be smart about your sleep deprivation and strategic about your alertness in order to live life to your fullest, most energetic potential. In fact, we challenge you to do so! What do you say, are you up for the challenge? The Stanford Sleep Book Dr. Dement's pioneering textbook has been the core text for Sleep and Dreams since 1980, but it has just recently been made available to the wider public for the first time. In it you'll find a more detailed account of the most important things you need to know about sleep, alertness, dreams, and sleep disorders. Studies, statistics, plus plenty of Dr. Dement's classic anecdotes painting the history of sleep medicine. More Sleep Resources The Zeo A revolution in personal sleep tracking, the Zeo is a wireless headband that transmits your brainwaves in realtime to a dock (pictured here) or your smartphone. The result? You can wake up and see exactly what stages of sleep you were in during the night! Unprecedented personalized sleep knowledge. Sleep Paralysis: A Dreamer's Guide Ever woken up paralyzed? A surprising number of us have, believe it or not. But few know the actual causes of this phenomenon, and fewer still how to exert control over it. Dream researcher and sleep paralysis expert Ryan Hurd shares breakthrough insights into how to do just that. Important Disclaimer Please Note: The information found on this page and throughout this site is intended for general information purposes only. While it may prove useful and empowering, it is NOT intended as a substitute for the expertise and judgments of healthcare practitioners.
{ "pile_set_name": "Pile-CC" }
La imagen es producto de un concurso abierto donde participaron más de 500 personas de todo el país. El jurado eligió a 10 finalistas cuyos trabajos fueron sometidos a votación pública a través de las redes sociales de la institución. El Parlamento ya hace eco de su nuevo diseño, donde la cúpula del Palacio, ocho estrellas doradas y la bandera tricolor del país resaltan en medio del nombre de la institución. El ganador del concurso es Gabriel Alberto González González, un Diseñador Gráfico venezolano de 37 años de edad. “Este cambio de imagen tiene que ver con devolverle la prestancia a la simbología nacional, usando el escudo y cúpula que históricamente ha identificado a la institución. Todo este intenso trabajo es parte de la agenda de apertura que hemos llevado adelante desde la Dirección de Comunicaciones Estratégicas”, precisó Oliver Blanco, Director de Comunicaciones Estratégicas y Relaciones Públicas e Institucionales. El ganador Gabriel Alberto González González visitó este miércoles la sede del Palacio Federal Legislativo. Al ser recibido por el presidente de la institución, Henry Ramos Allup, explicó que la imagen con la que ganó es una síntesis gráfica de la cúpula del Salón Elíptico del Palacio Federal Legislativo. Agregó que todo fue producto de su propia inspiración. “Me pareció pertinente agregar las ocho estrellas y el escudo que está colocado en el Salón del Hemiciclo. A título personal considero que la cúpula del Salón Elíptico, más estos dos símbolos patrios, es lo más emblemático de la Asamblea Nacional”, precisó González González. Agregó el diseñador gráfico que utilizó el color dorado porque representa riqueza, valor y sentimentalismo. “Considero que con esta imagen le estoy devolviendo el valor histórico e institucional que tiene el Parlamento venezolano”.
{ "pile_set_name": "OpenWebText2" }
RELATED ARTICLES Share this article Share And Eubank's usually supremely confident father has revealed he has some doubts ahead of the highly-anticipated contest. 'I didn't say (Junior would win),' Eubank Snr insisted during Thursday's pre-fight press conference at the O2. 'I'm not convinced (Junior will win), because James DeGale has pedigree in terms of gold medallists, former world champions - it's real. 'I respect the man's abilities. Junior has it - but who turns up on the night? 'This is going to be strange to the audience, but my son looks at the physical aspect of this person, the crowd - the physical game. Eubank Snr (left) admitted he was concerned that his son (right) may come up short 'And from a physical point of view, I don't think there is anyone who can actually stand with him. But it isn't just physical - it's also spiritual. 'And this is where Junior lacks that blessing. It's the only thing that allowed me to win so many championship fights and allowed me to put up with the bigotry of the media, the keyboard warriors, the critics. 'I've endured it all because, spiritually, I am buoyant, alive. I've never come down to that level but I don't know whether he (Junior) has that. 'It's definitely a 50-50 fight. I am petrified of what the outcome could be. I am petrified he may not win this fight.' The loser of Saturday's huge title fight is widely expected to retire from the sport
{ "pile_set_name": "Pile-CC" }
Q: Method can be made static, but should it? Resharper likes to point out multiple functions per asp.net page that could be made static. Does it help me if I do make them static? Should I make them static and move them to a utility class? A: Performance, namespace pollution etc are all secondary in my view. Ask yourself what is logical. Is the method logically operating on an instance of the type, or is it related to the type itself? If it's the latter, make it a static method. Only move it into a utility class if it's related to a type which isn't under your control. Sometimes there are methods which logically act on an instance but don't happen to use any of the instance's state yet. For instance, if you were building a file system and you'd got the concept of a directory, but you hadn't implemented it yet, you could write a property returning the kind of the file system object, and it would always be just "file" - but it's logically related to the instance, and so should be an instance method. This is also important if you want to make the method virtual - your particular implementation may need no state, but derived classes might. (For instance, asking a collection whether or not it's read-only - you may not have implemented a read-only form of that collection yet, but it's clearly a property of the collection itself, not the type.) A: Static methods versus Instance methods 10.2.5 Static and instance members of the C# Language Specification explains the difference. Generally, static methods can provide a very small performance enhancement over instance methods, but only in somewhat extreme situations (see this answer for some more details on that). Rule CA1822 in FxCop or Code Analysis states: "After [marking members as static], the compiler will emit non-virtual call sites to these members which will prevent a check at runtime for each call that ensures the current object pointer is non-null. This can result in a measurable performance gain for performance-sensitive code. In some cases, the failure to access the current object instance represents a correctness issue." Utility Class You shouldn't move them to a utility class unless it makes sense in your design. If the static method relates to a particular type, like a ToRadians(double degrees) method relates to a class representing angles, it makes sense for that method to exist as a static member of that type (note, this is a convoluted example for the purposes of demonstration). A: Marking a method as static within a class makes it obvious that it doesn't use any instance members, which can be helpful to know when skimming through the code. You don't necessarily have to move it to another class unless it's meant to be shared by another class that's just as closely associated, concept-wise.
{ "pile_set_name": "StackExchange" }
As the French elections loom, threatening to elevate ultra-nationalist Marine le Pen to power alongside Donald Trump, the eyes of the world are turned to France. In this situation, we don’t look to other French politicians for salvation, but to the ungovernable social movements that have rocked France over the past several years. The only surefire way to block neoliberal austerity measures, nationalist violence, and state repression is by building grassroots networks powerful enough to put a stop to them directly. In vivid firsthand accounts, the following retrospective traces social unrest in France from the declaration of the state of emergency in 2015 through the street riots and plaza occupations of 2016 up to the present moment. This is the first installment of a two-part series on the situation in France we are publishing in the lead-up to this weekend’s elections; the second will follow tomorrow. March 9, 2016. After the attacks claimed by ISIS in January and November 2015 and the declaration of a state of emergency, no one could have predicted that France was about to experience several months of upheaval. This is an attempt to offer an overview and analysis of the disruptions that followed the El Khomri work reform proposal (known as the “Loi Travail”). It is neither a comprehensive account nor a universal perspective, but a true story from the perspective of some who joined in the clashes. Although the events took place all over France—in Nantes, Rennes, Lille, Toulouse, Lyon, and elsewhere—we will focus on some of the actions in Paris in which we actively participated. On the Eve of the Work Reform Proposal At the end of February 2016, France was a powder keg. In retrospect, it’s not surprising that the political instability of the preceding years, coupled with deepening distrust of the government, gave anarchists the opportunity to play a leading role in the movement against the Loi Travail. The ISIS attacks of 2015 offered the French government an excuse to intensify control of the entire population. Taking advantage of the shock that followed each attack and the fear of future attacks, the authorities passed a new surveillance law and declared a state of emergency. This enabled them to apply new “temporary” and “exceptional” laws, such as forbidding demonstrations in the name of national security, regulating people’s movements and residence, and carrying out house searches without a judge’s authorization. This state of emergency was only supposed to last three months; in fact, it is still in effect as of April 2017. For more information about the state of emergency, consult the 2015 dialogue between CrimethInc. and Lundimatin. Meanwhile, the situation of migrants in France had been worsening since September 2015. The local authorities intensified their strategy of daily harassment, sending police forces to expel and dismantle several makeshift camps in Paris. The idea was clearly to ensure that groups of refugees would not be able to gather or organize effectively. Near Calais, the French government took drastic steps to reduce the number of people living in the “Jungle,” the refugee camp near the border crossing to the UK. They stepped up violent policing, created a militarized and highly secured “humanitarian camp,” and evicted the southern part of the Jungle on the morning of February 29, 2016. For more information on the plight of refugees in Calais, consult Calais Migrant Solidarity, which is close to the European No Border movement. Moreover, in the course of the preceding years, political discontent had crystalized around a few specific environmental issues, also known as “projets inutiles” (useless projects), and the resulting ZADs (“zones to be defended”). These include a new train line between Lyon and Turin (the notorious TAV), the dam project in Sivens where police brutally murdered the young activist Rémi Fraisse in November 2014, and the new airport at Notre-Dame-Des-Landes, regarding which the French government gave authorization to begin construction October 2016. In this context, it was not surprising that when the government invoked the state of emergency to shut down the official demonstrations during the international summit on climate change (COP 21) in Paris beginning on November 30, 2015, we decided to take the streets to defy them. The clashes with the police that took place at Place de la République the day before the opening of the COP 21 were a foretaste of what was to occur regularly on those streets few months later. All this explains why the French government faced an impasse at the beginning of 2016. Its popularity was low; people criticized its decisions, feeling betrayed by the openly neoliberal and repressive agenda of the traditional “Parti Socialiste.” However, desiring to continue the economic restructuring that followed the international financial crisis of 2008 and to keep presidential promises such as reducing unemployment rates, President François Hollande sought to revitalize his presidency by reshuffling his cabinet on February 2016. A few days later, Myriam El Khomri, the newly appointed Minister of Labor, presented the government’s new work reform as a way to facilitate employment and boost economic recovery. Despite this framing, it was easy to see that the primary objective of the law was to facilitate corporate flexibility at the expense of workers’ rights. In a nutshell, this law would make working conditions more precarious than they already are. Soon after the reform was announced, some people started mobilizing via online videos asking viewers to sign a petition against the law. Meanwhile, some radical groups appealed to people to take the streets and go on strike. Little by little, other organizations joined these calls until a national day of action against the Loi Travail was planned for Wednesday, March 9. Trade union leaders did not want to take part in this day of action, as they were not behind the call. However, after realizing that they were losing authority among their ranks as numerous trade unionists decided to attend the national demonstration as individuals, some major trade unions (including the CGT, FO, Solidaires, and FSU) decided at the last minute to join the festivities. We, too, decided to participate in the action. But we did not take the streets because we were opposed to this specific law or wanted a better one. Rather, we went because we consider capitalism and work itself to be illegitimate, alienating, and obstructive to our research and emancipation. On the eve of the first national mobilization, we had no idea that these calls would lead to four continuous months of mobilization. March 9, 2016. Sowing the Seeds of Revolt March 9, 2016 – Early in the morning, students decided to block access to their high schools. Meanwhile, in several universities, students were gathering to prepare their banners for the afternoon march. Later that morning, hundreds of students and activists converged at Place de la Nation to demonstrate without any political affiliations, official organizations, or trade unions. Taking advantage of a surprisingly low police presence, this large group of people took the streets, blocking traffic and throwing projectiles and paint bombs at a McDonald’s restaurant. This inspired some participants to begin tagging billboards and walls and smashing the windows of cell phone stores, real estate and insurance agencies, and banks, not to mention ATMs and cameras. This continued without interruption for more than 30 minutes until we reached Place de la Bastille. There, several brigades of riot police (CRS and/or Gardes Mobiles) were blocking the most direct access to the touristic sites and stores of downtown Paris. Some people threw projectiles at the police as a distraction so the rest of us could continue our march along another unblocked boulevard. Nevertheless, just before we reached a bridge that would have lead to another district of Paris, several riot police squads and their vehicles blocked our path. This successfully reduced our numbers, as some students left the action in order to avoid confrontation. The morning ended in a cat and mouse game, as small groups of protesters walked through the narrow streets of the Saint Paul district to avoid police control and arrest. That afternoon, people converged at Place de la République for the official demonstration. When we arrived on site, it was a great pleasure to see the square and its surroundings full of people. We were surprised to see so many people gathering in the streets under the state of emergency, considering that few months before, during the COP 21, only a few thousand people had gathered at Place de la République. At the beginning of the protest, information started to circulate that an autonomous group would form somewhere in the middle of the trade unions and official organizations. This marked the emergence of a large group of individuals from different backgrounds (anarchists, appelistes/tiqqunistes, insurrectionists, antifascists, etc.) that later came to be known as the “cortège autonome” (“autonomous procession”) or “cortège de tête” (“leading procession”). As during the morning action, people within the autonomous group started targeting major symbols of capitalism; this continued from République to Nation. Again, every single bus station, bank, and real estate or insurance agency saw its façade smashed and tagged. Although the autonomous group welcomed such actions with cheers and anti-capitalist chants, other demonstrators criticised them, and some even tried to personally interpose themselves to obstruct these actions. Surprisingly, during the hours that the demonstration lasted, the police made very few appearances. March 17, 2016: Police inside Tolbiac university. March 17, 2016 – Only a week after the first demonstration against the Loi Travail, we had another appointment to continue the struggle on Thursday, March 17. That same day, the Conseil d’Etat—an institution responsible for advising the French government on the lawfulness of law projects—was due to present an opinion on the proposed law. Once again, we decided to join hundreds of students at Place de la Nation for another morning action. That day, more people attended the morning action, probably due to the increase of blockades at high schools and general assemblies in universities. The atmosphere among the crowd that rushed into the main boulevard was a pleasant mix of joy, friendship, and determination. Nevertheless, it was immediately clear that events wouldn’t play out the way they had the previous week. After only ten minutes in the streets, we saw the first riot police show up in force. As soon as we saw their vehicles passing in front of us, we knew that confrontations would be inevitable. Their orders were probably to avoid any kind of public loss of control, and to make specific and targeted arrests. The first projectiles were thrown at the police vehicles; some of us picked up tools from a nearby construction site to attack them. Others took up stones and barriers to create a more offensive bloc to confront the police. The police eventually blocked the boulevard in front of us. The confrontation escalated for several long minutes as we tried to press forward and create a breach in their lines. People threw stones, glass bottles, and all kinds of projectiles at riot police, who answered with tear gas canisters, flash-bang grenades, and rubber bullets. Recognizing that we could not maintain the pressure any longer, we retreated in hopes of finding another route to our intended destination. After running through narrow streets, we arrived at another boulevard, only to see police trucks blocking our path once again. Taking advantage of the fact that we could not advance, police officers in plain clothes who had been following us throughout the action carried out several violent arrests. Many of us left the action as soon as we saw the first arrests, recognizing the police trap slowly closing on us. A couple hours later, we attended the afternoon protest organized by student unions and organizations. As soon as we found the “cortège autonome,” we realized that this was not a good idea. Indeed, to our surprise, this segment of the march was small and isolated from other groups of people. Moreover, on each side of the boulevard, police officers in plain clothes and members of the anti-criminality brigade (BAC) were following us. The first part of the demonstration was quiet and passive, as we were all concerned about the police observing us. Nevertheless, we managed to outwit police vigilance by dividing the “autonomous procession,” joining the mass of students within their organization- and union-free procession. Being among students allowed several of us to take action, especially against the main police station of the 13th district. Several arrests were made just before we arrived at Place d’Italie, the end of the demonstration. The square was completely surrounded by police forces; luckily for us, we entered the metro without being searched or controlled. Earlier in the afternoon, an invitation spread by word of mouth suggested that an occupation and a general assembly to discuss the perspectives of this emerging movement would take place at the university of Tolbiac later that night. Several activists and students sneaked into the closed university and started the occupation. Unfortunately, members of the university administration called the police. After only several minutes, hundreds of CRS and BAC members entered the university, charging and expelling the occupants. The attempted occupation of Tolbiac University. The events that took place on Thursday, March 17 represent a key moment in the mobilization against the Loi Travail. The violent interventions made by law enforcement authorities showed that the government was determined to suppress the budding youth movement by any means necessary. With hindsight, this strategy was a mistake—for the stronger the repression, the more people joined the “autonomous” group, chanting “everyone hates the police” and confronting them. From a more positive point of view, these first two days of action and mobilization showed some of our potential to go on the offensive—prepared to fight back, to improvise, to organize, and to take initiatives collectively. During the last two weeks of March, the mobilization against the work reform intensified. Several general assemblies took place in universities and among radical circles. This is where the first disagreements about strategy, objectives, and “agenda” emerged. For some of us, the priority was to take the lead during protests and confront police forces, while others thought we should also take advantage of this new social movement to diversify our strategies by sharing our ideals with others. The difficulty of finding common ground we experienced during our first general assemblies was not an isolated case. In Paris, some radical groups always try to defend their own image and interests by imposing their point of view on others. We often face this problem in autonomous circles: the challenge of dealing with power dynamics and the hegemony of certain groups or individuals. March 24. March 24. On March 24, students and workers took the streets again. Despite the fact that numerous high schools and universities were blocked during the day, the afternoon demonstration gathered fewer people than before, as most of the official calls had been made by student organizations. The lower number of participants did not affect the determination of some of us, as evidenced by several offensive initiatives, confrontations with the police, and attempts to rescue arrestees. The official march ended with a spontaneous uncontrolled protest in the district of the Eiffel Tower, leading to a game of hide-and-seek with riot police in the Champs de Mars. March 24. March 24. Earlier that day, video footage of police officers surrounding and punching a teenager had spread across the internet. This had occurred that morning near the Bergson high school in the 19th Arrondissement while students were blocking their school. The following day, students organized a wild demonstration leaving from Bergson high school in response to the numerous cases of police violence since the beginning of the movement. While wandering in the streets, some of them sought revenge by attacking several police stations. March 24: Beneath the paving stones, the police. Finally, another national call against the Loi Travail was made on March 31. This demonstration was one of the largest that took place in Paris that whole spring. Despite the heavy rain, hundreds of thousands people marched on the streets of the French capital city. That day, the “cortège autonome” took the lead, and kept its position to the end of the event. For the first time since the beginning of the movement, a kind of cohesion appeared among the autonomous groups: a solid black bloc asserted itself as a single force despite being composed of many different affinity groups. At the end of the protest, responding to a call made earlier that week, hundreds of people converged at Place de la République with a specific goal and lots of ambitions. Nuit Debout—A Failed Attempt to Build a French Occupy Movement? Nuit Debout began the evening of Thursday, March 31, when, following that afternoon’s demonstration, activists from a variety of political and social backgrounds gathered at Place de la République with the idea of occupying the square. That night, the first tents and plastic tarps appeared—things we had not seen since refugees were occupying the square in November 2015. Numerous people attended the first general assembly of what was intended to be the French Occupy movement. In fact, Nuit Debout and the occupation of the République had been planned carefully in advance by people close to the French alternative Left. This movement was not as spontaneous as it was intended to appear. Nuit Debout at Place de la République. Over the following days, new initiatives and collectives joined Nuit Debout. During the day, workshops (woodworking, gardening, etc.) and discussions on various subjects (direct democracy, environmental issues, anti-speciesism, police violence, etc.) took place. People were regularly invited to form small groups, sit down, and start to exchange their opinions and views on a selected topic. Activists and anarchist publishers set up their tables to provide radical literature, raising money to cover the lawyers’ fees of comrades. At night, Place de la République was filled up with people attending the daily general assembly and related activities such as documentary projections, outdoor shows, and artistic projects. A do-it-yourself restaurant offered food in exchange for donations, and people stayed out until really late at night. Nuit Debout became a logical rendezvous point for radical activists and anarchists to exchange, debate, organize, and take action. At first, Nuit Debout brought a new dynamic to the movement against the Loi Travail and to activism in general. During its first month of existence, the occupation at Place de la République was essential in enabling us to meet new people, extend our relationships, develop our capacities, and take more initiatives. Some people were curious to learn about new political theories; others finally felt the need to get involved and organize. Every night of April, we could feel this mix of joy, love, excitement, effervescence, and power emanating from each one of us while we waited for the next opportunity to take action. There was a naïve feeling in the air that something new and radically different was at hand. Nuit Debout provided us with a fixed location, which enabled us to initiate both spontaneous and planned actions. If you were at Place de la République at night during April or May, you could be sure that several times a week you would participate in wild demonstrations and confrontations with riot police. However, this occupation movement that had initially gathered thousands of people progressively lost attendance throughout May. The various efforts to evict the Place de la République initiated by local authorities in the name of maintaining social order succeeded in discouraging some of the occupants of the square. By the end of June, the movement and its daily general assembly only gathered a maximum of a hundred people. Orchestra performing at Nuit Debout. The Strengths and Limits of Nuit Debout From an interview conducted with anarchist participants: Why did “Nuit Debout” take place in 2016, rather than 2011? After the 2008 international financial crisis, several European countries, such as Greece and Spain, saw their economies faltering or collapsing. In order to recover from the crisis and to maintain its economic and geographic power, the European Union and the governments that compose it began to impose austerity measures. Three years later, in 2011, the situation remained precarious. Countries such as Greece and Spain were still experiencing increasing poverty and astronomical unemployment rates. The global context at that time, but also the fact that these governments made the population “pay” for their crisis, generated defiance against politicians and the global economic system, producing movements such as the 15 de Mayo in Spain and the anti-austerity movement in Greece, not to mention Occupy Wall Street in the US. However, as Pierre Haski explains, the context in France was different. Compared to Greece and Spain, France was still in better “health,” maintaining its leading influence in Europe alongside Germany. In the collective imagination, the Greek and Spanish situations were unthinkable in France. But the main reason an Occupy movement did not emerge in France then, despite several attempts, was due to the French electoral calendar: 2011 marked the last year of Nicolas Sarkozy’s presidency. Consequently, most public attention was turned to the upcoming 2012 presidential election and the hopes represented by the socialist François Hollande. Of course, once elected, he did not create the improvements people wanted to see in their lives. So France followed a different trajectory than Greece and Spain. While the fierce movements in those countries were ultimately, albeit temporarily, pacified by the ascension of “alternative” political parties such as Podemos and Syriza, part of the French population gave the Socialist party a chance before becoming absolutely disillusioned by François Hollande and government in general. It was strange for us in the US to witness French people employing a strategy and rhetoric that we imagined had been thoroughly exhausted four years earlier, when many people in the US tend to think of France as the avant-garde of radical theory and practice. How were the idea of occupying public space and the rhetoric of democracy and demands able to gain so much traction on the popular imagination in France? First, concerning the image some people in the US have of France, we have to say that unfortunately it is related to some kind of romanticism. Yes, in the past, France had its avant-garde moments in radical theory and practice; but like in every country, radical theory and practice face moments of inefficiency and failure. Living in France, we have a more critical opinion of radicalism and its capacity to change things here. Luckily, events like the ones during the first half of 2016 revitalize our circles and create new momentum. Now to answer your question: we can trace the popularity of democratic rhetoric and the idea of occupying public space in France to multiple origins. For one thing, France has a longstanding connection with the concept of democracy itself. A significant part of the population believes that we should not criticize the democratic system, as it is supposedly the only alternative to fascism or dictatorship. This notion is so deeply rooted that even leftist protesters criticize democracy only to reform and improve and thus reinforce it. Another source of enthusiasm for building an Occupy movement could be the popularity of concepts such as “civil disobedience,” “non-violence,” and “participatory democracy” among the French alternative Left. Mainstream activism has an unfortunate tendency to imitate what has already been done rather than learning from past mistakes to create something new. Of course, the people who initiated Nuit Debout might have had a complete different vision of the effectiveness of such a movement, and fewer criticisms regarding the limits and failures of the Occupy movements than we do as anarchists. In other words, French activists also fall into the trap of romanticism regarding foreign actions, and this admiration towards Occupy movements could be an example of it. What is the significance of the Place de la République, where the first clashes took place after the declaration of the State of Emergency and the Nuit Debout occupations later began? The decision to occupy the Place de la République likely had more to do with geographical convenience and traditional political symbolism than revolutionary history, imagery, or strategy. The square is served by five major metro lines, easily accessible by foot, and at the junction of three of the 20 districts of Paris. All these criteria make Place de la République one of the most important central places of the French capital city. Moreover, since its renovation in 2013, the square includes a large pedestrian space, which enables crowds to gather for all kinds of occasions: outdoor shows, demonstrations, gatherings, and the like. However, the new setup of the Place de la République also serves those who aim to maintain social order. As people are concentrated in the center of the square, police forces can be strategically positioned in every single adjacent street and boulevard, easily surrounding, controlling, and containing the crowd. Nevertheless, there is much to say regarding the history and symbolism of Place de la République. First, as its name suggests, the Parisian square pays tribute to the political regime under which we are living—the Fifth Republic. However, the origin of its name dates back to the end of the 19th century. The Second Empire ended on September 2, 1870 after the defeat of the French army in Sedan and the capture of emperor Napoleon III by Prussia. On September 4, the Third Republic was proclaimed as a desperate attempt to reestablish political stability within the country. Contrary to the French government’s hopes, the first years of the Third Republic included the events of the Paris Commune, a failed attempt to restore the Monarchy, and numerous political crises. Political stability did not return to France until Jules Grevy was elected President in1879. In 1883, a large statue to the glory of the Republic was inaugurated at the center of the square, then called the Place du Chateau d’Eau, renamed Place de la République in 1889. As for other symbolism, the traditional Left is also historically associated with the Place de la République. When the traditional Left or trade unions take the streets for demonstrations, the République square is usually a central location on their route. For example, every year, the May Day protest starts from Place de la République. More recently, just after the Paris attacks in 2015, politicians and part of the population used the square as a mourning site. Finally, if the square has significance for anarchists, it is because since September 2015, Place de la République has been the site of many struggles, including refugees’ camps, defying the “state of emergency” by demonstrating against the COP 21, and more. Wildcat march during Nuit Debout. How did the situation in Paris compare with those in other regions? What kinds of coordination existed, formal or informal? At some point, the situation in Paris felt really good, as more and more people were attending the general assembly and activities. However, to be realistic, the number of people who took part in Nuit Debout, even if they were several thousand at its climax, represents only a small proportion of the population of the Paris region. International media coverage of Nuit Debout made the movement seem bigger than it actually was. We were far short of the massive occupations seen at the Puerta del Sol (Madrid), Tahrir Square (Cairo), or Taksim Square and Gezi Park (Istanbul). What is certain is that, like other Occupy movements, Nuit Debout gained power and popularity via the internet. Using the tools offered by social media, Nuit Debout was able to multiply its initiatives and communicate widely about its aspirations. Social media and new technologies also enabled people to coordinate general assemblies in their own cities and regions. How much influence did the discourse of democracy really have in Nuit Debout? How did that discourse and the practices associated with it interact with more traditional French Ultraleft practices and values? Did the visits paid by David Graeber and other Occupy Wall Street participants to Nuit Debout make any impact? As we mentioned previously, the discourse of democracy was central to Nuit Debout. The French Occupy movement was hard-pressed to detach itself from traditional democratic discourse and practices. From the beginning, Nuit Debout stood for a reformist leftist alternative to the system and traditional parties rather than a strong revolutionary movement. Some participants in Nuit Debout were more passive, asking for change rather that acting to bring it about. The most commonly heard demands included a better and fairer democracy in France; less corrupt politicians; and ending the 5th Republic and starting a 6th Republic, an idea already defended by the Front de Gauche political party. In its practices, Nuit Debout reproduced systems that already exist in our society such as making decisions by majority vote of the people attending the general assemblies and establishing security groups in charge of maintaining “order” at Place de la République. Among the numerous workshops and activities offered at Nuit Debout, the discourse of democracy was omnipresent—for example, people asking you to sign petitions for specific issues, or, more surprisingly, a workshop about writing a new Constitution. However, the interaction between Nuit Debout participants and the Ultraleft generally went well, in the sense that everyone was free to organize, participate, or not participate in any action or general assembly according to their personal values and beliefs. If you did not agree with a decision, you could simply leave the assembly or not take part in the action. All the same, tensions repeatedly appeared between reformists and radicals. As always, the issue of pacifism divided us, as some reformists were obsessed with creating a “legitimate,” “likeable,” and “righteous” image for the movement. Once, some Nuit Debout security members tried to extinguish a bonfire that some of us had started, on the grounds that they had decided that bonfires were forbidden—but above all because they wanted to avoid any trouble with police. Yet despite these few moments of tension, participants in Nuit Debout generally did well in respecting a diversity of actions and values. Finally, we have no idea if advice from Occupy Wall Street participants made an impact on Nuit Debout, as we were not present during these discussions. However, unfortunately, it is certain that Nuit Debout was not able to distance itself from the traditional political masquerade, as evidenced by the warm welcome addressed to Miguel Urban Crespo (the European Deputy of Podemos), and the former finance minister of Greece, Yanis Varoufakis, when they made their speech at Place de la République. Once again, we see how “romanticism,” denial, or simply a lack of understanding of foreign social and political contexts can impact a social movement. It is still surprising for us that these international figures from the so-called “alternative left” were taken seriously rather than openly confronted or criticized by the crowd at the general assembly—especially considering the social and political situation of their respective countries. What limits did Nuit Debout reach, and why? The main limit that Nuit Debout encountered was its failure to continue expanding. By the end of June, the movement was only drawing a few dozen people to its daily general assemblies. How can we explain this phenomenon? First, it seems that Nuit Debout did not succeed in reaching many people from outside the Alternative Left or Ultraleft circles. This represents a major problem, especially when the movement claimed to embody a “convergence of struggles.” Many people who experience the violence of our system at a higher level due to their social background must not have felt any interest in the proposals made by Nuit Debout, or simply did not feel included by the movement. These failures contributed to a lack of diversity. As a result, the French Occupy movement sometimes felt more like an activists’ microcosm than an inclusive movement in which everyone could feel welcome. During discussions at Nuit Debout, some of us experienced resistance to anarchist and revolutionary ideas. Even if we were allowed to speak our minds, some people were not ready to challenge their own beliefs, habits, or comfort. It was challenging to argue to people that reinventing our relationships and ourselves should not be limited to Nuit Debout, but should become a widespread practice. Finally, some of the practices and power dynamics integral to Nuit Debout contributed to its decline. In an effort to approximate “democratic equality,” the “official” moderators allowed everyone present to address the crowd about subjects of their choosing, giving each speaker the same amount of time to develop their thoughts—just a couple minutes. Although appealing in theory, this practice rapidly revealed its shortcomings, as imposing the same speaking time on each orator did not achieve the expected effects. Instead, this decision ended up preventing spontaneity and serious discussion. Furthermore, because the moderators deliberately refrained from directing or reframing, the conversation moved arbitrarily from one subject to another without any closure. While attending general assemblies at Place de la République, it was not uncommon to have the impression that one was participating in group therapy—in which everyone could express their frustration in public—rather than taking part in a constructive discussion that would lead to important decisions for the movement and our future. Ultimately, the fatigue resulting from weeks of activism and occupation—the feeling of constantly going around in circles in the general assembly—the incapacity to rally more people to the movement—the lack of interest in preparing for what would come next—and increasing police harassment at the square put an end to the French Occupy movement. Police searching bags on April 5, 2016. Increasing the Pressure April 5, 2016 – That Tuesday morning, students and activists gathered at Place de la Nation for another autonomous and offensive demonstration. That day, several affinity groups decided to join forces and work hand in hand for strategic purposes. Police forces were already controlling access to the main square by searching the bags of potential “threatening protesters.” These security measures did not stop many of us from participating in the action. As soon as the crowd of demonstrators rushed into the street, a large black bloc appeared at the front bearing several reinforced banners. Less than ten minutes after the beginning of the protest, numerous police forces began to encroach on the back of the march. To stop this, part of the bloc confronted them. After long minutes of intense confrontation, the riot brigades charged us and succeeded in splitting the march in two, isolating the head—where the black bloc was—from the rest of the crowd. Several arrests took place during the police charge, and the majority of us ended up cornered between police lines and a large wall. This marked the end of the action. After more than an hour of waiting, the police received the order to search and arrest as many people as they could. As a result, more than a hundred people were sent to police stations to get their IDs checked before being released. There are several ways to understand the failure of this morning action: first, the crowd was not compact enough, which enabled the police to separate the “potential threats” from other demonstrators. Also, the confrontations lasted longer than they should have, allowing us to make more mistakes and to become more vulnerable. Finally, the bloc remained completely static, as most of us were only focusing on the clashes; there would have been no real obstacle or danger if we had continued moving through the streets. April 5, 2016. April 5, 2016. April 5, 2016. Later that day, some of us met at Place de la République during Nuit Debout. Some comrades were still detained after the morning events; they could be facing criminal charges. To show solidarity, we initiated a prisoner support action. We appealed to others at Nuit Debout to gather in front of the police station where our friends were detained. Many people left the République and started converging in the Saint Michel district where, decades earlier, students had created barricades during the uprising of May 1968. A spontaneous demonstration began blocking traffic as we approached the police station on rue de la Montagne Sainte Geneviève. About fifty people joined us in front of the station, chanting in unison, “Free our comrades!” In the meantime, other people began blocking the major intersection next to the station, employing various components from a nearby construction site as barricades. Due to the traffic this created, the police called for reinforcements, which had great difficulty reaching our location. Knowing that the reinforcements were finally approaching the police station, the crowd decided to leave the intersection and began another wild march towards the cathedral Notre-Dame. Near the cathedral, police tried to block some of us, but without any real success. Indeed, more and more people from Nuit Debout were already converging in front of the police station. This solidarity action lasted until early the next morning, gathering more than a hundred people. If we can draw conclusions from this action, we would argue that spontaneity, motion, and determination took the police by surprise and gave us a clear advantage against them that night. This also shows how Nuit Debout was used as a platform to inform protesters about planned initiatives. April 5, 2016. April 5, 2016. April 9, 2016 – Following a major demonstration, thousands of people gathered as usual at Place de la République to spend another night at Nuit Debout. The first action that took place that night was against borders. Around 9 pm, several hundred people left the occupied square and went to Stalingrad. Once there, protesters destroyed all the fences that prevented migrants and refugees living in this district from setting up their tents and building a camp under the elevated metro station. Afterwards, the group improvised a wild march back to République. A bit later, during the general assembly, three speakers made the same funny proposal: why not invite ourselves to get a quick drink at our Prime Minister’s house? His house was located on rue Keller in the Bastille district, not too far from République. After walking around the square to initiate the action, we could hear from the crowd different voices shouting “Aperitif at Valls’!” Wildcat demonstration, April 9, 2016. As a result, about 3000 people left the square and entered the only boulevard that was not blocked by the police. At a quick pace—mobility being our chief asset against police squads—the crowd made its way through the streets, happily chanting the already famous “Paris, debout, soulève toi!” (“Paris, stand up, rise up!”) and “Tout le monde déteste la police!” (“Everyone hates the police!”). During our advance on the Prime Minister’s address, several quick confrontations with police took place, the police station of the 11th district was attacked, police cars parked outside were destroyed, and small barricades appeared in the streets. Access to the Prime Minister’s building is well-guarded, and police reinforcements showed up rapidly. Reaching Manuel Valls’ apartment would have not changed anything, anyway, as he was in Algeria. Police troops surrounded part of the remaining crowd; after half an hour, they decided to let everyone go, pepper spraying everyone one last time for good measure. On their way back to République, the remaining couple hundred people, joined by some new supporters, initiated another offensive action. Surprisingly, traffic had not been interrupted on the main boulevard leading to the occupied square, and police forces were totally absent. Activists took the streets again, smashing advertising billboards and every single front window of the banks and insurance agencies on their way. At Place de la République, there were still a good thousand people present and a bonfire was lit. The rest of the night was spent in riots. People started putting barricades into the streets, some surveillance cameras were sabotaged, projectiles were thrown at law enforcement units, and an AutoLib car—the name given to the electric car-sharing service operated by the industrial holding group Bolloré—was set on fire. Police responded by charging the square, using flash-bang grenades, and shooting rubber bullets, inflicting several arrests and injuries. April 14, 2016 – After more than a month of national mobilizations against the Loi Travail et son monde, the French government was ready to do whatever it took to bury the movement once and for all. The authorities gave police more material and human resources, but also more freedom to impose “social order” in the streets. A national coordination of students organized a protest for the afternoon of April 14. The initial route was to connect Place de la Bataille de Stalingrad to Place de la Bastille. As usual, groups of students, anarchists, and members of the Ultraleft met in the morning at Place de la République with the intention of initiating a wild action that would end by joining the afternoon’s authorized demonstration. On their way to Stalingrad, the march attacked numerous symbols of capitalism and the state. Upon reaching Stalingrad square, the march faced numerous police squads that were already surrounding part of the afternoon demonstration. It seemed that the police had received orders to contain the crowd and to block or delay the protest’s departure. Deciding not to let the police divide us, we started confronting the closest police lines in order to create a breach that would allow all the demonstrators to join together. The police ultimately retreated under increasing pressure and the action finally started. The tension was palpable. Confrontations erupted as soon as the head of the demonstration reached Place de la République. Looking at the police presence at the square, it was obvious that they had received the order to stop the protest by any means necessary. They emptied the entire square by throwing tear gas canisters and flash-bang grenades. That night, President François Hollande was invited to a live political TV show to talk with a panel of selected citizens. Nuit Debout decided to project the debate. As usual, we went to the square to “take the temperature” of the crowd and see if there would be any opportunities. After the events of the afternoon, police forces had increased their presence all around the square. During the discussion, President Hollande clearly stated that the Loi Travail would not be withdrawn, but some modifications could be made during dialogues with trade union representatives. Wildcat demonstration on April 14, 2016. Soon after the debate ended, we gathered with other radicals and started walking around the square as an attempt to initiate something. Quickly, people lit torches and some of us started chanting “Si on ne marche pas, ça ne marchera pas!” (“If we don’t take action, no change will come!”) while others discussed whether to go to the Presidential Palace. Hundreds of people set out for the Boulevard Saint-Martin, but were stopped by police lines. While a group of us confronted the men in blue, the rest decided to continue the action by entering the Boulevard Magenta, where, once again, police forces were waiting for us and started shooting flash-bang grenades and tear gas. However, while focusing on the small group confronting them, police forces made a strategic mistake: they neglected to secure an adjacent street. We took advantage of the situation by entering the rue Léon Jouhaux and unleashing the storm. The first target attacked was the regional Customs’ building. At the end of the street, we all crossed the bridge of the Saint Martin canal, then turned on the Quai de Jemmapes, increasing our pace and covering the walls with our thoughts, dreams, and desires. A bit further, some people smashed the front windows of a corporate grocery store, then rushed inside to loot everything they could. Ahead, we could see numerous police vehicles coming our way. Taking advantage of their lack of mobility, we took a narrow street, heading north to the Boulevard de la Villette. Along the way, we expressed our rage by destroying banks, real estate and insurance agencies, AutoLib cars, bus shelters, billboards, and a Pôle Emploi agency—an administrative institution in charge of employment that actively participates in maintaining the conditions of exploitation by providing a desperate workforce, reinforcing social inequalities, and destroying people’s lives by denying or reducing unemployment benefits. At Colonel Fabien, we took the Avenue Mathurin Moreau, leading to the Buttes Chaumont Park. Again, several AutoLibs were destroyed, and hasty barricades were erected in the street to slow police vehicles. As a wink to the COP 21 decision to reduce greenhouse gas emissions, some of us decided to assist by destroying a luxury car dealership located nearby. Once in front of the park, what remained from the hundreds of people who had left République continued walking towards the 19th district’s City Hall. However, feeling that the wind would sooner or later turn, we decided that it was the right moment for us to leave the action—which ended few minutes later anyway, when the first police squad showed up just after the crowd reached City Hall. Indeed, as we were withdrawing through another avenue, we passed dozens of riot cops who were trying to reach the demonstration. Nevertheless, the arrival of numerous police reinforcements in the area—a desperate attempt to regain control of the situation—did not change the course of the evening. That night, the storm raged in the streets of Paris, and we were part of it. April 21, 2016 – While taking part in Nuit Debout at Place de la République, we got word that an initiative to help migrants and refugees was planned for later that night. The idea was to open a new squat somewhere in Paris for migrants to occupy. To succeed, such an action would require support from outside to prevent the police from intervening. We were informed that the location was already selected, and that, at the appointed hour, we would receive the address. In the meantime, other activists would lead a group of refugees to the location. We eventually received the address, left République, and took the metro to our destination. The squat was an unoccupied high school on Avenue Simon Bolivar, near the Pyrénées station, in the northeast of Paris. After waiting in small groups outside fast food restaurants or cafés to look less suspicious, we learned that the group of migrants was close. The crowd converged in front of the building, occupying the entire sidewalk and hiding the main entrance from sight. Several activists sneaked inside the high school, opened the main entrance for the migrants, and then, a few minutes later, closed and locked the doors from inside. Altogether, the entire action only took several minutes. Unfortunately, the authorities were warned that something unusual was happening in the neighborhood, and the first police car patrol showed up just after the doors were closed. We decided to stay near the squat, ready to respond to police intervention. Police reinforcements stopped in front of the squat, but in the end they did nothing more than try to see if the building was occupied and threaten us. Despite several actions to support this initiative, the squat only lasted for two weeks. On Tuesday, May 3, late at night, we received a last-minute appeal to gather in front of the squat early the next morning, as an eviction was imminent in consequence of a decision of the Administrative Court of Paris. Unfortunately, the large crowd that responded to the appeal could not do much to stop this massive police operation. As expected, on May 4, early in the morning, polices entered in the squat and violently evicted almost 300 migrants. Police evicting migrants from the squatted high school. May 1, 2016 – For many countries around the world, May Day is the international day of workers, paying tribute to the workers’ struggles of the late 19th century and the introduction of the eight-hour workday. However, it has a different connotation in France. In 1941, Marshal Pétain—fervent anti-Semite, head of the French government during the occupation, and one of the main people responsible for state collaboration with the Nazis—enacted new legislation stating that May Day would be called “la fête du Travail et de la Concorde sociale” (“the day of labor and social harmony”). The objective of the law was to create a rupture with socialism and Marx’s theory of class struggle. Since that law, Labor Day in France continues to bear the name “Fête du Travail,” paying tribute to Pétain’s maxim “Travail, Famille, Patrie” (“Work, Family, Fatherland”). How ironic and exciting it was for us to take the streets on Labor Day, then, when we had been fighting for almost two months against a new work reform—but also against the concept of work itself and the political and economic system as a whole. We were absolutely determined to see how this day would unfold. Every May Day, during the morning, traditional anarchist unions such as the CNT, the Fédération Anarchiste, and Alternative Libertaire gather at Place des Fêtes for an anarcho-syndicalist demonstration to pay tribute to the events of the Haymarket and its martyrs. Unfortunately, these protests are purely symbolic—they are more akin to a nice Sunday family outing under black and red flags than a passionate, offensive anarchist action. Nevertheless, alongside with other autonomous anarchists and insurrectionists, we decided to join their ranks to participate in the festivities—and who knows, maybe make the event more effective than usual. Hundreds of people took part in the demonstration from Place des Fêtes to Place de la Bastille, the official departure point of the national Labor Day demonstration. The anarchist march was more fun and offensive than we had expected: the walls of a church were spray painted, specific stores, windows, and ATMs were redecorated, and firecrackers and other projectiles were thrown at some police squads. As a whole, the action went without a hitch, as police kept their distance from us most of the time. The only discordant aspect of the morning was that someone who identified with anarcho-syndicalism started threatening some of us for attacking symbols of the capitalist system. His main arguments were that such actions were stupid and dangerous because they would get us all arrested. This example highlights some of the conflicts between different schools of thought in anarchism—but mostly, it shows how deeply rooted skepticism towards a plurality of tactics remains among many activists. As had become usual since the beginning of the movement, anarchists, autonomous radicals, and non-affiliated individuals took the lead in the demonstration. What a great pleasure it was to do this on Labor Day, relegating trade unions—political traitors and pawns of established political power—to the end of the procession where they belong, behind those who refuse any kind of political hijacking or representation. The least we can say is that the “autonomous procession” on May Day was incredible. We had never seen thousands of people of all ages, genders, and social backgrounds interacting in such a powerful and chaotic harmony. Because police had often shot tear gas canisters, flash-bang grenades, and rubber bullets at demonstrators since the beginning of the movement, numerous people came to the protest with protective equipment: safety or swimming goggles, face masks, gas masks, scarves, first aid medical kits, and more. As soon as the demonstration started, we set the tone by attacking the isolated police units positioned along our route. All kinds of projectiles were thrown at them: glass bottles, stones, firecrackers, fireworks. Despite the imposing police presence—from police officers in plain clothes (recognizable from miles away) following us on each side of the march to riot squads at each intersection and in front of potential targets—we managed to remain offensive, compact, and in constant motion. Unfortunately, the situation changed once we reached the intersection of the Boulevard Diderot and the rue de Chaligny. There, police forces succeeded in blocking us, and, to some extent, disorienting us by attacking the march from several directions at once. After long minutes of confrontation, riot police squads slowly gained the upper hand, dividing the head of the demonstration into two parts. Again, we paid the price for our failure to stay mobile, a mistake we had already made in the past and failed to learn from. The first part of the group was completely surrounded by police lines only half a mile from our destination, Place de la Nation. Again and again, we confronted the police lines in hopes of creating a breach, but without success. However, the second part of the “autonomous procession,” which remained all that time behind police lines, refused to disperse or to continue demonstrating without us. In solidarity, hoping to reunify the head of the demonstration, they increased the pressure around the police lines by getting closer and collectively screaming anti-police chants. After almost an hour without moving, police brigades finally backed down, as they were completely surrounded and could not handle the pressure anymore. When the two crowds reunited, we all joined in long cheering and the protest resumed its course. During the half mile that remained to our destination, we spray painted almost every wall, smashed billboards, and some of us attacked a small group of riot police in a nearby street. All these initiatives received acclamations from the crowd. Then, suddenly, thousands of people began chanting in unison “Nous sommes tous des casseurs” (“We are all rioters”) until we reached Place de la Nation. This last event might seem trivial; in reality, it represents an extremely important ideological shift in the movement. Since the beginning of the movement against the Loi Travail et son monde, media figures and politicians had worked hand in hand to make a distinction between the “legitimate, good, respectful, and non-violent demonstrators” and the “casseurs” or other “rioters” belonging to the notorious “black bloc,” who supposedly had no legitimacy or place in the movement. Unfortunately for them, the events of May Day broke their spell. People realized that the so-called “rioters” were just demonstrators like everybody else. Moreover, during the confrontations, they experienced mutual aid and solidarity, as the “rioters” were there to provide assistance wherever it was needed, to reassure people who were scared about the situation, to protect others during police charges, and to throw tear gas canisters back at the police who shot them. After experiencing disproportional police oppression on May Day, more and more people became critical of the police as an institution. May 1, 2016: Black bloc versus police. May 1, 2016: Fireworks. May 1, 2016: Riots. May 10, 2016 – Due to the increasing unpopularity of the Loi Travail among part of the French population, but also as a consequence of the difficulty the government had in containing the anger of the social movement, Prime Minister Manuel Valls announced that after consulting his ministers he had decided to invoke article 49:3 of the Constitution. This article allows him to engage the responsibility of the government in adopting a law. By doing so, the law is considered already adopted without passing through the traditional debates and vote at the Assemblée Nationale. The only way to counter such a process is by presenting a motion of no confidence within 24 hours. Using article 49:3 to impose the work reform by force has the merit of revealing the true face of representative democracy. When this was made public, people converged in front of the Assemblée Nationale, the lower house of the French Parliament. For the occasion, Nuit Debout also relocated its general assembly in front of that building. Upon arriving, we discovered that an imposing police deployment was already waiting for us. Police squads and vehicles could be seen everywhere around the area. Some were guarding the front of the National Assembly; others were standing by, waiting for orders, ready to attack us from the rear if needed. However, the police presence did not intimidate the thousands of people who gathered that night in front of the building to show their opposition to the government. May 10, 2016: People gathering in front of the National Assembly. Unfortunately, for the most part, the action remained static, as police lines carefully contained the expanding crowd by blocking strategic accesses or surrounding groups of demonstrators, like on the Concorde Bridge. Frustrated by such inaction, and knowing that sooner or later police reinforcements would show up to secure the entire area, some of us decided to pay a visit to the Parti Socialiste headquarters located a couple streets away. When our group finally decided to join them, it was already too late, as police were coming our way. To avoid being surrounded, we went down to the docks and ran the opposite way until we reached a safe location. After this short jog, we decided to cross the Seine River and relocated to the Quai des Tuileries. From where we were standing, we saw a large group of demonstrators leaving the site of the Assemblée Nationale and heading towards the Orsay Museum. Instantly, tear gas canisters were shot at the crowd. At the same time, on our side of the river, police started evicting groups of demonstrators from the Concorde Bridge. As it was obvious that police were becoming distracted dealing with all these different situations, we decided to take the opportunity to start our own action. We shouted for demonstrators to join us and began walking rapidly towards the Louvre. As expected, the spontaneity of our action and our mobility rapidly gave us precious advantages against our pursuers. Near the Pont Royal Bridge, as police vehicles were gaining ground, we threw barriers and construction equipment into the middle of the road. We crossed the Jardin des Tuileries and the Louvre, and then found ourselves face to face with the statue of Joan of Arc, freshly decorated with wreaths of flowers. It took us only few seconds to profane and vandalize this place of worship so dear to the National Front, fascists of all kinds, and other traditionalists. As soon as police vehicles showed up, we rushed into the narrow streets of the wealthy districts of Paris. We continued our pleasant night stroll by passing near the Opera, then headed towards the old Bourse du Commerce, our equivalent of the US Stock Exchange, leaving sporadic marks of our passage before finally vanishing into the silence of the night. Later that evening, we learned with enthusiasm that several similar actions had taken place in other parts of the city. May 12, 2016: Riots. May 12, 2016: Riots. May 12, 2016: Riots. May 17, 2016 – Desperate to finally muzzle the social movement against the Loi Travail, the authorities decided to make use of the “state of emergency.” Several persons received official documents prohibiting them from taking part in the major demonstration scheduled for May 17. However, these bans were cancelled after that an administrative judge declared that such documents represented a violation of the freedom to demonstrate. The least we can say is that the entire march, from Ecole Militaire to the Place Denfert-Rochereau, was odd. First, to reach the demonstration itself, we had to cross several security cordons, where police officers carefully searched our bags to confiscate all types of equipment that could be useful during confrontations. For the first time, we felt like all this was some kind of a trap. However, some of us managed to join the march without being searched, finding opportunities to get around several security checkpoints. Another strange aspect was the fact that the police were leading the procession, which did not bother trade unions and demonstrators at all. Looking at the crowd of demonstrators, it really seemed like we were nothing but a flock quietly following its shepherd, emptied of any passion. Luckily for us, the wind finally turned once we entered the Boulevard du Montparnasse. Groups of people dressed in black began to appear among the crowd of students; shortly after, the first provocations against police lines occurred. The autonomous group was back, ready and determined to interrupt the lethargy of this protest. Long confrontations took place until the end of the demonstration. At some points, the streets were literally full of tear gas. Nevertheless, we managed to reach our destination, Place Denfert-Rochereau. Once on the square, we saw that most of the exits were closed and controlled by police. Our best chance to avoid being trapped was to exit the square the same way we had come in. This meant making our way out through the various trade unions represented in the march. While we were heading towards the entrance of Boulevard Raspail to exit the square, the closest trade union march stopped. Suddenly, the trade union members in charge of security opened the trunk of a car and armed themselves with baseball bats, iron bars, and pickaxe handles, forming a line in front of us, closing the only safe exit from the square and helping the police to accomplish their goal of controlling the crowd. After long minutes of bitter arguments during which demonstrators and trade union security members exchanged threats, they finally opened their lines so that people could leave the square. This event illustrates the tensions that exist between the trade unions and the non-affiliated part of the movement. It is not easy to identify the reasons some trade unionists decided to arm themselves to assist the police that day. We can only assume that they were exasperated from having no legitimacy in the social movement and no control over it, and expressed their frustration against those they accused of ruining their political image. May 17, 2016: Armed trade unionists, tear gas, police leading the demonstration. May 18, 2016 – On Wednesday, May 18, the conservative and reactionary police union Alliance organized a protest at Place de la République to denounce the “anti-cop hatred” that had been increasing during the movement. Of course, everyone understood that this victim rhetoric was purely strategic. Having such a meeting for police unionists and officers to speak about the difficulty of their work was a way to divert attention from the daily violence perpetrated by the men in blue. Concerning the Loi Travail, it would be impossible to count how many people had been beaten, injured, or arrested since the beginning of the movement. Finally, the fact that the gathering was organized at République, where the French occupy movement started and where people had confronted the police together many times, represented an open provocation from the police. The police were engaging in a territorial war in order to reassert dominance. As soon as we heard about the police gathering, we decided that we would also converge at Place de la République to disrupt their protest. Due to the nature of this event, we knew that reaching the square would be difficult—and perhaps dangerous, as the police officers joining the demonstration would not be at work, and therefore even more free from regulations than police officers usually are. Early in the morning, some us met away from the square, with the intention of approaching it casually in groups of two or three. Unfortunately, this strategy didn’t work at all. As we headed towards République, two of us passed by two unmarked police vehicles that we had previously spotted, and as soon as we crossed the next street, officers in plain clothes stopped us to search and interrogate us. After several failed attempts to learn what we were doing in the area and whether we were involved with the “autonomous left-wing movement,” the leader of the squad lost his patience and started to threaten us. They had nothing they could use against us, so we left them. In the meantime, at République, a few hundred people were gathering for the “anti-cop hatred” protest. Some politicians showed up to support the angry crowd of police officers and sympathizers. The crowd warmly welcomed several members of the Front National who joined the protest. Some of us succeeded in gathering not to far from the square, but as all the entrances were heavily guarded, we decided to start our own action near the police gathering. While walking on the Quai de Valmy, demonstrators fortuitously encountered a police patrol. Without a second thought, they attacked the police car stuck in traffic, smashing its windows and throwing a lit torch in the back seat. The police officers exited their vehicle and impotently watched it go up in flames. Whether or not we agree with the way the events unfolded, setting a police car on fire—while only half a mile away, police officers were protesting against “anti-police hatred”—is a beautiful political act, full of poetry and symbolism. However, after this event, the authorities carried out witch-hunts, arresting six people altogether. During the subsequent trials, judges said that some of those charged had been identified by an undercover police officer—which is quite surprising, considering that the protesters who attacked the police car had masked their faces. Under the pressure of the police unions, the judges incarcerated four of our comrades under the following charges: attempted voluntary manslaughter of a person holding public office, destruction of property, group violence, and participating in a masked armed group. Some of them are members or sympathizers of the Paris and suburbs Antifascist Action; another is Kara Wild, an anarchist comrade and trans person from the United States. May 18, 2016: Law enforcement officers gather to denounce “anti-cop hatred.” May 18, 2016: Members of the fascist National Front at the demonstration against “anti-cop hatred.” May 18, 2016: A police car on fire near the demonstration against “anti-cop hatred.” June 4, 2016 – While the French government and much of the population were waiting for the opening of the European Football Cup tournament in France on June 10, we were all focused on keeping the movement against the Loi Travail et son monde alive. On June 4, as every year since 2013, an antifascist demonstration took place to commemorate the death of the young activist Clément Méric, who was murdered by neo-Nazis on June 5, 2013. Hundreds of people gathered at Place de la Bataille de Stalingrad, some German comrades joined us for the occasion, and after a long wait, the crowd started leaving the square. We heard that the police had made it clear that as soon as any property destruction or confrontations took place, they would immediately stop and disperse the procession—as if we cared about their threats! The antifascist and autonomous crowd crossed the Boulevard de la Villette and took the Quai de Valmy. It was not a coincidence that authorities changed our route at the last minute to redirect us onto the same street where the police car had been set on fire a couple weeks before. However, as soon as we entered the street, the black wave got to work. Windows were smashed, walls were spray-painted, and torches were lit as people chanted anti-capitalist and antifascist slogans. Every single symbol of gentrification on our path was redecorated to our liking. After a little less than a mile, some of us decided to leave the action, while the rest of the march found itself face to face with police forces at precisely the location where the police car had been set on fire. Considering their presence a deliberate provocation, some people responded by attacking them. Unfortunately, after a while, police squads succeeded in surrounding what remained of the march. June 4, 2016: Confrontations. June 4, 2016: Confrontations. June 4, 2016: After the storm. June 14, 2016 – There were nationwide appeals to join the afternoon demonstration in Paris on this special day. We heard that for the occasion, several hundred buses were supposed to converge in the capital city. It seemed that people were more determined than ever to confront the government. The demonstration was supposed to start from the Place d’Italie and take main boulevards to the Esplanade des Invalides. Choosing that location as the point of arrival brought back good memories of riots during a demonstration against the CPE law in March 2006—for some of us, our first experiences of rioting. Could we consider this some kind of sign? Unfortunately, some of us joined the demonstration pretty late. As a result, we missed some really intense confrontations with police, especially the one at the metro station Duroc, near the children’s hospital Necker. While moving through the crowd to get closer to the head of the march, we realized a few things. First, an impressive number of people were in Paris to demonstrate; it was impossible to see both ends of the protest at once. It has been said that about one million people walked in the streets of Paris that day. Second, we experienced real cohesion, solidarity, and trust among the people who formed the now classic non-affiliated autonomous procession. Whether a trade unionist, a student, or an anarchist, everyone was free to act as she or he wanted, and everyone was taking care of each other. For example, we saw groups of trade unionists confronting police lines, and some of them even helped us to de-arrest comrades. The intensity of confrontations peaked during this demonstration. The streets were covered with projectiles of all kinds: stones, broken glass bottles, torches, empty tear gas canisters, rubber bullets, flash-bang grenades. The walls were covered with painted messages; the symbols of the old world were destroyed, the windows smashed. For the first time since the beginning of the movement against the Loi Travail et son monde, the authorities used a water cannon to disperse the crowd. Police violence also intensified. During the hour we spent in the demonstration, we saw about ten people injured or laying on the ground receiving assistance from demonstrators, street medics, or emergency personnel. As planned, the demonstration ended at the Esplanade des Invalides. While the march was slowly entering the esplanade, the classic closing confrontations began. Protesters started attacking the water cannon and the closest police lines. Riot police responded, covering the esplanade with tear gas. Coming from the sides, groups from the anti-criminality brigade (BAC) in plainclothes approached the confrontation zones. Police forces were progressively gaining control of the entire zone. After more than half an hour of chaos, after witnessing a distress flare from police lines, we decided that it was time to leave the esplanade before the authorities managed to close all the exits. While withdrawing from Invalides, we learned that some people were gathering near the Senate in the Sorbonne district for a “picnic and soccer” party. Curious to know what it was about, we decided to go there. About a hundred people were there, holding a discussion in some kind of assembly. After minutes of waiting, doing absolutely nothing as the access to the Senate was heavily guarded, we finally decided to continue the day of protest against the Loi Travail by stopping traffic and taking the streets for a nice walk. We first took the direction of the Panthéon, going up the rue Soufflot. Then, as police vehicles were following us, we accelerated our pace and took the rue Saint Jacques. We turned in front of the prestigious Collège de France, took the first narrow street, and climbed up the hill as police vehicles were really close to us. Unfortunately, as soon as we reached the Panthéon again from another side, we had to disperse as police were exiting their vehicles. After this quick but fun wild action, we went to Place de la République. The square was surprisingly crowded, and a bit after 9 pm some of us decided to improve the setting by setting a metro security car on fire. Police squads rapidly arrived at the square. The tension was palpable. We knew that more confrontations were going to occur. Then about a thousand people decided to leave the square for a wild march, followed close behind by police vehicles. That was when we decided to leave the action and République. June 14, 2016: Tout le monde deteste Starbucks. June 14, 2016: Demonstrators. June 14, 2016: Police surrounding demonstrators at the end of the demonstration. After that day, the government changed its strategy regarding demonstrations. First, the authorities canceled a major demonstration that was planned for June 23. Their justification for doing so was that, due to the past events during the previous demonstration, they were not able to ensure the safety of property or individuals anymore. What an interesting statement, the government acknowledging its complete loss of power! However, due to the objections of trade unions, the authorities reconsidered their decision. Finally, the demonstration was authorized for June 23, on two conditions: the authorities would impose its route, and police would intensify their control of demonstrators. Naturally, trade union leaders accepted these conditions. We decided not to take part in this demonstration. There was no reason for us to rush straight into a trap. Shortly before June 23, we learned that the march would make a mile-long loop around the Parisian marina, leaving Place de la Bastille to finally reach… Place de la Bastille. To prevent property destruction or confrontations, the authorities covered every potential target with wooden planks, established a large number of security checkpoints, and carefully positioned their troops all around the route, so that wherever you went during the demonstration, police squads would be facing you. Despite all these measures, the demonstration gathered more than 30,000 participants; it seems that some people really love walking in circles and being monitored. On June 28, another demonstration was organized between Place de la Bastille and Place d’Italie, but as the authorities were once again imposing the rules, we decided to stay home. However, we continued taking part in less official initiatives at night at République. On the evening of July 2, after attending a barbecue organized by some people close to the appelistes, about a hundred people left the party to enjoy a nice walk in the warm summer night. People left Ménilmontant and took the Boulevard de Belleville. We reached the Belleville metro station after several detours through adjacent streets where people destroyed trashcans, wrote on walls, and chanted joyfully. There, some of us attacked the CFDT headquarters, destroying all its front windows. Several minutes after, as police forces were finally showing up, we left the boulevard and disappeared into adjoining streets. It was not the first time that trade union buildings were targeted during the movement against the Loi Travail. The CFDT (Confédération Française Démocratique du Travail, French Democratic Confederation of Work) was regularly targeted for refusing to take a stand against the law. June 14, 2016: Time to Learn from Our Mistakes and Move toward the Future What happened next was predictable. As always occurs during confrontational social movements, the government contained popular discontent as much as it could while playing for time. This strategy seems to have been fruitful: as the summer holidays were approaching, officials knew that the movement against the Loi Travail et son monde would die down. France has a regrettable tendency to give up struggles as soon as the summer holidays are in sight. Naturally, politicians are aware of this and take advantage of it by passing “sensitive” laws when no one is around to resist. As expected, after two more applications of article 49:3 of the Constitution, the Assemblée Nationale adopted the Loi Travail despite the months of mobilization against it. Since the law was adopted, more events have occurred in France. First, frightened by the appeals that insurrectionists and anarchists made to prevent the traditional summer meeting of the Parti Socialiste, the government decided to simply cancel the event. On August 31, Nuit Debout gathered several hundred people at Place de la République for their first general assembly since summer break. Then, to celebrate students going back to school, there was another national demonstration against the Loi Travail et son monde on September 15. As usual, there were intense confrontations with the police; several petrol bombs were thrown at the riot squads. Unfortunately, since then, no more major demonstrations against the Loi Travail have occurred. The demonstration on September 15. In the meantime, fascists, religious traditionalists, conservatives, and police forces have also been mobilizing. The Manif Pour Tous, an organization gathering religious traditionalists, homophobes, and fascists that became notorious after demonstrating against same-sex marriage in late 2012-2013, took the streets again in October 2016 to denounce gender theory, Medically Assisted Procreation, and third-party reproduction. The demonstration gathered tens of thousands of people, far exceeding their earlier numbers. Moreover, in Paris, an accommodation center for homeless people has been attacked several times since its construction. The last attack occurred on November 5, at night, when someone tried to set the center on fire while 27 adults and 24 children were inside it. Finally, in late October, police officers took the streets after one of them was injured by a petrol bomb while on duty in a case not related to the movement against the Loi Travail. They were demanding more equipment and assistance from the government, but also that the conditions justifying self-defense should be reviewed. As the next Presidential elections were to take place in spring 2017, the government decided to accelerate its pace of decision-making by authorizing the complete destruction and eviction of the “Jungle,” the migrant camp in Calais on the way to Britain. The operation began on October 24. While bulldozers and excavators protected by police were destroying tents and other hand-made habitations, migrants were forcibly sent to other accommodations. The truth is that, for some of them, the journey ended in French detention centers. A week later, the dismantlement of the “Jungle” concluded as the last shelters were destroyed on the afternoon of October 31. More than 6000 migrants and refugees were evicted during this operation. On Monday, November 14, the Administrative Court of Appeal of Nantes rendered its decision, authorizing the construction of the Notre-Dame-Des-Landes airport, ignoring the proofs of potential environmental impact presented a week before by its own public rapporteur. Dismantlement of the Jungle. Dismantlement of the Jungle. In view of the overall political and social situation in France, we can see that the upcoming months will be crucial in shaping our future. This is why we took the time to analyze what happened during the months of social upheaval against the Loi Travail et son monde, to make a self-criticism and raise questions. Such reflections should be made collectively, so that they benefit from many different experiences and analyses. To offer our own contribution to this process, we would like to discuss how the glorification of “insurrection” in our circles could end up alienating us. Of course, we have all shared this dream at least once—that people would suddenly rise up to overthrow the government together. Unfortunately, it seems to us that during the events related to the Loi Travail, this obsession mostly resulted in concentrating our efforts on directly confronting police forces. These confrontations became a kind of routine—for some of us, they became the only reason to participate in a demonstration. Over time, this approach showed its limits, as police squads ceased to be surprised by our attacks. Several times, it was obvious that they were expecting us to attack, that they actually wanted us to. Those were the moments when we missed important opportunities to diversify our tactics and implement new strategies in order to continue taking them by surprise. Once again, we are convinced that spontaneity, mobility, and the element of surprise are the key elements that can give us a clear advantage. This tendency to focus on confrontation alone is interrelated with the problem of becoming integrated into the same spectacle that we criticize. We all know that media outlets are partial to sensational and spectacular images of “rioters” attacking police forces. Nowadays, we are not only under the cameras of mainstream media and police officers, but also of other activists who are documenting every moment of our actions. Like it or not, we too are becoming prisoners of our image. By actively participating in reinforcing the culture of the spectacle, we feed and reinforce our own obsession with rioting and insurrection. Even if we criticize this trend, we also acknowledge that such footage might have some utility for presenting events to other activists. Finally, we believe that we should distance ourselves from the current obsession with insurrection and its rhetoric. If we do not do so, we may end up distracting ourselves from our true objectives. Instead, we should keep our minds clear, work together on new projects, and find new and subversive ways to liberate ourselves from the old world. Several months ago, appelistes claimed that there will be no presidential election in 2017; with the benefit of hindsight, this strikes us as a bit optimistic. All the same, it is time to learn from our mistakes, but also from our victories, to acknowledge our limits and our capacities to exceed some of them. All this, in order to advance upon the future and prepare ourselves for new horizons. June 4, 2016: From the storms of last year to the tempests to come. Postscript: On the Eve of the Presidential election We will conclude with a brief overview of several events that took place in France since we drafted this article at the end of 2016. We hope that it will give a clearer picture of the situation in France before the upcoming elections, but also demonstrate that, alone or in affinity groups, people are still organizing, attacking, and resisting the old world and the pawns that serve it. Since the end of the mobilization against the Loi Travail et son monde, the French government has intensified its investigations of those identified as “threats.” This is why, while several comrades were already in custody for taking part of some of the events described above, the authorities arrested another comrade in early December 2016. Since then, Damien has been accused of taking part in several attacks during the night of April 14, 2016, when an autonomous march resulted in thousand of euros in property destruction. After going to trial on January 19, 2017, he has been sentenced to 10 months in prison and 14,000€ of restitution. However, several solidarity actions took place since Damien’s arrest: in mid-December, several bank ATMs were destroyed in Besançon and Marseilles; on December 26 (Damien’s birthday), a luxury car was set on fire in an upper-class district of Paris; finally, at the end of December, in Brussels, several billboards and a security car were destroyed, while on New Year’s Eve a Vinci car and a Bam car—both companies known for building prisons—were set on fire.. Several actions also took place in front of the Fleury Mérogis prison, where some people who actively took part of the mobilization against the Loi Travail are detained. Meanwhile, at the end of March 2017, Antonin, a member of the Paris and Suburbs Antifascist Action, was released from prison after spending 10 months in custody on account of the police car set on fire on May 18, 2016. Unfortunately, some other comrades remain incarcerated: Kara, Nico, Krème, and Damien. In the meantime, actions of resistance have intensified throughout France in the different ZADs against the several useless projects. While Notre-Dame-des-Landes remains the best known example of activist resistance in the name of environment preservation in France, another conflict is gaining in importance. For about 20 years, the ANDRA (the National Agency for the Treatment of Radioactive Waste) has intended to establish its new treatment site near Bure, a small village located in the Meuse region of France. The purpose of the ANDRA is to study the soil in the region to find the perfect location for burying high-level nuclear waste. There is no need to explain the environmental consequences of such a project. This is why, for several years now, activists have been organizing resistance in the region through legal objections, protests, occupations, direct action, and sabotage. Last February, activists succeeded in tearing down the fences surrounding the ANDRA laboratory. In order to weaken the resistance against this project, French authorities employed the tools offered by the “state of emergency,” issuing numerous “inadmissibility” documents that forbid activists to be physically present in the region of Bure However, these threats did not have the expected effect, as some activists publicly expressed their will to continue the struggle in the field. Finally, during the last months, some tragic events involving police violence and murders have led to several protests and riots. Last summer, on July 19, 2016, 24-year-old Adama Traoré was found dead after being arrested by the police. Quickly, authorities decided to cover the incident by providing the result of an autopsy, explaining that the death of the young man was not related to the conditions of his arrest but due to personal health problems. However, further autopsies and testimony revealed new information and a whole different story than the one presented by official authorities. After Adama’s death, his family organized numerous protests and gatherings, alongside other organizations, to denounce police violence and impunity. More recently, on February 2, 2017, after a police control, 22-year-old Théo was hospitalized on account of a long wound inside the anal canal and a lesion of the sphincter muscle. Théo explained that during the police control, one officer penetrated him with his telescopic baton. The first official statement made by authorities did not mention any of this. This tragic event received widespread media coverage, revealing once more how the authorities try to cover up evidence and deny obvious facts. Politicians saw this event as an opportunity to reinforce their positions in view of the upcoming elections. For example, reaffirming once more her commitment to authority and law enforcement, Marine Le Pen gave all her support to the police officers involved in the case. However, despite promises to solve the case and uncover the truth behind this so-called “police burr,” the French government did not succeed in containing popular anger and thirst for vengeance. Riots and clashes with police immediately broke out in the suburbs. At Aulnay-sous-Bois, the police shot live rounds to disperse rioters. These events remind us of 2005, when the deaths of Zyed and Bouna—two teenagers who were chased by the police—moved part of the population living in these territories called “suburbs” to revolt. On February 11, 2017 thousands of people gathered in front of the Bobigny Court to show their solidarity with Théo and his family. The massive presence of police forces near the Court and in nearby streets exacerbated the frustration of the crowd, who chose to attack and confront them until late that night.. Numerous protests against police violence and in solidarity with Théo were also organized in Paris, Rennes, and Nantes, which brought back some of the atmosphere we had experienced a year before during the Loi Travail: uncontrollable demonstrations, property destruction, confrontations with police. Then, on March 26, 2017, members of the anti-criminality brigade (BAC) killed Liu Shaoyo while he was preparing dinner for his family. As always, the authorities tried to explain away this “accidental” death by giving their own version of the event. The Shaoyo family itself contests this version, as they were present during the police raid. Again, this murder led to several gatherings and protests in front of police stations. The least we can say is that, on the eve of the Presidential election, the supreme example of political spectacle, the climate in France is tenser than ever. During the last presidency and especially since the Loi Travail, part of the population has lost faith in the prevailing political system. Others see in the Alternative Left an option that will deliver us from our miseries. Still others, reinforced by the xenophobic discourses of the “migrant crisis,” the election of Donald Trump, and the Brexit success, seek a solution in the Front National, which promises to defend a supposed “French identity” and national interest against globalization. On account of its dangerous agenda and its popularity, activists have disrupted some of the electoral meetings of theFront National, including one in Nantes and another more recently in Paris. Moreover, for the first time in the history of the 5th Republic, the two traditional parties might not see one of their leaders elected as President. The outcome of the upcoming election remains more uncertain than ever; it is possible that a fascist, populist, and xenophobic government will come to power on May 7, 2017. Yet in the face of all these uncertainties, one thing remains certain: whoever is elected, we will remain ungovernable! Further Reading and Viewing Paris: Sous les Pavés la Rage, by Taranis News offers an overview of events throughout the protests against the Loi Travail.
{ "pile_set_name": "OpenWebText2" }
The effect of bile salts on the formation and hydrolysis of cholesterol esters by rat liver enzymes. To determine the effects of different bile salts on the enzymic esterification of cholesterol and the hydrolysis of cholesterol esters rat liver homogenates and rat liver microsomes were incubated with varying amounts of different bile salts. Bile salts inhibited the formation of radioactive cholesterol esters in incubations of either rat liver homogenates or rat liver microsomes containing [14C]cholesterol. Chenodeoxycholate, glycochenodeoxycholate and taurochenodeoxycholate were more potent inhibitors than their comparable cholate analogues. Bile salts stimulated the hydrolysis of cholesterol esters when incubation were carried out with the liver homogenates. The dihydroxy bile salts were again more potent in this regard than the trihydroxylated bile salts. When the effects of bile salts on cholesterol ester hydrolysis were studied in in vitro incubations of hepatic microsomes a biphasic mode of acion was observed. In the absence of Na+ or K+ bile salts stimulated the hydrolysis of cholesterol oleate. However, following the addition of either Na+ or K+ to the microsomal incubations, bile salts caused an inhibition of cholesterol ester hydrolysis. Since cholesterol esterification was also inhibited under these conditions a direct inhibitory effect (not attributable to enhanced hydrolase activity) of the bile salts on the formation of cholesterol esters by the microsomes was established. Furthermore, this inhibition takes place at the transacylation step involving the fatty acyl-CoA ester and the sterol. These results suggest that bile salts can significantly alter the cholesterol-cholesterol ester profile in the liver, and furthermore, that these effects may be influenced by small changes in the intracellular environment in the region where these reactions occur.
{ "pile_set_name": "PubMed Abstracts" }
[The use of roentgenstereophotogrammetry in dentistry for the localisation of ectopic teeth (author's transl)]. Ectopic teeth in the maxilla in eight patients were localised by roentgenstereo-photogrammetry and the findings confirmed at operation. This new method is likely to be useful in dental surgery.
{ "pile_set_name": "PubMed Abstracts" }
4 New Games Officially Greenlit by Steam Okay, so we all know what Steam is, right? It’s a digital distribution, digital rights management, multiplayer and communications platform (which was developed by the Valve Corporation). Steam also listens to their community and reaches out to certain (lucky) developers to start moving towards the Steam Community, too. Pretty cool, am I right? Anyways today Steam Greenlit 4 new titles…
{ "pile_set_name": "Pile-CC" }
Caries increment in young children in Skaraborg, Sweden: associations with parental sociodemography, health habits, and attitudes. To explore parental sociodemography, oral health habits, and attitudes in relation to dental caries increment in their children. A longitudinal questionnaire and clinical study. The children were followed annually from age 3 years (n = 271) to 6 years (n = 243). Carious lesions of different depth were registered (initial and manifest) by four calibrated dentists. The parents filled out a questionnaire. Statistics included factor analyses, Cronbach's alpha together with bivariate and multivariate logistic regression analyses. Most of the parents exhibited positive health behaviour and attitudes. 'Late start of toothbrushing of child' was, however, common (≥1 year; 29%) and 'external locus of control' showed a high mean value (10,1; possible range 3-15). In a multivariate model, 'parent born abroad' (OR 3.26, 95% CI 1.85-5.76) and 'parental indulgence' (OR 3.20, 95% CI 1.37-7.51) were the most important for the development of carious lesions in the children. This study identified 'parent born abroad' and 'parental indulgence' as significant risk factors for caries in the age period 3 to 6 years. Identifying parents with the greatest need should be emphasized, in order to target promotion and prevention activities.
{ "pile_set_name": "PubMed Abstracts" }
Fluorescence emission from photo-fragments after resonant S 2p excitations in H2S. Visible-UV fluorescence emission of gas-phase hydrogen sulfide, H(2)S, has been studied at the S 2p edge with synchrotron radiation excitation. Dispersed fluorescence measurements in the wavelength range 300-900 nm were taken at several photon energies corresponding to the excitations of the S 2p electrons to the unoccupied molecular and Rydberg orbitals. The spectra reveal fluorescence from the H, S, S(+), HS and HS(+) photo-fragments. H is found to be the strongest emitter at Rydberg excitations, while the emission from S(+) is dominant at the molecular resonances and above the S 2p ionization thresholds. The intensities of hydrogen Lyman-alpha (122 nm), Balmer-alpha (656 nm), Balmer-beta (486 nm) transitions as well as the visible-UV total fluorescence yield (300-900 nm) and the total ion yield were measured by scanning the photon energy in small steps across the S 2p edge. The different Balmer lines show some sensitivity to the specific core excitations, which is, however, not so strong as that recently observed in the water molecule [E. Melero García, A. Kivimäki, L. G. M. Pettersson, J. Alvarez Ruiz, M. Coreno, M. de Simone, R. Richter and K. C. Prince, Phys. Rev. Lett., 2006, 96, 063003].
{ "pile_set_name": "PubMed Abstracts" }
Serotypes of spotted fever group rickettsiae isolated from Dermacentor andersoni (Stiles) ticks in western Montana. Adult Dermacentor andersoni ticks were collected by flagging vegetation in 18 canyons bordering the Bitterroot Valley, Montana, an area where nearly 400 cases of Rocky Mountain spotted fever (RMSF) have occurred since 1900. Three hundred and nine (8.3%) of the 3,705 ticks collected contained hemocyte-associated rickettsia-like organisms of three morphologic types, coccobacillary, fine bacillary, and coarse bacillary (long forms). Only the coccobacillary and fine bacillary organisms stained with fluorescein-conjugated antibody specific for the spotted fever group. One hundred and six isolates of spotted fever-group rickettsiae obtained by inoculation of Vero cells with suspensions of hemolymph test-positive ticks were serologically typed by microimmunofluorescence. Four sharply distinct serotypes were obtained, including Rickettsia rickettsii (10 strains), R. montana (8 strains), R. rhipicephali (47 strains), and a hitherto undescribed serotype referred to as 369-C (41 strains). All but two isolates were obtained from west-side canyons where virtually all cases of RMSF had been acquired. The four serotypes were widely distributed on the west side as evidenced by their presence in 5-11 of the 13 collecting sites. Each serotype induced distinctive plaques and cytopathogenicity in Vero cell culture.
{ "pile_set_name": "PubMed Abstracts" }
Q: Constraints on sliding windows Let $L\subseteq \Sigma^*$ be a language of finite words and $n>0$ some integer. I would like to know if anything is known on the time and space complexity with respect to $n$ to check for membership in $L$ for a sliding window of size $n$ over an infinite stream. Here I mean the incremental complexity by moving the window along the stream and computing on the fly the membership of the window seen as a word to the language $L$. Exemple: It is simple to check with space complexity $\mathcal{O}(\log(n))$ and time complexity $\mathcal{O}(1)$ for the language $\Sigma^* ab \Sigma^*$ with $\Sigma=\{a,b\}$. You simply need to remember the last $ab$ factor seen in a register and to increment it by $1$ at every new symbol, which is constant in the appropriate RAM model. Case of interest (at least for me) includes: $L$ is the Parity language over $\{0, 1\}$, the number of $1$ is even, or in regexp: $(0^* + 10^*1)^*$ $L$ is the Majority language over $\{0,1\}$, there are more $1$ than $0$. $L$ is the language over $\{0,1,e\}$ such that there exists a $0$ before a $1$. $L$ is an arbitary regular language. In particular, is it needed to store all the window for those languages? It seems so but I fail to see a proof. Even if we allow a space $\mathcal{O}(n)$, can we reply in time $\mathcal{O}(1)$? A: It seems it would depend on your particular model, in particular what information you have access to. From what I infer, you are thinking of the following model: you have a memory $m$, for instance of size $O(\log n)$. at each step, you read a new letter $a\in\Sigma$ of your stream, and you are allowed to modify your memory $m$ you then have to say whether the word under you new sliding window shifted by $1$ is in $L$, based solely on $m$. In particular, you don't have access to the letter leaving the sliding window. If you had this information, the problem would be more symmetrical, and for instance languages Parity and Majority would be computable with constant and logarithmic memory respectively. Memory constraint In the setting above without this information, here is for instance a proof that a linear memory is needed for Parity, so basically you need to remember the whole word. Indeed, if you use sublinear memory, there are two different words $u$ and $v$ of length $n$ that give rise to the same memory state $m$. Then, let $d$ be the first position where $u$ and $v$ differ, and consider that your stream continues with $0^d$. After having read this suffix, you will have the same memory $m'$, so you must answer the same thing in both cases. But since the bit that got out of the window is not the same for $u$ and $v$, your answer is wrong for one of the two. Time constraint It is possible to recognize any regular language $L$ with quasi-constant amortized time. The time complexity is the one from a union-find-delete (UFD) data structure. For instance this paper shows that operations union, makeset and delete can be done in constant time, and the find operation in reverse Ackermann (so at most $5$ for any input value making sense in the physical word, see wikipedia on union-find). Let $A$ be a DFA recognizing $L$, with states $Q$, transition function $\delta:Q\times\Sigma\to Q$, and initial state $q_0.$ Let $k=|Q|$, since $L$ is fixed $k$ is a constant. Let $a_0a_2\dots a_{n-1}\in\Sigma^n$ be the word currently under the window. The idea is to maintain a memory structure $m$, giving for each word $u_i=a_i\dots a_{n-1}$ the state $q_i$ reached by $A$ after reading $u_i$. We will also maintain an index $\gamma\in[0,n-1]$, giving the identifier associated with $u_0$. The identifier for $u_j$ is $\gamma+j \mod n$. The UFD structure will store identifiers of all words $u_0\dots u_{n-1}$, and two words $u_i,u_j$ will be in the same partition if and only if $q_i=q_j$. The common state $q$ labels the partition. So in order to know whether the current word is in $L$, it suffices to identify the label $q$ of partition of the identifier $\gamma$ (corresponding to the word $u_0$), and check whether $q$ is accepting. When a new letter $a$ is read, we update the memory as follows: the identifier $\gamma$ is deleted from the UFD structure a new identifier $\gamma$ is added, and joins the partition labeled $q_0$. A new partition is created if none exists. For this we can use the help of an auxiliary memory of constant size, storing which states are currently labelling partitions, and giving a witness identifier for each one. the current index $\gamma$ is updated to $\gamma'=\gamma+1\mod n$. all labels of partitions are updated to their $a$-successors: $q'=\delta(q,a)$ for each label $q$. Partitions that get the same label are merged. All these operations are either constant time or in quasi-constant amortized time. A: Context Let $\mathcal{L}$ be a fixed regular language and let ($\mathcal{Q}, \Sigma, \delta, q_0, \mathcal{F})$ be an automaton recognizing $\mathcal{L}$. I will suppose in this post that we are working in the RAM model with cells of size logarithmic in the maximal size of the window, and that all the operations regarding the automaton are constant time. Claim We can maintain $\mathcal{L}$ in constant (non-amortized) time for a window of constant size. Let us first show how we can maintain in $O(\ln(n))$ time, then how this can be improved to constant amortized time and then finally let us prove how we can have the constant non-amortized result. Proof of the $O(\ln(n))$ bound We note $\bar{\delta}(w) : \mathcal{Q}\rightarrow \mathcal{Q}$ the function that associates $q$ with $\delta(q,w)$, which we call the effect of $w$. For the sake of simplicity we identify a letter $c$ with its effect $\bar{\delta}(c)$. To maintain whether the contents of the window belong to the language, it suffices to maintain the effect of the window, because a word $w$ belongs to $\mathcal{L}$ iff $(\bar{\delta}(w))(q_0) \in \mathcal{F}$. The idea here is to build a segment tree over the infinite word that allows us to query the effect of the sliding window in time $O(\ln(n))$. Note that $\bar{\delta}(w_1 w_2) = \bar{\delta}(w_2) \circ \bar{\delta}(w_1)$ therefore the effect of a word can, indeed, be computed with such a tree. As the stream is unbounded, we cannot use a segment tree directly, as both the memory will increase linearly and the depth of the tree will grow logarithmically in the size of the stream that has been read. To counter this problem we can use the following data structure. Let $k$ be such that $2^k \leq n < 2^{k+1}$. We will maintain three binary trees of depth $k$: $A, B$ and $C$. The binary tree $A$ will be rightmost full, $B$ will be either empty or full while $C$ will be leftmost full (but never full) as depicted here: To move the sliding window we need to remove a letter and add a new one. Let us first cover the removal: if $A$ is empty then we exchange $A$ and $B$. Then we remove the leftmost leaf from $A$. Adding a new letter on $C$ is always possible ($C$ is never full). If after this $C$ becomes full, we exchange $C$ and $B$. It is easy to see that with our choice of $k$ then when we switch $A$ and $B$ because $A$ is empty, then $B$ cannot also be empty, so it must be full. Likewise, when we exchange $B$ and $C$ because $C$ is full, then $B$ cannot also be full, so it is empty. Exchanging trees can be done in $O(1)$. Adding a letter or removing a letter at depth $k$ can be done in $O(k)$: we locate in $O(k)$ the place where the letter should be removed or inserted, we perform the change (accounting for the effect of the added or removed letter), and then we update the annotation of the effects of all parent nodes in $O(k)$ by going upwards in the tree. Therefore, we have an $O(\ln(n))$ algorithm. Note that reading the effect of the whole sliding window can be done by combining the effect of the roots of $A$, $B$ and $C$ and thus in $O(1)$. Note that this structure does not require the sliding window to be of constant size $n$ but only that we alternate between insertion and deletion (it will be useful for the next proof). Proof of the constant amortized bound The infinite stream will be split into "chunks" $C_1 \dots $ of size $K=O(\ln(n))$. At each step of the computation, the sliding window will start within a chunk $C_i$ and end within a chunk $C_{j}$ ($j-i$ will be roughly equal to $n/K$). We will maintain separately (1) the effect of the part coming from the first chunk $C_i$, (2) the effect from the part of the last chunk $C_{j}$ and (3) the combined effect of all the chunks from the middle $C_{i+1} \dots C_{j-1}$ (see figure below). The overall effect will simply be the combination of the effects of (1), (2), and (3). The effect of (1) can be maintained in the following way: each time our sliding window starts in a new chunk $C_i$ we compute for all suffixes $S$ of $C_i$ the effect of $S$. This can be done in time $O(|C_i|)$ because the effect of $aS$ (where $a$ is a letter and $S$ a word) can be computed by combining the effect of $a$ and $S$. Therefore to maintain (1) we pay a price $K$ each time we enter a new block of size $K$. Once the effects of all the suffixes have been computed we can answer in $O(1)$. In amortized complexity this gives us $O(1)$. The effect of (2) can be maintained in non-amortized $O(1)$ as we only add letters at the end of the current chunk, or restart from an empty chunk. The effect of (3) can be computed using a tree as seem above for the $O(\ln(n))$ bound. Clearly we only add and remove a new chunk every $K$ steps. And it takes $O(\ln(n))$ to make the insertion/deletion therefore we also have the expected amortized complexity. Proof of the constant non-amortized bound In the proof above, we have an algorithm that uses $O(1)$ computation at all steps plus $O(\ln(n))$ every $O(\ln(n))$ steps. The basic idea here is to use a small amount of computation at each of the steps to amortize the $O(\ln(n))$ cost. For the effect of (1), this is easy, when we are in a block $C_i$ we compute the effect of suffixes for the block $C_{i+1}$, for each new letter removed in $C_i$ we compute a new suffix of $C_{i+1}$. This is $O(1)$. For the effect of (2), there is nothing to do as it was already $O(1)$. For the effect of (3), it is more complex. In the algorithm that we used for the amortized complexity, each $O(\ln(n))$ steps we remove and add a chunk. When removing a chunk, we must locate in $O(\ln(n))$ where the chunk to remove is located (note that it may be in binary tree $B$ or even $C$), remove it, and update upwards the effect of the parent nodes. This modification of $O(\ln(n))$ can be performed by doing some $O(1)$ computation step each time the window is modified, resulting in $O(1)$ non-amortized time. Note that, while we perform these operations in place, the effects annotating the nodes of the affected tree $A$, $B$ or $C$ may no longer be valid (as they partly reflect the deletion), but this is not an issue: we only use the effect of the root of the tree to determine whether the current window is in $\mathcal{L}$ or not, and this annotation is modified last, when the deletion has actually taken place. When inserting a chunk, the same reasoning work, but there is an added complication: the value of the inserted chunk, and its effect, is only known at the very end of the insertion, so we cannot do this amortization as-is. To work around this problem, we split our sliding window into four blocks. As before we will have a block (1) covering the effect of the suffixes of the first chunk and (2) for the prefixes of the last chunk but (3) will now only cover $C_{i+1}$ up to $C_{j-2}$ and thus we will have a block (4) computing the effect of $C_{j-1}$. The effect of (4) can easily be maintained as it was already computed for (2) (the entire chunk is a suffix of itself). So this ensures that the chunk to insert in the tree, namely (4), is completely known, and we can do a similar amortization. The last subtlety to note is that the amortization of insertions and deletions may end up updating the same tree in-place (e.g., we insert a node in tree $C$, and we remove a node in tree $C$ which will be swapped with $B$ and $A$). However, one can show that this is no problem, because the modifications performed in-place in the amortization step are performed from bottom to top, so operations will be reflected in the right order. Alternatively, we can modify the structure of trees used in the $O(\ln(n))$ bound to use 5 trees instead of 3, and this can ensure that the computations when amortizing insertions and deletions will never take place in the same tree. Case of a variable-size window If we allow arbitrary insertions and deletions and allow the size of the sliding window to evolve freely, then the scheme can probably be adjusted. This would require the use of more trees in the $O(\ln(n))$ algorithm, with the possibility to merge together trees or split trees when the window size changes too much (i.e., its logarithm changes). What is more, the block size in the $O(1)$ amortized algorithm would also need to change; but as these window size changes are rare, we should be able to amortize these complete recomputations of the data structure. A: Here is a second, simpler and more general answer that was obtained after discussing with a3nm. Problem We fix a regular language $\mathcal{L}$ and we are interested in the following word problem. At start, we have an empty word and then we receive updates taking one of the following forms: Insert a letter at the beginning of the word Insert a letter at the end of the word Delete the letter at the beginning of the word Delete the letter at the end of the word After each update we want to know whether the current word is in the language $\mathcal{L}$. Clearly this problem is more general than the one proposed by C.P. Claim The problem above can be solved in constant (non amortized) update. Proof We note $\bar{\delta}(w) : \mathcal{Q}\rightarrow \mathcal{Q}$ the function that associates $q$ with $\delta(q,w)$, which we call the effect of $w$. For the sake of simplicity we identify a letter $c$ with its effect $\bar{\delta}(c)$. To maintain whether the contents of the window belong to the language, it suffices to maintain the effect of the window, because a word $w$ belongs to $\mathcal{L}$ iff $(\bar{\delta}(w))(q_0) \in \mathcal{F}$. I suppose that it is obvious to maintain the word after updates in a way that allows to query the letter at any position in the word (e.g. using an amortized circular buffer). We define the notion of guardian as a position within the word with a left span and right span. Let $w_1 \dots w_m$ be our word. A guardian placed at position $p$ with left span $l$ stores a list $b_1 \dots b_l$ of effects where the element $b_i$ corresponds to the effect of $w_{p-i} \dots w_{p-1}$. Similarly, if it has a right span $r$, then it stores a list $a_1 \dots a_r$ with $a_i$ corresponding to the effect of $w_p \dots w_{p+i}$. We say that a guardian is full whenever it spans the whole word. Properties of guardians: It takes a constant time to increase by a constant number the left and right spans of a guardian. If we have a guardian at some position in a word $w$ that is updated and if the guardian was not placed at a position that is deleted, we can get in constant time a guardian for the updated word that has the same span (possibly minus one if the span covered a letter that has been deleted). We can maintain after update a full guardian in constant time as long as its position is not deleted. Here is the sketch of our algorithm: let $N$ denotes the current size of the word. We will maintain a full guardian roughly at the middle of the word (between $N/4$ and $3N/4$). As soon as the full guardian escapes the middle, we start creating a second guardian at position $N/2$. After each update we increase the span of this second guardian by 8. This ensures that the second guardian will become full before our first guardian gets deleted and that the position of our second guardian will stay in the middle (between $3N/7$ and $4N/7$) as long as it is not full. When the second guardian is full, we replace the first guardian with the second. After each update, we have a full guardian that allows us to answer whether the word belongs to $\mathcal{L}$. Extension with infix queries With a3nm we also found out that we can solve an extension of this problem (insert & delete at the beginning and at the end of the word) plus queries of the form "given $(i,j)$, is the factor $w[i:j]$ of the current word $w$ within $\mathcal{L}$?" using Bojańczyk structure described in section 2.2 of its paper Factorization Forests. In his paper Bojańczyk does not describe how we can update the structure and it would require a little care to do it but it can be updated in constant time for a fixed language.
{ "pile_set_name": "StackExchange" }
Who doesn't love Hagrid and the magical creatures of Harry Potter? Well, I don't know but when my partner in the Back to Hogwarts swap listed the Magical Menagerie shop as a favourite I knew I had to make these little guys. The shop is sewn with a brick printed fabric and a drawstring was added to the top for a peaked roof. The puppets were knitted or crocheted from various patterns or made up, like the toad, owl, and kneazle. And you have to have Hagrid! Those are so cute! And I love that brick fabric. I have some in my sewing stash. I wish now that I would have bought more. I have used it for several different projects! Great job on your finger puppets.
{ "pile_set_name": "Pile-CC" }
Kumbalam Kumbalam may refer to places in India: Kumbalam, Ernakulam, Kerala Kumbalam, Kollam, Kerala Kumbalam, Krishnagiri, Tamil Nadu
{ "pile_set_name": "Wikipedia (en)" }
Inhibition of DPP-4: a new therapeutic approach for the treatment of type 2 diabetes. Glucagon-like peptide-1 (GLP-1) and glucose-dependent insulinotropic polypeptide (GIP) are hormones secreted by the enteroendocrine cells of the gut in response to the ingestion of nutrients. These incretin hormones, so called because they increase insulin secretion, are key modulators of pancreatic islet hormone secretion and, thus, glucose homeostasis. The glucoregulatory effects of incretins are the basis for new therapies currently being developed for the treatment of type 2 diabetes mellitus (T2DM). Drugs that inhibit dipeptidyl peptidase-4 (DPP-4), a ubiquitous enzyme that rapidly inactivates both GLP-1 and GIP, increase active levels of these hormones and, in doing so, improve islet function and glycemic control in T2DM. In this review, we briefly describe (1) the role of pancreatic islet dysfunction in the onset and progression of T2DM, (2) the rationale for developing drugs that enhance incretin activity, (3) the evidence that inhibition of DPP-4 is effective in ameliorating islet dysfunction and improving glycemic control in T2DM, (4) the efficacy, safety, and tolerability of DPP-4 inhibitors as monotherapy and in combination with other antidiabetic agents, and (5) the potential utility of DPP-4 inhibitors relative to existing oral antidiabetic agents and newer antidiabetic drugs in the pipeline. The review is based upon MEDLINE literature searches (1966-August 2006) and abstracts and presentations from the American Diabetes Association Scientific Sessions (2002-2006) and the European Association for the Study of Diabetes Annual Meetings (1998-2006). Basic science, preclinical, and clinical studies and review articles published in the English language were evaluated and selected based upon consideration of their originality, relevance, and frequency of citation. DPP-4 inhibitors are a new class of antidiabetogenic drugs that provide comparable efficacy to current treatments. They are effective as monotherapy in patients inadequately controlled with diet and exercise and as add-on therapy in combination with metformin, thiazolidinediones, and insulin. The DPP-4 inhibitors are well tolerated, carry a low risk of producing hypoglycemia, and are weight neutral. The long-term durability of effect on glycemic control and beta-cell morphology and function remain to be established. Islet cell dysfunction is central to the pathogenesis of T2DM. Incretin-based therapies, including GLP 1 analogues and DPP-4 inhibitors, have been shown to restore glucose homeostasis and improve glycemic control. The DPP-4 inhibitors, which can be used as monotherapy or in combination with other antidiabetic drugs, are a promising new treatment option, especially for patients with early-stage T2DM and more severe hyperglycemia.
{ "pile_set_name": "PubMed Abstracts" }
E2U MVB15 MOISTURE VAPOR BARRIER KIT E2U MVB15 MOISTURE VAPOR BARRIER KIT Manufacturer: EPOXY2U LLCLocation: Fullerton, California, USA E2U Moisture Vapor Barrier (MVB15) kit is a rapid curing, VOC-compliant, two component, 100% solids epoxy system for concrete substrates. MVB15 is a moisture vapor barrier that reduces the permeance of moisture vapor to levels that are acceptable for the application of flooring installation systems and floor coverings. It is compatible with most flooring adhesives and cementitious underlayments, including all E2U adhesives, primers and underlayments. APPLICATIONS Recommendations for concrete floors and slabs with a compressive strength of at least 2500 psi, where moisture vapor transmission of substrate falls between 3 lbs and 15 lbs per 1000 sqft over 24 hours using calcium chloride test per ASTM F1869 and the relative humidity is between 75% and 90% per ASTM F2170 or F2420. E2U POLYASPARTIC 85 KIT Manufacturer: EPOXY2U LLCLocation: Fullerton, California, USA E2U Polyaspartics is the next generation in two component, fast drying, aliphatic polyurea. While other Polyaspartics can only be applied...
{ "pile_set_name": "Pile-CC" }
Q: Python csv not writing to file I am trying to write to a .tsv file using python's CSV module, this is my code so far file_name = "test.tsv" TEMPLATE = "template.tsv" fil = open(file_name, "w") # Added suggested change template = csv.DictReader(open(TEMPLATE, 'r'), delimiter='\t') new_file = csv.DictWriter(fil, fieldnames=template.fieldnames, delimiter='\t') new_file.writeheader() basically TEMPLATE is a file that will contain the headers for the file, so i read the headers using DictReader and pass the fieldnames to DictWriter, as far as i know the code is fine, the file test.tsv is being created but for some reason the headers are not being written. Any help as to why this is happening is appreciated, thanks. A: DictReader's first argument should be a file object (create with open()), cf. http://docs.python.org/py3k/library/csv.html#csv.DictReader You forgot open() for the TEMPLATE file. import csv file_name = "test.tsv" TEMPLATE = "template.tsv" fil = open(file_name, "w") # you forgot this line, which will open the file template_file = open(TEMPLATE, 'r') template = csv.DictReader(template_file, delimiter='\t') new_file = csv.DictWriter(fil, fieldnames=template.fieldnames, delimiter='\t') new_file.writeheader()
{ "pile_set_name": "StackExchange" }
LGBT+ advocates facing far-right opponents (WOJTEK RADWANSKI/AFP/Getty) Urine, rocks, firecrackers and eggs have all been thrown by anti-Pride protesters this year at Poland’s LGBT+ community, all while the country’s ruling party dubbed queer people a “threat”. And it seems that the openly homophobic party is on track to hold onto power, exit polls show. The Law and Justice Party is expected to be swept into power once again by swaying voters – with turnout being at its highest since records began – with a campaign of aggrieved nationalism and anti-LGBT sentiment. As the exit polls were released, party chairman Jaroslaw Kaczyński, who once told Polish people to resist the “travelling theatre” of Pride, yesterday told reporters: “We have reasons to be happy. “The good change,” he said, “will continue.” Exit polls: Law and Justice Party on track to secure a majority. Voters headed to the polls in record numbers with more than 61 percent taking part – the highest turnout since the first, partly-free election of 1989 in Poland. The PiS are on track to secure a mandate with 43.6% of the vote, which if correct, would score the party 239 out of 460 seats in the Polish Sejm. The party have deep ties with the country’s influential Catholic Church. The opposition Civic Coalition, a liberal centre-right grouping, was predicted to receive 24.1%, or roughly 130 seats. Squashing hopes from liberal lawmakers to swing power through coalition, exit polls conducted by research centre Ipsos show. While snap election polls results are not always reliable, if the results prove to be accurate, a party with a severely homophobic record will continue to be in power for a further four years. Plunging the community in unease about what direction their rights and safety will go. What will this mean for Poland’s LGBT+ people? In the last four years since the party was elected to power in 2015, activists and critics have argued that the PiS have fermented hate. Multiple Prides in Poland this year – with many of then being the town’s first ever – were descended upon by hundreds of protesters. Several towns and villages have declared themselves as “LGBT-free” while religious leaders have called the community a “rainbow plague”. Moreover, for a time, a government-aligned newspaper Gazeta Polska distributed anti-LGBT stickers before the courts ruled it was illegal. And critics argue that Kaczyński’s re-election campaign has only added fuel to the fire. PiS leader: LGBT+ people are ‘real threat to Polish state’. By placing LGBT+ rights in the centre of public debates and depicting them as a dangerous Western idea that undermines traditional Catholic values, the leader described his party as fighting in an “ideological war”. Meanwhile, the southern city of Lublin recently gave awards to local officials who have opposed: “LGBT ideology, which goes against the family, the nation and the Polish state”, according to local media. While Polish policy-makers have been sluggish to enshrine LGBT+ people with rights, activists have pressed them to enact change. Tireless campaigners have proved successful in the past by pushing parliament to introduce positive measures, such as enabling gay men to donate blood. However, marriage equality, legal protections in the area of gender identity and adoption remain far off in the distance.
{ "pile_set_name": "OpenWebText2" }
UV photolysis of 3-nitrotyrosine generates highly oxidizing species: a potential source of photooxidative stress. Laser flash photolysis at 266 nm of 3-nitrotyrosine and N-acetyl-3-nitrotyrosine ethyl ester generates an oxidizing species, which shows all of the characteristics of a hydroxyl radical. This species reacts with Br(-) to yield Br(2).-, via an intermediate, that is kinetically identified as HOBr.-. Moreover, the formation of Br(2).- can be suppressed by methanol; competition kinetics yield relative rate constants for the reaction of the reactive species with Br(-) and methanol that are similar to those for the hydroxyl radical. Parallel time-resolved UV/vis spectroscopy suggests the formation of phenoxyl radicals, consistent with the formation of hydroxyl radicals. Laser flash photolysis at 355 nm also generates reactive intermediates that oxidize Br(-) to Br(2).- but appear not to be hydroxyl radicals.
{ "pile_set_name": "PubMed Abstracts" }
Consumers currently pay tens of millions annually in overdraft charges on such prepaid credit cards. Much of that money goes to one Georgia firm, Netspend, whose parent company is the Columbus-based Total System Services. Perdue has received $17,500 in campaign donations from Total System Services’ political action committee since the 2014 election cycle. He also accepted a similar amount from the company’s current and former top executives in the runup to his election, according to the money-in-politics site Open Secrets. Bureau in the cross hairs A businessman before he entered politics, Perdue has made fiscal issues a central part of his portfolio since arriving on Capitol Hill in 2015. He holds particular disdain for the Consumer Financial Protection Bureau, an independent agency created in the aftermath of the 2008 financial crisis. Like many Republicans, Perdue says the watchdog has been overzealous, and he's twice introduced legislation to overhaul it dramatically by giving the legislative branch control of its funding like a typical federal agency. When it comes to the agency’s prepaid credit card regulation, Perdue says it’s overly broad and too burdensome. The hundreds of millions it would cost for industry to implement it would likely be passed onto consumers, he said, thus “hurt(ing) the very people it intends to protect.” "These consumers, who simply want to manage their finances at a low-cost rate, cannot afford a sweeping new rule that would impose higher costs," he and U.S. Rep. Roger Williams, R-Texas, wrote in a recent Forbes op-ed. The duo also said the regulation would hamstring the growing financial technology market, including digital payment giants PayPal and Venmo. Indeed, several technology companies, including Google and PayPal, have lobbied against aspects of the rulemaking. Perdue said Congress should scrap the rule and approach the issue in another way. Supporters of the the rule see things differently. They frame Perdue’s bill as a naked attempt to aid Netspend. They point to competitors such as the Green Dot that have been supportive of the rule. Compared with its competitors, Netspend is said to have a business model that relies heavily on overdraft fees. American Banker reported that the CFPB’s rule, if implemented, could cut into the company’s annual revenue by up to 12 percent, or $85 million a year. The bureau’s new rule, which is scheduled to go into effect next spring, would not ban overdraft charges outright, but it would give consumers three weeks to repay their debt before being charged a late fee. It would also require companies issuing such cards to consider a would-be customer’s ability to pay his or her debts before moving forward. In a written statement provided to The Atlanta Journal-Constitution, a Netspend spokesman said the company “supports smart regulation of our industry that promotes financial inclusion and empowerment for Americans, including those without access to traditional financial services.” “We and many others outlined our reservations with the CFPB prepaid rule during the public comment period including thousands of concerned citizens, highlighting the important role prepaid products and electronic accounts play in their lives,” according to the statement. Allied Progress, a liberal advocacy group that pushes for tougher rules on Wall Street and payday lenders, is planning to kick off a television and digital ad campaign in the days ahead to pressure GOP senators to vote against Perdue’s bill. The six-figure campaign will likely focus on states represented by Republicans who have been critical of the prepaid credit card industry in the past such as Alaska, Maine and Nevada. “What Senator Perdue is counting on is that people will not be talking more about this subject and that it will happen under the radar and the only people that will know are his donors,” said Karl Frisch, Allied Progress’ executive director. “We’re going to make sure that’s not the case, that people hear about this.” The ad campaign is likely to skip Georgia outside of some limited internet ads, since U.S. Sen. Johnny Isakson has also signed onto Perdue’s effort. Ticking clock Allied Progress’ effort is looking to peel away three Republican senators, which would be enough to kill Perdue’s effort. Most Democrats have banded together to vote against previous Republican attempts to nullify leftover regulations from the Obama administration. Perdue has the backing of at least 31 GOP senators. The Republican is looking to stop the CFPB rule using a special type of legislation he’s never deployed before. Created by then-U.S. House Speaker Newt Gingrich in the 1990s, the procedure allows Congress to retroactively nullify any federal regulation within 60 legislative days of it being finalized — while also permanently blocking agencies from moving forward with the same rulemaking at a later date. The maneuver was rarely used successfully before President Donald Trump came into office. But now that a united Republican government has taken over, GOP leaders in Congress are rushing to undo many Obama-era regulations using the procedure while they still have time. Perdue’s office estimates that Congress has until May 9 to act on the prepaid credit card rule, which is why the Republican moved to expedite his bill. Senate Majority Leader Mitch McConnell has not indicated if or when he would be willing to bring up the legislation on the floor before then, but the Kentucky Republican did sign off on Perdue’s effort to fast-track the measure. A companion bill in the House is backed by Georgia Republican U.S. Reps. Buddy Carter, Doug Collins, Drew Ferguson, Tom Graves and Barry Loudermilk.
{ "pile_set_name": "OpenWebText2" }
(Newser) – A man was killed and at least seven other people were injured in a horrific ride malfunction on the opening day of the Ohio State Fair. Officials say the 18-year-old man was killed after being thrown in the air from the Fire Ball ride Wednesday evening and landing around 50 feet away, the Columbus Dispatch reports. Steve Martin, the Columbus Fire Division's battalion chief, says five of the injured are in critical condition. He says one of the injured people is 13 years old and the rest are adults. The Fire Ball, described by its maker as an "aggressive thrill ride," spins around riders held in sections on six spoke arms. Martin says one of the rows of seats "snapped off," sending riders flying, NBC4 reports. Michael Vartorella, chief ride inspector of the Amusement Ride Safety Division, says inspectors examined the ride earlier in the day and didn't spot any problems, reports CNN. Vartorella says the Fire Ball was inspected three or four times before the fair opened. He says inspections weren't rushed, though heavy rains and flooding forced inspectors to work long hours. "I am terribly saddened by this accident, by the loss of life and that people were injured enjoying Ohio's fair," Ohio Gov. John Kasich said in a statement. He ordered the closure of the other 71 rides at the fair for inspections. They're expected to reopen Thursday, apart from several rides near the Fire Ball, the Dispatch reports.
{ "pile_set_name": "Pile-CC" }
The present invention relates to a logical volume administration method and, more particularly, a method of administrating a logical unit in a disk memory apparatus. In recent years, electronic commerce has been being rapidly spread in association with the penetration of the Internet into the market. In the electronic commerce, the user accesses a Web site of a company through the Internet to do shopping. When a physical store is newly open, people in the neighborhood notice it. In these days of a large number of Web pages in the world reaching one billion, even if a Web site is established, the possibility that no one notices it and nothing is sold is high. On the other hand, when the user uses the Web sites, there are no restrictions from a geometrical and time viewpoints. Companies can regard the people all over the world as potential customers, so that there is a big business chance. In order to improve CRM (Customer Relationship Management), some companies providing Web pages try to know their customers well even by tracing mouse clicks of the customers. FIG. 15 is a conceptual diagram for explaining the relation between the users and a data center for collecting data of trace of user's mouse clicks to conduct CRM analysis. A number of users indicated by user 1, user 2, . . . and user N access Web serves in the data center via the Internet 1. The data center has a number of Web servers indicated by Web server 1, Web server 2, . . . and Web server M. The Web servers are connected to a disk apparatus via a disk server by using a LAN of the data center. In the disk apparatus, a Web page repository, a Web access history repository, and CRM analyzing data are distributed to proper disks and stored. To the LAN of the data center, further, CRM analyzing servers 1 and 2 are connected, a tape apparatus is connected via a tape server, and also a manager for monitoring and controlling these components is also connected. Web pages of companies providing the Web sites are stored in the Web page repository. When the user accesses a Web server in the data center via the Internet 1, the Web server reads the Web page from the Web page repository and sends it to the user. Simultaneously, the history of the access to the Web site by the user is written to the Web access history repository. When the amount of the Web access history data exceeds a specific value, the manager transfers the Web access history data to the tape apparatus and records the data to a tape for backup. In the case of performing CRM analysis on the Web access history data, the backup data recorded on the tape is transferred from the tape apparatus to the Web access history repository. The CRM analysis is made by the CRM analyzing server by using the transferred data. The result of analysis is stored as CRM analyzing data of the disk apparatus. Referring to FIG. 14, an example of the form of business done via a Web page will be described. As already stated with reference to FIG. 15, a number of users access Web sites to purchase products or to get service. Each of the Web sites is administered by a Web site operator who enters into a contract with each of a number of companies providing Web pages to run and maintain their Web sites. Although it is possible that the Web site operator has a storage to perform operations, usually, the Web site operator enters into a contract with a storage operator for operating a storage in order to fulfill the contract with the Web page providing companies. Further, although it is possible that the storage operator has a storage to perform operations, usually, the storage operator enters into a contract with a storage provider for providing a storage to fulfill the contract with the Web site operator. With such a configuration, a number of users can access an arbitrary Web site. Many companies providing Web pages and Web site operator think about obtaining CRM analyzing data as information to make their Web sites utilized more effectively. A CRM analyzer for periodically providing CRM analyzing data under contract with the companies and Web site operators consequently exists. Although FIG. 15 shows those organizations as one data center, in the industry of storage dealing with an enormous amount of data, the business form in which the functions are distributed as described above is being fixed. The amount of data stored for CRM analysis is enormous. In some companies, data increases by 1T bytes per month. A storage system is requested to provide a support function by which the operator can make capacity planning. For example, there is American storage administration software for disk arrays, by which I/O throughput of each port or each disk can be measured. By the software, for example, when I/O requests are concentrated on a certain disk, the data is reallocated to distribute the load, thereby enabling improved performance to be achieved. When it is predicted from data capacity increasing rate that a disk will become full in two months, addition of a disk can be planned. Similarly, there is another storage administration software for disk arrays, having the function of displaying disk operation information. In recent years, the price of the disk memory apparatus has been being lowered. However, with respect to data increasing at a rate of 1T bytes per month, the disk memory apparatus is still expensive as a total. As described above, therefore, log data as stated above is stored in a cheaper memory device such as a magnetic tape. It is to be noted here that the purpose is not to store log data but to understand the users more by analyzing the log data to thereby improve the CRM. That is, the stored log data has to be analyzed. At the time of analysis, the log data has to be stored on a magnetic disk memory apparatus and has to be processed into a database record. When log data is stored into a normal relational database, the size increases by a few times. In the case where logs are stored, it is sufficient to store the log onto a magnetic tape when a disk becomes full. As a result, however, a magnetic disk of a large capacity capable of storing log data is necessary for analysis. One of the advantages of Internet shopping for the user is low price. If the CRM cost is high, it is difficult for a company to maintain a low price. Reduction in the CRM cost is one of big subjects of E-commerce companies.
{ "pile_set_name": "USPTO Backgrounds" }
LRP5 and plasma cholesterol levels modulate the canonical Wnt pathway in peripheral blood leukocytes. Inflammation is triggered after invasion or injury to restore homeostasis. Although the activation of Wnt/β-catenin signaling is one of the first molecular responses to cellular damage, its role in inflammation is still unclear. It was our hypothesis that the low-density lipoprotein (LDL) receptor-related protein 5 (LRP5) and the canonical Wnt signaling pathway are modulators of inflammatory mechanisms. Wild-type (WT) and LRP5(-/-) mice were fed a hypercholesterolemic (HC) diet to trigger dislipidemia and chronic inflammation. Diets were supplemented with plant sterol esters (PSEs) to induce LDL cholesterol lowering and the reduction of inflammation. HC WT mice showed increased serum cholesterol levels that correlated with increased Lrp5 and Wnt/β-catenin gene expression while in the HC LRP5(-/-) mice Wnt/β-catenin pathway was shut down. Functionally, HC induced pro-inflammatory gene expression in LRP5(-/-) mice, suggesting an inhibitory role of the Wnt pathway in inflammation. Dietary PSE administration downregulated serum cholesterol levels in WT and LRP5(-/-) mice. Furthermore, in WT mice PSE increased anti-inflammatory genes expression and inhibited Wnt/β-catenin activation. Hepatic gene expression of Vldlr, Lrp2 and Lrp6 was increased after HC feeding in WT mice but not in LRP5(-/-) mice, suggesting a role for these receptors in the clearance of plasmatic lipoproteins. Finally, an antiatherogenic role for LRP5 was demonstrated as HC LRP5(-/-) mice developed larger aortic atherosclerotic lesions than WT mice. Our results show an anti-inflammatory, pro-survival role for LRP5 and the Wnt signaling pathway in peripheral blood leukocytes.
{ "pile_set_name": "PubMed Abstracts" }
INTRODUCTION {#s1} ============ Cardiac disease is a major cause of mortality in modern society. The high prevalence of obesity and related diseases, such as lipotoxic cardiomyopathy, plays a significant role in the increased incidence of heart failure. Heart failure affects more than a billion people worldwide. Lipotoxic cardiomyopathy is caused by excessive lipid accumulation in myocardial cells, and it is a form of cardiac dysfunction ([@BIO044719C9]). For example, high-fat diet (HFD)-fed flies exhibit increased triglyceride (TG) fat and alterations in insulin/glucose homeostasis, similar to mammalian responses. A HFD also causes cardiac lipid accumulation, cardiac contractility reduction, conduction blocks and severe structural pathologies, reminiscent of diabetic cardiomyopathies ([@BIO044719C8]). In addition, increasing evidence shows that inhibition of signaling through insulin, target of rapamycin (TOR), or the lipogenic transcription factor SREBP, or by increasing TG lipolysis, is effective in counteracting excess lipid accumulation as well as the associated cardiac defects in flies ([@BIO044719C8]; [@BIO044719C17]; [@BIO044719C27]). These reports suggest that both a HFD and cardiac lipid metabolism genes are closely related to lipotoxic cardiomyopathy. *Sir2* is the most intensively discussed longevity gene in current aging research. Importantly, some studies have shown that *Sir2* is involved in lipid metabolism regulation; a screen for obesity-inducing genes in *Drosophila* larvae pointed to a role for *Sir2* in regulating fat metabolism and a response to amino-acid starvation ([@BIO044719C53]). Moreover, *Sir2* apparently regulates expression of genes involved in fat metabolism, and the lack of *Sir2* increases fat deposition under normal conditions and consequently impairs starvation survival of flies ([@BIO044719C7]). Next, a recent study shows HFD-fed flies exhibit increased body TG levels and decreased body *dSir2* expression ([@BIO044719C70]). However, it is unclear whether *Sir2* can take part into heart lipid metabolism regulation. A recent study has confirmed *PGC-1α* as a vital antagonist of HFD-induced lipotoxic cardiomyopathy in flies since it plays key roles in mitochondrial biogenesis and electron transport chain assembly ([@BIO044719C19]; [@BIO044719C20]). Interestingly, *Sir2* expression can alter the transcriptional activity of the mitochondrial biogenesis coactivator PGC-1α, and it catalyzes PGC-1α deacetylation both *in vitro* and *in vivo*. Overexpression of Sir2 deacetylase or increasing NAD^+^ levels activates transcriptional activity of PGC-1α in neurons and increases mitochondrial density ([@BIO044719C16]; [@BIO044719C41]). Therefore, studying the relationship between cardiac NAD^+^/dSIR2/*PGC-1α* pathway and heart lipid metabolism is very important to understand the mechanism of lipotoxic cardiomyopathy formation. In modern society, exercise combined with a healthy diet is considered the most economical and non-invasive way to prevent and treat obesity ([@BIO044719C6]). Exercise also improves heart function and decreases incidence of heart failure in both human and *Drosophila*. Recent studies report that endurance exercise improves cardiac contraction, and it reduces body and heart lipid levels and heart fibrillation in both HFD and aging flies ([@BIO044719C70]; [@BIO044719C77]). Similarly, exercise training alters extrinsic modulation of the heart and improves the intrinsic pump capacity of the heart in human, and it also improves quality of life of patients with chronic heart failure ([@BIO044719C15]; [@BIO044719C32]; [@BIO044719C68]). In addition, exercise increased muscle NAD^+^ levels ([@BIO044719C25]; [@BIO044719C38]) and increasing NAD^+^ levels activates transcriptional activity of PGC-1α in neurons and increases mitochondrial density ([@BIO044719C16]; [@BIO044719C41]). Therefore, these results suggest that NAD^+^/dSIR2/*PGC-1α* pathway activation may be one of the key mechanisms in which exercise improves heart function and prevents lipotoxic cardiomyopathy. In this study, to explore whether endurance exercise could resist HFD-induced lipotoxic cardiomyopathy via activating NAD^+^/dSIR2/*PGC-1α* signal pathway, experimental flies were fed a HFD and given exercise, and heart *dSir2* expression was changed by building UAS/hand-Gal4 system. The heart TG levels and *dFAS* gene expression were reflected in the lipid metabolism status. In addition, the heart diastolic diameter, systolic diameter, fractional shortening and arrhythmia index were reflected in the heart function. Finally, the cardiac NAD^+^ levels, dSIR2 protein level, *dSir2* mRNA expression and *PGC-1α* mRNA expression were reflected in the heart NAD^+^/dSIR2/ *PGC-1α* pathway status. RESULTS {#s2} ======= Exercise prevented lipotoxic cardiomyopathy and activated cardiac NAD^+^/dSIR2/*PGC-1α* pathway in *Drosophila* {#s2a} --------------------------------------------------------------------------------------------------------------- Increasing evidence confirms that heart lipotoxicity impairment can be induced by feeding HFD in both mammals and flies, and the heart contractility and ejection fraction were weakened at the same time ([@BIO044719C1]; [@BIO044719C59]). Lipotoxicity impairment is also accompanied by the dysfunction of some genes in the heart, such as *PGC-1α*, *dFAS*, *TOR*, etc. ([@BIO044719C8]; [@BIO044719C17]; [@BIO044719C19]). On the contrary, exercise training improves heart function, decreases incidence of heart failure in both mammals and *Drosophila*, and reduces body and heart fat levels and heart fibrillation ([@BIO044719C70]; [@BIO044719C77]). In addition, exercise increased muscle NAD^+^ levels ([@BIO044719C25]; [@BIO044719C38]), and the increasing NAD^+^ levels could activate transcriptional activity of PGC-1α in cells and increase mitochondrial density ([@BIO044719C16]; [@BIO044719C41]). These results hinted that NAD^+^/dSIR2/*PGC-1α* pathway activation may be one of key mechanisms that exercise improved heart function and prevented lipotoxic cardiomyopathy. To identify this hypothesis, fruit flies in this experiment were subjected to exercise intervention and a HFD intervention. In this study, our results showed that a HFD remarkably increased heart TG levels in untrained-*w^1118^* flies (*P*\<0.01), and it also upregulated heart *dFAS* expression levels (*P*\<0.01). These were consistent with the results of previous studies. In addition, we found that exercise availably reduced heart TG level and *dFAS* expression level in both *w^1118^*-normal diet (ND) and *w^1118^*-HFD flies (*P*\<0.01, *P*\<0.05). Interestingly, the heart TG levels in *w^1118^*-high-fat diet+exercise (HFD+E) flies were lower than those in *w^1118^*-ND flies (*P*\<0.05). Therefore, we identified that endurance exercise could prevent lipid accumulation by downregulating cardiac *dFAS* expression level ([Fig. 1](#BIO044719F1){ref-type="fig"}A,B). Fig. 1.**The effect of a HFD and exercise on heart lipid accumulation.** (A) Heart relative TG level. Results are expressed as the fold difference compared with *w^1118^*-ND flies. The sample size was 80 hearts with three biological replicates. (B) Heart *dFAS* expression level. The sample size was 80 hearts with three biological replicates. A two-way ANOVA was used to identify differences among the ND, ND+E, HFD, and HFD+E groups in *w^1118^* flies. Data are represented as means±s.e.m. \**P*\<0.05; \*\**P*\<0.01. For heart function, results displayed that a HFD significantly reduced heart fractional shortening (FS) in untrained *w^1118^* flies (*P*\<0.01), and it also notably decreased heart diastolic diameters in untrained *w^1118^* flies (*P*\<0.05). Exercise significantly increased FS in both *w^1118^*-HFD flies and *w^1118^*-ND flies (both *P*\<0.05), and it also increased heart diastolic diameters in both *w^1118^*-HFD flies and *w^1118^*-ND flies (both *P*\<0.05). Importantly, there was no significant difference between *w^1118^*-HFD+E flies and *w^1118^*-ND flies in FS (*P*\>0.05) ([Fig. 2](#BIO044719F2){ref-type="fig"}A--C). Moreover, a HFD significantly increased arrhythmia index (AI) in untrained *w^1118^* flies (*P*\<0.05). Exercise reduced AI in *w^1118^*-HFD flies (*P*\<0.05). There was no significant difference between *w^1118^*-HFD+E flies and *w^1118^*-ND flies in AI (*P*\>0.05) ([Fig. 2](#BIO044719F2){ref-type="fig"}D). These results confirmed that a HFD could weaken heart contractility and increase the risk of arrhythmia in *w^1118^* flies, but endurance exercise could prevent this from happening in a HFD heart ([Fig. 2](#BIO044719F2){ref-type="fig"}E1--E4). Fig. 2.**The effect of a HFD and exercise on heart function.** (A) Heart diastolic diameters. (B) Heart systolic diameters. (C) Fractional shortening. (D) Arrhythmia index. (E) Illustrating qualitative differences in heart function parameters (10 s): fractional shortening and arrhythmia index; E1: *w^1118^*-ND; E2: *w^1118^*-ND+E; E3: *w^1118^*-HFD; E4: *w^1118^*-HFD+E. A two-way ANOVA was used to identify differences among the ND, ND+E, HFD, and HFD+E groups in *w^1118^* flies. Data are represented as means±s.e.m. \**P*\<0.05; \*\**P*\<0.01. The sample size was 30 hearts. The results also showed that a HFD significantly reduced cardiac NAD^+^ level, dSIR2 level, heart *dSir2* expression and *PGC-1α* expression level in untrained *w^1118^* flies (*P*\<0.05, *P*\<0.01). Exercise significantly increased cardiac NAD^+^ level, dSIR2 level, heart *dSir2* expression and *PGC-1α* expression level in both *w^1118^*-HFD flies and *w^1118^*-ND flies (*P*\<0.01). Importantly, the cardiac *PGC-1α* expression levels in *w^1118^*-HFD+E flies was higher than that of *w^1118^*-ND flies (*P*\<0.05) ([Fig. 3](#BIO044719F3){ref-type="fig"}A--D). Since the *PGC-1α* was involved in the synthesis of mitochondria, the number and morphology of mitochondria in cardiac cells was determined by transmission electron microscopy. We observed that in both HFD flies and non-HFD flies, exercise increased mitochondrial numbers and improved myofibril arrangement regularity in myocardial cells ([Fig. 3](#BIO044719F3){ref-type="fig"}E1--E4). Therefore, these results confirmed that a HFD induced a decreased in heart NAD^+^/dSIR2/*PGC-1α* pathway activity, but exercise training could prevent this from happening and even improve heart NAD^+^/dSIR2/*PGC-1α* pathway in HFD flies. Fig. 3.**The effect of a HFD and exercise on NAD^+^/dSIR2/*PGC-1α* pathway.** (A) Heart NAD^+^ levels. Results are expressed as the fold difference compared with *w^1118^*-ND flies. (B) Heart dSIR2 level. Results are expressed as the fold difference compared with *w^1118^*-ND flies. (C) Heart *dSir2* mRNA expression level. (D) Heart *PGC-1α* mRNA expression level. (E) The images of transmission electron microscopy; E1: *w^1118^*-ND; E2: *w^1118^*-ND+E; E3: *w^1118^*-HFD; E4: *w^1118^*-HFD+E. As we have seen exercise increased the mitochondrial numbers and improved myofibril arrangement regularity in myocardial cells. The red circle represented the position of the mitochondria in myocardial cells. The arrow represented the position of the Z line in myocardial cells. A two-way ANOVA was used to identify differences among the ND, ND+E, HFD, and HFD+E groups in *w^1118^* flies. Data are represented as means±s.e.m. \**P*\<0.05; \*\**P*\<0.01. The sample size of these indicators was 80 hearts, with three biological replicates. Lipotoxic cardiomyopathy and cardiac *dSir2* gene in *Drosophila* {#s2b} ----------------------------------------------------------------- Sir2 is an archetypal longevity gene and founder of the Sirtuin protein family, and it is involved in the regulation of rDNA stability and the control of cellular lifespan and aging ([@BIO044719C11]; [@BIO044719C35]; [@BIO044719C60]; [@BIO044719C72]). Recent studies report that *dSir2* also takes part into the regulation of lipid metabolism ([@BIO044719C28]; [@BIO044719C70]). For instance, overexpression of *dSir2* restricts fat accumulation in individual cells of the fat body in a cell autonomous manner, and loss of the *dSir2* leads to the age-progressive onset of hyperglycemia, obesity, glucose intolerance and insulin resistance ([@BIO044719C50]; [@BIO044719C53]). However, it remains unclear how *dSir2* regulates lipid metabolism. Some evidence suggests that *Sir2* expression can alter the transcriptional activity of the mitochondrial biogenesis coactivator PGC-1α, and it catalyzes PGC-1α deacetylation both *in vitro* and *in vivo*. Overexpression of Sir2 deacetylase or increasing NAD^+^ levels activate transcriptional activity of *PGC-1α* in neurons and increases mitochondrial density ([@BIO044719C16]; [@BIO044719C41]). It has been reported the *PGC-1α* in fly heart is a key gene in regulating the formation of lipotoxic cardiomyopathy ([@BIO044719C19]; [@BIO044719C20]). To confirm the guess that heart *dSir2* gene can regulate cardiac lipid metabolism via modulating NAD^+^/dSIR2/*PGC-1α* pathway, the cardiac *dSir2* gene was overexpressed and knocked down by building UAS/hand-Gal4 system in *Drosophila*. Cardiac *dSir2* overexpression reduced the risk of lipotoxic cardiomyopathy {#s2c} --------------------------------------------------------------------------- In this research, the results showed the cardiac *dSir2* mRNA expression of *dSir2*-overexpression-normal diet (*dSir2*-OE-ND) flies was higher than that of *dSir2*-control flies (*P*\<0.01, about 3.1-fold higher) ([Fig. 4](#BIO044719F4){ref-type="fig"}A). This suggested that cardiac *dSir2* gene overexpression was successfully constructed. Since a dnaJ-homologue (*dnaJ-H*) gene partially overlaps with *dSir2*, the cardiac *dSir2* overexpression might affect cardiac *dnaJ-H* mRNA expression. To avoid the influence of cardiac *dnaJ-H* mRNA expression on our results, we measured the expression of *dnaJ-H* gene in the heart*.* The results showed that there was no significant difference between *dSir2*-control flies and *dSir2*-OE flies in cardiac *dnaJ-H* mRNA expression (*P*\>0.05) ([Fig. 4](#BIO044719F4){ref-type="fig"}K). Increasing evidence indicates that moderately increased expression of *dSir2* (2.5-fold, threefold, and fivefold) from the native *dSir2* locus cannot increase *dnaJ-H* mRNA expression ([@BIO044719C11]; [@BIO044719C28]). In this study, cardiac *dSir2* mRNA expression of *dSir2*-OE-ND flies was about 3.1-fold higher than that of *dSir2*-control flies. This hinted that cardiac *dSir2* overexpression did not significantly affect cardiac *dnaJ-H* mRNA expression, and cardiac *dnaJ-H* gene may not affect our results in this study. Also, results showed that cardiac *dSir2* overexpression significantly increased heart dSIR2 level, NAD^+^ level, and *PGC-1α* expression level (*P*\<0.05, *P*\<0.05, *P*\<0.01) when *dSir2*-OE-ND flies were compared to *dSir2*-control flies ([Fig. 4](#BIO044719F4){ref-type="fig"}B--D). It hinted that cardiac *dSir2* gene overexpression upregulated NAD^+^/dSIR2/*PGC-1α* pathway activity. Moreover, we found heart diastolic diameter and fractional shortening of *dSir2*-OE-ND flies were higher than that of *dSir2*-control flies (*P*\<0.05) ([Fig. 4](#BIO044719F4){ref-type="fig"}E,G). The arrhythmia index of *dSir2*-OE-ND flies was lower than that of *dSir2*-control flies (*P*\<0.05) ([Fig. 4](#BIO044719F4){ref-type="fig"}H,L). This suggested that cardiac *dSir2* gene overexpression could enhance cardiac contractility and decrease the risk of arrhythmia. Finally, we found that the heart TG level and *dFAS* expression of *dSir2*-OE-ND flies was lower than that of *dSir2*-control flies (*P*\<0.01) ([Fig. 4](#BIO044719F4){ref-type="fig"}-I,J). Therefore, these results indicated that cardiac *dSir2* gene overexpression could prevent lipid accumulation in the heart. According to others and our results, we hypothesized that cardiac *dSir2* gene overexpression could reduce the risk of lipotoxic cardiomyopathy via activating cardiac NAD^+^/dSIR2/ *PGC-1α* pathway in old flies. Fig. 4.**The effect of a HFD and exercise on lipotoxic cardiomyopathy in *dSir2*-OE flies.** (A) Relative heart *dSir2* mRNA expression level. (B) Heart dSIR2 level. (C) Heart NAD^+^ levels. (D) Relative heart *PGC-1α* mRNA expression level. (E) Heart diastolic diameter. (F) Heart systolic diameter. (G) Fractional shortening. (H) Arrhythmia index. (I) Heart TG levels. Results are expressed as the fold difference compared with *dSir2-*control flies. (J) Relative heart *dFAS* gene expression level. (K) Relative heart *dnaJ-H* mRNA expression level. (L) Illustrating qualitative differences in heart function parameters (6 s): fractional shortening and arrhythmia index; L1: *dSir2*-control; L2: *dSir2*-OE-ND; L3: *dSir2*-OE-ND+E; L4: *dSir2*-OE-HFD; L5: *dSir2*-OE-HFD+E. Independent sample *t*-test was used to identify differences between *dSir2*-control flies and *dSir2*-OE flies. A two-way ANOVA was used to identify differences among the ND, ND+E, HFD, and HFD+E groups in *dSir2*-OE flies. Data are represented as means±s.e.m. \**P*\<0.05; \*\**P*\<0.01. The sample size was the same as with *w^1118^*. To further confirm whether cardiac *dSir2* gene overexpression could prevent lipotoxic cardiomyopathy induced by a HFD, the *dSir2*-OE flies were fed a HFD. Results showed that the cardiac *dSir2* expression level, dSIR2 level, NAD^+^ level, *PGC-1α* expression level, diastolic diameter, fractional shortening, arrhythmia index, heart TG level and *dFAS* expression of *dSir2*-OE-ND flies were not significantly different from that of *dSir2*-OE-HFD flies (*P*\>0.05) ([Fig. 4](#BIO044719F4){ref-type="fig"}). These results confirmed that cardiac *dSir2* gene overexpression could prevent lipotoxic cardiomyopathy induced by a HFD in old flies. The mechanism is that a HFD cannot weaken the activity of NAD^+^/dSIR2/*PGC-1α* pathway in *dSir2*-OE flies. In *w^1118^* flies, we have confirmed that endurance exercise could resist lipotoxic cardiomyopathy and activate NAD^+^/dSIR2/*PGC-1α* pathway, but the relationship between endurance exercise and cardiac *dSir2* gene overexpression in preventing lipotoxic cardiomyopathy induced by a HFD remained unknown. So, the *dSir2*-OE flies participated in exercise training. We found that endurance exercise significantly upregulated the expression of cardiac *dSir2* gene in both *dSir2*-OE-ND flies and *dSir2*-OE-HFD flies (*P*\<0.01 and *P*\<0.05, respectively) ([Fig. 4](#BIO044719F4){ref-type="fig"}A), and it also remarkably increased heart dSIR2 level, NAD^+^ level and *PGC-1α* expression level in both *dSir2*-OE-ND flies and *dSir2*-OE-HFD flies (*P*\<0.05 and *P*\<0.01, respectively) ([Fig. 4](#BIO044719F4){ref-type="fig"}B--D). In addition, endurance exercise significantly increased diastolic diameter in *dSir2*-OE-ND flies (*P*\<0.05), and it significantly increased fractional shortening in both *dSir2*-OE-ND flies and *dSir2*-OE-HFD flies (*P*\<0.055) ([Fig. 4](#BIO044719F4){ref-type="fig"}E--G). Moreover, endurance exercise significantly reduced heart TG level and *dFAS* expression in both *dSir2*-OE-ND flies and *dSir2*-OE-HFD flies (*P*\<0.05 and *P*\<0.01, respectively) ([Fig. 4](#BIO044719F4){ref-type="fig"}I,J). Therefore, in the fight against lipotoxic cardiomyopathy, overexpression of cardiac *dSir2* was parallel to exercise training. Overexpression of cardiac *dSir2* combined with exercise training could better prevent lipotoxic cardiomyopathy in old flies. The mechanism was that both overexpression of cardiac *dSir2* and exercise training could superimpose the improvement of the activity of cardiac NAD^+^/dSIR2/*PGC-1α* pathway. Exercise improved lipotoxic cardiomyopathy induced by cardiac *dSir2* knockdown {#s2d} ------------------------------------------------------------------------------- To further confirm the relationship between cardiac *dSir2* and lipotoxic cardiomyopathy, it was necessary to construct cardiac *dSir2* knockdown (KD) by UAS/hand-Gal4 system. In this study, the results showed that the cardiac *dSir2* mRNA expression of *dSir2*-KD-ND flies was lower than that of *dSir2*-control flies (*P*\<0.01, about 2.5-fold lower) ([Fig. 5](#BIO044719F5){ref-type="fig"}A). It suggested that cardiac *dSir2* gene knockdown was successfully constructed. In addition, when *dSir2*-OE-ND flies were compared to *dSir2*-control flies, we found cardiac *dSir2* knockdown significantly decreased heart dSIR2 levels, NAD^+^ levels, and *PGC-1α* expression levels (*P*\<0.01) ([Fig. 5](#BIO044719F5){ref-type="fig"}B--D). This suggested that cardiac *dSir2* gene knockdown inhibited NAD^+^/dSIR2/*PGC-1α* pathway activity. Moreover, we found the heart diastolic diameter and fractional shortening of *dSir2*-KD-ND flies were lower than that of *dSir2*-control flies (*P*\<0.05, *P*\<0.01) ([Fig. 5](#BIO044719F5){ref-type="fig"}E,G). The arrhythmia index of *dSir2*-KD-ND flies was higher than that of *dSir2*-control flies (*P*\<0.05) ([Fig. 5](#BIO044719F5){ref-type="fig"}H,K). This suggested that cardiac *dSir2* gene knockdown could weaken cardiac contractility and increase the risk of arrhythmia. Finally, we found that the heart TG levels and *dFAS* expression of *dSir2*-KD-ND flies were higher than that of *dSir2*-control flies (*P*\<0.01) ([Fig. 5](#BIO044719F5){ref-type="fig"}I,J). This indicated that cardiac *dSir2* gene knockdown could induce lipid accumulation in the heart. Therefore, according to others' and our own evidence, we hypothesized that cardiac *dSir2* gene knockdown could induce lipotoxic cardiomyopathy via inhibiting cardiac NAD^+^/dSIR2/ *PGC-1α* pathway in old flies. Fig. 5.**The effect of a HFD and exercise on lipotoxic cardiomyopathy in *dSir2*-KD flies.** (A) Relative heart *dSir2* mRNA expression level. (B) Heart dSIR2 level. (C) Heart NAD^+^ levels. (D) Relative heart *PGC-1α* mRNA expression level. (E) Heart diastolic diameter. (F) Heart systolic diameter. (G) Fractional shortening. (H) Arrhythmia index. (I) Cardiac TG level. Results are expressed as the fold difference compared with *dSir2-*control flies. (J) Relative heart *dFAS* gene expression level. (K) Illustrating qualitative differences in heart function parameters (10 s): fractional shortening and arrhythmia index; K1: *dSir2*-control; K2: *dSir2*-KD-ND; K3: *dSir2*- KD-ND+E; K4: *dSir2*- KD-HFD; K5: *dSir2*-KD-HFD+E. Independent sample *t*-test was used to identify differences between *dSir2*-control flies and *dSir2*-KD flies. A two-way ANOVA was used to identify differences among the ND, ND+E, HFD, and HFD+E groups in *dSir2*-OE flies. Independent sample *t*-test was used to identify differences between *dSir2*-control flies and *dSir2*-KD flies. Data are represented as means±s.e.m. \**P*\<0.05; \*\**P*\<0.01. The sample size was the same as with *w^1118^*. Although it had been confirmed that a HFD could induce lipotoxic cardiomyopathy in *w^1118^* flies, it remained unclear whether lipotoxic cardiomyopathy, induced by cardiac *dSir2* knockdown, could be aggravated after a HFD intervention. To figure this out, the cardiac *dSir2* gene knockdown flies were fed a HFD. Results showed that the cardiac *dSir2* expression level, dSIR2 level, NAD^+^ level and *PGC-1α* expression level of *dSir2*-KD-HFD flies were lower than that of *dSir2*-KD-ND flies (*P*\<0.05) ([Fig. 5](#BIO044719F5){ref-type="fig"}A--D). This suggested that a HFD could reduce cardiac *dSir2* gene expression and the activity of NAD^+^/dSIR2/*PGC-1α* pathway in untrained *dSir2*-KD flies. In addition, heart diastolic diameter and fractional shortening of *dSir2*-KD-HFD flies were lower than that of *dSir2*-KD-ND flies (*P*\<0.05, *P*\<0.01) ([Fig. 5](#BIO044719F5){ref-type="fig"}E,G), and the arrhythmia of *dSir2*-KD-HFD flies was higher than that of *dSir2*-KD-ND flies (*P*\<0.05) ([Fig. 5](#BIO044719F5){ref-type="fig"}H,K). It indicated that a HFD could weaken cardiac contractility and increase the risk of arrhythmia in untrained *dSir2*-KD flies. What is more, the heart TG level and *dFAS* expression of *dSir2*-KD-HFD flies were higher than that of *dSir2*-KD-ND flies (*P*\<0.05, *P*\<0.01) ([Fig. 5](#BIO044719F5){ref-type="fig"}I,J). It also indicated that a HFD could increase cardiac lipid accumulation in untrained *dSir2*-KD flies. So, these results confirmed that a HFD could aggravate lipotoxic cardiomyopathy induced by cardiac *dSir2* knockdown via inhibiting cardiac NAD^+^/dSIR2/*PGC-1α* pathway in untrained flies. Although it had been identified that exercise could prevent lipotoxic cardiomyopathy induced by a HFD in *w^1118^* flies, and although exercise combined with overexpression of cardiac *dSir2* could better prevent lipotoxic cardiomyopathy in old flies, it remained unknown as to whether endurance exercise could improve lipotoxic cardiomyopathy induced by cardiac *dSir2* knockdown, and whether endurance exercise could prevent further deterioration of lipotoxic cardiomyopathy induced by a HFD in cardiac *dSir2* knockdown flies. To figure this out, the *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies were given exercise training. Results showed that endurance exercise significantly upregulated the expression of cardiac *dSir2* gene in both *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies (*P*\<0.01) ([Fig. 5](#BIO044719F5){ref-type="fig"}A), and it also remarkably increased heart dSIR2 level, NAD^+^ level and *PGC-1α* expression level in both *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies (*P*\<0.05 and *P*\<0.01, respectively) ([Fig. 5](#BIO044719F5){ref-type="fig"}B--D). In addition, endurance exercise significantly increased diastolic diameter and fractional shortening in both *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies (*P*\<0.05 and *P*\<0.01, respectively) ([Fig. 5](#BIO044719F5){ref-type="fig"}E,G), and it significantly decreased arrhythmia index in both *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies (*P*\<0.05 and *P*\<0.01, respectively) ([Fig. 5](#BIO044719F5){ref-type="fig"}H,K). Moreover, endurance exercise significantly reduced heart TG level and *dFAS* expression in both *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies (*P*\<0.01) ([Fig. 5](#BIO044719F5){ref-type="fig"}I,J). Therefore, we hypothesized that endurance exercise could improve lipotoxic cardiomyopathy induced by cardiac *dSir2* knockdown, and it could prevent further deterioration of lipotoxic cardiomyopathy induced by a HFD in cardiac *dSir2* knockdown flies. However, to find out the extent to which exercise saved lipotoxic cardiomyopathy in both *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies, the *dSir2*-KD-HFD+E flies were compared with *dSir2*-KD-ND flies, and the *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies were compared with *dSir2*-control flies. Interestingly, the cardiac *dSir2* expression level, dSIR2 level, NAD^+^ level, *PGC-1α* expression level, diastolic diameter and fractional shortening of *dSir2*-KD-HFD+E flies were higher than that of *dSir2*-KD-ND flies (*P*\<0.05 and *P*\<0.01, respectively) ([Fig. 5](#BIO044719F5){ref-type="fig"}A--E,G). The arrhythmia index, heart TG level, and *dFAS* expression of *dSir2*-KD-HFD+E flies were lower than that of *dSir2*-KD-ND flies (*P*\<0.05, *P*\<0.01) ([Fig. 5](#BIO044719F5){ref-type="fig"}H--J). Moreover, the cardiac *dSir2* expression level, dSIR2 level, NAD^+^ level, *PGC-1α* expression level, diastolic diameter, fractional shortening, arrhythmia index, heart TG level and *dFAS* expression of *dSir2*-KD-ND flies and *dSir2*-KD-HFD flies were not significantly different from that of *dSir2*-KD-HFD flies (*P*\>0.05) ([Fig. 5](#BIO044719F5){ref-type="fig"}). So, we confirmed that endurance exercise could resist and treat lipotoxic cardiomyopathy induced by a HFD and cardiac *dSir2* knockdown flies. DISCUSSION {#s3} ========== Lipotoxic cardiomyopathy induced by a HFD related to inhibiting NAD^+^/dSIR2/*PGC-1α* pathway {#s3a} --------------------------------------------------------------------------------------------- Increasing evidence showed that a HFD could induce lipotoxic cardiomyopathy, which manifested as cardiac lipid accumulation, reduced cardiac contractility, increased risk of arrhythmia and severe structural pathologies in flies ([@BIO044719C8]; [@BIO044719C19]; [@BIO044719C49]; [@BIO044719C70]). Similarly, our results confirmed again that a HFD could induce lipotoxic cardiomyopathy. For example, a HFD increased the heart TG level and the heart *dFAS* expression levels, and it resulted in heavy lipid accumulation. In addition, a HFD reduced heart fractional shortening via decreasing diastolic diameter, and it increased arrhythmia indexes. These changes easily led to heart dysfunction and heart failure ([@BIO044719C5]; [@BIO044719C34]; [@BIO044719C65]). Moreover, the heart NAD^+^ levels, dSIR2 levels, *dSir2* gene expression levels and *PGC-1α* expression were all decreased after feeding a HFD. These results suggested the heart NAD^+^/dSIR2/*PGC-1α* pathway activation was inhibited by a HFD. Accumulating studies indicated that HFD-induced obesity could decrease the levels of NAD^+^ by several ways. For example, the mitochondria had compromised function due to overload that was thought to be induced by excessive beta-oxidation, and HFD-induced obesity could also decrease the mitochondrial numbers ([@BIO044719C2]; [@BIO044719C74]). Since there was a NAD^+^ pool in mitochondrial, NAD^+^ levels in metabolic tissues decreased with obesity ([@BIO044719C3]; Di Lisa et al., 2001; [@BIO044719C58]). In addition, the oxidative stress by a HFD also caused an increased in lipid peroxidation, and the increased oxidative stress accumulated fat was an important pathogenic mechanism of metabolic syndromes associated with obesity ([@BIO044719C17]; [@BIO044719C55]). A number of studies had demonstrated that oxidative stress induced excessive PARP-1 activation mediates cell death, and NAD^+^ depletion mediates PARP-1-induced cell death, which indicated that HFD-induced increased oxidative stress could also reduce NAD^+^ level via PARP-1 activation mediated cell death ([@BIO044719C29]; [@BIO044719C39]; [@BIO044719C46]; [@BIO044719C48]; [@BIO044719C51]). NAD^+^ depletion lead to abnormal hepatic lipid metabolism in HFD-induced nonalcoholic fatty liver disease ([@BIO044719C75]). Therefore, these reports hinted that a HFD induced decreased NAD^+^ levels in cells. In HFD flies, because of the lipotoxicity the reduction of cardiac NAD^+^ content inhibited dSIR2 (NAD-dependent histone deacetylases) activity. Since *PGC-1α* was a key antagonist of HFD-induced lipotoxic cardiomyopathy, and since PGC-1α was activated by the NAD^+^-dependent deacetylate of SIR2 ([@BIO044719C4]; [@BIO044719C56]), HFD-induced the reduction of NAD^+^ content decreased PGC-1α activation via inhibiting dSIR2 activation. This finally led to a more severe mitochondria number reduction, lipid accumulation, and dysfunction in the heart of HFD-fed flies. These findings suggested that the activity of NAD^+^/dSIR2/*PGC-1α* pathway was closely related to the formation of lipotoxic cardiomyopathy in flies. However, to confirm the relationship between NAD^+^/dSIR2/*PGC-1α* pathway and lipotoxic cardiomyopathy, further experiments should be done. Cardiac *dSir2* gene involved into regulating the formation of lipotoxic cardiomyopathy {#s3b} --------------------------------------------------------------------------------------- It had been proposed that *Sir2* in the fat body plays an important role in regulating fat storage and mobilization, as *Sir2/Sirt1* had been implicated in regulation of fat metabolism in flies and mammals. Overexpression of *Sir2* in the adult fat body was found to be sufficient to extend the lifespan of male and female *Drosophila* ([@BIO044719C10]; [@BIO044719C28]; [@BIO044719C36]). However, it remains unclear whether *Sir2* can regulate heart lipid metabolism and cardiac function. As expected, our research showed that the *dSir2* gene could also regulate lipid metabolism in the heart. For example, overexpression of cardiac *dSir2* gene could not only reduce heart TG accumulation and heart *dFAS* expression, but also it could prevent heart TG accumulation and decrease heart *dFAS* expression induced by a HFD. While cardiac *dSir2* knockdown could increase heart TG accumulation and heart *dFAS* expression, and this would get worse under a HFD intervention. The *dSir2* apparently regulates expression of genes involved in fat metabolism, and lack of *Sir2* increases fat deposition under normal conditions and consequently impairs starvation survival capabilities of flies ([@BIO044719C7]). It has been reported that the FOXO and PGC-1*α* activity can be modulated by SIR2 deacetylation ([@BIO044719C16]; [@BIO044719C41]), and these two factors are important to the formation of lipotoxic cardiomyopathy in *Drosophila* ([@BIO044719C19]; [@BIO044719C20]). However, there is no direct evidence that cardiac *Sir2* can regulate heart lipid metabolism via activating PGC-1*α* activity in *Drosophila*. In this study, we also found that cardiac *dSir2* gene had the ability to modulate cardiac function. For instance, overexpression of cardiac *dSir2* gene could increase heart fractional shortening via increasing diastolic diameter, and overexpression of cardiac *dSir2* gene could decrease arrhythmia index. In addition, overexpression of cardiac *dSir2* gene could prevent fractional shortening decline and arrhythmia index increase induced by a HFD. Also, cardiac *dSir2* knockdown could decrease heart fractional shortening via decreasing diastolic diameter, and cardiac *dSir2* knockdown could increase arrhythmia index. A HFD intervention could aggravate cardiac systolic dysfunction and arrhythmia in cardiac *dSir2* knockdown flies. It has been reported that *FOXO* or *PGC-1α* knockdown results in serious cardiac dysfunction in flies, including reduced cardiac contractility and increased the risk of arrhythmia ([@BIO044719C19]; [@BIO044719C20]). The activity of PGC-1α can be modulated by SIR2 deacetylation ([@BIO044719C16]; [@BIO044719C41]). However, there was no direct evidence that cardiac *dSir2* could regulate heart function via activating PGC-1*α* activity in *Drosophila*. To confirm whether cardiac *dSir2* gene could regulate lipotoxic cardiomyopathy by modulating cardiac NAD^+^/ dSIR2/*PGC-1α* pathway, the cardiac dSIR2 level, NAD^+^ level and *PGC-1α* expression levels were measured. We found overexpression of cardiac *dSir2* gene increased cardiac dSIR2 level, NAD^+^ level, and *PGC-1α* expression level, and overexpression of cardiac *dSir2* gene could prevent the decline of cardiac dSIR2 level, NAD^+^ level, and *PGC-1α* expression level induced by a HFD. On the other hand, cardiac *dSir2* knockdown decreased cardiac dSIR2 level, NAD^+^ level, and *PGC-1α* expression level. A HFD intervention could aggravate the decline of cardiac dSIR2 level, NAD^+^ level, and *PGC-1α* expression level in cardiac *dSir2* knockdown flies. SIR2 directly binds to PGC-1α and deacetylated it in 293T cells and PC12 cells ([@BIO044719C43]). SIR2 stimulates the ability of PGC-1α to coactivate hepatocyte nuclear factor 4α, thereby positively regulating gluconeogenic genes in response to pyruvate in hepatic cells. In the same cell type, SIR2 also enhances the ability of PGC-1α to inhibit glycolytic genes in response to pyruvate ([@BIO044719C73]). Furthermore, SIR2 affects fatty acid oxidation in adipocytes and knockdown of PGC-1α cancels the effect of overexpression of SIR2 upon fatty acid oxidation. Thus the availability of other family members also contributes to the net effect of sirtuins upon PGC-1α ([@BIO044719C62]). Systemic deletion of SIR2 in mice induces the development of dilated cardiomyopathy, which is accompanied by mitochondrial dysfunction. Overexpression of SIR2 in pancreatic β-cells enhances insulin secretion in response to glucose and improves glucose metabolism by increasing ATP production via suppression of uncoupling protein-2 expression ([@BIO044719C13]; [@BIO044719C45]). In this research, we identified that cardiac *dSir2* gene could regulate *PGC-1α* expression via NAD^+^ and dSIR2 level. This possibly caused dysfunction of the heart\'s mitochondria, and this could induce lipid accumulation and reduced contractile ability of the heart, and eventually result in lipotoxic cardiomyopathy. A previous study has confirmed that when *PGC-1* was overexpressed in heart, lipotoxic cardiomyopathy was prevented after flies were fed a HFD ([@BIO044719C19]). Similarly, overexpression of *dSir2* also resisted lipotoxic cardiomyopathy induced by a HFD in this study. Therefore, based on this evidence, we declared that the activation of cardiac NAD^+^/dSIR2/*PGC-1α* pathway was a key pathway that regulated the formation of lipotoxic cardiomyopathy. Exercise improved lipotoxic cardiomyopathy induced by a HFD and *dSir2* knockdown in old *Drosophila* {#s3c} ----------------------------------------------------------------------------------------------------- A lot of studies have confirmed that appropriate endurance exercise is a healthy and economical way to prevent and cure obesity, and endurance exercise is also considered a good way to improve heart functional in obese or old individuals ([@BIO044719C61]). For example, exercise training can strengthen the heart\'s ability to use fatty acids to provide energy by increasing the activity of related enzymes, which prevents lipid excessive accumulation in the heart ([@BIO044719C67]). Furthermore, exercise training improves heart function such as cardiac contractibility and exercise reduces heart failure in obese individuals ([@BIO044719C24]; [@BIO044719C40]; May et al., 2016; [@BIO044719C66]). Finally, exercise increases muscle NAD^+^ levels and neuron NAD^+^ levels, and it activates transcriptional activity of *PGC-1α* and increases mitochondrial density ([@BIO044719C16]; [@BIO044719C25]; [@BIO044719C38]; [@BIO044719C41]). However, it remains unclear whether exercise can prevent lipotoxic cardiomyopathy by activating cardiac NAD^+^/dSIR2/*PGC-1α* pathway. In this research, we found that in HFD-fed flies, the heart TG level and the heart *dFAS* expression level were significantly decreased after exercise training. In addition, exercise training increased heart fractional shortening via increasing diastolic diameters, and exercise training decreased arrhythmia index in a HFD-fed flies and cardiac *dSir2* knockdown flies. Finally, the heart NAD^+^ levels, dSIR2 levels, *dSir2* gene expression levels and *PGC-1α* expression were all increased after exercise training in HFD-fed flies. This suggested that exercise training reduced lipid accumulation, improved heart function, activated NAD^+^/dSIR2/*PGC-1α* pathway and reduced the risk of arrhythmia, which prevented lipotoxic cardiomyopathy formation. In HFD-fed flies, on one hand, exercise training can strengthen the heart\'s ability to use fatty acids to provide energy by increasing the activity of related enzymes, which prevents excessive lipid accumulation in the heart ([@BIO044719C67]). On the other hand, because the dSIR2 protein plays a pivotal role in PGC-1α function via NAD-dependent deacetylation ([@BIO044719C30]; [@BIO044719C33]; [@BIO044719C37]; [@BIO044719C54]), and because the *PGC-1α* is a key antagonist of HFD-induced lipotoxic cardiomyopathy ([@BIO044719C8]; [@BIO044719C26]; [@BIO044719C52]; [@BIO044719C71]), exercise training increased the *PGC-1α* function via improving heart NAD^+^ content and heart dSIR2 activation in this study ([@BIO044719C16]; [@BIO044719C25]; [@BIO044719C38]; [@BIO044719C41]). Therefore, these results suggested that the NAD^+^/dSIR2/*PGC-1α* pathway activation was an important molecular mechanism of exercise resistance against lipotoxic cardiomyopathy. However, it remained unclear whether exercise training could improve lipotoxic cardiomyopathy induced by cardiac *dSir2* knockdown. In this study, the heart *dSir2*-RNAi flies were exercise trained and we found exercise training also reduced lipid accumulation, enhanced heart function, activated NAD^+^/dSIR2/*PGC-1α* pathway, and reduced the risk of arrhythmia, which improved lipotoxic cardiomyopathy induced by heart *dSir2* RNAi. In heart *dSir2*-RNAi flies, exercise training can also increase the cardiac ability to use fatty acids to provide energy by increasing the activity of related enzymes, which prevents lipid excessive accumulation in the heart ([@BIO044719C67]). In addition, increasing evidence hints that exercise training can upregulate *dSir2* activity. For instance, it has been reported that exercise not only improves blood NAD^+^ levels but also in muscle and cardiac NAD^+^ levels ([@BIO044719C12]; [@BIO044719C22]; [@BIO044719C64]), which may eventually result in increasing NAD^+^ activity in these tissues and organs to meet the demand of NAD^+^ metabolism during exercise training. Since the *dSir2* activity can be regulated by free NAD^+^ in cells, the *dSir2* expression may be indirectly elevated by exercise trained ([@BIO044719C23]). Moreover, increasing evidence indicates that exercise can intensify the contraction of cardiac muscles which may facilitate SIRT1 upregulation. Exercise training can upregulate heart AMPK expression -- AMPK is an energy sensor. Since AMPK also increases the intracellular NAD^+^ levels, its activity is correlated with SIRT1 enhancement ([@BIO044719C14]; [@BIO044719C42]). Next, recent studies report that exercise training upregulates SIRT1 in kidney, liver and brain ([@BIO044719C31]; [@BIO044719C44]). So, these reports suggest that exercise training can increase *Sir2* expression. However, there is no evidence that exercise training can increase heart *dSir2* expression by affecting the UAS/Gal4 system. Besides, in our experiment, a stronger cardiac *dSir2* knockdown has not been generated any other way, such as with an inducible CRISPR or a stronger RNAi line or stronger driver. Therefore, our results indicated that exercise training rescued the cardiac *dSir2* expression and dSir2 protein levels only under this mild *dSir2*-knockdown condition, and the reason may be that exercise induction of cardiac *dSir2* was stronger than knockdown. In conclusion, we identified that the heart *dSir2* gene and *dSir2*/NAD^+^/*PGC-1α* pathway regulated the heart lipid metabolism and the formation of lipotoxic cardiomyopathy. Lipotoxic cardiomyopathy could be induced by heart *dSir2* knockdown, but the heart *dSir2* overexpression could prevent a HFD-induced lipotoxic cardiomyopathy. Exercise training could improve lipotoxic cardiomyopathy induced by a HFD or heart *dSir2* knockdown in old *Drosophila*. The NAD^+^/dSIR2/*PGC-1α* pathway activation was an important molecular mechanism of exercise resistance against lipotoxic cardiomyopathy. MATERIALS AND METHODS {#s4} ===================== Fly stocks, diet and husbandry {#s4a} ------------------------------ The *w^1118^* and *hand-Gal4* line was a gift from Xiu-shan Wu (Heart Development Center of Hunan Normal University). UAS-*dSir2*-OE (*w^1118^;P{EP}Sirt1^EP2300^DnaJ-H^EP2300^/CyO*) line was obtained from the Bloomington Stock Center, and the P{EP} construct carries Scer\\UAS binding sites for the Scer\\GAL4 transcriptional regulator, and bacterial sequences that allow plasmid rescue. The Gal4-UAS system allows regulated expression of genes proximate to the site of the insertion: genes properly oriented with respect to the Scer\\UAS sequences can be conditionally expressed via transgene-derived Scer\\GAL4 activity ([@BIO044719C57]). UAS-*dSir2*-KD (*w^1118^; P{GD11580}v23201*) line was obtained from the Vienna Drosophila RNAi Center. Male *hand-Gal4* flies were crossed to female UAS-*dSir2*-OE flies and UAS-*dSir2*-KD flies. To avoid the influence of genetic background differences on the results, maternal origin was used as the genetic control. The female '*w^1118^;P{EP}Sirt1^EP2300^DnaJ-H^EP2300^/CyO*' and '*hand-Gal4\>w^1118^;P{EP}Sirt1^EP2300^DnaJ-H^EP2300^/CyO*' were represented as '*dSir2*-control' and '*dSir2*-OE'. The female '*w^1118^; P{GD11580} v23201*' and '*hand-Gal4\>w^1118^; P{GD11580} v23201*' were represented as '*dSir2*-control' and '*dSir2*-KD'. The female '*w^1118^*', '*dSir2*-OE', and '*dSir2*-KD' virgin flies were divided into several groups: normal-diet (ND) group, normal-diet +exercise (ND+E) group, high-fat diet (HFD) group, and HFD+exercise (HFD+E) group. Normal food contained 10% yeast, 10% sucrose and 2% agar. The HFD was made by mixing 30% coconut oil with the food in a weight to volume ratio with the normal food ([@BIO044719C8]). Both HFD+E group flies and HFD-E group flies were fed the HFD from 28 days of age and were exposed to the HFD for 5 consecutive days. During the experimental time course, flies were housed in a 22±1°C incubator with 50% humidity and a 12-h light/dark cycle. This environment could keep the coconut oil food in a solid state since the melting point of coconut oil is about 24°C, thus ensuring that flies would not get stuck in the oily food. Fresh food was provided every other day for the duration of the experiment. All group flies were raised to the fourth weekend. Flies were trained or fed a HFD at 5 weeks old as we found flies were very sensitive to exercise or HFDs at this time. Exercise training device and protocols {#s4b} -------------------------------------- The advantage of the flies\' natural negative geotaxis behavior was taken to induce upward walking when constructing the exercise device ([@BIO044719C63]). All exercise group flies started exercise from when they were 5 weeks old, and underwent a 5-day-long exercise program. Vials were loaded horizontally into a steel tube that was rotated about its horizontal axis by an electric motor, with a gear regulating its shaft speed. There were 25 flies in each vial. Thus, each vial was rotated along its long axis with the accompanying rotating steel tube, which made the flies climb. Most flies continued to respond by climbing throughout the exercise period. The few that failed to climb were actively walking at the inner wall of the vial ([@BIO044719C69]; [@BIO044719C76]). Flies were exercised in vials with a 2.8-cm inner diameter, rotated at 0.14 rev/s. Flies were exercised for 1.5 hours every time. Semi-intact *Drosophila* preparation and image analysis {#s4c} ------------------------------------------------------- First, 30 flies were anesthetized with FlyNap for 2--3 min (a few flies were anesthetized with FlyNap for 4--5 min as they were hard to narcotize). Next, the head, ventral thorax and ventral abdominal cuticle were removed by special scissors and tweezers to expose the heart in the field of vision of a microscope. Note, dissections were done under oxygenated artificial hemolymph. These semi-intact preparations were allowed to equilibrate with oxygenation for 15--20 min before filming. Finally, image analysis of heart contractions was performed using high-speed videos of the preparations. Videos were taken 120--130 frames per second using a Hamamatsu EM-CCD digital camera on a Leica DM LFSA microscope with a 10 immersion lens. To get a random sampling of heart function, a single 30-s recording was made for each fly. All images were acquired and contrast enhanced by using Simple PCI imaging software. The heart physiology of the flies was assessed using a semi-automated optical heartbeat analysis program that quantifies heart diastolic diameters, systolic diameters, fractional shortening and arrhythmia index ([@BIO044719C21]). The SIRT1/dSIR2 assay, NAD^+^ assay, and TG assay {#s4d} ------------------------------------------------- For dSIR2 assay, 80 hearts were homogenized in 200 μl PBS buffer. To break the cells, hearts were subjected to freeze-thaw cycles. The homogenates were then centrifuged for 5 min at 5000×***g*** to get the supernate as a sample. We used purified insect SIRT1 antibody to coat microtiter plate wells, made the solid-phase antibody, then added SIRT1 to the wells, which, combined with HRP-labelled antibody, become antibody-antigen-enzyme-antibody complex. Then we added 50 μl standard sample liquid and experimental sample liquid to different wells. 100μl of HRP-conjugate reagent was added to each well, which were then incubated for 60 min at 37°C. 50 μl Chromogen Solution A and Chromogen Solution B were added to each well, which were kept in the dark for 15 min at 37°C. Next 50 μl of Stop Solution was added to each well to stop the reaction (a color change from blue to yellow was observed). The blank well was taken as zero, absorbance was read at 450 nm after adding Stop Solution and within 15 min. The OD values were used to determine sample Sirt1 concentration from the standard curve according to the manufacturer\'s instructions (Insect SIRT1 ELISA Kit, MLBIO). For NAD^+^ assay, 80 hearts were homogenized in 200 μl NAD exaction buffer, and then extracts were heated at 70°C for 5 min. 20 μl assay buffer and 100 μl of the opposite extraction to neutralize the extracts were added. Samples were centrifuged at 14,000 rpm for 5 min and then 40 μl standard sample liquid and experimental sample liquid were transferred to separate wells. 80 μl of working reagent (40 μl assay buffer, 1 μl oxidation-reduction enzyme, 10 μl 10% ethanol, 20 μl PMS, 20 μl MTT) was quickly added to each well. The resulting samples were then measured at 565 nm with a microplate spectrophotometer. The OD values were used to determine sample NAD^+^ concentration from the standard curve according to the manufacturer\'s instructions (EnzyChrom™NAD^+^/NADH assay kit). Cardiac TG measurements were taken from the hearts of 20 female flies dissected in artificial hemolymph. Care was taken to remove as much adipose tissue and other heart-associated cells from the heart as possible. Preparations were washed two times with PBS. Using fine forceps, the hearts were pulled off from the cuticle and transferred into Eppendorf tubes containing 26 μl of PBST (PBS+0.05% Triton X-100). Tubes were immediately frozen and stored at −80°C. Hearts were then mildly sonicated to lyse the cells. 20 μl heart lysates was transferred to a 96-well plate containing 200 μl of lipid reagent. After incubating 10′ at 37°C, 3 μl of heart lysate was transferred to wells containing 200 μl of Bradford reagent to measure protein content. The reaction mixture was incubated in an Environ Shaker at 300 rpm at 37°C for 10 min; the OD 550 nm was measured using SpectraMax Molecular Devices Corp and compared with a standardized curve. Experiments were repeated at least three times in multiple replicates. qRT-PCR {#s4e} ------- To check the transcriptional expression of the *dSir2*, *dFAS* and *PGC-1α* gene, 80 flies\' hearts were homogenized in Trizol for each group. Firstly, 10 μg of the total RNA was purified by organic solvent extraction from the Trizol (TRIzol, Invitrogen). Next, the purified RNA was treated with DNase I (RNase-free, Roche) and used to produce oligo dT-primed cDNAs (SuperScript II RT, Invitrogen), which were then used as templates for quantitative real-time PCR. The rp49 gene was used as an internal reference for normalizing the quantity of total RNAs. Finally, Real-time PCR was performed with SYBR green using an ABI7300 Real time PCR Instrument (Applied Biosystems). Expression of the various genes was determined by the comparative CT method (ABI Prism 7700 Sequence Detection System User Bulletin \#2, Applied Biosystems). Primer sequences of *dSir2* were as follows: F: 5′-GCAGTGCCAGCCCAATAA-3′; R: 5′-AGCCGATCACGATCAGTAGA-3′. Primer sequences of *PGC-1α* were as follows: F: 5′-TGTTGCTG CTACTGCTGCTT-3′; R: 5′-GCCTCTGCATCACCTACA CA-3′. Primer sequences of *dFAS* were as follows: F: 5′-GGTGAGACCATCGTGGAAGT-3′; R: 5′-AATGTCTGCCAAGCCAGAGT-3′. Primer sequences of *dnaJ-H* were as follows: F: 5′-GCAAGATGGCACACGTAGCTG-3′; R: 5′-CCACTGTAGCAAC ACGTAATCACC-3′. Primer sequences of Internal were as follows: F: 5′-CTAAGCTGTC GCACAAATGG-3′; R: 5′-AA CTTCTTG AATCCGGTGGG-3′. Statistical analyses {#s4f} -------------------- A two-way ANOVA was used to identify differences among the ND, ND+E, HFD, and HFD+E groups of *Drosophila* with the same genetic background. Independent sample *t*-test was used to identify differences between *dSir2*-control flies and *dSir2*-OE flies. Analyses were performed using the Statistical Package for the Social Sciences (SPSS) version 16.0 for Windows (SPSS Inc., Chicago, USA), with statistical significance set at *P*\<0.05. Data are represented as means±s.e.m. The authors thank Xiu-shan Wu (The Center for Heart Development, College of Life Science, Hunan Normal University) for supporting *Drosophila* of *w^1118^* and heart Shoot software technology. We also thank Karen Ocorr and Rolf Bodmer (Neuroscience and Aging Research Center, Sanford Burnham Medical Research Institute) for supporting semi-automatic optical echocardiography analysis software. **Competing interests** The authors declare no competing or financial interests. **Author contributions** Methodology: D.-T.W., D.C., Y.L.; Software: L.Z., Y.L.; Formal analysis: J.-x.L., K.L., W.-q.H.; Resources: D.-T.W., L.Z.; Data curation: J.-x.L., K.L., W.H.; Writing - original draft: D.-T.W.; Funding acquisition: L.Z. **Funding** This work was supported by the National Natural Science Foundation of China \[No. 31671243\] and the Ministry of Education funding PhD programs \[No. 20134306110009\].
{ "pile_set_name": "PubMed Central" }
In Oer-Erkenschwick hat es an einer KFZ-Werkstatt eine Schießerei gegeben. Schießerei in Oer-Erkenschwick mit 20 Beteiligten: Polizei warnt vor Flüchtigen. Sie könnten bewaffnet sein Schießerei in Oer-Erkenschwick SEK und Hubschrauber waren im Einsatz Mindestens vier Personen verletzt Polizei fahndet nach Flüchtigen Schüsse fielen während einer Schlägerei Oer-Erkenschwick. Nach der Schießerei am Dienstagabend in der Ludwigstraße in Oer-Erkenschwick hat die Polizei noch keine neuen Erkenntnisse. Nach den Flüchtigen wird weiterhin gefahndet. Gegen 18:44 Uhr sollen durch mehrere Schüsse mindestens vier Männer zum Teil schwer verletzt worden sein, wie Ramona Hörst von der Polizei Oer-Erkenschwick mitteilt. Die Schüsse sollen laut Polizeisprecherin während einer Auseinandersetzung zwischen mehreren Personen gefallen sein. Ein SEK-Team ist angerückt und blieb am Abend einsatzbereit. Zwischenzeitlich war auch ein Hubschrauber im Einsatz. Ein Video der Tat auf, dass sich insgesamt zwei Personen mit einem schwarzen Kleinwagen vom Tatort entfernten. Die Flüchtigen könnten bewaffnet sein. Die Polizei nahm bis zur Nacht zehn Personen fest. 20 Personen waren laut Polizei an der Auseinandersetzung beteiligt. Hintergründe unklar Warum es zu dem blutigen Konflikt kam, ist derzeit ebenfalls noch völlig unklar. Keine der beteiligten Personen konnte bislang von der Polizei vernommen werden, da alle Verletzten mit einem Rettungswagen ins Krankenhaus gebracht werden mussten. Schlägerei und Schüsse Die vier Verletzten seien nicht in Lebensgefahr, so ein Polizeisprecher am Mittwochmorgen. Ihr Zustand sei stabil. Zwei der Opfer erlitten demnach Schussverletzungen. Wir berichten weiter. Weitere Themen: Dieses Video zeigt die Schießerei von Oer-Erkenschwick Anzeige von Todkranker: Wer nimmt nach ihrem Tod den Hund? Junge Männer belästigen 72-Jährigen in Essen - und prügeln ihn dann krankenhausreif
{ "pile_set_name": "OpenWebText2" }
not the long story but some info: http://books.google.com/books?id=sL2oreiBQ6wC&pg=PA84&lpg=PA84&dq=forrest+j+ackerman+step+son+wendayne&source=bl&ots=KQolWVHuKv&sig=AiwLgWDjpJ0dd52U_FMfywA6wZ8&hl=en&sa=X&ei=S_mEUrrDI-qe2QWZ0oDgAw&ved=0CDEQ6AEwAQ#v=onepage&q=forrest%20j%20ackerman%20step%20son%20wendayne&f=false
{ "pile_set_name": "Pile-CC" }
Symphony No. 6 (Shostakovich) The Symphony No. 6 in B minor, Op. 54 by Dmitri Shostakovich was written in 1939, and first performed in Leningrad on 21 November 1939 by the Leningrad Philharmonic Orchestra under Yevgeny Mravinsky. Structure Symphony No. 6 is in three movements and is approximately 30 minutes in length: The Sixth Symphony is unusual in structure, beginning with a long and introspective slow movement, followed by two short movements: a scherzo and a "full-blooded and debauched music-hall galop". According to music critic Herbert Glass, the "entire [first] movement is based on the cell of a minor third, with a second theme - which follows without transition - the motif of a diminished seventh, with the trill at its close forming the third major ingredient of the movement - the two themes and the trill combined as a sort of super-theme. The composer lays this out as clearly as if he were teaching a music-appreciation class: do listen for it. Chamber music effects abound with, for instance, piccolo or flute, eerily alone or accompanied by the B-flat clarinets. There are walloping climaxes, too, each of which dies away into the gloom. Note, too, the composer's wonderful spotlighting of the melancholy English horn, a lone figure after the din has evaporated." The third movement galop is the movement Shostakovich himself thought was most successful. Music critic Daniel Hathaway noted that in the third movement, [the] "Snare drums ratcheted up the riot of brutal sound in the Scherzo and references to the William Tell Overture and laughing trombones added a hilarious burlesque quality to the finale." On average, the first movement is 15–20 minutes long, the second movement is 4–6 minutes long, and the third movement is 5–7 minutes long. Instrumentation This symphony is scored for piccolo, 2 flutes, 2 oboes, cor anglais, 3 clarinets (3rd doubling Eb clarinet), bass clarinet, 3 bassoons (3rd doubling contrabassoon), 4 horns, 3 trumpets, 3 trombones, tuba, timpani, snare drum, bass drum, cymbals, triangle, tambourine, tam-tam, xylophone, harp, celesta and strings. History The Sixth Symphony was originally planned to be a large-scale "Lenin Symphony" - a project which was often announced, but never materialised. Shostakovich had announced once in September 1938 that he was anxious to work on his Sixth Symphony, which would be a monumental composition for soloists, chorus and orchestra employing the poem Vladimir Ilyich Lenin by Vladimir Mayakovsky, but the declamatory nature of the poem made it difficult to set. He later tried to incorporate other literature about Lenin in his new symphony, but without success. In January 1939, he spoke about the Sixth Symphony in a radio address, with no mention of Lenin or any extramusical associations. The purely instrumental Symphony No. 6 was completed in September 1939. Shostakovich commented on it in the press: The musical character of the Sixth Symphony will differ from the mood and emotional tone of the Fifth Symphony, in which moments of tragedy and tension were characteristic. In my latest symphony, music of a contemplative and lyrical order predominates. I wanted to convey in it the moods of spring, joy, youth. On 21 November 1939, exactly two years after the premiere of the Symphony No. 5, the premiere of the Symphony No. 6 took place in the Large Hall of the Leningrad Philharmonic in Leningrad by the Leningrad Philharmonic Orchestra under Yevgeny Mravinsky—the same location and performers. In the same programme was the Romantic Poem for violin and orchestra of Zhelobinsky. The symphony had a successful premiere, and the finale was encored. However, although a local critic lauded Shostakovich for further freeing himself from formalistic tendencies in his new symphony, the work was later criticised for its ungainly structure and the jarring juxtaposition of moods. The fact that the symphony was performed during a 10-day festival of Soviet music which included patriotic works by Prokofiev (excerpts from Alexander Nevsky) and Shaporin (On the Field of Kulikovo) probably did not help. The first recording was made by Leopold Stokowski with the Philadelphia Orchestra for RCA Victor in December 1940. Notable recordings Notable recordings of this symphony include: * = Mono recording (1) = recorded live in Birmingham Source: arkivmusic.com (recommended recordings selected based on critics' reviews) References Bibliography Fay, Laurel (1999). Shostakovich: A Life. Oxford University Press. . External links Program note by the London Shostakovich Orchestra Symphony No. 06 (Shostakovich) Category:Compositions in B minor Category:1939 compositions
{ "pile_set_name": "Wikipedia (en)" }
1882 Liverpool City Council election Elections to Liverpool City Council were held on Wednesday 1 November 1882. One third of the council seats were up for election, the term of office of each councillor being three years. Ten of the sixteen seats were uncontested. After the election, the composition of the council was: Election result Ward results * - Retiring Councillor seeking re-election Abercromby Castle Street Everton Exchange Great George Lime Street North Toxteth Pitt Street Rodney Street St. Anne Street St. Paul's St. Peter's Scotland South Toxteth Vauxhall West Derby By-elections No.2, Scotland, 7 August 1883 Caused by the death of Councillor Patrick de Lacy Garton (Irish Home Rule, Scotland, elected 1 November 1880 – 1881) Aldermanic By Election, 18 September 1883 Alderman John Weightman died on 5 August 1883. Former Councillor Robert Vining (Conservative, Everton, elected 1 November 1876) was elected as an alderman by the Council (Councillors and Aldermen) on 18 September 1883. See also Liverpool City Council Liverpool Town Council elections 1835 - 1879 Liverpool City Council elections 1880–present Mayors and Lord Mayors of Liverpool 1207 to present History of local government in England References 1882 Category:1882 English local elections Category:November 1882 events Category:1880s in Liverpool
{ "pile_set_name": "Wikipedia (en)" }
What is the ten thousands digit of 14776? 1 What is the hundreds digit of 1060? 0 What is the units digit of 4012? 2 What is the units digit of 1375? 5 What is the hundreds digit of 883? 8 What is the hundreds digit of 555? 5 What is the tens digit of 2292? 9 What is the units digit of 7891? 1 What is the hundreds digit of 1105? 1 What is the tens digit of 712? 1 What is the ten thousands digit of 35958? 3 What is the units digit of 27983? 3 What is the hundreds digit of 2351? 3 What is the tens digit of 68545? 4 What is the ten thousands digit of 28711? 2 What is the hundreds digit of 1410? 4 What is the tens digit of 7759? 5 What is the units digit of 2962? 2 What is the thousands digit of 10107? 0 What is the tens digit of 2826? 2 What is the hundreds digit of 877? 8 What is the thousands digit of 3090? 3 What is the units digit of 972? 2 What is the thousands digit of 2960? 2 What is the units digit of 3248? 8 What is the hundreds digit of 604? 6 What is the thousands digit of 3973? 3 What is the hundreds digit of 3389? 3 What is the hundreds digit of 675? 6 What is the units digit of 313? 3 What is the thousands digit of 2399? 2 What is the hundreds digit of 11102? 1 What is the tens digit of 83728? 2 What is the hundreds digit of 29287? 2 What is the units digit of 616? 6 What is the hundreds digit of 4110? 1 What is the hundreds digit of 5133? 1 What is the units digit of 4968? 8 What is the units digit of 8906? 6 What is the thousands digit of 2707? 2 What is the tens digit of 4102? 0 What is the tens digit of 6558? 5 What is the thousands digit of 2352? 2 What is the thousands digit of 1018? 1 What is the ten thousands digit of 56096? 5 What is the hundreds digit of 41677? 6 What is the thousands digit of 140257? 0 What is the thousands digit of 9077? 9 What is the units digit of 666? 6 What is the tens digit of 1118? 1 What is the thousands digit of 23309? 3 What is the thousands digit of 1100? 1 What is the thousands digit of 57977? 7 What is the hundreds digit of 1613? 6 What is the units digit of 9182? 2 What is the hundreds digit of 4539? 5 What is the thousands digit of 9000? 9 What is the thousands digit of 27239? 7 What is the units digit of 13272? 2 What is the units digit of 776? 6 What is the units digit of 7779? 9 What is the tens digit of 1136? 3 What is the units digit of 1080? 0 What is the hundreds digit of 3906? 9 What is the tens digit of 36137? 3 What is the tens digit of 1657? 5 What is the units digit of 769? 9 What is the thousands digit of 1384? 1 What is the ten thousands digit of 39346? 3 What is the units digit of 603? 3 What is the hundreds digit of 391? 3 What is the hundreds digit of 11953? 9 What is the hundreds digit of 204? 2 What is the thousands digit of 2229? 2 What is the units digit of 6109? 9 What is the thousands digit of 2397? 2 What is the hundreds digit of 2694? 6 What is the hundreds digit of 13991? 9 What is the hundreds digit of 506? 5 What is the units digit of 41047? 7 What is the ten thousands digit of 24571? 2 What is the hundreds digit of 1374? 3 What is the units digit of 53? 3 What is the units digit of 778? 8 What is the tens digit of 18320? 2 What is the units digit of 1553? 3 What is the tens digit of 13554? 5 What is the units digit of 6407? 7 What is the hundreds digit of 42413? 4 What is the units digit of 1777? 7 What is the ten thousands digit of 16428? 1 What is the units digit of 2333? 3 What is the tens digit of 299? 9 What is the thousands digit of 32423? 2 What is the thousands digit of 1070? 1 What is the hundred thousands digit of 137552? 1 What is the hundreds digit of 1800? 8 What is the hundreds digit of 5269? 2 What is the hundreds digit of 5893? 8 What is the hundreds digit of 15049? 0 What is the tens digit of 398? 9 What is the hundreds digit of 593? 5 What is the tens digit of 1088? 8 What is the tens digit of 2441? 4 What is the thousands digit of 42932? 2 What is the ten thousands digit of 22270? 2 What is the thousands digit of 2803? 2 What is the tens digit of 630? 3 What is the units digit of 40431? 1 What is the tens digit of 794? 9 What is the units digit of 550? 0 What is the units digit of 8905? 5 What is the tens digit of 45961? 6 What is the tens digit of 3629? 2 What is the hundreds digit of 538? 5 What is the units digit of 3009? 9 What is the thousands digit of 7117? 7 What is the units digit of 1462? 2 What is the thousands digit of 5329? 5 What is the hundreds digit of 676? 6 What is the hundred thousands digit of 120184? 1 What is the tens digit of 394? 9 What is the thousands digit of 11936? 1 What is the units digit of 1635? 5 What is the ten thousands digit of 55455? 5 What is the units digit of 699? 9 What is the hundreds digit of 1116? 1 What is the tens digit of 99? 9 What is the tens digit of 17331? 3 What is the units digit of 200? 0 What is the thousands digit of 22851? 2 What is the thousands digit of 18703? 8 What is the hundreds digit of 63377? 3 What is the ten thousands digit of 10429? 1 What is the hundreds digit of 1671? 6 What is the hundreds digit of 6494? 4 What is the ten thousands digit of 26908? 2 What is the hundreds digit of 683? 6 What is the units digit of 59979? 9 What is the tens digit of 1780? 8 What is the tens digit of 4896? 9 What is the thousands digit of 9572? 9 What is the units digit of 562? 2 What is the thousands digit of 1088? 1 What is the units digit of 4788? 8 What is the units digit of 84556? 6 What is the units digit of 2665? 5 What is the thousands digit of 4690? 4 What is the units digit of 17236? 6 What is the hundred thousands digit of 115281? 1 What is the tens digit of 152? 5 What is the thousands digit of 1122? 1 What is the thousands digit of 3019? 3 What is the hundreds digit of 182? 1 What is the tens digit of 386? 8 What is the units digit of 16? 6 What is the hundreds digit of 48568? 5 What is the tens digit of 1042? 4 What is the units digit of 1477? 7 What is the tens digit of 399? 9 What is the hundreds digit of 16778? 7 What is the units digit of 175? 5 What is the tens digit of 220? 2 What is the hundreds digit of 5471? 4 What is the hundreds digit of 15643? 6 What is the thousands digit of 29443? 9 What is the tens digit of 2675? 7 What is the units digit of 728? 8 What is the tens digit of 51860? 6 What is the tens digit of 194? 9 What is the thousands digit of 7907? 7 What is the hundreds digit of 6615? 6 What is the thousands digit of 1998? 1 What is the tens digit of 806? 0 What is the hundreds digit of 21447? 4 What is the hundreds digit of 1982? 9 What is the thousands digit of 6594? 6 What is the thousands digit of 2290? 2 What is the hundreds digit of 39321? 3 What is the hundreds digit of 33615? 6 What is the tens digit of 2385? 8 What is the tens digit of 62758? 5 What is the tens digit of 2913? 1 What is the hundreds digit of 569? 5 What is the tens digit of 23872? 7 What is the tens digit of 647? 4 What is the units digit of 4500? 0 What is the tens digit of 196? 9 What is the hundreds digit of 2871? 8 What is the tens digit of 2758? 5 What is the units digit of 3? 3 What is the ten thousands digit of 13642? 1 What is the tens digit of 1954? 5 What is the thousands digit of 75457? 5 What is the ten thousands digit of 18533? 1 What is the hundreds digit of 30398? 3 What is the tens digit of 3849? 4 What is the hundreds digit of 380? 3 What is the tens digit of 17573? 7 What is the tens digit of 138957? 5 What is the hundreds digit of 121490? 4 What is the hundreds digit of 982? 9 What is the ten thousands digit of 61077? 6 What is the tens digit of 2257? 5 What is the hundreds digit of 4543? 5 What is the ten thousands digit of 97814? 9 What is the tens digit of 49529? 2 What is the tens digit of 5113? 1 What is the units digit of 378? 8 What is the tens digit of 7518? 1 What is the tens digit of 2045? 4 What is the tens digit of 116102? 0 What is the hundreds digit of 218? 2 What is the thousands digit of 5965? 5 What is the ten thousands digit of 21115? 2 What is the ten thousands digit of 21023? 2 What is the units digit of 24843? 3 What is the hundreds digit of 4558? 5 What is the units digit of 1226? 6 What is the units digit of 1386? 6 What is the thousands digi
{ "pile_set_name": "DM Mathematics" }
Effect of exercise training on metallothionein levels of hypertensive rats. Because oxidative stress may be involved in arterial hypertension by affecting the balance between relaxing and contracting factors of vascular smooth muscle, the training-induced adaptation of antioxidant defenses could be implicated in the antihypertensive effect of chronic exercise. It has been suggested that metallothionein (MT), a metal-binding protein, plays an antioxidant role in mammals. The aim of this experiment was to study whether chronic exercise (swimming) influences both the development of arterial hypertension in spontaneously hypertensive rats (SHR) and the modification of MT levels. Male SHR and Wistar Kyoto (WKY) rats as control were trained to swim 1 h.d-1 5 d.wk-1 for 8 wk and sacrificed 72 h after the last exercise period. MT and total thiol levels were then measured. Exercise training 1) reduced systolic blood pressure and heart rate in both SHR WKY rats, and 2) was associated with a decrease in hepatic and cardiac MT levels; there was an increase in the aortic MT amounts in exercised SHR only. No modifications were noted in the gastrocnemius muscle or kidneys. In exercised animals, total thiols were lower in the liver but not in kidneys. Chronic exercise induced a reduction in arterial hypertension development in SHR rats and an adaptation of the MT levels in cardiac, hepatic, and aortic tissues. Further experiments are needed to pinpoint the role of the MT in these two cases in which oxidative stress occurs.
{ "pile_set_name": "PubMed Abstracts" }
Q: Compute running sum in a window function I have issues with this running sum in Redshift (uses Postgres 8): select extract(month from registration_time) as month , extract(week from registration_time)%4+1 as week , extract(day from registration_time) as day , count(*) as count_of_users_registered , sum(count(*)) over (ORDER BY (1,2,3)) from loyalty.v_user group by 1,2,3 order by 1,2,3 ; The error I get is: ERROR: 42601: Aggregate window functions with an ORDER BY clause require a frame clause A: You can run a window functions on the result of aggregate function on the same query level. It's just much simpler to use a subquery in this case: SELECT *, sum(count_registered_users) OVER (ORDER BY month, week, day) AS running_sum FROM ( SELECT extract(month FROM registration_time)::int AS month , extract(week FROM registration_time)::int%4+1 AS week , extract(day FROM registration_time)::int AS day , count(*) AS count_registered_users FROM loyalty.v_user GROUP BY 1, 2, 3 ORDER BY 1, 2, 3 ) sub; I also fixed the syntax for expression computing week. extract() returns double precision, but the modulo operator % does not accept double precision numbers. I cast all three to integer while being at it. Like @a_horse commented, you cannot use positional references in the ORDER BY clause of a window function (unlike in the ORDER BY clause of the query). However, you cannot use over (order by registration_time) either in this query, since you are grouping by month, week, day. registration_time is neither aggregated nor in the GROUP BY clause as would be required. At that stage of the query evaluation, you cannot access the column any more. You could repeat the expressions of the first three SELECT items in the ORDER BY clause to make it work: SELECT extract(month FROM registration_time)::int AS month , extract(week FROM registration_time)::int%4+1 AS week , extract(day FROM registration_time)::int AS day , count(*) AS count_registered_users , sum(count(*)) OVER (ORDER BY extract(month FROM registration_time)::int , extract(week FROM registration_time)::int%4+1 , extract(day FROM registration_time)::int) AS running_sum FROM loyalty.v_user GROUP BY 1, 2, 3 ORDER BY 1, 2, 3; But that seems rather noisy. (Performance would be good, though.) Aside: I do wonder about the purpose behind week%4+1 ... The whole query might be simpler. Related: Get the distinct sum of a joined table column PostgreSQL: running count of rows for a query 'by minute'
{ "pile_set_name": "StackExchange" }
/*++ Copyright (c) Microsoft Corporation. All rights reserved. Licensed under the MIT license. Module Name: Dmf_HidPortableDeviceButtons.c Abstract: Support for buttons (Power, Volume+ and Volume-) via Vhf. Environment: Kernel-mode Driver Framework User-mode Driver Framework --*/ // DMF and this Module's Library specific definitions. // #include "DmfModule.h" #include "DmfModules.Library.h" #include "DmfModules.Library.Trace.h" #if defined(DMF_INCLUDE_TMH) #include "Dmf_HidPortableDeviceButtons.tmh" #endif /////////////////////////////////////////////////////////////////////////////////////////////////////// // Module Private Enumerations and Structures /////////////////////////////////////////////////////////////////////////////////////////////////////// // // Display backlight brightness up and down codes defined by usb hid review request #41. // https://www.usb.org/sites/default/files/hutrr41_0.pdf // #define DISPLAY_BACKLIGHT_BRIGHTNESS_INCREMENT 0x6F #define DISPLAY_BACKLIGHT_BRIGHTNESS_DECREMENT 0x70 // The Input Report structure used for the child HID device // NOTE: The actual size of this structure must match exactly with the // corresponding descriptor below. // #include <pshpack1.h> typedef struct _BUTTONS_INPUT_REPORT { UCHAR ReportId; union { unsigned char Data; struct { unsigned char Windows : 1; unsigned char Power : 1; unsigned char VolumeUp : 1; unsigned char VolumeDown : 1; unsigned char RotationLock : 1; } Buttons; } u; } BUTTONS_INPUT_REPORT; // Used in conjunction with Consumer usage page to send hotkeys to the OS. // typedef struct { UCHAR ReportId; unsigned short HotKey; } BUTTONS_HOTKEY_INPUT_REPORT; #include <poppack.h> /////////////////////////////////////////////////////////////////////////////////////////////////////// // Module Private Context /////////////////////////////////////////////////////////////////////////////////////////////////////// // typedef struct _DMF_CONTEXT_HidPortableDeviceButtons { // Thread for processing requests for HID. // DMFMODULE DmfModuleVirtualHidDeviceVhf; // It is the current state of all the buttons. // HID_XFER_PACKET VhfHidReport; // Current state of button presses. Note that this variable // stores state of multiple buttons so that combinations of buttons // can be pressed at the same time. // BUTTONS_INPUT_REPORT InputReportButtonState; // Enabled/disabled state of buttons. Buttons can be enabled/disabled // by higher layers. This variable maintains the enabled/disabled // state of each button. // BUTTONS_INPUT_REPORT InputReportEnabledState; } DMF_CONTEXT_HidPortableDeviceButtons; // This macro declares the following function: // DMF_CONTEXT_GET() // DMF_MODULE_DECLARE_CONTEXT(HidPortableDeviceButtons) // This macro declares the following function: // DMF_CONFIG_GET() // DMF_MODULE_DECLARE_CONFIG(HidPortableDeviceButtons) // MemoryTag. // #define MemoryTag 'BDPH' /////////////////////////////////////////////////////////////////////////////////////////////////////// // DMF Module Support Code /////////////////////////////////////////////////////////////////////////////////////////////////////// // // Number of BranchTrack button presses for each button. // #define HidPortableDeviceButtons_ButtonPresses 10 // // This HID Report Descriptor describes a 1-byte input report for the 5 // buttons supported on Windows 10 for desktop editions (Home, Pro, and Enterprise). Following are the buttons and // their bit positions in the input report: // Bit 0 - Windows/Home Button (Unused) // Bit 1 - Power Button // Bit 2 - Volume Up Button // Bit 3 - Volume Down Button // Bit 4 - Rotation Lock Slider switch (Unused) // Bit 5 - Unused // Bit 6 - Unused // Bit 7 - Unused // // The Report Descriptor also defines a 1-byte Control Enable/Disable // feature report of the same size and bit positions as the Input Report. // For a Get Feature Report, each bit in the report conveys whether the // corresponding Control (i.e. button) is currently Enabled (1) or // Disabled (0). For a Set Feature Report, each bit in the report conveys // whether the corresponding Control (i.e. button) should be Enabled (1) // or Disabled (0). // // NOTE: This descriptor is derived from the version published in MSDN. The published // version was incorrect however. The modifications from that are to correct // the issues with the published version. // #define REPORTID_BUTTONS 0x01 #define REPORTID_HOTKEYS 0x02 // Report Size includes the Report Id and one byte for data. // #define REPORT_SIZE 2 static const UCHAR g_HidPortableDeviceButtons_HidReportDescriptor[] = { 0x15, 0x00, // LOGICAL_MINIMUM (0) 0x25, 0x01, // LOGICAL_MAXIMUM (1) 0x75, 0x01, // REPORT_SIZE (1) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0x0D, // USAGE (Portable Device Control) 0xA1, 0x01, // COLLECTION (Application) 0x85, REPORTID_BUTTONS, // REPORT_ID (REPORTID_BUTTONS) (For Input Report & Feature Report) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0x0D, // USAGE (Portable Device Control) 0xA1, 0x02, // COLLECTION (Logical) 0x05, 0x07, // USAGE_PAGE (Keyboard) 0x09, 0xE3, // USAGE (Keyboard LGUI) // Windows/Home Button 0x95, 0x01, // REPORT_COUNT (1) 0x81, 0x02, // INPUT (Data,Var,Abs) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0xCB, // USAGE (Control Enable) 0x95, 0x01, // REPORT_COUNT (1) 0xB1, 0x02, // FEATURE (Data,Var,Abs) 0xC0, // END_COLLECTION 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0x0D, // USAGE (Portable Device Control) 0xA1, 0x02, // COLLECTION (Logical) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0x81, // USAGE (System Power Down) // Power Button 0x95, 0x01, // REPORT_COUNT (1) 0x81, 0x02, // INPUT (Data,Var,Abs) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0xCB, // USAGE (Control Enable) 0x95, 0x01, // REPORT_COUNT (1) 0xB1, 0x02, // FEATURE (Data,Var,Abs) 0xC0, // END_COLLECTION 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0x0D, // USAGE (Portable Device Control) 0xA1, 0x02, // COLLECTION (Logical) 0x05, 0x0C, // USAGE_PAGE (Consumer Devices) 0x09, 0xE9, // USAGE (Volume Increment) // Volume Up Button 0x95, 0x01, // REPORT_COUNT (1) 0x81, 0x02, // INPUT (Data,Var,Abs) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0xCB, // USAGE (Control Enable) 0x95, 0x01, // REPORT_COUNT (1) 0xB1, 0x02, // FEATURE (Data,Var,Abs) 0xC0, // END_COLLECTION 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0x0D, // USAGE (Portable Device Control) 0xA1, 0x02, // COLLECTION (Logical) 0x05, 0x0C, // USAGE_PAGE (Consumer Devices) 0x09, 0xEA, // USAGE (Volume Decrement) // Volume Down Button 0x95, 0x01, // REPORT_COUNT (1) 0x81, 0x02, // INPUT (Data,Var,Abs) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0xCB, // USAGE (Control Enable) 0x95, 0x01, // REPORT_COUNT (1) 0xB1, 0x02, // FEATURE (Data,Var,Abs) 0xC0, // END_COLLECTION 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0x0D, // USAGE (Portable Device Control) 0xA1, 0x02, // COLLECTION (Logical) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0xCA, // USAGE (System Display Rotation Lock Slider Switch) // Rotation Lock Button 0x95, 0x01, // REPORT_COUNT (1) 0x81, 0x02, // INPUT (Data,Var,Abs) 0x95, 0x03, // REPORT_COUNT (3) // unused bits in 8-bit Input Report 0x81, 0x03, // INPUT (Cnst,Var,Abs) 0x05, 0x01, // USAGE_PAGE (Generic Desktop) 0x09, 0xCB, // USAGE (Control Enable) 0x95, 0x01, // REPORT_COUNT (1) 0xB1, 0x02, // FEATURE (Data,Var,Abs) 0x95, 0x03, // REPORT_COUNT (3) // unused bits in 8-bit Feature Report 0xB1, 0x03, // FEATURE (Cnst,Var,Abs) 0xC0, // END_COLLECTION 0xC0, // END_COLLECTION //*************************************************************** // // hotkeys (consumer) // // report consists of: // 1 byte report ID // 1 word Consumer Key // //*************************************************************** 0x05, 0x0C, // USAGE_PAGE (Consumer Devices) 0x09, 0x01, // HID_USAGE (Consumer Control) 0xA1, 0x01, // COLLECTION (Application) 0x85, REPORTID_HOTKEYS, // REPORT_ID (REPORTID_HOTKEYS) 0x75, 0x10, // REPORT_SIZE(16), 0x95, 0x01, // REPORT_COUNT (1) 0x15, 0x00, // LOGICAL_MIN (0) 0x26, 0xff, 0x03, // HID_LOGICAL_MAX (1023) 0x19, 0x00, // HID_USAGE_MIN (0) 0x2A, 0xff, 0x03, // HID_USAGE_MAX (1023) 0x81, 0x00, // HID_INPUT (Data,Arr,Abs) 0xC0 // END_COLLECTION }; // HID Device Descriptor with just one report representing the Portable Device Buttons. // static const HID_DESCRIPTOR g_HidPortableDeviceButtons_HidDescriptor = { 0x09, // Length of HID descriptor 0x21, // Descriptor type == HID 0x21 0x0100, // HID spec release 0x00, // Country code == English 0x01, // Number of HID class descriptors { 0x22, // Descriptor type // Total length of report descriptor. // (USHORT) sizeof(g_HidPortableDeviceButtons_HidReportDescriptor) } }; _Function_class_(EVT_VHF_ASYNC_OPERATION) VOID HidPortableDeviceButtons_GetFeature( _In_ VOID* VhfClientContext, _In_ VHFOPERATIONHANDLE VhfOperationHandle, _In_ VOID* VhfOperationContext, _In_ PHID_XFER_PACKET HidTransferPacket ) /*++ Routine Description: Handle's GET_FEATURE for buttons which allows Client to inquire about the enable/disable status of buttons. This function receives the request from upper layer and returns the enable/disable status of each button which has been stored in the Module Context. Upper layer uses this data to send back enable/disable requests for each of the buttons as a bit mask. Arguments: VhfClientContext - This Module's handle. VhfOperationHandle - Vhf context for this transaction. VhfOperationContext - Client context for this transaction. HidTransferPacket - Contains SET_FEATURE report data. Return Value: None --*/ { DMFMODULE dmfModule; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; NTSTATUS ntStatus; FuncEntry(DMF_TRACE); UNREFERENCED_PARAMETER(VhfOperationContext); ntStatus = STATUS_INVALID_DEVICE_REQUEST; dmfModule = DMFMODULEVOID_TO_MODULE(VhfClientContext); moduleContext = DMF_CONTEXT_GET(dmfModule); if (HidTransferPacket->reportBufferLen < REPORT_SIZE) { DMF_BRANCHTRACK_MODULE_NEVER(dmfModule, "HidPortableDeviceButtons_GetFeature.BadReportBufferSize"); goto Exit; } if (HidTransferPacket->reportId != REPORTID_BUTTONS) { DMF_BRANCHTRACK_MODULE_NEVER(dmfModule, "HidPortableDeviceButtons_GetFeature.BadReportId"); goto Exit; } ntStatus = STATUS_SUCCESS; BUTTONS_INPUT_REPORT* featureReport = (BUTTONS_INPUT_REPORT*)HidTransferPacket->reportBuffer; DMF_ModuleLock(dmfModule); DmfAssert(sizeof(moduleContext->InputReportEnabledState) <= HidTransferPacket->reportBufferLen); DmfAssert(HidTransferPacket->reportBufferLen >= REPORT_SIZE); *featureReport = moduleContext->InputReportEnabledState; DMF_ModuleUnlock(dmfModule); DMF_BRANCHTRACK_MODULE_AT_LEAST(dmfModule, "HidPortableDeviceButtons_GetFeature{Enter connected standby without audio playing}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); Exit: DMF_VirtualHidDeviceVhf_AsynchronousOperationComplete(moduleContext->DmfModuleVirtualHidDeviceVhf, VhfOperationHandle, ntStatus); FuncExitVoid(DMF_TRACE); } _Function_class_(EVT_VHF_ASYNC_OPERATION) VOID HidPortableDeviceButtons_SetFeature( _In_ VOID* VhfClientContext, _In_ VHFOPERATIONHANDLE VhfOperationHandle, _In_ VOID* VhfOperationContext, _In_ PHID_XFER_PACKET HidTransferPacket ) /*++ Routine Description: Handle's set feature for buttons which allows Client to enable/disable buttons. This function receives the request from client and stores the enable/disable status of each button in the Module Context. Later, if that button is pressed and the Module Context indicates that the button is disabled, that button press is never sent to the upper layer. Arguments: VhfClientContext - This Module's handle. VhfOperationHandle - Vhf context for this transaction. VhfOperationContext - Client context for this transaction. HidTransferPacket - Contains SET_FEATURE report data. Return Value: None --*/ { DMFMODULE dmfModule; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; NTSTATUS ntStatus; FuncEntry(DMF_TRACE); UNREFERENCED_PARAMETER(VhfOperationContext); ntStatus = STATUS_INVALID_DEVICE_REQUEST; dmfModule = DMFMODULEVOID_TO_MODULE(VhfClientContext); moduleContext = DMF_CONTEXT_GET(dmfModule); if (HidTransferPacket->reportBufferLen < REPORT_SIZE) { DMF_BRANCHTRACK_MODULE_NEVER(dmfModule, "HidPortableDeviceButtons_SetFeature.BadReportBufferSize"); goto Exit; } if (HidTransferPacket->reportId != REPORTID_BUTTONS) { DMF_BRANCHTRACK_MODULE_NEVER(dmfModule, "HidPortableDeviceButtons_SetFeature.BadReportId"); goto Exit; } BUTTONS_INPUT_REPORT* featureReport = (BUTTONS_INPUT_REPORT*)HidTransferPacket->reportBuffer; DMF_ModuleLock(dmfModule); if (! featureReport->u.Buttons.Power) { // Fail this request...Power button should never be disabled. // DmfAssert(FALSE); DMF_BRANCHTRACK_MODULE_NEVER(dmfModule, "HidPortableDeviceButtons_SetFeature.DisablePowerButton"); } else { moduleContext->InputReportEnabledState = *featureReport; ntStatus = STATUS_SUCCESS; DMF_BRANCHTRACK_MODULE_AT_LEAST(dmfModule, "HidPortableDeviceButtons_SetFeature{Enter connected standby without audio playing}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); } DMF_ModuleUnlock(dmfModule); Exit: DMF_VirtualHidDeviceVhf_AsynchronousOperationComplete(moduleContext->DmfModuleVirtualHidDeviceVhf, VhfOperationHandle, ntStatus); FuncExitVoid(DMF_TRACE); } _Function_class_(EVT_VHF_ASYNC_OPERATION) VOID HidPortableDeviceButtons_GetInputReport( _In_ VOID* VhfClientContext, _In_ VHFOPERATIONHANDLE VhfOperationHandle, _In_ VOID* VhfOperationContext, _In_ PHID_XFER_PACKET HidTransferPacket ) /*++ Routine Description: Handle's GET_INPUT_REPORT for buttons which allows Client to inquire about the current pressed/unpressed status of buttons. This function receives the request from upper layer and returns the pressed/unpressed status of each button which has been stored in the Module Context. Arguments: VhfClientContext - This Module's handle. VhfOperationHandle - Vhf context for this transaction. VhfOperationContext - Client context for this transaction. HidTransferPacket - Contains GET_INPUT_REPORT report data. Return Value: None --*/ { DMFMODULE dmfModule; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; NTSTATUS ntStatus; FuncEntry(DMF_TRACE); UNREFERENCED_PARAMETER(VhfOperationContext); ntStatus = STATUS_INVALID_DEVICE_REQUEST; dmfModule = DMFMODULEVOID_TO_MODULE(VhfClientContext); moduleContext = DMF_CONTEXT_GET(dmfModule); if (HidTransferPacket->reportBufferLen < REPORT_SIZE) { DMF_BRANCHTRACK_MODULE_NEVER(dmfModule, "HidPortableDeviceButtons_GetInputReport.BadReportBufferSize"); goto Exit; } if (HidTransferPacket->reportId != REPORTID_BUTTONS) { DMF_BRANCHTRACK_MODULE_NEVER(dmfModule, "HidPortableDeviceButtons_GetInputReport.BadReportId"); goto Exit; } ntStatus = STATUS_SUCCESS; BUTTONS_INPUT_REPORT* inputReport = (BUTTONS_INPUT_REPORT*)HidTransferPacket->reportBuffer; DMF_ModuleLock(dmfModule); DmfAssert(sizeof(moduleContext->InputReportEnabledState) <= HidTransferPacket->reportBufferLen); DmfAssert(HidTransferPacket->reportBufferLen >= REPORT_SIZE); *inputReport = moduleContext->InputReportButtonState; DMF_ModuleUnlock(dmfModule); Exit: DMF_VirtualHidDeviceVhf_AsynchronousOperationComplete(moduleContext->DmfModuleVirtualHidDeviceVhf, VhfOperationHandle, ntStatus); FuncExitVoid(DMF_TRACE); } /////////////////////////////////////////////////////////////////////////////////////////////////////// // WDF Module Callbacks /////////////////////////////////////////////////////////////////////////////////////////////////////// // _Function_class_(DMF_ModuleD0Entry) _IRQL_requires_max_(PASSIVE_LEVEL) _Must_inspect_result_ static NTSTATUS DMF_HidPortableDeviceButtons_ModuleD0Entry( _In_ DMFMODULE DmfModule, _In_ WDF_POWER_DEVICE_STATE PreviousState ) /*++ Routine Description: On the way up clear the state of the buttons in case they were held during hibernate. Arguments: DmfModule - The given DMF Module. PreviousState - The WDF Power State that the given DMF Module should exit from. Return Value: NTSTATUS of either the given DMF Module's Open Callback or STATUS_SUCCESS. --*/ { NTSTATUS ntStatus; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; UNREFERENCED_PARAMETER(PreviousState); FuncEntry(DMF_TRACE); moduleContext = DMF_CONTEXT_GET(DmfModule); // Clear the state of buttons in case they are held down during power transitions. // DMF_HidPortableDeviceButtons_ButtonStateChange(DmfModule, HidPortableDeviceButtons_ButtonId_Power, FALSE); DMF_HidPortableDeviceButtons_ButtonStateChange(DmfModule, HidPortableDeviceButtons_ButtonId_VolumePlus, FALSE); DMF_HidPortableDeviceButtons_ButtonStateChange(DmfModule, HidPortableDeviceButtons_ButtonId_VolumeMinus, FALSE); ntStatus = STATUS_SUCCESS; FuncExit(DMF_TRACE, "ntStatus=%!STATUS!", ntStatus); return ntStatus; } /////////////////////////////////////////////////////////////////////////////////////////////////////// // DMF Module Callbacks /////////////////////////////////////////////////////////////////////////////////////////////////////// // #pragma code_seg("PAGE") _Function_class_(DMF_Open) _IRQL_requires_max_(PASSIVE_LEVEL) _Must_inspect_result_ static NTSTATUS DMF_HidPortableDeviceButtons_Open( _In_ DMFMODULE DmfModule ) /*++ Routine Description: Initialize an instance of a DMF Module of type HidPortableDeviceButtons. Arguments: DmfModule - The given DMF Module. Return Value: NTSTATUS --*/ { NTSTATUS ntStatus; DMF_CONFIG_HidPortableDeviceButtons* moduleConfig; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; PAGED_CODE(); FuncEntry(DMF_TRACE); moduleContext = DMF_CONTEXT_GET(DmfModule); moduleConfig = DMF_CONFIG_GET(DmfModule); ntStatus = STATUS_SUCCESS; // Set these static values now because they don't change. // moduleContext->VhfHidReport.reportBuffer = (UCHAR*)&moduleContext->InputReportButtonState; moduleContext->VhfHidReport.reportBufferLen = REPORT_SIZE; // Only one type of report is used. Set it now. // moduleContext->InputReportButtonState.ReportId = REPORTID_BUTTONS; moduleContext->InputReportButtonState.u.Data = 0; moduleContext->VhfHidReport.reportId = moduleContext->InputReportButtonState.ReportId; // Enable buttons by default. // NOTE: Unused buttons are left disabled. // moduleContext->InputReportEnabledState.u.Data = 0; moduleContext->InputReportEnabledState.u.Buttons.Power = 1; moduleContext->InputReportEnabledState.u.Buttons.VolumeDown = 1; moduleContext->InputReportEnabledState.u.Buttons.VolumeUp = 1; FuncExit(DMF_TRACE, "ntStatus=%!STATUS!", ntStatus); return ntStatus; } #pragma code_seg() #pragma code_seg("PAGE") _Function_class_(DMF_Close) _IRQL_requires_max_(PASSIVE_LEVEL) static VOID DMF_HidPortableDeviceButtons_Close( _In_ DMFMODULE DmfModule ) /*++ Routine Description: Uninitialize an instance of a DMF Module of type HidPortableDeviceButtons. Arguments: DmfModule - The given DMF Module. Return Value: NTSTATUS --*/ { DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; DMF_CONFIG_HidPortableDeviceButtons* moduleConfig; PAGED_CODE(); FuncEntry(DMF_TRACE); moduleContext = DMF_CONTEXT_GET(DmfModule); moduleConfig = DMF_CONFIG_GET(DmfModule); FuncExitVoid(DMF_TRACE); } #pragma code_seg() #pragma code_seg("PAGE") _Function_class_(DMF_ChildModulesAdd) _IRQL_requires_max_(PASSIVE_LEVEL) VOID DMF_HidPortableDeviceButtons_ChildModulesAdd( _In_ DMFMODULE DmfModule, _In_ DMF_MODULE_ATTRIBUTES* DmfParentModuleAttributes, _In_ PDMFMODULE_INIT DmfModuleInit ) /*++ Routine Description: Configure and add the required Child Modules to the given Parent Module. Arguments: DmfModule - The given Parent Module. DmfParentModuleAttributes - Pointer to the parent DMF_MODULE_ATTRIBUTES structure. DmfModuleInit - Opaque structure to be passed to DMF_DmfModuleAdd. Return Value: None --*/ { DMF_MODULE_ATTRIBUTES moduleAttributes; DMF_CONFIG_HidPortableDeviceButtons* moduleConfig; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; DMF_CONFIG_VirtualHidDeviceVhf virtualHidDeviceMsModuleConfig; UNREFERENCED_PARAMETER(DmfParentModuleAttributes); PAGED_CODE(); FuncEntry(DMF_TRACE); moduleConfig = DMF_CONFIG_GET(DmfModule); moduleContext = DMF_CONTEXT_GET(DmfModule); // VirtualHidDeviceVhf // ------------------- // DMF_CONFIG_VirtualHidDeviceVhf_AND_ATTRIBUTES_INIT(&virtualHidDeviceMsModuleConfig, &moduleAttributes); virtualHidDeviceMsModuleConfig.VendorId = moduleConfig->VendorId; virtualHidDeviceMsModuleConfig.ProductId = moduleConfig->ProductId; virtualHidDeviceMsModuleConfig.VersionNumber = 0x0001; virtualHidDeviceMsModuleConfig.HidDescriptor = &g_HidPortableDeviceButtons_HidDescriptor; virtualHidDeviceMsModuleConfig.HidDescriptorLength = sizeof(g_HidPortableDeviceButtons_HidDescriptor); virtualHidDeviceMsModuleConfig.HidReportDescriptor = g_HidPortableDeviceButtons_HidReportDescriptor; virtualHidDeviceMsModuleConfig.HidReportDescriptorLength = sizeof(g_HidPortableDeviceButtons_HidReportDescriptor); // Set virtual device attributes. // virtualHidDeviceMsModuleConfig.HidDeviceAttributes.VendorID = moduleConfig->VendorId; virtualHidDeviceMsModuleConfig.HidDeviceAttributes.ProductID = moduleConfig->ProductId; virtualHidDeviceMsModuleConfig.HidDeviceAttributes.VersionNumber = moduleConfig->VersionNumber; virtualHidDeviceMsModuleConfig.HidDeviceAttributes.Size = sizeof(virtualHidDeviceMsModuleConfig.HidDeviceAttributes); virtualHidDeviceMsModuleConfig.StartOnOpen = TRUE; virtualHidDeviceMsModuleConfig.VhfClientContext = DmfModule; // Set callbacks from upper layer. // virtualHidDeviceMsModuleConfig.IoctlCallback_IOCTL_HID_GET_FEATURE = HidPortableDeviceButtons_GetFeature; virtualHidDeviceMsModuleConfig.IoctlCallback_IOCTL_HID_SET_FEATURE = HidPortableDeviceButtons_SetFeature; virtualHidDeviceMsModuleConfig.IoctlCallback_IOCTL_HID_GET_INPUT_REPORT = HidPortableDeviceButtons_GetInputReport; DMF_DmfModuleAdd(DmfModuleInit, &moduleAttributes, WDF_NO_OBJECT_ATTRIBUTES, &moduleContext->DmfModuleVirtualHidDeviceVhf); FuncExitVoid(DMF_TRACE); } #pragma code_seg() VOID DMF_HidPortableDeviceButtons_BranchTrackInitialize( _In_ DMFMODULE DmfModule ) /*++ Routine Description: Create the BranchTrack table. These entries are necessary to allow the consumer of this data to know what code paths did not execute that *should* have executed. Arguments: DmfModule - This Module's handle. Return Value: None --*/ { // It not used in RELEASE build. // UNREFERENCED_PARAMETER(DmfModule); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "HidPortableDeviceButtons_GetFeature.BadReportBufferSize"); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "HidPortableDeviceButtons_GetFeature.BadReportId"); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "HidPortableDeviceButtons_GetFeature{Enter connected standby without audio playing}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "HidPortableDeviceButtons_SetFeature.BadReportBufferSize"); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "HidPortableDeviceButtons_SetFeature.BadReportId"); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "HidPortableDeviceButtons_SetFeature.DisablePowerButton"); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "HidPortableDeviceButtons_SetFeature{Enter connected standby without audio playing}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "HidPortableDeviceButtons_GetInputReport.BadReportBufferSize"); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "HidPortableDeviceButtons_GetInputReport.BadReportId"); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_Power.True{Press or release power}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_Power.False"); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_VolumePlus.True{Play audio during connected standby}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_VolumePlus.False{Don't play audio during connected standby}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_VolumeMinus.False{Play audio during connected standby}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_VolumeMinus.False{Don't play audio during connected standby}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "ButtonIsEnabled.BadButton"); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power.Down{Power press}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power.Up{Power release}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_VolumePlus.Down{Vol+ press}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power.ScreenCapture{Press Power and Vol+}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_VolumePlus.Up{Vol+ release}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_VolumeMinus.Down{Vol- press}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power.SAS{Press Power and Vol-}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_VolumeMinus.Up{Vol- release}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power"); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "HotkeyStateChange.HidPortableDeviceButtons_Hotkey_BrightnessUp.Down{Backlight+ press}[SshKeypad]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "HotkeyStateChange.HidPortableDeviceButtons_Hotkey_BrightnessUp.Up{Backlight+ release}[SshKeypad]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "HotkeyStateChange.HidPortableDeviceButtons_Hotkey_BrightnessDown.Down{BacklightDown- press}[SshKeypad]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_AT_LEAST_CREATE(DmfModule, "HotkeyStateChange.HidPortableDeviceButtons_Hotkey_BrightnessDown.Up{BacklightDown- release}[SshKeypad]", HidPortableDeviceButtons_ButtonPresses); DMF_BRANCHTRACK_MODULE_NEVER_CREATE(DmfModule, "HotkeyStateChange.DMF_HidPortableDeviceButtons_HotkeyStateChange"); } /////////////////////////////////////////////////////////////////////////////////////////////////////// // Public Calls by Client /////////////////////////////////////////////////////////////////////////////////////////////////////// // #pragma code_seg("PAGE") _IRQL_requires_max_(PASSIVE_LEVEL) _Must_inspect_result_ NTSTATUS DMF_HidPortableDeviceButtons_Create( _In_ WDFDEVICE Device, _In_ DMF_MODULE_ATTRIBUTES* DmfModuleAttributes, _In_ WDF_OBJECT_ATTRIBUTES* ObjectAttributes, _Out_ DMFMODULE* DmfModule ) /*++ Routine Description: Create an instance of a DMF Module of type HidPortableDeviceButtons. Arguments: Device - Client driver's WDFDEVICE object. DmfModuleAttributes - Opaque structure that contains parameters DMF needs to initialize the Module. ObjectAttributes - WDF object attributes for DMFMODULE. DmfModule - Address of the location where the created DMFMODULE handle is returned. Return Value: NTSTATUS --*/ { NTSTATUS ntStatus; DMF_MODULE_DESCRIPTOR dmfModuleDescriptor_HidPortableDeviceButtons; DMF_CALLBACKS_DMF dmfCallbacksDmf_HidPortableDeviceButtons; DMF_CALLBACKS_WDF dmfCallbacksWdf_HidPortableDeviceButtons; PAGED_CODE(); FuncEntry(DMF_TRACE); DMF_CALLBACKS_DMF_INIT(&dmfCallbacksDmf_HidPortableDeviceButtons); dmfCallbacksDmf_HidPortableDeviceButtons.DeviceOpen = DMF_HidPortableDeviceButtons_Open; dmfCallbacksDmf_HidPortableDeviceButtons.DeviceClose = DMF_HidPortableDeviceButtons_Close; dmfCallbacksDmf_HidPortableDeviceButtons.ChildModulesAdd = DMF_HidPortableDeviceButtons_ChildModulesAdd; DMF_CALLBACKS_WDF_INIT(&dmfCallbacksWdf_HidPortableDeviceButtons); dmfCallbacksWdf_HidPortableDeviceButtons.ModuleD0Entry = DMF_HidPortableDeviceButtons_ModuleD0Entry; DMF_MODULE_DESCRIPTOR_INIT_CONTEXT_TYPE(dmfModuleDescriptor_HidPortableDeviceButtons, HidPortableDeviceButtons, DMF_CONTEXT_HidPortableDeviceButtons, DMF_MODULE_OPTIONS_PASSIVE, DMF_MODULE_OPEN_OPTION_OPEN_PrepareHardware); dmfModuleDescriptor_HidPortableDeviceButtons.CallbacksDmf = &dmfCallbacksDmf_HidPortableDeviceButtons; dmfModuleDescriptor_HidPortableDeviceButtons.CallbacksWdf = &dmfCallbacksWdf_HidPortableDeviceButtons; ntStatus = DMF_ModuleCreate(Device, DmfModuleAttributes, ObjectAttributes, &dmfModuleDescriptor_HidPortableDeviceButtons, DmfModule); if (! NT_SUCCESS(ntStatus)) { TraceEvents(TRACE_LEVEL_ERROR, DMF_TRACE, "DMF_ModuleCreate fails: ntStatus=%!STATUS!", ntStatus); } FuncExit(DMF_TRACE, "ntStatus=%!STATUS!", ntStatus); return(ntStatus); } #pragma code_seg() // Module Methods // _IRQL_requires_max_(PASSIVE_LEVEL) BOOLEAN DMF_HidPortableDeviceButtons_ButtonIsEnabled( _In_ DMFMODULE DmfModule, _In_ HidPortableDeviceButtons_ButtonIdType ButtonId ) /*++ Routine Description: Determines if a given button is enabled or disabled. Arguments: DmfModule - This Module's handle. ButtonId - The given button. Return Value: TRUE if given button is enabled. FALSE if given button is disabled. --*/ { BOOLEAN returnValue; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; FuncEntry(DMF_TRACE); DMFMODULE_VALIDATE_IN_METHOD(DmfModule, HidPortableDeviceButtons); moduleContext = DMF_CONTEXT_GET(DmfModule); returnValue = FALSE; DMF_ModuleLock(DmfModule); // If statements are used below for clarity and ease of debugging. Also, it prevents // need to cast and allows for possible different states later. // switch (ButtonId) { case HidPortableDeviceButtons_ButtonId_Power: { if (moduleContext->InputReportEnabledState.u.Buttons.Power) { returnValue = TRUE; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_Power.True{Press or release power}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); } else { DMF_BRANCHTRACK_MODULE_NEVER(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_Power.False"); } break; } case HidPortableDeviceButtons_ButtonId_VolumePlus: { if (moduleContext->InputReportEnabledState.u.Buttons.VolumeUp) { returnValue = TRUE; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_VolumePlus.True{Play audio during connected standby}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); } else { DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_VolumePlus.False{Don't play audio during connected standby}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); } break; } case HidPortableDeviceButtons_ButtonId_VolumeMinus: { if (moduleContext->InputReportEnabledState.u.Buttons.VolumeDown) { returnValue = TRUE; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_VolumeMinus.False{Play audio during connected standby}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); } else { DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonIsEnabled.HidPortableDeviceButtons_ButtonId_VolumeMinus.False{Don't play audio during connected standby}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); } break; } default: { DmfAssert(FALSE); DMF_BRANCHTRACK_MODULE_NEVER(DmfModule, "ButtonIsEnabled.BadButton"); break; } } DMF_ModuleUnlock(DmfModule); FuncExit(DMF_TRACE, "returnValue=%d", returnValue); return returnValue; } _IRQL_requires_max_(PASSIVE_LEVEL) NTSTATUS DMF_HidPortableDeviceButtons_ButtonStateChange( _In_ DMFMODULE DmfModule, _In_ HidPortableDeviceButtons_ButtonIdType ButtonId, _In_ ULONG ButtonStateDown ) /*++ Routine Description: Updates the state of a given button. Arguments: DmfModule - This Module's handle. ButtonId - The given button. ButtonStateDown - Indicates if the button is pressed DOWN. Return Value: STATUS_SUCCESS means the updated state was successfully sent to HID stack. Other NTSTATUS if there is an error. --*/ { NTSTATUS ntStatus; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; FuncEntry(DMF_TRACE); DMFMODULE_VALIDATE_IN_METHOD(DmfModule, HidPortableDeviceButtons); moduleContext = DMF_CONTEXT_GET(DmfModule); // Lock the Module context because the Client Driver may call from different threads // (e.g. button press thread is different than rotation lock thread). // DMF_ModuleLock(DmfModule); DmfAssert(moduleContext->InputReportButtonState.ReportId == REPORTID_BUTTONS); DmfAssert(moduleContext->VhfHidReport.reportId == moduleContext->InputReportButtonState.ReportId); // If statements are used below for clarity and ease of debugging. Also, it prevents // need to cast and allows for possible different states later. // switch (ButtonId) { case HidPortableDeviceButtons_ButtonId_Power: { if (ButtonStateDown) { moduleContext->InputReportButtonState.u.Buttons.Power = 1; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power.Down{Power press}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); } else { moduleContext->InputReportButtonState.u.Buttons.Power = 0; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power.Up{Power release}[HidPortableDeviceButtons]", HidPortableDeviceButtons_ButtonPresses); } break; } case HidPortableDeviceButtons_ButtonId_VolumePlus: { if (ButtonStateDown) { moduleContext->InputReportButtonState.u.Buttons.VolumeUp = 1; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_VolumePlus.Down{Vol+ press}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); if (moduleContext->InputReportButtonState.u.Buttons.Power) { // Verify Screen Capture runs. // DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power.ScreenCapture{Press Power and Vol+}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); } } else { moduleContext->InputReportButtonState.u.Buttons.VolumeUp = 0; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_VolumePlus.Up{Vol+ release}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); } break; } case HidPortableDeviceButtons_ButtonId_VolumeMinus: { if (ButtonStateDown) { moduleContext->InputReportButtonState.u.Buttons.VolumeDown = 1; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_VolumeMinus.Down{Vol- press}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); if (moduleContext->InputReportButtonState.u.Buttons.Power) { // Verify SAS runs. // DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power.SAS{Press Power and Vol-}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); } } else { moduleContext->InputReportButtonState.u.Buttons.VolumeDown = 0; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_VolumeMinus.Up{Vol- release}[HidPortableDeviceButtons,Volume]", HidPortableDeviceButtons_ButtonPresses); } break; } default: { DmfAssert(FALSE); ntStatus = STATUS_NOT_SUPPORTED; DMF_BRANCHTRACK_MODULE_NEVER(DmfModule, "ButtonStateChange.HidPortableDeviceButtons_ButtonId_Power"); DMF_ModuleUnlock(DmfModule); goto Exit; } } // Don't send requests with lock held. Copy the data to send to local variable, // unlock and send. // BUTTONS_INPUT_REPORT inputReportButtonState; HID_XFER_PACKET hidXferPacket; inputReportButtonState = moduleContext->InputReportButtonState; hidXferPacket.reportBuffer = (UCHAR*)&inputReportButtonState; hidXferPacket.reportBufferLen = moduleContext->VhfHidReport.reportBufferLen; hidXferPacket.reportId = moduleContext->VhfHidReport.reportId; TraceEvents(TRACE_LEVEL_ERROR, DMF_TRACE, "Buttons state=0x%02x", moduleContext->InputReportButtonState.u.Data); DMF_ModuleUnlock(DmfModule); // This function actually populates the upper layer's input report with expected button data. // ntStatus = DMF_VirtualHidDeviceVhf_ReadReportSend(moduleContext->DmfModuleVirtualHidDeviceVhf, &hidXferPacket); Exit: FuncExit(DMF_TRACE, "ntStatus=%!STATUS!", ntStatus); return ntStatus; } _IRQL_requires_max_(PASSIVE_LEVEL) NTSTATUS DMF_HidPortableDeviceButtons_HotkeyStateChange( _In_ DMFMODULE DmfModule, _In_ HidPortableDeviceButtons_ButtonIdType Hotkey, _In_ ULONG HotkeyStateDown ) /*++ Routine Description: Updates the state of a given hotkey. Arguments: DmfModule - This Module's handle. ButtonId - The given hotkey. ButtonStateDown - Indicates if the hotkey is pressed DOWN. Return Value: STATUS_SUCCESS means the updated state was successfully sent to HID stack. Other NTSTATUS if there is an error. --*/ { NTSTATUS ntStatus; DMF_CONTEXT_HidPortableDeviceButtons* moduleContext; BUTTONS_HOTKEY_INPUT_REPORT hotkeyInputReport; HID_XFER_PACKET hidXferPacket; FuncEntry(DMF_TRACE); DMFMODULE_VALIDATE_IN_METHOD(DmfModule, HidPortableDeviceButtons); moduleContext = DMF_CONTEXT_GET(DmfModule); hotkeyInputReport.ReportId = REPORTID_HOTKEYS; hotkeyInputReport.HotKey = 0; // If statements are used below for clarity and ease of debugging. Also, it prevents // need to cast and allows for possible different states later. // switch (Hotkey) { case HidPortableDeviceButtons_Hotkey_BrightnessUp: if (HotkeyStateDown) { hotkeyInputReport.HotKey = DISPLAY_BACKLIGHT_BRIGHTNESS_INCREMENT; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "HotkeyStateChange.HidPortableDeviceButtons_Hotkey_BrightnessUp.Down{Backlight+ press}[SshKeypad]", HidPortableDeviceButtons_ButtonPresses); } else { DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "HotkeyStateChange.HidPortableDeviceButtons_Hotkey_BrightnessUp.Up{Backlight+ release}[SshKeypad]", HidPortableDeviceButtons_ButtonPresses); } break; case HidPortableDeviceButtons_Hotkey_BrightnessDown: if (HotkeyStateDown) { hotkeyInputReport.HotKey = DISPLAY_BACKLIGHT_BRIGHTNESS_DECREMENT; DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "HotkeyStateChange.HidPortableDeviceButtons_Hotkey_BrightnessDown.Down{BacklightDown- press}[SshKeypad]", HidPortableDeviceButtons_ButtonPresses); } else { DMF_BRANCHTRACK_MODULE_AT_LEAST(DmfModule, "HotkeyStateChange.HidPortableDeviceButtons_Hotkey_BrightnessDown.Up{BacklightDown- release}[SshKeypad]", HidPortableDeviceButtons_ButtonPresses); } break; default: DmfAssert(FALSE); ntStatus = STATUS_NOT_SUPPORTED; DMF_BRANCHTRACK_MODULE_NEVER(DmfModule, "HotkeyStateChange.DMF_HidPortableDeviceButtons_HotkeyStateChange"); DMF_ModuleUnlock(DmfModule); goto Exit; } hidXferPacket.reportBuffer = (UCHAR*)&hotkeyInputReport; hidXferPacket.reportBufferLen = sizeof(BUTTONS_HOTKEY_INPUT_REPORT); hidXferPacket.reportId = REPORTID_HOTKEYS; TraceEvents(TRACE_LEVEL_ERROR, DMF_TRACE, "Hotkey input report hotkey=0x%02x", hotkeyInputReport.HotKey); // This function actually populates the upper layer's input report with expected button data. // ntStatus = DMF_VirtualHidDeviceVhf_ReadReportSend(moduleContext->DmfModuleVirtualHidDeviceVhf, &hidXferPacket); Exit: FuncExit(DMF_TRACE, "ntStatus=%!STATUS!", ntStatus); return ntStatus; } // eof: Dmf_HidPortableDeviceButtons.c //
{ "pile_set_name": "Github" }
Concerto in G major __NOTOC__ Many composers have written concerti in the key of G major. These include: Harpsichord and piano concertos Harpsichord Concerto BWV 1058 (J. S. Bach) Piano Concerto No. 4 (Mozart) Piano Concerto No. 17 (Mozart) Piano Concerto No. 4 (Beethoven) Piano Concerto No. 2 (Tchaikovsky) Piano Concerto (Ravel) Piano Concerto No. 2 (Bartók) Piano Concerto No. 5 (Prokofiev) Viola and violin concertos Viola Concerto (Telemann) Violin Concerto No. 4 (Haydn) Violin Concerto No. 3 (Mozart) Flute concertos Flute Concerto No. 1 (Mozart) See also List of compositions for cello and orchestra List of compositions for keyboard and orchestra List of compositions for violin and orchestra
{ "pile_set_name": "Wikipedia (en)" }
833 F.2d 1014 Unpublished DispositionNOTICE: Federal Circuit Local Rule 47.8(b) states that opinions and orders which are designated as not citable as precedent shall not be employed or cited as precedent. This does not preclude assertion of issues of claim preclusion, issue preclusion, judicial estoppel, law of the case or the like based on a decision of the Court rendered in a nonprecedential opinion or order.UNITED STATES of America, Plaintiff-Appellee,v.Jon Thomas CUMMINS, Defendant-Appellant. No. 87-2065. United States Court of Appeals, Sixth Circuit. Nov. 26, 1987. Before KEITH, MILBURN and DAVID A. NELSON, Circuit Judges. ORDER 1 Defendant Cummins appealed from the district court's order of October 20, 1987, which ordered him detained pending trial. The government responded in opposition. 2 Cummins is scheduled to go on trial November 30, 1987 on charges of receipt and possession of unregistered firearms, being a felon in receipt and possession of firearms and using threats and intimidation to influence another in connection with an official proceeding. The United States magistrate conducted a hearing pursuant to 18 U.S.C. Sec. 3142(f) and ordered Cummins detained pending trial. The district court, by order of October 20, 1987, affirmed, finding that Cummins presented a threat to the safety of other persons and to the community and a risk of flight if released. Cummins timely appealed. 3 Cummins contends that he should have been released pending trial upon the conditions that he refrain from the use of alcohol and narcotic drugs, avoid contact with witnesses and be monitored by the appropriate agencies to guarantee his compliance. To detain him upon a determination of dangerousness, he contends, is an unconstitutional punishment before trial. He also maintains that he is not a risk of flight. 4 We will not disturb the factual findings of the district court and magistrate in pretrial hearings unless we determine those findings to be clearly erroneous. See United States v. Hazime, 762 F.2d 34, 37 (6th Cir.1985). Based upon the evidence presented in the hearing specifically authorized by section 3142(f), it does not appear to us that it was clearly erroneous for the district court and magistrate to determine that the facts are such as to warrant detention of Cummins pending trial. Pretrial detention under the Bail Reform Act of 1984 is regulatory in nature, moreover, and does not constitute punishment before trial in violation of the Due Process Clause of the Fifth Amendment. United States v. Salerno, --- U.S. ----, 107 S.Ct. 2095 (1987). Accordingly, 5 It is ORDERED that the October 20, 1987 order of the district court is affirmed.
{ "pile_set_name": "FreeLaw" }
Q: Unbelievable strange file creation time problem I have a very strange problem indeed! I wonder if the problem is in the framework, OS or maybe it's just me, misunderstanding things... I have a file, which might be created a long time ago, I use the file, and then I want to archive it, by changing it's name. Then I want to create a new file, with the same name as the old file had, before it was renamed. Easy enough! The problem that really puzzles me, is that the newly created file gets wrong "created"-timestamp! That's a problem since it's that timestamp that I want to use for determing when to archive and create a new file. I've created a very small sample that shows the problem. For the sample to work, there must be a file 1.txt in the Files folder. Also, the file attribute must also be set back in time (with one of the tools available, I use Nomad.NET). static void Main(string[] args) { // Create a directory, if doesnt exist. string path = Path.GetDirectoryName(Application.ExecutablePath) + "\\Files"; Directory.CreateDirectory(path); // Create/attach to the 1.txt file string filename = path + "\\1.txt"; StreamWriter sw = File.AppendText(filename); sw.WriteLine("testing"); sw.Flush(); sw.Close(); // Rename it... File.Move(filename, path + "\\2.txt"); // Create a new 1.txt sw = File.AppendText(filename); FileInfo fi = new FileInfo(filename); // Observe, the old files creation date!! Console.WriteLine(String.Format("Date: {0}", fi.CreationTime.Date)); Console.ReadKey(); } A: This is the result of an arcane "feature" going way back to the old days of Windows. The core details are here: Windows NT Contains File System Tunneling Capabilities (Archive) Basically, this is on purpose. But it's configurable, and an anachronism in most of today's software. I think you can create a new filename first, then rename old->old.1, then new->old, and it'll "work". I don't remember honestly what we did when we ran into this last a few years back. A: I recently ran into the same problem described in the question. In our case, if our log file is older than a week, we delete it and start a new one. However, it's been keeping the same date created since 2008. One answer here describes renaming the old file and then creating a new one, hopefully picking up the proper Creation Date. However, that was unsuccessful for us, it kept the old date still. What we used was the File.SetCreationTime method, and as its name suggests, it easily let us control the creation date of the file, allowing us to set it to DateTime.Now. The rest of our logic worked correctly afterwards.
{ "pile_set_name": "StackExchange" }
Here Andrew is back talking to Matt Cassidy about his 3rd place finish at the Last Legion Tournament in the North East. He takes us through his games before heading to the main topic for this episode which is Bragging Rights 2013 - a ETC style 4 person to
{ "pile_set_name": "Pile-CC" }
The Crusades Through Arab Eyes The Crusades Through Arab Eyes () is a French language historical essay by Lebanese author Amin Maalouf. As the name suggests, the book is a narrative retelling of primary sources drawn from various Arab chronicles that seeks to provide an Arab perspective on the Crusades, and especially regarding the Crusaders – the Franks (Franj), as the Arabs called them – who are considered cruel, savage, ignorant and culturally backward. From the first invasion in the eleventh century through till the general collapse of the Crusades in the thirteenth century, the book constructs a narrative that is the reverse of that common in the Western world, describing the main facts as bellicose and displaying situations of a quaint historic setting where Western Christians are viewed as "barbarians", unaware of the most elementary rules of honor, dignity and social ethics. References Category:Books about the Crusades Category:1984 non-fiction books Category:Works by Amin Maalouf Category:Arab history Category:French non-fiction books
{ "pile_set_name": "Wikipedia (en)" }
No penetration of orally administered N-acetylcysteine into bronchoalveolar lavage fluid. Six healthy volunteers underwent bronchoalveolar lavage (BAL) before and after receiving N-acetylcysteine (NAC) 600 mg daily for 2 weeks. Free and total NAC, cysteine and glutathione were determined in the lavage fluid, lavage cells and plasma. No NAC was demonstrated, free or bound in disulfides, in either of the lavage components; furthermore, the cysteine and glutathione content of these components and their respective redox states were unaltered during therapy. Plasma free and total cysteine content was unaltered by administration of the drug, but both free and total plasma glutathione increased significantly. Free NAC could not be detected in plasma following dosing. However, a mean of 0.3 nmol/100 microliters plasma was released from disulfides in plasma following reduction with dithiothreitol. N-acetylcysteine has been proposed to act as a mucolytic by cleavage of disulfide bonds. Our findings do not support this direct mode of action and alternative mechanisms of action must be sought.
{ "pile_set_name": "PubMed Abstracts" }
Ester Dean, center, has written smash hooks for Rihanna and Nicki Minaj. Illustration by Michael Gillette On a mild Monday afternoon in mid-January, Ester Dean, a songwriter and vocalist, arrived at Roc the Mic Studios, on West Twenty-seventh Street in Manhattan, for the first of five days of songwriting sessions. Her engineer, Aubry Delaine, whom she calls Big Juice, accompanied her. Dean picked up an iced coffee at a Starbucks on Seventh Avenue, took the elevator up to Roc the Mic, and passed through a lounge that had a pool table covered in taupe-colored felt. Two sets of soundproofed doors led to the control room, a windowless cockpit that might have been the flight deck of a spaceship. Tor Hermansen and Mikkel Eriksen, the team of Norwegian writer-producers professionally known as Stargate, were waiting there for Dean. Both are tall and skinny ectomorphs with pale shaved heads who would not look out of place in a “Matrix” movie. Dean, who is black, is neither skinny nor tall; she reached up to give them big hugs, which is how she greets almost everyone. They chatted for a while. Dean has a comical, Betty Boop-ish speaking voice, which will be featured in the upcoming animated film “Ice Age: Continental Drift.” (Sid, the giant ground sloth voiced by John Leguizamo, is finally getting a girlfriend, Dean’s Sloth Siren.) After ten minutes or so, she pronounced herself “ready to work.” Most of the songs played on Top Forty radio are collaborations between producers like Stargate and “top line” writers like Ester Dean. The producers compose the chord progressions, program the beats, and arrange the “synths,” or computer-made instrumental sounds; the top-liners come up with primary melodies, lyrics, and the all-important hooks, the ear-friendly musical phrases that lock you into the song. “It’s not enough to have one hook anymore,” Jay Brown, the president of Roc Nation, and Dean’s manager, told me recently. “You’ve got to have a hook in the intro, a hook in the pre-chorus, a hook in the chorus, and a hook in the bridge.” The reason, he explained, is that “people on average give a song seven seconds on the radio before they change the channel, and you got to hook them.” The top-liner is usually a singer, too, and often provides the vocal for the demo, a working draft of the song. If the song is for a particular artist, the top-liner may sing the demo in that artist’s style. Sometimes producers send out tracks to more than one top-line writer, which can cause problems. In 2009, both Beyoncé and Kelly Clarkson had hits (Beyoncé’s “Halo,” which charted in April, and Clarkson’s “Already Gone,” which charted in August) that were created from the same track, by Ryan Tedder. Clarkson wrote her own top line, while Beyoncé shared a credit with Evan Bogart. Tedder had neglected to tell the artists that he was double-dipping, and when Clarkson heard “Halo” and realized what had happened she tried to stop “Already Gone” from being released as a single, because she feared the public would think she had copied Beyoncé’s hit. But nobody cared, or perhaps even noticed; “Already Gone” became just as big a hit. A relatively small number of producers and top-liners create a disproportionately large share of contemporary hits, which may explain why so many of them sound similar. The producers are almost always male: Max Martin, Dr. Luke, David Guetta, Tricky Stewart, the Matrix, Timbaland, the Neptunes, Stargate. The top-liners are often, although not always, women: Makeba Riddick, Bonnie McKee, and Skylar Grey are among Dean’s peers. The producer runs the session and serves as creative director of the song, but the top-liner supplies the crucial spark that will determine whether the song is a smash. (When I asked Tricky Stewart to define “smash,” he said, “A hit is just a hit; a smash is a life changer.”) As Eric Beall, an A. & R. executive with Shapiro, Bernstein & Co., a music publisher, puts it, “The top-line writer is the one who has to face a blank page.” Stargate works with about twenty top-liners a year, and creates some eighty demos. These are sent out to A. & R. departments at record labels, to artists’ managers, and, finally, to the artists, for approval. Around twenty-five of Stargate’s songs end up on records each year. Dean has a genius for infectious hooks. Somehow she is able to absorb the beat and the sound of a track, and to come out with its melodic essence. The words are more like vocalized beats than like lyrics, and they don’t communicate meaning so much as feeling and attitude—they nudge you closer to the ecstasy promised by the beat and the “rise,” or the “lift,” when the track builds to a climax. Among Dean’s best hooks are her three Rihanna smashes—“Rude Boy” (“Come on, rude boy, boy, can you get it up / Come on, rude boy, boy, is you big enough?”), “S&M” (“Na-na-na-na COME ON”), and “What’s My Name” (“Oh, na-na, what’s my name?”), all with backing tracks by Stargate—and her work on two Nicki Minaj smashes, “Super Bass” (“Boom, badoom, boom / boom, badoom, boom / bass / yeah, that’s that super bass”) and David Guetta’s “Turn Me On” (“Make me come alive, come on and turn me on”). “Talk That Talk,” a Dean-Stargate song that’s the title track of Rihanna’s most recent album, is built around one chord progression—F-sharp minor, E minor, B minor, D. The music combines genres that, twenty years ago, were distinct: the hard beats of hip-hop and the big melody “money notes” sung by nineties stars such as Whitney Houston, Mariah Carey, and Celine Dion. The first hook comes right away, in an abbreviated chorus that precedes a Jay-Z rap. Then comes the main hook: “One and two and three and four / come and let me know if you want some more,” a salacious-sounding bit of rhythm singing, backed by dirty-sounding synths, which opens the chorus. Then there’s a verse, which delivers the third hook: “Say what you want, say what you like / Say what you want me to do and I got you.” The chorus rolls around again, this time with the lift, followed by the bridge, which delivers yet another hook: “What you say now, give it to me baby / I want it all night, give it to me baby,” sung over a nasty-sounding snare drum (which, like all the instrumental sounds, is machine-made). The bridge also conveys the “breakdown,” when the song’s momentum pauses momentarily. Then comes the chorus for a final time. The song is neither clever nor subtle—we are a long way from Cole Porter here—but it is deeply seductive all the same. Dean’s preferred method of working is to delay listening to a producer’s track until she is in the studio, in front of the mike. “I go into the booth and I scream and I sing and I yell, and sometimes it’s words but most time it’s not,” she told me. “And I just see when I get this little chill, here”—she touched her upper arm, just below the shoulder—“and then I’m, like, ‘Yeah, that’s the hook.’ ” If she doesn’t feel that chill after five minutes, she moves on to the next track, and tries again.
{ "pile_set_name": "OpenWebText2" }
A Drop-In Barrel That Delivers Custom Pistol Performance Brownells Edition barrels for Glock® are built to rigorous specifications set by noted self-defense instructor Matt Jacques. Proprietor of Victory First, a company providing real-world training to law enforcement personnel, a U.S. Marine, and a retired law enforcement officer himself, Matt knows a thing or two about what makes a reliable, consistent-shooting, accurate pistol barrel. At the same time, Brownells Edition barrels are designed to right drop into factory Glock slides. Brownells Edition / Victory First Barrels are machined from high-grade 416R stainless steel by skilled American craftsmen and are thoroughly tested to ensure impressive accuracy and reassuring reliability in your Glock® pistol. For maximum compatibility with the Glock® you already have in your gun safe, our barrels are compatible with Gen1 through Gen4 Glocks. Drop-in fit to most Glock® slides 1-10" right-hand twist Durable, non-reflective Black Nitride finish Models available for G17, G19 and G43 Does not come with thread protector All Brownells Edition / Victory First Barrels for Glock® come with an 11° recessed crown to protect the critical rifling near the muzzle. You can also choose 1/2" x 28 tpi muzzle threads for easy mounting of a compensator or sound suppressor. Big Book Catalog, Issue:72, Page:220
{ "pile_set_name": "OpenWebText2" }
ms in 10533*g**2 + 6581*g**2 - 28318*g**2. -11204*g**2 Collect the terms in -315*q - 51130*q + 6547*q - 11520*q. -56418*q Collect the terms in 3141*j**2 + 15*j - 2617 + 2617 - 3*j - 15*j. 3141*j**2 - 3*j Collect the terms in -641*s**3 - 202*s**3 - 331*s**3 + 1980*s**3. 806*s**3 Collect the terms in -89*o**2 + 110*o**2 + 8*o - 230*o**2 - 8*o. -209*o**2 Collect the terms in -99930*y**2 + 19991*y**2 + 19991*y**2 + 19995*y**2 - 9*y**3 + 19959*y**2 + 19994*y**2. -9*y**3 Collect the terms in -4*t**2 + 17*t**3 + 1922*t + 2*t**2 - 30*t**3 + 11*t**3. -2*t**3 - 2*t**2 + 1922*t Collect the terms in -4 - 5 + 3 + 271*y + 139*y. 410*y - 6 Collect the terms in 5*k**2 + 875*k + 233*k + 35*k**2 - 36*k**2 - 1108*k. 4*k**2 Collect the terms in -13*s - 197*s**2 + 79*s**2 + 13*s - 165*s**2. -283*s**2 Collect the terms in -6656 + 83*a - 291*a + 205*a + 2*a**3. 2*a**3 - 3*a - 6656 Collect the terms in -20382*z - 20482*z + 40886*z. 22*z Collect the terms in 2101*d - 1116 + 3350 - 1111 - 1123. 2101*d Collect the terms in 49 + 55 + 143*h + 60 + 50 - 214. 143*h Collect the terms in -771*q - 1021*q - 1013*q + 2805*q - 84*q**2. -84*q**2 Collect the terms in -348*y**2 + 1391*y**2 - 352*y**2 - 353*y**2 - 347*y**2. -9*y**2 Collect the terms in -6878*t - 8793*t**2 + 6878*t - 1. -8793*t**2 - 1 Collect the terms in -1083839*j**2 - 992223*j**2 - 2060069*j**2 - 505865*j**2. -4641996*j**2 Collect the terms in 13545*w**2 - 2711*w**2 - 2705*w**2 - 2705*w**2 - 2706*w**2 - 2717*w**2. w**2 Collect the terms in 188*a**2 + 1306*a**2 + 2541*a**2 + 7461*a**2. 11496*a**2 Collect the terms in 1100*v**3 - 353*v**3 - 360*v**3 - 359*v**3. 28*v**3 Collect the terms in 3*b**2 + 513 + 0*b**2 - 211 - 5*b**2 - 152 - 150. -2*b**2 Collect the terms in -402492*h**2 + 911*h**3 + 2494*h**3 + 402492*h**2. 3405*h**3 Collect the terms in 188*t**2 + 185*t**2 + 409*t**3 + 182*t**2 - 555*t**2. 409*t**3 Collect the terms in 511 + 5880124*h - 511 - 5880123*h. h Collect the terms in 6287*z - 9472*z - 4845*z - 3093*z - 16838*z. -27961*z Collect the terms in -4077*s**2 + 5527*s**2 + 7309*s**2 + 10688*s**2. 19447*s**2 Collect the terms in 3490014*b**3 - 1745062*b**3 - 1745027*b**3. -75*b**3 Collect the terms in -123*s**2 + 10*s**2 + 19*s**2 + 16*s**2 - 2 + 5*s**2 + 28*s**2. -45*s**2 - 2 Collect the terms in 2*f**2 - 4 + f - 168*f**2 + 166*f**2 - 616*f**3. -616*f**3 + f - 4 Collect the terms in 3*w - 459364*w**2 - 38480*w**2 - 3*w. -497844*w**2 Collect the terms in -338*i - 341*i - 347*i + 1348*i - 322*i + 4*i**2. 4*i**2 Collect the terms in -h**2 - 446 - 2414 + 594 - 1063. -h**2 - 3329 Collect the terms in 457*b - 1 + 147 + 50. 457*b + 196 Collect the terms in 2048849*q**2 - 1026623*q**2 - 1022222*q**2. 4*q**2 Collect the terms in -1 + 4 - 1072*x**2 - 1 + 7155*x**2. 6083*x**2 + 2 Collect the terms in 4525*b - 13557*b + 2 + 4524*b + 4520*b. 12*b + 2 Collect the terms in 2 + 6230347*j**3 - 2 - 6229651*j**3 - 4*j. 696*j**3 - 4*j Collect the terms in 250 - 123 - 62230*q - 127. -62230*q Collect the terms in -1891 + 2768 - 863 + x. x + 14 Collect the terms in 20*c**2 + 6103*c + 7*c**2 - 6103*c + 34757 - 34757. 27*c**2 Collect the terms in -3 - 11 - 5860*m + 1849*m + 14. -4011*m Collect the terms in -758 + 2631 - 1119 - 369*d**3 - 754. -369*d**3 Collect the terms in -2153*z**2 + 5909*z**2 - z**3 - 3716*z**2. -z**3 + 40*z**2 Collect the terms in -4*b**3 - 547451578*b**2 + 547450733*b**2 + 5*b**3. b**3 - 845*b**2 Collect the terms in -i**2 + 2*i**2 + 17 + 7203*i - 2408*i - 2430*i - 2365*i. i**2 + 17 Collect the terms in -7*z**2 + 0*z**2 + 3*z**2 + 889 - 449 - 440. -4*z**2 Collect the terms in -2*u + 803527065463 - 803527065463. -2*u Collect the terms in 758259*m**3 + 758443*m**3 + 758459*m**3 - 2275146*m**3. 15*m**3 Collect the terms in 22*b**3 - 25 + 12 + 32*b**3 + 5 + 7. 54*b**3 - 1 Collect the terms in 4*s - 14*s**2 + 22*s - 12*s + 17*s**2 - 14*s + 256. 3*s**2 + 256 Collect the terms in 288*b - 41*b**2 + 6*b**2 - 288*b + 20*b**2. -15*b**2 Collect the terms in 473 - 15*c**3 + 5*c**3 + 1073 + 7*c**3. -3*c**3 + 1546 Collect the terms in 15623*w**2 - 45*w - 11499*w**2 - 4127*w**2 + 45*w. -3*w**2 Collect the terms in 9052 - 254*p + p**2 + 258*p - 9052. p**2 + 4*p Collect the terms in -1616*o**2 + 1331*o**2 - 2542*o**2. -2827*o**2 Collect the terms in -365*m - 2319122 + 2319122. -365*m Collect the terms in -86527 + 86527 + 4626*x - 4626*x + 54*x**2. 54*x**2 Collect the terms in 691*z**3 + 745*z**2 - 557*z**3 - 745*z**2. 134*z**3 Collect the terms in 1074*n + 22260*n + 4589*n. 27923*n Collect the terms in -3*d + 4*d + 167600144*d**2 - 167600210*d**2. -66*d**2 + d Collect the terms in -32 + 235 - 63 - 2*l + 0*l + 120. -2*l + 260 Collect the terms in -3 + 3 + 26109*t - 29893*t. -3784*t Collect the terms in -292 - 37566*k + 291 + 271967*k - k**2. -k**2 + 234401*k - 1 Collect the terms in 161*x - 68 - 90 + 164. 161*x + 6 Collect the terms in 232 - 116 - 116 - 394080*a. -394080*a Collect the terms in 40305 - 2*g + 50750 + 40309 - 131364. -2*g Collect the terms in 3*j - 3*j**2 + 9*j - 264 - 200. -3*j**2 + 12*j - 464 Collect the terms in -3*m + 4*m + 170*m**2 + 8662*m**2 + 744*m**2. 9576*m**2 + m Collect the terms in -4173*y + 3113*y - 4535*y - 1615*y. -7210*y Collect the terms in 19298*s - 19302*s + 377 + 678. -4*s + 1055 Collect the terms in -358*u - 184*u - 13 - 5*u**2 + 3*u**2 + 9*u**2. 7*u**2 - 542*u - 13 Collect the terms in -180099*u + 540260*u - 180080*u - 180086*u. -5*u Collect the terms in -60 + 38 - 8 - 13*n - n + 30. -14*n Collect the terms in 23 - 2 - 1 - 13867*g**3 - 20 + 13871*g**3. 4*g**3 Collect the terms in 85012356262*l - 6*l**3 - 85012356262*l. -6*l**3 Collect the terms in -34611 - i**2 + 78*i - 114*i + 34*i. -i**2 - 2*i - 34611 Collect the terms in 343 + 201 + 108 + 173 - 5*b. -5*b + 825 Collect the terms in 1215*q + 68746 - 137499 + 68753. 1215*q Collect the terms in 0*t + 0*t - 2*t + 225231*t**2 + 181113*t**2. 406344*t**2 - 2*t Collect the terms in 206*r**2 + 0 + 499*r**2 + 3 - 7*r. 705*r**2 - 7*r + 3 Collect the terms in -2*f - 6565 + 13106 - 6580. -2*f - 39 Collect the terms in -4*v**2 + 3 - 17 + 396*v - 11*v + 14. -4*v**2 + 385*v Collect the terms in 168173*l**2 + 50328*l**2 + 19133*l**2. 237634*l**2 Collect the terms in 44917296252*w**2 - 8*w**3 - 44917296252*w**2. -8*w**3 Collect the terms in 2*n**3 + 160*n**2 - 113*n**2 - 47*n**2 + 318. 2*n**3 + 318 Collect the terms in 46 + 15 - 46 - 58 + 43 + 4*h. 4*h Collect the terms in -492*n**3 + 1472*n**3 - 493*n**3 - n**2 - 477*n**3. 10*n**3 - n**2 Collect the terms in 2*j**3 + 142939*j**2 - 142939*j**2. 2*j**3 Collect the terms in -5*x**2 + 19*x**3 - x**2 + 29*x - 4*x**2 + 3*x**2 - 7*x**2. 19*x**3 - 14*x**2 + 29*x Collect the terms in -6599 - 217*d + 219*d + 1012 + 9504 + 10896. 2*d + 14813 Collect the terms in 1559 - 521 - 533 + 440*x - 514. 440*x - 9 Collect the terms in 1016*h**2 + 1031*h**2 + 1017*h**2 - 5068*h**2 + 1018*h**2 + 1006*h**2. 20*h**2 Collect the terms in 6*z - 86*z**2 - 54*z**2 - 84*z**2 - 2*z**3 + 320*z**2 - 6*z. -2*z**3 + 96*z**2 Collect the terms in 651 + 10*m - 324 - 315. 10*m + 12 Collect the terms in -812859*l + 406430*l + 20*l**2 + 28*l**2 + 406429*l. 48*l**2 Collect the terms in -6359*c**3 + 12730*c**3 - 6372*c**3. -c**3 Collect the terms in -140*x - 203*x + 486*x - 351*x. -208*x Collect the terms in -7*p - 10*p + 17*p + 469776*p**3 - 154470*p**3. 315306*p**3 Collect the terms in -86004723 + 13*p + 86004723. 13*p Collect the terms in 1535347*m**2 - 511838*m**2 - 511883*m**2 - 511771*m**2. -145*m**2 Collect the terms in -54116461 - 284*l + 54116461. -284*l Collect the terms in 199 - 1159*v - 199 - 1240*v - 738*v. -3137*v Collect the terms in 2494*g + 4671*g + 1744*g - 1755*g + 2870*g. 10024*g Collect the terms in 4*a - 411 - 285 - 8*a - 297 + 7*a. 3*a - 993 Collect the terms in 3*o**3 + 1108777*o + 1108873*o - 2217650*o + 4*o**3. 7*o**3 Collect the terms in 1427773 + 73*k - 713879 - 713894. 73*k Collect the terms in -4738 - 4714 - 4*n**3 - 32*n**3 + 9454. -36*n**3 + 2 Collect the terms in 4*w**2 + 2633*w + 2 - 2618*w - w**2 - 3 + 1. 3*w**2 + 15*w Collect the terms in -15317893*g**3 - 3087*g**2 + 15317867*g**3 + 3087*g**2. -26*g**3 Collect the terms in 396 - 3*k - 405 + 612 + 2218. -3*k + 2821 Collect the terms in -178*j**2 - 3 + 18*j**3
{ "pile_set_name": "DM Mathematics" }
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>jQuery UI Effects Demos</title> <link rel="stylesheet" href="../demos.css"> </head> <body> <div class="demos-nav"> <h4>Examples</h4> <ul> <li class="demo-config-on"><a href="default.html">Default functionality</a></li> </ul> </div> </body> </html>
{ "pile_set_name": "Github" }
Sandy railway station Sandy railway station serves the town of Sandy in Bedfordshire, England. It is on the East Coast Main Line, about 44 miles (71 km) from . Sandy is managed and served by Great Northern. Sandy station was originally built in 1850 for the Great Northern Railway; the London and North Western Railway opened an adjacent station in 1862. The stations were later merged into one, which has since undergone many changes. The present station has two large platforms and 4 main rail lines, a pair of "up and down" slow lines used by stopping services and a pair of "up and down" fast lines used by high speed services passing through. A fifth line extends off the "up" slow line which links into the remaining sidings and original bay platforms. There is also a sixth line off the "down" slow line that links to a siding beside Platform1. The station platforms have been lengthened at their southern ends so that they can cope with 12-car trains, which have recently started serving the station to increase capacity and in preparation for new Class 700 trains following the completion of the Thameslink Programme. History The first section of the Great Northern Railway (GNR) - that from to a junction with the Manchester, Sheffield and Lincolnshire Railway at Grimsby - opened on 1 March 1848, but the southern section of the main line, between and , was not opened until August 1850. Sandy was one of the original stations, opening with the line on 7 August 1850. The Sandy and Potton Railway was opened for goods traffic on 23 June 1857, and to passengers on 9 November 1857. It was later purchased by the Bedford and Cambridge Railway (B&CR), which closed the line in January 1862 for reconstruction. The line reopened on 7 July 1862, including a new station at Sandy separate from, but adjacent to, the GNR station. The B&CR was absorbed by the London and North Western Railway (LNWR) in 1865. The eastern section of the Bedford-Cambridge route (sometimes known as the Varsity Line) closed on 1 January 1968, and with it, the ex-LNWR platforms at Sandy. The two stations were physically adjacent, and shared an island platform. In 1917 the LNWR station was placed under the management of the GNR, and then shared the booking facilities. After the closure of the Varsity Line, the station was considerably rebuilt in the early 1970s to give a 4-track layout throughout, and platforms on the slow lines only, thus removing a 2-track bottleneck on the East Coast Main Line. Sandy railway station was the site of the English unjust enrichment case Great Northern Railway Co. v Swaffield (1874) LR 9 Exch 132, in which the defendant sent a horse to this railway station, to be collected. His employee arrived the next day, but the station master demanded that he pay livery stable costs for the night; the employee refused to pay, and did not collect the horse. The defendant arrived later, and demanded payment to compensate him for duress of goods (after the station master offered to pay livery stable costs out of pocket); after the station master refused to pay such compensation, the defendant left the horse in the possession of the station for four months during litigation. The Court of the Exchequer held the defendant liable for four months' stable costs, as the plaintiff in the case 'had not choice, unless they would leave the horse at the station or in the high road to his own danger and the danger of other people' (per Kelly CB). In this way the court recognised a limited exception to the rule that no claim for salvage be recognised by the courts outside the context of salvage in tidal waters. The stable costs were paid to the use of the defendant by way of necessity, and therefore constituted unjust enrichment. Facilities Sandy station has a small café inside the booking office on Platform 2. There is a large sheltered area with seating on Platform 1, and a smaller one on Platform 2. Both platforms have step-free access via the external road bridge. However the slope to the bridge is relatively steep on both sides of the railway and the footpath on the bridge is quite narrow. In the later half of 2016, modern ticket barriers where installed at the entrance to both platforms along with a covered area to protect them from wind and rain damage. When in use, there are staff on hand if any issues arise. The station has two modern touch screen ticket machines located in front of the booking office, and there are cycle storage facilities to the south of it. The station also has help points throughout, which were installed by former franchise holder First Capital Connect. Services The station is served by a half-hourly Thameslink service southbound to Horsham via London St Pancras and northbound to Peterborough. Late night southbound services terminate at London Kings Cross instead. There is an hourly service in each direction on Sundays. Route Future In 2017, there was speculation that the station might be relocated from its current position in the town centre to a new site just to the north of the town. In late January 2020, East West Rail Ltd announced that the route of EWR between and would be 'in the Tempsford area', mid way between Sandy and St Neots. Concern has been expressed locally that a new EWR/ECML interchange hub at Tempsford railway station may lead to the closure of Sandy station. Location In the chainage notation traditionally used on the railways, it is from . References External links http://www.bedfordshire.gov.uk/CommunityAndLiving/ArchivesAndRecordOffice/CommunityArchives/Sandy/TheDeathOfASandyStationMaster.aspx (with photographs of both old stations) Category:Railway stations in Bedfordshire Category:Former Great Northern Railway stations Category:Railway stations opened in 1850 Category:Thameslink railway stations Category:Sandy, Bedfordshire Category:Former London and North Western Railway stations Category:Railway stations opened in 1862 Category:Railway stations closed in 1968 Category:1862 establishments in England
{ "pile_set_name": "Wikipedia (en)" }
A rapid and convenient filter-binding assay for ras p21 processing enzyme farnesyltransferase. Because it is the target for the development of anti-cancer agents, the mammalian cytosolic enzyme farnesyltransferase (FTase) has received significant attention in recent years. FTase catalyzes the transfer of a farnesyl group from farnesylpyrophosphate (FPP) to cysteine 185/186 at the carboxyl terminal end of ras proteins (ras p21), a reaction essential for the localization of ras p21 to the plasma membrane for their cellular functions including cell transformation in case of oncogenic ras p21. Here, we report the development of a rapid and convenient assay procedure for FTase using phosphocellulose paper which has a binding affinity for proteins. The FTase is assayed as the transfer of [3H]farnesyl group from [3H]FPP to the ras p21 at pH 7.4 and 37 degrees C in the presence of rat brain cytosol followed by the binding of radioactive farnesylated ras p21 to the phosphocellulose paper. The radioactivity associated with ras p21 bound to the phosphocellulose paper was determined by scintillation counting after soaking the paper in trichloroacetic acid and washing with distilled water. Utilizing [3H]FPP and recombinant Ha-ras p21 as substrates in the reaction, the FTase followed Michaelis-Menten kinetics with Km values of 1.0 and 7.69 microM for respectively [3H]FPP and recombinant Ha-ras p21. The method reported here has the advantages over the other published assay procedures of being rapid, convenient and economical, and can be successfully used for the basic assaying of FTase in different organs and distinct species and for the screening of novel inhibitors of FTase.
{ "pile_set_name": "PubMed Abstracts" }
A millipede compound eye mediating low-resolution vision. Millipedes are a species-rich and ancient arthropod clade which typically bear a pair of lateral compound eyes with a small number of large facets. To understand the visual tasks that underlie the evolution of millipede eyes, their spatial resolving performance is of key importance. We here investigate the spatial resolution of the millipede Cylindroiulus punctatus using behavioural assays. Individual animals were placed in the centre of a cylindrical arena under bright downwelling light, with dark stimuli of varying angular dimensions placed on the arena wall. We used continuous isoluminant stimuli based on a difference of Gaussians signal to test for orientation to the dark target via object taxis. Headings of individual animals were tracked in relation to the stimuli to determine whether the animals oriented towards the stimulus. We implemented a multilevel logistic regression model to identify the arc width of the stimulus that animals could resolve. We then modelled the angular sensitivity needed to identify this. We also related the visual performance to the 3D anatomy of the eye. We found that C. punctatus can resolve a stimulus of 56° period (sufficient to detect a 20° dark target). Assuming a contrast threshold of 10%, this requires a receptor acceptance angle of 72° or narrower. Spatial resolving power this low would only suffice for the simplest visual tasks, such as shelter-seeking.
{ "pile_set_name": "PubMed Abstracts" }
Join us as Street Team Movement is formally introduced to the downtown Orlando community. Featured on the front page of the Orlando Sentinel, come meet the staff that started it all! Network with other entrepreneurs and business owners as well as find out more about this amazing cause! Cover will be a $10 donation which gets you: Free appetizers 1 raffle ticket Happy Hour Drink Specials
{ "pile_set_name": "OpenWebText2" }
1. Field of the Invention The present invention relates to integrated nonvolatile memory circuits (preferably integrated flash memory circuits) which apply high voltage to selected transistors during one or more operating modes (e.g., during various stages of a memory erase operation), monitor one or more selected nodes to detect an illegal condition, and generate a halt signal (for causing the halting or aborting of circuit operation) in response to detection of an illegal condition. The nonvolatile memory circuit of the invention includes logic means for asserting a halt signal in response to an illegal condition, but only following application of a high voltage to components of the circuit (if the illegal condition occurs during application of the high voltage to such components). 2. Description of Related Art Throughout the specification, including in the claims, the term "connected" is used (in the context of an electronic component being "connected" to another electronic component) in a broad sense to denote that the components are electrically or electromagnetically coupled with sufficient strength under the circumstances. It is not used in a narrow sense requiring that an electrically conducting element is physically connected between the two components. Nonvolatile memory chips (integrated circuits) are becoming increasingly commercially important. The present invention pertains to a method and apparatus for halting operation of a nonvolatile memory chip in response to detection of an undesired ("illegal") operating condition of the chip. In order to appreciate the invention, it will be helpful initially to describe the structure and normal operating modes of a typical nonvolatile memory chip. A typical nonvolatile memory chip includes an array of nonvolatile memory cells, each cell comprising a transistor having a floating gate capable of semipermanent charge storage. The current drawn by each cell depends on the amount of charge stored on the corresponding floating gate. Thus, the charge stored on each floating gate determines a data value that is stored "semipermanently" in the corresponding cell. One particularly useful type of nonvolatile memory chip includes an array of flash memory cells, with each cell comprising a flash memory device (a transistor). The charge stored on the floating gate of each flash memory device (and thus the data value stored by each cell) is erasable by appropriately changing the voltage applied to the gate and source (in a well known manner). FIG. 1 is a simplified block diagram of a conventional nonvolatile memory chip. Integrated circuit 3 of FIG. 1 includes at least one I/O pad 30 (for asserting output data to an external device or receiving input data from an external device), input/output buffer circuit 10 for I/O pad 30, address buffers A0 through Ap for receiving memory address bits from an external device, row decoder circuit (X address decoder) 12, column multiplexer circuit (Y multiplexer) 14, and memory array 16 (comprising columns of nonvolatile memory cells, such as column 16A). Each of address buffers A0 through Ap includes an address bit pad for receiving (from an external device) a different one of address bit signals X0 through Xn and Y0 through Ym. I/O buffer circuit 10 includes a "write" branch and a "read" branch. The write branch comprises input buffer 18. The read branch comprises sense amplifier 19 and output buffer 20. Chip 3 executes a write operation by receiving data (to be written to memory array 16) from an external device at I/O pad 30, buffering the data in the write branch, and then writing the data to the appropriate memory cell. Chip 3 can also be controlled to execute a read operation in which it amplifies and buffers data (that has been read from array 16) in the read branch, and then assert this data to I/O pad 30. Although only one I/O pad (pad 30) is shown in FIG. 1, typical implementations of the FIG. 1 circuit include a plurality of I/O pads, and each I/O pad is buffered by an I/O buffer circuit similar or identical to circuit 10. For example, one implementation of the FIG. 1 circuit includes eight I/O pads, eight buffer circuits identical to circuit 10, one line connected between the output of the output buffer 20 of each buffer circuit and one of the I/O pads (so that eight data bits can be read in parallel from buffers 20 to the pads), and one line connected between the input of the input buffer 18 of each buffer circuit and one of the I/O pads (so that eight data bits can be written in parallel from the pads to buffers 18). Each I/O pad (including I/O pad 30) typically has high impedance when the output buffer is not enabled. Each of the cells (storage locations) of memory array circuit 16 is indexed by a row index (an "X" index determined by decoder circuit 12) and a column index (a "Y" index output determined by decoder circuit 14). FIG. 2 is a simplified schematic diagram of two columns of cells of memory array 16 (with one column, e.g., the column on the right, corresponding to column 16A of FIG. 1). The column on the left side of FIG. 2 comprises "n" memory cells, each cell implemented by one of floating-gate N-channel transistors N1, N3, . . . , Nn. The drain of each of transistors N1-Nn is connected to bitline 13, and the gate of each is connected to a different wordline (a different one of wordline 0 through wordline n). The column on the right side of FIG. 2 also comprises "n" memory cells, each cell implemented by one of floating-gate N-channel transistors N2, N4, . . . , Nm. The drain of each of transistors N2-Nm is connected to bitline 15, and the gate of each is connected to a different wordline (a different one of wordline 0 through wordline n). The source of each of transistors N1, N3, . . . , Nn, and N2, N4, . . . , Nm is held at a source potential (which is usually ground potential for the chip during a program or read operation). In the case that each memory cell is a nonvolatile memory cell, each of transistors N1, N3, . . . , Nn, and N2, N4, . . . , Nm has a floating gate capable of semipermanent charge storage. The current drawn by each cell (i.e., by each of transistors N1, N3, . . . , Nn, and N2, N4, . . . , Nm) depends on the amount of charge stored on the corresponding floating gate. Thus, the charge stored on each floating gate determines a data value that is stored "semipermanently" in the corresponding cell. In cases in which each of transistors N1, N3, . . . , Nn, N2, N4, . . . , and Nm is a flash memory device (as indicated in FIG. 2 by the symbol employed to denote each of transistors N1, N3, . . . , Nn, N2, N4, . . . , and Nm), the charge stored on the floating gate of each is erasable (and thus the data value stored by each cell is erasable) by appropriately changing the voltage applied to the gate and source (in a well known manner). In response to address bits Y0-Ym, circuit 14 (of FIG. 1) determines a column address which selects one of the columns of memory cells of array 16 (connecting the bitline of the selected column to Node 1 of FIG. 1), and in response to address bits X0-Xn, circuit 12 (of FIG. 1) determines a row address which selects one cell in the selected column. Consider an example in which the column address selects the column on the right side of FIG. 2 (the column including bitline 15) and the row address selects the cell connected along wordline 0 (the cell comprising transistor N2). To read the data value stored in the selected cell, a signal (a current signal) indicative of such value is provided from the cell's drain (the drain of transistor N2, in the example), through bitline 15 and circuit 14, to node 1 of FIG. 1. To write a data value to the selected cell, a signal indicative of such value is provided to the cell's gate and drain (the gate and drain of transistor N2, in the example). More specifically, the FIG. 1 circuit executes a write operation as follows. Each of address buffers A0 through An asserts one of bits X0-Xn to decoder circuit 12, and each of address buffers An+1 through Ap asserts one of bits Y0-Ym to decoder circuit 14. In response to these address bits, circuit 14 determines a column address (which selects one of the columns of memory cells of array 16, such as column 6A), and circuit 12 determines a row address (which selects one cell in the selected column). In response to a write command (which can be supplied from control unit 29, or other circuitry not shown in FIG. 1), a signal (indicative of data) present at the output of input buffer 18 is asserted through circuit 14 to the cell of array 16 determined by the row and column address (e.g., to the drain of such cell). During such write operation, output buffer 20 may be disabled. A data latch (not shown) is typically provided between input buffer 18 and I/O pad 30 for storing data (to be written to a memory cell) received from I/O pad 30. When the latched data is sent to input buffer 18, input buffer 18 produces a voltage at Node 1 which is applied to the selected memory cell. Input buffer 18 is typically implemented as a tri-statable driver having an output which can be placed in a high impedance mode (and thus disabled) during a read operation. In some implementations, the functions of the latch and input buffer 18 are combined into a single device. The FIG. 1 circuit executes a read operation as follows. Each of address buffers A0 through An asserts one of bits X0-Xn to address decoder circuit 12, and each of address buffers An+1 through Ap asserts one of bits Y0-Ym to address decoder circuit 14. In response to these address bits, circuit 14 asserts a column address to memory array 16 (which selects one of the columns of memory cells, such as column 16A), and circuit 12 asserts a row address to memory array 16 (which selects one cell in the selected column). In response to a read command (supplied from control unit 29, or from other circuitry not shown in FIG. 1), a current signal indicative of a data value stored in the cell of array 16 (a "data signal") determined by the row and column address is supplied from the drain of the selected cell through the bitline of the selected cell and then through circuit 14 to sense amplifier 19. This data signal is processed in amplifier 19 (in a manner to be described below), and the output of amplifier 19 is buffered in output buffer 20 and finally asserted at I/O pad 30. When reading a selected cell of array 16, if the cell is in an erased state, the cell will conduct a first current which is converted to a first voltage in sense amplifier 19. If the cell is in a programmed state, it will conduct a second current which is converted to a second voltage in sense amplifier 19 (the "second current" flowing through a programmed cell is negligibly small when the cell is read by a typical, conventional read operation). Sense amplifier 19 determines the state of a cell (i.e., whether it is programmed or erased corresponding to a binary value of 0 or 1, respectively) by comparing the voltage indicative of the cell state to a reference voltage. The outcome of this comparison is an output which is either high or low (corresponding to a binary value of one or zero) which sense amplifier 19 sends to output buffer 20, which in turn asserts a corresponding data signal to I/O pad 30 (from which it can be accessed by an external device). Nonvolatile memory chip 3 of FIG. 1 can also execute an erase operation in which all or selected ones of the cells of memory array 16 are erased in response to a sequence of one or more commands (e.g., an "Erase Setup" command followed by an "Erase Confirm" command), by discharging a quantity of charge stored on the floating gate of each cell. Typically, all cells of array 16 or large blocks of such cells are erased at the same or substantially the same time during an erase operation. Each erase operation comprises a sequence of steps, including "verification" steps for verifying that the cells have desired threshold voltages at each of one or more stages of the erase operation. More specifically, if cells of memory array 16 of FIG. 1 are to be erased, an "Erase Setup" command and then an "Erase Confirm" command are sent from an external device to I/O pad 30. Where each such command comprises parallel bits, the different bits are sent in parallel to I/O pad 30 and to additional I/O pads identical to I/O pad 30. The command is transferred from I/O pad 30 (or from I/O pad 30 and additional I/O pads) to input buffer 18 (or input buffer 18 and input buffers connected to the other I/O pads), and then to control unit 29. Control unit 29, which typically includes command execution logic and a state machine, processes the command to generate instruction data, and supplies the instruction data to circuit 14 and sense amplifier 19 (and to other components of memory chip 3 of FIG. 1) to cause chip 3 to execute a sequence of steps required for erasing the specified cells of array 16. These steps include verification steps (e.g., the verification step discussed below with reference to FIG. 5) for verifying that one or more of the cells have desired threshold voltages at each of one or more stages of the erase operation. During each verification step, verification data (denoted as "RAW VERIFY OK" in FIG. 1) is output from AND gate 22 (in response to the output of sense amplifier 19). This verification data can be fed back to control unit 29. Typically, an external device polls output pads of chip 3 in order to determine whether the erase operation has been completed and whether the erase operation was successful. More specifically, during verification, the output of sense amplifier 19 is "Anded" with a verification enable signal. I.e., the output of sense amplifier 19 is supplied to one input of AND gate 22, verification enable signal "VERIFY ENABLE" is supplied to the other input of AND gate 22, and the AND gate 22 outputs the signal "RAW VERIFY OK". The signal RAW VERIFY OK is asserted to a state machine (e.g., a state machine within control unit 29) to trigger execution of the next chip operation. The level of signal VERIFY ENABLE is a logical "1" only during each verification cycle. Thus, if the sense amplifier output becomes valid (i.e., a logical "1") at any instant during a verification operation, the signal RAW VERIFY OK is a logical "1" at a corresponding instant (and this instantaneous value of RAW VERIFY OK can cause the state machine to trigger execution of the appropriate chip operation. A conventional memory erase operation is next described in greater detail with reference to FIG. 3. FIG. 3 is a block diagram of a conventional flash memory integrated circuit 103 (also referred to herein as "system" 103) which is a variation on memory chip 3 of FIG. 1 which performs the same functions as does chip 3. The components of flash memory system 103 which correspond to components of memory chip 3 of FIG. 1 are identified by the same reference numerals as in FIG. 1. Memory array 16 of system 103 consists of flash memory cells arranged in rows and columns with there being a total of 256K of eight bit words in the array. The individual cells (not depicted) are addressed by eighteen address bits (A0-A17), with nine bits being used by X decoder circuit 14 to select the row of array 16 in which the target cell is located and the remaining nine bits being used by Y decoder circuit 14A (of Y-multiplexer 14) to select the appropriate columns of array 16. Internal state machine 120 (a component of control unit 29 of system 103) controls detailed operations of system 103 such as the various individual steps necessary for carrying out cell programming, reading and erasing operations. State machine 120 thus functions to reduce the overhead required of the processor (not depicted) typically used in association with system 103. In order for memory array 16 to be erased (typically, all or large blocks of the cells are erased at the same time), the processor must cause Output Enable (OE) pin to be inactive (high), and Chip Enable (CE) pin and Write Enable (WE or "-WE") pin to be active (low). The processor can then issue an 8 bit command 20H (0010 0000) on data I/O pins DQ0-DQ7, typically called an Erase Setup command (one of I/O pins DQ0-DQ7 corresponds to I/O pad 30 of FIG. 1). This is followed by issuance of a second eight bit command D0H (1101 0000), typically called an Erase Confirm command. Two separate commands are used so as to minimize the possibility of an inadvertent erase operation. The commands are transferred to data input buffer 122 (input buffer 18 of FIG. 1 corresponds to a component of buffer 122 which receives one bit of each command) and the commands are then transferred to command execution logic unit 124. Logic unit 124 then instructs state machine 120 to perform all of the numerous and well known steps for erasing array 16. Once the erase sequence is completed, state machine 120 updates an 8 bit status register 126, the contents of which are transferred to data output buffer 128 which is connected to data I/O pins DQ0-DQ7 of the memory system (output buffer 20 of FIG. 1 corresponds to a component of buffer 128 which receives one bit from register 126). The processor will periodically poll the data I/O pins to read the contents of status register 126 in order to determine whether the erase sequence has been completed and whether it has been completed successfully. FIGS. 4A and 4B are a flow chart showing a typical erase sequence as it is carried out by state machine 120. It should be noted that during any erase operation, there is a possibility that one or more cells of array 16 will become what is termed "overerased". The objective of the erase sequence is to erase all the cells of array 16 so that the threshold voltages are all within a specified voltage range. That range is typically a small positive voltage range such as +1.5 to +3.0 volts. If the erased cells fall within this range, the cell to be read (the "selected" or "target" cell) will produce a cell current in a read operation. The presence of cell current flow indicates that the cell is in an erased state (logic "1") rather than a programmed state (logic "0"). Cell current is produced in an erased cell because the voltage applied to the control gate of the cell, by way of the word line from the array connected to X decoder 12, will exceed the threshold voltage of the erased cell by a substantial amount. In addition, cells which are not being read ("deselected" cells) are prevented from producing a cell current even if such cells have been erased to a low threshold voltage state. By way of example, for cells located in the same row as the selected cell, by definition, share the same word line as the selected cell. However, the drains of the deselected cells will be floating thereby preventing a cell current from being generated. Deselected cells in the same column will not conduct cell current because the word lines of such deselected cells are typically grounded. Thus, the gate-source voltage of these cells will be insufficient to turn on these deselected cells even if they are in an erased state. Once array 16 has been erased, the vast majority of its cells will have a proper erased threshold voltage. However, it is possible that a few (or even one) of the cells may have responded differently to the erase sequence and such cell(s) have become overerased. If a cell has been overerased, the net charge on the floating gate will be positive. The result will be that the threshold voltage will be negative to some extent. Thus, when the word line connected to such overerased deselected cell is grounded, the deselected cell will nevertheless conduct current. This current will interfere with the reading of the selected cell thereby preventing proper memory operation. A principal objective of the erase sequence of FIGS. 4A and 4B is to prevent the overerase condition from occurring. With reference again to the FIG. 4A and 4B flow chart, the erase sequence is initiated (step 28) by the issuance of the two above-noted erase commands. Once the commands have been received by command execution logic 124 (shown in FIG. 3), state machine 120 will first cause all cells of array 16 to be programmed. This is done so that all cells are in essentially the same condition when they are subsequently erased, which reduces the likelihood that one or more of the cells will become overerased since all of the cells will have an increased tendency to respond to the subsequent erase sequence in the same manner. After step 28, an address counter (component 118 of FIG. 3) is initialized (as indicated by block 30) to the first address of the memory. Next, as indicated by block 32, the voltages used for programming are set to the proper level (including by providing high voltage Vpp, e.g. equal to +12 volts, from Vpp switch 121 of FIG. 3 to X and Y decoders 12 and 14A and other components of FIG. 3). When switch 121 is in a state in which it provides high voltage Vpp to X decoder 12, Y decoder 14A, and other components of FIG. 3, the signal "High V" output from switch 121 is at a high (logical "one") level. Otherwise, the signal "High V" output from switch 121 is at a low (logical "zero") level. Once the voltages are set, an internal program pulse counter (not depicted) is initialized as shown by block 34 of FIG. 4A. This counter will keep track of the number of programming pulses that have been applied to the cells of the word (byte) being programmed. Next, a programming pulse is applied to the cells of the word located at the first address of the memory, as indicated by block 36. The pulse counter is then incremented (block 38) and a determination is made as to whether a predetermined maximum number of pulses have been applied to the cells (block 40). If that is the case, the cells are read to determine whether the cells have, in fact, been programmed (verification operation 42). This is accomplished using sense amplifiers and associated components represented by block 100 of FIG. 3. If the cells are still not programmed at this point, there has been a failure since he maximum number of programming pulses has been exceeded. Depending upon the particular memory, the sequence will be terminated or a record of the failed word will be made and the sequence continued. This information will then be transferred to status register 126 (FIG. 3) so that it can be read by the processor. One potential cause of such a failure is that the memory endurance may have been exceeded. In other words, the memory has been cycled too many times. Assuming that the maximum count has not been exceeded, the byte is verified as indicated by operation 44. If the byte has not been programmed, a further programming pulse is applied (block 36) and the counter is incremented (block 38). Assuming that the maximum count has still not been exceeded, the byte is again verified (operation 44). This sequence will continue until the byte finally passes the verification test or until the pulse counter is at the maximum. Assuming that the first byte is eventually successfully programmed, a determination is made as to whether the last address of array 16 has been programmed (step 46). If that is not the case, address counter 118 (of FIG. 3) is incremented to the second address (block 48) and the internal pulse counter reset (block 34). A first programming pulse is applied to the byte of the second address (block 36) and the sequence is repeated. This process will continue until all cells of array 16 have either been programmed or until a determination is made that there is a programming failure. Assuming that all of the cells have been successfully programmed and verified, state machine 120 will continue the erase sequence by setting the appropriate voltages used for erasing, including the initialization of the address counter 118 (block 49 of FIG. 4B) and the setup of the appropriate voltages for erasing, including voltage Vpp (block 50). Next, an internal erase pulse counter is reset (block 52) and a single erase pulse is applied (block 54) to all of the cells of array 16 (or to the block of the array being erased in the event that capability is provided). The cells of array 16 will then be sequentially read (erase verification step 58) in order to determine whether all cells have been successfully erased. Before step 58, the conditions necessary for erase verification, namely those for cell reading, are set up (block 56) and the first cell of array 16 is read. A single erase pulse is almost never sufficient to accomplish an erasure so that the test (step 58) will almost always fail. The state of the erase pulse counter is then examined (step 60) and a determination is made that the maximum count has not been exceeded. Accordingly, a second erase pulse is applied to the entire array 16 (step 54) and the first byte is again tested (step 58). Once the byte has received a sufficient number of erase pulses and has passed the verification test (step 58), the address is incremented (block 60) and the second byte is tested (steps 56 and 58) to determine whether the second byte has been successfully erased. Since the cells are not always uniform, it is possible that the second byte has not be erased even though it has received the same number of erase pulses received by the first byte. In that event, a further erase pulse is applied to the entire array 16 and the second byte is again tested for a proper erase. Note that the address is not reset at this point since it is not necessary to retest those bytes that have already been erased. However, there is a possibility that those earlier erased bytes will become overerased, as will be explained. Once it has been established that the second byte has been properly erased, a determination is made as to whether the last address of array 16 has been verified (step 62). If that is not the case, address counter 118 is incremented (step 64) and the third byte is tested. Additional erase pulses will be applied if necessary. The internal erase pulse counter (step 60) will monitor the total number of erase pulses applied in the erase sequence. If a maximum number has been exceeded, the sequence will be terminated and one of the bits of status register 126 will be set to reflect that an erase error has occurred. Assuming that the second byte of cells has been properly erased, the remaining bytes will be verified and any necessary additional erase pulses will be applied. Once the last address has been verified, the erase sequence is ended and status register 126 is updated to indicate that the erase sequence has been successfully completed. With reference again to FIG. 3 (and to FIG. 5), memory chip 103 includes a conventional circuit 130 (shown in FIG. 3) for monitoring the status of one or more nodes of the chip. In response to detecting a condition which requires that the normal operational flow of the state machine be stopped (denoted below as an "illegal" condition), monitoring circuit 130 asserts a signal (labeled "ILLEGAL" in FIG. 3) having a high level (a logical "one") to command execution logic 124. In the absence of an illegal condition, the signal "ILLEGAL" is at a low level (a logical "zero"). In response to a high level of the signal "ILLEGAL," logic unit 124 (and in particular, logic circuitry 124A shown in FIG. 5 within unit 124) generates a halt signal (labeled "HALT" in FIG. 5) for causing the halting of circuit operation). Conventional logic circuitry 124A is typically implemented using combinational logic. Logic unit 124 asserts the halt signal to state machine 120 and optionally also to other components of chip 103. In response to the halt signal, state machine 120 halts (aborts or otherwise stops) any ongoing memory erase operation. However, a problem can arise as a result of the described conventional technique for halt signal generation. This problem occurs when the halt signal is generated at a time when high voltage (e.g., voltage V.sub.pp) is applied across the source and drain of one or more transistors of the FIG. 3 chip. It is well known that many typical transistors (e.g., most MOSFET transistors) can withstand high voltage (e.g., 12 volts) across their terminals. However, when a circuit attempts to switch a typical transistor (e.g., a typical NMOS or PMOS transistor) which is a component thereof by changing the voltage on the transistor's gate while a high voltage is applied across its source and drain, the well-known (and undesirable) phenomenon known as the "snap back bipolar" effect can disrupt operation of the circuit, and can also damage the transistor being switched. For convenience, the phrase "high voltage mode" is used below to denote an operating mode of a nonvolatile memory chip in which high voltage is applied across source and drain terminals of one or more transistors of the chip (where such "high voltage" is sufficiently high to subject the transistors to the snap back bipolar effect if gates of such transistors are switched with the high voltage across their source and drain terminals). An example of such a "high voltage" is the below-discussed voltage V.sub.pp (equal to 12 volts) which is sometimes applied across PMOS or NMOS transistors within X decoder circuit 12 of FIG. 3, which voltage is much greater than the supply voltage (V.sub.cc =5.0 volts or V.sub.cc =5.5 volts) applied across the terminals of the same transistors during reads of data from memory cells of the same chip. Also for convenience, the phrase "low voltage mode" (with reference to the same nonvolatile memory chip and the same transistors as in the definition of "high voltage mode") is used below to denote an operating mode of the chip in which "low voltage" is applied across the same terminals of the same transistors (where "low voltage" denotes a voltage, substantially lower than a "high voltage" applied across the terminals in a high voltage mode, and thus sufficiently low so as not to subject the transistors significantly to the snap back bipolar effect if the transistors are switched with the low voltage across their terminals). A typical value of "low voltage" is a supply voltage, V.sub.cc =5.5 volts, applied across the terminals of the transistors during reads of data from memory cells of the chip (where a high voltage of 12 volts is applied across the terminals of the transistors during a high voltage mode). In the example of the previous sentence, the operation of reading data from the memory cells (with V.sub.cc =5.5 volts applied across the terminals of the transistors) is a "low voltage mode" of the chip. The above-mentioned snap back bipolar effect occurs because of a bipolar effect on a MOS device. This effect is an avalanche hole generated phenomenon which can occur in relatively short channel devices. As source-to-drain separation is reduced, some hole current can flow to the source. If the drain voltage is low, most hole current flows out the substrate terminal. However, with large drain voltages, a substantial hole current can flow to the source, and the product of current flow and substrate resistance becomes large enough (e.g., 0.6 volts) to forward bias the source-substrate junction, thereby causing electron injection into the substrate from the source. This injection leads to an "n-p-n" (source-substrate-drain) bipolar transistor action or a snap back phenomenon. The emitter-base junction of the transistor is self biased. Any current across the reverse-biased collector-base junction is multiplied by current gain .beta. of the bipolar transistor. With reference to FIG. 8 (which shows a family of "drain current" v. "drain voltage" curves, each curve for a different indicated value of gate voltage), this current multiplication results in both a negative resistance characteristic and lower voltage of the BV.sub.CEO. If a halt signal of the type described above is generated during a high voltage mode of the FIG. 3 chip, at least some NMOS or PMOS transistors (having high voltage across their sources and drains) will be switched in the course of the chip's response to the halt signal. As a result, the snap back bipolar effect will not only disrupt operation of the chip, but may also damage each transistor that is switched during the high voltage mode with high voltage applied across its terminals. One possible solution to this problem (the problem of damage and disruption due to switching one or more transistors during a high voltage mode) is to ignore any illegal condition and avoid generating any halt signal during a high voltage mode. However, it is impractical to implement this "solution" in a nonvolatile memory chip for the following reason. During almost the entire duration of a memory erase operation of a nonvolatile memory chip (in which memory array cells of the chip are erased), the chip is in a high voltage mode. More specifically, as described above with reference to FIGS. 4A and 4B, an erase operation includes setup steps (such as steps 30, 32, and 34 of FIG. 4A and steps 49, 50, and 52 of FIG. 4B), programming and erasing steps (step 36 of FIG. 4A and step 54 of FIG. 4B), and verification steps (such as steps 42 and 44 of FIG. 4A and steps 56 and 58 of FIG. 4B). The chip is in a high voltage mode during the programming and erasing steps, and these steps typically consume almost the entire duration of an overall erase operation (programming step 36 typically requires on the order of ten microseconds while the setup and verification steps of FIG. 4A typically consume a total of about one microsecond, and erase step 54 typically requires on the order of tens of milliseconds while the setup and verification steps of FIG. 4B typically consume a total of about one microsecond). Thus, an undesirable consequence of operating a nonvolatile memory chip while ignoring any illegal condition that occurs (and without generating any halt signal) during a high voltage mode is that the chip could not generate a halt signal during almost the entire duration of an erase operation.-As a result, the chip would almost always fail to halt an erase operation despite the occurrence of an illegal condition during the erase operation, and it would thus be impractical to operate the chip in this manner. Until the present invention, it had not been known to design or operate a nonvolatile memory chip so that the chip generates a halt signal (and responds to the halt signal) each time an illegal condition has occurred (whether or not the illegal condition has occurred during a high voltage mode) while also avoiding the described snap back bipolar effect problem.
{ "pile_set_name": "USPTO Backgrounds" }
Crassispira bataviana Crassispira bataviana is an extinct species of sea snail, a marine gastropod mollusk in the family Pseudomelatomidae, the turrids and allies. Description Distribution Fossils have been found in Miocene strata in Myanmar; age range: 23.03 to 20.43 Ma References External links E. Vredenburg. 1921. Comparative diagnoses of Pleurotomidae from the Tertiary formations of Burma. Records of the Geological Survey of India 53:83-129 bataviana Category:Gastropods described in 1895
{ "pile_set_name": "Wikipedia (en)" }
As the Third Christian Millennium dawns, the Caribbean is at kairos: the nexus of opportunity and risk. In light of the Christocentric fulness theme of Ephesians 4:9 - 24, perspectives and counsel will be offered to support reformation, transformation and blessing towards a truly sustainable future under God. According to Mike at M & D’s in Wareham, a billfish of some kind was caught in the Cape Cod Canal Tuesday night at Murderer’s Row. At approximately 7:30AM Wednesday morning Cape Cod Tackle Facebook page posted, “I just watched a video on a customers cell phone of a guy catching a Marlin in the canal last night. I ‘m not kidding I said a Marlin. Caught at the Murders row last night. I’ll post pictures later when he sends them to me.” “They thought it was a shark at first, so they cast back out and hooked up. It was hanging around in between the pilings, which is even more strange,” Mike told us when we called him later that morning. At about 7pm Wednesday night, Mike also added to his Facebook page: “I should also point out they tried to revive the fish but it did not survive. The fish ended up having the braid wrapped around his tail cutting deep into the front of the tail area. fish was caught on a custom rod/Shimano Baitrunner reel 50 lb braid and a Storm Blue Herring swim bait lure. anglers name withheld for now.” 50 lb gel spun polyester braid probably has about the diameter of the more traditional 12 lb nylon mono line, and the reel (reportedly twice nearly spooled) and a surf fishing spinning reel could credibly handle a serious 50 - 80 lb fish. But, an amazing catch from shore.Though, it should be noted that Sailfish do come in close to shore but usually far to the south. But then the seas were apparently quite warm this summer.Rare, but possible. END As we continue to look at the Freedom From Religion Foundation's anti-Christian poster: . . . it is time to look at the implications of several common lab coat-dressed atheistical talking points that imply that the human mind is deeply delusional and so inadvertently back-fire through self-contradiction.A good place to begin is a recent Daily Mail article, reflecting on the reliably anti-theistic NewScientist: Brains 'are hardwired to believe in God and imaginary friends' Religion is part of human nature and our brains are hard wired to believe in God, scientists believe. The evidence includes studies of babies and children which have shown the brain is programmed to think of the mind as being separate from the body. This distinction allows us to believe in the supernatural, to conjure up imaginary friends - and to conceive of gods, this week's New Scientist reports. Other studies suggest our minds come with an overdeveloped sense of cause and effect, which primes us to see purpose and design everywhere, even when there is none. Children as young as seven or eight believe that rocks, rivers and birds have been created for a specific purpose. Taken together, the two traits mean were are perfectly programmed to believe in god. Professor Paul Bloom, a psychologist at Yale University in the US, said: 'There's now a lot of evidence that some of the foundations for our religious beliefs are hard-wired. 'All humans possess the brain circuitry and it never goes away.' This sort of thinking is of course the sub-text behind the dismissal of "gods," "angels" and "devils" in the FFRF poster. The Daily Mail article also cites the dean of the so-called new Atheists: Richard Dawkins. Britain's most famous atheist, argues in his book the God Delusion that religion is propagated through indoctrination, especially of children. Evolution predisposes children to swallow whatever their parents and elders tell them, he argues, as trust and obedience are important for survival. Asked about the idea of pre-programming, the Oxford University professor said: 'I am thoroughly happy with believing that children are predisposed to believe in invisible gods - I always was. 'But I also find that indoctrination hypothesis plausible. The two influences could, and I suspect do, reinforce one another.' Then of course, we can cite prof William Provine of Cornell in the well known 1998 Darwin Day keynote address at University of Tennessee: Naturalistic evolution has clear consequences that Charles Darwin understood perfectly. 1) No gods worth having exist; 2) no life after death exists; 3) no ultimate foundation for ethics exists; 4) no ultimate meaning in life exists; and 5) human free will is nonexistent . . . .The first 4 implications are so obvious to modern naturalistic evolutionists that I will spend little time defending them. Human free will, however, is another matter. Even evolutionists have trouble swallowing that implication. I will argue that humans are locally determined systems that make choices. They have, however, no free will . . . Nor should we neglect remarks by Nobel Prize holder Sir Francis Crick in his 1994 The Astonishing Hypothesis and their implications: . . . that "You", your joys and your sorrows, your memories and your ambitions, your sense of personal identity and free will, are in fact no more than the behaviour of a vast assembly of nerve cells and their associated molecules. As Lewis Carroll's Alice might have phrased: "You're nothing but a pack of neurons." This hypothesis is so alien to the ideas of most people today that it can truly be called astonishing. [T]he problem is to get [people] to reject irrational and supernatural explanations of the world, the demons that exist only in their imaginations, and to accept a social and intellectual apparatus, Science, as the only begetter of truth [--> NB: this is a knowledge claim about knowledge and its possible sources, i.e. it is a claim in philosophy not science; it is thus self-refuting]. . . .It is not that the methods and institutions of science somehow compel us to accept a material explanation of the phenomenal world, but, on the contrary, thatwe are forced by oura priori adherence to material causes[--> another major begging of the question . . . ]to create an apparatus of investigation and a set of concepts that produce material explanations, no matter how counter-intuitive, no matter how mystifying to the uninitiated. Moreover, that materialism is absolute[--> i.e. here we see the fallacious, indoctrinated, ideological, closed mind . . . ], for wecannot allow a Divine Foot in the door. [From: “Billions and Billions of Demons,” NYRB, January 9, 1997. Bold emphasis and notes added. If you have been led to imagine that this is "quote mined" kindly see the filler citation and notes here.] Game over, religion is myth and superstition, childish projections of imaginary friends up to the sky and so on. Science, duly dressed in the lab coat, has spoken.Not so fast:1 --> Provine and Crick actually inadvertently expose the real problem: evolutionary materialism -- which, let us not forget, Lewontin reminds us is now being imposed before the evidence is allowed to speak and is thus allowed to censor the evidence -- drastically undermines the credibility of the human mind. So, it refutes itself. This was recognised publicly as long ago as the turn of the 1930's by the noted evolutionary thinker J. B. S. Haldane: "It seems to me immensely unlikely that mind is a mere by-product of matter. For if my mental processes are determined wholly by the motions of atoms in my brain I have no reason to suppose that my beliefs are true.They may be sound chemically, but that does not make them sound logically. And hence I have no reason for supposing my brain to be composed of atoms. In order to escape from this necessity of sawing away the branch on which I am sitting, so to speak, I am compelled to believe that mind is not wholly conditioned by matter.” ["When I am dead," in Possible Worlds: And Other Essays [1927], Chatto and Windus: London, 1932, reprint, p.209. (Highlight and emphases added.)] 2 --> In short, if the thoughts of a Crick are nothing but the molecular agitations in his brain, and if a Provine has no sufficient freedom to choose and decide for himself, then thought, reasoning, knowledge, decision, ethics and more collapse into delusion. 3 --> Without a real mind, so that we are genuinely capable of capable of thinking, knowing and deciding for ourselves, we become little more than whatever we have been wired up in our brains or indoctrinated by whoever had control of our formative years up to College. 4 --> But, on the presupposition of evolutionary materialism, that matter, energy, space, time and resulting blind chance and mechanical necessity are all that exist, we do inescapably end up in the problem envisioned by Haldane over eighty years ago: sawing away the branch on which we must sit. 5 --> For: "if my mental processes are determined wholly by the motions of atoms in my brain I have no reason to suppose that my beliefs are true.They may be sound chemically, but that does not make them sound logically." Oops.6 --> With that in mind, let us look afresh at how NewScientists' sources and Dawkins as well as FFRF etc. try to displace this problem of self-refutation by projecting it unto belief in God: a: our brains are hard wired to believe in God b: the brain is programmed to think of the mind as being separate from the body. This distinction allows us to believe in the supernatural, to conjure up imaginary friends - and to conceive of gods c: our minds come with an overdeveloped sense of cause and effect, which primes us to see purpose and design everywhere, even when there is none d: All humans possess the brain circuitry and it never goes away e: Evolution predisposes children to swallow whatever their parents and elders tell them f: I am thoroughly happy with believing that children are predisposed to believe in invisible godsg: humans are locally determined systems that make choices. They have, however, no free will h: "You", your joys and your sorrows, your memories and your ambitions, your sense of personal identity and free will, are in fact no more than the behaviour of a vast assembly of nerve cells and their associated molecules.i: You're nothing but a pack of neurons j: there is only our natural [i.e. material] world 7 --> But obviously, the sauce that stews the goose cooks up the gander just as well. The basic problem is, that a rock has no dreams, and evolutionary materialism is forced to make the jump from rocks and molecules derived from rocks (our bodies are all formed "out of the dust of the earth"!) to self-aware, thoughtful, deciding, conscience-lashed conscious mindedness. For, plainly: 8 --> We are conscious and conscious that we live in a common external world, a world in which we perceive, think, reason, communicate, discuss, believe we know some things and more. So, if we try to reduce this all to genetically based brain chemistry and ion currents in neurons, multiplied by accidents of psycho-social conditioning, we are deeply undermining our first, undeniable fact: consciousness.9 --> Let's take up the classic brain in vats delusion in the diagram just above, as an illustrative example.10 --> This is of course a modern form of the classic parable of Plato's cave, in which men have been held prisoner from childhood and are forced to only see shadow-shows projected on the opposite wall of the cave, which they naturally imagine to be reality. Then, one is somehow released, and sees the cheat,t hen is dragged up into the real world, where he learns just how deluded he was. Taking pity on his fellows, he tries to return and help them, only to be targetted with dismissive hostility: 11 --> The inevitable problem in this sort of scheme of course is that once we project a notion of general delusion unto any major aspect of the human mind, there are no firewalls. So, who is to say that the world in which we perceive ourselves as brains in the vats is not in turn another cave of shadow shows, or the apparent outer world of reality is not another cave in turn, and so on in an infinite regress of delusions. Which, is patently absurd.12 --> Instead, we use a bit of common good sense and upend the lot: that we are conscious, self aware and thinking creatures who by multiple senses are also aware of a common external world is manifest and so, it makes no sense to imagine that we are subjects of general delusion. Yes, it is possible to err (which is something we can realise is undeniably true not just a matter of fact), but that is itself a point of certain truth. So, we recognise there are some things we can be certain of, and that we can make mistakes. 13 --> In particular, if we try to undermine freedom to think, decide, act and respond to the voice of conscience by imagining such are generally delusional or childish, comparable to having imaginary friends, we end up with the problem of general delusion. As the list of atheistical pronouncements made while dressed up in the lab coat above manifestly do.14 --> No wonder ID thinker Philip Johnson has replied that Sir Francis Crick should have therefore been willing to preface his works thusly: "I, Francis Crick, my opinions and my science, and even the thoughts expressed in this book, consist of nothing more than the behavior of a vast assembly of nerve cells and their associated molecules." Johnson then acidly commented: “[[t]he plausibility of materialistic determinism requires that an implicit exception be made for the theorist.” [Reason in the Balance, 1995.]15 --> In short, the lab coat clad materialists here are plainly sawing off the branch on which they, too, are sitting. CRAACK!16 --> Instead, UD Blog's W J Murray is apt: If you do not [acknowledge]the law of non-contradiction, you have nothing to argue about. If you do not [admit] the principles of sound reason, you have nothing to argue with. If you do not [recognise] libertarian free will, you have no one to argue against. If you do not [accept] morality to be an objective commodity, you have no reason to argue in the first place. 17 --> So, we have no good reason to deny that we are conscious, minded, enconscienced (so, morally governed and morally struggling . . . ) creatures who have significant freedom to think, decide and act, and we are living in a world that in ever so many ways gives every good reason to see it as patently designed. (Start from how the world we live in -- the only world we actually observe -- on very strong evidence had a beginning, which implies that it has a begin-ner of awesome power. Multiply by the evidence that from its basic physics, it is finely tuned in ever so many ways, to support Carbon chemistry, watery medium cell based life. [Try here for a start, and look here at UD's V J Torley as he replied to P Z Myers' attempt to dismiss W L Craig's short arguments presented here at KF, last time.]) 18 --> So much so, that the evolutionary materialists (as we have seen) are forced to project confident manner talking points that such are childish delusions to be dismissed . . . only to saw off the branch on which they too must sit.19 --> But of course, to see that, we need to pause and think about the self-referential implications of what they are saying. Do that for a few minutes, and, OOPS -- CRAACK!20 --> A particularly pivotal point is the sense we generally have that we are under moral government, as attested by the voice of conscience. This is a major point of our thoughts, life and conscious experience, so we have no good reason to imagine it is the delusion that has been suggested, on pain of sawing off the branch on which we all must sit.21 --> That is we live in a world where OUGHT is credibly real. That means, there is a foundational IS in our world that grounds OUGHT. For which IS, across centuries of serious debate and discussion, there has been just one serious candidate: the inherently good, Creator God and Loving, utterly Just Lord.22 --> So, the above attempts to brush aside such evidence as childish delusions projecting imaginary friends unto the sky, falls apart. Instead, what we see is that the evidence is so plain and so widespread that those who wish to deny it have to make up a story of general delusion that then saws off the branch on which they too must sit.23 --> In short, we are back to the force of one of the most uncomfortable texts in the Bible, where the Apostle Paul, in rebuke to the decadence and monstrous evil of Rome -- by that time horrifically manifest in the person of the Emperor himself . . . Nero, argued: Rom 1:19 For that which is known about God is evident to [men] and made plain in their inner consciousness, because God [Himself] has shown it to them. 20 For ever since the creation of the world His invisible nature and attributes, that is, His eternal power and divinity, have been made intelligible and clearly discernible in and through the things that have been made (His handiworks). So [men] are without excuse [altogether without any defense or justification], 21 Because when they knew and recognized Him as God, they did not honor and glorify Him as God or give Him thanks. But instead they became futile and[c]godless in their thinking [with vain imaginings, foolish reasoning, and stupid speculations] and their senseless minds were darkened. 22 Claiming to be wise, they became fools [professing to be smart, they made simpletons of themselves]. 23 And by them the glory and majesty and excellence of the immortal God were exchanged for and represented by images, resembling mortal man and birds and beasts and reptiles. [--> in those days, idols in temples surrounded by often scandalous myths, nowadays, images in museums and on the web or TV, or in textbooks surrounded by a priori materialist ideologies dressed up in a lab coat serve much the same purpose] 24 Therefore God gave them up in the lusts of their [own] hearts to sexual impurity, to the dishonoring of their bodies among themselves [abandoning them to the degrading power of sin], 25 Because they exchanged the truth of God for a lie and worshiped and served the creature rather than the Creator, Who is blessed forever! Amen (so be it). 26 For this reason God gave them over and abandoned them to vile affections and degrading passions. For their women exchanged their natural function for an unnatural and abnormal one, 27 And the men also turned from natural relations with women and were set ablaze (burning out, consumed) with lust for one another—men committing shameful acts with men and suffering in their own [d]bodies and personalities the inevitable consequences and penalty of their wrong-doing and going astray, which was [their] fitting retribution. 28 And so, since they did not see fit to acknowledge God or approve of Him or consider Him worth the knowing, God gave them over to a base and condemned mind to do things not proper or decent but loathsome, 29 Until they were filled (permeated and saturated) with every kind of unrighteousness, iniquity, grasping and covetous greed, and malice. [They were] full of envy and jealousy, murder, strife, deceit and treachery, ill will and cruel ways. [They were] secret backbiters and gossipers, 30 Slanderers, hateful to and hating God, full of insolence, arrogance, [and] boasting; inventors of new forms of evil, disobedient and undutiful to parents. 31 [They were] without understanding, conscienceless and faithless, heartless and loveless [and] merciless. 32 Though they are fully aware of God’s righteous decree that those who do such things deserve to die, they not only do them themselves but approve and applaud others who practice them. [AMP] 24 --> Looks like the old apostle had a serious point._____________So, it is back to whose report will we believe? Why? ENDPS: At Christmas season, this of course leads back to why believe in angels any more than Santa Claus, which is duly mocked by Dan Barker and his FFRF. The answer is, first, that while there are many legends about Santa, there is a historical basis, the old bishop of Smyrna, St Nicholas. So, if we have no good reason to dismiss the reality of God, there is no good reason to doubt that he may have created other orders of being, whom we may call angels . . . messengers. And, some such angels may be fallen from their original estate, and so there is no in principle reason why devils are necessarily superstitious myths also. Yes, there may be legends aplenty and dubious reports, but let us keep an open mind. Thursday, December 19, 2013 This time, let us focus on the pivotal ideas in the FFRF poster, that all that exists is the natural world and that "Religion" is therefore "but myth and superstition . . . "As we have been observing the FFRF poster confidently asserts: The obvious pivotal issue is that in our day such atheism wears the lab coat, and pronounces its assertions in the name of science, which in their minds, trumps "religion." (BTW: It seems, sadly, that such atheists are usually so ignorant or dismissive of philosophy that they can only equate religion with superstition, they have no conceptual category that allows them to recognise why there are diverse worldviews and why a worldview different from their own may be reasonable. Part of our job is to educate such, including on the inevitable worldview roots of science and of their evolutionary materialist secular humanist scientism. Including, the decisive weaknesses in that view. Later on, DV.)C S Lewis long ago answered -- actually, ANTICIPATED -- quite decisively, with the very miracle at the heart of Advent Season as the miracle in play: that Jesus of Nazareth was born of a virgin. This has been brought to the attention of a modern audience by way of an animation -- thanks to C S Lewis Doodle: Two George III sixpences, HT Wiki Here, we can see how by way of the example of two sixpences put in a drawer on successive days, we can understand the difference between a law of nature acting freely by mechanical necessity and/or by chance processes similar to what happens when we roll a pair of fair dice, and what happens with intelligent intervention. The two coins put in a drawer will add up to twelve pence or one shilling's worth -- unless someone intervenes. And if a thief intervenes, he will have not so much broken the laws of arithmetic as those of England.Just so, it was not ignorance of the laws of nature that led Joseph to change his mind about divorcing his espoused wife Mary. (And yes, the betrothal of that day was much stronger than our modern engagements are. One had to get a divorce to break it -- it was unconsummated marriage.) Joseph full well knew how women usually become pregnant with child. But, he was also open to the possibility that the world is not a closed, self-contained material, mechanical system with room only for chance and deterministic causal influences that trace ultimately to the physics and happenstance circumstances of the Big Bang or the like.So, it seems that the dismissal "[t]here are no gods" -- we agree, there is but one true Living God, our creator and Lord -- is not the pivotal matter, but instead the declaration, "[t]here is only our natural world." That is, FFRF and others of like atheistical ilk imagine that reality is material, and believe that "science" has somehow proved it so.Which science, when, where, by whom, how?Silence.Not psychology or biology, and not chemistry. And least of all, physics.Science properly understood studies the natural world as a going concern in light of empirical observations, it is unable to explain its ultimate root. Save, that cosmology (a branch of physics) is more and more finding out that the physics of our cosmos is highly fine tuned in ways that allow Carbon Chemistry, watery medium cell based life to exist on terrestrial planets. Ways that look suspiciously like a design. (We will follow this up later.)But also, at bottom, the confident assertions by FFRF also pivot on the notion that "there is no evidence for God," so belief in God MUST be blind faith, or superstition similar to believing in good luck due to having a rabbit's foot in your back pocket.(Perhaps, such need to ask themselves why they have come to imagine there is no such evidence, on what grounds. And, whether what they really mean is, "there is no evidence that I am willing to properly follow up, fairly evaluate and accept if the balance of the evidence points that way." A very different thing indeed.)However, it may be more useful to simply cite a current short summary of five pointers to God, as was presented by the noted Christian philosopher, William Lane Craig, during a recent television interview: In an accompanying article he notes . . . and he is a leading expert on the views of modern atheists with many public debates with leading atheists to the point where some are now gun-shy: . . . most atheists, in my experience, have no good reasons for their disbelief. Rather they’ve learned to simply repeat the slogan, “There’s no good evidence for God’s existence!” . . . . In my publications and oral debates with some of the world’s most notable atheists, I’ve defended the following five reasons why God exists: 1. God provides the best explanation of the origin of the universe. Given the scientific evidence we have about our universe and its origins, and bolstered by arguments presented by philosophers for centuries, it is highly probable that the universe had an absolute beginning. Since the universe, like everything else, could not have merely popped into being without a cause, there must exist a transcendent reality beyond time and space that brought the universe into existence. This entity must therefore be enormously powerful. Only a transcendent, unembodied mind suitably fits that description. 2. God provides the best explanation for the fine-tuning of the universe. Contemporary physics has established that the universe is fine-tuned for the existence of intelligent, interactive life. That is to say, in order for intelligent, interactive life to exist, the fundamental constants and quantities of nature must fall into an incomprehensibly narrow life-permitting range. There are three competing explanations of this remarkable fine-tuning: physical necessity, chance, or design. The first two are highly implausible, given the independence of the fundamental constants and quantities from nature's laws and the desperate maneuvers needed to save the hypothesis of chance. That leaves design as the best explanation.3. God provides the best explanation of objective moral values and duties. Even atheists recognize that some things, for example, the Holocaust, are objectively evil. But if atheism is true, what basis is there for the objectivity of the moral values we affirm? Evolution? Social conditioning? These factors may at best produce in us the subjective feeling that there are objective moral values and duties, but they do nothing to provide a basis for them. If human evolution had taken a different path, a very different set of moral feelings might have evolved. By contrast, God Himself serves as the paradigm of goodness, and His commandments constitute our moral duties. Thus, theism provides a better explanation of objective moral values and duties. 4. God provides the best explanation of the historical facts concerning Jesus’ life, death, and resurrection. Historians have reached something of consensus that the historical Jesus thought that in himself God’s Kingdom had broken into human history, and he carried out a ministry of miracle-working and exorcisms as evidence of that fact. Moreover, most historical scholars agree that after his crucifixion Jesus’ tomb was discovered empty by a group of female disciples, that various individuals and groups saw appearances of Jesus alive after his death, and that the original disciples suddenly and sincerely came to believe in Jesus’ resurrection despite their every predisposition to the contrary. I can think of no better explanation of these facts than the one the original disciples gave: God raised Jesus from the dead. 5. God can be personally known and experienced. The proof of the pudding is in the tasting. Down through history Christians have found through Jesus a personal acquaintance with God that has transformed their lives. So, is it really true that there is "no evidence" for God, or is it that there is no evidence that some are willing to accept that might just put an unwelcome Divine Foot in the door of their comfortable ideology? {Added, Dec 22: Cf. UD's V J Torley respond to P Z Myers' attempted dismissals of W L Craig's brief arguments, here.} And if God is, why would he not ever have good reason to occasionally act beyond the usual course of nature to fulfill a higher purpose? Such as, the prophesied and fulfilled incarnation of the Christ, his life and service, his death burial and resurrection as witnessed by 500 who could not be stopped by dungeon, fire or sword -- or worse? That is, the focus of this Advent season.That is, too, the possibility of and value of evidence for miracles is going to be settled in the end on whether one is willing to accept that God is possible in light of evidence that is accessible all around us and -- as our consciences testify -- even inside us. For, if we are subject to moral government -- the force of OUGHT, that strongly indicates that we live under a Moral Governor, the inherently good God, our Creator.We seem to be zeroing in on a will problem here.Let us ponder that, this Christmas season. END This is a case where it is useful to cross-post from Uncommon Descent, as we have a very interesting contrast of two signs to address:_____________>>>Coyne et al cheer on censorship — it is time to take notice . . . Yesterday, UD News headlined a case of radical secularist censorship in Los Angeles being cheered on by Jerry Coyne et al. The case concerns the removal of the following sign (shown under fair use) that was formerly present at a Museum of Natural History in that city: Notice, what Coyne says in exultation over the removal of the sign: If I get any other information I’ll convey it, but for now I’m pleased that God is out of the Museum and no longer gets credit for “creatures.” It’s a victory for secularism, for sure. Something is blatantly, deeply wrong. Wrong with the push to censor. Wrong with the willingness of the museum’s leadership to be intimidated by Darwinist thuggery — and yes, this is thuggery. Wrong with professors who should value academic freedom, freedom of expression and diversity but instead are cheering on censorship. And — most importantly, wrong in a civilisation that is so rapidly losing its way, that it too often does not see a warning-sign for what it is. By way of illustration, let me contrast a second sign that seems to have been put up (at Advent season, nothing less) by the Freedom From Religion Foundation in the Illinois State legislature building . . . which IIRC, is the same state where prof. Coyne is based; a sign reportedly put up by the FFRF in the name of freedom of religious expression: The stereotypical, scapegoating accusatory message and significance of its timing at the Christmas season could not be clearer. (Let’s ask: have Mr Coyne and ilk loudly called for removal of this blatant piece of bigotry and scapegoating hostility that refuses to acknowledge the most obvious facts that — despite the inevitable sins that any movement with a track record in history will also have to deal with – Judaeo-Christian theism is a legitimate and intellectually serious worldview with thousands of years of positive contributions to our civilisation including advancing humanitarianism, civil liberty, learning and science? I doubt it. [And while I am at it, let us remember: if we are to make sensible policy choices, we must compare real with real in light of material pros and cons, not real with utopian ideal or whitewashed . . . as in, strawman tactics make for poor and often unjust or abusive and corrupt policy. Cases in point are obvious, all around and on the ash-heaps of sound history. Which, we had better learn and value as a record of hard-bought experience and lessons; lest we repeat its worst chapters.]) {BTW: if you doubt the direct connexion between the two, ponder this comment by NewEnglandBob in Coyne’s Combox: Critical thinking – 1, Superstition – 0.} I took time out to comment on the news post, and as it is beginning to slide down the page, let me now headline that comment:________________>> This pattern of intolerance and censorship of legitimate and historically important perspectives begins to call forth an analysis of motives, attitudes and habitual patterns. For instance, Jesus — in a psychologically deeply insightful observation — warns that we should beware and seek to address the plank in our own eye when we want to take the speck out of someone else’s eye, and says that he who is faithful/unfaithful with little will be much the same with greater power and responsibility. So, while the temptation for objectors to design theory etc is to try to twist this about and project it accusingly against us, given their refusal to acknowledge history (BA77 [OOPS: Barb] is so right to point to Newton and by extension many others down to today . . . ) and to pretend that those on our side can only be ignorant, stupid, insane or wicked, we need to hold up a mirror. For instance, Egnor reports how Coyne exults: The anonymous donor quote at the NHM has been removed. My second-hand source tells me it will not be replaced. No doubt your efforts, coupled with those of a science reporter at KPCC looking into the mess, compelled the administration to finally do the right thing. Without doubt, you and your WEIT audience were the driving forces, for which I’m grateful. This is censorship of a legitimate perspective on science, from a context that is educational.It is part and parcel of an increasingly widespread pattern that projects blame, base motivation, hatred/enmity to science and shrill accusations of intent to create a theocratic, right wing tyranny.This outrageously false and unbalanced scapegoating is beginning to look like blame the victim/ blame the perceived other, projection to me. Where, writ large and backed by growing radical secularist power, it is manifestly part of a blame the target turnabout accusation that all too easily becomes a big lie propaganda agenda. Where also, of course, such a lie can and must be shown to be a case of speaking with willful disregard to the truth one knows or should know, hoping to profit by what is false being perceived and acted on as if it were true. In this case, through outright censorship of a donor’s plaque. And where we are cautioned, on the mirror principle, to note with Freud et al (and I here cite Wiki speaking against interest): Psychological projection was conceptualized by Sigmund Freud in the 1900s as a defense mechanism in which a person unconsciously rejects his or her own unacceptable attributes by ascribing them to objects or persons in the outside world.[1] For example, a person who is rude may accuse other people of being rude . . . .Projection tends to come to the fore in normal people at times of crisis, personal or political,[13] but is more commonly found in the neurotic or psychotic[14]—in personalities functioning at a primitive level as in narcissistic personality disorder or borderline personality disorder.[15] Carl Jung considered that the unacceptable parts of the personality represented by the Shadow archetype were particularly likely to give rise to projection, both small-scale and on a national/international basis.[16] Marie-Louise Von Franz extended his view of projection, stating that: “… wherever known reality stops, where we touch the unknown, there we project an archetypal image”.[17] The philosopher Ludwig Feuerbach based his theory of religion in large part upon the idea of projection, that is the idea that an anthropomorphic deity is the outward projection of man’s anxieties and desires . . . That last part is revealing: Feuerbach (who is where Marx began from, and IIRC is notorious for his you are what you eat materialist view . . . ) has simply swept away the serious reasons for a mature worldview that takes God seriously — and thus rightfully sees him as the Father of compassion and God of all comfort — and instead paints a ridiculous strawman caricature. Which itself invites the counter- analysis that asks, what is he afraid of in his own system that he projects to others. Not, as a mere rhetorical turnabout, but in the context of the well warranted observation that the portrait projected is manifestly a strawman so it invites analysis on mirror psychology grounds. in science we seek to think God’s creative and sustaining thoughts after him, serving him and others by exploring our world to more accurately understand it and so be better stewards of it and its resources . . . 2 –> There is nothing illegitimate or unduly threatening in such a view of and approach to science. That is obvious. Indeed, we do the public and especially children a disservice if we leave them with the impression that this view has not been historically important, a source of much good, and continues to be an important view today held by many working scientists, engineers and medical practitioners in all sorts of fields. 3 –> Likewise — as as BA77 hints at just above by citing the US Declaration of Independence of 1776 (which speaks to God no less than four highly significant times, and makes rights endowed by our Creator the pivot of its argument) — it is a manifest distortion of historically anchored truth we know or should know to pretend that faith in God is an inevitable prelude to tyranny. (And yes, we are aware of and address the sad history of the sins of Christendom, cf. here on. The problem is that we are not dealing with balance here, but a persistently repeated one-sided litany designed to stir up fear, suspicion and even hate leading to destructive anger. Instead, let us state the obvious: no influential movement of consequence in history will not have its record of sins as amidst wheat poisonous tares will forever spring up. As humans we are finite, fallible, morally and intellectually struggling, and too often ill-willed and even hypocritical. The moral hazards of being human which we must all struggle with. Hence Jesus’ counsel on planks in one’s own eye: first remove the plank then you can see clearly to help the other with the sawdust in his eye.) . . . if I cannot but wish to receive good, even as much at every man’s hands, as any man can wish unto his own soul, how should I look to have any part of my desire herein satisfied, unless myself be careful to satisfy the like desire which is undoubtedly in other men . . . my desire, therefore, to be loved of my equals in Nature, as much as possible may be, imposeth upon me a natural duty of bearing to themward fully the like affection. From which relation of equality between ourselves and them that are as ourselves, what several rules and canons natural reason hath drawn for direction of life no man is ignorant . . . [Hooker then continues, citing Aristotle in The Nicomachean Ethics, Bk 8:] as namely, That because we would take no harm, we must therefore do none; That since we would not be in any thing extremely dealt with, we must ourselves avoid all extremity in our dealings; That from all violence and wrong we are utterly to abstain, with such-like . . . ] [Eccl. Polity, preface, Bk I, "ch." 8, p.80.] 5 –> These facts are not exactly obscure or hard to learn, so there is no excuse for the sort of persistently willful distortion and projections that we are seeing, which are now manifesting themselves in cases of abuse of law, administrative power and influence, here to impose a characteristic mark of growing tyranny — undue censorship of public education. 6 –> Where, patently, there is nothing that is genuinely obscene or unduly offensive in the following inscription which was removed due to agitation, without proper accountability: “The Nature Lab is a gift to Los Angeles to celebrate all of God’s creatures and enable NHM to broaden our understanding of the natural world through the process of scientific discovery.” Anonymous Donor 2013 7 –> So, we have serious grounds for now applying the mirror psychology principle to Coyne et al and their censorship. 8 –> Obviously, such fear God and fear that the world of nature and of human experience of the inner and outer world is so replete with signs that point to God and to our duty under him, that to advance their agenda of teenager rebellion writ large, they must do everything to induce us to fear, loathe, suspect and exclude God from our reckoning and to act with hostility to those who act through acknowledging God. (Cf here on and here on in context.) 10 –> Where, obviously, such anger and threatening attitudes are easily projected to others who are designated, stereotypical, strawmannised scapegoats. Which in today’s age, increasingly obviously, is what Christians — let’s be direct — are typically set up to be by radical secularists. 11 –> And as Aristotle warned, in The Rhetoric Bk I ch 2, when he discussed the persuasive power of pathos, ethos and logos, our judgements when we are pleased and friendly are very different from those we make when we are pained and angry. 12 –> So, it is time to expose the attitudes and behaviours of Coyne and others who are already resorting to and cheering on censorship, that they are beginning to build up the same pattern of “a long train of abuses and usurpations” that dismisses concerns and remonstrance, that warrants taking serious action to carry out reformation in the teeth of those who by their persistent behaviour — cf the case in view here, outright censorship — show themselves threats to liberty and self-determination and self-government of and by a free people. >>_________________ Folks, the warning signs and flags are going up all around. Time to take heed, before things spin utterly out of control. END PS: By way of a small push-back to Coyne et al and FFRF et al also at , let me put up two 101 level videos that speak to the general public. Excellent news! This was the right decision by the administrators. I have already received an email from a colleague at the Museum and this are in fact great news. I know the curators and managers at the Museum played the main role by confronting the administrators, so thanks to them and to those of you who sent emails to the administrators. This looks a lot like a deeply entrenched institutional problem to me.Also, notice this declaration of intent by another commenter, calling himself Kevin Meredith: Here’s what I predicted/speculated in the comments to the first post:“Now, what would be really funny is if there’s enough of an outcry, or anonymous is outed or something, so that he/she/them agrees to let the sign come down, but doesn’t insist on donation refund so as not to look any more ignorant.” The first part seems to have come true. The second part, re. what happens to the money, would be tougher to verify. Anonymous probably won’t ask for a refund of past cash, but I bet they withhold future payments, next year’s grant or whatever. I wonder if these folks understand what they are revealing about themselves in light of their words and the mirror/projection principle given the underlying distortions, strawman tactics and hostile stereotypes? (As in why would someone clinging to a position that has to view/treat others as shown, project to others that they are “ignorant”? And why is he thinking in terms of “out[ing]” people — as in target-painting?) In the face of such a pattern, it is not melodramatic to say: gale warning. It is time for us to pay attention to what is going on and act prudently in good time before the storm hits in full force. END Search This Blog About Me A Caribbean-based applied scientist, educator and strategic change/ transformation advocate and facilitator; speaking out for record and calling to reformation in light of the patently destructive policy/ geostrategic/ propaganda/ spiritual/ moral- cultural and economic agenda tidal waves pounding on our shores with ever-mounting force. In response to which, we must learn the lesson of Ps 32:9: "Be not like a horse or a mule, without understanding, which must be curbed with bit and bridle . . . " As Economic policy is too important to be left to economists, politicians and their spin doctors, kindly cf. a KF 101 series on pivotal macro-economics principles and issues: 78, 79, 80, 81, 82, b/g (NB: pamphlet -- pdf -- here)
{ "pile_set_name": "Pile-CC" }
Range Day with an AR-15 We took some sparkling water cans to the beat laboratory for a little AR-15 action. It was a little anticlimactic--definitely expected more impressive damage. The bad news is a regular neoprene koozie, or even the BSG ONE has no chance of stopping a .223 round. The good news is the rounds sail right through, and your BSG ONE is still ready for action. Aftermath This was cool, BSG ONE wrapped can took a flip, and stuck the landing after a hit from a Springfield XD-S 3.3" 9mm. I give it a 10.
{ "pile_set_name": "Pile-CC" }
The Banff schema and differential diagnosis of allograft dysfunction. The pathological findings on renal allograft biopsy specimens are often complex. By carefully defining the morphological features of acute allograft rejection, the Banff schema provides an important tool for the differential diagnosis of acute allograft dysfunction. This article reviews the criteria for diagnosis of rejection, and its differentiation from other inflammatory infiltrates in renal allograft biopsy specimens.
{ "pile_set_name": "PubMed Abstracts" }
Iran's semi-official ISNA news agency reports the foreign ministry has summoned France's ambassador to Tehran over remarks made on Twitter by his colleague in Washington. Ambassador Philippe Thiebaud was being asked Sunday to explain why the French ambassador to the U.S., Gerard Araud, had tweeted that "sanctions could be reimposed" on Iran once the 2015 nuclear deal expires after 10 years. Araud said Saturday that because "Russia is providing enriched uranium" to Iran, Tehran shouldn't need to be "massively enriching uranium after the JCPOA," using the acronym for the nuclear deal signed with world powers, including France. ISNA says Iran's foreign ministry has called Araud's remarks "unacceptable" and in "open violation" of the nuclear deal. Under the nuclear deal, Iran capped its uranium enrichment activities in return to ending sanctions.
{ "pile_set_name": "OpenWebText2" }
Monika Bravo Monika Bravo (born 1964) is a multi-disciplinary artist born in Bogotá, Colombia, who lives and works in New York City, New York. Her work has been internationally exhibited, including at Stenersen Museum in Oslo; Seoul's International Biennial of New Media Art; Bank of the Republic in Bogotá; New Museum and El Museo del Barrio in New York City and Site Santa Fe. Her work has received acclaim including a 1999 New York Times review which called her piece Synchronicity (from a group exhibition at El Museo del Barrio) a "standout...small, beautifully blurry video images of boats plowing through New York Harbor..." In 1982, Bravo left Bogotá, moving to Rome to study fashion design, which she continued in Paris at Esmod, before traveling to London to study photography. In 1994 she moved to New York where she is currently still based. Career Among Bravo's most well-known artworks is September 10, 2001, Uno Nunca Muere La Vispera dedicated to artist Michael Richards who died in Tower One on the morning of the September 11 attacks. In summer 2001 Bravo was an artist-in-residence in the Lower Manhattan Cultural Council's World Views program. As described in a 2006 book: In 2010, Bravo was one of four winning artists in New York City's "urbancanvas" design competition with her work "Breathing Wall UC". Most recently Bravo Represented the Vatican City in the Pavilion of the Holy See at the 56th International Art Exhibition of the Venice Biennial with her work "ARCHE-TYPES: The sound of the word is beyond sense". With this new work, she continues with her interest in coding/decoding information, the interest in the language of abstraction and an ongoing pursuit to decipher reality by means of perception. She created a parallel between the prologue of the Gospel of John In the Beginning..., (given to her by the curator of the Pavilion, Micol Forti), Malevich’s ideas behind Suprematism* and the definition of Zaum by the avant garde Poet Aleksei Kruchenykh**. Among her most recent exhibitions are Waterweavers curated by José Roca and Alejandro Martín, Art Museum of the Americas, Washington DC 2015, Centro Conde Duque, Madrid 2015 and Bard Graduate Center, New York 2014; Theorem. You Simply Destroy the Image I Always Had of Myself curated by Octavio Zaya, MANA Contemporary, Jersey City NJ 2015; Landscape of Belief (solo), Y Gallery, New York 2015; Affective Architectures, Aluna Art Foundation, Miami FL 2014; URUMU (solo), NC-Arte, Bogotá 2014; Common Ground: Earth, Borusan Contemporary, Istanbul 2014. Public art "Breathing_Wall_UC", installation, City Point, Brooklyn "AN INTERVAL OF TIME_UTA _ COMMISSION", Landmarks Public Art Program, University of Texas at Austin has commissioned a time-based installation for their public art collection "AKA_H2O, A panoramic video installation of flowing water and nature scenes by artist Monika Bravo, is projected across a 60-foot wall creating a visually stimulating ambiance. Selected exhibitions "Urumu" (February 1 - March 29, 2014), NC-arte, Bogotá, Colombia "Monika Bravo: New Work" (September 22, 2013 – May 4, 2014), Montclair Art Museum, Montclair, New Jersey, United States "Solo Projects LABORATORIUM -ARTBO", Y GALLERY, curated by Jose Roca, (Oct. 17 2013, Bogota) "Monika Bravo: Landscape(s) of Belief" (September 6, 2013 – March 15, 2014), Brigham Young University Museum of Art, Provo, Utah, United States "The Storytellers: Narratives in International Contemporary Art" (August 30 - November 4, 2012), Stenersen Museum, Oslo, Norway "Paladar in Third Streaming" (October 24, 2012), Third Streaming, New York City, New York, United States "Tracing the Unseen Border" (April 21 - May 22, 2011), La Mama La Galleria, New York City, New York, United States "'Tawkin' New Yawk City Walls" (2005), Hillwood Estate, Museum & Gardens, Washington, D.C., United States "Frequency + Repetition" (January 13 - February 26, 2005), Bryce Wolkowitz Gallery, New York City, New York, United States "Playing with Time" (September 28, 2002 – January 25, 2003), SITE Santa Fe, Santa Fe, New Mexico, United States "A_Maze" (April 26 - May 25, 2002), De Chiara Gallery, New York City, New York, United States "World Views: Open Studio Exhibition" (December 1, 2001 – January 13, 2002), New Museum, New York City, New York, United States "The S-Files" (1999), El Museo del Barrio, New York City, New York, United States Publications Monika Bravo, Gabriel Cure, Juan Luque (ed.), Gabriel Cure Lemaitre La Arquitectura del Detalle, Two Leaves Editions 2012 Ricardo Cisneros, Between Two Worlds, Two Leaves Editions 2011 (Design by Monika Bravo) Stephan Apicella-Hitchcock, Naomi Ben-Shahar, Monika Bravo, Patty Chang, Site Matters: The Lower Manhattan Cultural Council's World Trade Center Artist Residency 1997–2001, LMCC 2004 References Category:Colombian women artists Category:Colombian artists Category:Living people Category:1964 births Category:People from Bogotá
{ "pile_set_name": "Wikipedia (en)" }
Mosquitto is an open source message broker that implements the MQ Telemetry Transport protocol version 3.1 and 3.1.1 MQTT provides a lightweight method of carrying out messaging using a publish/subscribe model. This makes it suitable for "machine to machine" messaging such as with low power sensors or mobile devices such as phones, embedded computers or micro-controllers like the Arduino.
{ "pile_set_name": "Pile-CC" }
Yasnippet: TextMate snippets for Emacs - pookleblinky http://code.google.com/p/yasnippet/ ====== KirinDave I use this library and like it. Snippet-like functuonality a one of the things that got TextMate as much attention as it received. It's particularly nice when you have Emacs's terrific electric mode on along with yasnippet working with a relevant set of snippets. Code just magically Ppesrs in screen, perfectly formatted. ------ grandalf I have to recommend technomancy's starter kit. I've been using it (and slowly customizing it to my own needs as I learn emacs) for the past couple of months. <http://github.com/technomancy/emacs-starter-kit/tree/master> Some of the forks include yasnippet as well, which I too use. ------ dagobart found yasnippet some days back, also that Chrononaut provides snippets “automatically converted from the TextMate repository” to be used with the yasnippet. blogged a tiny howto to get it running. <http://is.gd/ruUx> ------ larrywright I've been using this in my Emacs setup for a while now. It's really nice, and works like a charm. ------ JoshRosen I'm a vim user and I've been using snipMate: <http://github.com/meese/snipmate.vim/tree/master>
{ "pile_set_name": "HackerNews" }
Ahead of Mother’s Day next weekend, Apple’s weekly Apple Pay promotions have made a return. This time, Apple is offering $15 off at 1-800-Flowers when you shop the “Mother’s Day Collection” and checkout with Apple Pay. The promotion applies to both the 1-800-Flowers website as well as the app, with Apple Pay being available as a checkout option in both places. The offer is valid from May 2nd through May 10th and cannot be used in conjunction with other discounts or promotions. Here are the full terms and conditions for the promo: Get $15 off special Gift Collection purchases when you use Apple Pay in the 1-800-Flowers app or on 1800Flowers.com. Offer valid May 2, 2019, through May 10, 2019, until 11:59 p.m. ET. Some restrictions and exclusions apply (based on availability or other factors). Terms apply to special Gift Collection and cannot be combined or used with other discounts or promotions. Apple Pay offered a similar promotion for Mother’s Day last year, so it’s nice to see the offering continue this year. Mother’s Day is on May 12th this year. Head to 1-800-Flowers on the web or download the app from the App Store to lock in these savings. Read more: FTC: We use income earning auto affiliate links. More. Subscribe to 9to5Mac on YouTube for more Apple news:
{ "pile_set_name": "OpenWebText2" }
Apple, Openness, and the iPhone Yesterday, Apple released potentially one of the most interesting devices in computing history. The combination of mobility, relatively good power, rich OSX APIs, and multiple types of connectivity and sensors (phone, bluetooth, wifi, proximity, location, visual, audio, and orientation) could result in some truly spectacular new classes of applications. Unfortunately, it appears that they’re making their most classic blunder once again: locking out third parties. We have the opportunity to make ourselves heard, and request that Apple open the iPhone to third party developers. The only avenue of communication Apple leaves open to developers is Radar, their bug tracking system. Jonathan ‘Wolf’ Rentzch has filed an initial bug report on the topic, which he describes here. I strongly suggest that anyone interested in open application development on the iPhone (or being able to use third party applications on the iPhone) follow his lead and file additional requests at bugreport.apple.com (Please be polite though; ticket techs are people too!). A sample bug report (filed by our own Augie Fackler) is below: Summary: You can’t do any development for the iPhone. Steps to Reproduce: 1. Write a cool app2. Try to compile for iPhone Expected Results: A binary that should work in the spiffy iPhone. Actual Results: No way to compile for the iPhone exists, so no binary is produced Regression: None known. Notes: This is the same as Rentzsch’s bug rdar://problem/4917169 to make your life easier when you flag this as a duplicate. This entry was posted on Wednesday, January 10th, 2007 at 5:23 PM by David Smith and is filed under Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed. I’ve seen this mentioned in two places now (if you include this blog) but not in any official Apple statements. Is there any hard evidence that this is the case? Are you just assuming that because Apple didn’t release an update to their dev tools for the iPhone that it won’t happen? Apple probably isn’t ready to release a whole development kit yet. It would require a bunch of new tools like emulators, new documentation, etc.. I also made a suggestion about this via RDAR. It’s interesting to note that issues surrounding 3rd party apps on phone has been addressed in several ways. Qualcomm, the company I work for introduced BREW which uses comprehensive application review and signing to control which apps can be deployed to phones. The BREW platform also helps developers and the carrier collect their money and allows for trial and subscription periods. Apple could use a similar model. Another useful model to look at is the one that the game console guys use — plenty of 3rd party development but only 1st party approval and deployment. Buy the app via iTunes (like the new games for iPod). They only make available what they approve of and want to sell. It’s not ideal and as open as I’d like but would give us 3rd party guys a crack at putting some great stuff on the iPhone IMHO. I think it was a nice move for apple to come out with the apple iPhone. The iPhone has most features consumers have been waiting to have. I also think the price will not deter people from buying the Apple iPhone. I even think they will sell more then the 10 million Apple iPhones they expect to sell within the next year. Did you happen to see the iPhone demo video they can’t go wrong. Apple have done this for a reason, it’s not an oversight. Whether we agree or not is rather beside the point; they will have known the reaction to this when they made the decision. So, this can’t be a good idea – it’ll just gum up a functional system with barely relevant feedback on what is in all likelihood a done-and-dusted decision. Anyway, one of the interviews I read with Steve or Phil suggested that the phone was closed ‘for now’, and that they might possibly allow an iTunes-driven software distribution model in the future. Read: no crappy software, development probably by invitation only, you’ll likely have to pay. I haven’t quite decide whether this is a good thing or a bad thing, since I can understand both point of views. Maybe the deciding factor will be the market? As developers we often forget about the varying needs that we have as developers and those that are defined by the general public. Certainly they aren’t always incompatible, but experience shows that developers want something that is infinitly hackable, while the average person wants something that does the job advertised, without having to refer to the manual every five minutes. Remember the iPod has been very popular despite its lack of software extensions. While Apple has decided to close off the iPhone to third-party developers, it is possible that once they are happy with the stability of the phone they may change their stance? Once the phone is out people will most probably ways to install Linux on the phone or back doors to installing their own software, without the blessing of Apple (warantee invalidation). Its been done for many other things. Some experiences to consider: I have a friend who’s smartphone would crash while talking because of some buggy software, and this is not what is expected from a phone. Actually I can remember people wondering whether he was joking, until it crashed in front of them. It should also be noted that there is an experience being sought after, and when you see some of the half-hearted port jobs of applications running in Windows CE (UIs which aren’t suitable for the device, etc), you wonder that maybe this does have its advantages.
{ "pile_set_name": "Pile-CC" }
Support for Relatives Bereaved by Psychiatric Patient Suicide: National Confidential Inquiry Into Suicide and Homicide Findings. International suicide prevention strategies recommend providing support to families bereaved by suicide. The study objectives were to measure the proportion of cases in which psychiatric professionals contact next of kin after a patient's suicide and to investigate whether specific, potentially stigmatizing patient characteristics influence whether the family is contacted. Annual survey data from England and Wales (2003-2012) were used to identify 11,572 suicide cases among psychiatric patients. Multivariate regression analysis was used to describe the association between specific covariates (chosen on the basis of clinical judgment and the published literature) and the probability that psychiatric staff would contact bereaved relatives of the deceased. Relatives were not contacted after the death in 33% of cases. Contrary to the hypothesis, a violent method of suicide was independently associated with greater likelihood of contact with relatives (adjusted odds ratio=1.67). Four patient factors (forensic history, unemployment, and primary diagnosis of alcohol or drug dependence or misuse) were independently associated with less likelihood of contact with relatives. Patients' race-ethnicity and recent alcohol or drug misuse were not associated with contact with relatives. Four stigmatizing patient-related factors reduced the likelihood of contacting next of kin after patient suicide, suggesting inequitable access to support after a potentially traumatic bereavement. Given the association of suicide bereavement with suicide attempt, and the possibility of relatives' shared risk factors for suicide, British psychiatric services should provide more support to relatives after patient suicide.
{ "pile_set_name": "PubMed Abstracts" }
Clinical Issues-February 2017. Implementing surgical smoke evacuation practices Key words: surgical smoke, compliance, health effects, smoke evacuators. Surgical smoke evacuation policies and procedures Key words: surgical smoke, smoke evacuation, policy, procedure. Measuring compliance with surgical smoke evacuation practices Key words: surgical smoke, smoke evacuation, compliance. Patient safety and hand hygiene Key words: hand hygiene, hand wash, hand rub, patient safety, point of use.
{ "pile_set_name": "PubMed Abstracts" }
Parliament on Tuesday approved a resolution to support a European initiative by the Szekler National Council on the protection of national regions. The proposal by green opposition LMP, supported by the ruling parties, right-wing opposition Jobbik and by the Socialists, was approved unanimously with 158 votes in favour. The decision has symbolic significance given 2020 has been declared a year of national cohesion one hundred years after the Trianon Treaty was signed, the resolution states. The Szekler National Council fought for six years to achieve a European court ruling which obliged the European Commission to consider a proposal submitted for the European initiative. In line with the resolution, Parliament welcomes the initiative dubbed European Citizens’ Initiative for the Equality of the Regions and Sustainability of the Regional Cultures which aims to convince the European Union to pay special attention to regions whose national, ethnic, cultural, religious and ethnic characteristics are different from those of the surrounding regions. Parliament calls on Hungarians inside and outside Hungary to support the initiative with their signature. For the initiative launched on May 7 last year to be successful, at least one million supporting signatures are needed from seven member states by May 7 this year. After the vote, Katalin Szili, the prime minister’s commissioner, urged public support for the European initiative. She said that Europe has 400 ethnic minorities and one out of seven EU citizens belongs to an indigenous or regional minority, and called on ethnic Hungarian communities and organisations in the diaspora to promote the initiative. Featured photo illustration by Balázs Mohai/MTI
{ "pile_set_name": "OpenWebText2" }
Frequent homozygous deletions in lung cancer cell lines detected by a DNA marker located at 3p21.3-p22. Frequent allelic losses of chromosome 3p in lung cancer have been reported in a number of studies, and we previously demonstrated that 3p21.3 is one of the common regions of deletion in lung cancers and renal cell carcinomas. To further define a region containing the putative tumor suppressor gene, we performed Southern-blot analysis of 26 small cell lung cancer (SCLC) cell lines and ten non-small cell lung cancer (NSCLC) cell lines with 40 cosmid markers located at 3p21.3-p22. One marker detected homozygous deletions of four SCLC cell lines and one NSCLC cell line. None of the other markers revealed homozygous deletions or chromosomal rearrangements in these cell lines. The region of homozygous deletion described here is estimated to consist of less than 1 megabase of DNA, and it is very likely to contain at least one of the tumor suppressor genes associated with carcinogenesis of lung cancer and, possibly, renal cell carcinoma.
{ "pile_set_name": "PubMed Abstracts" }
The present invention relates generally to a reference voltage source and more particularly to a reference voltage source that provides a plurality of reference voltages with equal step size between voltages despite loads connected to the reference voltage source. A plurality of reference voltages with equal step size between voltages are often used in analog-to-digital converters (ADC) where an input voltage is compared to the reference voltages through comparators. Typically generated by passing a current I.sub.r through many serially connected resistors R.sub.r, as shown in FIG. 1, these reference voltages are produced at nodes or junctions between the resistors. Unfortunately, with comparators or other loads connected to the nodes, load currents I.sub.L are drawn from the nodes and these load currents in turn change the values of the reference voltages at the nodes. One method of preventing variations in the reference voltages due to load currents is to connect an extra voltage source V.sub.o to one of the nodes, as shown in FIG. 2. However, in a typical monolithic analog-to-digital converter, a reference source that provides 64 or more different reference voltages would require many extra voltage sources to hold all the reference voltages constant. This would undesirably increase the power consumption and the cost and complexity of the circuit. FIG. 3 shows a method of providing constant reference voltages by means of unequal resistor values. The value of each resistor is determined according to the amount of load current which the circuit designer expects to be drawn through that resistor. As a first order approximation, the value of a given resistor is equal to EQU R.sub.r *(1-n*(I.sub.L /I.sub.r)) where n represents the location of the resistor with respect to the current source. This method fails if the load current I.sub.L is different from the expected value, for example due to fluctuations in the manufacturing process, or if the load current changes with time, for example due to temperature variations. Another drawback of this method is that resistors, with values different from each other, having the required precision are much more difficult to implement, especially in integrated circuit technologies, than resistors with values equal to each other. To reduce the reference voltage error due to the load currents, FIG. 4 shows another method which feeds in compensation currents, as described in U.S. Pat. No. 4,804,941, issued to Yoji Yoshii on Feb. 14, 1989. This method simulates and offsets the load currents I.sub.L by a complex active compensation circuit CC that is made of three current mirrors, each current mirror replicating the input currents of 64 comparators. This approach is complex and difficult to implement economically. Various devices using the above methods have been known for a number of years, and by way of examples, forms of such devices can be found in IEEE Journal of Solid-State Circuits, Vol SC-17, No. 6, Dec. 1982, page 1133 to 1138. It is apparent from the foregoing that there is still a need for an efficient reference voltage source that can provide a plurality of reference voltages with equal step size between voltages despite loads connected to the reference voltage source and that can be effectively and economically implemented with various fabrication technologies.
{ "pile_set_name": "USPTO Backgrounds" }
According to a new survey of world penis size by Mandatory.com, a factual look at penis size offers a wake-up call for a universally size-obsessed culture. There’s just one problem: The data in the infographic is largely the result of blatantly flawed methodology and horrifically racist research. The Mandatory infographic is just one of many infographs in recent years that have attempted to divide the world in terms of penis size. According to Mandatory’s quick survey, the average world penis size is 5.5 inches. Out of the 80 countries referenced in the survey, the U.S. hovers near the bottom, clocking in at No. 61 with an average of 5.1 inches, while Congolese men of the DRC have the largest average penis length at 7.1 inches. The attempt to generate a cross-section of global penis size involves looking at numerous previous infographics and surveys. But when we look closer, most of the, erm, hard evidence used to generate this and other global size charts turns out to be utter bollocks. Most of the data used to generate “global” statistics about size comes from faulty or unreliable reporting. In many instances, the sources Mandatory and other websites used to generate statistics about international dick size relied on self-reporting or estimates given by men about the sizes of their own penis. In scientific studies, self-reporting is extremely unreliable, even when you’re not reporting something as highly fraught as penis size. Some studies have even shown that men perceive their own penises to be smaller than they actually are. And there’s an even bigger problem. (Sorry.) Many of the research studies in the field have been built off the inherently flawed racist work of a researcher named J. Philippe Rushton. Rushton, whose theories flourished during the ’80s, created a line of research to justify his belief that various cultures evolved to prioritize various systems of reproduction. He argued that Asian cultures evolved small penises because the cultures emphasized smaller families and higher intelligence, while boorish African cultures evolved larger penises in order to emphasize rapid reproduction rates and low intelligence rates. Not only is this theory an obviously false stereotype, but it’s based on flawed research. In order to find arguments for his racist theories, Rushton cited everything from decades-old obsolete research to issues of Penthouse magazine. But as appalling as this might seem, his research has been built on and added to as recently as 2012, in a roundly criticized study from researcher Richard Lynn that used irrelevant studies on rats to argue that testosterone levels differed for men around the globe. In both the Rushton and Lynn research, the happy middle between “most evolved” and “least evolved” was, of course, European and American societies. Psychology Today, in roundly criticizing both Rushton and the new theory, dubbed this the “Goldilocks Effect,” because of the way it positions white culture as the perfect medium between two extremes. How convenient. One thing the Mandatory chart does make clear, apart from perpetuating racist myths about size, is that the global average really is smaller than most men think. One study, which lasted 60 years and included results from more than 50 international research efforts, concluded that the average penis size, regardless of country of origin, is 4.7 to 5.1 inches. Proper self-measurements are taken from the tip of the penis to the base of the shaft. A quick glance at the popular Tumblr measureyourcock, dedicated to self-measurements, shows that most penises submitted fall into the average five-inch category. So, for the record, all the racist jokes you’ve ever heard about penis size are still false and degrading stereotypes. And trying to argue national superiority based on an inaccurate chart on the Internet makes you the biggest dick of all. Photo via Wikimedia Commons (CC BY SA 3.0)
{ "pile_set_name": "OpenWebText2" }
Wenckebach-type exit block from an ectopic focus as a cause of variable coupling. Intermittent bigeminal and trigeminal ventricular premature beats were recorded in an otherwise healthy 14 year old male. Coupling intervals progressively lengthened until an ectopic beat was dropped. Odd numbers of sinus beats occurred between bigeminal runs. This rhythm is interpreted as being due to Wenckebach-type block in an exit pathway from the ectopic focus, resulting in concealment of the persistently active extrasystolic mechanism.
{ "pile_set_name": "PubMed Abstracts" }
Trends in the community dental service 1980-1990. The recent past has seen many changes that have had an impact on the dental care of children: for example, demographic changes, changes in the prevalence of dental caries, changes in manpower and changes in the organisation of dental services. The community dental service (CDS) in particular has had a major role to play in the provision of care to many children in this country. An analysis of the statistical returns to the Department of Health for the community dental services in England and Wales for the years 1985-1990 shows that staffing in the CDS has declined from 1,544 (Whole Time Equivalents--WTE) to 1,309 (WTE) in 5 years. The total clinical hours worked has also reduced from 2.02 million to 1.59 million in ten years. Hours spent on administration have increased from 53,490 to 87,091 in the same period. Clinical time spent on treating handicapped adults has increased almost ten fold from 14,644 hours in 1980 to 122,463 hours in 1990. Time devoted to mother and child (pre-school) services in about the same as in 1985. Hours spent on school services have reduced from a peak of almost 2 million in 1985 to 1.38 million in 1989-90. Trends in eight aspects of dental treatment are presented.
{ "pile_set_name": "PubMed Abstracts" }
Proteases are among the technically most important of all enzymes. For washing and cleaning agents they are the longest-established enzymes, contained in practically all modern high-performance washing and cleaning agents. They cause the breakdown of protein-containing stains on the material to be cleaned. Among these in turn, proteases of the subtilisin type (subtilases, subtilopeptidases, EC 3.4.21.62), which are categorized among the serine proteases because of the catalytically effective amino acids, are particularly important. They act as nonspecific endopeptidases and hydrolyze any acid-amide bonds that are located within peptides or proteins. Their optimum pH is usually in the markedly alkaline range. An overview of this family is offered, for example, by the article “Subtilases: subtilisin-like proteases” by R. Siezen, in “Subtilisin enzymes” pp. 75-95, edited by R. Bott and C. Betzel, New York, 1996. Subtilases are formed naturally by microorganisms; among them, the subtilisins formed and secreted by Bacillus species are to be mentioned in particular as the most significant group within the subtilases. Examples of proteases of the subtilisin type used with preference in washing and cleaning agents are the subtilisins BPN′ and Carlsberg, protease PB92, subtilisins 147 and 309, the protease from Bacillus lentus, in particular from Bacillus lentus DSM 5483, subtilisin DY, and the enzymes (to be classified, however, as subtilases and no longer as subtilisins in the strict sense) thermitase, proteinase K, and the proteases TW3 and TW7, as well as variants of the aforesaid proteases that exhibit an amino acid sequence modified as compared with the initial protease. Proteases are modified, in controlled or random fashion, using methods known from the existing art, and are thereby optimized, for example, for use in washing and cleaning agents. These include point mutagenesis, deletion or insertion mutagenesis, or fusion with other proteins or protein parts. Correspondingly optimized variants are thus known for most proteases known from the existing art. The International Patent Application WO 03/054185 discloses alkaline proteases from Bacillus gibsonii (DSM 14391), including for use thereof in washing or cleaning agents. This strain was deposited on Mar. 1, 2001, in accordance with the Budapest Treaty on the International Recognition of the Deposit of Microorganisms of Apr. 28, 1977, at the German Collection of Microorganisms and Cell Cultures [Deutsche Sammlung von Mikroorganismen and Zellkulturen GmbH], Inhoffenstrasse 7B, D-38124 Braunschweig under the designation ID 01-192 and entry number DSM 14391. These proteases exhibit considerable differences in amino acid sequence as compared with the proteases recited above, so that an identity comparison of the amino acid sequences yields identity values that are below 80% identity. For the alkaline proteases from Bacillus gibsonii (DSM 14391), only a few protease variants optimized for use in washing and cleaning agents are so far known in the existing art.
{ "pile_set_name": "USPTO Backgrounds" }
Grus pagei Grus pagei is an extinct crane reported from the upper Pleistocene asphalt deposits of Rancho La Brea, Los Angeles, California. It is one of three cranes present at Rancho La Brea, the others being the living whooping crane (Grus americana) and sandhill crane (Grus canadensis). It is the smallest of the three cranes, and it had a relatively longer, more slender skull than the living cranes. At least 11 individuals are represented by 42 fossil bones. Described by Kenneth E. Campbell Jr. in 1995, it was named after the philanthropist responsible for the museum at the tar pits, George C. Page. References Category:Grus (genus) Category:Fossil taxa described in 1995 Category:Pleistocene birds Category:Pleistocene birds of North America
{ "pile_set_name": "Wikipedia (en)" }
Institute of Astronomy, Cambridge The Institute of Astronomy (IoA) is the largest of the three astronomy departments in the University of Cambridge, and one of the largest astronomy sites in the UK. Around 180 academics, postdocs, visitors and assistant staff work at the department. Research at the department is made in a number of scientific areas, including exoplanets, stars, star clusters, cosmology, gravitational-wave astronomy, the high-redshift universe, AGN, galaxies and galaxy clusters. This is a mixture of observational astronomy, over the entire electromagnetic spectrum, computational theoretical astronomy, and analytic theoretical research. The Kavli Institute for Cosmology is also located on the department site. This Institute has an emphasis on The Universe at High Redshifts. The Cavendish Astrophysics Group are based in the Battcock Centre, a building in the same grounds. History The Institute was formed in 1972 from the amalgamation of earlier institutions: The University Observatory, founded in 1823. Its Cambridge Observatory building now houses offices and the department library. The Solar Physics Observatory, which started in Cambridge in 1912. The building was partly demolished in 2008 to make way for the Kavli Institute for Cosmology. The Institute of Theoretical Astronomy, which was created by Fred Hoyle in 1967. Its building is the main departmental site (the Hoyle Building), with a lecture theatre added in 1999, and a second two-storey wing built in 2002. From 1990 to 1998, the Royal Greenwich Observatory was based in Cambridge, where it occupied Greenwich House on a site adjacent to the Institute of Astronomy. Teaching The department teaches 3rd and 4th year undergraduates as part of the Natural Sciences Tripos or Mathematical Tripos. Around 30 students normally study the Masters which consists of a substantial research project (around 1/3 of the Masters) and students have an opportunity to study courses such as General Relativity, Cosmology, Black Holes, Extrasolar Planets, Astrophysical Fluid Dynamics, Structure and Evolution of Stars & Formation of Galaxies. In addition, there are around 12 to 18 graduate PhD students at the department per year, mainly funded by the STFC. The graduate programme is particularly unusual in the UK as the students are free to choose their own PhD supervisor or adviser from the staff at the department, and this choice is often made as late as the end of their first term. Notable current staff A (incomplete) list of notable current members of the department. Cathie Clarke Carolin Crawford Andrew Fabian Paul Hewett Christopher Reynolds (Plumian Professor of Astronomy) George Efstathiou Gerry Gilmore Douglas Gough Richard G. McMahon Max Pettini James E. Pringle Martin Rees Anna Zytkow Notable past members and students Here are some notable members of the Department and its former institutes. Suzanne Aigrain George Airy Robert Stawell Ball James Challis John Couch Adams Donald Clayton Arthur Eddington Richard Ellis Stephen Hawking Fred Hoyle Jamal Nazrul Islam Harold Jeffreys Donald Lynden-Bell Jayant Narlikar Jeremiah Ostriker Robert Woodhouse Telescopes The Institute houses several telescopes on its site. Although some scientific work is done with the telescopes, they are mostly used for public observing and astronomical societies. The poor weather and light-pollution in Cambridge makes most modern astronomy difficult. The telescopes on the site include: The Northumberland Telescope donated by the Duke of Northumberland in 1833. This is a diameter refractor on an English mount. The smaller Thorrowgood Telescope, on extended loan from the Royal Astronomical Society. The telescope is an refractor. The 36-inch Telescope, built in 1951. The Three-Mirror Telescope, which is a prototype telescope with a unique design to have wide field of view, sharp images and all-reflection optics. The Institute's former 24" Schmidt Camera was donated to the Spaceguard Centre in June 2009. The Cambridge University Astronomical Society (CUAS) and Cambridge Astronomical Association (CAA) both regularly observe. The Institute holds public observing evenings on Wednesdays from October to March. Public activities The department holds a number of events involving the general public in astronomy. These include/ have included: Open evenings on Wednesdays during the winter, from October to March, with a talk given by a member of the Institute followed by observing in clear weather Hosting the Astroblast conference Annual sculpture exhibition showing work of Anglia Ruskin University Annual open day during the Cambridge Science Festival A monthly podcast, the 'Astropod', aimed at the general public (last published episode July 2011) Extra observing nights for special events such as IYA Moonwatch and BBC stargazing live Library The Institute library is housed in the old Cambridge Observatory building. It is a specialist library concentrating on the subjects of astronomy, astrophysics and cosmology. The collection has approximately 17,000 books and subscribes to about 80 current journals. The Library also has a collection of rare astronomical books, many of which belonged to John Couch Adams. Achievements Among the significant contributions to astronomy made by the institute, the now decommissioned Automatic Plate Measuring (APM) machine was used to create a major catalogue of astronomical objects in the northern sky. References External links Institute of Astronomy at the University of Cambridge Kavli Institute of Cosmology, Cambridge Images from the Institute of Astronomy Library Category:Astronomy institutes and departments Astronomy, Institute of Category:Research institutes in the United Kingdom Category:Astronomy in the United Kingdom Category:Educational institutions established in 1972
{ "pile_set_name": "Wikipedia (en)" }
US AIPAC AIPAC If there is something unique about this story it is the level of interest that it has generated. Neither spying, nor the influence peddling is new; but until professors John Mearsheimer and Stephen Walt broke the silence on the lobby’s influence, few were willing to discuss either. Things have moved on considerably since. Many fine books have come out in recent years that have shed light on the lobby’s operations, specifically on its frequently decisive role in shaping US Middle East policy. No analyst however has been as tenacious as Grant F. Smith of the Institute for Research: Middle Eastern Policy (IRMEP) who in a series of books has brought crucial new information to light through the use of the Freedom of Information Act. His latest, America’s Defense Line: the Justice Department’s Battle to Register the Israel Lobby as Agents of a Foreign Government, focuses on an important aspect of the lobby’s origins that has implications for how it operates today. Supporters of the Israel lobby have long maintained that the reason it does not have to register as an agent of a foreign government is that its funding and composition are indigenous to the US. Even critics such as Mearsheimer and Walt have declared its operations “as American as apple pie.” However, as Smith reveals, the lobby was only able to turn into the powerhouse it is today because of the start-up funding it received from Israel and its ability — through stonewalling, deception and subversion of the legal process — to stave off the State Department and the Department of Justice’s attempts to have it registered as a foreign agent. In fascinating detail supported by hundreds of declassified documents (reproduced in the Appendix) Smith reveals the various mechanisms it employed to avoid the purview of the Foreign Agents Registration Act (FARA). The lobby’s greatest success — to propagate the myth that Israel and the US have identical interests and common enemies — would not have been possible had the Department of Justice succeeded in securing its compliance with FARA. This law requires entities registered under it to mark all their informational material with the disclaimer that their author is the agent of a foreign government. Central to Smith’s investigation is the person of Isaiah L. Kenen, the Canadian-born founder of the American Israel Public Affairs Committee (AIPAC), whose brief stint as a journalist segued into his long lobbying career. (It is from Kenen’s 1980 history of the lobby, Israel’s Defense Line: Her Friends and Foes in Washington, that Smith draws the title of his book. If for Kenen the lobby was Israel’s defense line, for Smith the US judicial system is America’s.) Kenen began as the director of information for the American Emergency Committee for Zionist Affairs but after the creation of Israel he went on to work for the Israeli embassy’s Office of Information as a press officer. Already in the late 1940s, writes Smith, Kenen began probing the FARA unit for weaknesses, keenly aware that its restrictions would never allow him “to properly ‘frame’ issues in a sophisticated way that transformed and sold their presentation from Israeli needs to perceived American interests.” He therefore left the Office of Information and joined the American Zionist Council (AZC) as Israel’s domestic lobbyist. The AZC had recently delegated the activities previously carried out by the Jewish Agency at David Ben Gurion’s suggestion in order to bolster the appearance of “indigenous American control.” However, it faced a formidable challenger in the anti-Zionist American Council of Judaism (ACJ), which rejected “all those self-appointed spokesmen who presume to make their partisan claims in the name of all Americans of the Jewish faith.” It was the ACJ that finally took the AZC’s case to the Justice Department, eventually forcing it to register under FARA. This led Kenen to form the American Zionist Public Affairs Committee, soon to be subsumed by AIPAC, as a means of escaping FARA regulations. He also founded a biweekly publication, Near East Report, which introduced many of the themes familiar from the Israel lobby’s recent propaganda. The publication was underwritten by the Jewish Agency, the executive arm of the World Zionist Organization headquartered in Jerusalem. The Justice Department’s drawn-out struggle to register the lobby under FARA is chronicled by Smith in remarkable detail. These efforts were given a boost first by the Dwight D. Eisenhower administration (deeply resented by Kenen), which would withdraw the AZC’s tax-exempt status, and subsequently by John F. Kennedy, whose Justice Department would eventually lead the AZC to register under FARA. Throughout this period the AZC had to rely on funding from the Jewish Agency. The growing scrutiny only spurred the lobby to devise more sophisticated means of masking this funding through the use of various offshore shell corporations which laundered back tax-exempt aid first raised in the US. Once these mechanisms were revealed during the Fulbright hearings, however, the lobby finally switched to domestic funding. The dogged attempts by Department of Justice officials such as Irene Bowman and Nathan Lenvin eventually came to naught when the assassination of Kennedy led the new Attorney General Nicholas Katzenbach to go with the prevailing winds (decidedly pro-Israel under president Lyndon Johnson) and scrap the investigation. Smith also details the strong anti-Zionist current that characterized American Jewry before it was eventually overwhelmed by the better resourced Zionist factions. The initial charge against the Israel lobby was led by the American Council of Judaism, which was headed by reform rabbis such as Elmer Berger, and Jewish universalists such as the philanthropist Lessing Rosenwald. When The Wall Street Journal reported that Attorney General Robert F. Kennedy was concerned about offending “Jewish opinion,” he was deluged with letters from American Jews rejecting the notion as a myth. They saw themselves first and foremost as Americans and they wanted Kennedy to do all that he felt was necessary to protect US interests, including registering the lobby as a foreign agent. However, after the 1967 war, Jewish anti-Zionism would go into hibernation until its revival four decades later by the Iraq war and the role of the mostly Jewish neoconservatives in instigating it. Despite a 90 page appendix including useful profiles of the various organizations, key declassified documents, samples of racist cartoons published by Near East Report, and a history of incidents related to FARA enforcement, the book could have benefited from adding a concise chronology of events. Better editing could have also eliminated some of its repetitiveness and reduced the confusion that results from the sometimes non-linear narrative style. Nevertheless, the writing remains engaging throughout and the analysis is invariably sharp. In the wake of the Harman-AIPAC spy affair, calls have intensified for the leading Israel lobby institution to be registered as an agent of a foreign state. The lobby, as one of its stalwarts colorfully put it, is like a “nightflower” which wilts in the sunlight. Those seeking justice for the Palestinians and accountability for the disastrous course of foreign and domestic policy under the lobby’s tutelage could do worse than to ensure constant sunlight. Given the nature of the scandal, the Department of Justice is susceptible to public pressure and thanks to Smith’s indispensable work, we are privy to the means employed by the lobby to thwart similar investigations in the past. Armed with this information, it may finally be possible to uphold what Smith calls “America’s defense line” — the US laws that govern the operations of foreign agents. Muhammad Idrees Ahmad is the co-founder of Pulsemedia.org. He can be reached at m.idrees A T gmail D O T com. Related Links
{ "pile_set_name": "OpenWebText2" }
#ifndef BOOST_SERIALIZATION_ASSUME_ABSTRACT_HPP #define BOOST_SERIALIZATION_ASSUME_ABSTRACT_HPP // MS compatible compilers support #pragma once #if defined(_MSC_VER) # pragma once #endif /////////1/////////2/////////3/////////4/////////5/////////6/////////7/////////8 // assume_abstract_class.hpp: // (C) Copyright 2008 Robert Ramey // Use, modification and distribution is subject to the Boost Software // License, Version 1.0. (See accompanying file LICENSE_1_0.txt or copy at // http://www.boost.org/LICENSE_1_0.txt) // See http://www.boost.org for updates, documentation, and revision history. // this is useful for compilers which don't support the pdalboost::is_abstract #include <boost/type_traits/is_abstract.hpp> #ifndef BOOST_NO_IS_ABSTRACT // if there is an intrinsic is_abstract defined, we don't have to do anything #define BOOST_SERIALIZATION_ASSUME_ABSTRACT(T) // but forward to the "official" is_abstract namespace pdalboost { namespace serialization { template<class T> struct is_abstract : pdalboost::is_abstract< T > {} ; } // namespace serialization } // namespace pdalboost #else // we have to "make" one namespace pdalboost { namespace serialization { template<class T> struct is_abstract : pdalboost::false_type {}; } // namespace serialization } // namespace pdalboost // define a macro to make explicit designation of this more transparent #define BOOST_SERIALIZATION_ASSUME_ABSTRACT(T) \ namespace pdalboost { \ namespace serialization { \ template<> \ struct is_abstract< T > : pdalboost::true_type {}; \ template<> \ struct is_abstract< const T > : pdalboost::true_type {}; \ }} \ /**/ #endif // BOOST_NO_IS_ABSTRACT #endif //BOOST_SERIALIZATION_ASSUME_ABSTRACT_HPP
{ "pile_set_name": "Github" }
Manitoba Colony, Mexico Manitoba Colony is a large community of German speaking Mennonites mostly north of Ciudad Cuauhtémoc in the state of Chihuahua in Mexico. It was founded in 1922 by Old Colony Mennonites from Manitoba, Canada and consisted originally of 47 villages. It is the largest and oldest Mennonite colony in Mexico. In 1926 the Manitoba settlement consisted of 3,340 persons, in 1949 the number had grown to 7,706, and in 1953 the number was 8,768. In 1987 the total population of the Manitoba was around 12,500 persons and 17,000 in 2006. Adjacent to Manitoba Colony there is Swift Current Colony. Further to the north there are Ojo de la Yegua Colony (Nordkolonie), Santa Rita Colony and Santa Clara Colony. West of Santa Rita Colony there is Los Jagueyes Colony (Quellenkolonie). Altogether these Mennonite colonies stretch over more than 100 km and have some 50,000 Mennonites living in them (2015). References Category:Canadian diaspora in Mexico Category:Mennonitism in Mexico
{ "pile_set_name": "Wikipedia (en)" }
Immigration is the most pressing concern for Europeans, overtaking the economic situation and unemployment, according to a new Eurobarometer survey. Thirty-eight percent of Europeans regard immigration as their main policy priority, the spring Eurobarometer poll published on Friday (31 July) found, a 14 point increase from last autumn. Student or retired? Then this plan is for you. Migration has been pushed up the political agenda as thousands of migrants from north and sub-Saharan Africa cross the Mediterranean Sea in search of a better life in Europe. According to Frontex, the EU’s border agency, 153,000 migrants had landed in Europe by the end of June this year, a 150 percent increase on 2014. The largest numbers of migrants have come from Syria, Eritrea and Somalia. Data published by the UNCHR in June estimated that Greece is the most popular landing-point, with the number of migrants reaching the country by sea soaring to 63,000 this year, slightly higher than the 62,000 who arrived in Italy by sea. Migrant deaths at sea this year stood at 1,865 in June, the International Organisation for Migration said. The location of the EU’s smallest member state, Malta, in the south Mediterranean Sea, makes the island a popular entry point for would-be migrants from north Africa, and 65 percent of Maltese respondents cited immigration as their main concern. Despite the humanitarian crisis, and the large administrative burden for entry-point countries, governments have struggled to accept EU-commission proposals on reallocating asylum-seekers, eventually agreeing a number smaller than originally proposed. A total of 31,868 people were interviewed across the EU’s 28 member countries and five candidate countries. Economic prospects, unemployment and public finances continue to dominate concerns in the minds of Europeans, although a 48-42 percent majority agreed that unemployment levels have hit their peak and will gradually fall. Meanwhile, there was a slight increase in public optimism about the EU’s future and public trust in its institutions. Trust in the EU’s institutions has now hit 40 percent, nine points higher than at the time of last May’s European elections, fractionally higher than the 40 percent who believe the EU has a positive image. Public support for economic and monetary union and the euro remains unchanged at 57 percent. However, 69 percent of Greeks say they are in favour of euro membership, a six percent increase on last autumn. The survey took place between 16-27 May, more than a month before Greece’s referendum on whether to accept its creditors’ bailout terms and the introduction of strict capital controls in the country. Cyprus is the only eurozone country where a majority of respondents did not support euro membership. However, the survey suggests a big divide in public opinion between the euro ‘ins’ and ‘outs’. Romania was the only non-eurozone country where a majority supported membership of the single currency. Eighty-three percent of Estonians, whose country joined the euro in 2012, supported the currency bloc, the highest level in the EU.
{ "pile_set_name": "OpenWebText2" }
WASHINGTON--Legislators are readying a bill that could sharply limit Americans' rights relating to copying music, taping TV shows, and transferring files through the Internet. At the same time, the draft legislation seen by CNET News.com would place the struggling Webcasting industry on firmer legal footing. Two key House legislators wrote the double-edged proposal in consultation with the Library of Congress' Copyright Office. They appear likely to introduce it this month. The creation of the two-part draft comes as politicians and judges are grappling with the slippery mix of high-speed Net access, digital content, and the popularity of file-swapping networks. Last week, record labels hinted they might broaden their legal fusillade to encompass lawsuits against individuals. Reps. Howard Coble of North Carolina and Howard Berman of California, who authored the draft, say their proposed changes to copyright law follow suggestions made last August by the Copyright Office. "The Copyright Office recommended that Congress amend the Copyright Act," the two politicians wrote in a five-page letter sent last month to members of the subcommittee that oversees intellectual property. Coble is the Republican chairman of the panel, and Berman, who announced plans last month for an unrelated bill assailing peer-to-peer networks, is the senior Democrat. The first part of their proposal, which would limit backup copies, has already drawn objections from academics and nonprofit groups that have reviewed it. Under current copyright law, Americans who record a TV program or radio segment generally may "sell or otherwise dispose of" that analog recording or digital file as they wish. The proposed bill would end that exemption, handing copyright owners substantial new control over the distribution of their works by curtailing copying rights granted to consumers under a doctrine known as "fair use." "If you were to take today's episode of 'E.R.' and tape it and give it to your mother, it would be copyright infringement under this bill," said Jessica Litman, a professor at Wayne State University who specializes in copyright law. Aiding Webcasters A less incendiary section of the draft would give a minor boost to Webcasters by saying they're off the hook for temporary copies, called cached or buffered copies, made while streaming music to listeners. To qualify, a Webcaster must be licensed by an agency such as ASCAP and must ink an agreement with the record labels. According to the draft bill, such Webcasting "is not an infringement of copyright"--if temporary copies are made only to facilitate music distribution and if the copies are stored only for a time that's necessary for the broadcast. Critics of the measure said it would address a significant issue in how copyright law is applied to Webcasting. They noted, however, that it leaves some loopholes and ignores more pressing licensing issues threatening the industry, such as a recently proposed royalty scheme that some Net radio broadcasters say will put them out of business. "Exempting Webcasters' buffer copies from royalty obligations (is) the right thing to do--but almost meaningless given that, absent quick congressional action, the royalty scheme recently adopted by the Library of Congress will shut down most Webcasters the day it takes effect," said Philip Corwin, a lobbyist at Butera and Andrews representing Sharman Networks, which distributes the Kazaa file-sharing software. Last month, the Librarian of Congress set royalty fees for Web radio companies, ruling they would pay 0.07 cent, or about a 14th of a cent, for each song played for a single listener. Many Webcasters have said the rates are prohibitively high. Slow to take sides In an unusual twist, Coble and Berman stressed in their letter to colleagues that their authorship of the draft bill does not necessarily "constitute an endorsement of its contents." Rep. John Conyers of Michigan, the top Democrat on the full Judiciary committee, also helped in the creation and included the same unusual disclaimer. Spokeswoman Gene Smith said Thursday that Berman opposes the bill and drafted it only at the request of House Judiciary Committee Chairman James Sensenbrenner, R-Wis. "Part of it exempts buffer copies," Smith said. "Howard thinks there has been no demonstrated need for that. It's not a demonstrated problem. "The biggest impediment to more licensed, lawful services online is piracy, and that's why he is pushing his peer-to-peer bill," Smith said. Berman represents California's San Fernando Valley, adjacent to Los Angeles and Hollywood's cluster of entertainment companies. Last month, Berman said he would introduce a bill to let copyright owners, such as record labels or movie studios, launch technological attacks against file-swapping networks, where their wares are illegally traded. He plans to introduce it next week. Coble's office declined to comment on the substance of the draft bill. "We're awaiting the responses from the subcommittee members," a spokesman for Coble said. The origin of the joint proposal lies in the 1998 Digital Millennium Copyright Act ( DMCA). Part of that controversial law, which has been the subject of high-visibility court challenges and led to the prosecution of Russian programmer Dmitry Sklyarov, required the Copyright Office and the Commerce Department to report on how effective key portions of the DMCA have been. In its analysis, the Commerce Department made no proposals to amend the DMCA. But the Copyright Office did in its report released last August. In March, the House Judiciary committee asked for public comments based on the Copyright Office's recommendation. The panel's announcement said, "We are initiating a process to review relevant digital music issues and related proposals to amend the Copyright Act that have been brought or will be brought to our attention." Curtailing fair use One impetus for the draft bill, which remains untitled, could be to derail a more comprehensive bill favored by Webcasters called the Music Online Competition Act. It's co-authored by Rep. Rick Boucher, D-Va., who has vowed to oppose some of the more dramatic attempts by the music industry to tighten copyright laws. Some of the same opponents appear poised to offer a lukewarm endorsement of the Webcasting measure in the draft bill, while denouncing the limits on fair-use rights. R. Polk Wagner, who teaches intellectual property law at the University of Pennsylvania, says the proposal has "the potential to cut back fair use rather substantially." "Let's say I obtained a copyrighted work under fair use, say a photo of Mickey Mouse," Wagner said. "If I wanted to discuss, criticize or share that work, I need to interact with other people. Yet section one of the draft bill quite clearly says I have no rights to distribute the work, which would seem to rather severely limit my use. In the digital era, interaction takes place by transferring and copying files." Fred von Lohmann, an attorney with the Electronic Frontier Foundation, went further in his criticism. "The Berman-Coble change would arguably make it illegal for me to swap my iPod with a friend for a week, something I recently did," von Lohmann said. "Who knows what cool stuff might have thrived in this niche exception, but for (this proposed) change?" In accordance with the Film and Music Industy's new strategy of targeting individual users, it appears that Cox communications is sending out warnings to users trading files over Gnutella at the behest of the MPAA (Something Sony Music has been known to do). The warning lists which files the user has downloaded, as well as the date of the offense and the IP address of the offender. There is no indication as to whether or not Cox actually confirms the information before sending the letter. Originally spotted at the Politechbot mailing list, we reprint the letter below. Dear Customer, We are writing on behalf of Cox Communications to advise you that we have received a notification that you are using your Cox High Speed Internet service to post or transmit material that infringes the copyrights of a complainant's members. I have enclosed a copy of the complaint letter. Pursuant to the provisions of the Digital Millennium Copyright Act ("DMCA"), which is codified at 17 U.S.C. § 512, upon receiving such notification, Cox is required to "act expeditiously to remove, or disable access to" the infringing material in order to avoid liability for any alleged copyright infringement. Accordingly, Cox will suspend your account and disable your connection to the Internet within 24 hours of your receipt of this email if the offending material is not removed. Please be aware that the DMCA also provides procedures by which a subscriber accused of copyright violation can respond to the allegations of infringement and, under certain circumstances, cause his or her account to be reinstated. To do so, however, the response must meet certain criteria. Pursuant to section (g) of the DMCA (17 U.S.C. §512(g)), you have the right to submit to Cox a counter-notification which, to be effective, must include the following elements: (a) a physical or electronic signature of the subscriber; (b) identification of the material that has been removed or to whichaccess has been disabled and the location at which the material appeared before it was removed or disabled; (c) a statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled; (d) the subscriber's name, address, and telephone number and a statement that the subscriber consents to the jurisdiction of the Federal District Court for the judicial district in which the address is located. In the event that you submit to Cox a counter-notification that includes these elements, Cox will forward your counter notification to the complainant and advise them that Cox will cease disabling access to the allegedly infringing material in ten (10) business days. Unless the complainant notifies us that it has filed an action seeking a court order to restrain you from engaging in the allegedly infringing activity prior to the expiration of those ten (10) business days, Cox will reactivate your account. We have received information that an individual has utilized the above referenced IP address at the noted date and time to offer downloads of copyrighted motion picture(s) through a peer-to-peer service, including such title(s) as: Harry Potter And The Sorcerer's Stone Jay And Silent Bob Strike Back Simpsons, The (TV) Windtalkers The distribution of unauthorized copies of copyrighted motion pictures constitutes copyright infringement under the Copyright Act, Title 17 United States Code Section 106(3). This conduct may also violate the laws of other countries, international law, and/or treaty obligations. Since you own this IP address, we request that you immediately do the following: 1. Disable access to the individual who has engaged in the conduct described above, and; 2. Take appropriate action against the account holder under your Abuse Policy/Terms of Service Agreement. On behalf of the respective owners of the exclusive rights to the copyrighted material at issue in this notice, we hereby state, pursuant to the Digital Millennium Copyright Act, Title 17 United States Code Section 512, that we have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owners, their respective agents, or the law. Also pursuant to the Digital Millennium Copyright Act, we hereby state, under penalty of perjury, under the laws of the State of California and under the laws of the United States, that the information in this notification is accurate and that we are authorized to act on behalf of the owners of the exclusive rights being infringed as set forth in this notification. Please contact us at the above listed address or by replying to this email should you have any questions. Kindly include the above noted Reference # in the subject line of all email correspondence. We thank you for your cooperation in this matter. Your prompt response is requested. As an Independent Filmmaker, or someone that has a interest in the matter of copyright...This is so silly. Once again, the amount of money made by the industry, no matter what media film, music, or television. The amount of money being made is huge. As an Indie Filmmaker, I make nothing yet spend everything to do what I do...The others who inbark in the journey for the love of filmmaking never complain about the royalties that could be intitled to us. To do what you love, and have others view what you love is a reward in itself. The laws of copyright is sad to me. I never onced looked at the material made by me and my crew to be something that should be held so close. The art is what we do it for, and that should be where the heart is. To ask for people to pay in any such way, is sad. I understand that it is hard to follow any line of work in the entertainment industy as a steady paying way of life. But, let us artists remember why he decided to venture into this avenue. It was nevera about the money...it was always about the love. I've met many bands, filmmakers, and artist who never was in the mainstream. Who never had agents, publicity, or any other means of exposure. Yet, they still strive on to continue down the road that is still so hard. Why? its never because of the goals of making it rich. It was always about what they liked to do, and didn't know anything else... This is the only way for bigger artists to insure there place in the world. While cutting the legs from under the people that are in the underground, who never had the money, agents, or marketing plan that the mainstream consists of. Last, I would just like to say sorry to those in the industry that I might offend in anyway. My views of this matter was always cut clean and simple. Let the people be free, with no restrictions. You will always get what your worth in the end. If you put in 110%, you'll get 110% back...remember that... _________________Isnt it funny? This feeling inside...
{ "pile_set_name": "Pile-CC" }
Start Date: 10/21/01; HourAhead hour: 7; HourAhead schedule download failed. Manual intervention required. LOG MESSAGES: PARSING FILE -->> O:\Portland\WestDesk\California Scheduling\ISO Final Schedules\2001102107.txt !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database Error: dbCaps97Data: Cannot perform this operation on a closed database !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data !!!Unknown database. Alias: dbCaps97Data Error: dbCaps97Data: Cannot perform this operation on a closed database
{ "pile_set_name": "Enron Emails" }