text
stringlengths
0
3.78M
meta
dict
Inc. users have been getting to know David Karp since Tumblr burst on the scene a few years ago: His prodigious worth ethic; his favorite Tumblr; and even his modeling career. Now that he has sold Tumblr to Yahoo, he is in demand everywhere. On Thursday, he sat down with Bloomberg TV's Charlie Rose to discuss Yahoo's $1.1 billion acquisition, why he dropped out of high school, and how he plans to preserve Tumblr's authenticity. Here are some of the highlights. On how Tumblr got involved with Yahoo in the first place:"We started conversations about working with Yahoo in November of last year. After a few months, we knew there was a lot we were going to be doing together, regardless. We knew we were going to be working together. That's when Marissa [Mayer] showed up in New York and started to walk me through a story of how we could do even more together." Why Yahoo is a good fit for Tumblr:"[Yahoo] was a company with a legacy doing exactly the same kind of stuff we're hinging our business on--creative brand advertising. They were the original digital media company. They took a different approach to media. They approached media as an editorial team that created content and built creative brand advertising on top of that content. That's a big part of the future of Tumblr's business. That's something they've built out technology for and something they have advertiser relationships around and something they have a whole big honking salesforce for. What Marissa showed me and what their team showed us was an opportunity for Yahoo to help us fuel in a huge way the development of that network and the development of our ad business." Tumblr's introduction of ads:"It's very native advertising. The advertisements fit into spots where we already promote content. We already promote the best of Tumblr and use that as a place for people to discover things they wouldn't have seen otherwise. We'll roll in advertisements into those spots where we promote organic content." Why it was the right time to sell:"I was not expecting to sell the company this year, certainly wasn't looking to sell the company. This was a really, really remarkable opportunity that presented itself. This was an unbelievable opportunity to shortcut a lot of the very hard things that we're about to be going through." Why he dropped out of high school:"[Computer programming] wasn't in academia, and that was really the reason for me to drop out of school. It wasn't, 'Screw this.' It wasn't that I was bored. It wasn't that my friends were so lame. I was really enjoying school, but back in 1997 and 2000, when I was in high school, there wasn't computer science education in high schools in New York." On the future of Tumblr:"Hopefully we get this right, and Tumblr will be home to the most aspiring and talented creators all over the world. That's something we've already started to do. Regular people in the world, right now, they spend a huge amount of time in front of their televisions consuming premium content, some would call it, stuff produced by publishers, networks, studios. If we're not already there today, certainly five years from now, I expect the vast majority of the content we enjoy not to be produced only by a handful of creators who are selected and supported by those big studios."
{ "pile_set_name": "Pile-CC" }
-module(rts_app). -behaviour(application). %% Application callbacks -export([start/2, stop/1]). %% =================================================================== %% Application callbacks %% =================================================================== start(_StartType, _StartArgs) -> case rts_sup:start_link() of {ok, Pid} -> ok = riak_core:register_vnode_module(rts_vnode), ok = riak_core_node_watcher:service_up(rts, self()), ok = riak_core:register_vnode_module(rts_entry_vnode), ok = riak_core_node_watcher:service_up(rts_entry, self()), ok = riak_core:register_vnode_module(rts_stat_vnode), ok = riak_core_node_watcher:service_up(rts_stat, self()), EntryRoute = {["rts", "entry", client], rts_wm_entry, []}, webmachine_router:add_route(EntryRoute), {ok, Pid}; {error, Reason} -> {error, Reason} end. stop(_State) -> ok.
{ "pile_set_name": "Github" }
13 F.3d 334 UNITED STATES of America, Plaintiff-Appellant,v.John K. BRADY, Defendant-Appellee. No. 93-4085. United States Court of Appeals,Tenth Circuit. Dec. 21, 1993. Joshua Silverman, Atty., Dept. of Justice, Washington, DC (Richard D. Parry, U.S. Atty., and Stanley H. Olsen, Asst. U.S. Atty., Salt Lake City, UT, with him on the brief), for plaintiff-appellant. Rodney G. Snow (Anneli R. Smith and Steven G. Shapiro, with him on the brief) of Clyde, Pratt & Snow, Salt Lake City, UT, for defendant-appellee. Before BALDOCK and McWILLIAMS, Circuit Judges, and SAFFELS, District Judge.* BALDOCK, Circuit Judge. 1 The government appeals the district court's dismissal of a four count indictment against Defendant John K. Brady on the grounds that the indictment was insufficient as a matter of law. We have jurisdiction pursuant to 18 U.S.C. Sec. 3731. I. 2 Expert testimony below, as thoroughly summarized by the district court, see United States v. Brady, 820 F.Supp. 1346 (D.Utah 1993), established the following description of the operation of cellular telephones. Cellular telephone service is based upon a system of individual cellular telephone units, which have wireless radio transmission capabilities, operating among a series of geographic cells. Each geographic cell is served by a radio transmitter, and as the cellular telephone user moves from one cell to another, transmission of telephone calls are shifted from one transmitter to the other. 3 Cellular telephones are typically programmed with two identifying numbers. The mobile identification number ("MIN") is a ten digit number (usually the area code and telephone number) assigned to the customer's cellular telephone by the cellular carrier when the customer subscribes to that carrier's service. The electronic serial number ("ESN") is an eight digit number programmed onto an electronic chip by the telephone manufacturer. When a telephone call is initiated, the cellular telephone unit transmits the MIN and ESN to the cellular system. 4 Another feature provided by cellular carriers allows a cellular telephone customer to "roam," placing calls from a geographic cell belonging to a carrier with whom they do not have an account. This feature allows a Salt Lake City customer, for example, to use his Salt Lake City cellular telephone to make a local or long distance call while in New York City. When a roaming customer places a call, his telephone transmits the MIN and ESN. The roaming carrier, e.g., the New York City carrier, recognizes the MIN as belonging to another carrier, e.g., the Salt Lake City carrier, but cannot instantly validate the call because the validation system does not allow instantaneous inter-carrier validation. Rather than delay service to the roaming customer, the roaming carrier accepts this first call from the roaming customer before it has had an opportunity to validate the MIN and ESN as a legitimate combination.1 While the "first call" is taking place, a computer communicates with a central database of all legitimate MIN/ESN combinations. If the MIN/ESN combination does not match a valid combination in the home carrier's computers, subsequent calls using the same combination will not be allowed. Telephone calls attributed to "unmatched" MIN/ESN combinations are listed individually in the cellular carrier's billing computer, along with the charges associated with each individual call, but the user cannot be identified and the charges cannot be collected from him. 5 Cellular telephones can be altered by either replacing or reprogramming the microchip containing the unit's MIN and ESN. Telephones altered in this manner can be used either as "clones" or "free riders" to circumvent the normal cellular telephone system billing process. Cloning involves the programming of a cellular telephone so that the MIN/ESN combination is identical to a combination assigned to a legitimate customer. By cloning, the user accesses the legitimate customer's account to obtain free telephone service until the legitimate customer recognizes and reports the unauthorized charges. 6 Free riding involves the use of "tumbling" cellular phones. Free riding is achieved when the microchip that holds the MIN and the ESN has been modified to allow the user to change or tumble the MIN/ESN combination in his telephone at will by programming and reprogramming the MIN, the ESN, or both, from the key pad. The user programs a random MIN/ESN combination into the unit and continues using it until the validation system determines that it is invalid and blocks further calls. In this way, the user free rides the cellular telephone system and takes advantage of the roamer service by continually making a series of unmatched first calls, without ever being charged for the calls. II. 7 On October 24, 1992, the grand jury returned an indictment charging Defendant with four counts of violating 18 U.S.C. Sec. 1029(a)(1). Counts I through III alleged that Defendant, in pertinent part: 8 knowingly, and with intent to defraud, trafficked in a counterfeit access device, as defined in 18 U.S.C. Sec. 1029(e)(2); that is, an altered cellular telephone, permitting unauthorized access to telephone services, such conduct having an effect on interstate commerce, all in violation of 18 U.S.C. Sec. 1029(a)(1). 9 Count IV alleged that Defendant, in pertinent part: 10 knowingly, and with intent to defraud, used a counterfeit access device, as defined in 18 U.S.C. Sec. 1029(e)(2); that is, an altered cellular telephone, permitting unauthorized access to telephone services, such conduct having an effect on interstate commerce, all in violation of 18 U.S.C. Sec. 1029(a)(1). 11 Defendant moved to dismiss the indictment as insufficient, claiming that it failed to state an essential element of the offense, i.e., that Defendant used or trafficked in an access device that gained access to a billed account. Defendant also moved to suppress statements he made during the course of the investigation and to dismiss the indictment based on the government's breach of an agreement not to prosecute. Following a three-day evidentiary hearing on Defendant's motions, Defendant filed a third motion to dismiss the indictment, this time based on insufficiency of the evidence. 12 At the hearing, the government presented evidence that Defendant used and trafficked in four tumbling Mitsubishi Series 800 cellular telephones. Testimony established that these telephones had been altered so that the caller could obtain telephone service by free riding the system. Defendant admitted at the hearing that he had used a tumbling cellular telephone to place some 1300 calls over several months; however, the government conceded that it could not prove that Defendant, or any of the four telephones associated with Defendant, actually accessed identifiable subscriber accounts. 13 The government's offer of proof concerning account access came from employees of Cellular One of Salt Lake City--one of two cellular telephone companies in Salt Lake. The employees testified that unmatched calls and the charges created by the calls are reflected in Cellular One's records. The employees further testified that these charges cannot be collected, resulting in Cellular One absorbing whatever costs are associated with such calls. The evidence indicated that Cellular One has an account with McCaw2 and when unmatched calls are made on Cellular One's system, Cellular One must in turn make payment to McCaw for these calls. The evidence also indicated that Cellular One has accounts with various long distance carriers, and when unmatched long distance calls are made on Cellular One's system, Cellular One is obligated to pay the long distance carrier for the calls. Although the government presented testimony from Cellular One employees, the government was unable to link any of the four phones associated with Defendant to any unmatched call in Cellular One's accounting records or in any other carrier's records. 14 The district court dismissed all counts against Defendant finding the indictment insufficient as a matter of law. The court dismissed Count IV with prejudice, reasoning that the government could not show that Defendant gained access to one or more identifiable accounts or establish a factual connection between any cellular telephone company losses and Defendant's alleged conduct. As a result, the court determined that the government was unable to establish an essential element of a violation of 18 U.S.C. Sec. 1029(a)(1)--i.e., use of an access device. The court dismissed Counts I through III, the trafficking counts, without prejudice, allowing the government an opportunity to recharge Defendant if it is prepared to prove that Defendant transferred an altered cellular telephone with the intent that it serve as a clone.3 The court did not rule on Defendant's motion to suppress, or his motion to dismiss based on the government's breach of agreement. 15 On appeal, the government claims that the district court erred in concluding that a tumbling cellular telephone, used or transferred to another for purposes of free riding on the telephone system, is not an "access device" within the meaning of 18 U.S.C. Sec. 1029. We affirm. III. 16 We judge the sufficiency of an indictment by (1) whether the indictment contains the elements of the offense and apprises the defendant of the charges he must meet, and (2) whether the defendant would be protected against double jeopardy by a judgment on the indictment. United States v. Brown, 925 F.2d 1301, 1304 (10th Cir.1991). A sufficient indictment is required to implement the Fifth Amendment guaranty that the defendant's conviction is based on facts presented to a grand jury. United States v. Shelton, 848 F.2d 1485, 1494 (10th Cir.1988). The sufficiency of an indictment is a question of law we review de novo. U.S. v. Shelton, 937 F.2d 140, 142 (5th Cir.1991), cert. denied, --- U.S. ----, 112 S.Ct. 607, 116 L.Ed.2d 630.4 17 Section 1029 makes it unlawful for anyone to "knowingly and with intent to defraud produce[ ], use[ ], or traffic[ ] in one or more counterfeit access devices." 18 U.S.C. Sec. 1029(a)(1). Access device is defined as: 18 any card, plate, code, account number, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds other than a transfer originated solely by paper instrument. 19 Id. at Sec. 1029(e)(1) (emphasis added). Section 1029 defines counterfeit access device as "any access device that is counterfeit, fictitious, altered, or forged, or an identifiable component of an access device or a counterfeit access device." Id. at Sec. 1029(e)(2). The legislative history of Sec. 1029 reveals that Congress enacted the statute out of concern over " 'fraudulent use of access devices in connection with credit transactions.' " United States v. McNutt, 908 F.2d 561, 563 (10th Cir.1990) (quoting United States v. Blackmon, 839 F.2d 900, 913-14 (2d Cir.1988)), cert. denied, 498 U.S. 1084, 111 S.Ct. 955, 112 L.Ed.2d 1043 (1991). In this circuit, we have applied Sec. 1029 to the unauthorized use of credit cards, see United States v. Ryan, 894 F.2d 355, 357 (10th Cir.1990), and to long distance telephone access codes, see United States v. Teehee, 893 F.2d 271, 272 (10th Cir.1990). At the same time, we have held that Sec. 1029 does not apply to electronic addresses of satellite television descramblers. See McNutt, 908 F.2d at 563-64. 20 In McNutt, we held that cloned electronic addresses on satellite television descrambler modules were not "access devices" within the meaning of Sec. 1029. Id. The defendant in McNutt used a cloned descrambler to free ride satellite television transmissions. Id. at 563. We determined that Sec. 1029 did not prohibit this activity because, although the operators of satellite television services suffered economic losses from the revenue forgone due to the use of cloned descrambler modules, use of such modules did not "debit legitimate subscribers' accounts[, and] no additional charges accrued as a result of the unauthorized use." Id. at 563-64. For purposes of Sec. 1029, we defined an account as "a formal record of debits and credits." Id. at 563. The government argued in McNutt that the use of cloned descramblers was a means of account access because a legitimate fee-paying viewer provides the free ride. Id. We rejected this argument stating, "the government has mistaken economic losses for actual monetary losses." Id. We held that economic losses were not enough under Sec. 1029; instead, the government must be able to connect actual losses to distinct transactions reflected in the company's accounting records. Id. Finally, we concluded that "nothing in the plain wording, legislative history or judicial interpretation of Sec. 1029 [ ] lead[s] us to believe that Congress intended that statute to apply to anything other than direct accounting losses." Id. at 564. 21 In light of McNutt, we conclude that the cellular telephones at issue in this case--i.e., altered cellular telephones used for purposes of free riding on the cellular telephone system--are not "access devices" within the meaning of Sec. 1029. The government's offer of proof fails to establish that the tumbling cellular telephones were a "means of account access" as required by Sec. 1029(e)(1). Although the government argues that a tumbling cellular telephone is a means of account access because it is capable of accessing one cellular carrier's "account" with another carrier, we do not believe that this is the type of account access contemplated by Sec. 1029. 22 Unlike the unauthorized use of credit cards or long distance telephone access codes, use of a tumbling cellular telephone, like the use of a cloned satellite television descrambler in McNutt, does not debit a legitimate subscriber's account, nor does it trigger the creation and maintenance of a formal record of credits and debits. See id. at 563. In support of its argument that access to a cellular telephone carrier's account with another carrier is a means of account access under Sec. 1029, the government relies on United States v. Taylor, 945 F.2d 1050 (8th Cir.1991), and United States v. Brewer, 835 F.2d 550 (5th Cir.1987). However, these cases do not support, and our research reveals no other cases that support, the proposition that Sec. 1029 applies to anything less than access to an identifiable account for which a record is created and maintained.5 23 In Brewer, the defendant obtained a number of unassigned long distance telephone access codes and used them to obtain free long distance service. 835 F.2d at 551. In Taylor, the defendant obtained an unassigned American Express account code enabling him to obtain over $6,500 in goods and services. 945 F.2d at 1051. In each case, although neither defendant accessed an established customer account, each defendant utilized an identifiable, valid account number, and transactions in which the account numbers were used were actually identified in connection with specific accounts. The accounts accessed by the defendants in Brewer and Taylor were legitimate in that the companies involved had created the account numbers for future assignment, and each transaction entered into by the defendants appeared in the record actually created and maintained for that particular account. In the instant case, on the other hand, Defendant never accessed a valid account; rather he continually used MIN/ESN combinations that were invalid and therefore, he was unable to access either a previously assigned or yet unassigned valid account.6 24 Moreover, the cellular telephone carrier's "account" with other carriers that the government asserts Defendant accessed in violation of Sec. 1029 is no more than a list of unmatched telephone calls, which are not billable because they cannot be attributed to a legitimate subscriber's account. That these lists of unmatched calls result in charges between and among cellular and long distance carriers does not mean that the placement of an unmatched call accesses an account under Sec. 1029. Rather, the lists of unmatched calls represent a method by which the costs of system usage is allocated between and among different cellular and long distance carriers. As the district court concluded below, these lists of unmatched calls merely reflect that users of tumbling cellular telephones have been able to access the cellular carrier's system, not the type of distinct identifiable accounts required by Sec. 1029.7 25 In summary, we conclude that, similar to the situation in McNutt, Sec. 1029 cannot be extended to apply to tumbling cellular telephones used for purposes of free riding on the cellular telephone system when the government is unable to show that the telephone accessed an identifiable account. The plain language of Sec. 1029, together with our interpretation of Sec. 1029 in McNutt, informs us that in order to fall within Sec. 1029's definition of access device, the government must be able to establish access to a valid identifiable account for which a record of debits and credits is created and maintained, and which results in direct accounting losses. We believe that to hold otherwise would turn Sec. 1029 into a general theft statute applicable whenever a company can document a loss through fraud. Such a broad interpretation of Sec. 1029 is neither supported by the language of the statute nor its legislative history. See H.R.Rep. 894, 98th Cong., 2d Sess., reprinted in 1984 U.S.C.C.A.N. 3182, 3689 (Congress seeking to address "the growing problem in ... unauthorized use of account numbers or access codes"). Although Congress, without question, has the power to criminalize the use of or trafficking in cellular telephones altered to allow free riding on the cellular telephone system, even when such telephones do not access valid identifiable accounts, Congress did not do so when it enacted Sec. 1029. 26 The indictment against Defendant does not contain one of the necessary elements of a violation of Sec. 1029--i.e., that Defendant used or trafficked in an access device. As a result, the indictment in this case is insufficient, see Brown, 925 F.2d at 1304 (indictment must contain all elements of offense), and we AFFIRM the district court's dismissal of all counts. * The Honorable Dale E. Saffels, Senior United States District Judge for the District of Kansas, sitting by designation 1 Depending on the length of the telephone call and the speed of the validation process, the caller may be able to place more than one call before validation occurs 2 The relationship between Cellular One and McCaw is unclear from the record. At one point, a Cellular One employee testified that Cellular One is a subsidiary of McCaw. The same witness then testified that Cellular One is a national corporation and that Cellular One and McCaw are the same corporation 3 We make no comment as to whether a cloned cellular telephone--i.e., one with an MIN and ESN identical to another existing legitimate unit--would represent a means of account access within the ambit of Sec. 1029 4 While ordinarily the sufficiency of an indictment is judged solely on the face of the indictment, where both parties present evidence and raise no objection to the judge's consideration of the essential undisputed facts, "[i]t is permissible and may be desirable ... for the district court to examine the factual predicate for an indictment to determine whether the elements of the criminal charge can be shown sufficiently for a submissible case." Brown, 925 F.2d at 1304; see also United States v. Wood, 6 F.3d 692, 695 (10th Cir.1993) (relying on undisputed fact outside of indictment in concluding indictment was insufficient) In the instant case, the district court determined the insufficiency of the indictment from its face as well as from evidence presented at the evidentiary hearing. Because both parties presented evidence and neither has objected to the court's consideration of the undisputed facts, we note that the court's procedural handling of the case was appropriate. 5 The only other court to address the precise issue of tumbling cellular telephones and Sec. 1029 concluded that the microchips installed in the cellular telephones to allow the user to free ride were not access devices under Sec. 1029. See United States v. Bailey, No. CR-91-59 (C.D.Cal. Nov. 10, 1992), appeal docketed, No. 92-50721 (9th Cir. Dec. 4, 1992) 6 While it is conceivable for a tumbling cellular telephone to chance upon a MIN/ESN combination that has been assigned to a legitimate customer, the government's case against Defendant relied solely on Defendant's use of MIN/ESN combinations that resulted in unmatched calls 7 We note that the government's proffer of evidence would also fail under McNutt for failure to attribute any direct accounting losses to Defendant's conduct. See McNutt, 908 F.2d at 564. While the losses to the cellular telephone carriers are somewhat more tangible than the purely economic losses in McNutt, the government is simply unable to establish any factual connection between the four tumbling cellular telephones associated with Defendant and any cellular carrier losses. The government cannot establish any connection between Defendant and Cellular One, much less a connection between Defendant and any of the unmatched calls reflected in Cellular One's records
{ "pile_set_name": "FreeLaw" }
Niphorycta hemipercna Niphorycta hemipercna is a moth in the family Xyloryctidae. It was described by Alexey Diakonoff in 1954. It is found in New Guinea. References Category:Xyloryctidae Category:Moths described in 1954
{ "pile_set_name": "Wikipedia (en)" }
Following reports of collusion between Ukrainian government officials and Democratic National Committee (DNC) operatives, a Ukrainian member of Parliament is calling for a criminal investigation into alleged “illegal interference” in the 2016 US presidential election. Ukranian MP Andrei Derkach requested the meeting in a July 24 letter to Ukraine’s prosecutor general, Politico reported. Derkach claims the alleged meddling has damaged US-Ukraine relations. (RELATED: Everybody Is Forgetting That Clinton Allies Did The Same Thing As Don Jr.) “Only a transparent and thorough investigation into the unlawful interference of Ukrainian officials with the U.S. election campaign can restore the trust of our strategic partner,” Derkach wrote in the letter, copies of which were obtained by Politico. Politico reported in January the extent of the DNC’s collaboration with Ukrainian government officials who wanted Democratic nominee Hillary Clinton to win the 2016 election. A veteran DNC operative who previously worked in the Clinton White House, Alexandra Chalupa, worked with Ukrainian government officials and journalists, both from Ukraine and America, to dig up Russia-related opposition research on Donald Trump and then-campaign chair Paul Manafort. She also shared her anti-Trump research with both the DNC and the Clinton campaign, according to the Politico report. Derkach wrote in his letter that the “illegal interference” was “organized by a criminal organization” that included senior government officials.
{ "pile_set_name": "OpenWebText2" }
Moose Jaw Wakamow Moose Jaw Wakamow is a provincial electoral district for the Legislative Assembly of Saskatchewan, Canada. This district was created for the 1967 election after the Saskatchewan government decided to retire a system of multiple-MLA electoral divisions for the cities of Regina, Saskatoon, and Moose Jaw. The riding contains all of Moose Jaw south of Caribou Street, east of 9th Ave and northwest of Thatcher Drive. Members of the Legislative Assembly Election results Moose Jaw South (1967 – 1991) References External links Website of the Legislative Assembly of Saskatchewan Elections Saskatchewan - Official Results of the 2011 Provincial Election Saskatchewan Archives Board – Saskatchewan Election Results By Electoral Division Map of Moose Jaw Wakamow riding as of 2016 Category:Moose Jaw Category:Saskatchewan provincial electoral districts
{ "pile_set_name": "Wikipedia (en)" }
Abstract: Multiple Myeloma may have extraosseous manifestations in the cranial region. It may be a solitary intracranial tumor (extramedullary plasmacytomas without any other signs of multiple myeloma) or intracranial disease may be a part of generalized disease. We report herein a 65-year-old multiple myeloma patient with the involvement of different regions of brain parancyhma with spontaneous intratumoral hemorrhages. It is an unusual recurrence presentation and unusual situation that intracranial involvements are both with and without dural attachment and all of them have intratumoral hemorrhages. Keywords: 1. Introduction Multiple Myeloma may have extraosseus manifestations in the cranial region. It may be a solitary intracranial tumor (extramedullary plasmacytomas without any other signs of multiple myeloma) or intracranial disease may be a part of generalied disease [1]. We report herein a multiple myeloma recurrence after first line therapy with the involvement of different regions of brain parancyhme with spontaneous intratumoral hemorrhage. 2. Case Report A 65-year-old man admitted to the department of hematology of our hospital with the complaints of fatigue and dyspnea. His medical history revealed that the patient was referred firstly to a research institute in India in April 2014 with bone pains and weakness. On investigations he was found to have anemia, lytic lesions on skeletal bones and slightly raised serum creatinine level. He was diagnosed with Multiple Myeloma stage 3 based on bone marrow aspiration which showed infiltration of 70% plasma cells and positive M-spike in the serum. The patient then has been started on treatment of Bortezomib and Dexamethasone. He has also received palliative radiation to the involved areas of the bone. After induction treatment he was referred to a transplantation center in Turkey for autologous transplant on June 2014. Bone marrow biopsy performed there and revealed 10-15% infiltration of monoclonal plasma cells so that he has been started Bortezomib, Thalidomide and Dexamethasone treatment. While he was going on his treatment, the patient was admitted to our department with fatigue, fever and dyspnea on Jan 2015. There is bilateral pulmonary infiltration on chest x-ray and comp?ted tomography (CT) scan (Figure 1). Because of dyspnea, tacypnea and respiratory failure, the patient admitted to intensive care unit and empirical piperacillin-tazobactam and trimethoprim-sulphametoxasole antibiotherapy was started immediately due to suspicion of hospital acquired pneumonia and Pneumocytis carinii infection. Later we demonstrated Meticilin-resistant Staphylococcus aureus (MRSA) in culture of deep tracheal aspiration and started teicoplanin treatment. He clinically improved with these antibiotics. But on 10th day of treatment, we noticed altered mental status, confusion and lower extremity weakness/numbness. We performed brain imaging with CT scan and MRI. The imaging studies both revealed 5 masses with surrounding edema and intratumoral hemorrhages. The diameters were 29x21 mm in right temporal lobe, 31x15 mm in left frontal lobe, 57x23 mm in left parietal lobe, 26x17 mm in left parietal lobe and 15 mm superior to it (Figure 2). Four of them were intraparencymal masses with cranial and dural attachment, one of them without dural attachment. We has started dexamethasone treatment and referred the patient to another center for radiation therapy to the brain. Figure 2: MRI images show five masses with intratumoral hemorrahges. First, second, third and fourth masses are with dural attachment. Fifth mass is without dural attachment 3. Discussion Plasma cell neoplasms account for 1% of malignant tumors, including multiple myeloma, solitary plasmacytoma and syndromes caused by tissue immunoglobulin deposition [2]. Patients with multiple myeloma often have neurologic complications [3]. These include peripheral neuropathies, spinal radiculopathies, cranial nerve palsies, spinal cord compression and metabolic encephalopathies. The course includes vertebral compression fractures, base of skull and other bony involvement, metabolic imbalance, hyperviscosity syndromes and amyloidosis [4]. Invasion of central nervous system in multiple myeloma is rare, either as presumed intracerebral metastases or as Leptomeningeal Myelomatosis [5]. We noticed confusion and extremity weakness as a first sign in our case during antibiotic treatment for pneumonia and then suspected intracranial involvement. This is an unusual recurrence presentation. A solitary plasmacytoma is a located plasma cell neoplasm that usually affects bone (bone plasmacytoma) and rarely involves other tissue (extramedullary plasmacytoma) [6]. In 80% of cases, extramedullary plasmacytomas are located in the upper respiratory tract, rarely they may affect the gastrointestinal tract, lymph nodes, bladdder and central nervous system (CNS) [7]. Solitary plasmacytomas involving the CNS usually result from the spread of malignant plasma cells from dura mater or skull [2]. Primary intraparenchymal brain plasmacytomas without dura mater or skull involvement have been reported extremely rare [8]. Because plasma cells are not found in the brain tissue in normal conditions, an isolated intraparenchymal involvement is difficult to explain in the absence of contiguous dural or bone lesions [9]. Also spontaneous intratumoral hemorrhage with intracranial plasmacytoma is also extraordinarily rare [10]. We saw all of these extraordinary situations all together in the current case. In summary, we report a multiple myeloma case with intracranial plasmacytomas with intratumoral hemorrhage. It is an unusual recurrence presentation in which intracranial involvements are both with and without dural attachment and all of them have intratumoral hemorrhages.
{ "pile_set_name": "Pile-CC" }
Q: SAS - Kolmogorov-Smirnov Two Sided Critical Values I am trying to compute the critical values for the two-sided Kolmogorov-Smirnov test (PROC NPAR1WAY doesn't output these!). This is calculated as c(a) * sqrt( (n+m)/(nm) ) where n and m are the number of observations in each dataset and c(a) = 1.36 for for confidence level a = 0.05. Either, A) is there a routine in SAS that will calculate these for me? (I've been searching a while) or, B) what is the best way to compute the statistic myself? My initial approach is to select the number of rows from each data set into macro variables then compute the statistic, but this feel ugly. Thanks in advance A: A) Probably not, if you've searched all the relevant documentation. B) That method sounds fine, but you can use a data step if you prefer, e.g. data example1 example2; set sashelp.class; if _n_ < 6 then output example1; else output example2; run; data _null_; if 0 then set example1 nobs = n; if 0 then set example2 nobs = m; call symput('Kolmogorov_Smirnov_05',1.36 * sqrt((n+m)/(n*m))); run; %put &=Kolmogorov_Smirnov_05;
{ "pile_set_name": "StackExchange" }
Q: ajax json object doesn't update in IE8 I'm working on a project with an heavy use of Ajax & Json and I tend to refresh the data every second. Everything works great, Json Parse works well in Google Chrome, but at IE8 my object does not updates from its initial state, forcing me to clear the browser cache in order to see the changes. With Chrome everything works as expected, changes are seen live. I tried both the native JSON.parse() and jQuery.parseJSON(). Would be glad to have some help with this to make the project run on IE just as good as on Chrome. Here is this section of the code: function get_tables() { $.ajax( { url: 'index.php?a=1', type: 'GET', dataType: 'html', success: function(data){ to_object = JSON.parse( console.log('requested'); }, }); } setInterval(get_tables,1000); Thanks in advance. A: You are making same request all the time, so it caches your request. You can disable caching in two way, This will make cache false for all ajax requests $(document).ready(function() { $.ajaxSetup({ cache: false }); }); or This will disable cache for only this request $.ajax( { url: 'index.php?a=1', type: 'GET', dataType: 'html', success: function(data){ to_object = JSON.parse( console.log('requested'); }, cache: false });
{ "pile_set_name": "StackExchange" }
pay for wifi on first of three-flight trip still works on the next flights 2,653 shares
{ "pile_set_name": "OpenWebText2" }
WLWT-TV/YouTube Screenshot by Chris Matyszczyk/CNET Many believe that speed cameras were invented by Fagin. They perch there in all arrogance, waiting for the next sucker whose pocket they'll pick. Some localities have come to admit that they don't reduce accidents. Arizona took the decision to remove its highway speed cameras altogether. Baltimore's were so riddled with errors that they were removed recently too. Who could forget the recent, poetic incident in Baltimore when a speed camera decided (with the help of a human police officer) that a stationary car was speeding. The chorus of suspicion surrounding these dubious objects has now been joined by one of the last people you'd suspect: a judge. As WDTN-TV Ohio reports, Judge Robert Ruehlman this week declared that speed cameras were "a scam." He vehemently criticized the authorities of Elmwood Place, Ohio, a village that installed speed cameras and then began to bathe in revenue as divas bathe in champagne. The Columbus Dispatch reported that the judge also described the cameras as "nothing more than a high-tech game of 3-card Monty." In the first month of the cameras' activity, Elmwood Place sprinkled 6,600 speeding tickets, each of which generated $105. Oddly, there are only 2,000 residents in the whole of Elmwood Place. Locals decided this resembled backstreet robbery and so went to court, also offering the legal defense that the cameras were installed without displaying the appropriate public notices to warn people this was coming. The judge ordered the village to just stop it with the speeding tickets. The village, perhaps concerned that its pockets might cease to bulge, is to appeal his verdict. The attorney for the plaintiffs, Mike Allen, however, told the Columbus Dispatch: "This is the first time that a judge has said 'enough is enough'. I think this nationally is a turning point." There is, perhaps, still a long way to go before the nation's local authorities will decide to forgo such as easy money-spinning device. In the meantime, please think of the poor people of Dayton, Ohio. There, if you have two unpaid tickets, the city can now legally tow your car away. How's that for justice?
{ "pile_set_name": "OpenWebText2" }
Story: Baeyertz, Charles Nalder Page 1 Baeyertz, Charles Nalder 1866–1943 Teacher, journalist, editor, critic This biography was written by G. A. K. Baughen and was first published in the Dictionary of New Zealand BiographyVolume 2, 1993 Charles Nalder Baeyertz was born in Melbourne, Australia, on 15 December 1866, the son of Emilia Louisa Aronson and her husband, Charles Baeyertz, manager of the National Bank of Australasia at Colac, Victoria. After the death of her husband in 1871, Emilia Baeyertz became a popular evangelist for the Church of England, working in New Zealand, the United States, Canada and Great Britain as well as Australia. Baeyertz was educated at Prince Alfred College in Adelaide, and gained a licentiate in music from the London College of Music. In Melbourne on 21 December 1886 he married Isabella Johnston, the daughter of a Baptist clergyman; there were four children from the marriage. Having suffered losses in land speculation, Baeyertz and his family left Melbourne for Dunedin, New Zealand, in 1892. He taught modern and classical languages – he is said to have known 17 languages – elocution, music and singing, and became music and drama critic for the Otago Daily Times, also contributing articles to the Otago Witness. He no doubt benefited from claiming to have the only musical qualification of its kind in New Zealand. In April 1893 Baeyertz published the first monthly number of the Triad, a journal dedicated to the study of music, art and science; literature was added later. Its coverage of science was always minimal, however, and in later years it dealt more generally with current affairs and politics. There was an early struggle to establish the journal commercially, but by 1898 it had expanded to 12 regional issues throughout New Zealand. In 1897 circulation was said to have reached 10,000, and it was said in 1919 that the Triad was found 'in every club, hotel and reading-room throughout Australasia'. During the 32 years for which he was its editor and part-owner the Triad furnished the livelihood of Baeyertz and his family. Through the Triad Baeyertz sought to disseminate 'a small modicum of musical, artistic, and scientific information throughout New Zealand', an arduous task which he approached with a crusading spirit. Baeyertz himself wrote much of the material, but also printed many articles from leading European journals. In his more optimistic moments he perceived a growing artistic maturity in the receptiveness of audiences to tours by esteemed overseas artists, in the improvement in the diction and accent of New Zealanders, in the busyness of the local artistic communities, and in the emergence of some artists of merit in New Zealand. He admired the painters C. N. Worsley, Petrus van der Velden and C. F. Goldie; the cartoonist David Low; the poet Dick Harris; and the novelist, poet and playwright Arthur H. Adams. However, Baeyertz's view of the arts in New Zealand was mixed. He spoke of New Zealand as 'Philistia': active in the arts but lacking in artistic sensitivity and an appreciation of excellence. This was mostly attributed to the colony's raw youthfulness, although Baeyertz thought the arts in the doldrums throughout the Anglo-Saxon world. Charles Baeyertz held conservative views on the arts: new movements in painting, such as impressionism and cubism, received scant attention in the Triad, and no praise. Modern poetry fared even worse: between 1912 and 1915 Baeyertz's associate editor, Frank Morton, was involved in an acrimonious exchange with Ezra Pound, whose poetry was described as 'perverted drivelling' and 'revolting insanity'. Despite the journal's wide sales it was directed explicitly at an educated and cultured élite – the 'intelligent and thinking minority' as Baeyertz called it. One of the reasons which he gave for practising elocution was to identify oneself as one of the 'cultivated people', possessor of the standard English accent; he did not welcome the development of New Zealand or Australian accents. Similarly, he did not publish work with a working-class or up-country flavour, like that of the Australian poets Banjo Paterson and Henry Lawson. He opposed socialist activity, particularly the strikes of 1912–13, and did not take feminism seriously. In both the arts and politics Baeyertz decried egalitarianism which, he thought, levelled everyone to mediocrity. Baeyertz sought to stimulate the arts and to counter this mediocrity through his activities as a critic. As judge of elocution and singing at 54 amateur competitions in New Zealand and Australia, and in his reviews in the Triad, he gained a reputation for fearlessness and controversy. He considered it his responsibility to judge all performances against exacting standards of excellence: 'The beautiful is true for the professional and amateur alike,' he said. While his judgement was seldom at issue, his frequently caustic and sometimes abusive remarks caused offence, especially to amateur performers accustomed to a more charitable reception. Baeyertz denounced his opponents with gusto, engaging in lengthy battles with other journalists. Several times he was involved in libel actions. In 1913 he wrote that the tenor John Fuller had a voice like a 'pig's whistle' and accused him of 'closefistedness' and 'managerial meanness'. In the ensuing court case, Fuller was told that 'pig's whistle' meant merely a 'low whisper', while the mention of meanness was held to be fair comment; Baeyertz exulted in his victory. In 1912 publication of the Triad was moved from Dunedin to Wellington, and in 1914 to Sydney; a separate Australian edition appeared in 1915. The Baeyertz household preceded these shifts, moving to Wellington in 1909 and to Sydney in 1913. But the Triad did not flourish commercially in Australia. Baeyertz ended his connection with it in 1925, when he briefly became editor of the Sydney Sunday Times. He spent the rest of his career as a broadcaster and speech coach for the Australian Broadcasting Commission. He also started a correspondence school of elocution, and was appointed an examiner in the art of speech for the universities of Australia and for the New South Wales State Conservatorium of Music. In addition to the Triad, Baeyertz, an ardent admirer of the scenery of New Zealand, published a tourist Guide to New Zealand in 1902, and in 1924 a four-volume series on public speaking. Isabella Baeyertz died in Auckland on 9 February 1929; she had been living in New Zealand since at least 1919. In Sydney on 4 September 1930, Charles Baeyertz married Lily Agnes Price, by whom he had had a son 15 years earlier. He died at Rylstone, New South Wales, on 5 June 1943; Lily Baeyertz died in 1949. Baeyertz had an unexcelled knowledge of the arts and a magisterial aura which was enhanced by the sharpness of his glance and his mephistophelean beard. His standing as a successful editor and dominant personality in the world of the arts in contemporary New Zealand is secure, and the Triad's success suggests that he achieved his objective of improving and broadening the appreciation of the arts.
{ "pile_set_name": "Pile-CC" }
Social Automation vs PPC When considering social automation, the first thing to know is how does it compare to PPC (Pay-Per-Click). If you know what you spending on PPC it’s easy to compare a simple cost analysis and benefit if you know the value you are receiving from your PPC campaigns. Truth is most campaign managers don’t have a clue because without expensive 3rd party directed synced analytics, that often costs as much as the PPC campaigns themselves, there’s no way to possibly know your ROI. In order to make this post of something useful let’s pretend we know our response numbers – but you don’t need to know them to compare the two, the core purpose of PPC and social automation are virtually identical. The following is a data pool from 100 google AdWord ad network advertisers from a broad random range of markets. AdWords are purchased based on a bid system for the placement of banner and widget content inline with google search results and their affiliate sponsor network. A banner or widget can consist of a small image, a title, a URL link, and a descriptive typically about 20 words. The size of a campaign isn’t significant as the data stacks well in cost trend based on campaign size. The first disturbing PPC trend just off the top is that prices of PPC campaigns almost doubled in 2016 from 2015. What was once just lunch money is now a mortgage payment. This could be a result of a growing economy, more sellers drive up the bids for PPC spots. Conversation rate is difficult to gage due to the varying activities that define a specific advertisers campaign objective. Some advertisers want sales, some want signups, and some want downloads. A conversion is simply an end objective positive result. In 2016 more defined conversion tactics influenced the numbers due to a greater non-agency buyer pool, when you’re spending your own money you tend to be a bit more performance focused. From about 2007 through 2014 there was not much change in CPC this might have been primarily due to a large portion of PPC campaigns that were driven by large buys mostly managed by agency or PPC buyers. In 2015 and 2016 there was a significant increase in non-agency buys. Agency buys in 2014 represented over 40% of the market. In 2015 agency purchases dipped to around 34% of the market share. Why? because agencies charge a management fee and with the increasing costs of PPC combined with agency fees the already unknown ROI becomes significantly further out of reach. Social Engagement, though a similar goal to build online traffic, plays out a little different. Social automation is response engagement based on real-time conversations that take place in many mainstream online social forums such as Facebook, Twitter, and LinkedIn. Until recently social engagement was a manual process that required substantial human sweat equity. Comparing the two prior to automation wasn’t practical making PPC a substantial financial bargain. What hasn’t changed is the results. Though the human factor makes social media campaigns cost prohibitive the results they produce by activity is significantly better than PPC. Automation is a disruptive industry game changer. When you remove the human cost you can now apply the benefit of social media engagement on a level playing field with PPC services. A single server can post hundreds of engagement responses a minute with precision accuracy across multiple social channels. In 2016 ailign posted hundreds of thousands of automated social engagement responses. Here’s what the numbers look like. Let’s break it down simply by Cost to Conversion. If we have a budget of $1000 on each campaign type respectively. Another dynamic benefit of social automation vs PPC is positioning. Positioning is an essential component of PPC and the primary factor that drives up costs. The entire cost model of PPC is orientated to benefit the highest bidder though ad placement position strategy. Simply bidding for PPC keywords is no guarantee of placement. Social media is about influence engagement during real time conversations, social automation guarantees your placement regardless of your campaign budget. Pay for a post, it get’s posted! While we’re pouring salt on the PPC wound let’s do one more. Social media has a significantly broader audience than PPC. A social forum post can last days, months, and even years, the lifespan of a PPC is only about 6 seconds. Apply post duration to the numbers above and you could potentially double and/or triple your Total Traffic Click Trough with Social Automation!
{ "pile_set_name": "Pile-CC" }
Q: How to hide/remove a picture in footline on title slide only, as a template using beamer class I am designing a latex template for presentation slides for my company. I use beamer class. I made the following codes to show a footline on every slide. It is a image on the left, and some words on the right, and the words and image are aligned in the center. However, I want to just remove the image in the title slide. I have made the following codes \setbeamertemplate{footline}{% \ifnum\insertframenumber=1 % \else \includegraphics[align=c, height=1.5cm]{sim-ci-logo-2.png}% \fi \hfill% \usebeamercolor[fg]{myfootlinetext} Company confidential. \textcopyright\, 2018 All rights reserved.\hspace*{1em} \insertdate{}\hspace*{2em} \insertframenumber\kern1em } However, it does not work properly. In the title page, the image is gone, but the words moved to the bottom edge. See the two screenshots below: This is the title slide's footline, where the words moved to the bottom edge This is the normal slide's footline. Do you know how to keep the words in the title slide in the same position as other slides? Thanks in advance. Note that I have used \ifnum\insertframenumber=1, assuming title slide is always the first slide. As @samcarter pointed out How to make the end slide use the same background as title page, while the normal slide use different background?, it is usually a bad idea to make such an assumption, but I do not know how to make it. Any suggestion on that is also appreciated. A: In exactly the same way as for the background templates, you can have different footlines: \documentclass{beamer} \usepackage{tikz} \defbeamertemplate{background}{special frames}{% \begin{tikzpicture} \useasboundingbox (0,0) rectangle(\the\paperwidth,\the\paperheight); \fill[color=gray] (0,2) rectangle (\the\paperwidth,\the\paperheight); \end{tikzpicture} } \setbeamertemplate{background}{ \begin{tikzpicture} \fill[white,opacity=1] (0,0) rectangle(\the\paperwidth,\the\paperheight); \end{tikzpicture} } \defbeamertemplate{footline}{special frames}{text for special footline} \setbeamertemplate{footline}{text for normal footline} \newcommand{\insertendpage}{% \setbeamertemplate{background}[special frames] \setbeamertemplate{footline}[special frames] \begin{frame} bla bla \end{frame} } \setbeamertemplate{title page}{% \setbeamertemplate{background}[special frames] \setbeamertemplate{footline}[special frames] \begin{frame} text text \end{frame} } \begin{document} \titlepage \begin{frame} Slide 2 \end{frame} \insertendpage \end{document} Quick hack: If you don't want to worry about the vertical position, replace the image by some invisible element of the same height, e.g. a \rule{0pt}{1.5cm}
{ "pile_set_name": "StackExchange" }
Full text ========= Progesterone is critical in mammary gland development. Breast cancer evolves from normal tissue through increasingly abnormal cellular changes that include increased expression of progesterone receptor (PR), and PR is an established marker of response to endocrine therapy. PR is expressed as two proteins (PRA and PRB) with different functions, and *in vitro* evidence reveals PRA to inhibit PRB function. This suggests that PRA may repress progesterone action and that the ratio of PRA:PRB may be an important determinant in tissue sensitivity to ovarian steroid hormones. This study examined the expression of PRA and PRB proteins in normal breast tissue (*n* =13) during the menstrual cycle, and in premalignant (*n* =45) and malignant (*n* =39) breast tissues, to determine differences in relative isoform expression.We used dual immunofluorescent histochemistry on formalin-fixed, paraffin-embedded tissue sections using mouse monoclonal antibodies that bind to either PRB or PRA. In most normal breast cases PR staining was confined to scattered epithelial cells expressing equivalent levels of PRA and PRB. However, 50% of cases in the luteal phase (*n* =6) showed reduced PRA expression. In proliferative premalignant lesions without atypia (PDWA, *n* =15), there was a marked increase in intensity and number of cells expressing PR, but inter-cell homogeneity was maintained. Atypical proliferative benign lesions (ADH, *n* =15; DCIS, *n* =15), showed high levels of both PRA and PRB expression with notable inter-cell heterogeneity in relative isoform content. This was also observed in malignant breast tumours (*n* =39). Furthermore, breast tumours expressing an overall predominance of one isoform were associated with features of higher histological grade. In conclusion, our results show a change from inter-cell homogeneity of PRA:PRB in normal tissue to extensive heterogeneity in the malignant state, suggesting a progressive loss of control of relative PRA and B expression that may occur early in cancer development and may eventually be associated with features of poorer prognosis.
{ "pile_set_name": "PubMed Central" }
[ { "title": "Associate Site Reliability Engineer", "source": "Freedom of the Press Foundation", "sourceUrl": "https://freedom.press/jobs/job-opening-associate-site-reliability-engineer/", "city": "Multiple", "state": "Multiple", "country": "United States", "description": "In this role, you will empower the whole FPF team by participating in the development of a robust continuous deployment pipeline, by performing routine maintenance tasks, and by automating operations work, e.g., by using cluster and configuration management tools. Open to remote work in time zones within the Americas. Deadline to apply: 4 November. It's open to recent college or university graduates, and to early-career and mid-career technologists whether or not they have a relevant degree. It is also open to candidates from non-technology career backgrounds with substantial applicable volunteer experience.", "status": "active", "remote": true, "tags": [ "Unix CLI", "Python", "Ruby" ] }, { "title": "Software Engineer", "source": "MasterControl", "sourceUrl": "https://mastercontrol.applicantpro.com/jobs/908219.html", "city": "Cottonwood Heights", "state": "Utah", "country": "United States", "description": "Software Engineer will be responsible for the design, development, implementation, and analysis of the company's technical products and systems. Performs engineering design evaluations and may develop a range of products. Uses professional concepts and company policies to solve a wide range of difficult problems in imaginative and practical ways. Works on problems of diverse scope where analysis of data requires evaluation of identifiable factors. Exercises judgment within generally defined practices and policies in selecting methods and techniques for obtaining solutions. Normally receives no instruction on routine work, general instructions on new assignments. May lead and direct the work of others. Considered highly skilled and proficient in discipline. Works under minimal supervision with wide latitude for independent judgment.", "status": "active", "remote": false, "tags": [ "Java", ".Net", "Oracle", "Angular", "Ruby", "JavaScript" ] }, { "title": "Software Quality Assurance Engineer", "source": "MasterControl", "sourceUrl": "https://mastercontrol.applicantpro.com/jobs/908219.html", "city": "Cottonwood Heights", "state": "Utah", "country": "United States", "description": "MasterControl is looking for creative, energetic automation test engineers to join our software quality team. Team members will use innovative test tools and methods, working closely with product managers and developers in an agile environment, to proactively ensure delivery of the best software possible.", "status": "active", "remote": false, "tags": [ "Quality Assurance", "QA", "SQL", "Oracle", "Angular", "Ruby", "JavaScript" ] }, { "title": "Software Engineer", "source": "Lockheed Martin", "sourceUrl": "https://www.lockheedmartinjobs.com/job/boulder/software-engineer/694/8061488", "city": "Boulder", "state": "Colorado", "country": "United States", "description": "We are seeking a Software Engineer to join our dynamic and growing team! The selected candidate will design, develop, and test software solutions across our contracted efforts, supporting multiple baselines in defect resolution as well as enhancements, special projects, new business initiatives, and modernization efforts. The successful candidate will be a passionate coder, someone who loves a challenge and always rises to the occasion to ensure success. They embrace modern development practices and insist that others do as well. Only a Secret Clearance is required to start, and there are multiple openings for each position.", "status": "active", "remote": false, "tags": [ "Java", "C++" ] } ]
{ "pile_set_name": "Github" }
Q: Change Play Dist snapshot number Using Play 2.0 framework, when I run play dist I always get: xyz-1.0-SNAPSHOT.zip How can I increase that number, or specify it manually with each build? End result would be: xyz-1.1-SNAPSHOT.zip A: Change the appVersion and/or appName in project/Build.scala file. It will create dist package with new values next time.
{ "pile_set_name": "StackExchange" }
Yoga for Cyclists, part 6: Ankles Your ankles take the strain when you ride - so here's how to give them a bit of TLC... Yoga 6 If you've been following our series of Yoga for Cyclists videos, you'll know from Part 5: Posture that the ankles are one of the weak points in many cyclists, thanks to all the rotations the feet make. Road.cc yoga expert Karen Burt is back with installment six, in which we look at the movements ankles make, and what limited ankle flexibility can do to the shins and the calves. For tight shins, there's a simple relaxing kneeling exercise, that can be made easier with a cushion for the really tight of shin, and for the tight-calved we show you a simple stretch to open out the calves. Watch Tony struggle with this, and you'll see the benefits of regular yoga. The feet move side to side at the ankle as well as up and down, and there's a second set of exercises to deal with eversion and inversion, and these can be practised sitting down, so there's really no excuse. The various videos from the Road.cc Yoga for Cyclists series can be put together in any combination that suits you, for a regular complementary workout to supplement your training. After an unpromising start, having to be bribed by her parents to learn to ride without stabilisers, Sarah became rather keener on cycling in her university years, and was eventually persuaded to upgrade to proper road cycling by the prospect of a shiny red Italian bike, which she promptly destroyed by trapping a pair of knickers in the rear derailleur. Sarah writes about about cycling every weekend on road.cc.
{ "pile_set_name": "Pile-CC" }
import React from 'react'; import AddTodo from './AddTodo'; import TodoList from './TodoList'; export default class App extends React.Component { render() { return ( <div> <h1>Todos</h1> <TodoList/> <AddTodo/> </div> ); } }
{ "pile_set_name": "Github" }
JACKSONVILLE, Fla., Aug. 18 (UPI) -- A Clay County, Fla., employee was charged with animal cruelty after allegedly using his power mower to run over and kill a group of ducklings, officials said. Mark Preston Akers, 29, of Middleburg, was arrested Wednesday after he allegedly chased a mother duck and a group of seven ducklings with his power mower, killing four of the baby ducks, the Jacksonville Times-Union reported. A witness told investigators Akers lowered his mowing attachment over the baby ducks and then "appeared to laugh and gave … the thumbs up." Another witness said Akers later bragged about what had allegedly just happened. "If the allegations are correct, it's very disturbing," said Stephanie Kopelousos, Clay County manager.
{ "pile_set_name": "OpenWebText2" }
/* File: SFNTLayoutTypes.h Contains: SFNT file layout structures and constants. Version: QuickTime 7.3 Copyright: (c) 2007 (c) 1994-2001 by Apple Computer, Inc., all rights reserved. Bugs?: For bug reports, consult the following page on the World Wide Web: http://developer.apple.com/bugreporter/ */ #ifndef __SFNTLAYOUTTYPES__ #define __SFNTLAYOUTTYPES__ #ifndef __MACTYPES__ #include <MacTypes.h> #endif #if PRAGMA_ONCE #pragma once #endif #if PRAGMA_IMPORT #pragma import on #endif #if PRAGMA_STRUCT_ALIGN #pragma options align=mac68k #elif PRAGMA_STRUCT_PACKPUSH #pragma pack(push, 2) #elif PRAGMA_STRUCT_PACK #pragma pack(2) #endif /* ----------------------------------------------------------------------------------------- */ /* CONSTANTS */ /* The following values can be used to set run feature values. Note that unless the feature is defaulted differently in different fonts, the zero value for the selectors represents the default value. Check the following URL site for further info: "http://fonts.apple.com/Registry" */ /* * Summary: * Feature types */ enum { kAllTypographicFeaturesType = 0, kLigaturesType = 1, kCursiveConnectionType = 2, kLetterCaseType = 3, kVerticalSubstitutionType = 4, kLinguisticRearrangementType = 5, kNumberSpacingType = 6, kSmartSwashType = 8, kDiacriticsType = 9, kVerticalPositionType = 10, kFractionsType = 11, kOverlappingCharactersType = 13, kTypographicExtrasType = 14, kMathematicalExtrasType = 15, kOrnamentSetsType = 16, kCharacterAlternativesType = 17, kDesignComplexityType = 18, kStyleOptionsType = 19, kCharacterShapeType = 20, kNumberCaseType = 21, kTextSpacingType = 22, kTransliterationType = 23, kAnnotationType = 24, kKanaSpacingType = 25, kIdeographicSpacingType = 26, kUnicodeDecompositionType = 27, kRubyKanaType = 28, kCJKSymbolAlternativesType = 29, kIdeographicAlternativesType = 30, kCJKVerticalRomanPlacementType = 31, kItalicCJKRomanType = 32, kCJKRomanSpacingType = 103, kLastFeatureType = -1 }; /* * Summary: * Selectors for feature type kAllTypographicFeaturesType */ enum { kAllTypeFeaturesOnSelector = 0, kAllTypeFeaturesOffSelector = 1 }; /* * Summary: * Selectors for feature type kLigaturesType */ enum { kRequiredLigaturesOnSelector = 0, kRequiredLigaturesOffSelector = 1, kCommonLigaturesOnSelector = 2, kCommonLigaturesOffSelector = 3, kRareLigaturesOnSelector = 4, kRareLigaturesOffSelector = 5, kLogosOnSelector = 6, kLogosOffSelector = 7, kRebusPicturesOnSelector = 8, kRebusPicturesOffSelector = 9, kDiphthongLigaturesOnSelector = 10, kDiphthongLigaturesOffSelector = 11, kSquaredLigaturesOnSelector = 12, kSquaredLigaturesOffSelector = 13, kAbbrevSquaredLigaturesOnSelector = 14, kAbbrevSquaredLigaturesOffSelector = 15, kSymbolLigaturesOnSelector = 16, kSymbolLigaturesOffSelector = 17 }; /* * Summary: * Selectors for feature type kCursiveConnectionType */ enum { kUnconnectedSelector = 0, kPartiallyConnectedSelector = 1, kCursiveSelector = 2 }; /* * Summary: * Selectors for feature type kLetterCaseType */ enum { kUpperAndLowerCaseSelector = 0, kAllCapsSelector = 1, kAllLowerCaseSelector = 2, kSmallCapsSelector = 3, kInitialCapsSelector = 4, kInitialCapsAndSmallCapsSelector = 5 }; /* * Summary: * Selectors for feature type kVerticalSubstitutionType */ enum { kSubstituteVerticalFormsOnSelector = 0, kSubstituteVerticalFormsOffSelector = 1 }; /* * Summary: * Selectors for feature type kLinguisticRearrangementType */ enum { kLinguisticRearrangementOnSelector = 0, kLinguisticRearrangementOffSelector = 1 }; /* * Summary: * Selectors for feature type kNumberSpacingType */ enum { kMonospacedNumbersSelector = 0, kProportionalNumbersSelector = 1, kThirdWidthNumbersSelector = 2, kQuarterWidthNumbersSelector = 3 }; /* * Summary: * Selectors for feature type kSmartSwashType */ enum { kWordInitialSwashesOnSelector = 0, kWordInitialSwashesOffSelector = 1, kWordFinalSwashesOnSelector = 2, kWordFinalSwashesOffSelector = 3, kLineInitialSwashesOnSelector = 4, kLineInitialSwashesOffSelector = 5, kLineFinalSwashesOnSelector = 6, kLineFinalSwashesOffSelector = 7, kNonFinalSwashesOnSelector = 8, kNonFinalSwashesOffSelector = 9 }; /* * Summary: * Selectors for feature type kDiacriticsType */ enum { kShowDiacriticsSelector = 0, kHideDiacriticsSelector = 1, kDecomposeDiacriticsSelector = 2 }; /* * Summary: * Selectors for feature type kVerticalPositionType */ enum { kNormalPositionSelector = 0, kSuperiorsSelector = 1, kInferiorsSelector = 2, kOrdinalsSelector = 3 }; /* * Summary: * Selectors for feature type kFractionsType */ enum { kNoFractionsSelector = 0, kVerticalFractionsSelector = 1, kDiagonalFractionsSelector = 2 }; /* * Summary: * Selectors for feature type kOverlappingCharactersType */ enum { kPreventOverlapOnSelector = 0, kPreventOverlapOffSelector = 1 }; /* * Summary: * Selectors for feature type kTypographicExtrasType */ enum { kHyphensToEmDashOnSelector = 0, kHyphensToEmDashOffSelector = 1, kHyphenToEnDashOnSelector = 2, kHyphenToEnDashOffSelector = 3, kSlashedZeroOnSelector = 4, kSlashedZeroOffSelector = 5, kFormInterrobangOnSelector = 6, kFormInterrobangOffSelector = 7, kSmartQuotesOnSelector = 8, kSmartQuotesOffSelector = 9, kPeriodsToEllipsisOnSelector = 10, kPeriodsToEllipsisOffSelector = 11 }; /* * Summary: * Selectors for feature type kMathematicalExtrasType */ enum { kHyphenToMinusOnSelector = 0, kHyphenToMinusOffSelector = 1, kAsteriskToMultiplyOnSelector = 2, kAsteriskToMultiplyOffSelector = 3, kSlashToDivideOnSelector = 4, kSlashToDivideOffSelector = 5, kInequalityLigaturesOnSelector = 6, kInequalityLigaturesOffSelector = 7, kExponentsOnSelector = 8, kExponentsOffSelector = 9 }; /* * Summary: * Selectors for feature type kOrnamentSetsType */ enum { kNoOrnamentsSelector = 0, kDingbatsSelector = 1, kPiCharactersSelector = 2, kFleuronsSelector = 3, kDecorativeBordersSelector = 4, kInternationalSymbolsSelector = 5, kMathSymbolsSelector = 6 }; /* * Summary: * Selectors for feature type kCharacterAlternativesType */ enum { kNoAlternatesSelector = 0 }; /* * Summary: * Selectors for feature type kDesignComplexityType */ enum { kDesignLevel1Selector = 0, kDesignLevel2Selector = 1, kDesignLevel3Selector = 2, kDesignLevel4Selector = 3, kDesignLevel5Selector = 4 }; /* * Summary: * Selectors for feature type kStyleOptionsType */ enum { kNoStyleOptionsSelector = 0, kDisplayTextSelector = 1, kEngravedTextSelector = 2, kIlluminatedCapsSelector = 3, kTitlingCapsSelector = 4, kTallCapsSelector = 5 }; /* * Summary: * Selectors for feature type kCharacterShapeType */ enum { kTraditionalCharactersSelector = 0, kSimplifiedCharactersSelector = 1, kJIS1978CharactersSelector = 2, kJIS1983CharactersSelector = 3, kJIS1990CharactersSelector = 4, kTraditionalAltOneSelector = 5, kTraditionalAltTwoSelector = 6, kTraditionalAltThreeSelector = 7, kTraditionalAltFourSelector = 8, kTraditionalAltFiveSelector = 9, kExpertCharactersSelector = 10 }; /* * Summary: * Selectors for feature type kNumberCaseType */ enum { kLowerCaseNumbersSelector = 0, kUpperCaseNumbersSelector = 1 }; /* * Summary: * Selectors for feature type kTextSpacingType */ enum { kProportionalTextSelector = 0, kMonospacedTextSelector = 1, kHalfWidthTextSelector = 2 }; /* * Summary: * Selectors for feature type kTransliterationType */ enum { kNoTransliterationSelector = 0, kHanjaToHangulSelector = 1, kHiraganaToKatakanaSelector = 2, kKatakanaToHiraganaSelector = 3, kKanaToRomanizationSelector = 4, kRomanizationToHiraganaSelector = 5, kRomanizationToKatakanaSelector = 6, kHanjaToHangulAltOneSelector = 7, kHanjaToHangulAltTwoSelector = 8, kHanjaToHangulAltThreeSelector = 9 }; /* * Summary: * Selectors for feature type kAnnotationType */ enum { kNoAnnotationSelector = 0, kBoxAnnotationSelector = 1, kRoundedBoxAnnotationSelector = 2, kCircleAnnotationSelector = 3, kInvertedCircleAnnotationSelector = 4, kParenthesisAnnotationSelector = 5, kPeriodAnnotationSelector = 6, kRomanNumeralAnnotationSelector = 7, kDiamondAnnotationSelector = 8, kInvertedBoxAnnotationSelector = 9, kInvertedRoundedBoxAnnotationSelector = 10 }; /* * Summary: * Selectors for feature type kKanaSpacingType */ enum { kFullWidthKanaSelector = 0, kProportionalKanaSelector = 1 }; /* * Summary: * Selectors for feature type kIdeographicSpacingType */ enum { kFullWidthIdeographsSelector = 0, kProportionalIdeographsSelector = 1, kHalfWidthIdeographsSelector = 2 }; /* * Summary: * Selectors for feature type kUnicodeDecompositionType */ enum { kCanonicalCompositionOnSelector = 0, kCanonicalCompositionOffSelector = 1, kCompatibilityCompositionOnSelector = 2, kCompatibilityCompositionOffSelector = 3, kTranscodingCompositionOnSelector = 4, kTranscodingCompositionOffSelector = 5 }; /* * Summary: * Selectors for feature type kRubyKanaType */ enum { kNoRubyKanaSelector = 0, kRubyKanaSelector = 1 }; /* * Summary: * Selectors for feature type kCJKSymbolAlternativesType */ enum { kNoCJKSymbolAlternativesSelector = 0, kCJKSymbolAltOneSelector = 1, kCJKSymbolAltTwoSelector = 2, kCJKSymbolAltThreeSelector = 3, kCJKSymbolAltFourSelector = 4, kCJKSymbolAltFiveSelector = 5 }; /* * Summary: * Selectors for feature type kIdeographicAlternativesType */ enum { kNoIdeographicAlternativesSelector = 0, kIdeographicAltOneSelector = 1, kIdeographicAltTwoSelector = 2, kIdeographicAltThreeSelector = 3, kIdeographicAltFourSelector = 4, kIdeographicAltFiveSelector = 5 }; /* * Summary: * Selectors for feature type kCJKVerticalRomanPlacementType */ enum { kCJKVerticalRomanCenteredSelector = 0, kCJKVerticalRomanHBaselineSelector = 1 }; /* * Summary: * Selectors for feature type kItalicCJKRomanType */ enum { kNoCJKItalicRomanSelector = 0, kCJKItalicRomanSelector = 1 }; /* * Summary: * Selectors for feature type kCJKRomanSpacingType */ enum { kHalfWidthCJKRomanSelector = 0, kProportionalCJKRomanSelector = 1, kDefaultCJKRomanSelector = 2, kFullWidthCJKRomanSelector = 3 }; /* --------------------------------------------------------------------------- */ /* ---------------- Table Specific Typedefs and Constants -------------------- */ /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: lookup tables - used within various other tables */ enum { kSFNTLookupSimpleArray = 0, /* a simple array indexed by glyph code */ kSFNTLookupSegmentSingle = 2, /* segment mapping to single value */ kSFNTLookupSegmentArray = 4, /* segment mapping to lookup array */ kSFNTLookupSingleTable = 6, /* sorted list of glyph, value pairs */ kSFNTLookupTrimmedArray = 8 /* a simple trimmed array indexed by glyph code */ }; typedef UInt16 SFNTLookupTableFormat; typedef UInt16 SFNTLookupValue; typedef UInt16 SFNTLookupOffset; typedef UInt32 SFNTLookupKind; /* A BinarySearchHeader defines the five standard fields needed to perform quick lookups in a lookup table (note that using UInt16s, and not ItemCounts or similar types, is important here, since these tables are in fonts, and the documented font formats specify 16-bit quantities). */ struct SFNTLookupBinarySearchHeader { UInt16 unitSize; /* size of a unit in bytes */ UInt16 nUnits; /* number of units in table */ UInt16 searchRange; /* (largest power of two <= nUnits) * unitSize */ UInt16 entrySelector; /* log2 (largest power of two <= nUnits) */ UInt16 rangeShift; /* (nUnits - largest power of two <= nUnits) * unitSize */ }; typedef struct SFNTLookupBinarySearchHeader SFNTLookupBinarySearchHeader; /* A format 0 lookup table maps all glyphs in the font to lookup values */ struct SFNTLookupArrayHeader { SFNTLookupValue lookupValues[1]; }; typedef struct SFNTLookupArrayHeader SFNTLookupArrayHeader; /* A format 8 lookup table maps some range of glyphs in the font to lookup values */ struct SFNTLookupTrimmedArrayHeader { UInt16 firstGlyph; UInt16 count; SFNTLookupValue valueArray[1]; }; typedef struct SFNTLookupTrimmedArrayHeader SFNTLookupTrimmedArrayHeader; /* Format 2 and format 4 lookup tables map ranges of glyphs to either single lookup values (format 2), or per-glyph lookup values (format 4). Since both formats use the same kind of data, only one unified set of segment-related structures is defined. */ struct SFNTLookupSegment { UInt16 lastGlyph; UInt16 firstGlyph; UInt16 value[1]; }; typedef struct SFNTLookupSegment SFNTLookupSegment; struct SFNTLookupSegmentHeader { SFNTLookupBinarySearchHeader binSearch; SFNTLookupSegment segments[1]; }; typedef struct SFNTLookupSegmentHeader SFNTLookupSegmentHeader; /* A format 6 lookup table maps single glyphs to lookup values. */ struct SFNTLookupSingle { UInt16 glyph; UInt16 value[1]; }; typedef struct SFNTLookupSingle SFNTLookupSingle; struct SFNTLookupSingleHeader { SFNTLookupBinarySearchHeader binSearch; SFNTLookupSingle entries[1]; }; typedef struct SFNTLookupSingleHeader SFNTLookupSingleHeader; /* The format-specific part of the subtable header */ union SFNTLookupFormatSpecificHeader { SFNTLookupArrayHeader theArray; SFNTLookupSegmentHeader segment; SFNTLookupSingleHeader single; SFNTLookupTrimmedArrayHeader trimmedArray; }; typedef union SFNTLookupFormatSpecificHeader SFNTLookupFormatSpecificHeader; /* The overall subtable header */ struct SFNTLookupTable { SFNTLookupTableFormat format; /* table format */ SFNTLookupFormatSpecificHeader fsHeader; /* format specific header */ }; typedef struct SFNTLookupTable SFNTLookupTable; typedef SFNTLookupTable * SFNTLookupTablePtr; typedef SFNTLookupTablePtr * SFNTLookupTableHandle; /* --------------------------------------------------------------------------- */ /* GENERAL FORMATS FOR STATE TABLES -- prefix "ST" */ enum { kSTClassEndOfText = 0, kSTClassOutOfBounds = 1, kSTClassDeletedGlyph = 2, kSTClassEndOfLine = 3, kSTSetMark = 0x8000, kSTNoAdvance = 0x4000, kSTMarkEnd = 0x2000, kSTLigActionMask = 0x3FFF, kSTRearrVerbMask = 0x000F }; typedef UInt8 STClass; typedef UInt8 STEntryIndex; struct STHeader { UInt8 filler; STClass nClasses; UInt16 classTableOffset; UInt16 stateArrayOffset; UInt16 entryTableOffset; }; typedef struct STHeader STHeader; struct STClassTable { UInt16 firstGlyph; UInt16 nGlyphs; STClass classes[1]; }; typedef struct STClassTable STClassTable; struct STEntryZero { UInt16 newState; UInt16 flags; }; typedef struct STEntryZero STEntryZero; struct STEntryOne { UInt16 newState; UInt16 flags; UInt16 offset1; }; typedef struct STEntryOne STEntryOne; struct STEntryTwo { UInt16 newState; UInt16 flags; UInt16 offset1; UInt16 offset2; }; typedef struct STEntryTwo STEntryTwo; /* --------------------------------------------------------------------------- */ /* GENERAL FORMATS FOR STATE TABLES to be used with 'morx' tables -- prefix "STX" */ enum { kSTXHasLigAction = 0x2000 }; typedef UInt16 STXClass; typedef UInt16 STXStateIndex; typedef UInt16 STXEntryIndex; struct STXHeader { UInt32 nClasses; UInt32 classTableOffset; UInt32 stateArrayOffset; UInt32 entryTableOffset; }; typedef struct STXHeader STXHeader; typedef SFNTLookupTable STXClassTable; struct STXEntryZero { STXStateIndex newState; UInt16 flags; }; typedef struct STXEntryZero STXEntryZero; struct STXEntryOne { STXStateIndex newState; UInt16 flags; UInt16 index1; }; typedef struct STXEntryOne STXEntryOne; struct STXEntryTwo { STXStateIndex newState; UInt16 flags; UInt16 index1; UInt16 index2; }; typedef struct STXEntryTwo STXEntryTwo; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'lcar' */ /* CONSTANTS */ enum { kLCARTag = 0x6C636172, /* 'lcar' */ kLCARCurrentVersion = 0x00010000, /* current version number for 'lcar' table */ kLCARLinearFormat = 0, kLCARCtlPointFormat = 1 }; /* TYPES */ struct LcarCaretClassEntry { UInt16 count; UInt16 partials[1]; /* these are either FUnits or control-point numbers */ }; typedef struct LcarCaretClassEntry LcarCaretClassEntry; struct LcarCaretTable { Fixed version; UInt16 format; SFNTLookupTable lookup; }; typedef struct LcarCaretTable LcarCaretTable; typedef LcarCaretTable * LcarCaretTablePtr; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'just' */ /* CONSTANTS */ enum { kJUSTTag = 0x6A757374, /* 'just' */ kJUSTCurrentVersion = 0x00010000, kJUSTStandardFormat = 0, kJUSTnoGlyphcode = 0xFFFF, /* used in a pcConditionalAddAction */ kJUSTpcDecompositionAction = 0, kJUSTpcUnconditionalAddAction = 1, kJUSTpcConditionalAddAction = 2, kJUSTpcGlyphStretchAction = 3, kJUSTpcDuctilityAction = 4, kJUSTpcGlyphRepeatAddAction = 5 }; /* Justification priority levels */ enum { kJUSTKashidaPriority = 0, kJUSTSpacePriority = 1, kJUSTLetterPriority = 2, kJUSTNullPriority = 3, kJUSTPriorityCount = 4 }; /* Justification flags */ enum { kJUSTOverridePriority = 0x8000, kJUSTOverrideLimits = 0x4000, kJUSTOverrideUnlimited = 0x2000, kJUSTUnlimited = 0x1000, kJUSTPriorityMask = 0x0003 }; /* TYPES */ typedef UInt16 JustPCActionType; typedef UInt16 JustificationFlags; /* A JustPCDecompositionAction defines a ligature decomposition action. */ struct JustPCDecompositionAction { Fixed lowerLimit; Fixed upperLimit; UInt16 order; UInt16 count; UInt16 glyphs[1]; }; typedef struct JustPCDecompositionAction JustPCDecompositionAction; /* A JUSTPCUnconditionalAddAction defines an unconditional glyph add action. */ typedef UInt16 JustPCUnconditionalAddAction; /* A JUSTPCConditionalAddAction defines a glyph substitution and add action. If the addGlyph is equal to kJUSTnoGlyphcode, then no glyph will be added, and the justification for the line will be redone. */ struct JustPCConditionalAddAction { Fixed substThreshhold; /* threshhold of growth factor at which subst occurs */ UInt16 addGlyph; UInt16 substGlyph; }; typedef struct JustPCConditionalAddAction JustPCConditionalAddAction; /* A PCDuctilityAction defines a ductile axis along which the glyph will be varied. */ struct JustPCDuctilityAction { UInt32 ductilityAxis; Fixed minimumLimit; Fixed noStretchValue; Fixed maximumLimit; }; typedef struct JustPCDuctilityAction JustPCDuctilityAction; /* A PCGlyphRepetitionAction defines a glyph which will not be stretched or otherwise transformed, but rather which will be emplaced however many times are needed to fill the needed gap. */ struct JustPCGlyphRepeatAddAction { UInt16 flags; UInt16 glyph; }; typedef struct JustPCGlyphRepeatAddAction JustPCGlyphRepeatAddAction; /* PCActionSubrecords contain the actual postcompensation actions. */ struct JustPCActionSubrecord { UInt16 theClass; /* justification class value associated with this rec */ JustPCActionType theType; UInt32 length; UInt32 data; /* not really a UInt32; cast as ptr to appropriate action */ }; typedef struct JustPCActionSubrecord JustPCActionSubrecord; /* The set of postcompensation records is defined in a PCAction struct. */ struct JustPCAction { UInt32 actionCount; /* long for alignment purposes */ JustPCActionSubrecord actions[1]; }; typedef struct JustPCAction JustPCAction; /* JustWidthDeltaEntry is the justification table entry structure. The justClass value (which is actually limited to 7 bits by the state table structure) is defined as a long for PPC alignment reasons. */ struct JustWidthDeltaEntry { UInt32 justClass; Fixed beforeGrowLimit; /* ems AW can grow by at most on LT */ Fixed beforeShrinkLimit; /* ems AW can shrink by at most on LT */ Fixed afterGrowLimit; /* ems AW can grow by at most on RB */ Fixed afterShrinkLimit; /* ems AW can shrink by at most on RB */ JustificationFlags growFlags; /* flags controlling grow case */ JustificationFlags shrinkFlags; /* flags controlling shrink case */ }; typedef struct JustWidthDeltaEntry JustWidthDeltaEntry; struct JustWidthDeltaGroup { UInt32 count; JustWidthDeltaEntry entries[1]; }; typedef struct JustWidthDeltaGroup JustWidthDeltaGroup; /* Overall structure of a postcompensation table is defined in PostcompTable. */ struct JustPostcompTable { SFNTLookupTable lookupTable; /* action records here */ }; typedef struct JustPostcompTable JustPostcompTable; struct JustDirectionTable { UInt16 justClass; /* offset to state table (0=none) */ UInt16 widthDeltaClusters; /* offset to clusters */ UInt16 postcomp; /* offset to postcomp table (0=none) */ SFNTLookupTable lookup; }; typedef struct JustDirectionTable JustDirectionTable; struct JustTable { Fixed version; UInt16 format; UInt16 horizHeaderOffset; UInt16 vertHeaderOffset; }; typedef struct JustTable JustTable; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'opbd' */ /* CONSTANTS */ enum { kOPBDTag = 0x6F706264, /* 'opbd' */ kOPBDCurrentVersion = 0x00010000, kOPBDDistanceFormat = 0, kOPBDControlPointFormat = 1 }; /* TYPES */ typedef UInt16 OpbdTableFormat; /* The OpbdSideValues struct is the lookup result from the FindSingle call for the optical tables. It contains the 4 FUnit values that are relevant to the specified glyph, or the 4 control gxPoint values. */ struct OpbdSideValues { SInt16 leftSideShift; SInt16 topSideShift; SInt16 rightSideShift; SInt16 bottomSideShift; }; typedef struct OpbdSideValues OpbdSideValues; struct OpbdTable { Fixed version; OpbdTableFormat format; SFNTLookupTable lookupTable; }; typedef struct OpbdTable OpbdTable; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'mort' */ /* CONSTANTS */ enum { kMORTTag = 0x6D6F7274, /* 'mort' */ kMORTCurrentVersion = 0x00010000, /* current version number for 'mort' table */ /* Coverage masks */ kMORTCoverVertical = 0x8000, kMORTCoverDescending = 0x4000, kMORTCoverIgnoreVertical = 0x2000, kMORTCoverTypeMask = 0x000F, /* Subtable types */ kMORTRearrangementType = 0, kMORTContextualType = 1, kMORTLigatureType = 2, kMORTSwashType = 4, kMORTInsertionType = 5, /* Ligature subtable constants */ kMORTLigLastAction = (long)0x80000000, kMORTLigStoreLigature = 0x40000000, kMORTLigFormOffsetMask = 0x3FFFFFFF, kMORTLigFormOffsetShift = 2, /* Rearrangement subtable actions */ kMORTraNoAction = 0, /* no action */ kMORTraxA = 1, /* Ax => xA */ kMORTraDx = 2, /* xD => Dx */ kMORTraDxA = 3, /* AxD => DxA */ kMORTraxAB = 4, /* ABx => xAB */ kMORTraxBA = 5, /* ABx => xBA */ kMORTraCDx = 6, /* xCD => CDx */ kMORTraDCx = 7, /* xCD => DCx */ kMORTraCDxA = 8, /* AxCD => CDxA */ kMORTraDCxA = 9, /* AxCD => DCxA */ kMORTraDxAB = 10, /* ABxD => DxAB */ kMORTraDxBA = 11, /* ABxD => DxBA */ kMORTraCDxAB = 12, /* ABxCD => CDxAB */ kMORTraCDxBA = 13, /* ABxCD => CDxBA */ kMORTraDCxAB = 14, /* ABxCD => DCxAB */ kMORTraDCxBA = 15, /* ABxCD => DCxBA */ /* Insertion subtable constants */ kMORTDoInsertionsBefore = 0x80, kMORTIsSplitVowelPiece = 0x40, kMORTInsertionsCountMask = 0x3F, kMORTCurrInsertKashidaLike = 0x2000, kMORTMarkInsertKashidaLike = 0x1000, kMORTCurrInsertBefore = 0x0800, kMORTMarkInsertBefore = 0x0400, kMORTMarkJustTableCountMask = 0x3F80, kMORTMarkJustTableCountShift = 7, /* JustTableIndex for marked character */ kMORTCurrJustTableCountMask = 0x007F, kMORTCurrJustTableCountShift = 0, /* JustTableIndex for current character */ kMORTCurrInsertCountMask = 0x03E0, kMORTCurrInsertCountShift = 5, /* count to insert after current glyphRec */ kMORTMarkInsertCountMask = 0x001F, kMORTMarkInsertCountShift = 0 /* count to insert after marked glyphRec */ }; /* TYPES */ typedef UInt32 MortSubtableMaskFlags; typedef UInt32 MortLigatureActionEntry; struct MortRearrangementSubtable { STHeader header; }; typedef struct MortRearrangementSubtable MortRearrangementSubtable; struct MortContextualSubtable { STHeader header; UInt16 substitutionTableOffset; }; typedef struct MortContextualSubtable MortContextualSubtable; struct MortLigatureSubtable { STHeader header; UInt16 ligatureActionTableOffset; UInt16 componentTableOffset; UInt16 ligatureTableOffset; }; typedef struct MortLigatureSubtable MortLigatureSubtable; struct MortSwashSubtable { SFNTLookupTable lookup; }; typedef struct MortSwashSubtable MortSwashSubtable; struct MortInsertionSubtable { STHeader header; }; typedef struct MortInsertionSubtable MortInsertionSubtable; union MortSpecificSubtable { MortRearrangementSubtable rearrangement; MortContextualSubtable contextual; MortLigatureSubtable ligature; MortSwashSubtable swash; MortInsertionSubtable insertion; }; typedef union MortSpecificSubtable MortSpecificSubtable; struct MortSubtable { UInt16 length; UInt16 coverage; MortSubtableMaskFlags flags; MortSpecificSubtable u; }; typedef struct MortSubtable MortSubtable; struct MortFeatureEntry { UInt16 featureType; UInt16 featureSelector; MortSubtableMaskFlags enableFlags; MortSubtableMaskFlags disableFlags; }; typedef struct MortFeatureEntry MortFeatureEntry; struct MortChain { MortSubtableMaskFlags defaultFlags; /* default flags for this chain */ UInt32 length; /* byte length of this chain */ UInt16 nFeatures; /* number of feature entries */ UInt16 nSubtables; /* number of subtables */ MortFeatureEntry featureEntries[1]; /* the subtables follow */ }; typedef struct MortChain MortChain; struct MortTable { Fixed version; UInt32 nChains; MortChain chains[1]; }; typedef struct MortTable MortTable; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'morx' (version 2 and beyond metamorphosis tables) */ /* CONSTANTS */ enum { kMORXTag = 0x6D6F7278, /* 'morx' */ kMORXCurrentVersion = 0x00020000, /* version number for current 'morx' table */ /* Coverage masks */ kMORXCoverVertical = (long)0x80000000, kMORXCoverDescending = 0x40000000, kMORXCoverIgnoreVertical = 0x20000000, kMORXCoverTypeMask = 0x000000FF }; /* TYPES */ struct MorxRearrangementSubtable { STXHeader header; }; typedef struct MorxRearrangementSubtable MorxRearrangementSubtable; struct MorxContextualSubtable { STXHeader header; UInt32 substitutionTableOffset; }; typedef struct MorxContextualSubtable MorxContextualSubtable; struct MorxLigatureSubtable { STXHeader header; UInt32 ligatureActionTableOffset; UInt32 componentTableOffset; UInt32 ligatureTableOffset; }; typedef struct MorxLigatureSubtable MorxLigatureSubtable; struct MorxInsertionSubtable { STXHeader header; UInt32 insertionGlyphTableOffset; }; typedef struct MorxInsertionSubtable MorxInsertionSubtable; union MorxSpecificSubtable { MorxRearrangementSubtable rearrangement; MorxContextualSubtable contextual; MorxLigatureSubtable ligature; MortSwashSubtable swash; MorxInsertionSubtable insertion; }; typedef union MorxSpecificSubtable MorxSpecificSubtable; struct MorxSubtable { UInt32 length; UInt32 coverage; MortSubtableMaskFlags flags; MorxSpecificSubtable u; }; typedef struct MorxSubtable MorxSubtable; struct MorxChain { MortSubtableMaskFlags defaultFlags; /* default flags for this chain */ UInt32 length; /* byte length of this chain */ UInt32 nFeatures; /* number of feature entries */ UInt32 nSubtables; /* number of subtables */ MortFeatureEntry featureEntries[1]; /* the subtables follow */ }; typedef struct MorxChain MorxChain; struct MorxTable { Fixed version; UInt32 nChains; MorxChain chains[1]; }; typedef struct MorxTable MorxTable; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'prop' */ /* CONSTANTS */ enum { kPROPTag = 0x70726F70, /* 'prop' */ kPROPCurrentVersion = 0x00030000, /* current version number for 'prop' table */ kPROPPairOffsetShift = 8, kPROPPairOffsetSign = 7, kPROPIsFloaterMask = 0x8000, /* glyph is floater */ kPROPCanHangLTMask = 0x4000, /* glyph can hang left/top */ kPROPCanHangRBMask = 0x2000, /* glyph can hang right/bottom */ kPROPUseRLPairMask = 0x1000, /* if glyph lands in RL streak, use paired glyph */ kPROPPairOffsetMask = 0x0F00, /* 4-bit signed offset to other pair member */ kPROPRightConnectMask = 0x0080, /* glyph connects to glyph on right */ kPROPZeroReserved = 0x0060, /* must be zero */ kPROPDirectionMask = 0x001F /* direction bits */ }; /* These are the Unicode direction classes (plus the Special European Number class). */ enum { kPROPLDirectionClass = 0, /* Left-to-Right */ kPROPRDirectionClass = 1, /* Right-to-Left */ kPROPALDirectionClass = 2, /* Right-to-Left Arabic Letter */ kPROPENDirectionClass = 3, /* European Number */ kPROPESDirectionClass = 4, /* European Number Seperator */ kPROPETDirectionClass = 5, /* European Number Terminator */ kPROPANDirectionClass = 6, /* Arabic Number */ kPROPCSDirectionClass = 7, /* Common Number Seperator */ kPROPPSDirectionClass = 8, /* Paragraph Seperator (also referred to as Block Separator) */ kPROPSDirectionClass = 9, /* Segment Seperator */ kPROPWSDirectionClass = 10, /* Whitespace */ kPROPONDirectionClass = 11, /* Other Neutral */ kPROPSENDirectionClass = 12, /* Special European Number (not a Unicode class) */ kPROPLREDirectionClass = 13, /* Left-to-Right Embeding */ kPROPLRODirectionClass = 14, /* Left-to-Right Override */ kPROPRLEDirectionClass = 15, /* Right-to-Left Embeding */ kPROPRLODirectionClass = 16, /* Right-to-Left Override */ kPROPPDFDirectionClass = 17, /* Pop Directional Format */ kPROPNSMDirectionClass = 18, /* Non-Spacing Mark */ kPROPBNDirectionClass = 19, /* Boundary Neutral */ kPROPNumDirectionClasses = 20 /* Number of Unicode directional types + Special European Number */ }; /* TYPES */ typedef UInt16 PropCharProperties; struct PropTable { Fixed version; UInt16 format; PropCharProperties defaultProps; SFNTLookupTable lookup; }; typedef struct PropTable PropTable; struct PropLookupSegment { UInt16 lastGlyph; UInt16 firstGlyph; UInt16 value; }; typedef struct PropLookupSegment PropLookupSegment; struct PropLookupSingle { UInt16 glyph; PropCharProperties props; }; typedef struct PropLookupSingle PropLookupSingle; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'trak' */ /* CONSTANTS */ enum { kTRAKTag = 0x7472616B, /* 'trak' */ kTRAKCurrentVersion = 0x00010000, /* current version number for 'trak' table */ kTRAKUniformFormat = 0 /* kTRAKPerGlyphFormat = 2*/ }; /* TYPES */ typedef SInt16 TrakValue; struct TrakTableEntry { Fixed track; UInt16 nameTableIndex; UInt16 sizesOffset; /* offset to array of TrackingValues */ }; typedef struct TrakTableEntry TrakTableEntry; struct TrakTableData { UInt16 nTracks; UInt16 nSizes; UInt32 sizeTableOffset; TrakTableEntry trakTable[1]; }; typedef struct TrakTableData TrakTableData; struct TrakTable { Fixed version; UInt16 format; UInt16 horizOffset; UInt16 vertOffset; }; typedef struct TrakTable TrakTable; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'kern' */ /* CONSTANTS */ enum { kKERNTag = 0x6B65726E, /* 'kern' */ kKERNCurrentVersion = 0x00010000, kKERNVertical = 0x8000, /* set if this table has vertical kerning information */ kKERNResetCrossStream = 0x8000, /* this value in a cross-stream table means reset to zero */ kKERNCrossStream = 0x4000, /* set if this table contains cross-stream kerning values */ kKERNVariation = 0x2000, /* set if this table contains variation kerning values */ kKERNUnusedBits = 0x1F00, /* UNUSED, MUST BE ZERO */ kKERNFormatMask = 0x00FF /* format of this subtable */ }; enum { kKERNOrderedList = 0, /* ordered list of kerning pairs */ kKERNStateTable = 1, /* state table for n-way contextual kerning */ kKERNSimpleArray = 2, /* simple n X m array of kerning values */ kKERNIndexArray = 3 /* modifed version of SimpleArray */ }; /* Message Type Flags */ enum { kKERNLineStart = 0x00000001, /* Array of glyphs starts a line */ kKERNLineEndKerning = 0x00000002, /* Array of glyphs ends a line */ kKERNNoCrossKerning = 0x00000004, /* Prohibit cross kerning */ kKERNNotesRequested = 0x00000008, /* Caller wants kerning notes */ kKERNNoStakeNote = 1, /* Indicates a glyph was involved in a kerning pair/group */ kKERNCrossStreamResetNote = 2, /* Indicates a return-to-baseline in cross-stream kerning */ kKERNNotApplied = 0x00000001 /* All kerning values were zero, kerning call had no effect */ }; /* TYPES */ typedef UInt8 KernTableFormat; typedef UInt16 KernSubtableInfo; typedef SInt16 KernKerningValue; typedef UInt16 KernArrayOffset; /* header for version 0 kerning table */ struct KernVersion0Header { UInt16 version; /* font version number (will be 0!) */ UInt16 nTables; /* number of subtables present */ UInt16 firstSubtable[1]; /* first subtable starts here */ }; typedef struct KernVersion0Header KernVersion0Header; /* Header for a kerning table */ struct KernTableHeader { Fixed version; /* font version number (currently 1.0) */ SInt32 nTables; /* number of subtables present */ UInt16 firstSubtable[1]; /* first subtable starts here */ }; typedef struct KernTableHeader KernTableHeader; typedef KernTableHeader * KernTableHeaderPtr; typedef KernTableHeaderPtr * KernTableHeaderHandle; /* F O R M A T S P E C I F I C D E F I N I T I O N S kernOrderedList: The table is a sorted list of [left glyph, right glyph, value] triples. There's enough information in the header so that the list can be efficiently binary searched. */ /* defines a single kerning pair of Glyphcodes */ struct KernKerningPair { UInt16 left; UInt16 right; }; typedef struct KernKerningPair KernKerningPair; /* a single list entry */ struct KernOrderedListEntry { KernKerningPair pair; /* the kerning pair */ KernKerningValue value; /* the kerning value for the above pair */ }; typedef struct KernOrderedListEntry KernOrderedListEntry; typedef KernOrderedListEntry * KernOrderedListEntryPtr; /* the header information for binary searching the list */ struct KernOrderedListHeader { UInt16 nPairs; /* number of kerning pairs in table */ UInt16 searchRange; /* (largest power of two <= nPairs) * entry size */ UInt16 entrySelector; /* log2 (largest power of two <= nPairs) */ UInt16 rangeShift; /* (nPairs - largest power of two <= nPairs) * entry size */ UInt16 table[1]; /* entries are first glyph, second glyph, and value */ }; typedef struct KernOrderedListHeader KernOrderedListHeader; /* KernStateTable: like the the generic state tables */ struct KernStateHeader { STHeader header; /* state table header */ UInt16 valueTable; /* offset to kerning value table */ UInt8 firstTable[1]; /* first table starts here */ }; typedef struct KernStateHeader KernStateHeader; struct KernStateEntry { UInt16 newState; UInt16 flags; /* flags per above enum */ }; typedef struct KernStateEntry KernStateEntry; /* Kern offset table header. The offset table is a trimmed array from firstGlyph to limitGlyph. Glyphs outside of this range should get zero for right-hand glyphs and the offset of the beginning of the kerning array for left-hand glyphs. */ struct KernOffsetTable { UInt16 firstGlyph; /* first glyph in class range */ UInt16 nGlyphs; /* number of glyphs in class range */ KernArrayOffset offsetTable[1]; /* offset table starts here */ }; typedef struct KernOffsetTable KernOffsetTable; typedef KernOffsetTable * KernOffsetTablePtr; /* Header information for accessing offset tables and kerning array */ /* KernSimpleArray: The array is an nXm array of kenring values. Each row in the array represents one left-hand glyph, and each column one right-hand glyph. The zeroth row and column always represent glyphs that are out of bounds and will always contain zero. A pair is looked up by indexing the left-hand glyph through the left offset table, the right-hand glyph through the right offset table, adding both offsets to the starting address of the kerning array, and fetching the kerning value pointed to. */ /* Kern offset table header. */ /* The offset table is a trimmed array from firstGlyph to limitGlyph. */ /* Glyphs outside of this range should get zero for right-hand glyphs */ /* and the offset of the beginning of the kerning array for left- */ /* hand glyphs. */ struct KernSimpleArrayHeader { UInt16 rowWidth; /* width, in bytes, of a row in the table */ UInt16 leftOffsetTable; /* offset to left-hand offset table */ UInt16 rightOffsetTable; /* offset to right-hand offset table */ KernArrayOffset theArray; /* offset to start of kerning array */ UInt16 firstTable[1]; /* first offset table starts here... */ }; typedef struct KernSimpleArrayHeader KernSimpleArrayHeader; /* Index Array */ struct KernIndexArrayHeader { UInt16 glyphCount; UInt8 kernValueCount; UInt8 leftClassCount; UInt8 rightClassCount; UInt8 flags; /* set to 0 for now */ SInt16 kernValue[1]; /* actual kerning values reference by index in kernIndex */ UInt8 leftClass[1]; /* maps left glyph to offset into kern index */ UInt8 rightClass[1]; /* maps right glyph to offset into kern index */ UInt8 kernIndex[1]; /* contains indicies into kernValue */ }; typedef struct KernIndexArrayHeader KernIndexArrayHeader; /* format specific part of subtable header */ union KernFormatSpecificHeader { KernOrderedListHeader orderedList; KernStateHeader stateTable; KernSimpleArrayHeader simpleArray; KernIndexArrayHeader indexArray; }; typedef union KernFormatSpecificHeader KernFormatSpecificHeader; /* version 0 subtable header */ struct KernVersion0SubtableHeader { UInt16 version; /* kerning table version number */ UInt16 length; /* length in bytes (including this header) */ KernSubtableInfo stInfo; /* sub-table info */ KernFormatSpecificHeader fsHeader; /* format specific sub-header */ }; typedef struct KernVersion0SubtableHeader KernVersion0SubtableHeader; /* Overall Subtable header format */ struct KernSubtableHeader { SInt32 length; /* length in bytes (including this header) */ KernSubtableInfo stInfo; /* subtable info */ SInt16 tupleIndex; /* tuple index for variation subtables */ KernFormatSpecificHeader fsHeader; /* format specific sub-header */ }; typedef struct KernSubtableHeader KernSubtableHeader; typedef KernSubtableHeader * KernSubtableHeaderPtr; /* --------------------------------------------------------------------------- */ /* FORMATS FOR TABLE: 'bsln' */ /* CONSTANTS */ enum { kBSLNTag = 0x62736C6E, /* 'bsln' */ kBSLNCurrentVersion = 0x00010000, /* current version number for 'bsln' table */ kBSLNDistanceFormatNoMap = 0, kBSLNDistanceFormatWithMap = 1, kBSLNControlPointFormatNoMap = 2, kBSLNControlPointFormatWithMap = 3 }; /* Baseline classes and constants */ enum { kBSLNRomanBaseline = 0, kBSLNIdeographicCenterBaseline = 1, kBSLNIdeographicLowBaseline = 2, kBSLNHangingBaseline = 3, kBSLNMathBaseline = 4, kBSLNLastBaseline = 31, kBSLNNumBaselineClasses = kBSLNLastBaseline + 1, kBSLNNoBaselineOverride = 255 }; /* TYPES */ typedef UInt32 BslnBaselineClass; /* The BslnBaselineRecord array defines the baseline deltas for the line. */ typedef Fixed BslnBaselineRecord[32]; /* BslnFormat0Part is the format-specific data for a distance table with no mapping (i.e. all the glyphs belong to the defaultBaseline). */ struct BslnFormat0Part { SInt16 deltas[32]; }; typedef struct BslnFormat0Part BslnFormat0Part; /* BslnFormat1Part is the format-specific data for a distance table with a gxMapping. */ struct BslnFormat1Part { SInt16 deltas[32]; SFNTLookupTable mappingData; }; typedef struct BslnFormat1Part BslnFormat1Part; /* BslnFormat2Part is the format-specific data for a control-point table with no mapping (i.e. all the glyphs belong to the defaultBaseline). It specifies a single glyph to use and the set of control points in that glyph that designate each of the baselines. */ struct BslnFormat2Part { UInt16 stdGlyph; SInt16 ctlPoints[32]; }; typedef struct BslnFormat2Part BslnFormat2Part; /* BslnFormat3Part is the format-specific data for a distance table with a mapping. Like format 2, it contains a single glyph and its set of control-point values for each of the baselines. */ struct BslnFormat3Part { UInt16 stdGlyph; SInt16 ctlPoints[32]; SFNTLookupTable mappingData; }; typedef struct BslnFormat3Part BslnFormat3Part; /* The BslnFormatUnion is a union containing the format-specific parts of the baseline table. */ union BslnFormatUnion { BslnFormat0Part fmt0Part; BslnFormat1Part fmt1Part; BslnFormat2Part fmt2Part; BslnFormat3Part fmt3Part; }; typedef union BslnFormatUnion BslnFormatUnion; /* The table format used in BaselineTable */ typedef UInt16 BslnTableFormat; /* BaselineTable defines the top-level format of the baseline table in the font. */ struct BslnTable { Fixed version; BslnTableFormat format; UInt16 defaultBaseline; BslnFormatUnion parts; }; typedef struct BslnTable BslnTable; typedef BslnTable * BslnTablePtr; /* --------------------------------------------------------------------------- */ #if PRAGMA_STRUCT_ALIGN #pragma options align=reset #elif PRAGMA_STRUCT_PACKPUSH #pragma pack(pop) #elif PRAGMA_STRUCT_PACK #pragma pack() #endif #ifdef PRAGMA_IMPORT_OFF #pragma import off #elif PRAGMA_IMPORT #pragma import reset #endif #endif /* __SFNTLAYOUTTYPES__ */
{ "pile_set_name": "Github" }
1. Field of the Invention The present invention generally relates to coding in information and data processing systems and, more particularly, to a method for correcting a bust of errors plus random errors in data. Such errors may, for example, originate from reading data from a disk drive storing the data. 2. Background Description Many methods are known for correcting random errors in codes with check symbols. Reed-Solomon codes are designed to correct random errors. If the code has t syndromes then the minimum distance between two code words is t+1 so at most t/2 random errors can be corrected. If some of the errors are erasure errors (i.e., their location is known) then f erasure errors and e random errors can be corrected as long as 2e+f does not exceed t. Methods for correcting those errors are known, and are not a part of this invention. In many cases it is known that errors may occur in bursts as well as at random locations. For some applications, such as in correcting errors while reading magnetic disks, it is known (or suspected) that a burst of b errors (some of which may have the value 0, i.e., no error occurred at those locations) have occurred (a burst of b errors is b errors whose locations are contiguous) in addition to e random errors. In this case 2e+b+1 cannot exceed t. The usual method for correcting a burst of b errors in addition to e random errors is to start with l=0 (l being the location of the start of the burst) and treat the locations l, l+1, . . . , as the location of b erasure errors, and employ one of the known methods for correcting b erasure errors (whose locations are l, l+1, . . . , l+b−1) and e random errors. The value of l is then changed to l+1, and the process repeated. It should be emphasized that there may be multiple solutions to a burst of b errors and e random errors, and some other criterion has to be used to resolve this ambiguity when it arises. The drawback of this method is that as many values of l as the length of the code must be checked (more precisely, the length of the code minus (b−1)). Typically, the value of l ranges from 170 to 500-600.
{ "pile_set_name": "USPTO Backgrounds" }
Lot 609 TWO NEW GUINEA SHELL AND FIBRE ORNAMENTS Price realisedNLG 878 EstimateNLG 1,500 - NLG 2,000 TWO NEW GUINEA SHELL AND FIBRE ORNAMENTS Each with large woven panel with pendent strips, painted red and blue, nassa shell borders, each with an ovula shell to each side of the central wood rib 33cm. and 37cm. long (2)
{ "pile_set_name": "Pile-CC" }
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <title>VSTGUI: CFileExtension Class Reference</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <link href="doxydocu.css" rel="stylesheet" type="text/css"/> </head> <body> <!-- Generated by Doxygen 1.6.3 --> <div class="navigation" id="top"> <div class="tabs"> <ul> <li><a href="index.html"><span>Main&nbsp;Page</span></a></li> <li><a href="pages.html"><span>Related&nbsp;Pages</span></a></li> <li><a href="modules.html"><span>Modules</span></a></li> <li><a href="namespaces.html"><span>Namespaces</span></a></li> <li class="current"><a href="annotated.html"><span>Classes</span></a></li> <li><a href="files.html"><span>Files</span></a></li> </ul> </div> <div class="tabs"> <ul> <li><a href="annotated.html"><span>Class&nbsp;List</span></a></li> <li><a href="classes.html"><span>Class&nbsp;Index</span></a></li> <li><a href="hierarchy.html"><span>Class&nbsp;Hierarchy</span></a></li> <li><a href="functions.html"><span>Class&nbsp;Members</span></a></li> </ul> </div> </div> <div class="contents"> <h1>CFileExtension Class Reference</h1><!-- doxytag: class="CFileExtension" --><!-- doxytag: inherits="CBaseObject" --> <p>file extension description <a href="#_details">More...</a></p> <p><code>#include &lt;cfileselector.h&gt;</code></p> <p><a href="class_c_file_extension-members.html">List of all members.</a></p> <table border="0" cellpadding="0" cellspacing="0"> <tr><td colspan="2"><h2>Public Member Functions</h2></td></tr> <tr><td class="memItemLeft" align="right" valign="top">&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a82ad1d2467b3cada2ad3e60760201d08">CFileExtension</a> (const char *<a class="el" href="class_c_file_extension.html#a8444d6e0dfe2bbab0b5e7b24308f1559">description</a>, const char *<a class="el" href="class_c_file_extension.html#a84bf1fb20854625843d173ca370a6f91">extension</a>, const char *<a class="el" href="class_c_file_extension.html#a601a3f862806cfe363e774594ef28bfe">mimeType</a>=0, int <a class="el" href="class_c_file_extension.html#ae420482072c5abe9844a5552886e7107">macType</a>=0)</td></tr> <tr><td class="memItemLeft" align="right" valign="top">&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a7060e6cf2650cf7cca4151b8eb0fa884">CFileExtension</a> (const <a class="el" href="class_c_file_extension.html">CFileExtension</a> &amp;ext)</td></tr> <tr><td class="memItemLeft" align="right" valign="top">&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a9786a248d13d8f466332b3397db4a20d">~CFileExtension</a> ()</td></tr> <tr><td class="memItemLeft" align="right" valign="top">const char *&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a75a561fea2eb253bec2f2d45a53e6bf2">getDescription</a> () const </td></tr> <tr><td class="memItemLeft" align="right" valign="top">const char *&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#ad1f9205ddf7a7da6aa5f653cd11b86cb">getExtension</a> () const </td></tr> <tr><td class="memItemLeft" align="right" valign="top">const char *&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a9e4b12ddfc9afd9b82b1dbce916ea665">getMimeType</a> () const </td></tr> <tr><td class="memItemLeft" align="right" valign="top">int&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#aab0974b698118961536a3dc03e1055b8">getMacType</a> () const </td></tr> <tr><td class="memItemLeft" align="right" valign="top">bool&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a3e7a70079acd9cc71ef1795a211b28cb">operator==</a> (const <a class="el" href="class_c_file_extension.html">CFileExtension</a> &amp;ext) const </td></tr> <tr><td colspan="2"><div class="groupHeader">Reference Counting Methods</div></td></tr> <tr><td colspan="2"><div class="groupText"><p><a class="anchor" id="amgrpedfd2603e45787e0f5180f3f75cb23db"></a> </p> </div></td></tr> <tr><td class="memItemLeft" align="right" valign="top">virtual void&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_base_object.html#ad63e28fbe95a3458c97c60bfacd47ab8">forget</a> ()</td></tr> <tr><td class="mdescLeft">&nbsp;</td><td class="mdescRight">decrease refcount and delete object if refcount == 0 <a href="#ad63e28fbe95a3458c97c60bfacd47ab8"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">virtual void&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_base_object.html#ada0719d1daaca4af1795018001769311">remember</a> ()</td></tr> <tr><td class="mdescLeft">&nbsp;</td><td class="mdescRight">increase refcount <a href="#ada0719d1daaca4af1795018001769311"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">long&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_base_object.html#a7baf9c801f9691fb887f3e4473b89761">getNbReference</a> () const </td></tr> <tr><td class="mdescLeft">&nbsp;</td><td class="mdescRight">get refcount <a href="#a7baf9c801f9691fb887f3e4473b89761"></a><br/></td></tr> <tr><td colspan="2"><div class="groupHeader">Message Methods</div></td></tr> <tr><td colspan="2"><div class="groupText"><p><a class="anchor" id="amgrp84a4b7ed6226b9142fbae63958a627a5"></a> </p> </div></td></tr> <tr><td class="memItemLeft" align="right" valign="top">virtual <a class="el" href="vstgui_8h.html#a2c1cd94c80c1fa6feeb2d29e8116caa7">CMessageResult</a>&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_base_object.html#af6f09a19ef1db7b019690590747b34e8">notify</a> (<a class="el" href="class_c_base_object.html">CBaseObject</a> *sender, const char *message)</td></tr> <tr><td colspan="2"><h2>Protected Member Functions</h2></td></tr> <tr><td class="memItemLeft" align="right" valign="top">void&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a466e95a851ee99905e3a2887437da571">init</a> (const char *<a class="el" href="class_c_file_extension.html#a8444d6e0dfe2bbab0b5e7b24308f1559">description</a>, const char *<a class="el" href="class_c_file_extension.html#a84bf1fb20854625843d173ca370a6f91">extension</a>, const char *<a class="el" href="class_c_file_extension.html#a601a3f862806cfe363e774594ef28bfe">mimeType</a>)</td></tr> <tr><td colspan="2"><h2>Protected Attributes</h2></td></tr> <tr><td class="memItemLeft" align="right" valign="top">char *&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a8444d6e0dfe2bbab0b5e7b24308f1559">description</a></td></tr> <tr><td class="memItemLeft" align="right" valign="top">char *&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a84bf1fb20854625843d173ca370a6f91">extension</a></td></tr> <tr><td class="memItemLeft" align="right" valign="top">char *&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#a601a3f862806cfe363e774594ef28bfe">mimeType</a></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int&nbsp;</td><td class="memItemRight" valign="bottom"><a class="el" href="class_c_file_extension.html#ae420482072c5abe9844a5552886e7107">macType</a></td></tr> </table> <hr/><a name="_details"></a><h2>Detailed Description</h2> <p>file extension description </p> <hr/><h2>Constructor &amp; Destructor Documentation</h2> <a class="anchor" id="a82ad1d2467b3cada2ad3e60760201d08"></a><!-- doxytag: member="CFileExtension::CFileExtension" ref="a82ad1d2467b3cada2ad3e60760201d08" args="(const char *description, const char *extension, const char *mimeType=0, int macType=0)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname"><a class="el" href="class_c_file_extension.html">CFileExtension</a> </td> <td>(</td> <td class="paramtype">const char *&nbsp;</td> <td class="paramname"> <em>description</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char *&nbsp;</td> <td class="paramname"> <em>extension</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char *&nbsp;</td> <td class="paramname"> <em>mimeType</em> = <code>0</code>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int&nbsp;</td> <td class="paramname"> <em>macType</em> = <code>0</code></td><td>&nbsp;</td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td><td></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="a7060e6cf2650cf7cca4151b8eb0fa884"></a><!-- doxytag: member="CFileExtension::CFileExtension" ref="a7060e6cf2650cf7cca4151b8eb0fa884" args="(const CFileExtension &amp;ext)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname"><a class="el" href="class_c_file_extension.html">CFileExtension</a> </td> <td>(</td> <td class="paramtype">const <a class="el" href="class_c_file_extension.html">CFileExtension</a> &amp;&nbsp;</td> <td class="paramname"> <em>ext</em></td> <td>&nbsp;)&nbsp;</td> <td></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="a9786a248d13d8f466332b3397db4a20d"></a><!-- doxytag: member="CFileExtension::~CFileExtension" ref="a9786a248d13d8f466332b3397db4a20d" args="()" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">~<a class="el" href="class_c_file_extension.html">CFileExtension</a> </td> <td>(</td> <td class="paramname"></td> <td>&nbsp;)&nbsp;</td> <td></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <hr/><h2>Member Function Documentation</h2> <a class="anchor" id="a75a561fea2eb253bec2f2d45a53e6bf2"></a><!-- doxytag: member="CFileExtension::getDescription" ref="a75a561fea2eb253bec2f2d45a53e6bf2" args="() const " --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">const char* getDescription </td> <td>(</td> <td class="paramname"></td> <td>&nbsp;)&nbsp;</td> <td> const<code> [inline]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="ad1f9205ddf7a7da6aa5f653cd11b86cb"></a><!-- doxytag: member="CFileExtension::getExtension" ref="ad1f9205ddf7a7da6aa5f653cd11b86cb" args="() const " --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">const char* getExtension </td> <td>(</td> <td class="paramname"></td> <td>&nbsp;)&nbsp;</td> <td> const<code> [inline]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="a9e4b12ddfc9afd9b82b1dbce916ea665"></a><!-- doxytag: member="CFileExtension::getMimeType" ref="a9e4b12ddfc9afd9b82b1dbce916ea665" args="() const " --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">const char* getMimeType </td> <td>(</td> <td class="paramname"></td> <td>&nbsp;)&nbsp;</td> <td> const<code> [inline]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="aab0974b698118961536a3dc03e1055b8"></a><!-- doxytag: member="CFileExtension::getMacType" ref="aab0974b698118961536a3dc03e1055b8" args="() const " --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int getMacType </td> <td>(</td> <td class="paramname"></td> <td>&nbsp;)&nbsp;</td> <td> const<code> [inline]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="a3e7a70079acd9cc71ef1795a211b28cb"></a><!-- doxytag: member="CFileExtension::operator==" ref="a3e7a70079acd9cc71ef1795a211b28cb" args="(const CFileExtension &amp;ext) const " --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">bool operator== </td> <td>(</td> <td class="paramtype">const <a class="el" href="class_c_file_extension.html">CFileExtension</a> &amp;&nbsp;</td> <td class="paramname"> <em>ext</em></td> <td>&nbsp;)&nbsp;</td> <td> const</td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="a466e95a851ee99905e3a2887437da571"></a><!-- doxytag: member="CFileExtension::init" ref="a466e95a851ee99905e3a2887437da571" args="(const char *description, const char *extension, const char *mimeType)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void init </td> <td>(</td> <td class="paramtype">const char *&nbsp;</td> <td class="paramname"> <em>description</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char *&nbsp;</td> <td class="paramname"> <em>extension</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char *&nbsp;</td> <td class="paramname"> <em>mimeType</em></td><td>&nbsp;</td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td><td><code> [protected]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="ad63e28fbe95a3458c97c60bfacd47ab8"></a><!-- doxytag: member="CFileExtension::forget" ref="ad63e28fbe95a3458c97c60bfacd47ab8" args="()" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">virtual void forget </td> <td>(</td> <td class="paramname"></td> <td>&nbsp;)&nbsp;</td> <td><code> [inline, virtual, inherited]</code></td> </tr> </table> </div> <div class="memdoc"> <p>decrease refcount and delete object if refcount == 0 </p> <p>Reimplemented in <a class="el" href="class_c_draw_context.html#aa78336379db86549f01190aa3dae09a1">CDrawContext</a>.</p> </div> </div> <a class="anchor" id="ada0719d1daaca4af1795018001769311"></a><!-- doxytag: member="CFileExtension::remember" ref="ada0719d1daaca4af1795018001769311" args="()" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">virtual void remember </td> <td>(</td> <td class="paramname"></td> <td>&nbsp;)&nbsp;</td> <td><code> [inline, virtual, inherited]</code></td> </tr> </table> </div> <div class="memdoc"> <p>increase refcount </p> </div> </div> <a class="anchor" id="a7baf9c801f9691fb887f3e4473b89761"></a><!-- doxytag: member="CFileExtension::getNbReference" ref="a7baf9c801f9691fb887f3e4473b89761" args="() const " --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">long getNbReference </td> <td>(</td> <td class="paramname"></td> <td>&nbsp;)&nbsp;</td> <td> const<code> [inline, inherited]</code></td> </tr> </table> </div> <div class="memdoc"> <p>get refcount </p> </div> </div> <a class="anchor" id="af6f09a19ef1db7b019690590747b34e8"></a><!-- doxytag: member="CFileExtension::notify" ref="af6f09a19ef1db7b019690590747b34e8" args="(CBaseObject *sender, const char *message)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">virtual <a class="el" href="vstgui_8h.html#a2c1cd94c80c1fa6feeb2d29e8116caa7">CMessageResult</a> notify </td> <td>(</td> <td class="paramtype"><a class="el" href="class_c_base_object.html">CBaseObject</a> *&nbsp;</td> <td class="paramname"> <em>sender</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char *&nbsp;</td> <td class="paramname"> <em>message</em></td><td>&nbsp;</td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td><td><code> [inline, virtual, inherited]</code></td> </tr> </table> </div> <div class="memdoc"> <p>Reimplemented in <a class="el" href="class_c_data_browser.html#a995cf6e41cb91dff28a59638c9814ae1">CDataBrowser</a>, <a class="el" href="class_c_scrollbar.html#a995cf6e41cb91dff28a59638c9814ae1">CScrollbar</a>, <a class="el" href="class_c_tooltip_support.html#af3f8320730913edf80f42a4b67c79b6c">CTooltipSupport</a>, <a class="el" href="class_c_view.html#a995cf6e41cb91dff28a59638c9814ae1">CView</a>, and <a class="el" href="class_c_view_container.html#a995cf6e41cb91dff28a59638c9814ae1">CViewContainer</a>.</p> </div> </div> <hr/><h2>Member Data Documentation</h2> <a class="anchor" id="a8444d6e0dfe2bbab0b5e7b24308f1559"></a><!-- doxytag: member="CFileExtension::description" ref="a8444d6e0dfe2bbab0b5e7b24308f1559" args="" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">char* <a class="el" href="class_c_file_extension.html#a8444d6e0dfe2bbab0b5e7b24308f1559">description</a><code> [protected]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="a84bf1fb20854625843d173ca370a6f91"></a><!-- doxytag: member="CFileExtension::extension" ref="a84bf1fb20854625843d173ca370a6f91" args="" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">char* <a class="el" href="class_c_file_extension.html#a84bf1fb20854625843d173ca370a6f91">extension</a><code> [protected]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="a601a3f862806cfe363e774594ef28bfe"></a><!-- doxytag: member="CFileExtension::mimeType" ref="a601a3f862806cfe363e774594ef28bfe" args="" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">char* <a class="el" href="class_c_file_extension.html#a601a3f862806cfe363e774594ef28bfe">mimeType</a><code> [protected]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <a class="anchor" id="ae420482072c5abe9844a5552886e7107"></a><!-- doxytag: member="CFileExtension::macType" ref="ae420482072c5abe9844a5552886e7107" args="" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int <a class="el" href="class_c_file_extension.html#ae420482072c5abe9844a5552886e7107">macType</a><code> [protected]</code></td> </tr> </table> </div> <div class="memdoc"> </div> </div> <hr/>The documentation for this class was generated from the following files:<ul> <li><a class="el" href="cfileselector_8h.html">cfileselector.h</a></li> <li><a class="el" href="cfileselector_8cpp.html">cfileselector.cpp</a></li> </ul> </div> <hr class="footer"/><address style="text-align: right;"><small>Generated on Fri Apr 9 10:19:32 2010 for VSTGUI by&nbsp; <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.6.3 </small></address> </body> </html>
{ "pile_set_name": "Github" }
Diagnosis and management of hereditary hemochromatosis. Hereditary hemochromatosis is inherited in an autosomal recessive manner with partial biochemical expression in heterozygotes. A high percentage of saturation of serum transferrin is the hallmark of the disorder, and serum ferritin concentration gives an approximate estimation of the size of iron stores. Hepatic computed tomography, magnetic susceptometry, and nuclear magnetic resonance provide new noninvasive ways of determining hepatic iron content, but chemical estimation of iron in a percutaneous liver biopsy specimen remains the mainstay of diagnosis. Once a proband is identified, transferrin saturation and serum ferritin are used to screen family members and HLA typing is employed selectively to detect homozygotes at risk. Removal of excess body iron and maintenance of normal iron stores by repeated venesection arrests tissue injury and prolongs survival.
{ "pile_set_name": "PubMed Abstracts" }
Imports Access = NetOffice.AccessApi Imports NetOffice.AccessApi.Enums Imports NetOffice.AccessApi.Constants Imports DAO = NetOffice.DAOApi Imports NetOffice.DAOApi.Enums Imports NetOffice.DAOApi.Constants Public Class Example04 Implements IExample Dim _hostApplication As ExampleBase.IHost #Region "IExample Member" Public Sub RunExample() Implements ExampleBase.IExample.RunExample ' its an example with an own visual control ' checkout ShowDatabaseInfo End Sub Public ReadOnly Property Caption As String Implements ExampleBase.IExample.Caption Get Return "Example04" End Get End Property Public ReadOnly Property Description As String Implements ExampleBase.IExample.Description Get Return "Database informations" End Get End Property Public Sub Connect(ByVal hostApplication As ExampleBase.IHost) Implements ExampleBase.IExample.Connect _hostApplication = hostApplication End Sub Public ReadOnly Property Panel As System.Windows.Forms.UserControl Implements ExampleBase.IExample.Panel Get Return Nothing End Get End Property #End Region #Region "UI Trigger" Private Sub buttonSelectDatabase_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles buttonSelectDatabase.Click Dim ofd As New OpenFileDialog() ofd.Filter = "(*.mdb)|*.mdb|(*.accdb)|.accdb" If (DialogResult.OK = ofd.ShowDialog(Me)) Then textBoxFilePath.Text = ofd.FileName treeViewInfo.Nodes.Clear() ShowDatabaseInfo(textBoxFilePath.Text) End If End Sub #End Region #Region "Methods" Private Sub ShowDatabaseInfo(ByVal filePath As String) ' start access Dim accessApplication As New Access.Application() 'open database Dim database As DAO.Database = accessApplication.DBEngine.Workspaces(0).OpenDatabase(filePath) Dim tnTableDefs As TreeNode = treeViewInfo.Nodes.Add("Tables") For Each item As DAO.TableDef In database.TableDefs tnTableDefs.Nodes.Add(item.Name) Next item Dim tnQueryDefs As TreeNode = treeViewInfo.Nodes.Add("Queries") For Each item As DAO.QueryDef In database.QueryDefs tnQueryDefs.Nodes.Add(item.Name) Next item Dim tnRelations As TreeNode = treeViewInfo.Nodes.Add("Relations") For Each item As DAO.Relation In database.Relations tnRelations.Nodes.Add(item.Name) Next item Dim tnContainers As TreeNode = treeViewInfo.Nodes.Add("Containers") For Each item As DAO.Container In database.Containers tnContainers.Nodes.Add(item.Name) Next item End Sub #End Region End Class
{ "pile_set_name": "Github" }
Case Studies This case study explores Student Action for a Sustainable Future, a comprehensive environmental education program for middle school students that takes place in the city of Saskatoon, the largest city in the Canadian province of Saskatchewan. This case study describes one country’s process of implementing a national environmental education act. The Taiwan Environmental Education Act (TEEA) was approved on June 5th, 2010 and went into effect the following year, on June 5th, 2011. Case Studies This case study looks at the growth of the international Eco-Schools program in Northern Ireland as well as the challenges it faces in empowering our young people to be the drivers of behavior change for a sustainable world. This case study describes the United Arab Emirates’ (UAE) Sustainable Schools Initiative, or Al Madaris Al Mustadama, which was designed to reduce the nation’s ecological footprint and help move environmental education from Case Studies This case study presents an overview of ResourceSmart Schools, a well established Victorian Government program that helps a wide range of schools benefit from embedding sustainability into everything they do.
{ "pile_set_name": "Pile-CC" }
Q: Random table name generator I am trying to write a script that will randomly generate a "name", and use the variable assigned as the table name. However i am not able to create the table i get the error "table was not created:". I listed my code below. Thanks for any help you can give me. $con = mysqli_connect("localhost","placeholder","placeholder","placeholder"); //or die ('unable to connect'); // Check connection if (mysqli_connect_errno()) { echo "Failed to connect to MySQL: " . mysqli_connect_error(); } //create random database name $alpha = "abcdefghijklmnopqrstuvwxyz"; $alpha_upper = strtoupper($alpha); $numeric = "0123456789"; $special = ".-+=_,!@$#*%<>[]{}"; $chars = ""; if (isset($_POST['length'])){ // if you want a form like above if (isset($_POST['alpha']) && $_POST['alpha'] == 'on') $chars .= $alpha; if (isset($_POST['alpha_upper']) && $_POST['alpha_upper'] == 'on') $chars .= $alpha_upper; if (isset($_POST['numeric']) && $_POST['numeric'] == 'on') $chars .= $numeric; if (isset($_POST['special']) && $_POST['special'] == 'on') $chars .= $special; $length = $_POST['length']; }else{ // default [a-zA-Z0-9]{9} $chars = $alpha . $numeric; $length = 6; } $len = strlen($chars); $pw = ''; for ($i=0;$i<$length;$i++) $pw .= substr($chars, rand(0, $len-1), 1); // the finished table name $pw = str_shuffle($pw); //using the $pw variable for the table name $sql="CREATE TABLE `' . $pw . '` ( PID INT NOT NULL AUTO_INCREMENT, PRIMARY KEY(PID), Name CHAR(15))"; if (mysqli_query($con,$sql)) { echo "table created successfully"; } else { echo "table was not created:" . mysqli_error($sql); } //TODO create XML file mysqli_close($con); A: $sql="CREATE TABLE `" . $pw . "` // you were using single quotes.. replace them with double ( PID INT NOT NULL AUTO_INCREMENT, PRIMARY KEY(PID), Name CHAR(15))"; It will work now..
{ "pile_set_name": "StackExchange" }
While convincing me that the Federal government’s listing should have applied to all koalas. I am also supportive of the suggestion that ” . . . for koalas to survive, protection of their habitat has to be the top priority.” The only problem being, understanding what is happening to koala habitat is not straight forward, even when it’s supposedly protected. For example, at Gunnedah, where 25% of koalas died during a heatwave in 2009, researchers have been providing water to koalas, from ‘blinky drinkers’, designed by a local farmer. They have found koalas are regularly drinking water during winter, when the research began. This departure from the general perception, that koalas get all their water from leaves, could reflect a reduction in soil fertility, including Soil Water Holding capacity. Also speaking at the conference was James Fitzgerald, about the growing koala population on the southern tablelands and their bark chewing. According to James koalas are drawn to particular trees that have a higher sodium content in the bark. Hence, they are raking around the base of these trees to protect them from fuel reduction burns. Another approach, given trees can only lose so much bark before they die, would be to provide ‘salt licks’ for koalas. These are readily available at any stock feed outlet and could help both koalas and trees. There isn’t reference to the talk about south coast koalas in the article. Although with regard to fuel reduction burning, the timber in the photo below is from dead Silver-top ash, the main eucalyptus regrowth after integrated logging. All of this biomass, taken from a 10 x 10 metre plot, would be consumed in a fuel reduction burn. The next shot is shows the timber from particular live and dead Allocasuarina littoralis trees, in the same plot. Most of these trees would die in a fuel reduction burn, largely cancelling any benefit from the burning. The benefits from removing some of the trees include, actually lowering the potential impact of wildfire on live eucalyptus, maintaining soil cover and habitat for ground dwelling species, along with providing woody biomass for other more useful and less polluting purposes. All up, just over 1 cubic metre of of woody biomass, equating to something above 100 tonnes per hectare, has been removed from the plot. If this growth had all gone into eucalyptus trees, the Forestry Corporation could rightly claim its management works. Shame about that. Share this: Like this: As reported on the ABC this week, the Clean Energy Finance Corporation (CEFC)” . . . has asked political leaders to actively consider using organic matter as fuel as an option to bolster the baseload energy supply.” CEFC chief executive, Paul McCartey, stressed that “forests or plantations used for the biomass had to be certified under a recognised brand as sustainable.” Of course this includes all native forests certified under the less than adequate Australian Forestry Standard. So there was a less than supportive response from the conservation movement. While open to the use of biomass from plantations, Greens’ forestry spokeswoman, Janet Rice said ” . . . There are just far too many potential holes in the legislation which would allow wood from native forests to be able to be used.” NCC chief executive Kate Smolski said ” . . . Instead of considering feeding what remains of our forests into power plants, all public native forests should be protected following the expiry of the RFAs and the industry transitioned to 100 per cent plantation.” While this sounds all very well, the notion that native forests are protected under NPWS management is a tad unrealistic. Indeed, based on current information the volume of CO2 pumped annually into the atmosphere, from the NPWS’s counter-conservation burning, must be very close to forestry’s contribution. From that perspective and given the negative impacts most fire has on forests, alternative management methods are required. In particular, reducing the wildfire hazardin regrowth forests through low impact biomass removal. So the biomass can be used for gasification and power production while the carbon, in the form of charcoal, can be sequestered in the soil. The regrowth forest management issue was raised at the recent forest forum, both by myself and a representative from East Gippland. So the message may get through, eventually. Home-sized biomass gasification unit Last week the NSW Environment Minister Gabrielle Upton announced more funding for koalas indicating ” . . .This $10 million investment is in addition to the $2.5 million allocated for the creation in March 2016 of flora reserves totalling 120 square kilometres on the South Coast, run by the National Parks and Wildlife Service, to protect the last known local koala population.” 1592 LANDS AND FORESTRY—MURRAH FLORA RESERVE—Ms Walker to ask the Minister for Primary Industries, Minister for Regional Water, Minister for Trade and Industry representing the Minister for Lands and Forestry, and Minister for Racing— (1) In relation to the $2.5 million allocated from the NSW Environmental Trust to Forestry Corporation of NSW for a haulage subsidy to source alternative logs following the declaration of the Murrah Flora Reserves: (a) how much haulage subsidy was allocated in 2015-16? (b) how much haulage subsidy was allocated in 2016-17? (2) Does the Commonwealth Environment Protection and Biodiversity Conservation Act 1999 apply in State Forest flora reserves such as the Murrah Flora Reserves? Like this: Early next month the Port Macquarie Koala Hospital will be hosting the second national koala conference. Among the 30 or so speakers at the conference is OE&H employee Chris Allen, giving a talk titled ‘Fire & habitat rehabilitation in the SE forests of NSW’. While I expect the talk will focus on the OE&H’s claims it is protecting koalas from fire and planting trees on cleared land will help them. I also expect there will be no disagreement with these claims. On the fire issue, it is now a few weeks since the first burn was ignited in the Cuttagee catchment. During that time the scorched leaves on eucalyptus have turned brown as indicated below. Also during this time the scorched needles on forest oaks have fully cured and also turned brown. Apart from some remaining large trees with black trunks, the whole area is now brown. Prior to the fire, 30 years of litter, mostly from the oaks, provided soil cover that formed a thick mat, partially welded together through the actions of various fungi. Post the fire, the greatly reduced litter layer will be dry and loose. Coupled with the dead oaks, the outcome, come next summer, would seem to be ideal conditions for a rapidly moving wildfire. Added to all this, yesterday and last night we received 100mm of rain, a large proportion of which was high intensity rainfall. While this issue could be taken up with local government, getting the OE&H to be a bit more accountable would help. Sometime in the not too distant past, OE&H supporter the South East Region Conservation Alliance announced that its website will not be updated. No reasons are provided, but it’s safe to say that SERCA has not been an effective agent for change. So it was interesting to receive the message below, recently posted on a local mailing list. ———————————————————————– In 2019 the Regional Forest Agreement (RFA), which underpins the native forest industry in our region, expires. We understand that government preference is for an automatic rollover with no public consultation. We consider this to be unacceptable. On Sunday June 11 at the Tathra hall, we will be holding a forest forum which is an initial step in promoting the message that there are better uses for our native forests than woodchipping. Local environmentalists have been developing alternative forest strategies and the time has come for wider community involvement. You will receive a more detailed notice of June 11 proceedings closer to the day. In the meantime, we ask that you flag the date and mention it to friends. David Gallan Tim Taysom President Vice-President National Parks Association (Far South Coast Branch) Like this: The NPWS is continuing its inane broad-acre burning, blotting out the sun and polluting the atmosphere for the past two weeks. Most recent is a 260 hectare burn in the Wapengo catchment, also in an area with recent koala records. The subtle but perhaps important difference on this occasion, is that the records come from surveys funded by the federal government. According to the interim working plan for the flora reserves, the federally funded surveys found black she-oak (Allocasuarina littoralis), is one of the most abundant species. The reason for this outcome probably stems from the decision to increase the diameter of trees measured in the koala plots,from 100 mm to 150 mm. If 100 mm minimum had been retained, it seems likely the surveys would confirm black she-oak are the most abundant species in most of the reserve. While credible science tells us burning does not provide leverage over wildfire in this bio-region. The data employed is from eucalyptus forests, as opposed to the generally heavily logged and burned forests in the reserve. Accordingly the volume of fuel is reported as 16.4 tonnes per hectare, with fine fuels making up about 2 tonnes per hectare or 200 grams per square metre. In the photo below is a black plastic bag filled with one square metre of fine fuel from under black she-oaks. Minus the bag it weighs 5660 grams, just over 28 times the weight of fine fuel in eucalyptus dominated forest. Not surprisingly this level of fuel greatly adds to the smoke and the CO2 produced from the fire. In this case, rather than the notional 32.8 tonnes of CO2 per hectare, the fire is likely to produce 142 tonnes of CO2 per hectare. NSW annual emissions per capita are around 19 tonnes CO2. So every 100 hectares burned equates to the annual CO2 output from 747.4 people. Yesterday I received a response from Minister Upton, pasted below, regarding my request for NPWS contact details about the fence and catchments. While it’s expected that the NPWS would readily accept the Forestry Corporation’s version of events. I can’t find any reference to illegal encroachments, fences or investigations in the flora reserve working plan. So I wonder if there may be another non community version of the plan, circulating in state government departments As for the Bega Valley Shire Council being the most appropriate contact about catchment issues. Mike Saxon is also the contact for a recently advertised OE&H position for a ‘Senior Team Leader – Water, flood plains and coast’, for the far south coast. So it possible that the NPWS and the OE&H are yet to employ someone that does catchments. Only because I found the job description interesting, details for the position are at iworkfor.nsw.gov.au, job reference- 000057WJ, and applications close Monday 15 May 2017 11.59 pm. Dear Mr Bertram I refer to your email to the Minister for the Environment, the Hon Gabrielle Upton MP about your biodiversity reconstruction project on the NSW far south coast. Your email was referred to the Office of Environment and Heritage (OEH) and I have been asked to reply. Thank you for your interest in the biodiversity of the far south coast. Before your proposal to trial biodiversity reconstruction can be considered for endorsement, there is an issue with the location of the fence that needs to be resolved. The National Parks and Wildlife Service (NPWS) have advised that the Forestry Corporation of NSW did not approve the construction of the portion of the fence on State Forest that is now part of the Murrah Flora Reserves. As part of the handover of the management of the flora reserves from Forestry Corporation to NPWS, the fence was identified as an illegal encroachment onto the Reserve. In the Murrah Flora Reserves Interim Working Plan the fence is identified for investigation. In the first instance, the Director South Coast Region (NPWS), Kane Weeks would be the most appropriate person to contact regarding the status of the fence and to consider your proposal to use the area for fauna reintroductions. The most appropriate contact about catchment issues is Bega Valley Shire Council. Like this: As part of it’s asset protection works, the NPWS have been clearing around critical assets – road signs. While such work is expected, the methods employed seem to be inconsistent with the latest koala Priority Action Statement (PAS). According to the PAS – ” . . . Intense prescribed burns or wildfires that scorch or burn the tree canopy : Liaise with relevant authorities or land managers to ensure that identified koala habitat areas are defined as assets for protection in fire planning tools when managing wildfires and prior to any hazard reduction burns. Promote best practice fire management protocols in areas of significant koala populations. Liaise with authorities or land managers to ensure that any unavoidable prescribed burns within koala habitat are conducted in a way that minimises impacts on koala habitat.” As indicated in the picture below, the clearing involved cutting down two trees. If reducing fire hazard was the aim, cutting the tree trunks a metre off the ground, thereby creating standing dead wood, seems inconsistent with this aim. Similarly the heads of the trees, have been pushed under adjacent trees, creating fine fuels, also a metre above the ground. A simple solution would be to cut the trees down at ground level and remove the branches so the logging debris is all on the ground. Meanwhile the Nature Conservation Council is seeking donations to encourage more use of renewable energy, particularly wind and solar. If local conservation groups were concerned about climate change and supported a different approach, the NCC could also push for the NPWS to move toward a carbon negative approach to management. In that case the trunks of the aforementioned trees could be employed to generate electricity to power the vehicles. The charcoal from this process, about 90% carbon, could then be put in the ground. This approach would decrease CO2 emissions, increase soil water holding capacity, reduce soil acidity and perhaps aid in reducing die-back. Of course, such an approach requires both support for and the implementation of best practice fire management protocols, in areas of significant koala populations. Like this: Depending on one’s perspective, the decision to establish a Department of Environment and Energy could be the most interesting, or disturbing outcome from federal election. Minister for the new department, the Hon. Josh Frydenberg, was quick to talk about the need for more natural gas. Naturally I expect this means more fracking, rather than constraining the large volumes of gas exported. While this Bio-region has no coal, gas or oil, it does have a timber industry that government’s claim is sustainable. So it seems likely the Forest Industry Advisory Council will see some support for its proposals to burn ‘waste timber’ for energy production. For those interested in growing trees, an alternative is using the timber currently burnt or eliminated through other means. For example, Bega Valley Council has an excavator, essentially a logging machine with a different attachment, that it uses to mulch trees along roads and elsewhere. While the purpose is increasing vision, there is an argument that such management should be part of efforts to reduce fuel loads and potential CO2 emissions, both on and beyond the road verge. In that regard I’ve recently increased the size of the gas reservoir attached to the back-yard bio-char and syngas production unit. The first gas container was designed for continuous gas production from a methane digester and only holds 0.16 of a cubic metre, at low pressure. Based on trials to date this represents about 10% of the gas produced from 35kg of Silver-top ash sticks. The new container holds 2 cubic metres and when operating, hopefully this week, should provide the opportunity to compare gas and char volumes from the other species of interest, Black forest oak. Some long term trials to evaluate whether the soil preparation using char aids in the growth of Forest red gum would be helpful. A couple of weeks ago a (or the?) NPWS ranger for the Murrah reserves, Simon Conarty, dropped in to talk about the beginning of its dog/fox baiting program, letter below. According to Simon the Local Land Services previously undertook the baiting program in Biamanga NP. The change to flora reserves has led to the NPWS taking over responsibility for baiting in both locations. Simon also advised that there is to be no change to the Forestry Corporation’s baiting program, while a management plan for the reserves is developed. The problem with the Forestry Corporation’s baiting program is the fact that it is not part of a ‘nil tenure’ approach. So while the baiting has largely eliminated dingoes and dogs, hence a significant increase in kangaroo numbers and associated road kill. It will never have a significant impact on fox numbers, while it isn’t part an approach across tenures. We are writing to inform you that the far South Coast Region NPWS are conducting a ground baiting program in the Murrah Flora Reserve and in Biamanga National Park wild dogs using 1080 meat baits. The program will commence on or shortly after 28th June 2016 and will be ongoing throughout the year. A warning that non-target animals may be affected. If you have any enquiries please call 64955023. If you have further enquiries, please call Simon Conaughty on 65955025. Like this: The Queensland government has recently released a report finding koala populations, in the south east of the state, have declined by 80%.According to the ABC ” . . . State Environment Minister Steven Miles has flagged a plan to establish an expert panel to point policy in the right direction.” Minister Miles is quoted saying: ” . . . I think it’s time for an honest conversation with policy makers but also the public about what we think it will take to protect koalas. The alternative is doing what other governments have done, proclaim a solution then realise it’s not working. We need to determine some new action and it’s very much our intention to begin that in months not years.” I couldn’t agree more about the need for an honest conversation about koalas. Along those lines, the notion of an expert panel has also been suggested, but is yet to eventuate. In part this may stem from the widely held belief that ‘protecting’ koalas can be achieved merely by stopping logging, even though the evidence proves otherwise. Locally, the Bega District News ran a story about Far South Coast Landcare, moving into new premises. It referred to one of the organisations long-term projects, ‘the planting of 13,000 trees by children to re-vegetate a river corridor between Gulaga and Biamanga national parks’. According to coordinator Dean Turner, “ . . . From all the survey work done over the last seven years we’ve got a lot of data about what is needed.” This statement would seem to be code for- ‘we planted the former primary koala feed trees but they didn’t grow’. As I understand it, secondary feed species trees are now being planted, although as soils limitations are not a consideration, there is no information to suggest these trees will either grow or be suitable for koalas. A major difference between the various state and federal re-vegetation projects would seem to be the level of reporting. For projects that ‘Plant seeds or seedlings on cleared land to establish a permanent forest’, the Clean Energy Regulator requires actual measurements, in combination with computer based ‘Reforestation Modelling Tools’. However, there appears to be no such requirement for federal Bio-fund projects or state government funded projects, even though it is all public money. It may be a rash and perhaps bold thought, but a consistent approach could be a ‘new action’ that policy makers could try. Of course locally it would require considering whether Forestry’s 1997 koala recovery plan remains the best approach, given it is consistently wrong.
{ "pile_set_name": "Pile-CC" }
Q: Using PyMC3 to fit a stretched exponential: bad initial energy I am trying to change the very simplest getting started - example of pymc3 (https://docs.pymc.io/notebooks/getting_started.html), the motivating example of linear regression into fitting a stretched exponential. The simplest version of the model I tried is y = exp(-x**beta) import numpy as np import matplotlib.pyplot as plt plt.style.use('seaborn-darkgrid') # Initialize random number generator np.random.seed(1234) # True parameter values sigma = .1 beta = 1 # Size of dataset size = 1000 # Predictor variable X1 = np.random.randn(size) # Simulate outcome variable Y = np.exp(-X1**beta) + np.random.randn(size)*sigma # specify the model import pymc3 as pm import theano.tensor as tt print('Running on PyMC3 v{}'.format(pm.__version__)) basic_model = pm.Model() with basic_model: # Priors for unknown model parameters beta = pm.HalfNormal('beta', sigma=1) sigma = pm.HalfNormal('sigma', sigma=1) # Expected value of outcome mu = pm.math.exp(-X1**beta) # Likelihood (sampling distribution) of observations Y_obs = pm.Normal('Y_obs', mu=mu, sigma=sigma, observed=Y) with basic_model: # draw 500 posterior samples trace = pm.sample(500) which yields the output Auto-assigning NUTS sampler... Initializing NUTS using jitter+adapt_diag... Multiprocess sampling (4 chains in 4 jobs) NUTS: [sigma, beta] Sampling 4 chains: 0%| | 0/4000 [00:00<?, ?draws/s]/opt/conda/lib/python3.7/site-packages/numpy/core/fromnumeric.py:2920: RuntimeWarning: Mean of empty slice. out=out, **kwargs) /opt/conda/lib/python3.7/site-packages/numpy/core/fromnumeric.py:2920: RuntimeWarning: Mean of empty slice. out=out, **kwargs) Bad initial energy, check any log probabilities that are inf or -inf, nan or very small: Y_obs NaN --------------------------------------------------------------------------- RemoteTraceback Traceback (most recent call last) RemoteTraceback: """ Traceback (most recent call last): File "/opt/conda/lib/python3.7/site-packages/pymc3/parallel_sampling.py", line 160, in _start_loop point, stats = self._compute_point() File "/opt/conda/lib/python3.7/site-packages/pymc3/parallel_sampling.py", line 191, in _compute_point point, stats = self._step_method.step(self._point) File "/opt/conda/lib/python3.7/site-packages/pymc3/step_methods/arraystep.py", line 247, in step apoint, stats = self.astep(array) File "/opt/conda/lib/python3.7/site-packages/pymc3/step_methods/hmc/base_hmc.py", line 144, in astep raise SamplingError("Bad initial energy") pymc3.exceptions.SamplingError: Bad initial energy """ The above exception was the direct cause of the following exception: SamplingError Traceback (most recent call last) SamplingError: Bad initial energy The above exception was the direct cause of the following exception: ParallelSamplingError Traceback (most recent call last) <ipython-input-310-782c941fbda8> in <module> 1 with basic_model: 2 # draw 500 posterior samples ----> 3 trace = pm.sample(500) /opt/conda/lib/python3.7/site-packages/pymc3/sampling.py in sample(draws, step, init, n_init, start, trace, chain_idx, chains, cores, tune, progressbar, model, random_seed, discard_tuned_samples, compute_convergence_checks, **kwargs) 435 _print_step_hierarchy(step) 436 try: --> 437 trace = _mp_sample(**sample_args) 438 except pickle.PickleError: 439 _log.warning("Could not pickle model, sampling singlethreaded.") /opt/conda/lib/python3.7/site-packages/pymc3/sampling.py in _mp_sample(draws, tune, step, chains, cores, chain, random_seed, start, progressbar, trace, model, **kwargs) 967 try: 968 with sampler: --> 969 for draw in sampler: 970 trace = traces[draw.chain - chain] 971 if (trace.supports_sampler_stats /opt/conda/lib/python3.7/site-packages/pymc3/parallel_sampling.py in __iter__(self) 391 392 while self._active: --> 393 draw = ProcessAdapter.recv_draw(self._active) 394 proc, is_last, draw, tuning, stats, warns = draw 395 if self._progress is not None: /opt/conda/lib/python3.7/site-packages/pymc3/parallel_sampling.py in recv_draw(processes, timeout) 295 else: 296 error = RuntimeError("Chain %s failed." % proc.chain) --> 297 raise error from old_error 298 elif msg[0] == "writing_done": 299 proc._readable = True ParallelSamplingError: Bad initial energy INFO (theano.gof.compilelock): Waiting for existing lock by process '30255' (I am process '30252') INFO (theano.gof.compilelock): To manually release the lock, delete /home/jovyan/.theano/compiledir_Linux-4.4--generic-x86_64-with-debian-buster-sid-x86_64-3.7.3-64/lock_dir /opt/conda/lib/python3.7/site-packages/numpy/core/fromnumeric.py:2920: RuntimeWarning: Mean of empty slice. out=out, **kwargs) /opt/conda/lib/python3.7/site-packages/numpy/core/fromnumeric.py:2920: RuntimeWarning: Mean of empty slice. out=out, **kwargs) Instead of the stretched exponential, I have also tried power laws, and sine functions. It seems to me that the problem arises as soon as my model is not injective. Can this be an issue (as apparent, I am a newbie in this field)? Can I restrict sampling to only positive x values? Are there any tricks to this? A: So the problem here is that X1**beta is only defined when X1 >= 0, or when beta is an integer. When you feed this into your observations, for most places, beta will be a float, and so many of mu = pm.math.exp(-X1**beta) will be nan. I found this out with >>> basic_model.check_test_point() beta_log__ -0.77 sigma_log__ -0.77 Y_obs NaN Name: Log-probability of test_point, dtype: float64 I am not sure what model you are trying to specify! There are ways to require beta to be an integer, and ways to require that X1 be positive, but I would need more details to help you describe the model.
{ "pile_set_name": "StackExchange" }
Q: How to tame the X on the JOptionPane Dialog boxes? Also, right now whenever I click the 'X" button on top right, the dialog boxes behaves as if I clicked OK (on messages) or YES (on questions). When the user clicks the X, I want DO_Nothing. In the code below, when i click on the X on the dialog box, it pops out the 'eat!'. Apparently, the X is acting as 'YES' Option, which it should not. int c =JOptionPane.showConfirmDialog(null, "Are you hungry?", "1", JOptionPane.YES_NO_OPTION); if(c==JOptionPane.YES_OPTION){ JOptionPane.showMessageDialog(null, "eat!", "Order",JOptionPane.PLAIN_MESSAGE); } else {JOptionPane.showMessageDialog(null, "ok cool", "Order",JOptionPane.PLAIN_MESSAGE);} A: Changed to show how to ignore the cancel button on Dialog box per OP clarification of question: JOptionPane pane = new JOptionPane("Are you hungry?", JOptionPane.QUESTION_MESSAGE, JOptionPane.YES_NO_OPTION); JDialog dialog = pane.createDialog("Title"); dialog.addWindowListener(new WindowAdapter() { public void windowClosing(WindowEvent evt) { } }); dialog.setContentPane(pane); dialog.setDefaultCloseOperation(JDialog.DO_NOTHING_ON_CLOSE); dialog.pack(); dialog.setVisible(true); int c = ((Integer)pane.getValue()).intValue(); if(c == JOptionPane.YES_OPTION) { JOptionPane.showMessageDialog(null, "eat!", "Order",JOptionPane.PLAIN_MESSAGE); } else if (c == JOptionPane.NO_OPTION) { JOptionPane.showMessageDialog(null, "ok cool", "Order",JOptionPane.PLAIN_MESSAGE); }
{ "pile_set_name": "StackExchange" }
Hilary Paige Smith lived in Montreal for three years — and loved it. The native of Saint John, N.B., lived in the city's Plateau neighbourhood and took full advantage of restaurants and cafés a short walk from her apartment. But when an opportunity to work remotely from her native province came along, she took it. Paige Smith says the Maritimes offered better options when it came to housing, commuting and job opportunities in her first language, English. "I'm from New Brunswick; my family is here, and if I were to settle down and have kids, I'd have support around me," explained Paige Smith, a marketing specialist. The 27-year-old is among thousands of young Quebec residents who opt to leave for elsewhere in Canada every year. In fact, the province lost more than 7,000 people a year to interprovincial migration between 2011 and 2016, for a total of 36,955 residents, according to Statistics Canada data compiled by the Montreal-based Association for Canadian Studies. Between 2006 and 2011, by comparison, the net loss was 20,245. The new figures come as employers across the province struggle with a labour shortage caused by the bustling economy and shrinking labour pool. The figures do not, however, include the current year. Jack Jedwab, president of the Association for Canadian Studies, said most of the people leaving Quebec are between 25 and 34 years old — an age when most are just starting their careers. "It's an important group, relative to meeting our demographic challenge," he said. And it's not, in fact, anglophones leading the charge, as was the case a few decades ago when thousands of English-speakers flocked to Ontario. In total, over the five-year period, the province had a net loss of: 15,440 allophones. 10,175 anglophones. 9,225 francophones. Ontario is the top target for relocation, followed by Alberta, British Columbia and New Brunswick. Jedwab maintains the primary driver for relocation is jobs. He said quarterly results from the current year suggest people are still leaving the province at a significant rate. But the economy isn't the only factor. Like Paige Smith, Ronit Milo and her husband decided to move east for a better quality of life and more manageable cost of living. Hilary Paige Smith lived in Montreal for three years, but she moved back to New Brunswick. (Submitted by Hilary Paige Smith) They moved to Dartmouth, N.S. last summer. "Certainly, affordability of buying a house for us as a middle-class family was a big incentive ... combined with the fact that we have access to the ocean, and we're still in a city," she said. Quebec Premier Philippe Couillard said Tuesday he is optimistic that things will change. "I'm sure that, given the fact that the economy is so much stronger now, we will see a progressive — it will not happen overnight — reversal of the trend."
{ "pile_set_name": "OpenWebText2" }
An important consideration in data communication equipment is circuit density. Most central data communication locations have limited space. Therefore, there is a need to reduce the size of data communication equipment, and install as much data communication equipment as possible in a relatively small space at a central data communication location. For data communication manufacturers, making high density frames can be a challenging process in which engineers develop frames to meet the high density needs of the central data communication locations while protecting communication lines, maintaining bend radii of the communication lines, and managing massive amounts of the communication lines. This is particularly true for optical fiber communication lines, where the engineers create total front access (TFA) frames having a high density of optical fibers. Frames exist having a high density capacity of about 3,000 fiber terminations per frame, but the frames are not TFA, and instead require access to the backs of the frames. For example, in the case where the frame has a high density capacity of about 3,000 fiber terminations per frame, the splices are done at the back of the frame. Thus, a user must first splice cables at the back of the frame, and then traverse around a plurality of frames (e.g., a row of frames) to get to the front of the frame to patch the cables at the front of the frame the user is working on. Moreover, when higher density capacities of fiber terminations are involved, the frames may be a dedicated splicing only frame or a dedicated patching only frame, resulting in a higher quantity of frames, and consuming more space. Further, when higher density capacities of fiber terminations are involved, footprints of the frames can become uncommon (i.e., not a standard size), resulting in uncommon space consumption in data communication locations. For example, when higher density capacities of fiber terminations are involved, a 23-inch mount (58-centimeter mount) frame may be designed to have a footprint of a width about 30 inches (76 centimeters) and a depth of about 24 inches (61 centimeters), which may be an uncommon footprint size used in central data communication locations and may be difficult to utilize with other existing frames and/or in relatively small spaces at the central data communication locations.
{ "pile_set_name": "USPTO Backgrounds" }
Smooth or hairy, pungent or tasteless, deep-hued or bright: new versions of old fruits could be hitting the produce aisles as plant experts embrace cutting-edge technology, scientists say. While researchers have previously produced plants with specific traits through traditional breeding techniques, experts say new technologies such as the gene-editing tool Crispr-Cas9 could be used to bring about changes far more rapidly and efficiently. It could, they say, potentially open the door to a new range of fruits and vegetables that look, taste and feel very different to those we are used to. Gene-editing is already being used by scientists to change the characteristics of food. One such endeavour used Crispr to make mushrooms that don’t brown, while a team in Spain has been using the approach to try to produce wheat that can be eaten by people with coeliac disease. Still others are looking at using gene-editing to give crops resistance to particular environmental problems or pathogens. Earlier this year, biotech firm Monsanto invested $125m in a new gene-editing company called Pairwise that reportedly has goals such as sweeter-tasting strawberries, while scientists in Japan have used the technique to produce seedless tomatoes. Another team have been using Crispr to change the architecture of tomato plant branches and the spacing of fruit. Facebook Twitter Pinterest Inside a lab in Norwich where researchers from a startup called Tropic Biosciences are using Crispr to create a better banana. Photograph: Tatum Reid/Tropic Biosciences Among the genes flagged in the new study in the journal Trends in Plant Science are those behind the production of a family of substances known as MYBs, which are among the proteins that control whether other genes are switched on or off. Gene editing – and what it really means to rewrite the code of life Read more “MYBs are great targets because they are central to several consumer traits or features like colour, flavour [and] texture,” said Andrew Allan, a co-author of the review from the University of Auckland whose own projects include working on red-fleshed apples and changing the colour of kiwi fruits. “Russet skin in apple and pear [is linked to MYBs]. Hairs on peaches but not nectarines – another type of MYB.” Dr Richard Harrison, head of genetics, genomics and breeding at the horticultural organisation NIAB EMR, who was not involved in the article, said tweaking MYB genes or the way such genes are themselves controlled was a fruitful approach. “For fruits,” he said, “MYB genes have long been known to be associated with expression of molecules such as anthocyanin, a red-coloured compound that gives strawberries or blood-red oranges their colour. “Increasingly, MYBs are being implicated in the production of other important compounds, hence the interest in this family of genes that are conserved between many plant species.” Gene-editing of MYB genes and other genes could bring a host of benefits, Harrison said, adding: “There is a large opportunity to improve the nutritional profile of fruits and vegetables in the future using gene-editing technology, as well as other techniques.” Such techniques, he said, introduce the same sort of DNA changes as plant breeders have introduced by artificially selecting traits that cropped up through spontaneous DNA mutation – but much faster. Facebook Twitter Pinterest Hybrid purple raspberries of the Glen Coe variety. Crispr may make such specimens more common. Photograph: PR/Suttons “Red-fleshed apples developed through conventional breeding have taken decades to even come close to market acceptability,” he said, “due to the multiple rounds of breeding and selection that have had to occur to take the naturally occurring red-fleshed gene variant from a wild species of apple and introduce it into a commercially acceptable variety. “In our normal breeding work, we often see seedlings produced purely from conventional breeding with a range of colour and flavour profiles that simply never make it to the market, such as peach-flavoured strawberries [and] super-dark purpleish strawberries.” The review is timely: next week the European Court of Justice will announce if or how plants that have been gene-edited using techniques such as Crispr will be regulated, and whether they will be treated like genetically modified plants. The US has already ruled against serious restrictions, provided the changes could have been produced through traditional plant-breeding techniques. “We are interested in making produce more healthy, sustainable and convenient so that people will eat more produce,” Dr Haven Baker, Pairwise’s chief business officer, said, noting that gene-editing could be used to increase levels of anthocyanins, improve taste, increase shelf life, improve yields, boost disease resistance or even lengthen the season of availability. Such approaches, said Baker, could not only boost consumers’ nutrient intake, but could also reduce food waste and produce adaptations needed to weather climate change: “We are trying to solve problems that matter to both consumers and the agricultural systems.”
{ "pile_set_name": "OpenWebText2" }
--- author: - | Shay Elmalem, Raja Giryes and Emanuel Marom\ Tel Aviv University\ bibliography: - 'egbib.bib' title: Motion Deblurring using Spatiotemporal Phase Aperture Coding --- Introduction ============ Related work {#prevWork} ============ Spatiotemporal aperture coding {#mask} ============================== The color-coded motion deblurring network {#CNN} ========================================= Experiments {#exp} =========== Conclusion {#sum} ========== PSF spectral analysis {#psf_spect} ===================== CNN structure and details {#cnn_det} ========================= Test-set results {#testSet} ================ Quantitative comparison statistics {#stat} ================================== Experimental setup description {#expSetup} ============================== Additional experimental results {#expRes} ===============================
{ "pile_set_name": "ArXiv" }
By the end of 2018, nearly 8000 complete tailed phage genomes were published online and a further 22,000 partial genomes were stored in databases gathered under the umbrella of the International Nucleotide Sequence Database Collaboration ([@B34]; [@B49]). The classification of this massive group is the formal responsibility of the Bacterial and Archaeal Viruses Subcommittee of the International Committee on the Taxonomy of Viruses (ICTV). In recent years, we (the Subcommittee) have focused on classifying newly described phages into species and genera ([@B41], [@B40]; [@B3]; [@B37]; [@B4]). However, once our attention shifted toward higher order relationships, we found that the ranks currently used in phage taxonomy (species, genus, subfamily, family, and order) are no longer sufficient for the description of phage diversity. The limitation is particularly acute in the case of the order *Caudovirales*---arguably the most abundant and heterogeneous group of viruses ([@B50]; [@B53]; [@B47]). Indeed, the diversity of caudoviruses surpasses that of any other virus taxon. A recent analysis of the gene content of the dsDNA virosphere demonstrated that the global network of dsDNA viruses consists of at least 19 modules, 11 of which correspond to caudoviruses ([@B30]). Each of the eight remaining modules encompasses one or more families of eukaryotic or archaeal viruses. Consequently, each of the 11 caudovirus modules could be considered a separate family. Despite this remarkable diversity, the vast majority of caudoviruses is classified into three families *Myoviridae*, *Podoviridae*, and *Siphoviridae*, which were historically established on morphological features, forming an artificial classification ceiling. These observations prompted us to work on the update of current taxonomic order within the *Caudovirales* order. As an initial step of this major reclassification of the tailed phages, we, the members of the Subcommittee proposed creation of two novel families corresponding to distinct modules revealed in the abovementioned gene-sharing network analyses ([@B30]; [@B11]). The first of these, named *Ackermannviridae*, encompasses phages related to *Salmonella virus ViI* that were formerly assigned to the genus *Viunalikevirus* ([@B2], [@B5]). In the present work, we focus on the second new family, named *Herelleviridae*. The phages belonging to this new family are large myoviruses related to the Bacillus phage SPO1, Staphylococcus phage Twort, Staphylococcus phage K, Listeria phage P100, and Enterococcus phage $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$\varphi$\end{document}$EF24C. Most of these viruses were previously grouped in the *Spounavirinae* subfamily or recognized as related to it. When this subfamily was first devised ([@B40]), the unifying characteristics of its members included: the hosts belong to the bacterial phylum *Firmicutes*; strictly virulent lifestyle; myovirion morphology (i.e., icosahedral capsid and long contractile tail); terminally redundant, nonpermuted dsDNA genome of 127--157 kbp in length; and "considerable amino acid similarity" ([@B35]). The strictly virulent lifestyle of these viruses has been somewhat disputed ([@B54]; [@B60]) but still remains a rule of thumb for inclusion into the taxon. Since the initial description of the subfamily, the number of its members has grown significantly, and its taxonomic structure has been contested several times ([@B35]; [@B10]; [@B30]; [@B37]; [@B11]; [@B4]). Thus, we wanted not only to delineate a new family but also resolve its internal structure. Unfortunately, there is no one-size-fits-all method for the classification of viruses at all taxonomic ranks. Virus taxonomy has always suffered from the lack of universal marker genes that could be used for phylogenetic reconstruction of the evolutionary relationships. Additionally, differing mutation rates between viral lineages, horizontal gene transfer, and genomic mosaicism limit usefulness of many of the available phylogenetic and phylogenomic methods that have become the gold standard in evolutionary biology ([@B18]; [@B44]). Thus, our strategy for reclassification included a plethora of classification tools that employ very different approaches. Our analyses ranged from coarse-grained, high-throughput, holistic clustering methods where similarity is computed from comparison of all viral genes \[vContact, GRAViTy ([@B11]; [@B7]; [@B8])\] to detailed genome and proteome comparisons \[Victor, Dice, GOAT and Phage Proteomic Tree ([@B52]; [@B45]; [@B44])\] and individual gene phylogenies \[IQtree ([@B46])\]. This multifaceted approach allowed us to gradually descend from the definition of the new family to the study of its internal structure. Interestingly, despite the diversity of the applied methods their results turned out to be complementary and predominantly concordant. All methods painted a robust picture of the new family as a distinct and diverse taxon and supported the same general scheme for its structure ([Table 1](#T1){ref-type="table"}). ###### New classification of the 93 spounaviruses and spouna-like viruses in the new family *Herelleviridae*$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{a}$\end{document}$ Family Subfamily Genus$\documentclass[12pt]{minimal} Species$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{amsmath} \usepackage{wasysym} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{upgreek} \usepackage{mathrsfs} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \setlength{\oddsidemargin}{-69pt} \begin{document} \begin{document} }{}$^{a}$\end{document}$ }{}$^{b}$\end{document}$ ------------------ ------------------- ------------------------------------------- --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- *Herelleviridae* *Bastillevirinae* *Agatevirus* *Bacillus virus Agate*, *Bacillus virus Bobb*, *Bacillus virus Bp8pC* (Bp8p-T)     *Bequatrovirus* (formerly *B4virus*) *Bacillus virus AvesoBmore*, *Bacillus virus B4* (B5S), *Bacillus virus Bigbertha, Bacillus virus Riley, Bacillus virus Spock, Bacillus virus Troll*     *Bastillevirus* *Bacillus virus Bastille, Bacillus virus CAM003, Bacillus virus Evoli, Bacillus virus HoodyT*     *Caeruleovirus* (formerly *Bc431virus*) *Bacillus virus Bc431*, *Bacillus virus Bcp1*, *Bacillus virus BCP82*, *Bacillus virus JBP901*     *Nitunavirus* (formerly *Nit1virus*) *Bacillus virus Grass*, *Bacillus virus NIT1*, *Bacillus virus SPG24*     *Tsarbombavirus* *Bacillus virus BCP78* (BCU4), *Bacillus virus TsarBomba*     *Wphvirus* *Bacillus virus BPS13*, *Bacillus virus Hakuna*, *Bacillus virus Megatron* (Eyuki), *Bacillus virus WPh*, *Bacillus virus BPS10C*     Unassigned *Bacillus virus Mater*, *Bacillus virus Moonbeam*, *Bacillus virus SIOphi*   *Brockvirinae* *Kochikohdavirus* *Enterococcus virus ECP3*, *Enterococcus virus EF24C* (phiEFC24C-P2), *Enterococcus virus EFLK1*     Unassigned *Enterococccus virus EFDG1*   *Jasinskavirinae* *Pecentumvirus* (formerly *P100virus*) *Listeria virus A511*, *Listeria virus P100*, *Listeria virus List36*, *Listeria virus LMSP25* (LMTA-57, LMTA-94), *Listeria virus LMTA148*, *Listeria virus LMTA34*, *Listeria virus LP048*, *Listeria virus LP064* (LP-125), *Listeria virus LP083-*2 (LP-124), *Listeria virus AG20*, *Listeria virus WIL1*   *Spounavirinae* *Siminovitchvirus* (formerly *Cp51virus*) *Bacillus virus CP51*, *Bacillus virus JL*, *Bacillus virus Shanette*     *Okubovirus* (formerly *Spo1virus*) *Bacillus virus Camphawk*, *Bacillus virus SPO1*   *Twortvirinae* *Kayvirus* *Staphylococcus virus G1*, *Staphylococcus virus G15*, *Staphylococcus virus JD7*, *Staphylococcus virus K*, *Staphylococcus virus MCE2014*, *Staphylococcus virus P108*, *Staphylococcus virus Rodi*, *Staphylococcus virus S253*, *Staphylococcus virus S25-4*, *Staphylococcus virus SA12*, *Staphylococcus virus Sb1* (676Z, A3R, A5W, Fi200W, IME-SA1, IME-SA118, IME-SA119, IME-SA2, ISP, MSA6, P4W, SA5, Staph1N, Team1)     *Silviavirus* *Staphylococcus virus Remus* (Romulus), *Staphylococcus virus SA11*     *Sepunavirus* (formerly *Sep1virus*) *Staphylococcus virus IPLAC1C*, *Staphylococcus virus SEP1*     *Twortvirus* *Staphylococcus virus Twort*   Unassigned Unassigned *Lactobacillus virus Lb338*   Unassigned Unassigned *Lactobacillus virus LP65*   Unassigned Unassigned *Brochothrix virus A9* $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{a}$\end{document}$Genera were renamed in 2018, taxonomy proposal 2018.007B. $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{b}$\end{document}$The species listed here represent the 93 genome data set on which all analyses have been performed. Phage isolates at the subspecies or strain level are indicated between brackets. We emphasize that this reclassification is an essential step in the larger revision of the taxonomy of the order *Caudovirales*. The final goal of our group is a novel system that appropriately accommodates the genomic diversity of prokaryotic viruses and is consistent with taxonomy of eukaryotic viruses ([@B7]; [@B58]). Materials and Methods {#SEC1} ===================== For brevity and clarity's sake, only the basic principles of previously published methods are summarized in the following section. A detailed description of each method used in this study can be found in Supplementary File 1 available on Dryad at [http://dx.doi.org/10.5061/dryad.106q6g6](10.5061/dryad.106q6g6). Creation of the "Herelleviridae" Data Set {#SEC1.1} ----------------------------------------- Genome sequences of known spounaviruses were retrieved from the GenBank or (preferably) RefSeq databases based on literature data, and taxonomic classifications provided by the ICTV and the National Center for Biotechnology Information (NCBI). Records representing genomes of candidate spouna-related viruses were retrieved by searching the same databases with the tBLASTn algorithm ([@B9]) using as queries terminase and major capsid proteins of type isolates of the original subfamily ([@B13]). After manual curation, the search yielded a set of 93 virus genomes (Supplementary Table S1.1 available on Dryad), which were reannotated using PROKKA ([@B55]) and used in the following analyses. To conduct interfamilial comparisons, we compiled an additional genome set including well-described viruses from the ICTV 2016 Master Species List 31V1.1 and Virus Metadata Resource (Supplementary Table S1.2 available on Dryad). All original genome sequences are available from NCBI (accession number information listed in Supplementary Table S1 available on Dryad) and the reannotated genomes are available from Github (github.com/evelienadri/herelleviridae). Definition of the New Herelleviridae Family Within the dsDNA Virosphere {#SEC1.2} ----------------------------------------------------------------------- We examined whether or not the family, *Herelleviridae*, is a clearly distinct group of viruses within the dsDNA phages, by using two cutting-edge virus clustering tools capable of discerning relations even between divergent taxa. Using vConTACT v2.0, we constructed a monopartite network of viral genomes by clustering gene families based on BLAST hits between their protein products as previously described ([@B11]; [@B31]). In this framework, similarities between pairs of genomes were calculated as a function of the shared protein families. The network was visualized with Cytoscape (version 3.5.1; <http://cytoscape.org/>) with genomes sharing more proteins clustered more closely together (detailed information in Supplementary File 1 available on Dryad). The second method used is 'Genome Relationships Applied to Virus Taxonomy' or GRAViTy \[GitHub: Paiewsakun/GRAViTy ([@B7]; [@B8])\]. This framework created a dendrogram of viruses, based on protein profile hidden Markov models of the predicted gene products and genome organization models calculated into a composite generalized Jaccard (CGJ) score representing the difference between two viruses on a scale from 1 to 0 (detailed information in Supplementary File 1 available on Dryad). We also investigated the clustering of the family within the *Caudovirales* order on the VIPtree server ([@B48]), which uses the Phage Proteomic Tree approach described below and detailed in in Supplementary File 1 available on Dryad. Exploration of the Intrafamilial Relationship {#SEC1.3} --------------------------------------------- After demarcation of the family, we proceeded with analysis of its internal structure, using the defined set of 93 genomes described above. In the process, we compared a collection of the classification tools, gathering the phylogenetic signal from the different types of data (whole genome sequences, complete proteomes, marker genes, and gene order). Genome-Based Analyses {#SEC1.4} --------------------- Nucleotide sequence-based grouping of phages was conducted using VICTOR (Virus Classification and Tree Building Online Resource), a Genome-BLAST Distance Phylogeny (GBDP) method ([@B43]; [@B44]). The program calculates intergenomic distances from BLAST+ hits using GBDP (including 100 pseudobootstrap replicates) and used them to infer a balanced minimum evolution tree with branch support via FASTME including subtree pruning and regrafting postprocessing (for details of the algorithm design, see [@B43]; [@B44]). The analysis was conducted under settings recommended for prokaryotic viruses. To reevaluate and interpret results of the VICTOR clustering, we compared the genome sequences using the Gegenees tool with default parameters ([@B15]; [@B6]). The program calculated symmetrical identity (SI) scores for each pairwise comparison based on BLASTn hits and a genome length. To check if the translated local alignment of the whole genomes will be more sensitive to a phylogenetic signal at higher taxonomic ranks, we followed the Dice methodology proposed previously ([@B45]). The Dice score was calculated based on all reciprocal tBLASTx hits between pairs of genomes with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$\ge$\end{document}$30% identity, alignment length $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$\ge$\end{document}$30 amino acids, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$E$\end{document}$-value $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$\le$\end{document}$0.01. Pairs of scores were used to construct a distance matrix, which in turn was converted to the final tree using the BioNJ algorithm ([@B22]). Again, to evaluate and interpret this result, we calculated SI scores between all translated genome sequences using Gegenees. This time, we applied tBLASTx as the alignment algorithm with the other settings left on default values. Proteome-Based Analyses {#SEC1.5} ----------------------- The Phage Proteomic Tree was constructed as described previously ([@B52]). In brief, the protein sequences were extracted and clustered using BLASTp. These clusters were refined by Smith--Waterman alignment using CLUSTALW version 2 ([@B39]). Alignments were scored using open-source PROTDIST from the phylogeny inference package (PHYLIP) ([@B20]). Alignment scores were converted to distances as described in [@B52], and the distances thus obtained were used to generate the final tree using the neighbor joining algorithm. Identification of Protein Clusters {#SEC1.6} ---------------------------------- In order to comprehensively define the gene content in *herellevirus* genomes, we applied two independent, yet complementary methods of identifying orthologous clusters. An initial set of orthologous protein clusters (OPCs) was constructed using the GET_HOMOLOGUES software suite, which utilizes several independent clustering methods ([@B17]). To capture as many evolutionary relationships as possible, a greedy COGtriangles algorithm ([@B36]) was applied with a 50% sequence identity threshold, 50% coverage threshold, and an $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$E$\end{document}$-value cutoff equal to 1e-10. The results were converted into an orthologue matrix with the "compare_clusters" script (part of the GET_HOMOLOGUES suite) ([@B20]). A second method was based on assignment of the genes to a predefined pVOG (prokaryotic Virus Orthologous Group) set described previously ([@B24]) and available at <http://dmk-brain.ecn.uiowa.edu/pVOGs/>. In brief, protein-coding genes in the 93 analyzed genomes were identified using Prodigal V2.6.3 in anonymous mode ([@B29]). Then, the gene products were assigned to the respective orthologue group by HMMsearch ($\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$E$\end{document}$-value $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$<$\end{document}$10$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{-2}$\end{document}$) against the database of Hidden Markov Models (HMMs) created for every of 9518 pVOG alignments using HMMbuild of HMMer v3.1b2 ([@B21]). Analysis of Gene Synteny {#SEC1.7} ------------------------ To investigate a genomic synteny-based classification signal, we implemented a method developed at the University of Utrecht, a gene order-based metric built on dynamic programming, the Gene Order Alignment Tool (GOAT, Schuller et al.: Python scripts are available on request, manuscript in preparation). The tool used the pVOG assignments described above to generate a synteny profile of every genome (in fact, this pVOGs methodology is integral part of the GOAT pipeline). The algorithm accounted for gene replacements and low similarity between genes by using an all-vs-all similarity matrix between pVOG pairs based on HMM--HMM similarity (HH-suite 2.0.16) ([@B59]). Distant HHsearch similarity scores between protein families were calculated as the average of reciprocal hits and used as substitution scores in the gene order alignment. The GOAT algorithm identified the optimal gene order alignment score between two virus genomes by implementing semiglobal dynamic programming alignment based only on the order of pVOGs identified on every virus genome. To account for virus genomes being cut at arbitrary positions during sequence assembly, the gene order was transmuted at all possible positions and in both sense and antisense directions in search of the optimal alignment score. The optimal GOAT alignment score GAB between every pair of virus genomes A and B was converted to a distance DAB as follows: $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$ \mathrm {DAB} = 1 - \frac{GAB + GBA}{GAA + GBB} $\end{document}$$ in which GAB and GBA represent the optimal GOAT score between A and B, and B and A, respectively, while GAA and GBB represent the GOAT scores of the self-alignments of A and B, respectively. This pairwise distance matrix was converted to a tree with BioNJ ([@B22]). Marker Protein Phylogenies {#SEC1.8} -------------------------- Based on the OPC and pVOG clusters defined above, which respectively identified 14 and 38 core protein clusters (Supplementary Table S2 available on Dryad), we chose 10 consistently-predicted protein groups (encoded by genes with well-defined boundaries and without introns) for inclusion as phylogenetic marker. The selected clusters included: DNA helicase cluster, tail sheath protein, two different groups of virion proteins (including the major capsid protein cluster), and six clusters with no known function. The members of these clusters were aligned using Clustal Omega with default parameters ([@B56]). The resulting alignments were analyzed with the IQ-TREE pipeline, which includes the ModelFinder tool that determines the most suitable model of sequence evolution for the alignment, the main algorithm that constructs a maximum-likelihood tree and ultrafast bootstrap (UFBOOT)---an UFBOOT subroutine that calculates the support of the branches ([@B46]; [@B16]; [@B33]; [@B26]). The same program was used to generate the approximation of the "species tree" based on the concatenated alignments of all markers. In this case, the partitioned model of the alignment was also calculated using the ModelFinder module of IQ-TREE and the analysis was run in 100 replicates to select the final tree with best log-likelihood score. Visualization and Comparison of the Results {#SEC1.9} ------------------------------------------- All trees were rooted at Brochothrix phage A9---a phage that consistently appeared as a distant outlier in all obtained topologies (to facilitate comparisons) and visualized using Geneious tree viewer. The taxon coloring and the legend was added using Inkscape 0.92.3 with no distortion of topology, branch lengths, or support. Topological distances between different trees were calculated as Robinson--Foulds metrics ([@B51]) with IQ-TREE and detected differences were visualized as tanglegrams generated using Neighbor Net-based heuristics in Dendroscope 3.5.9 ([@B28]). Results {#SEC2} ======= Definition of the Candidate "Herelleviridae" Family {#SEC2.1} --------------------------------------------------- Recently, several studies have shown the paraphyly of the families constituting the order *Caudovirales* ([@B30]; [@B11]; [@B7]). We created a monopartite network of all dsDNA viruses in the NCBI RefSeq using vConTACT v2.0 ([@B11], Bolduc et al. under revision) showing the phages related to SPO1 as a clearly defined, interrelated cluster ([Fig. 1a](#F1){ref-type="fig"}). The distinctness of the cluster was confirmed with the GRAViTy pipeline ([Fig. 1b](#F1){ref-type="fig"}), which showed that subfamily classifications in the order *Caudovirales* are clustered at the same distance as the new tailed phage family *Ackermannviridae* and as eukaryotic virus families ([@B7]; [@B8]). A further comparison of all dsDNA viruses using the Phage Proteomic Tree method on the VIPTree server showed that myoviruses, siphoviruses, and podoviruses were interspersed with each other, but SPO1-related phages formed a distinct and coherent clade (Supplementary Fig. S1 available on Dryad). These results clearly indicate that the SPO1-related viruses are distinct and form a cohesive group. Based on this evidence, we propose that this group of viruses represents a new family, and we suggest the name *Herelleviridae,* in honor of the 100th anniversary of the discovery of prokaryotic viruses by Félix d'Hérelle. ![a) Network representation of predicted protein content similarity of dsDNA viruses generated with vConTACT v2.0. Viruses are represented as circles (nodes) connected with each other (edges) based on a significant number of shared protein clusters, with more similar genomes displayed closer together on the network. The genomes belonging to the new family *Herelleviridae* are indicated with a circle. Genomes previously assigned to the subfamily *Spounavirinae* are indicated in pink. b) Clustering of dsDNA bacteriophages that possess subfamily assignments in the order *Caudovirales* generated with GRAViTy, darker colors in the heatmap represent higher degrees of similarity between genomes. The phages are clustered using UPGMA into a dendrogram, showing bootstrap values (100 pseudoreplicates) on each branch.](syz036f1){#F1} Exploration of the Intrafamilial Relationship {#SEC2.2} --------------------------------------------- After delineating the family, we proceeded with the investigation of the relationships between its members. Regardless of the approach applied, we found five clearly-separated clusters interpreted by us as potential subfamilies ([Figs. 1b](#F1){ref-type="fig"}, [2](#F2){ref-type="fig"}, and [3](#F3){ref-type="fig"}, Supplementary Figs. S2--S4 available on Dryad, [Table 1](#T1){ref-type="table"}, Supplementary Table S1 available on Dryad). The first cluster (here suggested to retain the name *Spounavirinae*), groups *Bacillus*-infecting viruses that are similar to Bacillus phage SPO1. The second cluster (*Bastillevirinae*) includes *Bacillus*-infecting viruses that most closely resemble phage Bastille. The third cluster (*Brockvirinae*) comprises viruses of enterococci that are similar to Enterococcus phage $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$\varphi$\end{document}$EF24C. The fourth cluster (*Twortvirinae*) gathers staphylococci-infected viruses that are similar to Staphylococcus phage Twort. The remaining cluster (*Jasinskavirinae*) consists of viruses infecting *Listeria* that are similar to Listeria phage P100. The classification left three viruses with no genus and subfamily assignment: Lactobacillus phage Lb338, Lactobacillus phage LP65, and Brochothrix phage A9. ![a) VICTOR and b) DICE score trees. The trees were rooted at Brochothrix phage A9. The scale bars represent the calculated distance metric, branch support values at the VICTOR trees were calculated from 100 pseudobootstrap replicates. Genera and subfamilies are delineated with colored squares and colored circles, respectively.](syz036f2){#F2} ![a) Virus Proteomic Tree (VIPTree) and b) GOAT tree. The trees were rooted at Brochothrix phage A9. The scale bar represents the distance metric. Genera and subfamilies are delineated with colored squares and colored circles, respectively.](syz036f3){#F3} Five subfamily-rank clusters can be further subdivided into smaller clades that correspond well with the currently accepted genera ([Table 1](#T1){ref-type="table"}). The evidence supporting this suggested taxonomic reclassification is presented in the following sections. Genome-Based Analyses {#SEC2.3} --------------------- The genome-based analyses used to identify close relationships between phage genomes provide powerful information for species and genus demarcation. We performed an all-against-all BLASTn analysis with Gegenees ([@B6]), revealing that the genomes of several viruses were similar enough to consider them strains of the same species (they shared $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$>$\end{document}$95% nucleotide identity, [Table 1](#T1){ref-type="table"}, Supplementary Table S1, Fig. S2 available on Dryad). We could delineate clear groups with significant nucleotide similarity, proposed as genus-rank taxa, at similarities greater than 50%. Using the BLAST-based phylogenetics framework VICTOR ([@B44]), we were able to confirm that the existing genera form well-supported clades ([Fig. 2a](#F2){ref-type="fig"}). Similar patterns emerged at the translated nucleotide level when the genomes were analyzed using the tBLASTx-based Dice method ([Fig. 2b](#F2){ref-type="fig"}) ([@B45]). An all-against-all comparison at the translated nucleotide level (tBLASTx) with Gegenees showed an overall low level of similarity (15%) within the newly proposed family and allowed us to start delineating the subfamily level at approximately 25% translated genome similarity (Supplementary Fig. S2 available on Dryad). However, the subfamily boundaries were not always clear using these methods. For example, the members of the *Brockvirinae* subfamily shared 20--25% similarity at the translated nucleotide level with the twortviruses and jasinkaviruses. Proteome-Based Analyses {#SEC2.4} ----------------------- As proteome-based analyses rely on genome annotation, they are sensitive to bias introduced by different annotation methods, and the results of such analyses should, therefore, be interpreted with caution. To mitigate this, we reannotated all genomes with the same automated pipeline as described above (M&M, Supplementary File 1 available on Dryad). We inferred a Virus (Phage) Proteomic Tree using only the members of the new family to assess its internal structure ([Fig. 3a](#F3){ref-type="fig"}). This showed clearly-defined clusters at the subfamily and genus rank, but revealed longer than expected branch lengths for phages that had very similar genomes, implying that this method should not be used for fine-grained taxonomic classification. Among 1296 singleton proteins (proteins without recognizable homologues in the analyzed genomes) and 2070 protein clusters defined using the OPC approach, we identified 14 clusters common for all viruses belonging to the new family "*Herelleviridae"* ([Table 2](#T2){ref-type="table"}, Supplementary Table S2 available on Dryad). Classification of the viral proteins using pVOGs showed that 38 pVOGs were shared between all 93 virus genomes, with 14 pVOGs functionally annotated ([Table 2](#T2){ref-type="table"}, Supplementary Table S2 available on Dryad). Upon closer inspection of the gene annotations, we found that these analyses might have been confounded by the presence of introns and inteins in many of the core genes. Indeed, many genes of spounaviruses and related viruses are invaded by mobile introns or inteins ([@B23]; [@B42]). These gaps in coding sequences challenge standard gene prediction tools and introduce additional bias in similarity-based cluster algorithms. Because of these insertions as confounding factors, we used a subset of 10 core genes for further phylogenetic analysis. ###### Core genes with putative annotated functions identified in all 93 herellevirus genomes Putative function of the core gene identified$\documentclass[12pt]{minimal} pVOG/OPC ID Identification method \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{a}$\end{document}$ ----------------------------------------------------------------------------- --------------------------- ----------------------- DnaB-like helicase$\documentclass[12pt]{minimal} VOG0025, OPC6121 OPC, pVOG \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{b}$\end{document}$ Baseplate J-like protein$\documentclass[12pt]{minimal} VOG4691, VOG4644, OPC6132 OPC, pVOG \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{b}$\end{document}$ Tail sheath protein$\documentclass[12pt]{minimal} VOG0067, OPC6142 OPC, pVOG \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{b}$\end{document}$ Terminase large subunit$\documentclass[12pt]{minimal} VOG0051, OPC6160 pVOG \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{c}$\end{document}$ Major capsid protein$\documentclass[12pt]{minimal} VOG0061, OPC6148 OPC, pVOG \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{b}$\end{document}$ Prohead protease VOG4568, OPC6150 pVOG Portal protein VOG4556, OPC6151 OPC, pVOG DNA primase VOG4551 pVOG DNA polymerase I VOG0668, OPC6097 OPC, pVOG RNA polymerase VOG0118 pVOG Recombination exonuclease VOG4575 pVOG Recombination endonuclease VOG0083 pVOG Tail tape measure protein VOG0069 pVOG Tail tube protein VOG0068, OPC6141 OPC, pVOG $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{a}$\end{document}$The full list of protein clusters is available in Supplementary Table S2 available on Dryad (14 core genes identified using OPCs, 38 using pVOGs). $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{b}$\end{document}$Core genes used in concatenated phylogenetic tree. $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{upgreek} \usepackage{mathrsfs} \setlength{\oddsidemargin}{-69pt} \begin{document} }{}$^{c}$\end{document}$Omitted in further phylogenetic analyses due to frequent intron invasion and unclear gene borders. OPC = orthologous protein clusters; pVOG = prokaryotic virus orthologous group. Analysis of Gene Synteny {#SEC2.5} ------------------------ Viral genomes are thought to be highly modular, with recombination and horizontal gene transfer potentially resulting in "mosaicism" ([@B32]; [@B38]). By clustering the herelleviruses based solely on the gene order, we investigated plasticity of their genome structure and potential effects of recombination ([Fig. 3b](#F3){ref-type="fig"}). The clustering results proved comparable with results obtained using sequence-based methods, with almost all viruses clustered according the proposed taxa. The potential exception was Bacillus phage Moonbeam ([@B14]), which showed an inversion of the central part of its genome compared with the other herelleviruses. From this overall picture, we can infer that genomic rearrangements leave a measurable evolutionary signal in all lineages, but do not shuffle genomes of related viruses beyond recognition. Thus, we did not observe the high modularity that might be expected with rampant mosaicism. The lack of considerable mosaicism supports recent findings that, at most, about 10% of reference virus genomes have a high degree of mosaicism ([@B11]). Marker Protein Phylogenies {#SEC2.6} -------------------------- We used the amino acid sequences of concatenated marker proteins identified from the OPC analysis ([Table 2](#T2){ref-type="table"}) to generate a phylogenetic tree that is able to identify the evolutionary relationships at the genus and subfamily rank within the new family *Herelleviridae* ([Fig. 4](#F4){ref-type="fig"}). This tree supported all proposed new taxa but was unable to differentiate between the different species. Branches representing subfamilies and genera were particularly well-supported (UFBOOT support above 99%). Additionally, nearly all topologies of single marker trees (Supplementary Fig. S3 available on Dryad) fitted well in the suggested taxonomic structure. The only notable deviation from the proposed classification scheme could be found in the Tail tube protein tree (VOG0068--OPC6141, Supplementary Fig. S3 available on Dryad). It shuffled members of the genus *Silviavirus* into the *Kayvirus* clade and also mixed the genera *Nitunavirus* and *Agatevirus* with unclassified phages. This may indicate that the evolutionary signal contained in this marker is insufficient to resolve related genera. Alternatively, the inconsistencies may be explained by the effect of horizontal gene transfer or convergent evolution introducing additional noise in our data. Regardless of the true reason of this inconsistency, it should be stressed that with a small number of available marker loci, additional sources of phylogenetic signal (e.g., whole genome phylogenies) may be necessary to properly interpret any result. ![Maximum-likelihood tree based on concatenated alignment of 10 marker proteins generated using IQ-tree. The scale bar represents the number of substitutions per site, branch support values were calculated from 1000 ultrafast bootstrap (UFBOOT) replicates. The trees were rooted at Brochothrix phage A9 to facilitate comparison. Branches corresponding to genera and subfamilies are delineated with colored squares and circles, respectively.](syz036f4){#F4} Comparison of the Results Obtained Using Different Methods {#SEC2.7} ---------------------------------------------------------- Virus classification methods in general suffer from a low signal-to-noise ratio. This "noise" may be introduced in the data by horizontal gene transfer and differences in mutation rates in different viral lineages. To get a measure of the discrepancies between the methods used above, we calculated the normalized Robinson--Foulds distances (representing the fraction of data partitions that are present only in one of the analyzed trees, Supplementary Table S3 available on Dryad) and created tanglegrams for the visual comparison of topologies (Supplementary Fig. S4 available on Dryad). Trees obtained using different methods differed considerably (normalized Robinson--Foulds metric in range 0.16--0.58) but topological distances between them were comparable to distances between single marker trees (and in most cases smaller, see Supplementary Table S3 available on Dryad). Interestingly, for the herelleviruses, most of the noise becomes averaged at the genus rank, meaning that the grouping at this rank and above remains almost the same regardless of the classification method employed. The only significant discrepancies compared with the proposed taxonomic classification were observed in the GOAT analysis and one single-marker tree (i.e., tail tube protein tree, VOG0068--OPC6141). Both of these deviations concerned a single genus or even unclassified species and they did not follow any commonpattern. Discussion {#SEC3} ========== The rapid expansion of phage genomics and metagenomics has left taxonomy behind. There are more than 8000 publicly-available caudovirus genomes, but only 873 have been officially classified by the ICTV ([@B19]). The remaining genomes are provisionally stashed in the NCBI database within "unclassified" bins attached to the order *Caudovirales* or its associated families ([@B13]; [@B1]; [@B57]). One of the main problems is that the level of sequence divergence is so high that it often leaves no detectable sequence similarity between disparate members of the same order. Thus, not a single reliable phage-specific or even *Caudovirales*-specific marker gene could be defined. In addition, a classification system based on a single marker would be highly prone to instances of horizontal gene transfer. Indeed, there is no commonly recognized general phage classification tool and all of the currently used phylogenetic approaches have their critical limitations as described in this study. For that reason, above the family rank we had to rely on high-throughput network and clustering analyses (vConTACT, GRAViTy, and VipTree) that are capable of discerning the groups of taxa that are comparable, even if phylogenetic signal is sparse. These methods can analyze significant subsets of the viral genomic space in a reasonable time, outcompeting traditional phylogenetic approaches in terms of speed. They are, however, still expensive computationally and need to be recalculated when new data become available ([@B12]). Moreover, these high-throughput methods do not attempt to model the process that gave rise to the observed data, but rather calculate arbitrary distance matrices from local similarities and use them to define groupings. Thus, the relation between the calculated distance and the divergence time remains unclear and the results of these methods should be taken with a grain of salt, especially in less divergent taxa or at the lower taxonomic ranks. After defining the new family *Herelleviridae*, we applied a combination of genome and proteome analyses, gene synteny assessments, and multimarker gene phylogenies to establish its internal taxonomic structure. It has to be stressed that the results of most of these methods should be treated as approximations of phylogenic reconstruction. Many of them suffer from similar methodological drawbacks as the abovementioned high-throughput clustering techniques, lacking proper theoretical support of their algorithms. Only the maximum-likelihood analysis of (a) marker sequence(s) allows for rigorous, statistically sound phylogenetic inference under a well-defined model of sequence evolution. Unfortunately, if the number of available marker loci is small, this method becomes vulnerable to the noise introduced by horizontal gene transfer ([@B18]). More importantly, this approach is heavily influenced by the gene annotation. This may be a crucial disadvantage as the quality of database records is often debatable and computational reannotation of analyzed genomes does not always yield valid, comparable results. On the other hand, these drawbacks can be easily circumvented by methods analyzing whole genome sequences (DICE, VICTOR, BLAST). Obviously, they are annotation-independent and mitigate the effects of horizontal gene transfer by averaging the signal across the total genome length. Unfortunately, if the untranslated nucleotide sequence of the virus is used, rapid decay of the similarity should be expected above the genus rank (e.g., Supplementary Fig. S2 available on Dryad). Above that rank, nucleotide sequence similarities were virtually undetectable, but sequence translations (DICE coefficient) or protein sequences (Phage Proteomic Tree) were still considerably similar. Thus, nucleotide sequence-based approaches capture small differences (e.g., silent mutations) between closely related genomes and may be well suited for species and strain demarcation but gradually lose sensitivity with each consecutive taxonomic rank. To the best of our knowledge, the GOAT algorithm is the only method explicitly aimed at capturing the signal associated with genomic rearrangements in fluid genomes of viruses. Unfortunately, the evolutionary process that is responsible for the observed variations is even less studied than whole genome similarity metrics and we cannot rule out that this algorithm may be disproportionally susceptible to some random rearrangement events. However, it is ideally suited to pinpoint just those kinds of genomic rearrangements and mutations that are missed by other methods. Thus, it can provide unique data on structural dynamics of the studied genomes but in its present form should not be treated as the primary classification tool. Bearing in mind all the advantages and limitations of the classification tools utilized here, and the convergence of their results for the analyzed taxa, we recommend an "ensemble of methods" approach similar to the one we used as a method of choice for the phage taxonomy. We suggest that future classification efforts should implement at least one well established phylogenetic method (e.g., maximum-likelihood analysis of concatenated marker genes/proteins) and at least one whole genome-based annotation-independent method to account for annotation inconsistencies, rearrangements and mosaicism. Additional approaches may be used, especially if methods of choice produce inconclusive or discordant results but should always be used with regard to their limitations. All evidence considered, we suggest that the SPO1-related phages should be removed from the family *Myoviridae* and given a family rank. Hence, we proposed establishing a new family *Herelleviridae*, containing five subfamilies: *Spounavirinae* (*sensu stricto*), *Bastillevirinae*, *Twortvirinae*, *Jasinkavirinae*, and *Brockvirinae*, each comprising the genera listed in [Table 1](#T1){ref-type="table"}. The suggested classification corresponds well with host taxonomy and leaves only 3% of viruses within the new family unassigned. These unassigned viruses may represent clades at the rank of genus or even subfamily that are still undersampled. Removing spounaviruses from the family *Myoviridae* to form the new *Herelleviridae* family is a major change in phage taxonomy. We envisage this detachment from their original taxon will be followed by abolishment of the*Podoviridae*, *Myoviridae*, and *Siphoviridae* and creation of new "phylogenomic" families, based on current subfamily-rank clades, which will faithfully reflect the genetic relationships between bacterial viruses. In our opinion, these changes are necessary to accommodate the observed diversity of tailed phages. It is worth stressing that this change does not remove the historically established caudovirus morphotypes: myovirids forming virions with contractile tails, siphovirids with long noncontractile tails, and podovirids with short noncontractile ones. Nevertheless, by disconnecting morphotype and taxonomy, related clades can be grouped across different morphotypes. Such an approach would solve the problems of the muviruses that are suggested to be classified in the family "*Saltoviridae*" ([@B27]) and potentially the broad set of Escherichia phage lambda-related viruses that are currently distributed among the families *Siphoviridae* and *Podoviridae* ([@B25]). Finally, abolishing the current morphology-based classification of tailed phages will remove the major barrier in classifying phages from metagenomic sequence data. We thank Laura Bollinger, Integrated Research Facility at Fort Detrick, for technical writing services. *Dedication: This article is dedicated to Hans-Wolfgang Ackermann, a pioneer of prokaryotic virus electron microscopy and taxonomy, who died on 12 February 2017, at the age of 80. He was involved in the early stages of this study, and his input is dearly missed*. Supplementary Material ====================== Data available from the Dryad Digital Repository: [http://dx.doi.org/10.5061/dryad.106q6g6](10.5061/dryad.106q6g6). Funding ======= This work was supported by the National Science Centre, Poland (2016/23/D/NZ2/00435) to J.B.; the Netherlands Organization for Scientific Research (NWO) (Vidi 864.14.004) to B.E.D. (MBPS and BED); the US National Science Foundation (DUE-132809 and MCB-1330800) to R.A.E.; the University of Helsinki and Academy of Finland funding for Instruct-FI to H.M.O.; the Chargé de Recherches fellowship from the National Fund for Scientific Research, FNRS, Belgium to A.G.; the EUed Horizon 2020 Framework Programme for Research and Innovation, 'Virus-X' (685778) to F.E.; the Gordon and Betty Moore Foundation Investigator Award (GBMF\#3790) to M.B.S.; the Battelle Memorial Institute's prime contract with the US National Institute of Allergy and Infectious Diseases (NIAID) (Contract number HHSN272200700016I) to J.H.K.; the GOA grant 'Phage Biosystems' of the KULeuven to R.L. the Intramural Research Program of the NIH, National Library of Medicine to J.R.B. and I.T.; and by the Biotechnology and Biological Sciences Research Council Institute Strategic Programme in Gut Microbes and Health BB/R012490/1 and its constituent project BBS/E/F/000PR10353 to E.M.A. The content of this publication does not necessarily reflect the views or policies of the US Department of Health and Human Services or of the institutions and companies affiliated with the authors.
{ "pile_set_name": "PubMed Central" }
// Copyright 2009 the Sputnik authors. All rights reserved. /** * If the argument len is not a Number, then the length property of * the newly constructed object is set to 1 and the 0 property of * the newly constructed object is set to len * * @path ch15/15.4/15.4.2/15.4.2.2/S15.4.2.2_A2.3_T4.js * @description Checking for Number object */ var obj = new Number(0); var x = new Array(obj); //CHECK#1 if (x.length !== 1) { $ERROR('#1: var obj = new Number(0); var x = new Array(obj); x.length === 1. Actual: ' + (x.length)); } //CHECK#2 if (x[0] !== obj) { $ERROR('#2: var obj = new Number(0); var x = new Array(obj); x[0] === obj. Actual: ' + (x[0])); } var obj = new Number(1); var x = new Array(obj); //CHECK#3 if (x.length !== 1) { $ERROR('#3: var obj = new Number(1); var x = new Array(obj); x.length === 1. Actual: ' + (x.length)); } //CHECK#4 if (x[0] !== obj) { $ERROR('#4: var obj = new Number(1); var x = new Array(obj); x[0] === obj. Actual: ' + (x[0])); } var obj = new Number(4294967295); var x = new Array(obj); //CHECK#5 if (x.length !== 1) { $ERROR('#5: var obj = new Number(4294967295); var x = new Array(obj); x.length === 1. Actual: ' + (x.length)); } //CHECK#6 if (x[0] !== obj) { $ERROR('#6: var obj = new Number(4294967295); var x = new Array(obj); x[0] === obj. Actual: ' + (x[0])); }
{ "pile_set_name": "Github" }
Worlds away from ordinary: The life and art of Octavia Butler Julia Keller, Tribune cultural criticCHICAGO TRIBUNE She was living proof of the Oscar Wilde aphorism: "All of us are lying in the gutter, but some of us are looking at the stars." Octavia E. Butler, 58, who died last weekend, grew up black and poor and minus any sort of early encouragement for her literary ambitions. "Honey," an aunt once told her, as Butler recollected in a 1995 essay, "Negroes can't be writers." Yet Butler -- good for her, good for us -- didn't listen. The Seattle-based author became a popular and critically acclaimed writer of science fiction -- a genre in which, for a very long time, a female author was about as welcome as a scratch on a telescope lens. Thus she overcame a daunting range of obstacles, from poverty to prejudice, without ever taking her eye off the stars. And her sudden death leaves a terrible void, because Butler's talents were iridescently unique. In books such as "Kindred" (1979), "Parable of the Sower" (1993) and her most recent novel, "Fledgling" (2005), she intertwined present-day problems such as racism, misogyny and economic injustice with themes familiar to science fiction fans: time travel, interplanetary exploration, the creation of utterly plausible alternative universes. Her prose is supple and refreshingly colloquial, her characters beautifully conceived and accessible. To read the first sentence of an Octavia E. Butler novel -- the "E" is for "Estelle" -- is to be drawn instantly into the enchanted realm of a superb storyteller, one whose message of tolerance and understanding and self-respect was never intrusive or heavy-handed. She brought the lightest of touches to the most profound of topics: human destiny. During a book tour last October to promote "Fledgling" -- a scintillating novel about a black female vampire -- Butler gave the keynote address at the 15th annual Gwendolyn Brooks Conference on Black Literature and Creative Writing at Chicago State University. It was a rare public appearance for the author, who once wrote that her looks -- she grew to be 6 feet tall before her 15th birthday and, friends say, was always embarrassed by her crooked teeth -- made her "want to disappear" throughout her childhood. "I believed I was ugly and stupid, clumsy, and socially hopeless," Butler added. `Gracious and very humble' To her Chicago audience, however, she seemed radiant. "She was gracious and very humble, very kind. A joy to be around," recalled Quraysh Ali Lansana, director of the Gwendolyn Brooks Center. "She was very much a recluse and we were very happy and honored when she consented to attend the conference. "I feel very fortunate we were able to invite her, specifically in light of her sudden and tragic death," the director continued. "She reminded me a great deal of Miss [Gwendolyn] Brooks, in terms of her spirit -- her openness and ability to listen, to really listen to folks. She's achieved such stature, but she was able to listen and interact with real sincerity." Stature, indeed: In 1995 Butler received the MacArthur Fellowship nicknamed the "genius grant." She won the 2000 Nebula Award -- the Oscar in the world of science-fiction scribes -- for her novel "Parable of the Talents," along with many other writing awards. But the plaudits came after long years of struggle in stubborn obscurity, as Butler often recounted in interviews and essays. She was born to an impoverished family in southern California; her father, who died when Butler was small, shined shoes for a living, and her mother was employed as a domestic. All she wanted to do, Butler said, was write. "I pecked my stories out two-fingered on the Remington portable typewriter my mother had bought me. I had begged for it when I was ten," she recalled in an essay called "Positive Obsession" that details her early years. "[But] Who was I anyway? Why should anyone pay attention to what I had to say? "I took classes taught by an elderly woman who wrote children's stories. She was polite about the science fiction and fantasy that I kept handing in, but she finally asked in exasperation, `Can't you write anything normal?'" Fortunately, the answer was "No." Butler went her own way, following her own star, living on beans and potatoes during the lean years before her work caught fire commercially. As a black woman writing science fiction, she had to fight not one but two stereotypes -- only white males had succeeded in the genre -- and Butler fought in the best possible way: By writing extraordinary books that transmuted the pain of being an outsider into lyrical narratives of other worlds and future times. Tallest in the class "At school I was always taller than the rest of my class," Butler said in an essay that aired on National Public Radio in 2001. "I was different. And even in the earliest grades, I got pounded for it. I learned that five and six-year-old kids have already figured out how to be intolerant." Butler moved to Seattle in 1999, after nursing her mother through the latter's terminal illness, and lived alone amid her books. She didn't drive, instead becoming a fixture on Seattle buses, and made only sporadic public appearances. Reportedly she suffered from high blood pressure and other ailments; leaving her house on Friday, Feb. 24, she fell and hit her head. She died the next day in a local hospital. In his blog, fellow science fiction writer Neil Gaiman mused, "I didn't know Octavia Butler well -- we met at the Conference on the Fantastic in the Arts in Florida and we ate together and talked, and she was incredibly tall and wise and imposing ... but I loved her books and somehow thought of her as a permanent presence, although nobody ever is." Butler often described herself as "a hermit living in a large city; a pessimist if I'm not careful; a student, endlessly curious; a feminist; an African-American; a former Baptist; and an oil and water combination of ambition, laziness, insecurity, certainty and drive." In an interview two years ago, she added this to the self-portrait: "I'm a 56-year-old writer who can remember being a 10-year-old writer, and who expects someday to be an 80-year-old writer." - - - `Caught between terror and joy' I'm learning to fly, to levitate myself. No one is teaching me. I'm just learning on my own, little by little, dream lesson by dream lesson. ... I've had many lessons, and I'm better at flying than I used to be. I trust my ability more now, but I'm still afraid. I can't quite control my directions yet. I lean forward toward the doorway. ... And I lean into the air, straining upward, not moving upward, but not quite falling down either. Then I do begin to move, as though to slide on the air drifting a few feet above the floor, caught between terror and joy.
{ "pile_set_name": "Pile-CC" }
A pressão do governo israelense de Benjamin Netanyahu não sensibilizou o governo brasileiro, que deverá rejeitar a indicação do nome de Dani Dayan para embaixador de Israel em Brasília; Dayan é ligado aos assentamentos em Jerusalém Oriental e na Cisjordânia e dificilmente receberá o agrément, a aceitação do Itamaraty; a avaliação do Brasil é de que Israel quebrou o protocolo ao tornar pública a indicação antes da resposta brasileira; "Os israelenses estão fazendo o pior jogo possível. A maneira como tudo foi feito, a quebra do protocolo, a pressão, isso não funciona no mundo diplomático", disse uma autoridade brasileira; o episódio gerou uma crise diplomática entre os dois países e a preocupação no governo israelense; Israel agora teme que a disputa possa encorajar ativismo pró-Palestina edit 247 – O governo brasileiro não deverá ceder às pressões de autoridades israelenses para aceitar a indicação de Dani Dayan para embaixador de Israel em Brasília. O Brasil resiste a conceder o agrément – a aceitação do Itamaraty – ao empresário de origem argentina naturalizado israelense. Dayan é um antigo líder do movimento de assentamentos judaicos, enquanto o Brasil tem como parte da sua política externa o apoio à criação de um estado palestino. O Brasil considera os assentamentos judaicos em terras palestinas ilegais. Por isso, a indicação não foi bem vista pelo governo brasileiro. O governo de Benjamin Netanyahu afirmou no último domingo que o Brasil arrisca degradar o relacionamento bilateral se Dayan não for autorizado a suceder Reda Mansour, embaixador israelense que deixou o Brasil na semana passada. A avaliação do Brasil é de que Israel quebrou o protocolo ao tornar pública a indicação antes da resposta brasileira. "Os israelenses estão fazendo o pior jogo possível. A maneira como tudo foi feito, a quebra do protocolo, a pressão, isso não funciona no mundo diplomático", disse uma autoridade brasileira, segundo reportagem publicada pelo jornal O Globo nesta terça-feira 29. Um editorial do jornal "Jerusalem Post" saiu em defesa de Dayan nesta segunda-feira e afirmou que "as relações bilaterais entre Israel e Brasil movem-se em direção a uma crise de grandes proporções". O jornal israelense "Haaretz" informou que na quinta-feira haverá uma nova reunião para tratar do caso, na presença de Netanyahu.
{ "pile_set_name": "OpenWebText2" }
This is the original SCA documentary! The videographers of Duckball home video have put together a well-rounded, 68-minute program describing the Society for Creative Anachronism and the Pennsic War. This video is a definite "must-have" for the SCAdian library. It is the largest and most complete documentary ever released of the Pennsic war, containing the woods, field, castle, and belted champions battles, several tournaments, music by Jack-In-The-Green and others, peerage ceremonies, opening and closing ceremonies, courts, the fools parade, classes, archery, artisans, shopping, and interviews with some of the early founders of Pennsic and the SCA, along with younger members who have since gone on to become peers and royalty. It is not only a wonderful document of this historic event, but also an ideal introduction to the SCA, useful at demos, meetings, or just showing people what you do for a hobby. Originally shot on Super-VHS and Hi-8 video, this program was digitally remastered and duplicated on a high-quality, hi-fi DVD. It is a SCA documentary of the highest order! This special edition also includes a 48-minute bonus feature of "lost" footage. This footage is edited to concentrate subject matters, so that all the music is together, all the fighting is together, all the courts are together, and so forth. There is also an informative "where-are-they-now" insert included updating the stories of some of the gentles who were interviewed, many of whom have since become knights, laurels, kings, and queens! It also tells the story behind the making of this video. People also appearing include: King David and Queen Tanguistl King Randal and Queen Katherine King of Calontir King of The Outlands Mistress Morgana Andrixos Dawid Zyugury Master Alan King Inman Sir Alexander Caithness of Wick Fulk the Wyvern Edward Dragonslayer Ervald the Optimistic
{ "pile_set_name": "Pile-CC" }
One of Bill O’Reilly‘s sexual harassment accusers penned an open letter today slamming Fox News and accusing multiple higher-ups at the conservative network of engaging in sexual harassment and of covering-up such behavior. And, she warns, they’re soon to be exposed. In a post originally published on Facebook the morning of December 16–and now available via Twitter—Juliet Huddy teases an incoming series of accusations and outings for as-yet-unnamed sexual harassers. The letter begins ominously: Tick tock, tick tock. Executives who not only covered up for sexual harassers/predators (<and believe me, I don’t use this word lightly) but WERE THEMSELVES are about to be exposed. Huddy later accuses Rupert Murdoch of being one such figure–though not a harasser himself. She writes: Rupert Murdoch is not just a media mogul. He’s a perpetrator, complicit in wrecking careers of hardworking, talented people while protecting their tormentors. Law&Crime reached out to Huddy for comment on this accusation. She clarified that Murdoch is not being accused of sexual harassment, but rather, she was simply referring to his complicity in “covering up” the stories about–and claims against–Roger Ailes, Bill O’Reilly and others. In a statement, Huddy added: It’s ironic that O’Reilly, Murdoch and others have suggested that I, along with the other accusers, are part of some left wing conspiracy. [One], I’m fiscally conservative and socially liberal so let’s just get that out of the way. [And two], based on everything I have seen and has been reported, the participants in this, The Grand Conspiracy, are the executives at Fox. Huddy’s letter calls out various, unnamed Fox News higher-ups for their sexual harassment and complicity as well. She writes, “There are still men AND women working at Fox News who actively engaged in sexual harassment and/or subsequent coverup. And they occupy some of, if not THE, highest positions. I know other women were targeted by these people (several of whom are part of my own experience).” Notably, Huddy’s letter also takes aim at the perceived lack of positive reverberations in the wake of the #metoo watershed. That is, Huddy addresses, at length, how the women who have made the accusations are only seeing half of the justice quotient because while their accused are being punished, many accusers still have to deal with wrecked careers. Huddy notes: The women who have already come forward aren’t money-hungry, attention-starved liars or drama queens. And we certainly aren’t part of some left wing conspiracy. Most of us — not some, but MOST — can’t get a job in TV because we’re viewed as radioactive. Hire Juliet Huddy? You risk alienating a chunk of your audience that sees her as trying to dismantle Fox News. Or sees her as an unhinged, thrice-divorced man-hater who ruined their evening programming by helping to get Bill O’Reilly fired. It’s the same story for virtually every woman who left Fox and other companies under these circumstances. WE have seen our careers torched, yet WE are not the problem. Huddy’s letter could be read as a response to recent comments made by Murdoch to Sky News where he rubbished the claims of women who have come forward as “nonsense.” Law&Crime reached out to Fox News, Rupert Murdoch and his representatives for comment on this story, but no response was forthcoming at the time of publication. [image via screengrab/NBC] Follow Colin Kalmbacher on Twitter: @colinkalmbacher Editor’s note: This afternoon, Huddy deleted her original Facebook post citing privacy concerns. This article has been updated to reflect that and incorporate comments from Huddy regarding Rupert Murdoch, Fox News and Bill O’Reilly. Have a tip we should know? [email protected]
{ "pile_set_name": "OpenWebText2" }
Ask HN: What are the best Bay Area programming meetups? - fuqted Specifically for someone looking to learn. I&#x27;m in Oakland and pretty open as far as languages go.<p>What meetups do you guys go to? ====== dhruvkar The east bay python meetup is pretty relaxed, and has grown quite a bit in the last year. It's at Lost and Found on Telegraph on the 1st Tuesday of every month. [http://meetu.ps/e/.chxnhlyvpbcb/9Plqj/a](http://meetu.ps/e/.chxnhlyvpbcb/9Plqj/a) ~~~ fuqted Ok, I'll check that out thanks. I've gone to the weekly Js meeting at L & F.
{ "pile_set_name": "HackerNews" }
Q: TYPO3 rte didn't render tag in extension output view I have some problem with rte in my extension. In tables I set field text area with rte. In BE TYPO3 generating rte view and when I formatting text everything is ok. The only problem is when I have some paragraphs - in BE I have <p> tag, but in frontend in HTML code the <p> tag didn't "exist". My TCA code looks like this: 'description' => array( 'exclude' => 1, 'label' => 'LLL:EXT:fu_product_table/locallang_db.xml:tx_table_products.description', 'defaultExtras' => 'richtext[*]', 'config' => array( 'type' => 'text', 'cols' => '30', 'rows' => '5', 'wizards' => array( '_PADDING' => 2, 'RTE' => array( 'notNewRecords' => 1, 'RTEonly' => 1, 'type' => 'script', 'title' => 'Full screen Rich Text Editing|Formatteret redigering i hele vinduet', 'icon' => 'wizard_rte2.gif', 'script' => 'wizard_rte.php', ), ), ) ), And then trying to render the field in the class: '<td class="td-1">' . $this->getFieldContent('description') . '</td>'; Any suggestion? A: TYPO3 saves RTE's content little bit 'trimmed' (without full markup) so for 'reverting' it back to the valid HTML you need to wrap it with the dedicated method, ie: $this->pi_RTEcssText($this->getFieldContent('description')) Note: Adrian, next point for Extbase: it has special viewhelper for this, so you can do it easily directly in the template ;)
{ "pile_set_name": "StackExchange" }
Q: Web authentication using desktop ldap Problem: I want users from my corporate client to authenticate with my web server by using their local LDAP credentials. Users have a local desktop client that can authenticate with the local LDAP server. My server and the LDAP server do not talk to each other. I know it is possible to authenticate on a web server using LDAP if the web server relays the LDAP request to a LDAP server. (User/desktop client connects to web server, sends credentials and web server interacts with LDAP server for authentication) But is there a way for a desktop client to authenticate with a local LDAP server and then connect to a web server sending a token that would grant access to the web server? (user auths with ldap, sends ldap response to webserver) I am not talking Oauth, which requires both servers to talk. In this case, the LDAP server is isolated from outside contact. The big problem here is that you should never trust the client, even if you have written it yourself. Something like public/private authentication would (probably) not work as well, since the problem is not the encryption, but making sure the message came as "OK" from the LDAP server. A rogue client could fake the OK and sign it anyway. A: If I understand your problem correctly, you're looking for a way to make your desktop client talk to your web application using the user's domain credentials. This should be easy to do using something like ADFS. If you run ADFS inside your clients Active Directory domain, your desktop client can get a token from it using Kerberos. It can then use this token to authenticate with your web application. You will need to configure your web application to trust tokens issued by the ADFS instance in your clients domain.
{ "pile_set_name": "StackExchange" }
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>runDestinationsByUUID</key> <dict> <key>19271D85-6C2A-4AB7-B0C5-AD1C09375278</key> <dict> <key>localComputer</key> <dict> <key>busSpeedInMHz</key> <integer>100</integer> <key>cpuCount</key> <integer>1</integer> <key>cpuKind</key> <string>Intel Core i7</string> <key>cpuSpeedInMHz</key> <integer>2800</integer> <key>logicalCPUCoresPerPackage</key> <integer>8</integer> <key>modelCode</key> <string>MacBookPro11,3</string> <key>physicalCPUCoresPerPackage</key> <integer>4</integer> <key>platformIdentifier</key> <string>com.apple.platform.macosx</string> </dict> <key>targetArchitecture</key> <string>x86_64</string> <key>targetDevice</key> <dict> <key>modelCode</key> <string>iPhone7,2</string> <key>platformIdentifier</key> <string>com.apple.platform.iphonesimulator</string> </dict> </dict> </dict> </dict> </plist>
{ "pile_set_name": "Github" }
UNDER THE HELMET, the latest addition to Calgary’s public art folio PROJECT: UNDER THE HELMET SERIES: CALGARY PUBLIC ART PHOTOS + COPY: ANGUS MACKENZIE As elemente’s PUBLIC ART series continues, we felt it time to add some fashion to the mix. Sure the interactive works and the million dollar hoop are nice but what’s really needed to round out the city’s portfolio is a 50 ft metallic fireman’s helmet that slightly resembles Santiago Calatrava’s Valencia Opera House. elemente’s public works folio now includes the likes of a tangled mess of chaotic awesomeness that is the The River Passage, the new not-really-public-art-but-is-sort-of-artsy Skipping Stone/St. Patrick bridges and the translucent waviness/illuminati worshipping bit that is the Beltline’s Chinook Arc but no hats. Completed in October 2014 at a budget of $170,000, the piece designed by South African born artist Ilan Sandler, entitled “Under the Helmet” was designed as sculptural add-on to the new Windsor Park Fire Station.Standing on edge at what looks like a smidge over two storeys tall, the piece at first isn’t obvious as a helmet. On profile the sculpture presents as more of an abstract piece of art than literal helmet newton interpretation. However upon viewing its skeletal shape from directly across the street you start to see iconic shapes like the flared brim at the back, the visor framework and the signature oblong shaping. According to the artist and city brief, “The artwork speaks to the complex relationships and dependencies that exist among firefighters and their equipment. In particular, the helmet distinguishes the individuality of the fire-fighter, while symbolizing membership on a team,” states Sandler. ” By constructing the linear form from the characteristics of hoses and maintaining ample open spaces within the structure, the artwork’s curves complement the angular geometry of the building’s design and hardscaping.” The chromium styled, open-themed helmet can be found at the Windsor Park Fire Station just off McLeod Trail at 5536 – 4th Street S.W. Source: City of Calgary
{ "pile_set_name": "OpenWebText2" }
Big House Plans With Large Front And Back Porches Living Room Chairs – Choosing chairs for the living room does not have to be a daunting task. Gone are the days when everything matched and just a style that was expected throughout the house. Nowadays, chair styles can be an eclectic collection and your personal style and ... 2 Bedroom House Plans Open Floor Plan – What is your dream home? Do you have an idea like what form? Defining a dream home is very difficult, especially if you have a partner or something that has your own taste. Even though you might agree with the floor plan, do you both ... Living room wall art – the walls are one of the most important decoration elements of a house. A bare wall can make an empty room, even when it is full of furniture. However, there are some easy and inexpensive ways to fix a bare wall with wall art. Buy some cheap frames at...
{ "pile_set_name": "Pile-CC" }
Curacao is an island in the Caribbean, off of the Venezuelan Coast. It is also a constituent country of the Netherlands. I had to google it and if you look at photos of the island, it looks stunning. I wanted to find out about Curacao as I received an email from a lady who lives there. She thanked me for a 'wonderful book' and said she would be passing it on. It would be nice to get a small fan base in Curacao and I really appreciated the time she took to write. I hope more people choose to pass on 'An Extra-Ordinary Beginning'. Word of mouth is so important and really helps in, unsurprisingly, spreading the word! I was discussing this with a friend who runs Prague Youth Theatre who told me how this has really helped him. For the last two weeks, I have written nothing (this will change on Monday). The editing of ‘Survival Instinct’ is ongoing and my editor continues to smile at me so I am taking this as a good sign. The factory work I refer to in the Blog title has all been computer based. At the moment, not enough people know about ‘The Adventures of Eric and Ursula’ and this must change if I am to succeed. The only way this will change is to contact people and tell them that this great book exists. Over the last eight working days, I have visited numerous school sites to find out who teaches English and their email addresses. As right now, I have 422 contacts who I need to email. Collecting these email, trawling through websites, has been laborious and I call it factory work. So, how did I survive: I gave myself a break every 50 minutes I broke up the monotony with some exercise to let my frustration out! I gave myself a reward e.g. when I have collected another 50 emails I will get a sweet These may sound simple and childish but they work for me. If I just email my new contacts and say here is a book for you to buy, my email will be deleted by them before they read it. To try to stop this, I am offering these teachers and librarians some super free reading activities that they can do with their students. I am also offering them ‘An Extra-Ordinary Beginning’ for free. If 10% of my contacts download my book and visit my website then I will consider this marketing strategy successful. It is important to relax or to take a break. I know that sounds obvious but I am bad at doing this, and I doubt I am alone. Often, I become so absorbed in what I am doing - writing, marketing, drafting - that before I know it, hours have passed. In 'How to set up an online business', Kevin Partner gives 5 tips to succeed. The first five are quite standard: Do what you love, love what you do Never stop learning Work on the business, not just in the business Always look on the bright side of life Work your nuts off However, it his bonus tip that I have found most useful: Get a dog The point he is making is that a dog will mean you will exercise, will lower your blood pressure and will force you to take a break from what you are doing. It is during these breaks that he claims he has his best ideas. I agree with him. While running or cycling or cooking, my thoughts become clearer and suddenly ideas pop into my head that I would not have had if I had been sat at my computer. A few years ago, I went to see an exhibition of Monet's Water Lilies in London. One canvas was large (I think about 3 metres by 3 metres) and I stood right in front of it, just a few centimetres away. I could see nothing which isn't a surprise but when I stepped back and sat down, removed from the painting, I could take it all in and notice more detail that I had previously missed. Last week I stepped back from my work, had a break for five days. Consequently, I have come back fresher, with more ideas and I am more perceptive.
{ "pile_set_name": "Pile-CC" }
Design and evaluation of drug delivery vehicles by Palm Apergi, Caroline Abstract (Summary) A crucial aspect of drug delivery is efficient transport to the site of action. Thus, there is a need to design and evaluate new delivery vehicles. In this thesis two delivery vehicles, cell-penetrating peptides and bacterial ghosts, were evaluated. The understanding of the internalization and degradation kinetics of cell-penetrating peptides is important for the practical aspects of cargo delivery since peptides have a notorious reputation of being rapidly degraded. If the cell-penetrating peptide remains intact inside the cellular environment, there is a possibility that the peptide-cargo conjugate leaks back to the extracellular environment. However, if it is degraded outside the cell, the cargo will never be delivered. In order to improve uptake efficiency and to be able to foresee side effects, the translocation mechanism needs to be fully elucidated. Data gathered from the first two papers led to the proposal of a new me-chanism involved in cell-penetrating peptide uptake: the membrane repair response, a resealing mechanism rapidly patching up broken membranes. This mechanism could explain the divergence in perception concerning the uptake pathways. Furthermore a new assay to produce the second delivery vehicle, bacterial ghosts, was developed based on data from the cell-penetrating peptide investigations. Bacterial ghosts are dead bacteria devoid of cytoplasmic contents but still retaining their structural and morphological characteristics, after protein E lysis of the bacterial cell membrane. By using a cell-penetrating peptide with antimicrobial effects, a new rapid peptide-based strategy to produce ghosts was developed and the capability to deliver plasmid DNA into the cell for expression was evaluated.
{ "pile_set_name": "Pile-CC" }
Toni Wilen has now released the next release candidate for his Amiga emulator, as ' WinUAE 3.2.0 Beta 20 (RC3) '. Although I was expecting WinUAE to be released as a final by now, it seems more bugs have crept up and needed to be fixed before he can put his big old Toni stamp of approval on this fine piece of Amiga - PC software. But still if all goes well, expect the final version to be available either this month or next. See changelog below for what has been fixed. Beta 20: (RC3)
{ "pile_set_name": "Pile-CC" }
Q: Draw points all over my form i want to draw 1px points allover my form example: 1pxBlack 1pxwhite 1pxBlack 1pxwhite 1pxBlack 1pxwhite 1pxBlack 1pxwhite 1pxBlack 1pxwhite 1pxBlack 1pxwhite 1pxBlack 1pxwhite 1pxBlack 1pxwhite 1pxBlack 1pxwhite A: you can use setPixel example: Dim bmp As New Bitmap(Me.Width, Me.Height) For y = 0 To Me.Height - 1 For x = 0 To Me.Width - 1 If x Mod 2 = 0 And y Mod 2 = 0 Then bmp.SetPixel(x, y, Color.Black) Else bmp.SetPixel(x, y, Color.White) End If Next Next Me.BackgroundImage = bmp
{ "pile_set_name": "StackExchange" }
Norwegian Cruise Line Tees up Golf Bermuda Program Miami – Aug 30, 2007 — Norwegian Cruise Line (NCL), the official cruise line of the PGA TOUR and Champions Tour, has launched a new Golf Bermuda program, giving guests more options for hitting the links in Bermuda, where there are more golf courses per square mile than anywhere in the world. The comprehensive program offers guests advanced tee time bookings; Callaway® rental clubs; transportation to and from the course; and assistance with planning golf tournaments. “Based on the popularity of the NCL America Golf Hawai`i program, we decided to enhance our current Bermuda golf offerings to make it easier and more convenient for our guests to experience the island’s vast array of world-class courses,” said Scott Rogers, NCL’s senior vice president of sales and marketing. “NCL’s Golf Bermuda provides guests the resources to enjoy golf the Freestyle Cruising way: more options for whenever and wherever they want to play.” With packages ranging from $85 to $269 per person, Golf Bermuda has options to fit every budget and experience level, and invites golfers to experience Bermuda’s most popular and scenic courses, including: Mid Ocean Golf Club, located in scenic Tucker’s Town, is home to one of the greatest golf courses in the world and has challenged the biggest names in golf today; The par 71 Port Royal Golf Course offers some of the most challenging holes on the island and has been owned and operated by the Bermuda government for almost 40 years; In 2005, Travel + Leisure Golf readers named Tucker’s Point Golf Club one of the top three courses in the categories of Best Golf Resort and Best Restaurants in the Caribbean; St. George’s Golf Course, situated on the eastern tip of the island, is breathtakingly beautiful with ocean views at every hole; Opened in 1922, the 18-hole Riddell’s Bay Golf Club is Bermuda’s oldest golf course and is described by locals as “the course you must play.” This fall, the 25th annual PGA Grand Slam of Golf, the world’s most exclusive golf tournament, will be held in Bermuda on October 16 and17, hosted by the Bermuda Department of Tourism, Mid Ocean Golf Club and the Fairmont Southampton Hotel. Past champions include defending champion Tiger Woods, Phil Mickelson, Jim Furyk, Ernie Els, Tom Lehman, Ben Crenshaw, Greg Norman, Nick Price and Ian Woosnam. This year, Tiger Woods, Zach Johnson and Angel Cabrera are among the participants. Norwegian Crown will be there to welcome the tournament to Bermuda for the very first time. For Norwegian Crown guests, NCL is offering a three-day event ticket for $150 per person. Tickets can be pre-purchased at ncl.com/shorex through September 14. Currently, NCL has four ships offering Bermuda itineraries. Norwegian Dawn sails seven-day Bermuda and Bahamas cruises from New York through August 25, 2007. Norwegian Crown sails roundtrip from New York on seven-day itineraries through October 28, 2007. Norwegian Majesty sails roundtrip from Boston on seven-day itineraries through September 30, 2007 and one five-day itinerary on October 7, 2007. From October 28 through November 10, 2007, Norwegian Majesty sails roundtrip from Charleston on six- and seven-day itineraries. Norwegian Spirit sails roundtrip from New York on an eight-day Bermuda and Eastern Caribbean itinerary through the end of August. In 2008, NCL will offer the largest deployment to Bermuda in the company’s history with itineraries from five East Coast cities. These include: Norwegian Dawn sailing from New York, featuring the city’s only seven-day cruise to Bermuda; Norwegian Dream sailing from Boston; and Norwegian Majesty sailing to Bermuda from three cities-Philadelphia, Baltimore and Charleston. NCL Corporation Ltd. is an innovative cruise company headquartered in Miami, Florida, with a fleet of 14 ships in service and under construction. The corporation oversees the operations of Norwegian Cruise Line, NCL America, and Orient Lines. The company recently took delivery of its newest ship, Norwegian Pearl, and is currently building Norwegian Gem for delivery in October of 2007. In addition, NCL plans to build up to three new third generation Freestyle Cruising ships for delivery between 2009 and 2011. NCL is on target to have the youngest fleet in the industry by the end of 2007 with the introduction of Norwegian Gem, providing guests the opportunity to enjoy the flexibility of Freestyle Cruising on the newest, most contemporary ships at sea. For high resolution, downloadable images, please log onto NCL’s website at www.ncl.com/pressroom. For further information on NCL Corporation, contact a travel agent or NCL in the U.S. and Canada at (800) 327-7030. Suzanne Klasen – Cruise Arizona Hi! I am Suzanne Klasen, an Independent Vacation Specialist with CruiseOne. You may also know me from cruise sites and forums as Cruise Arizona. Along with my husband Steve (aka Mr Papa), we have combined our love of cruising with computer skills to bring you a very informative and entertaining site that we hope will help you plan your next vacation. Read More About Suzanne
{ "pile_set_name": "Pile-CC" }
Pricing & Floor Plans Icon/36/Chevron-openCreated with Sketch. Estimated cost from $2,829 to $3,457 per month* *Seniorly’s estimated monthly pricing is based on the local average pricing of other communities in the area and what typical communities of the same size offer in services. Please verify all information prior to making a decision. Seniorly is not responsible for any errors regarding the information displayed on this website. Community Details Icon/36/Chevron-openCreated with Sketch. Hurd Senior Care Home is an assisted living community located in Dallas, TX. This is a board & care community with 8 units. Communities this size typically offer shared and private accommodations, a high caregiver to resident ratio, limited resident enrichment, and more affordable prices when compared to larger communities. Seniorly estimates the costs to be $3,143 per month which is around 15% under the average of $3,700 in Dallas. The community has an average star rating of 4.0 from 1 reviews. Local Details Local Health: Hurd Senior Care Home has the benefit of being located close to 20 different hospitals. Hospitals like Methodist Charlton Medical Center and University General Hospital Dallas are a couple of the highest rated options. Your non-emergency health care needs can be met by over 20 nearby doctors and 20 nearby dentists. Vas Collin J Md and Va Medical Center Dallas: Wickremasinghe Itala Md are 2 of 20 other health related services. Local Wellness: Hurd Senior Care Home's residents have 20 beauty salons to choose from, including SmartStyle Hair Salon. There are also 16 spas and 20 gyms near the community. Anytime Fitness is located just 3 miles from the community. Local Amenities: Big T Plaza, Dallas, Hilton Garden Inn Dallas/Duncanville and South Dallas Cafe are just a few of the local shopping and restaurant offerings nearby. Hurd Senior Care Home has over 20 cafes, 20 restaurants within a 5-mile radius and 20 supermarkets and 20 malls. Local Spirituality: Oak Cliff Bible Fellowship is the closest Church.There are 20 places of worship close to Hurd Senior Care Home for people of all faiths.
{ "pile_set_name": "Pile-CC" }
Tuesday, March 3, 2015 The Federal Communications Commission's recent ruling to reclassify broadband as a public utility under Title II of the Telecommunications Act, is a step in the right direction, but probably will not break the stranglehold that the major ISP's have over our entire nation. The FCC's new ruling prevents an ISP from offering 'paid prioritization', i.e. slow and fast lanes, depending on how much the content provider pays the ISP. Before Netflix gave in to the bullying tactics of Comcast, the largest ISP in America, streaming a Netflix movie was a pretty bad experience. This is a typical example of the consumer paying the price when network operators argue over money. Throttling and blocking are two other no-no's under the new rules and for the first time, open Internet rules will be fully applicable to mobile devices. In other words, the FCC now can regulate some aspects of how major ISP's conduct their business. But one of the most important causes of the deterioration of broadband access in America, is the lack of competition. FCC chairman Tom Wheeler did not seem to have the stomach to confront that issue. Read more... Thursday, February 26, 2015 You don't have to be a movement expert to appreciate how President Obama moves. Black or white, American or not, he is the coolest guy that ever walked in presidential shoes. Outside the US, especially in Northern Europe and Israel, Obama is a lot more appreciated than here at home. Whether this popularity has anything to do with his swagger is debatable, but it probably doesn't hurt. The American President's casual confidence may be viewed as a breath of fresh air, an anti-dote to the overly formal and stiff demeanor of some European politicians. The definition of swagger is 'A demeanor of confidence, coolness, and togetherness. Someone with Swagger gives off an aura of comfortability with himself. It can also be shown in the person's walk.' Another, more illuminating definition is: 'I Don't Know, I'm White'. When asked where he learnt to walk the way he does, actor Denzel Washington, the ultimate swaggerer on the Hollywood scene, said: 'I don't remember, but it doesn’t work with your hands in your pockets'. But swagger is more than just a walk. If you have Swagger you can wear jeans to the opera, a suit to the beach and people will think nothing of it. They'll admire your swagger. Obama knows how to up his swagger at the precise moment. Whether he kisses his beautiful wife at a basketball game, marches in a parade down Pennsylvania Avenue, or makes that last minute wave before entering Air Force 1, he does it all with grace and finesse. It is not just the President that has Swagger. Watch the First Lady's awesome performance in this video to promote her "Let's Move" campaign, to encourage parents everywhere to get up and get moving with their kids. Mr. Obama has done more talk-show appearances than other sitting presidents, appearing six times alone during his re-election campaign. White House aides say the president uses late-night talk shows to reach an audience that doesn’t always get its news from traditional sources. He uses the media to set certain misconceptions straight, promote his agenda and even though it seems like a contradiction, to remind the audience of what is important, of 'keeping your eye on the prize', when the line between entertainment and politics is starting to blur. Some critics argue that his frequent appearances are at the expense of tax payer money and conservatives find his appearances unpresidential. Former President George W. Bush would not have been caught dead on late night talk shows during his presidency. It was beneath his dignity, but he also instinctively knew that he didn't have the swagger to pull it off. Read more... Saturday, February 21, 2015 Amsterdam has a reputation. Ignorant people allude to the city’s cannabis cafés and its red light district with a smirk, reducing its entire identity to a haven for hippies and sleazy tourists in search of free pot and sex. And they generalize this to the whole Netherlands. It is true that Holland has always been exceptionally progressive, open-minded and tolerant of free-thinking. It has long been in the forefront of decriminalization of drug addiction, sex work, euthanasia and gay marriage, it has always been a haven for persecuted religious minorities such as the Huguenots and the Puritans (who went to Holland before ending up in Massachusetts). But the glib stereotype does not do justice either to the city or to the country. For one thing, it is a zoning thing. Many countries zone “sin” in such a manner. Paris has Pigalle, the US has Las Vegas, China has Macao. etc. Read more... Sunday, February 1, 2015 In my previous post, I argued that when it comes to variations in violence and murder rates, AGE explains more than just about any other variable. In other words, Auguste Comte was right when he said that demography is destiny. 2. Today I want to show the importance of demography in another related area, namely (im)migration and population shifts. This, too, is something that threatensa lot of people today, something quite topical in the aftermath of the Charlie Hebdo bloodbath and the incessant chatter aboutterrorism. Many Europeans fret about the “Arabization” of their continent, and manyAmericans fear the “Latinization” of their country.The reaction in both cases is Eurocentric Christian nativism. Europeans are marching and rallying behind nativist leaders such as Marine Le Pen and Geert Wilders. Some,like Hungary’s Jobbik Party, attack gypsies. In the US, many Republicanswant to evict millions of Hispanic immigrants. The unifying theme on both sides of the Atlantic is:“Save Western civilization.” Saturday, January 31, 2015 Our last three posts have been about Charlie Hebdo, terrorism and Islamic immigration. There has been excellent response by readers. The present post is also related to those topics. The title of this piece is usually attributed to Auguste Comte, the father of Sociology, and I want to showhowtrue it is. Two of the thingswhich the media never let us forgetare: (1)terrorism/crime/violence/war and (2) immigration. Thesetwo issuesare related, as in the Charlie Hebdo case, because some of the violence is committedby Muslim immigrants to places like France. Western societies, foremost among them the United States, are in a never-ending search for the explanations and solutions tothis dual problem, alwaystrying to implement a variety ofpolicies. Experts arepulling their hair out trying to explain crime and violence. The explanations andpolicies range from various criminological fads, all the way to war.Read more... One of the loftiest qualities of humans is their ability to distinguish right from wrong. We call it morality. Without a sense of morality, we would soon descend in a state of anarchy, where no one is accountable for their actions. Some societies are already on the brink of anarchy, the so-called 'failed states' of the world, where citizens are never sure whether they will live or die any day of their lives. Morality is the glue that binds people together, it creates the space where the give and take between people takes place. Without it, life would be worse than death since being dead at least doesn't cause someone to suffer. But why do we aspire to be moral to begin with? We want to be healthy, happy, free of pain, that is understandable. We call these 'natural' desires, but why do we desire to be moral? A biologist would ask: What do we gain by it? How does it serve our survival as a species? Thomas Hobbes thought he had the answer by saying that the natural state of man is "warre of every man against every man" and to prevent people from hacking each other to death, they needed to have a moral code. Obviously Hobbes didn't believe in man's innate goodness. That is pretty much how our culture has branded human nature over the past few centuries. We are selfish bastards who have developed a system which forces us to cooperate with each other by submitting to a self-imposed structure. Thanks to our superior intellect, we have escaped the fate that nature imposes on the world, the cruel, barbaric law of the jungle that all species is subject to. With the help of philosophers like Malthus who anticipated Darwin's principle of the struggle for existence, it is widely accepted as a law of nature. This view leads one to assume that if you are nice, you are a patsy. But just because we have irrevocably painted ourselves in the corner of selfishness, doesn't mean that we don't have the capacity for compassion. Primatologist Frans De Waal explains in Good Natured-The Origins of Right and Wrong in Humans and Other Animals, 'In the same way that birds and airplanes appear to defy the law of gravity yet are fully subjected to it, moral decency may appear to fly in the face of natural selection yet still be one of its many products.'Read more... Tuesday, January 27, 2015 In my previous post, I asked whether the European opinion leaders had lost the capacity for anger when Europeans are under attack. Obviously, there are still plenty of people in Europe who are capable of anger. These are the politically incorrect. They are the rednecks. They are the equivalent of what Jerry Falwell used to call the “silent majority.” They represent the political RIGHT. Many of them support very unsympathetic characters, some of them with fascistoid tendencies. They are “populists,” often nativists, and racists. They follow demagogues such as Geert Wilders in Holland and his equivalents elsewhere. France has Marine Le Pen, fretting about the Arabization of her country. Hungary has its Jobbik movement, a sinister fascist group that has lynched gypsies. There are the people who recently attacked, damaged and burned mosques in Sweden. There are the people who have been marching to kick immigrants out of Germany. It is noteworthy that xenophobia is strongest in the EASTERN part of Germany, precisely where there are the fewest immigrants. These groups are the equivalent of America’s Tea Party and its Republican Party. Read more... Translate Most recent posts Link to Us! Receive Email notification of new posts Publish Your Article! A valid author name is required. We will create live links to url's that you specify in your post. Please be patient, and allow us some time to read and approve your article.We reserve the right to refuse any articles that are not deemed appropriate for this blog.
{ "pile_set_name": "Pile-CC" }
Sen. Bernie Sanders, 77, really is just as curmudugeonly as you’d expect. According to a leaked campaign rider from his 2020 presidential campaign obtained by The Smoking Gun, the Democratic socialist from Vermont demands that his hotel rooms be cold and his bathrooms not have slow flushing toilets. Called the “Senator Comfort Memo” — marked “Confidential: For Campaign Staff Use Only” — the document instructs the exact arrangements that must be met for Sanders’ hotels, food, drink, family and staff. “After a hard day of campaigning, Senator Bernie Sanders likes to settle down in a frigid hotel suite with a cozy down comforter and a bathroom that has been checked for “leaky faucets, slow flushing toilets, slow draining bathtubs,” according to a tour rider prepared by the candidate’s staff,” The Gun wrote. TRENDING: RUTH BADER GINSBURG DEAD! Supreme Court Justice Dies at Home Surrounded by Family The Sanders rider advocates the poaching of “mini honey bottles or single honey packs” encountered at hotels. “Stock up!” campaign aides are told, wrote The Gun. For Sanders, who is referred to as “SBS” in the memo, a “small junior suite” is ideal. “We have no need for a large suite–please avoid this upgrade as much as possible,” the memo states. The candidate also seeks a “Bathtub, if the hotel has that option” and a room thermostat set at 60 degrees. “ALWAYS TEST, SET, AND RUN THE THERMOSTAT BEFORE ARRIVAL,” the memo advises advance team personnel. As for the location of Sanders’s suite, it should not be “near elevators, ice machines, or other high foot traffic spots.” Additionally, hotel management should be asked “if any other groups are staying at the hotel and adjust floor placement as necessary to ensure a quiet stay.” If any of Sanders’s seven grandchildren are traveling with him, campaign workers are advised to secure a room for them adjoining Sanders’s suite. An aide to Sanders’s wife Jane should also be apprised if the hotel has a pool and/or hot tub since, “This is particularly important if the grandchildren are accompanying SBS and Jane.” But Bernie doesn’t sleep cold. He demands a king-size bed with a down comforter. If no comforters are available, then lots of blankets will do. And you know those annoying pamphlets and booklets that are all over hotel rooms? Yeah, none of those for Bernie. “As part of ‘QUALITY CONTROL BEFORE ARRIVAL,’ Sanders aides must remove any ‘hotel pamphlets/signage from bed and side-tables.’ They must also test the room’s lights, TV, keys, and ‘Check for any leaky faucets, slow flushing toilets, slow draining bathtubs, hot water, etc..’ “ Notes The Gun: ‘T]he Democratic candidate appears to share the current president’s concern about the insufficient flushing power of today’s toilets.” The senator who prefers socialism over capitalism also makes these demands each day: Green tea with honey (saving any excess honey packets), English breakfast tea, a low sugar drink, one small bottle of red Gatorade, one bottle of Smart water, clementines and a small can of unsalted cashews/walnuts/almonds. Oh, and on departure, he makes one final demand: “Shred any documents left behind.”
{ "pile_set_name": "OpenWebText2" }
Bamboo Love: Our Favorite Customer Quotes from March 2016 It’s been another great month, and we’re excited that it’s finally spring! We’re also excited to share some of our favorite customer quotes from March: “Bamboo has been great for our company, easy to implement and use! I’ve definitely sent my fair share of questions to your support team, and they’ve been very helpful and answered all my questions. Thank you for everything and we look forward to many more years working with Bamboo!” “Your ATS is so much better than what I’m using right now! It does everything I need it to and more! I’m excited about this!” “We launched the ATS today and had 3 hits with the spiced-up job ads in 2 hours! Everyone is so impressed about what Bamboo can do. My husband loved my demo–he wants the ATS in his company too!” “The whole experience is just amazing. I can truly feel your cultural behavior throughout even though I am your customer.” “First, I just want to say–I love BambooHR, and you guys (everyone I’ve encountered) are great! I’m so excited to iron out all these details and understand all the ins and outs of the system. I can’t wait to roll this out to my employees. They are going to love it. So, thank you!!! And thank you for your patience with all my questions.” “BambooHR is already becoming extremely effective within the company, and we just went live today! So far, I LOVE it!!!” “We have never had such a simple, easy, smooth implementation before and part of it was how great BambooHR is, but most importantly it was because of how amazing [our implementation representative] was…BambooHR is life changing for us in the HR department—we are leaving a really archaic and non-user-friendly system behind and this is so refreshing and helpful.” “I like the simple approach [and] the ability to really configure the system to be very usable. I don’t dread going to BambooHR, I enjoy it. :)” “My [implementation representative] was one of the best implementation managers I have ever worked with…I have worked with many implementation experts over the years, and she is by far one of the best I have worked with.” “Have already used the esignatures to onboard an employee, and it saved lots of hassle—especially because he is a remote employee.” “I remember joining with you guys…back when BambooHR was starting. It is so amazing to see how much you have grown and have added to the system to make my life easier. It’s also great to see that you guys haven’t lost your kindness and amazing support like most companies that grow do. I love calling in and knowing I am going to get taken care of by someone who is friendly and won’t treat me like I am out of the loop! Thanks, BambooHR!” And as if those customer quotes weren’t enough to make March incredible, we also received another award:
{ "pile_set_name": "Pile-CC" }
1.. Introduction ================ Methionine is an essential amino acid for animals and is involved in numerous metabolic processes \[[@b1-sensors-10-03562]--[@b4-sensors-10-03562]\]. In addition to being a building block in protein synthesis, methionine, after being transformed into S-adenosylmethionine, serves as a methyl donor in transmethylation reactions involved in the biosynthesis of lipids, biotin, and polyamines \[[@b5-sensors-10-03562]\]. Since methionine cannot be synthesized *de novo* in mammal cells, its supplementation in animal diets is required to provide optimal growth and physiological performance of the animals. Plant proteins, however, are poor in methionine and its optimal level in animal diets is provided by supplementation with crystalline methionine \[[@b6-sensors-10-03562]\] or methionine analogs such as 2-keto-4-(methylthio) butyric acid \[[@b7-sensors-10-03562]\] and hydroxymethionine \[[@b8-sensors-10-03562],[@b9-sensors-10-03562]\]. Therefore, timely and accurate pre-quantification of this amino acid in feed ingredients is necessary to improve cost efficiency of feed formulation and prevent its overdosage. According to Klasing and Austic \[[@b10-sensors-10-03562]\] and Baker \[[@b11-sensors-10-03562]\], excess of individual amino acids due to feed mixing errors can be potentially harmful to the animal, with methionine considered to be the amino acid possessing the highest toxicity. Feed compounds such as cysteine, vitamin B~12~, arginine, choline, and sulfate that are related to methionine metabolism can affect the apparent methionine requirement of animals and additionally complicate the estimation of the optimal dosage of this amino acid in animal diets \[[@b12-sensors-10-03562]\]. Chemical assays including high performance liquid chromatography (HPLC) are commonly used to quantify methionine level in feed ingredients. The analysis, however, involves pretreatment of the samples with performic acid followed by acid digestion \[[@b13-sensors-10-03562],[@b14-sensors-10-03562]\]. The procedure results in a complete protein degradation and liberation of methionine which differs from protein digestion under physiological conditions. Feed-derived methionine, which is available to animals to assimilate, can be more accurately estimated by animal or microbial assays which are considered to correspond more directly to the physiological needs of animals \[[@b15-sensors-10-03562],[@b16-sensors-10-03562]\]. Although considered standard, animal assays are laborious, expensive, and time consuming \[[@b17-sensors-10-03562]--[@b19-sensors-10-03562]\]. The types of animal assays that have been used for quantifying methionine availability have been reviewed extensively by Froelich and Ricke \[[@b18-sensors-10-03562]\] and will not be discussed further in the current review. Microbial assays appear to be easier and more affordable for routine analysis. Rapid development and recent improvements in molecular techniques allow for constructing successful and accurate amino acid biosensors via more precise genetic targeting of specific genes in microbial cells. This review discusses methionine biosynthesis and regulation in *Escherichia coli* and the potential of genetically modifying this microorganism into practical whole cell biosensors for methionine bioavailability quantification. 2.. Microbial Biosensors ======================== Recently, numerous microbial biosensors have been created and used in medical diagnostics, food technology, biotechnology, and environmental monitoring. Microbial biosensors couple a biological element (enzymes, viable or non-viable microbial cells) and a transducer or a device which allows for rapid, accurate and sensitive detection of target analytes \[[@b20-sensors-10-03562],[@b21-sensors-10-03562]\]. Their popularity is due to highly specific selectivity to the substrate of interest, relative inexpensiveness, and portability \[[@b22-sensors-10-03562],[@b23-sensors-10-03562]\]. Versatile microorganisms have proven to be useful in development of biosensors. The bacterium *Vibrio harveyi* and *Mycena citricolor*, a fungal microorganism, demonstrated high sensitivity for detecting cyanide and sodium monofluoroacetate respectively \[[@b24-sensors-10-03562]\]. A microbial biosensor for sensitive, selective, rapid, and direct determination of *p*-nitrophenyl (PNP) -substituted organophosphates was developed based on PNP oxidation metabolic pathway of the *Moraxella* sp. \[[@b25-sensors-10-03562]\]. *Flavobacterium* sp. were employed for development of a biosensor for methyl parathion pesticide \[[@b26-sensors-10-03562]\]. The variety and versatility among microbial species useful in the construction of biosensors for environmental application is more extensively discussed elsewhere \[[@b20-sensors-10-03562],[@b27-sensors-10-03562]\] and will not be further discussed here. In the food industry, microbial biosensors, derived from *Gluconobacter oxydans* and yeast have gained popularity for detecting total sugars, sucrose, and ethanol \[[@b28-sensors-10-03562],[@b29-sensors-10-03562]\]. Respiratory activities of *Gluconobacter oxydans* DSM 2343 cells, immobilized on chitosan, were used in the quantification of glucose. A linear relationship (R^2^ = 0.99) between sensor's response and substrate concentration was achieved in the range of 0.05 to 0.1 mM glucose \[[@b23-sensors-10-03562]\]. By using a microbial biosensor based on immobilized *Saccharomyces ellipsoideus* yeast cells, Rotariu *et al*. \[[@b29-sensors-10-03562]\] were able to determine ethanol concentrations up to 50 mM in alcoholic beverages including two types of beer, vodka, and cognac. The comparison to the chemical assay used for the analyses of the same analyte revealed good correlation (correlation coefficient 0.998) between the biosensor and the spectrometric method. An *Acetobacter pasteurianus*-based biosensor has been proposed as an alternative to chemical methods available for quantifying lactate which is used as an indicator for specific fermentations activities including those of milk, yogurt, and wine \[[@b30-sensors-10-03562],[@b31-sensors-10-03562]\]. *Aeromonas phenologenes*-, *Pseudomonas fluorescens*-, and *Bacillus subtilis*-based biosensors were proposed to serve as alternatives in quantification of amino acids including tyrosine, tryptophan, and glutamate \[[@b32-sensors-10-03562],[@b33-sensors-10-03562]\]. 3.. *E. coli* as a Biosensor ============================ Among all microorganisms, *E. coli* is one of the most highly investigated bacteria for the purposes of biosensor fabrication. It is easy to cultivate, with simple nutritive requirements and rapid growth \[[@b34-sensors-10-03562]\]. *E. coli* is a Gram negative microorganism with very well known genetics which enables the construction of a wide variety of biosensors \[[@b20-sensors-10-03562],[@b21-sensors-10-03562]\]. The complete *E. coli* genome has been sequenced and the information deposited to the National Center for Biotechnology Information (NCBI) \[[@b35-sensors-10-03562]\]. Thus, each DNA sequence of interest is routinely available to the public and can be used for a wide range of potential further genetic manipulations. In promoter-based *E. coli* biosensors, a gene promoter, inducible by the analyte of interest, is fused to a reporter that generates a signal in response to the analyte that can be easily monitored and measured. A strong SOS *E. coli* promoter fused to a *lux* gene resulted in the development of a construct which served in a dose-dependent detection of 6 genotoxic chemicals including mitomycin C, *N*-methyl-*N*-nitro-*N*-nitrosoguanidine, nalidixic acid, dimethylsulfate, hydrogen peroxide, and formaldehyde \[[@b36-sensors-10-03562]\]. An *E. coli* BL21 DE3 (RIL) biosensor strain displayed a specific response and high sensitivity to different aromatic aldehydes. The response was measured by monitoring the fluorescence of a reporter (green fluorescent protein) fused to an alcohol dehydrogenase inducible promoter (*Sso2536adh*) belonging to the archaeon *Sulfolobus solfataricus* \[[@b37-sensors-10-03562]\]. A plasmid-borne transcriptional fusion between the *E. coli* nitrate reductase (*narG*) promoter and the *Photorhabdus luminescens lux* operon was used to generate a modified *E. coli* with a highly bioluminescent phenotype in the presence of nitrate that enabled the detection of nitrate to a level of 5 × 10^−5^ mol L^−1^ (0.3 ppm) \[[@b38-sensors-10-03562]\]. Following the same approach, biosensors for toluene, arsenite and arsenate, and lead have also been generated \[[@b39-sensors-10-03562]--[@b41-sensors-10-03562]\]. In addition to environmental testing and analyses, *E. coli*-based biosensors were found to be useful in the food industry as well. *E. coli* derived β-galactosidase, glucose oxidase, and horseradish peroxidase were immobilized on a glassy carbon electrode to generate a biosensor for quantification of lactose in raw milk \[[@b42-sensors-10-03562]\]. Simultaneous determination of various mono- and disaccharides was performed by a sensor array comprised of bacterial mutants of *E. coli* K12 lacking different transport systems for individual carbohydrates \[[@b43-sensors-10-03562]\]. 4.. *E. coli* as a Biosensor for Amino Acid Bioavailability =========================================================== Amino acids are building monomers in protein synthesis and indicators for protein quality which explains the interest in constructing microbial biosensors for their quantification. Successful whole-cell biosensors for the quantification of threonine, tryptophan, lysine and glutamine have been developed based on *E. coli* auxotrophy for the respective amino acids \[[@b44-sensors-10-03562]--[@b46-sensors-10-03562]\]. Wild type *E. coli* can synthesize all amino acids and does not require their supplementation in media. However, auxotrophic mutants that are defective in the biosynthesis of the amino acid of interest grow in a dose-dependent fashion in response to the external concentration of the amino acid. In addition, *E. coli* is a part of the intestinal microflora of most animals and humans with high similarity in the assimilation of amino acids and peptides which is a necessary prerequisite for the bacterium to serve as a representative biosensor microorganism for these compounds \[[@b47-sensors-10-03562]\]. After pre-treating feed ingredients with pronase and peptidase, Erickson *et al.* \[[@b48-sensors-10-03562]\] obtained a correlation of 0.94 between lysine bioavailability determined by using an *E. coli* lysine auxotroph and previously published chick bioassay data. Indeed, in a direct experimental comparison, the *E. coli* biosensor developed by Chalova *et al.* \[[@b19-sensors-10-03562]\] proved to be as accurate as a chick bioassay for quantitation of bioavailable lysine in diverse feed ingredients and mixtures including soybean meal, cotton seed meal, meat and bone meal, chick starter and finisher, and swine starter. Early efforts for microbial quantification of methionine have also been based on bacterial auxotrophy. Hitchens *et al.* \[[@b45-sensors-10-03562]\] demonstrated that *E. coli* GUC41 could grow on DL-methionine sulfoxide but not on DL-methionine sulfone. The microbiological assay was as accurate as the chemical assay with high correlation coefficients between the two. The microbiological assay values for amino acid content were expressed as percentages of the HPLC values to obtain the bioavailability values. By using *E. coli* ATCC 23798, a methionine auxotroph, Zabala-Díaz *et al.* \[[@b49-sensors-10-03562]\] were able to quantify crystalline methionine added to feed. The feed matrix had negligible influence on the assay and methionine recovery percentages for all supplementation levels ranged from 71 to 80% indicating consistency in the bacterial response to the supplemented methionine. The *E. coli* methionine growth assay has also been miniaturized and adapted to be conducted in microtiter plates where a linear response of the *E. coli* auxotroph to up to 26.8 μM methionine was achieved \[[@b50-sensors-10-03562]\]. In general, this early assay work with *E. coli* methionine auxotrophs supports the feasibility of this approach and potential reliability for routine use. However, there are also limitations with these particular *E. coli* methionine auxotrophs. To the best of our knowledge, *E. coli* methionine auxotrophs used for methionine quantification so far have been generated via chemical mutation \[[@b51-sensors-10-03562]--[@b53-sensors-10-03562]\]. This mutation method is a "hit-or-miss" approach that mutates the organism in random locations, followed by a selection of a certain phenotype. As a result, the mutation is not target specific and various non-methionine related genes can be affected. Revertants or compensatory mutations may occur to abolish the desired functionality \[[@b54-sensors-10-03562]\]. In addition, in the case of methionine, the auxotrophic requirements for this amino acid are not specific and can also be satisfied by a variety of compounds including methioninyl peptides, α-hydroxy methionine, *N*-acetylmethionine, and the α-keto analogue α-keto-λ-methiol butyrate \[[@b55-sensors-10-03562]\]. When a chemically generated *E. coli* methionine auxotroph (ATCC 23798) was used, Froelich *et al*. \[[@b56-sensors-10-03562]\] established no differences based on substrate affinities of an *E. coli* methionine auxotroph to methionine and methionine hydroxy analog, respectively. Estimated maximum growth rate of the *E. coli* auxotroph when grown on both substrates was also found to be similar. Although the *E. coli* methionine auxotroph did not discriminate between methionine and its hydroxyl analog, it appears that both sources are not equally assimilated by animals. While studying the efficacy of both methionine and methionine hydroxyl analog supplementation of pig diets, Shoveller *et al.* \[[@b57-sensors-10-03562]\] established that methionine hydroxyl analog is significantly less bioavailable compared to DL-methionine for protein deposition in growing pigs. Similar observations were made by Feng *et al.* \[[@b58-sensors-10-03562]\] who reported the methionine hydroxyl analog to be 26.8% and 54.4% less effective than methionine for growing pigs with respect to nitrogen retention and plasma urea nitrogen respectively. Therefore, more specific mutagenesis that targets specific gene(s) without altering other metabolic pathways would be a more desirable approach to generate a microbial biosensor for discriminating and quantifying specific forms of methionine. Detailed knowledge about *E. coli*'s genomics and more specifically, the genes involved in methionine biosynthesis and transportation is a prerequisite to accomplish such a goal and is the focus of the discussion in the following sections. 5.. Biosynthesis of Methionine in *E. coli* =========================================== Methionine's carbon skeleton is initially derived from aspartate. The intermediates of this pathway, aspartyl semialdehyde and homoserine, are also used in the synthesis of lysine and threonine. Serine and cysteine are metabolically related to the methionine pathway: serine being the precursor in the synthesis of folate, which is the methyl donor for the synthesis of methionine and cysteine from the precursor of cystathionine, which is intermediate in methionine synthesis \[[@b59-sensors-10-03562]\]. Methionine biosynthesis results from the coupling of homocysteine and a methyl group, but can be accomplished via two distinct pathways \[[@b55-sensors-10-03562],[@b60-sensors-10-03562]\]. The *E. coli* K-12 methionine biosynthesis pathway <http://biocyc.org/ECOLI/organism-summary?object=ECOLI&detail-level=3> has been schematically presented by EcoCys \[[@b61-sensors-10-03562]\], a member of BioCys database collection (<http://biocyc.org/publications.shtml>), and is available via SRI International Pathway Tools, version 13.5 \[[@b62-sensors-10-03562]\]. A summary of the consecutive reactions, participating genes and respective products is given in [Table 1](#t1-sensors-10-03562){ref-type="table"}. The nonfolate branch of the methionine pathway includes *metA, metB, metC, metH, and metK* and the folate branch is comprised of *metF* and *metE* which are all negatively controlled by the *metJ* repressor system \[[@b73-sensors-10-03562]\]. The final methyl transfer is catalyzed by either a B~12~-dependent methyltransferase (*metH* gene product) or a non-B~12~-methyl transferase (*metE* product). The metabolic intermediate, 5-methyltetrahydrafolate, encoded by the *metF*, provides the methyl group for both enzymes to attach. This is a convergence point through which the cells are able to balance the requirement for protein synthesis, methylation reactions, and nucleic acid synthesis on several levels and to regulate the pathway flow of methyl units \[[@b73-sensors-10-03562]\]. Once methionine is formed, it is metabolized to S-adenosylmethionine (AdoMet) in the presence of ATP and AdoMet synthetase, a *metK* gene product \[[@b74-sensors-10-03562]--[@b76-sensors-10-03562]\]. The regulation of the methionine biosynthetic pathway consists of positive and negative feedback mechanisms depending on methionine availability and B~12~. For example, MetE biosynthesis is autoregulated via a negative feedback loop. It can also function as an antagonist of the *metR* gene product, by either interfering directly in the activation mechanism or by repressing *metR* expression \[[@b73-sensors-10-03562],[@b77-sensors-10-03562],[@b78-sensors-10-03562]\]. Alternatively, the activation depends not only on the presence of a functional MetR but also on a coactivator. A functional *metF* gene is required for vitamin B~12~- mediated repression of *metE* gene, and 5-methyltetrahydrofolate may be involved in a negative feedback repression. Inactivation of the *metE* gene allows for accumulation of the methionine intermediates O-succinylhomoserine, cystathionine, homocysteine, and 5-methyltetrahydrafolate \[[@b60-sensors-10-03562],[@b75-sensors-10-03562]\]. The first unique step in bacterial methionine biosynthesis involves the activation of homoserine, which in *E. coli* is accomplished through a succinylation reaction catalyzed by homoserine transsuccinylase (HTS). The activity of this enzyme is closely regulated *in vivo* and therefore represents a critical control point for cell growth and viability \[[@b79-sensors-10-03562]\]. Born and Blanchard \[[@b80-sensors-10-03562]\] cloned homoserine transsuccinylase from *E. coli* and demonstrated that the enzyme generates a complex with the succinyl group of succinyl-CoA before transferring it to homoserine to form the final product, O-succinylhomoserine. The enzyme can be inhibited by iodoacetamide in a pH-dependent manner which suggests the presence of cysteine in the active site that forms a succinyl-cysteine intermediate during enzymatic turnover. In *E. coli*, HTS is not only a key regulator of methionine biosynthesis but also of the bacterial growth at elevated temperatures \[[@b81-sensors-10-03562]\]. *E. coli* growth is impaired at temperatures above 44 °C due to the instability of HTS. According to Biran *et al*. \[[@b79-sensors-10-03562]\], the instability of the protein is determined by the amino-terminal part of the protein, and its removal or substitution by the N-terminal part of beta-galactosidase confers stability. Mordukhova *et al*. \[[@b82-sensors-10-03562]\] reported that two amino acids in the enzyme, namely isoleucine 229 and asparagine 267, are responsible for HTS instability and their substitution leads to stabilization of HTS molecule and improved bacterial growth at elevated temperature. MetA is controlled by the expression of *metJ* \[[@b83-sensors-10-03562]\]. MetE, a zinc-containing monomer, transfers the methyl group of N^5^-methyl-tetrahydrofolic to the thiolate group of homocysteine \[[@b68-sensors-10-03562],[@b75-sensors-10-03562],[@b78-sensors-10-03562]\]. Several mechanisms for repression of *metE* exist. The interaction between methionine as S-adenosylmethionine with MetJ leads to a corepression of *metE* through a negative feedback loop \[[@b75-sensors-10-03562]\]. The absence of MetR can also repress *metE*. MetR and MetE are of similar size and exist relatively in the same location but result from transcription in opposite directions \[[@b77-sensors-10-03562]\]. MetR is a transactivator of both *metE* and *metH* gene \[[@b75-sensors-10-03562],[@b77-sensors-10-03562],[@b78-sensors-10-03562]\]. Homocysteine coactivates both the expression of the *metR* gene and the MetR stimulation of *metE* expression. The vitamin B~12~ -mediated repression of the *metE* gene in *E. coli* requires the B~12~-dependent transmethylase, a product of the *metH* gene. It has been proposed that the MetH-B~12~ holoenzyme complex is involved directly in the repression mechanism \[[@b55-sensors-10-03562],[@b73-sensors-10-03562],[@b75-sensors-10-03562]\]. According to Wu *et al*. \[[@b84-sensors-10-03562]\], however, B~12~-mediated repression of the *metE* gene derives primarily from a loss of MetR-mediated activation due to depletion of the coactivator homocysteine, rather than a direct repression by the MetH-B~12~ holoenzyme. MetH has a higher constant of Michaelis-Menten (K~m~) than MetE, which is compensated by the very strong expression of the *metE* gene \[[@b68-sensors-10-03562]\]. N^5^-methyl-H~4~-folate transfers a methyl unit to the MetH holoenzyme where it is subsequently attached to homocysteine \[[@b55-sensors-10-03562],[@b68-sensors-10-03562],[@b75-sensors-10-03562],[@b78-sensors-10-03562]\]. The cobalamin-independent methyltransferase (MetE) shares no similarity with the sequence of the cobalamin-dependent protein (MetH), suggesting that the two have arisen by convergent evolution \[[@b85-sensors-10-03562]\]. The *metF* gene codes for N^5^-methyl-H~4~-folate and regulates *metE* in an indirect way. N^5^-methyl-H~4~-folate is required for the transfer of a methyl group to the B~12~ within the MetH holoenzyme forming a methyl-B~12~ enzyme; the catalytically active methylated form of the MetH protein regulates *metE* expression \[[@b55-sensors-10-03562],[@b75-sensors-10-03562],[@b77-sensors-10-03562],[@b78-sensors-10-03562]\]. Regulation by MetJ may occur more readily because of the existence of 5 *met* boxes in *metF*'s promotor region making it more sensitive than the other *met* genes to small increases of AdoMet that might occur in B~12~ grown cells \[[@b75-sensors-10-03562]\]. YagD is a third methionine synthase in *E. coli*. YagD is a zinc-dependent methyltransferase with a catalytic mechanism similar to MetH and synthesizes methionine from S-methylmethionine or S-adenosylmethionine and homocysteine. YagD does not contribute to the utilization of methionine sulfoxide as methionine sulfoxide is converted to methionine via reduction. YagD is subject to regulation by the MetJ-S-adenosyl-methionine system \[[@b68-sensors-10-03562]\]. All *met* genes are regulated by MetJ. MetJ protein binds to a specific DNA region, met box, which is present in all *met* genes except *metH*. The met box region is a sequence with dyad symmetry (TGAA . . . TTCA) and produces a helical region containing four leucine residues seven amino acids apart. This motif is called a leucine zipper and has been proposed to play a role in protein dimerization that is required for DNA bindings. MetJ can bind to this region and prevent the transcription of most of the *met* genes (*metA, metBL, metC, metF, metJ, metR,* and *metE*) \[[@b55-sensors-10-03562],[@b59-sensors-10-03562],[@b71-sensors-10-03562],[@b74-sensors-10-03562]\]. The interaction of the MetJ protein with the *met* operator region is markedly enhanced by the presence of AdoMet. 6.. Bacterial Transport of Methionine ===================================== Although *E. coli* prototroph cells are capable of synthesizing methionine *de novo,* they can also acquire external methionine or methionine analogs to satisfy cellular needs for either methionine or sulfur which reflects the high flexibility of the organism under a wide range of environmental conditions. The activity of methionine transport systems in *E. coli* is influenced by the concentrations of both external and internal methionine pools \[[@b86-sensors-10-03562]\]. Cells with increased internal methionine pool or pre-exposed to excess of external methionine exhibit decreased rates of methionine uptake. Conversely, starvation for methionine in a methionine auxotroph can increase the rate of external methionine transport \[[@b86-sensors-10-03562]\]. At least two transport systems for methionine exist in *E. coli*. The high affinity transport system (*metD*) has a K~m~ of approximately 10^−7^ M and is responsible for the uptake of [l]{.smallcaps}- and [d]{.smallcaps}- methionine isomers \[[@b87-sensors-10-03562]\]. MetD is an ABC transporter with Abc the ATPase, YaeE the permease, and YaeC the likely substrate binding protein. The expression of these genes is regulated by [l]{.smallcaps}-methionine and MetJ, the common repressor of the methionine regulon. Interestingly, [l]{.smallcaps}-methionine inhibits the uptake of [d]{.smallcaps}-methionine; however, [d]{.smallcaps}-methionine does little to affect the uptake of the [l]{.smallcaps}-isomer \[[@b88-sensors-10-03562]\]. By performing competition experiments Kadner \[[@b88-sensors-10-03562]\] established that MetD possesses a distinct substrate-binding site for each stereoisomer. The second system (*metP*) is a low affinity system with a K~m~ of approximately 40 μM and can transport [l]{.smallcaps}-methionine but not the [d]{.smallcaps}-isomer \[[@b88-sensors-10-03562],[@b89-sensors-10-03562]\]. By using various deletion mutants, Merlin *et al*. \[[@b87-sensors-10-03562]\] observed that only mutants with active MetD were able to grow on [d]{.smallcaps}-methionine. Methionine can be transported across a concentration gradient (a temperature sensitive uptake process) with the assistance of MetD \[[@b90-sensors-10-03562]\]. The accumulation against a concentration gradient and the temperature influence of the uptake indicates that methionine enters bacterial cells through active transport, which is an energy-dependent process. When starved of methionine, the rate of uptake of methionine is faster than those grown with methionine \[[@b91-sensors-10-03562]\]. Both systems are regulated by the level of the internal methionine pool of the bacterium and differ in affinity by a factor of at least 400-fold \[[@b86-sensors-10-03562],[@b88-sensors-10-03562],[@b91-sensors-10-03562]\]. In *E. coli*, the methionine, transported into the cells, accumulates in the form of AdoMet rather than as free methionine. Active transport can be completely eliminated in the presence of glucose with the presence of azide and fluoride \[[@b86-sensors-10-03562],[@b91-sensors-10-03562]\]. In the absence of glucose, cells could still accumulate methionine less efficiently. The methionine analogs that inhibit uptake required the −S (or Se)-CHS group \[[@b91-sensors-10-03562]\]. The initial rate of uptake of [l]{.smallcaps}-methionine was poorly affected by the addition of α-keto-λ-methiol-butyrate, [d]{.smallcaps}-methionine, or methionine sulfoxide when they were added simultaneously with the substrate. However, methionine transport was reduced in cells exposed to analogs and methionine variations prior to the addition of a substrate \[[@b86-sensors-10-03562]\]. 7.. Genetic Strategies for Construction of *E. Coli* Mutants for Methionine Bioassays ===================================================================================== 7.1.. General Strategies ------------------------ Understanding methionine biosynthesis and transportation in *E. coli* is a prerequisite for constructing accurate and specific microbial biosensors for methionine estimation. An *E. coli* microbial bioassay approach for methionine quantification necessitates using an auxotrophic strain for methionine which is incapable of biosynthesizing this amino acid on its own. As discussed in the previous sections, mutants, currently in use for the purpose of methionine quantification, have been developed and isolated after exposure to a chemical mutagen. However, the disadvantage of the imprecise nature of chemical mutagenesis requires other approaches for generation of mutants that are more specific and efficient. To avoid the hit and miss nature of broad spectrum mutagenesis approaches such as those involving addition of chemical mutagens requires a strategy that targets a specific site on the genome without alteration of the remainder of the genome. Such approaches are more likely to result in phenotypes that are exclusively linked to a specific genetic modification rather than the collective accumulation of several mutations some of which may not be related to the gene(s) of interest. The problem with multiple mutations is not only the risk of unpredictable reversion of the phenotype of interest but a less robust mutant that does not grow as well under the selective conditions required for a particular assay. In the past few years, genetic tools have been developed that harness the utility of biological systems such as transposons that can more directly interact with the bacterial chromosome at specific sites. Transposons are versatile tools for genetic manipulation and analysis. These are DNA sequences that can be mobilized into bacterial chromosome by a recombination process that is catalyzed by an enzyme, called transposase. In contrast to chemical mutagenesis, insertion of a transposon in the bacterial genome causes complete disruption of the gene of interest and results in non-leaky phenotypes that are specifically linked to the mutated gene \[[@b92-sensors-10-03562]\]. This approach is particularly useful where the function of all the genes in the bacterial genome is not known or the biosynthetic pathway of the analyte of interest is complicated or bypassed. Transposon engineering was used by McAdam *et al*. \[[@b93-sensors-10-03562]\] to mutate *Mycobacterium bovis* BCG, a member of the slow-growing *M. tuberculosis* complex. Two auxotrophs for leucine and one for methionine were isolated from the library of transposon insertions and used to study the functionality of the respective genes. The random insertion of transposon Tn4560 into *Streptomyces tendae* ATCC 31160 resulted in identification of six genes involved in the biosynthesis of nikkornycin, a nucleoside-peptide chitin synthase inhibitor \[[@b94-sensors-10-03562]\]. The scope of application of transposon mutagenesis techniques was increased by Kwon and Ricke \[[@b95-sensors-10-03562]\] and Kwon *et al*. \[[@b96-sensors-10-03562]\] when they developed an approach for the identification of transposon location in the bacterial genome based on the amplification of transposon flanking regions using polymerase chain reaction (PCR). Deletion of specific gene(s) which abolishes the biosynthetic capability of the bacteria for certain amino acids is an alternative approach to transposon mutagenesis. This technique is applicable when the sequence of the gene to be deleted is known. Four individual (Δ*glnA1*, Δ*glnA2*, Δ*glnA3*, and Δ*glnA4*) and one triple mutant (Δ*glnA1EA2*) of *Mycobacterium tuberculosis* were generated by deletion to investigate the roles of glutamine synthetase enzymes in the nitrogen metabolism of this specific bacterium \[[@b97-sensors-10-03562]\]. Tryptophan auxotrophy in *Leptospira meyeri* was achieved by deletion of the tryptophan biosynthetic gene *trpE* via homologous recombination \[[@b98-sensors-10-03562]\]. Li and Ricke \[[@b99-sensors-10-03562]\] were able to completely delete *lysA* in *E. coli* K12 by using a linear DNA which contained at both ends 50 bp sequences homologous to upstream and downstream sequences of *lysA*. The *lysA* encoded for diaminopimelic acid decarboxylase and is a key enzyme in lysine biosynthetic pathway in *E. coli* K12 \[[@b99-sensors-10-03562]\]. The recombinant strain behaved as an auxotroph for lysine and was not able to grow in minimal medium without lysine supplementation. The *E. coli* K12 Δ *lysA* growth response to increasing concentrations of lysine was found to be linear, which is a must for the purpose of lysine quantification in feed-derived proteins. In fact, after being converted into a fluorescent biosensor, the strain was successfully used to quantitatively assess lysine in feed ingredients and complete diets \[[@b19-sensors-10-03562]\]. 7.2.. Generating specific *E. coli* Methionine Auxotrophs --------------------------------------------------------- Identifying a specific gene from the biosynthetic pathway of methionine in *E. coli* in which a deletion could result in methionine auxotroph phenotype is not straightforward. Due to the versatility in methionine biosynthetic pathway, only mutations in certain genes in the *met* regulon would result in auxotrophy for methionine and not for any of the pathway intermediates or precursors. For example, *metL* mutants can grow on homoserine while *metBL* mutants can propagate on both cystathionine and homoserine \[[@b101-sensors-10-03562]\]. While studying mutations that influenced the methionine biosynthetic pathway, Mulligan *et al*. \[[@b55-sensors-10-03562]\] observed that deficiencies in *metA* and *metB* resulted in growth requirements for homosysteine and cystathionine, and a mutation in *metE* was overcome by B~12~ supplementation. Insertions in *metL* and *metH* also did not result in methionine auxotrophy. In the same study, *metF* was the only gene which sufficiently abolished biosynthesis functions to ensure a requirement for external methionine for bacterial growth. In *Streptomyces lividans*, the disruption of a gene encoding for 5,10-methylenetetrahydrofolate reductase which was found to be highly homologous to *E. coli* MetF, also resulted in methionine auxotrophy \[[@b102-sensors-10-03562]\]. In contrast to other amino acid mutants of *E. coli* which require the [l]{.smallcaps}-form for growth, *cys* and *met* mutants are capable of using either isomer of cysteine or methionine \[[@b103-sensors-10-03562]\]. [d]{.smallcaps}-Methionine is not bioactive and cannot be directly incorporated into protein biosynthesis. Therefore, the utilization of [d]{.smallcaps}-methionine for [l]{.smallcaps}-methionine is justifiable only if the [d]{.smallcaps}-form of this amino acid is ultimately transformed into [l]{.smallcaps}-methionine. According to Cooper \[[@b104-sensors-10-03562],[@b105-sensors-10-03562]\], conversion of [d]{.smallcaps}- to [l]{.smallcaps}-methionine in *E. coli* is possible and occurs via oxidative deamination and subsequent transamination of the keto-methionine product of the former reaction. By using ultraviolet irradiation, Cooper \[[@b105-sensors-10-03562]\] was able to generate a mutant incapable of growing on [d]{.smallcaps}-methionine. The locus of the [d]{.smallcaps}-methionine utilization was mapped at approximately 2 min away from *lac* region toward threonine and leucine. Therefore, to make an *E. coli* biosensor specific for growth on [l]{.smallcaps}-methionine would require an addition to disabling the [l]{.smallcaps}-methionine biosynthesis genes as well as the genes responsible for conversion of other forms such as [d]{.smallcaps}-methionine transformation to [l]{.smallcaps}-methionine. Another approach may be possible now that the structure and allosteric regulation of the high-affinity *E. coli* methionine ABC transporter is better understood \[[@b106-sensors-10-03562]\] and manipulation of methionine transport may offer a more precise targeting of the relationship between intracellular [l]{.smallcaps}-methionine transport and external concentration of different forms of methionine. 8.. Detection Modes for Methionine Microbial Biosensors ======================================================= As analytical tools, microbial biosensors are genetically engineered to produce a measurable signal in response to the compound of interest. These signals include but are not limited to light emission, reflection, fluorescence, or absorption. Although their function is based on different principles, a common feature is the proportionality between the intensity of the signal and the concentration of target analyte \[[@b107-sensors-10-03562]\]. The choice of an appropriate detection system is an important point since each detection mode possesses advantages and disadvantages which are summarized in [Table 2](#t2-sensors-10-03562){ref-type="table"}. Several detection methods for detecting microbial responses exist for potential implementation in respect to the microbiological assay for methionine quantification. 8.1.. Optical Density --------------------- Measuring optical density (OD) is a common approach to monitor bacterial growth and is thoroughly reviewed by Kavanagh in \[[@b111-sensors-10-03562]\]. The readings provided by the spectrophotometer correlate directly with the concentration of bacteria in the test media. A non-inoculated tube with media is used to calibrate the spectrophotometer as a representative blank or "zero" value. A nutrient medium is inoculated with the *E. coli* bacterial suspension, incubated at 37°C, and the growth response of the test organism is measured hourly. Over time the turbidity/cell number is calculated and ultimately plotted to determine a linear response. The optical density values that constitute the linear slope gradually increase as the concentration of test nutrient increases. The theoretical aspects of photometry have been extensively described elsewhere \[[@b111-sensors-10-03562]\]. Although OD measurements require minimal technical effort and are relatively inexpensive there are several drawbacks for their use in quantifying nutrients from complex oranic matrices such as animal feeds and feed ingredients. To prevent any potential alternations of methionine availability, autoclaving or heat treatment of feed samples should be avoided. Therefore, the primary problem is the contribution of nonspecific microflora growth that results in OD increases, not corresponding to different concentrations of the nutrient being quantified by the assay organism. Erickson *et al*. \[[@b112-sensors-10-03562]\] were able to overcome this with the use of an antibiotic-based selective media which exclusively supported the growth of the *E. coli* lysine bioassay organism. Froelich *et al*. \[[@b113-sensors-10-03562]\] tested a medium containing a cocktail of antibiotics and antifungal agents and demonstrated that they did not alter growth kinetics of a methionine *E. coli* auxotroph in response to various methionine concentrations when compared to growth responses of the same strain of *E. coli* grown without antibiotics. Although the use of antibiotics suppress background microflora sufficiently to allow for short term bioassay measurements eventually background microflora can overcome antibiotic inhibition of growth. Consequently, if detection based on OD alone requires longer assay times, background microflora would need to be eliminated by sterilization of the feed matrix. Sterilization, particularly by thermal processes adds to the uncertainty of the accuracy of the amino acid assay by potentially altering their respective availability and any resulting measurements would no longer reflect the original values of the animal feeds being assayed. 8.2.. β-galactosidase --------------------- The measurement of β-galactosidase expression historically is a well-understood, easily measured and reliable method for examining bacterial genetics and understanding fundamentals of gene regulation \[[@b114-sensors-10-03562]\]. The β-galactosidase enzyme assay has also been used as an indirect method of microbial detection and quantitation and is more sensitive than OD \[[@b108-sensors-10-03562]\]. The *E. coli lac* operon enables the organism to metabolize lactose as a carbon source. This *lac* operon is translated at a constant rate when lactose is present in the media \[[@b115-sensors-10-03562]\]. Therefore, the enzyme concentration of lysed cells can be directly correlated with the total bacterial cell count. β-galactosidase assay was successfully used by Hitchens *et al.* \[[@b45-sensors-10-03562]\] to quantify the bioavailability of cysteine, methionine, threonine, and tryptophan in 17 foods. To overcome the lack of exoproteolytic activities in *E. coli*, the food matrices were enzymatically digested with pronase and further subjected to analysis with the respective auxotrophic bacterial strain. The accuracy of the β-galactosidase assay was evaluated by comparison of the data to the amino acid estimates in the same food-derived proteins obtained by a chemical assay. Spearman rank correlation coefficients for the two methods were significant and found to be as follows: cysteine (0.61), methionine (0.95), threonine (0.64), and tryptophan (0.85). Thus, Hitchens *et al*. \[[@b45-sensors-10-03562]\] and earlier Tuffnell and Payne \[[@b108-sensors-10-03562]\] demonstrated that β-galactosidase biosynthesis correlated to the concentrations of the amino acid needed by the auxotrophic bacterial cells for growth and could be accurately used in the quantification of methionine, tryptophan, and lysine bioavailability. However, the β-galactosidase-based assay requires more steps than an OD assay. It is disruptive and is not appropriate for kinetic studies. More importantly as with OD measurements, there is a risk of nonspecific background microflora contributing to overall β-galactosidase assay response as several organisms possess this enzyme. Therefore, a key requirement for any detection system to be used is that it is sufficiently unique *versus* the typical native microflora already present on the animal feed matrix. 8.3.. Luminescence ------------------ Compared to β-galactosidase, luminescence is a more recent detection approach and has been routinely used in the generation of bacterial biosensors. This method allows the detection of viable cells through a quantum measurement to indirectly enumerate cells. A bioluminescent signal can not only be coupled to bacterial growth response to accurately measure levels of the respective nutrient limiting bacterial growth but is 10- fold more sensitive than OD \[[@b46-sensors-10-03562],[@b109-sensors-10-03562],[@b116-sensors-10-03562]\] and considerably more sensitive than β-galactosidase. While testing the efficiency of both firefly luciferase and β-galactosidase as reporters in developing vaccine virus, Rodrigues *et al*. \[[@b117-sensors-10-03562]\] established that the luciferase assay was 1,000-fold more sensitive than that of β-galactosidase. The limit of detection of luminescence produced by the action of luciferase was found to be approximately one infected cell in a background of a million noninfected cells. In *E. coli*, bioluminescence does not occur and must be acquired via genetic modifications \[[@b118-sensors-10-03562],[@b119-sensors-10-03562]\]. Luminescence is accomplished by the introduction of the *luxAB* genes via plasmid or chromosomal insertion. Cells are subsequently grown in the test media and a chemical reagent is required to induce the bioluminescent phenotype of the inserted sequence. The production of light lasts only minutes (seconds in flash luminescence) before destabilization of the exogenous reagent. This is a shortcoming of luminescence technology and has led to genetic development of longer lasting luminescence and reagent-less requiring strains. The bioluminescence assay response is measured with a flash luminescence luminometer and requires addition of autoinducer \[[@b46-sensors-10-03562],[@b116-sensors-10-03562]\] and therefore, it is not possible to continuously monitor bacterial cell population increases during exponential growth. In order to quantify luminescence, expensive detection devices must be purchased \[[@b46-sensors-10-03562],[@b116-sensors-10-03562]\]. However, Froelich *et al*. \[[@b120-sensors-10-03562]\] demonstrated with a bioluminescent *E. coli* methionine auxotroph that, although the growth kinetics between the transformed strain and a nonplasmid carrying auxotroph were somewhat different, the OD-based standard curves between the two strains were similar. This indicates that even in the absence of available luminescent detection equipment such strains could still be used in a conventional OD-based assay with the advantage being that they could be used for luminescent based assays when the opportunity for using such equipment is made available. 8.4.. Fluorescence ------------------ A similar assay method to luminescence is fluorescence. One advantage of fluorescence over luminescence is that it is less expensive to detect and is a self-contained assay, requiring no additional reagents \[[@b121-sensors-10-03562]\]. Fluorescence occurs naturally in chemicals that resonate (a carbon chain with alternating single and double bonds) \[[@b122-sensors-10-03562]\]. It also occurs in a protein referred to as Green Fluorescent Protein (GFP) that originally was produced in jellyfish (*Aequorea victoria*), but the DNA encoding sequence has been isolated and incorporated via transgenics (the genetic translocation of genes from one species to another, *i.e.*, placing *gfp* from jellyfish into a eukaryotic strain) \[[@b123-sensors-10-03562]\]. Once incorporated, either through transformation of a gene system on a vector or directly incorporated in DNA of the test organism, the fluorescent protein is concomitantly synthesized with other cell proteins. The assay then requires a spectrofluorometer that can excite the engineered organism's new protein and detect emitted light at a different wavelength \[[@b110-sensors-10-03562],[@b124-sensors-10-03562]\]. Just as with OD, the value are recorded over time and graphed linearly over time and concentration. Originally discovered in *Aequorea victoria,* two proteins were found within this jellyfish that had luminescent/fluorescent capabilities. The first was aequorin that emitted blue light with the presence of Ca^++^(luminescence). The second was the green fluorescent protein which when excited could be detected on a fluorometer (fluorescence) \[[@b125-sensors-10-03562]\]. Tsien \[[@b122-sensors-10-03562]\] described the general molecular weight of most GFP forms to be approximately 27 kDa. An advantage of the use of *gfp* as a reporter gene is its structural stability. The eleven beta strands surround and protect the chromophore that is positioned near the geometric center of a "beta can", which protects the chromophore from temperature, acid, and oxidation. Its normal excitation peak is at 395nm with a minor peak at 475nm and emission peaks at 508 nm \[[@b122-sensors-10-03562]\]. It does not require any additional substrates or reagents to fluoresce, and thus sample perturbation and destruction are avoided \[[@b126-sensors-10-03562]\]. Froelich *et al*. \[[@b127-sensors-10-03562]\] successfully transformed an *E. coli* methionine auxotroph with a plasmid encoding for a green fluorescent protein and demonstrated that it could be used to quantify methionine in several representative animal feed ingredients. However, some variation between OD---based measurements and fluorescent measurements were noted suggesting some potential interference with fluorescent measurements. Some artifacts have to be taken into consideration when detecting the GFP chromophore. Media and feeds may contain aromatic and resonating conjugate carbon chains that may also fluoresce. Some of them have emission spectrum overlapping the emission spectrum of GFP (350 to 550 nm). This often leads to low signal to noise ratios, decreased emission intensity and occasionally complete inability to detect the fluorescence emitted by GFP \[[@b128-sensors-10-03562]\]. To correct for this, a simple excitation filter that allows light to pass at wavelengths higher than 350 nm is used in conjunction with an emissions bandpass filter that allows only light with certain wavelength to pass. Heim and Tsien \[[@b129-sensors-10-03562]\] using specific optical filters detected three different forms of GFP simultaneously in samples of viable bacteria. In addition, GFP variants with different emission spectra were created to overcome either the low intensity of the emission signal or the background fluorescence of various compounds. The resulting GFP mutants are characterized with different excitation/emission spectra, brighter fluorescence, higher solubility, and more even distribution throughout the cytoplasm than the wild type \[[@b130-sensors-10-03562]\]. These mutants allow the monitoring of multiple species of bacteria simultaneously in a complex microbial community. However, Patterson *et al*. \[[@b131-sensors-10-03562]\] implied that no single variant was appropriate for all applications but that each of them offers advantages and disadvantages when investigating viable cells. There are some issues associated with fluorescence assay which must be accounted for such as autofluorescence from matrices that naturally fluoresce. By studying autofluorecence capacity of feed ingredients including soybean meal, cottonseed meal, meat and bone meal, Chalova *et al.* \[[@b132-sensors-10-03562]\] observed that hydrolyzed feed proteins in concentrations up to 0.1 mg/ml did not interfere with the fluorescence of Gfpmut3 \[[@b133-sensors-10-03562]\] which was used as a reporter in an *E. coli* whole cell-based lysine biosensor. Nonhydrolyzed soybean meal and cottonseed meal did not exhibit detectable background fluoorescence up to 2 mg/ml. The same authors demonstrated the advantages of the constructed *gfp*-based biosensor in the quantification of bioavailable lysine in the feed samples when contaminated with *E. coli*. The second possible problem is light scatter in the fluorometer. By simply diluting the sample to an OD of 0.1 or less, absorption artifacts and secondary inner filter affects can be avoided. This also prevents light scatter because the density of the sample is lower. Other techniques to lower light scatter should be checked with a blank made from media to determine if scatter is occurring. Finally, the existence of possible quenchers such as other fluorophores which may lower or lose quantum yield can be problematic. This can be corrected with the application of several equations depending on the cause \[[@b110-sensors-10-03562]\]. 9.. Conclusions =============== In conclusion, microbial sensors for methionine quantification in feed and feed ingredients are an alternative to animal assays because they have the advantage of being simpler, more rapid, and cost efficient. Versatile tools in molecular biology combined with current knowledge of *E. coli* genetics favor the generation of appropriate and successful constructs that may serve as methionine biosensors. However, more work needs to be done in understanding the bacterial genome to better target gene(s) that lead to generation of methionine auxotroph exhibiting a single phenotype. The wide variety of available detection modes should facilitate the choice of a reporting system which will contribute to the simplified operation and identification of a biosensor's emitted signal. This review was supported by Hatch Grant H8311 administered by the Texas Agricultural Experimental Station and Texas Advanced Technology program grant \#000517-0220-2001 (Texas Higher Education Board, Austin, TX). C. A. Froelich, Jr. was partially supported by a Texas Public Education Grant (Texas Higher Education College Board, Austin, TX). ###### Summary of genes which participate in methionine biosynthesis and regulation. **Gene** **Product** **Reaction/Function** **Reference** ---------------------------------------- ----------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------ ----------------------------- **Methionine biosynthesis** *metA* homoserine O-transsuccinylase L-homoserine + succinyl-CoA \<==\> O-succinyl-L-homoserine + coenzyme A \[[@b63-sensors-10-03562]\] *metB* Cystathionine ã-synthetase L-cysteine + O-succinyl-L-homoserine \<==\> succinate + L-cystathionine + H+ \[[@b64-sensors-10-03562]\] *metC* cystathionase L-cystathionine + H2O \<==\> pyruvate + ammonia + L-homocysteine + H+ \[[@b65-sensors-10-03562]\] *metH* Cobalamin-dependent tetrahydropteroylglutamate methyltransferase L-homocysteine + 5-methyltetrahydrofolate \<==\> L-methionine + tetrahydrofolate \[[@b66-sensors-10-03562]\] *metE* Cobalamin-independent tetrahydropteroyltriglutamate methyltransferase L-homocysteine + 5-methyltetrahydropteroyltri-L-glutamate \<=\> L-methionine + tetrahydro-pteroyltri-L-glutamate \[[@b67-sensors-10-03562]\] *yagD* homocysteine methyltransferase L-homocysteine + S-adenosyl-L-methionine \<==\> L-methionine + S-adenosyl-L-homocysteine + H+ \[[@b68-sensors-10-03562]\] *metK* methionine adenosyltransferase Catalyzes the formation of the sulfonium compound S-adenosylmethionine from methionine \[[@b70-sensors-10-03562]\] **Methionine biosynthesis regulation** *metR* DNA-binding transcriptional activator, homocysteine-binding Transactivate *metA, metE*, and *metH* \[[@b71-sensors-10-03562]\] *metJ* S-adenosylmethionine transcriptional repressor Represses transcription from associated promoter \[[@b72-sensors-10-03562]\] ###### Detection systems for microbial assays. **Detection Systems** **Characteristics** **Reference** ----------------------- ------------------------------------------------------------------------------------------------ ------------------------------ Optical Density (OD) EconomicalReliableEasy to use \[[@b111-sensors-10-03562]\] â-galactosidase More sensitive than ODRequires more steps \[[@b108-sensors-10-03562]\] Luminescence 10X more sensitive than ODRequires aldehyde to initiate luminescenceExpensive \[[@b109-sensors-10-03562]\] Fluorescence Same advantages as luminescenceLess expensive detectionSelf contained assay: no reagents added \[[@b110-sensors-10-03562]\] [^1]: Current address: Department of Biochemistry and Molecular Biology, University of Food Technologies, Plovdiv, Bulgaria. [^2]: Current address: Department of Biochemistry and Molecular Biology, Louisiana State University Health Science Center, Shreveport, LA 71129, USA.
{ "pile_set_name": "PubMed Central" }
On the present schedule, Secretary of State John F. Kerry will exit his current position on the same day as President Obama leaves his, Jan. 20 of 2017. Kerry told the Globe this week he doesn’t “have a clue” what he plans to do next. As it happens, that’s right around the time, also according to the present schedule, that the International Olympic Committee will be gearing up to decide whether Boston will host the 2024 Summer Games. Kerry, a man of the world, a sporting enthusiast, and a self-described “huge proponent” of the Boston Games, would appear a natural fit to join the late-stage lobbying to make that happen.
{ "pile_set_name": "OpenWebText2" }
--- author: - | [C.G.Bao$^1$, Y.X.Liu$^2$]{}\ [$^1$ Department of Physics,Zhongshan University, Guangzhou,510275,P.R.China.]{}\ [$^2$ Department of Physics, Beijing University, Beijing, 100871, P.R.China]{} --- 148 true mm 225 true mm tcilatex ABSTRACT: The inherent nodal structures of the wavefunctions of 6-nucleon systems are investigated. A group of six low-lying states (including the ground states) dominated by total orbital angular momentum L=0 components are found, the quantum numbers of each of these states are deduced. In particular, the spatial symmetries of these six states are found to be mainly the {4,2} and {2,2,2}. PACS: 21.45.+v, 02.20.-a, 27.20.+n As a few-body system the 6-body system has been scarcely investigated theoretically due to the complexity arising from the 15 spatial degrees of freedom. The existing related literatures concern mainly the ground states and a few resonances \[1-5\]. The study of the character of the excited states is very scarce. On the other hand, the particles of 6-body systems are neither too few nor too many. The study of them is attractive because it may lead to an understanding of the connection between the few-body theory and the modal theories for nuclei. Before solving the 6-body Schrödinger equation precisely, if we can have some qualitative understanding of the spectrum, it would be very helpful. This understanding , together with the results from calculations and experiments, will lead to a complete comprehension of the physics underlying the spectrum. In \[6\] the qualitative feature of 4-nucleon systems has been studied based on symmetry. In this paper we shall generalize the idea of \[6\] to extract qualitative character of the low-lying states of 6-nucleon systems. There are two noticeable findings in \[6\]. (i) The ground state is dominated by total orbital angular momentum L=0 component, while all the resonances below the 2n+2p threshold are dominated by L=1 components, there is a very large gap lying between them. Experimentally, this gap is about 20 MeV. This fact implies that the collective rotation is difficult to be excited. (ii) The internal wavefunctions (the wavefunction relative to a body-frame) of all the states below the 2n+2p threshold do not contain nodal surfaces. This fact implies that the excitation of internal oscillation takes a very large energy. Therefore, ti would be reasonable to assume that the L=0 nodeless component will be also important in the low-lying spectrum of the 6-nucleon systems. It was found in \[7,8\] that a specific kind of nodal surfaces may be imposed on the wavefunctions by symmetry. Let $\Psi $ be an eigenstate. Let $A$ denotes a geometric configuration. In some cases $A$ may be invariant to specific combined operations $O_i$ ( i=1 to m). For example, when $A$ is a regular octahedron (OCTA) for a 6-body system, then $A$ is invariant to a rotation about a 4-fold axis of the OCTA by 90$^{\circ }$ together with a cyclic permutation of four particles. In this case we have $$\stackrel{\wedge }{O_i}\Psi (A)=\Psi (O_iA)=\Psi (A)\hspace{1.0in}(1)$$ Owing to the inherent transformation property of $\Psi $ (the property with respect to rotation, inversion, and permutation), (1) always can be written in a matrix form (as we shall see) and appears as a set of homogeneous linear algebra equations. They impose a very strong constraint on $\Psi $ so that $\Psi $ may be zero at $A$. This is the origin of this specific kind of nodal surfaces, they are called the inherent nodal surfaces (INS). The INS appear always at geometric configurations with certain geometric symmetry. For a 6-body system the OCTA is the configuration with the strongest geometric symmetry. Let us assume that the six particles form an OCTA. Let k’ be a 4-fold axis of the OCTA, and let the particles 1,2,3, and 4 form a square surrounding k’. Let $R_\delta ^{k^{\prime }}$ denote a rotation about k’ by the angle $\delta $ (in degree), let $p(1432)$ denotes a cyclic permutation. Evidently, the OCTA is invariant to $$O_1=p(1432)R_{-90}^{k^{\prime }}\hspace{1.0in}(2)$$ Let $p_{ij}$ denotes an interchange of the locations of particles i and j, $% P $ denotes a space inversion. The OCTA is also invariant to $$O_2=p_{13}p_{24}p_{56}P\hspace{1.0in}(3)$$ Let i’ be an axis vertical to k’ and parallel to an edge of the above square; say, parallel to $\stackrel{\rightarrow }{r_{12}}$. Then the OCTAis also invariant to $$O_3=p_{14}p_{23}p_{56}R_{180}^{i^{\prime }}.\hspace{1.0in}(4)$$ Let $OO^{\prime }$ be a 3-fold axis of the OCTA, where $O$ denotes the center of mass. Let particles 2,5, and 3 form a regular triangle surroundung the $OO^{\prime }$; 1,4, and 6 form another triangle. Then the OCTA is also invariant to $$O_3=p(253)p(146)R_{-120}^{oo^{\prime }}\hspace{1.0in}(5)$$ Besides, the OCTA is also invariant to some other operators, e.g., the $% p(152)p(364)R_{-120}^{oo"}$ (where $OO"$ is another 3-fold axis). However, since the rotations about two different 3-fold axes are equivalent, one can prove that this additional operator does not introduce new constraints, and the operators $O_1$ to $O_4$ are sufficient to specify the constraints arising from symmetry. Let an eigenstate of a 6-nucleon system with a given total angular momentum J, parity $\Pi $, and total isospin T be written as $$\Psi =\sum_{L,S}\Psi _{LS}\hspace{1.0in}(6)$$ where S is the total spin, $$\Psi _{LS}=\sum_{\lambda i}F_{LSM}^{\lambda i}\chi _S^{\stackrel{\symbol{126}% }{\lambda }i}\hspace{1.0in}(7)$$ Where $M$ is the Z-component of L, $F_{LSM}^{\lambda i}$ is a function of the spatial coordinates, which is the i$^{th}$ basis function of the $% \lambda -$representation of the S$_6$ permutation group. The $\chi _S^{% \stackrel{\sim }{\lambda }i}$ is a basis function in the spin-isospin space with a given S and T and belonging to the $\stackrel{\sim }{\lambda }-$representation, the conjugate of $\lambda .$ In (7) the allowed $\lambda $ are listed in Table 1, they depend on S and T \[9\]. S T $\lambda $ --- --- --------------------------------------------------------------------- 0 0 {1$^6$}, {2,2,1,1},{3,3},{4,1,1} 1 0 {2,1$^4$}, {3,1$^3$}, {2,2,2}, {3,2,1}, {4,2} 2 0 {2,2,1,1}, {3,2,1} 3 0 {2,2,2} 0 1 {2,1$^4$}, {3,1$^3$}, {2,2,2}, {3,2,1}, {4,2} 1 1 {1$^6$}, {2,1$^4$}, 2{2,2,1,1}, {3,1$^3$}, 2{3,2,1}, {3,3}, {4,1,1} 2 1 {2,1$^4$}, {2,2,1,1}, {3,1$^3$}, {2,2,2}, {3,2,1} 3 1 {2,2,1,1} Tab.1, The allowed representation $\lambda $ in (7) From k’ and i’ defined before one can introduce a body frame i’-j’-k’. In the body-frame the $F_{LSM}^{\lambda i}$ can be expanded $$F_{LSM}^{\lambda i}(123456)=\sum_Q D_{QM}^L(-\gamma ,-\beta ,-\alpha )F_{LSQ}^{\lambda i}(1^{\prime }2^{\prime }3^{\prime }4^{\prime }5^{\prime }6^{\prime })\hspace{1.0in}(8)$$ Where $\alpha \beta \gamma $ are the Euler angles to specify the collective rotation, $D_{QM}^L$ is the well known Wigner function, Q are the projection of L along the k’-axis. The (123456) and (1’2’3’4’5’6’) specifies that the coordinates are relative to a fixed frame and the body-frame, respectively. Since the $F_{LSQ}^{\lambda i}$ span a representation of the rotation group, space inversion group, and permutation group, the invariance of the OCTA to the operations $O_1$ to $O_4$ leads to four sets of equations. For example, from $$\hat O_1F_{LSQ}^{\lambda i}(A)=F_{LSQ}^{\lambda i}(O_1A)=F_{LSQ}^{\lambda i}(A)\hspace{1.0in} (9)$$ where $F_{LSQ}^{\lambda i}(A)$ denotes that the coordinates in $% F_{LSQ}^{\lambda i}$ are given at an OCTA, for all $Q$ with $|Q|\leq L$ we have $$\sum_{i^{\prime }}[g_{ii^{\prime }}^\lambda (p(1234))e^{-i\frac \pi 2Q}-\delta _{ii^{\prime }}]F_{LSQ}^{\lambda i^{\prime }}(A)=0\hspace{1.0in}% (10)$$ where $g_{ii^{\prime }}^\lambda $ are the matrix elements belonging to the representation $\lambda $, which are known from the textbooks of group theory (e.g., refer to \[10\]). From $\hat O_2$ and $\hat O_4,$ we have $$\sum_{i^{\prime }}[g_{ii^{\prime }}^\lambda (p_{13}p_{24}p_{56})\Pi -\delta _{ii^{\prime }}]F_{LSQ}^{\lambda i^{\prime }}(A)=0\hspace{1.0in}(11)$$ and $$\sum_{Q^{\prime }i^{\prime }}[(-1)^Lg_{ii^{\prime }}^\lambda (p_{14}p_{23}p_{56})\delta _{\stackrel{-}{Q}Q^{\prime }}-\delta _{ii^{\prime }}\delta _{QQ^{\prime }}]F_{LSQ^{\prime }}^{\lambda i^{\prime }}(A)=0\ % \hspace{1.0in}(12)$$ where $\stackrel{-}{Q}=-Q.$ It is noted that $$R_{-120}^{oo^{\prime }}=R_\theta ^{j^{\prime }}R_{-120}^{k^{\prime }}R_{% \stackrel{-}{\theta }}^{j^{\prime }}\hspace{1.0in}(13)$$ where $\theta =\arccos (\sqrt{\frac 13})$. Thus from $\hat O_3$ we have $$\sum_{Q^{\prime }i^{\prime }}[g_{ii^{\prime }}^\lambda [p(235)p(164)]\sum_{Q^{\prime \prime }}D_{QQ"}^L(0,\theta ,0)e^{-i\frac{2\pi }3Q"}D_{Q^{\prime }Q"}^L(0,\theta ,0)-\delta _{ii^{\prime }}\delta _{QQ^{\prime }}]F_{LSQ^{\prime }}^{\lambda i^{\prime }}(A)=0\hspace{1.0in}% (14)$$ Eq.(10), (11), (12), and (14) are the equations that the $F_{LSQ}^{\lambda i}(A)$ have to fulfilled. In some cases there is one or more than one nonzero solution(s) (i.e., not all the $F_{LSQ}^{\lambda i}(A)$ are zero) to all these equations . But in some other cases, there are no nonzero solutions. In the latter case, the $\Psi _{LS}$ has to be zero at the OCTA configurations disregarding their size and orientation. Accordingly, an INS emerges and the OCTA is not accessible. Evidently, the above equations depend on and only on L, $\Pi $, and $\lambda .$ Therefore the existence of the INS does not at all depend on dynamics (e.g., not on the interaction, mass, etc.). Since the search of nonzero solutions of linear equations is trivial, we shall neglect the details but give directly the results of the L=0 components in the second and fourth columns of Tab.2 0$^{+}$ 0$^{+}$ 0$^{-}$ 0$^{-}$ ------------ --------- --------- --------- --------- $\lambda $ OCTA C-PENTA OCTA C-PENTA {6} 1 1 0 0 {5,1} 0 1 0 0 {4,2} 1 1 0 0 {3,3} 0 1 0 0 {2,2,2} 1 1 1 0 {2,2,1,1} 0 1 0 0 {2,1$^4$} 0 1 0 0 {1$^6$} 0 1 0 0 {3,2,1} 0 2 0 0 {4,1,1} 0 0 0 0 {3,1$^3$} 0 0 1 0 Tab.2, The accessibility of the OCTA (regular octahedron) and the C-PENTA (regular centered-pentagon) to the L$^\Pi =0^{+}$ and $0^{-}$ wavefunctions with different spatial permutation symmetry $\lambda $. Where the figures in the blocks are the numbers of independent nonzero solutions. The figure 0 implies that nonzero solutions do not exist. The INS existing at the OCTA may even extend beyond the OCTA. For example, when the shape in Fig.1a is prolonged along k’, then the shape is called a prolonged-octahedron. This shape (denoted by $B$ ) is invariant to $O_1,O_2,$ and $O_4$, but not to $O_3$. Hence, the $F_{LSQ^{\prime }}^{\lambda i^{\prime }}(B)$ should fulfill only (10) to (12), but not (14). When nonzero common solutions of (10), (11), (12), and (14) do not exist, while nonzero solutions of only (10) to (12) also do not exist, the INS extends from the OCTA to the prolonged-octahedrons. An OCTA has many ways to deform;e.g., instead of a square, the particles 1,2,3, and 4 form a rectangle or form a diamond, etc.. Hence, the INS at the OCTA has many possibilities to extend. How it extend is determined by the (L$\Pi \lambda$) of the wavefunction. Thus, in the coordinate space, the OCTA is a source where the INS may emerge and extend to the neighborhood surrounding the OCTA. This fact implies that specific inherent nodal structure exists. The details of the inherent nodal structure will not be concerned in this paper. However, it is emphasized that for a wavefunction, if the OCTA is accessible, all the shapes in the neighborhood of the OCTA are also accessible, therefore this wavefunction is inherent nodeless in this domain. Another shape with also a stronger geometric symmetry is a regular centered-pentagons(C-PENTA, the particle 6 is assumed to be located at the center of mass O). Let k’ be the 5-fold axis. The C-PENTA is invariant to (i) a rotation about k’ by $\frac{2\pi }5$ together with a cyclic permutation of the five particles of the pentagon , (ii) a rotation about k’ by $\pi $ together with a space inversion, (iii) a rotation about i’ by $\pi $ together with $p_{14}p_{23}$ (here i’ is the axis vertical to k’ and connecting O and particle 5). These invariances will lead to constraints embodied by sets of homogeneous equations, and therefore the accessibility of the C-PENTA can be identified as also given in Tab.2. In addition to the OCTA, the C-PENTA is another source where the INS may emerge and extend to its neighborhood; e.g., extend to the pentagon-pyramid as shown in Fig.1b with h$\neq $0. There are also other sources. For example, the one at the regular hexagons. However, among the 15 bonds, 12 can be optimized at an OCTA, 10 at a pentagon-pyramid, but only 6 at a hexagon. Therefore in the neighborhood of the hexagon (and also other regular shapes) the total potential energy is considerably higher. Since the wavefunctions of the low-lying states are mainly distributed in the domain with a relatively lower potential energy, we shall concentrate only in the domains surrounding the OCTA and the C-PENTA. When (L$\Pi \lambda $) =(0+{6}), (0+{4,2}), or (0+{2,2,2}), the wavefunction can access both the OCTA and the C-PENTA (refer to Table 2). These and only these wavefunctions are inherent-nodeless in the two most important domains, and they should be the dominant components for the low-lying states. All the other L=0 components must contain at least an INS resulting in a great increase in energy. From Tab.1 it is clear that the (0+{6}) component is not allowed, while the (0+{4,2}) component can be contained in \[S,T\]=\[1,0\] and \[0,1\] states, and the (0+{2,2,2}) component can be contained in \[S,T\]=\[1,0\], \[3,0\], \[0,1\], and \[2,1\] states. When \[S,T\]=\[1,0\] , the $\lambda $ can be {4,2} or {2,2,2}, therefore two J$% ^\Pi =1^{+}$ partner-states with their spatial wavefunctions orthogonal to each other exist, each of them is a specific mixture of {4,2} and {2,2,2}. Similarly, two partner-states with \[S,T\]=\[0,1\] and J$^\Pi =0^{+}$ exist also. When \[S,T\]=\[3,0\] or \[2,1\], the $\lambda $ has only one choice, therefore in each case only one state exists. Thus we can predict that there are totally six low-lying states dominated by L=0 components without nodal surfaces as listed in Tab.3, where the L,S, and $\lambda $ are only the quantum numbers of the dominant component. $\lambda $ E -- --- --- --- -- ------------------- ------ {4,2} and {2,2,2} 0 {4.2} and {2,2,2} 5.65 {2,2,2} 2.19 0 2 + 4.31 {4,2} and {2,2,2} 3.56 {4,2} and {2,2,2} {2,2,2} 5.37 Tab.3, Prediction of the quantum numbers of low-lying states (dominated by L=0 components) of the 6-nucleon systems based on symmetry. The last column is the energies (in MeV) of the states of $^6$Li taken from \[11\]. It is expected that these low-lying states should be split by the nuclear force. Owing to the interference of the {4,2} and {2,2,2} components, there would be an larger energy gap lying between the two partner-states of each pair. Ajzenberg-selove has made an analysis on $^6$Li based on experimental data \[11\], the results are listed in Tab.3. Although our analysis is based simply on symmetry, but the results of the two analyses are close. For the T=0 states, there are two J$^\Pi =$ 1$^{+}$ states (\[S,T\]=\[1,0\]) in \[11\] with a split, they are just the expected partners. The split is so large (5.65 MeV) that the lower one becomes the ground state while the higher one becomes the highest state of this group. There is a T=0 state in \[11\] at 2.19 MeV with exactly the predicted quantum numbers J$^\Pi =3^{+}$. Nonetheless, there is a T=0 state in \[11\] at 4.31 MeV with J$^\Pi $ = 2$^{+}$, which do not appear in our analysis. May be this state is dominated by L=1 component, may be there is another origin to be clarified. For the T=1 states, one of the expected partners with J$^\Pi =0^{+}$ (\[S,T\]=\[0,1\]) was found in \[11\] at 3.56 MeV . However, the other partner ( it would be considerably higher) has not yet been identified in \[11\], this is an open problem. Nonetheless, if this state exists, the structure of its spatial wavefunction would be similar to the T=0 state at 5.65 MeV . The third expected T=1 state was found in \[11\] at 5.37MeV with exactly the predicted J$^\Pi =2^{+}$. In summary we have explained the origin of the quantum numbers of the low-lying states of 6-nucleon systems. The explanation is very different from that based on the shell model \[12,13\]. For example, according to our analysis, the J$^\Pi =3^{+}$ state at 2.19 MeV has S=3 and L=0. On the contrary, in the shell model the four nucleons in the 1s orbit must have their total spin zero and total isospin zero; therefore this state should have S $\leq 1$ and L $\geq 2.$ However, it is noted that the 2$_1^{+}$ state (having S=0 and L=2) of the $^{12}C$ lies at 4.44 MeV \[14\]. Since the $% ^6$Li is considerably lighter and smaller than the $^{12}$C, the L=2 state of $^6$Li should be much higher than 4.44 MeV due to having a much smaller moment of inertia. Therefore the 3$^{+}$ state at 2.19 MeV is difficult to be explained as a L $\geq $ 2 state. In particular, it is found that the {2,2,2} component is important; however this component is suppressed by the shell model. Thus, our analysis raises a challenge to the shell model in the case that the number of nucleons is not large enough. Evidently, much work should be done to clarify the physics underlying these systems. It has been shown that sources of INS may exist in the quantum states. Nonetheless, there are essentially inherent-nodeless components of wavefunctions (each with a specific set of (L$\Pi \lambda $)). They are the most important building blocks to constitute the low-lying states. The identification of these particularly favorable components is a key to understand the low-lying spectrum. The idea of this paper can be generalized to investigate different kinds of systems, thereby we can understand them in an unified way. ACKNOWLEDGEMENT: This work is supported by the NNSF of the PRC, and by a fund from the National Educational Committee of the PRC. REFERENCES 1, B.S.Pudliner, V.R. Pandharipande, J.Carlson, and R.B.Wiringa, Phys. Rev. Lett. 74, 4396, (1995) 2, B.S.Pudliner, V.R. Pandharipande, J.Carlson, S.C.Pieper, and R.B.Wiringa, Phys. Rev. C56, 1720 (1997) 3, K.Varga, Y.Suzuki, Phys. Rev. C52, 2885, (1995) 4, A.Csótó, Phys. Rev. C49, 3035, (1994) 5, Y. Fujiwara and Y.C.Tang, Phys. Rev.C43, 96, 1991; Few-Body Systems 12, 21, (1992.) 6, C.G.Bao, Conference Handbook of XVth International Conference on Few-Body Problems in Physics, edited by L.P.Kok, J.C.S.Bacelar, and A.E.L.Dieperink, Gröningen, p.496, 1997: nucl-th/9805001(preprint). 7, C.G.Bao, Few-Body Systems, 13, 41, (1992); Phys. Rev. A47, 1752 , (1993); Phys. Rev. A50, 2182, (1994); Chinese Phys. Lett. 14, 20, (1997); Phys. Rev. Lett., 79, 3475,(1997.) 8, W.Y.Ruan, and C.G.Bao, Few-Body Systems, 14, 25, (1993) 9, C.Itzykson and M.Nauenberg, Rev. Mod. Phys. 38, 95, (1966) 10, J.Q.Chen, ”Group Representation Theory for Physicists”, World Scientific, Singapore ,1989 11, F.Ajzenberg-Selove, Nucl.Phys. A490, 1, 1(988) 12, M.G.Mayer and J.H.D.Jensen, ”Elementary Theory of Nuclear Shell Structure”, Willey, New York, 1955 13, A. deShalit and I.Talmi, ”Nuclear Shell Theory”, Academic, New York, 1963 14, Y.Fujiwara, H.Horiuchi, K.Ikeda, M.Kamimura, K.Kato, Y.Suzuki, and E.Uegaki, Prog. Theor. Phys., Supplement 68, 29, (1980)
{ "pile_set_name": "ArXiv" }
G Proteins participate in the transduction of cellular signals by cycling between an active conformation (complexed with GTP) D and an inactive conformation (complexed with GDP). The ras proteins are guanine nucleotide binding proteins believed to participate in the transduction of proliferative signals, although their specific role is still unknown. Using a variety of experimental approaches, we showed that they are not regulatory elements of either of the two main signaling pathways in mammalian cells, namely the adenylate cyclase and phosphoinostide pathways; however, using Xenopus oocytes, we were able to show that they exert a regulatory role (even in the absence of protein synthesis) in cascades of phosphorylation associated with the induction of proliferation and cell division. The HIV nef gene product has also been proposed to act as a regulatory G protein based on reports attributing GTP binding and GTPase activity to these proteins. We expressed different cDNA clones of nef using the same bacterial and mammalian vectors used previously for ras. Unlike ras, nef from the different HIV isolates lacked GTP binding activity but showed autophosphorylation using either GTP or ATP as the phosphate donor. In addition, unlike ras, HIV nef did not exhibit oncogenic potential in focus-forming assays with NIH 3T3 cells, nor did it cause meiotic maturation of Xenopus oocytes. It therefore appears that the biological function of nef does not follow the pattern of G proteins; however, its phosphorylation, either by protein kinase C or through its autokinase activity, may be functionally significant in vivo.
{ "pile_set_name": "NIH ExPorter" }
Q: Can a form submit be disabled if a HTML file input field is empty? In a form which contains only a <input id="fileInput" name="BugReport" type="file" /> input field, I would like to disable the Submit button if the file input is empty (no file was chosen yet). Is there a recommended way to do this? A: Add the required attribute to the input. It'll only work in browsers that support it, so you should have a JavaScript alternative (<form onSubmit="if(document.getElementById('fileinput').value == '') return false;"> or something along those lines).
{ "pile_set_name": "StackExchange" }
307 F.Supp. 1212 (1968) Mrs. Alline E. CORDELL v. DETECTIVE PUBLICATIONS, INC. Civ. A. No. 5040. United States District Court E. D. Tennessee, S. D. January 3, 1968. Supplemental Opinion May 15, 1968. *1213 *1214 Chambliss, Hodge, Bahner & Crawford, Mitchell Crawford, Chattanooga, Tenn., for plaintiff. Stophel, Caldwell & Heggie, Charles J. Gearhiser, Chattanooga, Tenn., for defendant. MEMORANDUM FRANK W. WILSON, District Judge. This is an action for alleged wrongful invasion of privacy arising out of the publication by the defendant of a certain article entitled "House of Horror" in the March 1967 issue of the Front Page Detective magazine. The case is before the Court upon the motion of the defendant to dismiss upon the grounds that (1) the complaint fails to state a claim upon which relief can be granted and (2) that the Court lacks in personam jurisdiction of the defendant. In the alternative, the defendant moves for a more definite statement. The basis of the defendant's contention that the complaint fails to state a claim upon which relief can be granted is defendant's argument that in Tennessee there is no cause of action for wrongful invasion of privacy. The defendant contends that the right of action has never been expressly recognized by the Tennessee courts and that such right of action should not now be recognized because it conflicts with the right of publication of matters of public interest and with the constitutional guarantee of freedom of the press. The duty of the Court of course is to apply the law which a state court would apply if it were sitting. Not *1215 only does the Court have a duty to follow precedent established by the state courts, but where there is no precedent the Court has a duty to anticipate the law which would be applied. The cause of action for wrongful invasion of privacy has been discussed in the cases of Langford v. Vanderbilt University (1956), 199 Tenn. 389, 287 S.W.2d 32, and Martin v. Senators, Inc. (1967), 418 S.W.2d 660. In each of these cases it was held that the plaintiff had waived any right of privacy which she or they may have had. It is true that these cases do not expressly and clearly hold that there is such a cause of action in Tennessee, but the Court is of the opinion that such recognition is implicit in their holdings. In the Martin case the Tennessee Supreme Court devotes some discussion to a consideration of the nature of the tort of wrongful invasion of privacy and quotes from the American Law Institute's Restatement of the Law of Torts. Dean Prosser, on the basis of the Langford case cites Tennessee as recognizing the cause of action for wrongful invasion of privacy. See Prosser on Torts, 3rd Ed., Section 112, pp. 831-832. The Court is accordingly of the opinion that Tennessee courts would recognize a cause of action for wrongful invasion of privacy and that the complaint in this case is not subject to dismissal because it is based upon such an alleged cause of action. Defendant further complains that the complaint does not specifically set forth the language which it contends constitutes the invasion of privacy. The defendant cites in support of its contention Tennessee cases requiring that allegedly libelous language be set forth with particularity in a declaration. However, the Court is of the opinion that the libel cases are not necessarily applicable in an action for alleged wrongful invasion of privacy. Bearing in mind the liberal rules associated with federal pleading, the Court is of the opinion that the complaint must fairly be said to be sufficient in its allegations that the publication of the article constituted a wrongful invasion of the plaintiff's privacy. The defendant further contends that the complaint shows that the article complained of was concerned with the death of the plaintiff's daughter and that any right of action would be personal to the daughter and would not be maintainable by this plaintiff. However, not only does the complaint allege that the plaintiff was herself the subject of improper disclosures in the article but also that she was personally injured by the references to her daughter. The Court is of the opinion that the mother of a deceased may maintain an action for alleged wrongful invasion of privacy based upon the article concerning the circumstances of the daughter's death. In our familial society it is certainly possible that certain types of publicity concerning one member of a family may constitute an invasion of the privacy of another member. Accordingly, the Court is of the opinion that the defendant's motion should be overruled insofar as it relies upon the ground of failure to state a claim upon which relief can be granted. The jurisdictional objection raised by the defendant gives rise to a difficult and delicate problem, that is, the extent to which a publisher can be subject to suits based upon personal jurisdiction in various states into which commercial publications of such publisher may be sent. This particular problem has occupied the attention of the Court of Appeals for the Fifth Circuit and the Court of Appeals for the Second Circuit in recent years, and has prompted at least one law review article. A number of the cases have arisen out of articles published by national magazines and newspapers of nationwide reputation concerning various racial conflicts which had arisen in the southern states. In New York Times Co. v. Conner (C.A. 5, 1966), 365 F.2d 567, the Fifth Circuit held that Alabama had no in personam jurisdiction of the New York Times in an action for libel arising out of an article *1216 or articles printed in the Times concerning events that took place in Alabama. The Fifth Circuit based its holding in part upon the particularly protected status which freedom of the press enjoys under the United States Constitution and held that "considerations surrounding the law of libel require a greater showing of contact to satisfy the due process clause than is necessary in asserting jurisdiction over other types of tortious activit[ies]." The Court is of the opinion that a better approach to this problem is set forth in the opinion of the Court of Appeals for the Second Circuit in Buckley v. New York Post (C.A. 2, 1967), 373 F.2d 175. Judge Friendly in that case reasoned that the free press considerations could best be effectuated by divorcing them from problems of due process under the Fourteenth Amendment. Judge Friendly's analysis that free press can best be protected by allowing the institution of suits based upon allegedly libelous publications in states where they are published and then by applying a doctrine of forum non conveniens to reduce hardship upon national publishers. The requirements of the Due Process Clause of the Fourteenth Amendment as applied in cases of substituted service based upon "minimum contact" with the forum state under the qualitative test of International Shoe Co. v. Washington, 326 U.S. 310, 66 S.Ct. 154, 90 L.Ed. 95, ultimately boil down to a balancing of interests. It has been suggested that the factors to be considered are these: (1) the relative inconvenience of the defendant in being required to defend in the forum state, (2) the relative inconvenience to which plaintiff would be put if forced to pursue his action in the state where defendant may be found, and (3) whatever interest the forum state may have in providing a means of redress to the plaintiff. One of the problems inherent in actions arising out of national publications is the multiplicity of suits to which a national publisher may be subjected. Some states have taken a step toward solution of this problem by adoption of the so-called single publication rule whereby a publication is deemed to take place only at the situs where the article is first published and nowhere else. Some commentators have suggested that an ultimate solution may only be provided by some sort of congressional legislation. It would appear to the Court that whatever may be the status of suits filed in other states where publication may have taken place, a suit should be maintainable in the state where the plaintiff lives and has her reputation among her friends and business associates. The Court is accordingly of the opinion that publication of the article out of which this action arises in Tennessee, which publication is neither disputed nor minimized in the record in this case, would constitute "minimum contact" purposefully established with this State so that maintenance of this suit would not offend principles of fundamental fairness. The Court is further of the opinion that Tennessee has provided for constructive service in cases of this nature by way of T.C.A. § 20-235, which authorizes constructive service based upon "any tortious act committed in this State." The Court is therefore of the opinion that the defendant's motion to dismiss should be denied and an order should enter to that effect. With respect to the defendant's motion for a more definite statement, the Court is of the opinion that this would be an appropriate case for granting the relief requested. The Court is accordingly of the opinion that the plaintiff should file a more definite statement with respect to the following matters: (1) The specific matters alleged to have been disclosed which it is claimed were private matters as distinguished from matters of public information; (2) The specific matters alleged to be false or highly fictionalized; and (3) The specific matters alleged to be offensive or objectionable to a person of ordinary sensibilities. An order will enter in accordance with this opinion, the order to include provision *1217 that the plaintiff will be allowed ten days within which to file the more definite statement as provided in this memorandum. SUPPLEMENTAL MEMORANDUM This cause of action is before the Court upon the defendant's motion for summary judgment. The plaintiff brings an action for invasion of her privacy by the publication of an article in the March 1967 issue of defendant's magazine, Front Page Detective. The subject of the article was the murder of the plaintiff's daughter and the events leading up to the capture of the suspected assailants. The defendant moves for summary judgment upon the following grounds: (1) the publication was protected by the First Amendment of the Constitution; (2) there is no relational right of privacy so that the plaintiff as the mother of the murder victim has no cause of action for invasion of privacy; and (3) the pleading, affidavits, and exhibits refute any alleged invasion of privacy. In support of its motion the defendant has filed the affidavit of Charles J. Gearhiser, attorney for the defendant, with 51 exhibits attached, and the affidavit of Carmena Freeman with seven exhibits attached. The plaintiff has filed the affidavit of Mitchell Crawford, attorney for the plaintiff, with one exhibit, and the affidavit of the plaintiff, Alline E. Cordell, with one exhibit. The affidavits and exhibits place in the record the article sued upon together with police records and numerous newspaper accounts relating to the murder and the apprehension of the suspected assailants. An action for invasion of privacy is a recent innovation of the common law and is generally attributed to an article written by Samuel D. Warren and Louis D. Brandeis, "The Right to Privacy," 4 Harv.L.Rev. 193 (1890). Consequently the nature of the action is not clearly defined. Prosser divides the action into four different classes: (1) intrusion (invading the plaintiff's physical solitude or seclusion), (2) Public Disclosure of Private Facts, (3) False Light in the Public Eye, and (4) Appropriation (Use of name or likeness for advertising or other business purpose). See Prosser, Torts Section 112 at 833-842 (3d ed. 1964). Since there is no allegation of physically entering plaintiff's home or other invasion of the plaintiff's solitude, the instant action is not one of intrusion. The plaintiff's action must be predicated upon "public disclosure," "false light," or "appropriation" or a combination thereof. The elements of an action for public disclosure are: publication of private facts which are offensive and objectionable to a reasonable man of ordinary sensibilities. The action will lie even though the matter disclosed is true. The action for false light is similar, but the matters disclosed must be false. Appropriation lies when the plaintiff's name or likeness is used to advertise the defendant's product or otherwise to the defendant's commercial advantage. A fairly well defined defense of privilege has developed to the invasion of privacy action. The publication is privileged if it gives publicity to an already public figure, and it is privileged when it publicizes news or matters of public interest. Of course, the Court must also consider the defense of freedom of the press upon which these two privileges are founded. In determining whether or not the defendant is entitled to a judgment as a matter of law, the Court will consider each applicable theory of invasion of privacy and whether there is a material issue of fact to be determined by the jury. Under an action for appropriation, the plaintiff has charged that the defendant's magazine article was designed for commercial exploitation, and that a fictionalized account of her daughter's murder was published solely to further the defendant's commercial interests. Appropriation, however, usually involves the use of the plaintiff's *1218 name or photograph to advertize a particular product or service or to add luster to a corporation. See Prosser, Torts Section 122 at 840 (3d ed. 1964). But when an event, even of a public and newsworthy nature, has been fictionalized, some courts have used language of appropriation. For instance, in Hazlitt v. Fawcett Publications, Inc., 116 F. Supp. 538, 545 (D.Conn., 1953), the Court stated: The existence of fictionalization also lays foundation for plaintiff's claim that it was an appropriation of an episode of the plaintiff's life to the defendant's use for commercial purposes. [citations omitted] For, to the extent that the defendant indulged in fictionalization, the inference gathers strength that the dominant characteristic of the story was not genuine information but fictional readability conducive to increased circulation for the magazine. [citations omitted] Thus this count may be deemed to state an actionable claim on the theory that the published story was in essence not a vehicle of information but rather a device to facilitate commercial exploitation. [citations omitted] The Court, however, is of the opinion that the charge that the defendant's publication was primarily to advance the defendant's commercial interests and was for commercial exploitation does not state a cause of action for appropriation or invasion of privacy. See Jenkins v. Dell Publishing Co., 251 F.2d 447, 450-451 (3rd Cir., 1957); Mahaffey v. Official Detective Stories, Inc., 210 F.Supp. 251, 253 (W.D.La., 1962). The Court is further of the opinion that a charge of fictionalization would be more properly considered under the public disclosure and false light categories of invasion of privacy. Turning next to an action for public disclosure, the defendant has supplied the Court with the initial missing persons report with four supplemental reports all from the files of the Chattanooga Police Department (Exhibit 2 to Gearhiser affidavit); 47 newspaper stories from The Chattanooga Times, Chattanooga Post, and Chattanooga News-Free Press concerning the crime, the capture of the suspects, and the trial (Exhibits 4-50 of Gearhiser affidavit, but only Exhibits 4-39 were published before March 1967); and two U.P.I. releases (Exhibits 6 and 7 of Freeman affidavit). Upon reading the magazine article and comparing it to the above mentioned exhibits, it is clear that the events contained in the article were substantially publicized and were a part of the public record. The Court is of the opinion that the plaintiff may not complain of public disclosure of private facts when the material facts in the article are not private but are matters of public record and are in the public domain. See Johnson v. Evening Star Newspaper Co., 120 U.S.App.D.C. 122, 344 F.2d 507 (1965); Shorter v. Retail Credit Co., 251 F.Supp. 329 (D.S.C., 1966). Concerning the theory of false light in the public eye, the plaintiff in her more definite statement sets forth 59 selections from the magazine article, which she alleges are false or highly fictionalized. Of the 59 selections there are 27 statements which she alleges are offensive or objectionable to a person of ordinary sensibilities. Upon reading the statements and the documents and newspaper accounts, the Court is of the opinion that the article on the whole is consistent with the published newspaper accounts, with the additions or embellishments not being of a significant or material nature. It appears that the greater portion of the matters found objectionable unto the plaintiff relate to alleged statements by her daughter of a new romantic interest in her life. Not only are the statements of an innocent and typically adolescent nature, but they make no public disclosure of private matters personal to the plaintiff. In this regard it should be recalled that an action for invading the right to privacy is personal, and the plaintiff cannot bring an action for statements referring only to her daughter. See Maritote v. Desilu Productions, Inc., 345 F.2d 418 (7th *1219 Cir., 1965) (action brought by administratrix of the Estate of Alphonse (Al) Capone, his widow, and son); Mahaffey v. Official Detective Stories, Inc., supra (action brought by parents of deceased). Ten of the selections from the article (29, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 43) refer to a relative, but only from reading other accounts would one know that it referred to the plaintiff. Another selection consisted of the following: (8) "The Cordells did not own a television set and it was almost time to view the morning serial on the Recors' TV." The plaintiff, Mrs. Cordell, alleges that the statement is false because: "We owned a television set but it was broken." (Plaintiff's answers to Interrogatories p. 2). Two of the statements refer to the plaintiff as mother of the victim: (2) "As she assured her mother the next morning and her girlfriends during the day, the evening had been a turning point in her life." (28) "She still was sitting there, waiting, at 11:45 when her mother glanced out of the window before going upstairs to bed." Bearing in mind the personal nature of the action, the Court is of the opinion that neither of these selections nor anything else in the article could reasonably be interpreted as casting the plaintiff, Mrs. Cordell, in public disrepute, nor could they reasonably be offensive or objectionable to a person of ordinary sensibilities as they reflect upon Mrs. Cordell. Finally, concerning the defenses available to a right of privacy action, the defendant contends that its article falls within the protection of the First Amendment of the Constitution. In Time, Inc. v. Hill, 385 U.S. 374, 87 S.Ct. 534, 17 L.Ed.2d 456 (1967), the Supreme Court held that the New York "Right of Privacy" Statute was precluded from being applied by the constitutional protection of freedom of speech and press in the absence of proof that the defendant published the report with knowledge of its falsity or in reckless disregard of the truth. In that case Life magazine falsely reported that a new play depicting a family's experience when they were held hostage and terrorized by escaped convicts re-enacted the experience of the plaintiffs. It was true that the family had been held hostage, but they had not been terrorized. Applying New York Times v. Sullivan, 376 U.S. 254, 84 S.Ct. 710, 11 L.Ed.2d 686 (1964), the Supreme Court stated: "* * * We create a grave risk of serious impairment of the indispensable service of a free press in a free society if we saddle the press with the impossible burden of verifying to a certainty the facts associated in news articles with a person's name, picture or portrait, particularly as related to nondefamatory matter. Even negligence would be a most elusive standard, especially when the content of the speech itself affords no warning of prospective harm to another through falsity. A negligence test would place on the press the intolerable burden of guessing how a jury might assess the reasonableness of steps taken by it to verify the accuracy of every reference to a name, picture or portrait. "In this context, sanctions against either innocent or negligent misstatement would present a grave hazard of discouraging the press from exercising the constitutional guarantees. Those guarantees are not for the benefit of the press so much as for the benefit of all of us. A broadly defined freedom of the press assures the maintenance of our political system and an open society. Fear of large verdicts in damage suits for innocent or merely negligent misstatement, even fear of the expense involved in their defense, must inevitably cause publishers to `steer * * * wider of the unlawful zone,' [citations omitted]. "But the constitutional guarantees can tolerate sanctions against calculated falsehood without significant impairment *1220 of their essential function. * * *" Time v. Hill, 385 U.S. at 389, 87 S.Ct. at 542 (emphasis in original). The plaintiff alleges that the defendant willfully and maliciously invaded the plaintiff's right of privacy in that it published the said article with full knowledge of the false and fictionalized nature of the article or it published it with reckless disregard of the plaintiff's rights in failing to make a proper investigation of the truth. In the affidavit of Carmena Freeman, Editor of the defendant publication, she states that the author of the article had contributed over 100 articles since 1961 and that this is the only complaint that the magazine has received. She further states that when a contributor submits an article he is also required to submit newspaper accounts to verify the accuracy of his story. She states that the author of the challenged article in fact submitted six newspaper stories or public records, which she compared with the article, together with two U.P.I. releases. (Exhibits of 1-7 Freeman affidavit) These supporting documents establishing prior public disclosure of the essential facts in the article sued upon are placed in the record. The First Amendment protection extends to publication of newsworthy matter or matters of public concern. Although what is of public concern is not as yet a clearly defined field of the law, it has been held that even in borderline cases the benefit of doubt should be cast in favor of protecting the publication. Cf. Rosenblatt v. Baer, 383 U.S. 75, 86 S.Ct. 669, 15 L.Ed.2d 597 (1966) (defamation action brought by supervisor of county ski recreation area precluded by First Amendment); 33 Tenn.L.Rev. 554 (1966). In some circumstances even an innocent victim may lose his right to privacy (See Johnson v. Evening Star Newspaper Co., supra) and even an innocent bystander may be precluded from asserting an action for invasion of privacy. See Jacova v. Southern Radio & Television Co., 83 So.2d 34 (Fla.). It is the opinion of the Court that the affidavit of Carmena Freeman establishes that the article was of matters in the public domain and was not published with knowledge of its falsity or with reckless disregard of its truth or falsity. It is therefore protected by the First Amendment of the Constitution. Under the undisputed evidence in this case, the Court is of the opinion that the murder of the plaintiff's daughter was clearly a matter of public concern and public interest. Accepting as false all those portions of the article asserted by the plaintiff to be false, even when so read, the article does not cast the plaintiff in a false light nor does it reflect upon her in a manner that could be said to be offensive or objectionable to a reasonable person of ordinary sensibilities. The Court is of the opinion that the plaintiff may not recover in an action for invasion of her privacy where that action purports to be based upon a reasonably factual magazine article that only incidentally and briefly refers to the plaintiff in the course of recounting the story of the murder of the plaintiff's daughter, a matter of undisputed public interest, where the article is free of material and calculated falsehood and where in its reference to the plaintiff it could not reasonably be interpreted as being offensive or objectionable to a person of ordinary sensibilities. See Maritote v. Desilu Productions, supra; Mahaffey v. Official Detective Stories, Inc., supra; Jenkins v. Dell Publishing Co., 143 F.Supp. 952 (W.D.Pa., 1956), aff'd 251 F.2d 447 (3rd Cir., 1958), cert. denied 357 U.S. 921, 78 S.Ct. 1362, 2 L.Ed.2d 1365 (1958); Waters v. Fleetwood, 212 Ga. 161, 91 S.E.2d 344; Bremmer v. Journal-Tribune Publishing Co., 247 Iowa 817, 76 N.W.2d 762. The Court is accordingly of the opinion that upon the pleading in this case, the answers to interrogatories, and the affidavits, it appears that there is no genuine issue as to any material fact to be decided by a jury and that the defendant is entitled to a judgment in its favor as a matter of law. An order will enter accordingly.
{ "pile_set_name": "FreeLaw" }
#349135 +( 7277 )- [X] <beser> Today my History class took a feild trip to the Museum of Tolerance. Its a museum showing kids not to be prejudice and all that good stuff. <beser> Anyways, one exhibit is two doors next to each other. One door has a sign hanging over it saying "Those with prejudice walk through this door" The other door's sign said "Those without prejudice walk through this door". Obviously the door for people without prejudice isn't openable because as the tour guide says "Everyone has prejudice". <beser> So, I start tugging on the door and say "What the hell is wrong with this damn door, did some damn Jew make this?" and the tour guide kicked me out and i had to sit in the bus for 15 minutes
{ "pile_set_name": "OpenWebText2" }
After making it available yesterday, Apple this evening has seemingly removed the watchOS 5 developer beta from its website. The company doesn’t elaborate as to the specifics of the removal, though it acknowledges the unavailability on its website… On its developer portal, Apple says that seed 1 of watchOS 5 is “temporarily unavailable.” The company seems to suggest that the update process rendered the Apple Watch of some unusable. Apple says it is investigating an issue that occurs while updating and invites affected user to contact AppleCare. Seed 1 of watchOS 5 is temporarily unavailable. We are investigating an issue that occurs while updating. If you’ve experienced any issues, please contact AppleCare. Apple has both removed the watchOS developer configuration file from its website, as well as removed the over-the-air update that would appear in the Apple Watch app on iPhone after the configuration profile had been installed. The company doesn’t provide a timetable as for when the update might become available again. Aside from typical beta issues such as general bugs and app compatibility issues, we’ve not seen any reports of such bricked devices. Have you had issues updating to beta one of watchOS 5? Let us know down in the comments! Be sure to catch up with all of our WWDC coverage in our full roundup of yesterday’s announcements. Subscribe to 9to5Mac on YouTube for more Apple news: FTC: We use income earning auto affiliate links. More. Check out 9to5Mac on YouTube for more Apple news:
{ "pile_set_name": "OpenWebText2" }
This is a composite image of the lunar nearside taken by the Lunar Reconnaissance Orbiter in June 2009, note the presence of dark areas of maria on this side of the moon. Credit: NASA The secret to deep-space exploration could be buried deep within the moon. A University of Central Florida scientist is developing a process that could mine the moon of its ice, which could eventually open the way for rocket-fuel production on the lunar surface. That would make it more likely that rockets could take off from the moon with enough force to, for the first time, expand a vehicle's range. "The cost of spaceflight is primarily driven by the launch of propellants into space," said UCF's Phil Metzger, who landed a six-month contract with United Launch Alliance to explore the potential. "If we could get those propellants from space, we could cut those costs." But sending hardware to the moon might not be cost-efficient—especially as reusable launch vehicles such as those used by SpaceX and Blue Origin bring the price of launches down, said Jon Goff, who runs the Broomfield, Colo.-based robotics company Altius Space Machines. "Once you get stuff launched from the moon, will it still always be cheaper than launching from Earth?" said Goff, whose company has worked with NASA and ULA. "That is an open question." The benefits of the exploration could reduce the cost of space transportation significantly, ULA Chief Scientist Bernard Kutter said in a news release. "Procuring propellant derived from the moon may be substantially less expensive than hauling the propellant out of Earth's deep-gravity well," he said. "This in turn could reduce the cost of space transportation by as much as a factor of five." The moon mining is driven in part by ULA's 30-year vision, which foresees 1,000 people living and working in the space between Earth and the moon by 2046. That would require sustainable resources that could support teams near the moon and also provide a rest stop for those who plan to travel or explore deeper into space, Metzger said. "It would be like a gas station along the way to keep it going," he said. Financial details of ULA's deal with Metzger were not disclosed. Efforts to mine the moon's ice provide a way for ULA to plant its flag in a new sector, hoping to remain competitive with SpaceX, Goff said. The Elon Musk-led company hit a major milestone Tuesday by launching its Falcon Heavy rocket, which employs reusable boosters, on its first test flight from Kennedy Space Center. "In a world where SpaceX keeps succeeding, the next question should be, 'How do I compete?'" Goff said. "... This is them trying to copy what SpaceX has done and have an exciting goal and get people excited to work with them," he said. Metzger's team is seeking a way to reach ice that scientists say is buried at the moon's poles. The initial thought is that drills could penetrate the moon, pump heat into it and collect vapor that comes from the ice chunks. That vapor can then be broken down into hydrogen and oxygen, two elements required in the production of rocket fuel. Using lunar resources could also benefit Earth's environment. "We have outgrown our globe and we are putting too much burden on the planet," Metzger said. "We are using up most affordable resources. The ultimate solution is to put the machinery of civilization into space." ©2018 The Orlando Sentinel (Orlando, Fla.) Distributed by Tribune Content Agency, LLC.
{ "pile_set_name": "OpenWebText2" }
Slideshow ( 3 images ) BANGKOK (Reuters) - U.S. fast food giant Taco Bell is opening its first outlet in Thailand, continuing the Yum! Brands YUM.N chain's Asia expansion, offering adapted menu items and local beer. The fast-food chain’s new Bangkok outlet opens on Thursday and will introduce new items with local flavors including an extra-spicy sauce to compete with the multiple quick-service chains and higher-end Mexican restaurants in the city center. It will also serve Thai beer brands Singha and Chang as well as Philippines beer San Miguel Light. Its Thai franchise partner, Thoresen Thai Agencies Pcl (TTA) TTA.BK, owned by the billionaire Mahagitsiri family, a shipping company that branched out last year into the food and beverage business with quick-service restaurant, Pizza Hut, also owned by Yum. "Taco Bell will appeal to the young generation, particularly millennials," Chalermchai Mahagitsiri, CEO of Taco Bell's Thai franchise partner Thoresen Thai Agencies (TTA) TTA.BK, said in a statement, adding that his family “fell in love” with the chain while visiting the United States. TTA, owned by the billionaire Mahagitsiri family, is a shipping company that branched out last year into the food and beverage sector. Taco Bell’s Asia Pacific’s managing director, Ankush Tuli, said Thailand’s “strong food culture, adventurous spirit and appetite for trying new things” make it a good market for the brand. The latest store was unveiled by Taco Bell President Liz Williams on Tuesday. The chain, known for serving burritos and tacos opened its first store in China in 2016 and last year signed a deal to expand in New Zealand and Australia.
{ "pile_set_name": "OpenWebText2" }
Friday Fictioneers – Capitol The first remarkable thing about the space was its spaciousness. Hall after colonnaded hall receded into the far distance. Clouds obscured the vaulted ceiling. Even Marcus, safe big Marcus holding my hand, was diminished. The second remarkable thing–the Capitol refracted identity. Mirrors on every wall reflected mirrors, and I saw myself seeing. The third thing, well, everyone knows that –the mortality of gods. They killed the Emperor that day, right in front of me. And the mirrors multiplied his dying into a massacre of thousands, one death for each of his crimes. Now we must learn to worship ourselves. Friday fictioneers is a weekly challenge set by Rochelle Wisoff Fieldsto write a 100-word story in response to a photo prompt. You can find other stories here I found your story fascinating for two reasons. The first is that it’s uniquely personal to you; I can’t imagine anybody else writing it. The second is that there are little quirks in the writing where you depart from the norm in a way that you wouldn’t normally (e.g. ‘safe big Marcus’ rather than ‘big safe Marcus’). You’ve written a very attractive story. I think my favourite phrase was ‘and I saw myself seeing’. Kudos, Neil! Well done, Neil. That last Line: Now we must learn to worship ourselves. is food for thought. My immediate thought was that this would be great for the selfie generation. However, I’m not sure whether the selfie is a sign of self-worship or more aligned with crippling self-doubt. Best wishes, Rowena And the mirrors multiplied his dying into a massacre of thousands, one death for each of his crimes. As if this could ever make up for all his crimes ~ whatever they might have been. Even Marcus, safe big Marcus holding my hand, was diminished. This line makes me feel as if the story is being told by a child. Probably not so. Wow, I really loved this one, Neil! Great use of a child’s voice to give an intriguing perspective. The structure and pacing really worked for me and I was hooked by the “well, everybody knows that” line. Nice effect with the mirrors too, both visually and symbolically. One of your best that I’ve read, I’d say. I liked this story, and the hope that goes with it. You can only make a god die once no matter how many crimes he’s committed, so let’s imagine it in metaphor. Anything is better than a god emperor, even rule by ados with smart phones. Have to agree with others here – that idea of the mirrors, of seeing a massacre in one death, a reflection of all the deaths the Emperor has taken … Just so good. Terrific take on the prompt and some wonderful imagery
{ "pile_set_name": "Pile-CC" }
Current Affairs Questions on 5th, 6th May 2016 : Which Indian Bank has highest number of wilful defaulters ? A. SBI B. ICICI Bank C. PNB D. HDFC Bank Answer: A Explanation: State Bank of India has ranked Number 1 in the list of public sector banks with the highest number of wilful defaulters stood at 1164. Total amount outstanding in the bank was INR 11,705 crore according to the Finance Ministry. Check Detail EXPLANATION at INDIA GK Mobile App. Government of India has deferred approval to FDI in an Indian JV with AgustaWestland and which Indian company? A. Godrej B. Reliance Defence C. TATA Sons D. Mahindra & Mahindra Answer: C Explanation: Government of India has deferred approval to the Agusta Westland FDI in Indian JV among charges over alleged kickback in the helicopter deal. FIPB has deferred a decision on increase in FDI in the Italian firm’s joint venture with TATA Sons. Check Detail EXPLANATION at INDIA GK Mobile App. Shreya Ukil, wins gender discrimination lawsuit against which Company in London ? A. Tata Consultancy Service B. Wipro C. Reliance Industries D. Satyam Answer: B Shreya Ukil, a former employee at Wipro Ltd, has won a landmark case of sex discrimination and victimization against the software giant at the London Employment Tribunal. The 39-year-old had sued Wipro, led by billionaire Azim Premji, in October last year, alleging then that she was subjected to a "deeply predatory, misogynistic culture" at the outsourcing giant. Check Detail EXPLANATION at INDIA GK Mobile App.
{ "pile_set_name": "Pile-CC" }
Wednesday, 9 March 2016 General Manager Corporate Affairs at MTN Nigeria MTN Nigeria - The leader in telecommunications in Nigeria, and a part of a diverse community in Africa and the Middle East, our brand is instantly recognisable. It is through our compelling brand that we are able to attract the right talents who we carefully nurture by continuously improving our employment offerings even beyond reward and recognition. We are recruiting to fill the vacant position below: Job Title: General Manager Corporate Affair Location: LagosJob Description Extract value from what we already have through cross-functional/and or regionally focused activities such as: multi-functional business optimisation, contracts review and negotiation, cross-functional capital/budget efficiency projects etc. Maintain leadership in the ICT/Digital industry by influencing state legislations & policies, participating in state level industry think-tanks, building & extending national B-2-B and similar relationships, etc. Oversee all aspects of planning and execution of major corporate events and manage relations with a multitude of internal and external stakeholders in achieving related objectives. Develop high level media briefing documents for senior management, including pre-briefing meetings and supporting management, when required, on external speaking platforms with focus on media opportunities, managing and producing high level presentations/speeches for CEO/Executives. Provide technical leadership/advice in the formulation and development of corporate communications framework, policies and guidelines and ensure compliance of operations with MTNN policies and procedures. Provide thought leadership and advice on the creation/adoption of a framework to integrate business analysis and planning into MTNN’s engagements and identify /create distinct competitive advantages for the organization through strategic use of information. About GOODAXIS is a trademark name of Global Axis Nigeria Limited registered under Corporate Affairs Commission with registration number RC651711 and duly licensed as Employment Agent by the Federal Ministry of Employment, Labour & Productivity with certificate number ML.MH/90/000405/EW. GOODAXIS delivers a broad range of professional services to leading businesses in Nigeria. We provide Consulting Services, HR Outsourcing, Business Solutions, ICT and Courses & Training for industries, organizations, manufacturing companies, construction companies etc. GOODAXIS places innovative business solutions at your doorstep; we employ a team dedicated solely to your needs so you can focus on growing your business. No matter what size or stage of the company, we can provide a customized solution. Thus, we bring fresh and innovative approach to recruitment services, acting as liaison between the company management and the workers.
{ "pile_set_name": "Pile-CC" }
Catechin-loaded Eudragit microparticles for the management of diabetes: formulation, characterization and in vivo evaluation of antidiabetic efficacy. Catechin (CT) is natural molecule proved for antidiabetic activity. Clinical application of CT is highly restricted because of its low bioavailability and ineffectiveness in in vivo conditions. Therefore, the main objective of the present investigation was to formulate CT-loaded Eudragit RS 100 microparticles and evaluated for its potential against diabetes. CT microparticles showing highest entrapment efficiency of 92.3 ± 6.5% and higher percentage yield of 63.46 ± 4.3% was selected as optimised formulation. CT microparticles treated rats showed significantly lower blood glucose, cholesterol, LDL, free fatty acid and triglyceride concentrations in comparison to pristine CT-treated rats. The glucose and lipid profiles of microparticle formulation were akin to normal rats. Moreover, CT microparticles did not produce obesity even after 60 days which is a comment side effect of antidiabetic drugs. These results indicate that the CT microparticles can be applied as potential and safe carrier for the treatment of diabetes.
{ "pile_set_name": "PubMed Abstracts" }
This holiday forecast blows! Thanksgiving paradegoers should bundle up for the coldest temperatures in 20 years — and brace for powerful winds that threaten to ground dazzling giant balloons. It’s expected to plunge into the low 20s in Manhattan — but it will feel more like the teens — in the coldest projected Thanksgiving on record since 1996, meteorologists told The Post. “It’s going to be brutal out there,” said Accuweather senior meteorologist Dave Dombek. “It’s going to be cold. Very, very cold.” He added, “If things stay as is, this will be the third-coldest Thanksgiving in New York history” — with the most frigid reaching a low of 19 degrees in 1901. Sustained wind could reach up to 25 mph and gusts could blow up to 35 mph, which would ground beloved balloons such as Charlie Brown, the Grinch and SpongeBob SquarePants. If sustained winds exceed 23 mph and gusts surpass 34 mph, none of this year’s 16 character balloons will be allowed to soar due to city regulations, Macy’s Thanksgiving Day Parade spokesman Orlando Veras told The Post. It would be the first time the city has grounded the colorful balloons since 1971. In 1997, a woman was left in a coma when a powerful gust of wind caused the Cat in the Hat balloon to strike a streetlight, which fell and hit her head. But organizers haven’t yet made a call about whether to ground the balloons this year. “It is too early to make any determinations as to the flight of the balloons,” Veras said Monday. “In the morning, just prior to the start of the event, Macy’s and the NYPD will make a final determination on the flight of the giant balloons, based on the current weather data available from the parade route and a number of additional sources.” Overall, Thursday’s low temperature is expected to be 21 degrees with a wind chill factor of 10 to 16 degrees, Dombek said. New floats this year include Elf on the Shelf, Rise of the Teenage Mutant Ninja Turtles, Splashing Safari Adventure by Kalahari Resorts and Conventions, and Fantasy Chocolate Factory by Kinder. Oldies but goodies include the Pillsbury Doughboy, the Grinch and Ronald McDonald.
{ "pile_set_name": "OpenWebText2" }
Q: Xamarin.Forms Carousel Page Swipe Event Page Changing I'm using the Carousel Page that ships with Xamarin Form (2.5.0) and would like to be able to detect when a page is about to change. Each Page has some validation and if this fails I want to prevent the user from moving to the next page. Currently the only event I can see is PageChanged and this is where I trigger the validation, however the user must swipe back to see the error message. Is there a way to hook into the native swipe event? The App is currently targeting iOS, however it will eventually need to support Android. A: I know it's a bit late, but maybe someone else might also ask, so here's an idea: As you wrote, in protected override void OnCurrentPageChanged() you could find out when a user swiped to the next page. Now if you do the validation for the previous page, you could go back to the previous page in case of error with int index = Children.IndexOf(CurrentPage); this.CurrentPage = this.Children[index-1]; This does not prevent the user from leaving the page (as there is no 'OnSwipingStart' or else), but the user will see the error without having to move back manually. If you are happy to use a different control than CarouselPage: There is a pull request to get CarouselView into native Xamarin Forms. It has a Scrolled-Event which is triggered already on the first percent swiped so you could do your actions there.
{ "pile_set_name": "StackExchange" }
Effect of dehydration on morphogenesis of the lymphatic network and immune structures in the small intestine. Dehydration was accompanied by cell changes in solitary lymphoid nodules and Peyer's patches. The proportion between lymphocytes, macrophages, and mast cells in lymphoid organs depended on the stage of dehydration. The inhibition of cell mitoses, disappearance of mature plasma cells and mast cells (per field of view), significant decrease in lymphocyte count, 4-5-fold increase in the number of destructive cells, and low density of cells and lymphatic network of the small intestine (per unit area) were observed on days 6 and 10 of dehydration. Severe morphological changes were also revealed in other layers of the small intestinal wall (mucosa, submucosa, lamina propria, etc.).
{ "pile_set_name": "PubMed Abstracts" }
Anadolu Agency via Getty Images Jeff Barnes (left) of Alameda, Calif., invites people to sign a free speech sign during a pro-Donald Trump rally at Martin Luther King Jr. Civic Center Park in Berkeley, Calif., on April 27, 2017. The co-opting of the free speech mantle by conservatives has some progressives convinced that free speech itself is no longer worth defending. I recently read a downright alarming opinion piece. It worried me in a multitude of ways. It worried me, first of all, because of what it said about about the future of political discourse in our society; about the condition of our shared social values; and about the direction of the progressive movement. In the piece, the author — a colleague of mine at HuffPost Canada — asserted that free speech is "not worth fighting for." "Only the most privileged benefit from free speech," my colleague wrote, referring to a "necessary fight against a 'free speech' movement." "'Free speech' is too costly for the disenfranchised, and this will never change when the system in power profits from this imbalance," my colleague concluded. Note the quotation marks around the words free speech. On campuses across North America, a growing number of people on the left are turning against the very notion of freedom of speech, having grown convinced that it is yet another bludgeon used by "them" against "us." It's true that we live in strange times, but I had not realized, until I read that sentence, that we are so far through the looking glass that we now inhabit a space where some people working in news media have actually stopped believing in free speech. This opinion piece is not an isolated incident. On campuses across North America, a growing number of people on the left are turning against the very notion of freedom of speech, having grown convinced that it is yet another bludgeon used by "them" against "us." In the now-famous castigation of Lindsay Shepherd at Wilfrid Laurier University, university officials on three occasions likened free speech to Nazi ideology. Is this what academia has come to? The belief that freedom of speech is fascist? To me, a student of history, this is bizarro world. Free speech is key to any fight for rights The first I ever came across the notion of free speech was in my teens, when I read about Mario Savio and the Free Speech Movement at Berkeley in the 1960s. Progressive students fought for the right to express their opinions on campus, paving the way for the civil rights and anti-Vietnam War protests that would spread to campuses around the continent. Political activism is an integral part of campus life today; it's doubtful that would have happened had it not been for the '60s free speech movement. In that context, free speech was always about giving voice to those who have no voice, about giving some measure of power and influence to those who were deprived of it — and about sticking it to The Man. Where would Martin Luther King, Jr. have been without the freedom to give the speeches he gave? Heck, would white people have ever even heard of Malcolm X were it not for freedom of speech? Or how about the role of gay pulp fiction in the early years of the fight for LGBTQ rights? Anywhere you look in history, you can see how freedom of speech — when it was seized by those who needed it most — empowered the downtrodden. The historical reality simply does not square up with my colleague's assertion that "free speech is too costly for the disenfranchised." A lack of free speech would have been much, much costlier. Yet today, the progressive movement has come to see free speech as a threat. That is one element of what was so alarming about that anti-free speech opinion piece to me — it came from a perspective that is ignorant of the historical context, and importance, of freedom of expression. It ignores entirely the long history of those who have had to fight for the right to have a voice. So why is the progressive movement turning away from free speech? It is without doubt a reaction to the successful co-opting of free-speech rhetoric by the social conservative and far-right movements. Over the past few decades, conservatives have adopted tactics of the left for their own purposes, including the use of the free-speech mantle to express their opinions. They have learned to use free speech as a moral bludgeon, to the frustration of the left. The result is that now the "free speech movement" looks to many progressives like it belongs to the conservatives — if they see free speech being invoked, it's to further some conservative cause. If you think marginalized groups have it bad in a world with free speech, just wait until you see what happens in a world without it. And that is a failure of progressivism. The movement, in effect, lost control of the free-speech mantle to the right, so now it seeks to de-legitimize the entire concept; hence those quotation marks in my colleague's article. But this is a trap that the progressive movement must not fall into. Nothing will make conservatives happier than watching progressives throw freedom of speech under the bus. Want to lose a political battle? Just look like the person who's trying to shut everyone else up. Progressivism must retake the mantle of free speech. The alternative is sure to backfire in time. Any tool of for silencing a voice can be used to silence yours, too. My colleague argued, in essence, that free speech is not worth defending because in a world with inequities, those with power will always have more access to the bully pulpit than those without. That may be true. But if you think marginalized groups have it bad in a world with free speech, just wait until you see what happens in a world without it. Follow HuffPost Canada Blogs on Facebook Also on HuffPost:
{ "pile_set_name": "OpenWebText2" }
Serena Williams could go on to play until age 40 Serena Williams, who has won 17 Grand Slams so far and needs another five to beat Steffi Graf's open era record, admitted that ten years ago she would never have expected to be here still playing now. When asked where she expected to be in another ten years, the 32-year-old replied: "Who knows? I might be here. I have learned from ten years ago. I can never say." Speaking ahead of the WTA Championships which start here on Tuesday, Williams refused to rule out the improbable because she has already achieved what seemed to her impossible anyway. Serena Williams. Pic/ AFP That was the pulmonary embolism which endangered her life three years ago and forced her to spend almost a year away from the WTA tour. "It doesn't matter what happens to me in the present I never give up," she said. "If you have an opportunity to survive, you survive. "I had overwhelming emotions when I returned to number one again," she said of the triumph which happened in February this year. "I never expected that again. "I didn't think I would play again. I just wanted to try to survive. It put a lot of character in me and even more mental toughness. "It made me realise I have overcome a lot of things. I had a lot of help with that. I think all of that really, really made me feel I can do it." As for the more immediate future, Williams said: "I never thought I would have one of my best years this year, and now there is an opportunity to do even better. "I am interested for next year to take my game to a new level, which I think I can do. "Even if I got to 23 Grand Slams, it would be very hard, you know, with so many wonderful players, especially now. There are so many great new players coming up. Everyone is so young, everyone is so hungry, everyone wants to be the next number one. "So, you know, it's going to be even tough for me to get to 18. Obviously that's my goal, but I take it one match at a time." Williams is firm favourite to retain the WTA Championships title and win it for a fourth time. However her nearest rival, Victoria Azarenka, the Belarussian, has beaten her twice this year and ran her close in the US Open final last month. "I think it's great that, I don't know, I'm always considered a favourite in a tournament," the American said. "I don't think about it. I don't like it, but I don't hate it. You know, it's better to be considered a favourite. "I also do well when I'm considered the underdog. I never consider myself a favourite because every opponent I play has a chance to do really well." Williams starts Tuesday with a round robin match against Angelique Kerber, the leading German, and has to qualify from a group which also contains Sara Errani, the Italian number one, and Petra Kvitova, the former Wimbledon champion from the Czech republic, if she is to reach Saturday's semi-finals.
{ "pile_set_name": "Pile-CC" }
Validating the Access to an Electronic Health Record: Classification and Content Analysis of Access Logs. Electronic Health Records (EHRs) have made patient information widely available, allowing health professionals to provide better care. However, information confidentiality is an issue that continually needs to be taken into account. The objective of this study is to describe the implementation of rule-based access permissions to an EHR system. The rules that were implemented were based on a qualitative study. Every time users did not meet the specified requirements, they had to justify access through a pop up window with predetermined options, including a free text option ("other justification"). A secondary analysis of a deidentified database was performed. From a total of 20,540,708 hits on the electronic medical record database, 85% of accesses to the EHR system did not require justification. Content analysis of the "Other Justification" option allowed the identification of new types of access. At the time to justify, however, users may choose the faster or less clicks option to access to EHR, associating the justification of access to the EHR as a barrier.
{ "pile_set_name": "PubMed Abstracts" }
The Los Angeles Rams and New England Patriots are slated to meet in Super Bowl LIII. The matchup on paper puts two of the top offensive teams in the league against one another. However, we may not be seeing the shootout some expect from two of 2018’s most potent offenses. Los Angeles Rams Firstly, the Rams have the best defensive player in the league on their defensive line in Aaron Donald. So far this postseason neither the Chiefs nor Chargers were able to get close to Brady. But they were bringing pressure from the edge, whereas the Rams will bring it up the middle. To no one’s surprise – Aaron Donald wins the PFF Defensive Player of the Year award.https://t.co/rtqdumQWcy pic.twitter.com/duX8WBJAyx — Pro Football Focus (@PFF) January 26, 2019 Between Donald and Ndamukong Suh, the Patriots will have a much harder time keeping Brady clean. Although Suh has had difficulties withteams running directly at him. If he can be patient and wait for the runner it will give the Rams an advantage up front. Likewise, DE Michael Brockers needs to set the edge as he did against the Saints. On the other edge will be Dante Fowler Jr., who will need another big game and be charged with getting after the RB’s. The Rams defensive line first and foremost have to do their best to limit Sony Michel and James White. As an added advantage, if they can pressure Brady, the Rams will be in good shape. The rest of the Rams defense will have their hands full. Linebackers Corey Littleton and Mark Barron could be chasing down back’s and busting screens if James Develin and Rob Gronkowski continue to block as they have been. COMIN FOR IT ➡️➡️ pic.twitter.com/CrpmlaKkiE — Marcus Peters (@marcuspeters) January 25, 2019 Simultaneously, the secondary will need to play tight man coverage to limit Julian Edelman’s involvement. Expect Aquib Talib and Marcus Peters to try and force the receivers to the outside, as well as be physical at the line of scrimmage. Look for Lamarcus Joyner will need to play the Eric Berry role that was seen in the AFC Championship Game. This could keep him on either Gronkowski or White. Where the Rams will need to win this battle is up front. Although they have the speed and tackling ability, they will be open to exploitation from RBs making catches out of the backfield. New England Patriots The New England defense has played two phenomenal first halves in the playoffs so far. They have been helped by the offense chewing up the clock, but have also held up their share of the work. Linebacker Kyle Van Noy has been their biggest playmaker on defense in the postseason, and will likely be tasked with wrapping up Todd Gurley and C.J. Anderson. Dont’a Hightower will man the other side of the field, and these two linebackers are both quick and strong. They will be perfectly suited to not only limiting the rushing attack but also disrupting tightend’s Tyler Higbee and Gerald Everett. The Patriots’ secondary is less suited to their opponents, Robert Woods and Brandon Cooks, and to a lesser degree Josh Reynolds. Stephon Gilmore has had a strong season, and Jason McCourty is a seasoned veteran. But they will both need to find another level to really clamp down on the Rams’ dynamic receiving duo. Among the league’s CBs with at least 175 snaps in coverage – Stephon Gilmore ranked 6th by allowing just 0.72 yards per coverage snap pic.twitter.com/6PjXTOaC5b — Pro Football Focus (@PFF) January 27, 2019 Cornerback Jonathan Jones had some trouble holding his own against Sammy Watkins and the Chargers receivers in the matchups leading up to the Super Bowl. Yet, Safeties Devin McCourty and Patrick Chung are so experienced, especially in Super Bowls, that they will be there to clean up and help out in coverage. Finally, the Patriots’ line. Trey Flowers, Malcolm Brown, Lawrence Guy, and Adrian Clayborn have loved the lead that their offense has given them. It has allowed the defense to be more aggressive and get after opposing QB. They pressured Mahomes from the get-go, and Jared Goff will be in similar conditions. The Rams’ offensive line is marginally better than the Chiefs’, but will still be hard-pressed to hold their own. And the Winner is… So where does that leave us? The Rams have the better defensive line, purely because of Donald, but Patriots have the better linebackers. Where the Patriots can take the lead is the secondary. Although Talib might be the most talented corner on the field, the overall Rams secondary is not at the same level as their New England counterparts. Belichick, McDaniels, and Brady might be able to take advantage of the matchups in the passing game, but Los Angeles is counting on their line to mask their flaws. Equally, Gurley and Anderson need to have success rushing the football to prevent the Patriots’ front seven bringing Goff down. The defensive advantage leans slightly to New England overall, but the more talented individuals reside in Los Angeles. Share this: Tweet Like this: Like Loading...
{ "pile_set_name": "OpenWebText2" }
This invention relates to exterior sheathing panels useful in building construction. To provide adequate resistance to lateral forces, such as seismic and wind forces, all buildings typically must have bracing attached to the framework of the exterior walls. The materials and labor required to install such bracing adds to the expense of construction. Bracing is generally provided by the application of one or a combination of the following materials to the exterior building walls: metal, wood, plywood, or other reconstituted wood based panels located at the corners and spaced apart at certain distances along the walls. Alternatively, panels made from wood, laminated paperboard or gypsum wallboard are placed about the entire perimeter of the building for reinforcing purposes. Insulating panels are also commonly placed on the exterior framework of a building. Such panels, which are used to retard heat transfer through the exterior walls, are commonly made of polystyrene, polyurethane, or phenolic foams or glass fiber materials. Sheets of metal foil, used to prevent foam aging, are adhered to the planar surfaces of panels made from such materials. Insulating panels known to the inventor do not have sufficient shear strength and fracture toughness to significantly brace the framework of a building. Therefore, additional exterior wall bracing is used with these insulating panels. An additional problem associated with available insulative sheathing products is the propensity for such products to puncture or break during either transportation or construction. In light-frame housing construction, workers frequently attach the sheathing to the studs before placing the wall in an upright position. Workers often walk on top of the panels in order to attach the panels to the studs. Walking on known insulating panels can cause them to rupture. A recurring problem associated with available sheathing is the temperature related expansion and contraction of the panels which causes the panels to retract from the supporting nails. Once a panel retracts, a pathway is created for the infiltration of air and moisture, which reduces the overall thermal performance of the panels. Therefore, a need exists for improved insulating sheathing panels directed toward overcoming these and additional problems of the prior art.
{ "pile_set_name": "USPTO Backgrounds" }
Different characteristics distinguish early versus late arising adaptive mutations in Escherichia coli FC40. The Escherichia coli strain FC40 has frequently been employed to investigate the mechanism of adaptive mutations. The strain cannot utilize lactose due to a +1 frameshift mutation that reduces beta-galactosidase to about 1% of normal levels. Cells undergo a high rate of mutation from Lac- to Lac+ when cells are grown with lactose as the sole energy source. Almost all Lac+ colonies arising 3-6 days after plating result from a base pair deletion in runs of iterated base pairs within a 130-bp target region. In this study we characterized Lac+ colonies arising 3-10 days after plating. Temperature gradient gel electrophoresis (TGGE) was used to detect mutations in the target region as a function of the day a colony appears. TGGE results confirmed the occurrence of mutations within the target region in 36 of 37 FC40 Lac+ colonies arising on days 3-7. However, mutations in this region were not detected in 23 of 37 Lac+ colonies arising from days 8-10. Sequencing data verified the TGGE results. Half of the Lac+ mutants arising on days 8-10 with no base pair change in the target region were unstable and exhibited a Lac- phenotype after successive growth cycles in rich medium. The results suggest that amplification of the lac operon region is a common factor in late arising colonies, and that different characteristics distinguish early and late arising Lac+ colonies.
{ "pile_set_name": "PubMed Abstracts" }
/* * arch/arm/mach-tegra/localtimer.c * * Copyright (C) 2002 ARM Ltd. * All Rights Reserved * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. */ #include <linux/init.h> #include <linux/smp.h> #include <linux/clockchips.h> #include <asm/irq.h> #include <asm/smp_twd.h> #include <asm/localtimer.h> /* * Setup the local clock events for a CPU. */ void __cpuinit local_timer_setup(struct clock_event_device *evt) { evt->irq = IRQ_LOCALTIMER; twd_timer_setup(evt); }
{ "pile_set_name": "Github" }
#GameOfThrones finale prediction: Arya already killed Petyr Baelish Game of Thrones opened season seven with misdirection. Walder Frey, fresh off being fed his children and killed at the end of season six, stood to welcome “every Frey who means a damn thing” to his second feast of the fortnight. We were confused. Didn’t we just see Arya open his throat? We did. But this was not Walder Frey. It was no one. It was the lone wolf. It was Arya Stark in Walder Frey’s dead face. “When they ask you what happened here, tell them the north remembers. Tell them winter came for House Frey.” This show is too good to open a season with that scene and not call back to it. Seasons have their own arc, and I believe the arc of season seven will be Arya Stark revealing herself as the killer of Petyr Baelish. …unless he’s not fooling anyone because Arya already slit his throat with the Valryian steel dagger he gave to Bran. 2. Sansa saw the dagger when she snuck into Arya’s room during “Beyond The Wall.” She then, because she’s such a great snoop, found Arya’s bag of faces under the bed. Arya Stark is not so careless as to leave a valuable weapon and a bag of faces sitting around… …unless the show needs to lay the groundwork for a big reveal in the season finale. 3. Arya ends their chilly conversation by putting the dagger in Sansa’s hands, and that’s where I think her intentions are revealed. She’s not trying to frame Sansa for Petyr’s death to get her in trouble; she’s doing it to bolster her position with the lords of the north. 4. When Petyr arranged for Arya to find Sansa’s note from King’s Landing he meant for it to drive a wedge between the two sisters, and that’s exactly what the show is making Arya pretend it did. My prediction is she saw through it immediately, recognized the way it could damage Sansa and determined then that the only way out was to take his life now and set up Sansa as the one who saved the north from his treachery. The biggest missing piece here is for the show to create a reason why the lords of the north would hate Petyr. I’m sure they don’t like him, but I’m also not sure they want him dead. I think Game of Thrones will use the 79-minute season seven finale titled “The Dragon and the Wolf” to reveal Petyr as the man behind the attempt on Bran’s life, who turned on Ned Stark an murdered Lysa Tully. What better way to reinforce Sansa’s position than to frame her as the hero who killed the traitorous Littlefinger? They wouldn’t show us the scene with Arya as Walder at the beginning of the season and then forget the entire thing. They wouldn’t reveal Arya’s secret to Sansa in the penultimate episode if they didn’t intend it to be a BIG part of the finale. They wouldn’t include Petyr’s dagger in the scene without reason. I think it will be the bookend to Arya’s story in season seven. It starts with pretending to be Walder Frey to avenge her mother and brother, it ends with pretending to be Petyr Baelish after she brings him winter. [UPDATE] I had another thought here: What if Arya really is mad at her sister and will use Petyr’s face to humiliate Sansa and gain dominance in their relationship? If the jealousy and anger Arya has shown toward Sansa is real, what better way to turn it against her than use Littlefinger’s mask to convince Sansa to act against her then reveal her own face? A ridiculous Arya-Sansa theory This one is stupid, but I’m compelled to reveal it just in case. Arya has shown unusual envy toward Sansa since they reunited. “Your pretty handwriting.” “I remember the pretty dress you were wearing. I remember the fancy way you did your hair.” “You wanted to be a queen, to sit next to a handsome young king on the iron throne.” “I wonder what it would feel like to wear those pretty dresses. To be the Lady of Winterfell.” My ridiculous Arya-Sansa theory is that Arya will become so consumed with jealousy and rage toward her sister that she kills the Lady of Winterfell and takes her face. It would be a fitting tragedy for the only family on the show that shows true familial love. You’re on thin ice Why is there thin ice north of the wall? If the land is so cold its inhabitants have to keep moving and having sex to stay warm then the ice should be thick enough to walk on. How am I supposed to be afraid of winter if it’s not even going to get cold enough to freeze a lake? WTF, Hound? What’s wrong with The Hound? He appeared to be shellshocked during the fight with the zombie polar bear and then inexplicably goaded the dead army into attacking Jon’s team on their little rock. What’s his deal? She told Petyr, simply, “I haven’t heard from Jon in weeks.” That’s all it takes. In fact that whole interview really makes me angry and pushes me more toward the thinking in this Screenrant column about how this season has gone off the rails. And I wholeheartedly agree with the assertion in this piece from Esquire: “While things began to crack last season—its first without the guiding light of George R.R. Martin’s books—it has become clear that the writers don’t know how to complete the author’s vision.”
{ "pile_set_name": "Pile-CC" }
Massive oral ingestion of elemental mercury. A 42 year old male, while repairing a sphygmomanometer, intentionally ingested an estimated 3 kg (220 mL) of metallic mercury. During admission, only tremor, irritability, forgetfulness and fatigue were noted. There were no obvious gastrointestinal or hepatic complications. Blood and urine mercury levels were significantly elevated. Most of the metallic mercury was cleared from the gut within 10 days. A few months later, hepatic dysfunction with jaundice developed. Serial investigations did not suggest a viral etiology or alcoholism. Liver function tests and blood and urine mercury levels returned to normal over the next 10 months. The observation suggests that massive and prolonged retention of metallic mercury may facilitate the conversion of metallic, elemental mercury to divalent mercury and its subsequent absorption with development of hepatic dysfunction.
{ "pile_set_name": "PubMed Abstracts" }
You are browsing the Blog for John Connor I’m a numbers guy. You live by the numbers or you die by them in the real estate game. Short of divine intervention, no amount of luck, sorcery or practical know-how can save you from a bad property if the numbers simply don’t work. It’s no secret. It’s just slightly elusive. And honestly, I totally understand how SO MANY landlords fall into this trap. Most new investors will get an approval letter from the bank saying they can afford a property worth “X” so they calculate their mortgage payments, potential rental income & property taxes and sign on the dotted line. The truth is, that there is so much more to consider! That’s why I always run all of the numbers before even considering a purchase. While it may be tempting to take shortcuts like using the famous “50% Rule” when vetting properties, shortcuts like this can be disastrous when you’re on the hook for hundreds of thousands of dollars.
{ "pile_set_name": "Pile-CC" }
OVERALL DESCRIPTION: This application continues and amplifies the work already undergoing at the Center. The overall goal of the MU proposal is to foster interdisciplinary research that will enable the systematic evaluation of the safety and efficacy of botanicals. The PI's of the current proposal have already established collaborations, which has been shown a productive one. The proposed studies are aimed to understand the molecular mechanisms of phytochemicals and phytonutrients in human disease. The Center grant contains five projects, pilot studies, core units and career development. The concepts directing the research program include 1) the influence of phytonutrients in the progression of prostate carcinoma, this proposal examines the effect of ERKO mice will be studies in the TRAMP mouse model. 2) The effects phytoestrogens in the innate immunity of ER deficient mice, this proposal aims to determine whether phytoestrogens act to innate immunity through either the ER alpha or beta, or both, in SCID mice. 3) This project will determine whether treatment of CF cystic fibrosis with soy derived isoflavones, (primarily Genistein) acts through a non-ER-mediated pathway, on the mutated cystic fibrosis transmembrane conductance regulator (CFTR). 4) To identify and characterize botanicals with primary emphasis on those used in food supplements. 5) To examine alternative molecular mechanisms of phytoestrogens when considered as polyphenols in neurodegenerative disease. The research is facilitated by resources and several well established core facilities. The center Advisory Committee will provide guidance from distinguished representatives that will meet twice a year.
{ "pile_set_name": "NIH ExPorter" }
When Omran Daqneesh’s picture was taken after what was said to be a pro-government airstrike on a rebel-held neighborhood in the city of Aleppo, it instantly became an icon of Syria’s cruel civil war. Images and video of the little boy, the dust and blood on his face comingling as he sat in an ambulance chair in bewilderment, went viral on social media. They dominated the news cycle, propelling Syria once more to the front pages of newspapers and the top of news broadcasts. One CNN newscaster, Kate Bolduan, could barely hold back tears as she spoke of Omran’s ordeal. Yet for many residents of the western, government-held part of Aleppo, Omran’s image promotes a one-sided narrative about the conflict. They see it as yet another salvo in a media war that they are losing, their suffering all but forgotten in the eyes of the world. “The policy of these western countries is to destroy the Syrian government, or the ‘regime’ as they call it, so they don’t mention what happens in government territory… because they don’t want their people to know the truth of what is happening in the country,” said Ayman Oweilah, a 30-year old engineer student living Aleppo. “Western channels don’t send their correspondents to government-controlled areas because that would be an acknowledgement of the Syrian state.” Yet Damascus often denies visas to journalists, either because they are from countries or outlets antagonistic to the government or their coverage is deemed not objective by the Syrian Ministry of Information. It is also difficult to reach people in government areas; mistrustful of western media in general, they are reluctant to talk for fear their words will be twisted or get them in trouble with the authorities. “It reflects the general sense that Assad’s side is responsible for far more of the death than the rebel side,” said Thanassi Cambanis, a Fellow at the Century Foundation who was granted a visa last year. “But access is a far bigger issue than the political judgment of who is the bigger villain in the conflict.” “Whenever the Syrian government has let journalists in to do work, there is always a steady stream of stories that highlight the suffering of civilians on the government side,” he said. As the battle has raged for control of Aleppo, Syria’s largest city, casualty numbers indicate that people on both sides — which have largely been locked in a stalemate since 2012 — live in a crucible of suffering, where death can drop from above at any moment. According to the Syrian Observatory for Human Rights, a pro-opposition watchdog with a network of activists in Syria, 218 civilians, including 46 children, were killed in Aleppo in the month of August alone as a result of government airstrikes on opposition-controlled neighborhoods. Although loyalist forces control the skies, rebels have lobbed hundreds of mortar shells into western Aleppo. Many of the explosives are crude gas canisters repurposed for the indiscriminate shelling that killed 178 civilians in government-held areas in August. The death toll among children there was even higher; the observatory put it at 52. Rami Abdul Rahman, head of the observatory, explained that despite the disparity in the destructive power of the rebels’ arsenal compared to the government, government-controlled Aleppo had a “much higher population density.” There are roughly 1.4 million people living in government-held areas, Abdul Rahman said. “In the western neighborhoods you have five or six times the people in the east, and so the number of the casualties is higher,” said Abdul Rahman. “Just the other day, one shell got eight people in one go.” While aid groups estimate anywhere from 175,000 to 300,000 people still live in eastern rebel-held Aleppo, it is difficult to gauge the accuracy of figures from rebel territory. For example, Darayya, another besieged rebel-held city, was said to have more than 8,000 occupants. But last week, when government forces evacuated the entire town, they found fewer than 2,000 people still residing there. Ironically, many of those killed or injured in rebel bombardment come from opposition-held areas themselves; thousands have fled the fighting and constant government airstrikes on rebel territories and join the roughly 6.5 million internally displaced Syrians in the country, according to the U.N. In the days following Omran’s tragic rise to world attention, pro-government outlets and activists uploaded images of children they said were injured or killed in west Aleppo and had been ignored by western media. https://twitter.com/edwardedark/status/766399965916762114 One resident, Kamel Mohammad, shared a photo from pro-government outlet "Syria Now" of a young boy, his face covered in the now-familiar red-and-white mask of blood and dust. “Who will cry the for this child?” he asked. Below, the caption read “A child from Aleppo… after his house was shelled by the gangs of [religious] terrorism.” Pro-government outlets routinely refer to the opposition pitted against Syrian President Bashar Assad as terrorists. “Unfortunately, his enemy is protected by CNN and its ilk… and the world won’t see the terror in his eyes,” it read. Edward Dark, the pseudonym of a Twitter user living in government-held Aleppo, uploaded a picture of Rim, a little girl he said had been injured by rebel mortar fire just below that of Omran. "One of them made global headlines, while the other was ignored. Guess why," he wrote. "Of course western media will never show you the children shelled & murdered by the jihadis their government back in #Syria,” he wrote. https://twitter.com/edwardedark/status/767034925736394752 Mohammad and other social media users also posted videos and pictures casting doubt on Daqneesh’s story. Mahmoud Raslan, the photographer who took the picture of Omran, said that the boy was rescued along with members of his family from the rubble of their house in the rebel-held Al-Qaterji neighborhood. Three days later, activists said, one of his older siblings succumbed to his injuries and died. Theories about how the image must have been staged circulated on social media. Medical workers wouldn’t leave a wounded child like that; the ambulance looked too clean; Omran seemed too calm. One widely distributed photo showed a make-up artist prepping “wounds” on a girl. “This is what the studios of [Al-Arabiya] and [Al-Jazeera] have always done… visual tricks to sway Western public opinion,” the picture’s caption said, referring to news channels affiliated with Syria’s regional enemies, Saudi Arabia and Qatar. Even the Russian Ministry of Defense fueled speculation, denying in a statement that it had conducted airstrikes near Omran’s home. “The nature of the debris shown by Western broadcasters during the operation to save [the wounded boy, Omran Daqneesh] demonstrates that there are intact windows in a building nearby,” the statement said,” and this in turn shows that the strike, if it happened, was carried out not using aircraft ammunition but a mine or a gas cylinder, which are commonly used by terrorists.” The relative absence of pro-government areas from coverage feeds the perception that any individual story of suffering is told to the detriment of others. “To me, Omran's plight is that of all Syrians caught in this war,” said Leith Abou Fadel, editor of the pro-government Masdar News. “It agitates me when people try to use images of children to spread their political agenda, be it opposition or government. Both sides are guilty of it.” “West Aleppo has suffered immensely; however, they are terrible at promoting this stuff,” he said. “Which is sad now that someone has to "promote" the hell these civilians are going through.” Bulos is a special correspondent.
{ "pile_set_name": "OpenWebText2" }
Q: Symfony3 + Assetic : ParameterNotFoundException I'm working on a Symfony 3.4 application. Assetic bundle wasn't installed, so I made : $ composer require symfony/assetic-bundle and add it in the appKernel.php : new Symfony\Bundle\AsseticBundle\AsseticBundle(), It worked perfect. Then, in my app/config/config.yml, I added : # app/config/config.yml assetic: debug: '%kernel.debug%' use_controller: '%kernel.debug%' filters: cssrewrite: ~ # ... and now my front-end is no more available, this is the error displayed with app_dev.php : ParameterNotFoundException You have requested a non-existent parameter "templating.engines". Even if I remove the Assetic configuration out of the config.yml the error is here. I have been searching in all my *.yml files I do not find any property "templating.engines" .... any idea ? A: Try adding the following in the config.yml framework: ... templating: engines: ['twig']
{ "pile_set_name": "StackExchange" }
In the manufacture of circuit card assemblies (CCAs) such as multi-layer ceramic cards, the ceramic or other such substrates are populated with a variety of devices, including leadless chip carriers having typical board to device clearances of, for example, 0.006 inches and generally a minimum stand-off of 0.004 inches. Inasmuch as solder and solder flux mountings and connections are most commonly used in mounting and connecting the various devices to the substrate, the extremely close spacing between device and board traps flux residues that must be removed to avoid problems in subsequent manufacturing steps, such as when the CCAs are conformally coated. The removal of flux residues has been generally accomplished through the use of vapor degreasing equipment. Typical of such prior art degreasing equipment is a dual sump assembly in which the first sump contains a degreasing solvent which is heated and the second sump also contains the same solvent. The first sump functions as a wash bath and the second sump functions as a rinse bath. A suitable conveyor means introduces a basket, for example, containing one or more CCAs into the heated solvent of the first sump. After a washing period, which may be of any suitable duration, the basket is removed from the liquid of the first sump and lifted into a vapor area above the sump through which it is passed to the second sump, where it is rinsed. In some cleaning applications, it is highly desirable, if not mandatory, that the contaminant level after cleaning not exceed ten micrograms per square inch on the circuit board. More particularly, the ionic contamination of the surface of the board, which generally comprises a ceramic substrate populated with various devices and is, for example, six inches square, must be lower than ten micrograms (NaCl equivalent) per square inch; ion chromatography requirements by type must be less than one microgram per square inch for each of the ions chloride, bromide, and sulfate; and there should be no visible residue left on the surface under 7.times. magnification. Heretofore, excellent cleaning results which met the foregoing criteria had been achieved with 1,1,1 trichlorethane in both of the sumps of the previously described vapor degreasing equipment. However, that particular solvent is a Class 1 ozone depleting substance (ODS-1) CFC covered under the Montreal Protocol, the use of which is restricted by U.S. Environmental Protection Agency regulations, and international treaties. As a consequence of the foregoing, it is extremely important that there be a cleaning system for circuit boards that uses environmentally "friendly" materials while meeting or exceeding the aforementioned cleanliness criteria.
{ "pile_set_name": "USPTO Backgrounds" }
[Cite as State v. Klinkner, 2014-Ohio-2022.] IN THE COURT OF APPEALS OF OHIO TENTH APPELLATE DISTRICT State of Ohio, : Plaintiff-Appellee, : No. 13AP-469 v. : (C.P.C. No. 12CR-1089) Kyle L. Klinkner, aka Klinker, : (REGULAR CALENDAR) Defendant-Appellant. : State of Ohio, : Plaintiff-Appellee, : No. 13AP-521 v. : (C.P.C. No. 12CR-1090) Kenneth A. Bryant, : (REGULAR CALENDAR) Defendant-Appellant. : State of Ohio, : Plaintiff-Appellee, : No. 13AP-595 v. : (C.P.C. No. 12CR-1091) William M. Bryant, : (REGULAR CALENDAR) Defendant-Appellant. : D E C I S I O N Rendered on May 13, 2014 Ron O'Brien, Prosecuting Attorney, and Seth L. Gilbert, for appellee. Todd Barstow, for appellant Kyle L. Klinkner, aka Klinker. Nos. 13AP-469, 13AP-521 and 13AP-595 2 Scott & Nolder Co., L.P.A., and Steven S. Nolder, for appellant Kenneth A. Bryant. Yeura R. Venters, Public Defender, and David L. Strait, for appellant William M. Bryant. APPEALS from the Franklin County Court of Common Pleas KLATT, J. {¶ 1} In these consolidated appeals, defendants-appellants William M. Bryant, Kenneth Bryant, and Kyle L. Klinkner each appeal from judgment entries of conviction and sentence entered by the Franklin County Court of Common Pleas. For the following reasons, we affirm those judgments. I. Factual and Procedural Background {¶ 2} A Franklin County Grand Jury indicted all three appellants with one count of felonious assault, in violation of R.C. 2903.11. The charges arose out of a fight involving the three men and Kenneth's former employer, Victor Tantarelli, Sr. Appellants entered not guilty pleas and proceeded to a trial. Appellants waived their rights to a jury trial and all three appellants were tried together to the same judge. {¶ 3} Victor Tantarelli, Sr. ("Vic Sr.") owns a body shop in Columbus, Ohio, and employed Kenneth as an auto technician in 2011. In December 2011, Kenneth stopped working for Vic Sr. and apparently left repair work on a number of cars unfinished. According to Vic Sr.'s policy, however, he does not pay employees for their time until they complete their work on the assigned cars. Because Kenneth left his work unfinished, he had not been paid for some of the time he had worked. {¶ 4} On January 6, 2012, Kenneth returned to the body shop to pick up his tools. He brought with him his dad, William, and Kyle Klinkner. William and Kyle were both auto technicians at Kenneth's new place of employment. Kyle drove the three men to the body shop because he had a big truck that could hold Kenneth's tool box, which weighed almost 1,000 pounds. The men went in the body shop, got the tool box, and brought it out to Kyle's truck. Kenneth also handed his keys to the body shop to Vic Sr.'s son, Vic Jr. The three men went back to the truck and remained there for 10 to 15 minutes. Nos. 13AP-469, 13AP-521 and 13AP-595 3 {¶ 5} At that point, the three men got out of the truck and walked back inside the body shop. Kenneth went inside the office where Vic Sr. was eating lunch and William and Kyle stood outside the office door. Kenneth asked Vic Sr. if he planned to pay him for the work Kenneth did on the unfinished jobs. Vic Sr. told him that he would not pay him because Kenneth quit before the cars were finished. The men began yelling at each other and Vic Sr. came out from behind the desk where he was sitting and approached Kenneth. Here, the respective versions of events begin to diverge. {¶ 6} According to Vic Sr. and another employee of the body shop, when Vic Sr. approached Kenneth, Kenneth punched him twice in the chest. He then pulled Vic Sr. down to the ground and pinned Vic Sr.'s arms close to his body. While Kenneth held Vic Sr. down on the ground, William punched him a few times and Kyle kicked him a number of times. Employees of the body shop soon came out and broke up the fight, after which William, Kenneth, and Kyle left the scene. Vic Sr. sustained serious physical injuries as a result of the fight. {¶ 7} Appellants each presented slightly different versions of events. They each testified that they went over to the body shop to get Kenneth's tools. Kenneth testified, however, that he decided to ask Vic Sr. for some money that day because some repair shops will pay an auto technician for time spent working on a car even if the technician quits before completing the work. When Vic Sr. told Kenneth he would not pay him, Kenneth swore at him and began walking out of the office. According to Kenneth, Vic Sr. was yelling as Vic Sr. approached him. Vic Sr. pushed him and Kenneth grabbed at Vic Sr. so he would not fall down. The two men became entangled and fell to the floor. Kenneth denied punching Vic Sr. or pinning his arms while they were on the ground. He thought they were only on the ground for a few seconds until he was able to release himself from Vic Sr. and leave the scene. He did not observe William or Kyle hit Vic Sr. {¶ 8} Kyle testified that he was standing near the office when he heard Kenneth and Vic Sr. yelling at each other. He then saw Vic Sr. grab at Kenneth's shirt. He did not see Kenneth punch Vic Sr. Kyle thought that Kenneth lost his footing and grabbed at Vic Sr. to stop his fall. The two men stumbled around and fell down. Kyle stated he did see Kenneth holding Vic Sr.'s arms. Kyle and William began to go toward the fight but as they Nos. 13AP-469, 13AP-521 and 13AP-595 4 did, they saw Vic Jr. and another man coming to break up the fight. Kyle denied kicking Vic Sr. but testified that William punched Vic Sr. and may have kicked him once. {¶ 9} William testified that all three of the men went inside the body shop so that Kenneth could get his last paycheck. Kenneth went into the office while William and Kyle stood nearby. Kenneth asked Vic Sr. for his check but Vic Sr. told him that he would not pay him because the work was not finished. The two men began to escalate their voices and then William saw Kenneth start to leave the office. Vic Sr. came at Kenneth and pushed him as if he wanted him out of the office. Vic Sr. also grabbed Kenneth and the two came "flying out" of the office and then fell down. (Tr. 996.) William did not see Kenneth punch Vic Sr. before they fell to the ground. According to William, Kenneth had Vic Sr. on the ground in a bear hug while Vic Sr. yelled for help. William saw Vic Sr. strangling Kenneth and also trying to kick him. William became scared for his son's life, so he approached the two men and kicked and hit Vic Sr. to free Kenneth from the altercation. Shortly thereafter, the other men came to the scene of the fight and broke it up. {¶ 10} The trial judge found all three appellants guilty of felonious assault. The judge found the appellants' version of events not credible and concluded that they went to the body shop to either get money from Victor Sr. or to beat him up. The trial court sentenced them accordingly. II. The Appeals {¶ 11} All three appellants appeal their convictions. {¶ 12} William Bryant assigns the following errors: [1.] Given the nature of the case, the evidence presented by the State, and the defenses asserted by Defendant-Appellant, the failure of the trial court to conduct a hearing to evaluate the nature and extent of plea negotiations was error. [2.] The judgment of the trial court is not supported by sufficient, credible evidence. [3.] The judgment of the trial court is against the manifest weight of the evidence. {¶ 13} Kyle L. Klinkner assigns the following errors: Nos. 13AP-469, 13AP-521 and 13AP-595 5 [1.] WHEN A MOTION FOR NEW TRIAL IS FILED ON THE TRIAL LEVEL AFTER A NOTICE OF APPEAL GRANTS JURISDICTION TO THE COURT OF APPEALS, THE BEST INTERESTS OF ALL PARTIES WOULD BE SERVED IF THIS COURT REMANDS THE APPEAL TO THE TRIAL COURT TO LITIGATE THE NEW TRIAL MOTION. [2.] PREJUDICIAL ERROR OCCURS WHEN THE ACCUSED IS TRIED WITH TWO CO-DEFENDANTS, AND TESTIMONY SHOWS ANTAGONISTIC DEFENSES BETWEEN THE ACCUSED AND THE OTHER TWO CO- DEFENDANTS, MANDATING SEVERANCE, CONSISTENT WITH THE FIFTH, SIXTH AND FOURTEENTH AMENDMENTS TO THE CONSTITUTION. [3.] WHEN THE ACCUSED WAIVES A TRIAL BY JURY, BUT DOES SO WITH TWO OTHER CO-DEFENDANTS, THE CASE MUST BE REMANDED TO DETERMINE WHETHER THE WAIVER WAS INVOLUNTARY AND OCCURRED AS A RESULT OF AN AGREEMENT WITH THE OTHER CO- DEFENDANTS, CONTRA THE SIXTH AND FOURTEENTH AMENDMENTS TO THE CONSTITUTION. [4.] WHEN THERE IS NO INDICATION DURING THE PRE-TRIAL STAGES OF THE STATUS OF PLEA NEGOTIATIONS, UNDER THE UNITED STATES SUPREME COURT CASE OF LAFLER V. COOPER, THE CASE MUST BE REMANDED TO THE TRIAL COURT FOR A HEARING TO DETERMINE WHETHER THE ACCUSED WAS PROPERLY ADVISED BY HIS ATTORNEY CONSISTENT WITH THE SIXTH AND FOURTEENTH AMENDMENTS TO THE CONSTITUTION. [5.] WHEN TRIAL COUNSEL COMMITS CONSTITU- TIONAL VIOLATIONS REPRESENTING THE ACCUSED DURING THE PRE-TRIAL AND TRIAL STAGES, THE CASE MUST BE REVERSED AND REMANDED FOR A NEW TRIAL BECAUSE OF INEFFECTIVE ASSISTANCE OF COUNSEL, CONTRA THE SIXTH AND FOURTEENTH AMENDMENTS TO THE CONSTITUTION. {¶ 14} Finally, Kenneth Bryant assigns the following errors: [1.] APPELLANT KENNETH BRYANT WAS DEPRIVED OF DUE PROCESS WHEN THE STATE AMENDED THE INDICTMENT. Nos. 13AP-469, 13AP-521 and 13AP-595 6 [2.] APPELLANT KENNETH BRYANT WAS DEPRIVED OF THE EFFECTIVE ASSISTANCE OF COUNSEL WHEN HIS ATTORNEYS FAILED TO MOVE FOR JUDGMENT OF ACQUITTAL AFTER THE STATE'S OPENING STATEMENT. [3.] APPELLANT KENNETH BRYANT'S CONVICTION DEPRIVED HIM OF DUE PROCESS BECAUSE IT WAS BASED ON INSUFFICIENT EVIDENCE OR WAS AGAINST THE MANIFEST WEIGHT OF THE EVIDENCE. [4.] WHEN THERE IS NO INDICATION OF THE STATUS OF PLEA NEGOTIATIONS, UNDER LAFLER V. COOPER, APPELLANT KENNETH BRYANT'S CASE MUST BE REMANDED FOR A HEARING TO DETERMINE WHETHER HE WAS PROPERLY ADVISED OF THE PLEA OFFER. {¶ 15} We will address the assignments of error out of order and, where appropriate, together. A. Kyle's Individual Assignments of Error 1. Severance {¶ 16} Kyle argues in his second assignment of error that the trial court erred by not severing his trial from his co-defendants. We disagree. {¶ 17} Before addressing the merits of Kyle's claim, we note that he never asked the trial court to sever his trial from his co-defendants. That failure forfeits error on appeal absent plain error. State v. Lott, 51 Ohio St.3d 160, 164 (1990). Under Crim.R. 52(B), plain errors affecting substantial rights may be noticed by an appellate court even though they were not brought to the attention of the trial court. To constitute plain error, there must be: (1) an error, i.e., a deviation from a legal rule, (2) that is plain or obvious, and (3) that affected substantial rights, i.e., affected the outcome of the trial. State v. Barnes, 94 Ohio St.3d 21, 27 (2002). Even if an error satisfies these prongs, appellate courts are not required to correct the error. Appellate courts retain discretion to correct plain errors. Id.; State v. Litreal, 170 Ohio App.3d 670, 2006-Ohio-5416, ¶ 12 (10th Dist.). Courts are to notice plain error under Crim.R. 52(B) " 'with the utmost caution, under exceptional circumstances and only to prevent a manifest miscarriage of justice.' " Barnes, quoting State v. Long, 53 Ohio St.2d 91 (1978), paragraph three of syllabus. Nos. 13AP-469, 13AP-521 and 13AP-595 7 {¶ 18} Crim.R. 8(D) provides that co-defendants may be tried together for a non- capital offense as long as they are alleged to have participated in the same act or transaction or in the same course of criminal conduct. State v. Walters, 10th Dist. No. 06AP-693, 2007-Ohio-5554, ¶ 21. As a general rule, the law favors joinder of trials because, among other reasons, it conserves judicial resources and reduces the possibility of incongruous results before different juries. Id.; State v. Miller, 10th Dist. No. 11AP- 899, 2013-Ohio-1242, ¶ 50. Nevertheless, a defendant may move for severance from a co- defendant's trial pursuant to Crim.R. 14 upon a showing of prejudice. Lott at 163. The defendant has the burden to affirmatively demonstrate prejudice. State v. Payne, 10th Dist. No. 02AP-723, 2003-Ohio-4891, ¶ 23. {¶ 19} Appellants' indictment alleged that they participated in the same act. Therefore, under Crim.R. (8), it was appropriate for them to be tried together. Kyle argues, however, that his trial should have been severed because of the antagonistic defenses which arose between himself and his co-defendants. Antagonistic defenses can prejudice co-defendants to warrant severance. Walters at ¶ 23-24. Defenses are mutually antagonistic where each defendant attempts to exculpate himself and inculpate his co- defendants. Walters. To merit severance, the defenses must be antagonistic to the point of being irreconcilable and mutually exclusive. Miller at ¶ 52, citing Walters. {¶ 20} We reject Kyle's claim that his defense was mutually antagonistic with that of the Bryants' defenses. Kyle's defense at trial was that he did not kick or hit Vic Sr. Alternatively, William's defense at trial was that he acted in defense of his son and Kenneth argued that the state failed to meet its burden of proof to prove that he assaulted Vic Sr. These defenses did not attempt to exculpate one person while inculpating another. In fact, neither William nor Kenneth testified that Kyle ever hit Vic Sr. or otherwise placed blame on Kyle. Simply put, there is nothing antagonistic about the defenses these appellants presented at trial. Accordingly, the trial court did not err, let alone commit plain error, by not severing Kyle's trial from that of his co-defendants. We overrule Kyle's second assignment of error. Nos. 13AP-469, 13AP-521 and 13AP-595 8 2. Jury Waiver {¶ 21} Kyle argues in his third assignment of error that we should remand this case for the trial court to determine whether he knowingly and voluntarily waived his right to a jury trial. We disagree. {¶ 22} At the start of his trial, Kyle signed a document in which he "voluntarily waive[d] and relinquish[ed] my right to a trial by jury and elect[ed] to be tried by a judge." Upon receiving the document, the trial court asked Kyle whether he could read and write English, whether his trial counsel explained the document to him and if he understood the document, and whether he understood the right to a jury trial that he sought to waive. Lastly, the trial court asked him if this was his "free and voluntary act." (Tr. 4-6.) Kyle replied affirmatively to each question and the trial court accepted his waiver and had it filed in the record. {¶ 23} The Sixth Amendment to the United States Constitution, made applicable to the states through the Fourteenth Amendment, guarantees an accused the right to trial by jury. State v. Lomax, 114 Ohio St.3d 350, 2007-Ohio-4277, ¶ 6, citing Duncan v. Louisiana, 391 U.S. 145 (1968). Likewise, Ohio Constitution, Article I, Section 5, states that the "right of trial by jury shall be inviolate." However, Crim.R. 23(A) allows a defendant to waive his right to a trial by jury in serious offense cases provided that the waiver is made knowingly, intelligently, and voluntarily, and in writing. Additionally, pursuant to R.C. 2945.05, for a waiver of jury trial to be valid, it must be in writing, signed by the defendant, filed, made part of the record, and made in open court. Lomax at ¶ 9; State v. Sanders, 188 Ohio App.3d 452, 2010-Ohio-3433, ¶ 11 (10th Dist.). A written waiver is presumptively voluntary, knowing, and intelligent. Lomax at ¶ 10. {¶ 24} Kyle concedes that the trial court complied with Crim.R. 23(A) and R.C. 2945.05. Further, he does not argue that his waiver was not voluntary. Instead, he argues that in light of the antagonistic defenses that developed between him and his co- defendants, this court should remand the matter for the trial court to further question him about the voluntary and intelligent nature of his waiver. We disagree. Kyle has not alleged or demonstrated any error below and, in fact, concedes that the trial court satisfied its obligations before accepting his waiver. Accordingly, we overrule Kyle's third assignment of error. Nos. 13AP-469, 13AP-521 and 13AP-595 9 3. Motion for New Trial {¶ 25} Kyle also seeks this court to stay these proceedings and to remand his case for the trial court to rule on a pending motion for new trial. We already denied Kyle's first request for the same relief and he presents nothing new to justify a different decision. State v. Klinkner, 10th Dist. No. 13AP-469, Sept. 24, 2013 (journal entry). Therefore, we deny this relief. 4. Conclusion {¶ 26} We overrule Kyle's first, second, and third assignments of error. B. Kenneth's Individual Assignment of Error 1. The State's "amendment" of his Indictment {¶ 27} The grand jury indicted Kenneth with a single count of felonious assault in violation of R.C. 2903.11(A). Kenneth argues in his first assignment of error that the state "constructively amended" that indictment during his trial. Specifically, Kenneth points out that he was originally charged as a principal offender but then identified as an aider and abettor during trial. We reject this argument. {¶ 28} The state did not need to amend the indictment to proceed under an aiding and abetting theory against Kenneth. Pursuant to R.C. 2923.03(F), "[a] charge of complicity may be stated in terms of this section, or in terms of the principal offense." Thus, a defendant charged with an offense may be convicted of that offense upon proof that he was complicit in its commission, even though the indictment is "stated * * * in terms of the principal offense" and does not mention complicity. State v. Herring, 94 Ohio St.3d 246, 251 (2002). R.C. 2923.03(F) adequately notifies defendants that the jury may be instructed on complicity, even when the charge is drawn in terms of the principal offense. See State v. Keenan, 81 Ohio St.3d 133, 151 (1998). {¶ 29} Kenneth's reliance on State v. Killings, 1st Dist. No. C-970167 (May 29, 1998), in support of this assignment of error is misplaced, as it is factually distinguishable from the present matter. In that case, the defendant was charged as a principal offender for one count of rape. However, the trial court instructed the jury on complicity for a separate rape (of the same victim) committed by another individual for which Killings was not charged with nor provided an opportunity to defend. The jury found Killings guilty of one count of rape, but the appellate court concluded that because of the complicity Nos. 13AP-469, 13AP-521 and 13AP-595 10 instruction, they could not determine what act the jury actually found him guilty of: rape, or that of aiding and abetting a separate rape. Thus, the court concluded that the complicity instruction was error. {¶ 30} Here, there are no uncharged acts that Kenneth faced at trial such as in Killings. All three appellants faced the same charges that arose from the same conduct. Accordingly, Kenneth's reliance on Killings is unpersuasive. {¶ 31} The state did not amend Kenneth's indictment. The indictment charged him with a count of felonious assault and, pursuant to R.C. 2923.03(F), that indictment put Kenneth on notice that he also could be found complicit in the commission of that offense. Accordingly, we overrule Kenneth's first assignment of error. C. The Sufficiency and Manifest Weight of the Evidence {¶ 32} Kenneth's third assignment of error and William's second and third assignments of error each contend that their convictions were not supported by sufficient evidence and were against the manifest weight of the evidence. We disagree. {¶ 33} Sufficiency of the evidence is a legal standard that tests whether the evidence introduced at trial is legally adequate to support a verdict. State v. Thompkins, 78 Ohio St.3d 380, 386 (1997). Whether the evidence is legally sufficient to support a verdict is a question of law. Id. {¶ 34} In determining whether the evidence is legally sufficient to support a conviction, " '[t]he relevant inquiry is whether, after viewing the evidence in a light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime proven beyond a reasonable doubt.' " State v. Robinson, 124 Ohio St.3d 76, 2009-Ohio-5937, ¶ 34, quoting State v. Jenks, 61 Ohio St.3d 259 (1991), paragraph two of the syllabus. A verdict will not be disturbed unless, after viewing the evidence in the light most favorable to the prosecution, it is apparent that reasonable minds could not reach the conclusion reached by the trier of fact. State v. Treesh, 90 Ohio St.3d 460, 484 (2001). {¶ 35} In this inquiry, appellate courts do not assess whether the state's evidence is to be believed, but whether, if believed, the evidence admitted at trial supports the conviction. State v. Yarbrough, 95 Ohio St.3d 227, 2002-Ohio-2126, ¶ 79-80 (evaluation of witness credibility not proper on review for sufficiency of evidence); State v. Bankston, Nos. 13AP-469, 13AP-521 and 13AP-595 11 10th Dist. No. 08AP-668, 2009-Ohio-754, ¶ 4 (noting that "in a sufficiency of the evidence review, an appellate court does not engage in a determination of witness credibility; rather, it essentially assumes the state's witnesses testified truthfully and determines if that testimony satisfies each element of the crime."). {¶ 36} The weight of the evidence concerns the inclination of the greater amount of credible evidence offered to support one side of the issue rather than the other. Thompkins at 387. (Although there may be sufficient evidence to support a judgment, a court may nevertheless conclude that a judgment is against the manifest weight of the evidence. Id.) {¶ 37} When presented with a challenge to the manifest weight of the evidence, an appellate court may not merely substitute its view for that of the trier of fact, but must review the entire record, weigh the evidence and all reasonable inferences, consider the credibility of witnesses and determine whether in resolving conflicts in the evidence, the trier of fact clearly lost its way and created such a manifest miscarriage of justice that the conviction must be reversed and a new trial ordered. Id. at 387. An appellate court should reserve reversal of a conviction as being against the manifest weight of the evidence for only the most " 'exceptional case in which the evidence weighs heavily against the conviction.' " Id., quoting State v. Martin, 20 Ohio App.3d 172, 175 (1st Dist.1983); State v. Strider-Williams, 10th Dist. No. 10AP-334, 2010-Ohio-6179, ¶ 12. {¶ 38} In addressing a manifest weight of the evidence argument, we are able to consider the credibility of the witnesses. State v. Cattledge, 10th Dist. No. 10AP-105, 2010-Ohio-4953, ¶ 6. However, in conducting our review, we are guided by the presumption that the jury, or the trial court in a bench trial, " 'is best able to view the witnesses and observe their demeanor, gestures and voice inflections, and use these observations in weighing the credibility of the proffered testimony.' " Id., quoting Seasons Coal Co., Inc. v. Cleveland, 10 Ohio St.3d 77, 80 (1984). Accordingly, we afford great deference to the trier of fact's determination of witness credibility. State v. Redman, 10th Dist. No. 10AP-654, 2011-Ohio-1894, ¶ 26, citing State v. Jennings, 10th Dist. No. 09AP- 70, 2009-Ohio-6840, ¶ 55. See also State v. DeHass, 10 Ohio St.2d 230 (1967), paragraph one of the syllabus (credibility determinations are primarily for the trier of fact). Nos. 13AP-469, 13AP-521 and 13AP-595 12 1. The Elements of the Convictions {¶ 39} In order to find appellants guilty of felonious assault, the state had to prove that they knowingly caused serious physical harm to another. R.C. 2903.11(A). 2. Appellants' Sufficiency Arguments {¶ 40} Kenneth argues that the evidence was insufficient to prove that he was complicit or aided and abetted the others in the attack on Victor Sr. We disagree. {¶ 41} It is not clear whether the trial court found Kenneth guilty as a principal offender or as an aider and abetter. Even if the trial court found him guilty of aiding and abetting, rather than as a principal offender, that conviction would be supported by sufficient evidence. {¶ 42} R.C. 2923.03(A)(2) prohibits someone from aiding or abetting another in committing an offense. To support a conviction for complicity by aiding and abetting pursuant to R.C. 2923.03(A)(2), the evidence must show that the defendant supported, assisted, encouraged, cooperated with, advised, or incited the principal in the commission of the crime, and that the defendant shared the criminal intent of the principal. State v. Johnson, 93 Ohio St.3d 240 (2001), syllabus. Such criminal intent can be inferred from the presence, companionship, and conduct of the defendant before and after the offense is committed. Id. at 245. It may also be inferred from the circumstances surrounding the crime. Columbus v. Bishop, 10th Dist. No. 08AP-300, 2008-Ohio-6964, ¶ 41. {¶ 43} Here, testimony from Vic Sr. and the other employee who saw the entire fight indicated that Kenneth punched Vic Sr. twice, pulled him to the ground, held him down, and pinned his arms, allowing William and Kyle to hit Vic Sr. when Vic. Sr. could not defend himself. Bishop at ¶ 45 (act of holding down was sufficient, by itself, to convict as an aider and abetter). Viewing this evidence in the most favorable light to the state, as we must, the evidence is sufficient evidence for a reasonable trier of fact to conclude that Kenneth, at a minimum, assisted, supported, or cooperated in the assault of Vic Sr. {¶ 44} William argues that the evidence was insufficient to prove that he knowingly caused Vic Sr. serious physical harm. We disagree. {¶ 45} R.C. 2901.22(B) provides that "[a] person acts knowingly, regardless of his purpose, when he is aware that his conduct will probably cause a certain result or will probably be of a certain nature. A person has knowledge of circumstances when he is Nos. 13AP-469, 13AP-521 and 13AP-595 13 aware that such circumstances probably exist." State v. Ranson, 10th Dist. No. 01AP- 1049, 2002-Ohio-2398, ¶ 17. " 'Knowingly' does not require the offender to have the specific intent to cause a certain result. That is the definition of 'purposely.' Instead, whether a person acts knowingly can only be determined, absent a defendant's admission, from all the surrounding facts and circumstances, including the doing of the act itself." (Footnote omitted.) State v. Huff, 145 Ohio App.3d 555, 563 (1st Dist.2001). " 'The test for whether a defendant acted knowingly is a subjective one, but it is decided on objective criteria. * * * However, if a given result is probable, a person will be held to have acted knowingly to achieve it because one is charged by the law with knowledge of the reasonable and probable consequences of his own acts.' " State v. Thomas, 10th Dist. No. 02AP-778, 2003-Ohio-2199, ¶ 75, quoting State v. McDaniel, 2d Dist. No. 16221 (May 1, 1998). {¶ 46} William admitted that he kicked Vic Sr. and hit him with his hand at least twice. While he claims that he did so in defense of his son, such a defense presumes an intentional and purposeful use of force. See State v. Hubbard, 10th Dist. No. 11AP-945, 2013-Ohio-2735, ¶ 54. William's testimony alone is sufficient for a reasonable fact finder to conclude that William acted knowingly. 3. Appellants' Manifest Weight of the Evidence Arguments {¶ 47} In arguing that their convictions were against the manifest weight of the evidence, Kenneth claims that Vic Sr.'s testimony was not credible. He notes several purported inconsistencies in Vic Sr.'s testimony. {¶ 48} A defendant is not entitled to a reversal on manifest weight grounds merely because inconsistent evidence was offered at trial. State v. Campbell, 10th Dist. No. 07AP- 1001, 2008-Ohio-4831, ¶ 23. The trier of fact is in the best position to take into account the inconsistencies in the evidence, as well as the demeanor and manner of the witnesses, and to determine which witnesses are more credible. State v. DeJoy, 10th Dist. No. 10AP- 919, 2011-Ohio-2745, ¶ 27. While appellant points to certain portions of Vic Sr.'s testimony that were inconsistent with his prior descriptions of the events, these inconsistencies do not render the conviction against the manifest weight of the evidence. The judge was aware of these inconsistencies and chose to believe Vic Sr.'s testimony describing the fight. This is within the province of the trier of fact. State v. Conkel, 10th Nos. 13AP-469, 13AP-521 and 13AP-595 14 Dist. No. 08AP-845, 2009-Ohio-2852, ¶ 17-18; State v. Thompson, 10th Dist. No. 08AP- 22, 2008-Ohio-4551, ¶ 20-21. Additionally, we note that another employee who saw the fight provided testimony that was largely consistent with Vic Sr.'s testimony. {¶ 49} Next, William argues that his conviction is against the manifest weight of the evidence because he established that he acted in defense of his son. We disagree. {¶ 50} Defense of family, being a variation of self-defense, is an affirmative defense that the defendant has the burden of proving by a preponderance of the evidence. R.C. 2901.05(A); State v. Seals, 2d Dist. No. 04CA0063, 2005-Ohio-4837, ¶ 34, citing State v. Martin, 21 Ohio St.3d 91 (1986). Ohio has long recognized a privilege to defend the members of one's family. Sharp v. State, 19 Ohio 379 (1850). If a person in good faith and upon reasonable grounds believes that his wife and family are in imminent danger of death or serious bodily harm, that person is entitled to use such reasonably necessary force, even to the taking of life, to defend his wife and family as he would be entitled to use in defense of himself. State v. Williford, 49 Ohio St.3d 247 (1990). However, a person who intervenes to help another stands in the shoes of the person whom he is aiding. If that person is at fault, and therefore not entitled to use force in self-defense, the intervenor is not justified in using force in that person's defense. See State v. Wenger, 58 Ohio St.2d 336, 338-39 (1979). {¶ 51} The state's version of events refutes Williams' claim that he acted in defense of his son. The state's witnesses described a scene where Kenneth began the confrontation by punching Vic Sr. twice in the chest. Moreover, Kenneth was holding Vic Sr. down with his arms pinned against him while William and Kyle assaulted him. A conviction is not against the manifest weight of the evidence because the trier of fact believed the state's version of events over the appellant's version. State v. Webb, 10th Dist. No. 10AP-189, 2010-Ohio-5208, ¶ 16; Strider-Williams at ¶ 13. The judge, as the trier of fact, was free to disbelieve William's version of events and believe the state's version of events. That decision was within the province of the trial judge. State v. Williams, 10th Dist. No. 08AP-719, 2009-Ohio-3237, ¶ 18-19 (jury's decision to reject claim of self-defense and believe prosecution's version of events not against manifest weight of the evidence); Webb at ¶ 17. Given the conflicting testimony regarding how this fight started and what occurred during the fight, this is not the exceptional case in which Nos. 13AP-469, 13AP-521 and 13AP-595 15 the evidence weighs heavily against the conviction. Seals at ¶ 47-48 (trial court did not lose its way in rejecting claim of self-defense). {¶ 52} Given the conflicting testimony presented, we cannot say that the trial court clearly lost its way and created a manifest miscarriage of justice. The judge simply believed the version of events presented by the state's witnesses and disbelieved appellants' version of events. This was within the province of the judge as the trier of fact. Accordingly, appellants' convictions are not against the manifest weight of the evidence. {¶ 53} Appellants' convictions for felonious assault are supported by sufficient evidence and are not against the manifest weight of the evidence. Accordingly, we overrule Kenneth's third assignment of error and William's second and third assignments of error. D. Ineffective Assistance of Counsel {¶ 54} Each appellant raises certain claims of ineffective assistance of counsel. To establish a claim of ineffective assistance of counsel, appellant must show that counsel's performance was deficient and that counsel's deficient performance prejudiced him. State v. Jackson, 107 Ohio St.3d 53, 2005-Ohio-5981, ¶ 133, citing Strickland v. Washington, 466 U.S. 668, 687 (1984). The failure to make either showing defeats a claim of ineffective assistance of counsel. State v. Bradley, 42 Ohio St.3d 136, 143 (1989), quoting Strickland at 697. ("[T]here is no reason for a court deciding an ineffective assistance claim to approach the inquiry in the same order or even to address both components of the inquiry if the defendant makes an insufficient showing on one."). {¶ 55} In order to show counsel's performance was deficient, the appellant must prove that counsel's performance fell below an objective standard of reasonable representation. Jackson at ¶ 133. The appellant must overcome the strong presumption that defense counsel's conduct falls within a wide range of reasonable professional assistance. Strickland at 689. To show prejudice, the appellant must establish that there is a reasonable probability that, but for counsel's unprofessional errors, the result of the proceeding would have been different. State v. Hale, 119 Ohio St.3d 118, 2008-Ohio- 3426, ¶ 204. Nos. 13AP-469, 13AP-521 and 13AP-595 16 1. Plea Negotiations and Lafler v. Cooper {¶ 56} In William's first assignment of error and in Kyle and Kenneth's fourth assignments of error, all three appellants attempt to raise ineffective assistance of counsel claims under Lafler v. Cooper, __ U.S. __, 132 S.Ct. 1376 (2012). In that case, and the related case of Missouri v. Frye, __ U.S. __, 132 S.Ct. 1399 (2012), the United States Supreme Court held that the Sixth Amendment's right to effective assistance of counsel extends to the plea bargaining process. Lafler at 1384. {¶ 57} In their assignments of error, however, appellants do not allege that their trial counsel acted deficiently in the plea bargaining process. Instead, they seek a remand of this matter for the trial court to hold a hearing to determine whether the state offered a plea bargain that trial counsel did not communicate to them. Because appellants fail to allege, let alone demonstrate, error, we have no reason to remand the matter. 2. Appellants' Claims of Ineffective Assistance of Counsel {¶ 58} Kenneth and Kyle, in their second and fifth assignments of error, respectively, assert other claims of ineffective assistance of counsel. {¶ 59} Kenneth specifically argues that his trial counsel was ineffective for not moving for a judgment of acquittal after the state's opening argument. Kenneth is mistaken. Trial counsel did move for a judgment of acquittal after the state's opening argument, which the trial court denied. (Tr. 27.) {¶ 60} Kyle asserts a number of instances of alleged ineffective conduct by his counsel. First, he argues that trial counsel deficiently failed to file a motion to sever his trial from his co-defendants. We have already concluded that appellants did not have antagonistic defenses. Therefore, a motion to sever would have been meritless. Therefore, trial counsel was not ineffective for failing to file a motion to sever. State v. Kelley, 179 Ohio App.3d 666, 2008-Ohio-6598, ¶ 76 (7th Dist.); State v. Simms, 10th Dist. No. 10AP-1063, 2012-Ohio-2321, ¶ 49. {¶ 61} Second, Kyle appears to argue that counsel was ineffective for allowing him to waive his right to a jury trial. The record demonstrates, as noted above, that Kyle's choice to waive his right to a jury trial was voluntary and that the trial court fulfilled its obligation to ensure that his choice was voluntary. This defeats any claim of alleged Nos. 13AP-469, 13AP-521 and 13AP-595 17 ineffective assistance of counsel with respect to the jury waiver. State v. Webb, 10th Dist. No. 10AP-289, 2010-Ohio-6122, ¶ 70-72. {¶ 62} Third, Kyle argues that trial counsel acted deficiently by not interviewing a witness and not securing his presence at trial. Even assuming this was deficient conduct, Kyle cannot demonstrate that he was prejudiced. He speculates without any evidentiary support that this witness's testimony would have been important. It is pure speculation to conclude that the result of his trial would have been different had the additional witness testified. Williams at ¶ 35, citing State v. Thorne, 5th Dist. No. 2003CA00388, 2004- Ohio-7055, ¶ 70 (failure to show prejudice without affidavit describing testimony of witnesses not called); State v. Stalnaker, 5th Dist. No. 21731, 2004-Ohio-1236, ¶ 9. This type of vague speculation is insufficient to establish ineffective assistance of counsel. State v. Wiley, 10th Dist. No. 03AP-340, 2004-Ohio-1008, ¶ 30. {¶ 63} Lastly, Kyle argues that trial counsel deficiently questioned Vic. Sr. during his cross-examination by not asking him about allegedly inconsistent statements he made in a pre-trial deposition. We disagree. The scope of cross-examination clearly falls within the ambit of trial strategy, and debatable trial tactics do not establish ineffective assistance of counsel. State v. Hoffner, 102 Ohio St.3d 358, 2004-Ohio-3430, ¶ 45, citing State v. Campbell, 90 Ohio St.3d 320, 339 (2000). {¶ 64} Each of the appellants has failed to demonstrate ineffective assistance of counsel. Accordingly, we overrule William's first assignment of error, Kyle's fourth and fifth assignments of error, and Kenneth's second and fourth assignments of error. III. Conclusion {¶ 65} Having overruled all of the assignments of error presented by these appellants, we affirm the judgments of the Franklin County Court of Common Pleas in each of these cases. Judgments affirmed. CONNOR and T. BRYANT, JJ., concur. T. BRYANT, J., retired, of the Third Appellate District, assigned to active duty under authority of Ohio Constitution, Article IV, Section 6(C).
{ "pile_set_name": "FreeLaw" }
Øresundsmetro The Øresund Metro is a proposed rapid transit service for the cities of Copenhagen, Denmark and Malmö, Sweden. It would complement the current Øresund heavy rail line, and could be the world's only existing cross-border metro. Background In September 2011, the local governments in Copenhagen and the neighbouring Malmö in Sweden announced that they were seeking European Union funding to study a potential metro line under the Øresund to the neighbourhood of Malmö Central Station, providing faster trips and additional capacity beyond that of the existing Øresund Bridge. The study, for which the EU granted funding in the following December, will consider both a simple shuttle between the two stations and a continuous line integrated with the local transport networks on each side, and they anticipate a travel time of 15 minutes between the two city centers. Work on the study is expected to continue until 2020. In May 2018 the Oresundsmetro Executive was announced, formed of representatives from the two cities, industry and researchers, to explore the proposal to link Copenhagen and Malmö via a driverless metro system, with travel time of around 20 minutes compared to 35 minutes by train. Capacity constraints are expected on the Oresund Line rail services once the Fehmarn Belt Fixed Link is completed, and the €4 billion metro proposal would ease this bottleneck. Proposal The line is planned to have capacity for 36 trains per hour in each direction, a maximum speed of and be connected to the existing Copenhagen Metro system. See also Øresundståg Johor Bahru–Singapore Rapid Transit System - a similar proposed cross-border metro line between Singapore and Malaysia Berlin U-Bahn References External links Official website Category:Rapid transit in Denmark Category:Rapid transit in Sweden Category:Railway lines in Denmark Category:Railway lines in Sweden Category:International railway lines Category:Transport in Copenhagen Category:Transport in Malmö Category:Proposed rapid transit
{ "pile_set_name": "Wikipedia (en)" }
Orange Seal 9 results Orange Seal is the next generation of tyre sealant. Using premium latex and ‘Nanites’, Orange Seal coats the entire tyre from bead-to-bead to ensure complete protection. The unique Nanites enable Orange Seal to quickly and permanently seal punctures and sidewall slices far bigger than other sealants.
{ "pile_set_name": "Pile-CC" }
package logging // The IRC client will log things using these methods type Logger interface { // Debug logging of raw socket comms to/from server. Debug(format string, args ...interface{}) // Informational logging about client behaviour. Info(format string, args ...interface{}) // Warnings of inconsistent or unexpected data, mostly // related to state tracking of IRC nicks/chans. Warn(format string, args ...interface{}) // Errors, mostly to do with network communication. Error(format string, args ...interface{}) } // By default we do no logging. Logging is enabled or disabled // at the package level, since I'm lazy and re-re-reorganising // my code to pass a per-client-struct Logger around to all the // state objects is a pain in the arse. var logger Logger = nullLogger{} // SetLogger sets the internal goirc Logger to l. If l is nil, // a dummy logger that does nothing is installed instead. func SetLogger(l Logger) { if l == nil { logger = nullLogger{} } else { logger = l } } // A nullLogger does nothing while fulfilling Logger. type nullLogger struct{} func (nl nullLogger) Debug(f string, a ...interface{}) {} func (nl nullLogger) Info(f string, a ...interface{}) {} func (nl nullLogger) Warn(f string, a ...interface{}) {} func (nl nullLogger) Error(f string, a ...interface{}) {} // Shim functions so that the package can be used directly func Debug(f string, a ...interface{}) { logger.Debug(f, a...) } func Info(f string, a ...interface{}) { logger.Info(f, a...) } func Warn(f string, a ...interface{}) { logger.Warn(f, a...) } func Error(f string, a ...interface{}) { logger.Error(f, a...) }
{ "pile_set_name": "Github" }
Introduction {#s1} ============ An ecological trap arises when an artificial habitat is introduced into a natural environment, attracts animals to its vicinity and the subsequent association leads to negative ecological consequences for the animal [@pone.0015646-Battin1]. Animals may prefer an artificial habitat over natural habitats if it mimics the set of ecological cues which signify a good quality habitat, despite other ecological processes rendering the habitat of low quality and leading to poorer reproduction or survival. Robertson and Hutto [@pone.0015646-Robertson1] suggest that ecological traps derive from habitat alteration that operates in one of three ways; (1) increasing the attractiveness of an environment by enhancing the set of cues that animals recognise as attractive; (2) decreasing the suitability of a habitat; or (3) doing both (1) and (2) simultaneously. Alternatively, artificial habitats of high quality, where individuals increase in condition, reproduce better or have improved survival, all of which may ultimately lead to positive population growth rates, act as population sources. Objective testing of whether ecological traps exist is well embedded in the literature concerning terrestrial systems [@pone.0015646-Robertson1], yet few studies have investigated whether they exist in marine environments. Artificial structures that aggregate fish (fish aggregation devices; FADs) have been previously suggested to act as ecological traps by acting as a super-stimulus and misleading fish to make inappropriate habitat selections [@pone.0015646-Hallier1]. Coastal sea-cage fish farms are widespread artificial structures in coastal waters, producing over 2.5 million tons of fish each year [@pone.0015646-FAO1]. They have previously been described as analogous to FADs, attracting and aggregating large assemblages of wild fish in their immediate vicinity [@pone.0015646-Dempster1]. Attraction and aggregation of tons of wild fish to the immediate surrounds of Norway\'s coastal salmon farms [@pone.0015646-Dempster1], [@pone.0015646-Dempster2] meets Robertson and Hutto\'s [@pone.0015646-Robertson1] first condition for the formation of an ecological trap. However, whether the fish farm area is poorer in habitat quality for wild fish than natural adjacent habitats, thus meeting Robertson and Hutto\'s [@pone.0015646-Robertson1] second condition, remains unknown. Relative habitat quality is a key component in determining the extent to which fish farms may act as population sources or ecological traps for wild fish. Along the Norwegian coastline, 1198 coastal sea-cage salmonid farm concessions used 1.2 million tons of fish food to produce 829 000 t in 2008 [@pone.0015646-Norwegian1]. Farming is concentrated in particular fjords, with farms spaced several kilometres apart. Wild saithe are the most abundant species associated with salmon farms within fjord systems [@pone.0015646-Dempster2], [@pone.0015646-Dempster3]. Saithe use farms as a loose network of preferred habitats, moving repeatedly among farms and remaining resident at specific farms for weeks to months [@pone.0015646-Uglem1]. Atlantic cod are also attracted to fish farms in number [@pone.0015646-Dempster2] and may reside in their vicinity for months at a time [@pone.0015646-Uglem2], [@pone.0015646-Uglem3]. Attraction of wild fish to salmon farms is likely to have a range of fitness consequences due to the modified environment fish farms induce, both in the altered trophic network around farms and the close proximity of hundreds of thousands to millions of farmed salmonids. Diet, body fat content, fatty acid composition and parasite loads may all be altered when wild fish closely associate with farms [@pone.0015646-Diamant1], [@pone.0015646-FernandezJover1], [@pone.0015646-FernandezJover2]. Simultaneous analysis of this suite of factors at an extensive number of locations is required to resolve whether farms function as population sources or ecological traps [@pone.0015646-Chalfoun1]. Here, we tested the hypotheses that the diets, indices of condition and parasite loads of cod and saithe associated with salmon farms differed from those of fish present at locations distant from salmon farms. To ensure broad generality of the results, we sampled fish in three intensive fish farming areas along the latitudinal extent of salmon farming in Norway (59°N to 70°N). Materials and Methods {#s2} ===================== Study locations and experimental design {#s2a} --------------------------------------- Saithe and cod were sampled from the three salmon farming areas (Ryfylke 59°N, Hitra 63°N and Øksfjord 70°N) from the same Atlantic salmon (*Salmo salar*) farms and during the same season (summer) as aggregation sizes were determined [@pone.0015646-Dempster2]. Within each salmon farming area, fish were sampled at three farms and two to six non-farm control locations ([Fig. 1](#pone-0015646-g001){ref-type="fig"}). Farm-associated fish were captured within 5 m of cages containing salmon. The number of non-farm locations varied from two to six depending on the area and species of wild fish sampled (Saithe: Ryfylke 2, Hitra 4, Øksfjord 3; Cod: Ryfylke 3, Hitra 6, Øksfjord 3). Control fish were sampled from locations 4 to 20 km distant from the nearest farm ([Fig. 1](#pone-0015646-g001){ref-type="fig"}) to limit the possibility of sampling fish at non-farm locations that had interacted recently with a farm. The 4 km minimum limit was based on telemetry-derived observations of the predominant movements of wild cod and wild saithe [@pone.0015646-Uglem1], [@pone.0015646-Uglem2], [@pone.0015646-Uglem3] in the vicinity of fish farms. ![Map of the study locations in the three Norwegian salmon farming areas of Ryfylke, Hitra and Øksfjord.\ (F) = salmon farm sampling location for both saithe *Pollachius virens* and Atlantic cod *Gadus morhua*; (S) = non-farm sampling location for saithe; (C) = non-farm sampling location for Atlantic cod. The picture shows an un-associated (left) and farm-associated (right) saithe of similar length but distinctly different morphology sampled from Hitra.](pone.0015646.g001){#pone-0015646-g001} All fish were sampled with standardised hook and line fishing gear. Collections by hook and line select for feeding fish, but are more suitable for accurate counts of the number of external parasites than other catch methods such as trawling or gill nets which may remove external parasites through abrasion. Moreover, capture by any other method beside the cages at fish farms is impractical due to possible negative interactions of fishing gear with fish farming structures. Collections were made at each location from June to September 2007 during the period where feed input to salmon farms is high [@pone.0015646-Norwegian1]. Size, diet and condition indices {#s2b} -------------------------------- Upon capture, fish were immediately examined for the presence of external parasites (see parasite sampling section below) and then placed on ice. Fish were weighed and measured to the nearest 0.5 cm (fork length; FL). Each fish was dissected and liver and gonad weights were obtained. Sex for each fish was determined by macroscopic examination of the gonads. In gadoid species, such as Atlantic cod, lipids are stored primarily in the liver [@pone.0015646-Lambert1] making liver weight a measure of spawner quality [@pone.0015646-Marshall1]. Therefore, we calculated three condition indices: body condition, the hepatosomatic index and the gonadosomatic index. Fulton\'s condition index (FCI) was calculated with the formula: FCI = (W/FL^3^)×100, where W = wet weight--stomach content weight and FL = fork length (cm). The hepatosomatic index (HSI) was calculated using the formula: HSI = (LW/W)×100, where LW = liver weight and W = wet weight--stomach content weight. The gonadosomatic index (GSI) was calculated using the formula: GSI = (GW/W)×100, where GW = gonad weight and W = wet weight--stomach content weight. Stomach contents from the foregut were examined and prey species were identified to the lowest taxonomic level possible and weighed. Prey categories were later reduced to 11 for saithe (waste salmon feed, Brachyura, Osteichthyes, Polychaeta, Caridea, zooplankton, Phaeophyceae, Bivalvia (principally *Mytilus* sp.), Ophiuridae, Hydroida (principally *Ectopleura larynx*), and other organic matter) and 13 for cod (waste salmon feed, Brachyura, Osteichthyes, Polychaeta, Caridea, Phaeophyceae, Bivalvia (*Mytilus* sp.), Holothuria, Ophiuridae, Echinoidea, Octopoda, Amphipoda and other organic matter). Parasite sampling {#s2c} ----------------- Fish were examined to estimate the incidence of parasites that may have occurred in increased incidence around fish farms through direct transfer from the farmed salmonids (e.g. mobile sea lice) or through indirect means, such as the modified farm environment increasing the density of con-specific fish or the pool of intermediate hosts available to these parasites, thus increasing their incidence. Immediately upon capture, saithe and cod were examined for the incidence of mobile sea lice (*Caligus* spp.) and attached parasitic copepods (*Clavella* sp.) on all external surfaces, and inside the mouth and gills. In August, 100 mobile sea lice from un-associated (hereafter UA) and farm-associated (hereafter FA) fish were collected in all salmon farming areas to identify the species composition of mobile sea lice. We hypothesised that FA cod and saithe would have elevated levels of *Caligus* compared to UA fish either through direct transfer of adult *Caligus* from caged salmon or elevated levels of *Caligus* larvae in the waters surrounding farms. Gills of cod were examined for the presence and abundance of *Lernaeocera branchialis*, a copepod parasite of cod which invasively attaches to the gills and feeds on blood [@pone.0015646-Khan1]. For *Clavella* sp. and *L. branchialis*, we hypothesised that no differences in infestation levels would be detected between FA and UA fish, as no direct transfer route between salmon farms and wild fish has been established for these parasites. Livers were dissected from both species of fish and inspected for the third stage (L3) larvae of the parasitic nematode *Anisakis simplex* [@pone.0015646-Klimpel1]. Infection intensity was scored on a semi-quantitative scale form 0 to 3: 0 = *A. simplex* absent; 1 = mild infestation; 2 = moderate infestation; and 3 = heavy infestation. We hypothesised that L3 larvae of *A. simplex* would be less abundant in FA than UA fish as high consumption of lost feed at farms would mean lower consumption of natural prey items such as crustaceans, squid and fish, which may contain L3 larvae. Statistical analyses {#s2d} -------------------- As gonadal development was minimal during the non-spawning season sampling period and diets in the non-spawning season are not known to vary among male and female cod and saithe, we pooled the sexes for dietary analyses and analyses of condition. Further, as differences in the incidence of parasites among male and female gadoids have rarely been found [@pone.0015646-Hemmingsen1], and no differences are known for the parasite species investigated here, we pooled the sexes for parasite analyses. Non-parametric multivariate techniques were used to compare dietary compositions among farm and non-farm locations. All multivariate analyses were performed using the PRIMER statistical package. Prior to calculating the Bray-Curtis similarity matrices, the dietary data were pooled across all individuals sampled within each location and month by summing the total weights of prey items within each prey category to reduce the stress of MDS representation. Fourth root transformations were made to weigh the contributions of common and rare dietary categories in the similarity coefficient. Non-metric multidimensional scaling (nMDS) was used as the ordination method. Variables that had more influence on similarities within groups and dissimilarities among groups of locations or depths, determined by ANOSIM (analysis of similarity), were calculated using the SIMPER (similarity percentages) procedure. The ANOSIM permutation test was used to assess the significance of differences among farm and non-farm locations. As diets of both saithe and cod at farms contained feed pellets, we repeated all analyses with this prey category removed to determine if differences in diet among farm and non-farm locations remained significant. To test for differences in fish size (fork length; FL), stomach content weight, FCI, HSI, GSI and the incidence of the various parasites among farm and non-farm locations in each of the three fish farming areas, we used Generalized Linear Models (GLMs). Prior to the GLMs, heterogeneity of variance was tested with Cochran\'s *C*-test. Data were ln(*x*+1) transformed if variances were significantly different at p = 0.05. Comparisons across fish in all size classes were made in each of the three farming areas for cod. To ensure that any differences detected in comparisons were not related to the different sizes of fish in the FA and UA treatments, we used FL as a co-variate in analyses of stomach content weight, condition and parasite loads. For saithe, as HSIs\>10% are indicative of a waste feed dominated diet for several months and wild saithe fed solely on natural diets do not have HSIs\>10% [@pone.0015646-Gjster1], we tested if the incidence of the various parasites differed among FA fish with HSIs\>10%, FA fish with HSIs\<10%, and UA fish with HSIs\<10%. To detect if the parasite loads we detected were related to the body condition (FCI) of wild fish, we applied multiple regression analysis for both cod and saithe. Results {#s3} ======= Size structures of farm-associated and un-associated fish {#s3a} --------------------------------------------------------- In total, 355 FA and 215 UN saithe were captured at sizes ranging from 21.5--108.5 cm fork length (FL) and weights from 0.1--12.5 kg. 171 FA and 178 UA cod were collected at sizes ranging from 28.5--121.0 cm FL and weights from 0.23--18.0 kg. Saithe were captured at all farms, while cod were only available at 8 of the 9 farms (all except one farm at Hitra). Significant differences were detected in mean fork lengths among UA and FA groups for both species in all three farming areas ([Table 1](#pone-0015646-t001){ref-type="table"}). FA saithe were larger than UA saithe at two of the three farming areas (Hitra and Øksfjord), but significantly smaller at Ryfylke. FA cod were significantly larger than UA cod in Ryfylke and Hitra but not Øksfjord, and the magnitude of the difference varied greatly among the areas. 10.1371/journal.pone.0015646.t001 ###### Mean sizes of samples of saithe (*Pollachius virens*) and Atlantic cod (*Gadus morhua*) used to compare diet, condition and parasite loads across farm-associated (FA) and farm unassociated (UA) locations in each of the three Norwegian salmon farming areas. ![](pone.0015646.t001){#pone-0015646-t001-1} FA/UA Ryfylke Hitra Øksfjord ----------------- ------- --------- ----------------- ---------- ----------------- ----- ----------------- ***P. virens*** FA 97 50.1±0.7**^b^** 148 40.2±1.2**^a^** 110 46.2±0.8**^a^** UA 30 54.2±0.9**^a^** 88 34.3±1.1**^b^** 97 43.4±0.8**^b^** ***G. morhua*** FA 13 63.3±4.5**^a^** 89 52.8±1.6**^a^** 65 62.3±2.5 UA 12 46.7±4.4**^b^** 75 45.7±1.9**^b^** 91 58.5±1.5 Superscripts (^a,b^) indicate a significant difference was detected between the FA and UA groups at p\<0.05. Diets of farm-associated and un-associated fish {#s3b} ----------------------------------------------- Saithe captured from non-farm locations had a higher proportion of empty stomachs (31%) and lower average stomach content weight (8.6 g) compared to FA saithe (16%, 20.2 g). For cod, both FA (18%) and UA fish (19%) had similar proportions of empty stomachs, although stomach content weight was higher in FA (32.9 g) than UA fish (23.2 g). 44.3% of saithe and 20% of cod captured around farms had waste feed in their stomachs. Overall, waste feed accounted for 71% (14.2 g) and 25% (8.3 g) of the diet by weight of FA saithe and cod, respectively. The 2-dimensional nMDS plot based on weights of prey groups by location and month revealed clear separation of the diets of FA and UA fish for both saithe ([Fig. 2a](#pone-0015646-g002){ref-type="fig"}) and cod ([Fig. 2b](#pone-0015646-g002){ref-type="fig"}). ANOSIM indicated that differences in diets between FA and UA fish were significant (saithe: *R* ~global~ = 0.69, p = 0.001; cod: *R* ~global~ = 0.45, p = 0.003). When pellets were removed from the analysis, differences in diets between FA and UA fish remained significant (saithe: *R* ~global~ = 0.52, p = 0.01; cod: *R* ~global~ = 0.38, p = 0.02). ![Non-metric multi-dimensional scaling plots of dietary items of saithe *Pollachius virens* and Atlantic cod *Gadus morhua* sampled from farm and non-farm locations throughout Norway from June to September.\ a: saithe; b: Atlantic cod. Each point is based on mean weights of prey categories for the specific month. Jun = June; Jul = July; Aug = August; Sep = September. R = Ryfylke; H = Hitra; Ø = Øksfjord.](pone.0015646.g002){#pone-0015646-g002} Diets of FA saithe clustered together, regardless of sampling location and month, while diets of UA saithe were more variable ([Fig. 2a](#pone-0015646-g002){ref-type="fig"}). UA saithe diets were characterised by similar weights of relatively few dietary items. Over 70% of group similarity was accounted for by fish (41.5%), zooplankton (16.8%), crustaceans (8.0%) and ophiuroids (4.5%). Over 80% of similarity in FA saithe diets was due to waste feed (45.7%), fish (14.8%), mussels (10.5%) and zooplankton (10.2%). Dissimilarities in diets between UA and FA saithe were due to large differences in the abundance of a few of the major items (waste feed 32.3% F\>C, fish 14.3% C\>F, zooplankton 10.3% F\>C and mussels 9.9% F\>C). Similarities in UA cod diets were predominantly due to similar weights of fish (39.7%), crabs (24.3%), ophiuroids (9.7%) and crustaceans (6.5%) while similarities in FA cod diets were predominantly due to fish (37.6%), polychaetes (19.6%), pellets (14.6%) and crabs (9.6%). FA cod consumed more waste feed, polychaetes and fish (dissimilarities of 18.9%, 12.1% and 7.8%, respectively) while UA cod consumed more Ophiuridae, crabs and mussels (dissimilarities of 11.5%, 9.9% and 7.8%, respectively). Body, liver and gonad condition of farm-associated and un-associated fish {#s3c} ------------------------------------------------------------------------- FA saithe had significantly higher average FCIs (1.06-1-12 times) than UA fish in all three farming areas ([Fig. 1](#pone-0015646-g001){ref-type="fig"}, [Fig. 3a](#pone-0015646-g003){ref-type="fig"}). Average HSIs were significantly higher in saithe (1.4--1.8 times) collected around farms compared to UA fish at Hitra and Øksfjord ([Fig. 3b](#pone-0015646-g003){ref-type="fig"}). No difference was detected for FA and UA fish sampled from Ryfylke. As the June-September sampling period occurred after the main spawning period for saithe and many of the individuals sampled were less than 2 kg in size and thus likely to be immature, no difference was detected in average GSIs among farm and UA fish in any of the three areas ([Fig. 3c](#pone-0015646-g003){ref-type="fig"}). ![Condition indices of farm-associated (FA) and un-associated (UA) saithe *Pollachius virens* and Atlantic cod *Gadus morhua* in each of the three intensive fish farming areas.\ a, b, c: saithe; d, e, f: Atlantic cod. R = Ryfylke; H = Hitra; Ø = Øksfjord. FCI = Fulton\'s condition index; HSI = Hepatosomatic index; GSI = Gonadosomatic index. **\*** indicates a significant difference at p\<0.05 was detected among the groups.](pone.0015646.g003){#pone-0015646-g003} FCIs, HSIs and GSIs of cod were clearly affected by association with salmon farms. FCIs were consistently 1.06--1.11 times greater in FA than UA cod in all three areas ([Fig. 3d](#pone-0015646-g003){ref-type="fig"}). Similarly, average HSIs varied among the three areas, but were consistently 2.0--2.8 times greater in cod collected around farms compared to UA fish ([Fig. 3e](#pone-0015646-g003){ref-type="fig"}). In contrast to saithe, where average GSIs in FA and UA fish were similar, average GSIs in cod were significantly greater (1.7--4.8 times) in FA than UA cod in all three areas, despite the timing of sampling in the post-spawning period ([Fig. 3f](#pone-0015646-g003){ref-type="fig"}). Parasite loads of farm-associated and un-associated fish {#s3d} -------------------------------------------------------- Significant differences in the abundances of parasites were detected in both directions, with FA or UA fish having greater levels of particular parasites in certain fish farming areas. From the collections in August, two species of mobile sea-lice were identified on both saithe and cod in all three areas: *Caligus elongatus* and *C. curtus*. Significantly higher numbers of sea lice occurred on FA saithe with HSIs\>10 or \<10 compared to UA fish with HSIs\<10 at Ryfylke (2.5 to 3.5 times) and Hitra (3.1 to 3.7 times), but not at Øksfjord ([Fig. 4](#pone-0015646-g004){ref-type="fig"}). *Clavella* sp. abundances were significantly higher in FA saithe with HSIs\>10 or \<10 compared to UA fish at Hitra (1.8 to 2.1 times). FA saithe with HSIs\>10 had 2.6 to 3.6 greater abundances of *Clavella* sp. than both FA saithe with HSIs\<10 and UA fish in Øksfjord. No differences in *Clavella* sp. abundance among the three groups were detected at Ryfylke. For the *Anisakis simplex* index, FA saithe had consistently lower values that UA saithe across the three locations. FA saithe with HSIs\>10 had 1.6 to 2.1 times lower *A. simplex* infestations than FA saithe with HSIs\<10 and UA fish. ![Mean abundances (± SE) of common parasites of saithe *Pollachius virens* in fish with a hepatosomatic index (HSI)\<10 taken from non-farm locations (UA), and fish with HSI\<10 and HSI\>10 captured in association with Atlantic salmon farms (FA) in the three intensive fish farming areas.\ HSI = Hepatosomatic index. Superscripts (^a,b,c^) indicate a significant difference was detected among the groups at the p\<0.05 level. Numbers above bars give the number of fish sampled for each comparison.](pone.0015646.g004){#pone-0015646-g004} *Caligus* spp. occurred in abundances 2.4 times higher on FA cod at Øksfjord compared to UA cod, whereas no significant differences between FA and UA cod were detected at Ryfylke and Hitra ([Fig. 5](#pone-0015646-g005){ref-type="fig"}). No significant differences were detected for *Clavella* sp. or *Anisakis simplex* L3 larvae between farm-associated and UA fish in any of the three areas. The gill parasite *Lernaeocera branchialis* occurred in significantly higher abundance (2.8 times) in UA cod than FA cod in Øksfjord, with no difference detected in the other two areas. ![Mean abundances (± SE) of common parasites of farm-associated (FA) and un-associated (UA) Atlantic cod *Gadus morhua* in each of the three intensive salmon farming areas.\ HSI = Hepatosomatic index. Superscripts (^a,b^) indicate a significant difference was detected between the two groups at the p\<0.05 level. Numbers above bars give the number of fish sampled for each comparison.](pone.0015646.g005){#pone-0015646-g005} Multiple regression analysis of parasite loads versus body condition revealed that none on the four species of parasites investigated for cod were significantly related to FCI (F = 1.12, p = 0.35; R^2^ = 0.02; *Caligus* spp.: p = 0.11; *Clavella* sp.: p = 0.17; *L. branchialis*: p = 0.86; A. *simplex*: p = 0.49). For saithe, the multiple regression was significant (F = 9.7, p\<0.001; R^2^ = 0.05), with *Clavella* spp. positively related to FCI (p = 0.003), *Anisakis* sp. strongly negatively related to FCI (p\<0.001), and no relationship evident for mobile sea lice (*Caligus* spp.: p = 0.59). Discussion {#s4} ========== Proxy measures of fitness of farm-associated and un-associated fish {#s4a} ------------------------------------------------------------------- We have demonstrated that proxy measures of fitness (FCI, HSI, abundances of specific parasites and diet) of wild saithe and cod caught in close association with salmon farms differ significantly from their counterparts captured distant from farms. These effects are likely to be general across the spatial extent of salmon farming in Norway (59°N--70N°) and apply to a substantial pool of fish aggregated around farms. Dempster et al. [@pone.0015646-Dempster2] conservatively estimated that over 12000 tons of wild fish, principally saithe and cod, were aggregated at Norway\'s 1198 salmon farms on any given day in summer based on video-derived estimates of aggregations at the same 9 farms investigated here. Conclusions derived from this study are therefore based upon these abundance estimates, but are limited to the summer months during which samples were taken. Salmon farms clearly increased the amount of food consumed by closely associated saithe and cod, indicating a strong trophic link between farms and wild fish. Stomachs of FA saithe contained more than twice the amount of food by weight than UA fish with stomach content weight similarly elevated in FA cod (1.4 times). Food pellets are high in fish proteins and oils and thus provide a high energy source of feed [@pone.0015646-Tacon1], although with distinctly different fatty acid distributions from natural diets [@pone.0015646-FernandezJover1]. While waste feed dominated diets of FA saithe and cod, the composition of dietary items still differed among FA and UA fish when waste pellets were removed from analyses, indicating that the availability of other types of prey differed between farm and non-farm locations. Salmon farms are known to have modified meio- and macro-fauna communities [@pone.0015646-Kutti1] and modified fish assemblages [@pone.0015646-Dempster2] compared to control locations, which likely contributed to the dietary differences. The increased body and liver condition observed in FA saithe and cod is likely linked to the trophic subsidy that farms provide. Livers are the principal lipid and thus energy stores in gadoids [@pone.0015646-Lambert1]. High HSIs are indicative of high total lipid energy, which is known as a direct proxy to egg production in gadoid fish [@pone.0015646-Marshall1]. Moreover, lipid energy reserves 3--4 months prior to spawning are the best proxy for fecundity [@pone.0015646-Skjraasen1]. In this context, association with fish farms throughout summer and autumn could increase the fecundity of saithe and cod, which spawn in early spring, even if these fish migrate away from farms months prior to spawning. While fecundity, in terms of egg numbers or size, may increase through FA fish having high energy reserves, the composition of stored lipids in FA saithe and cod may differ from those of UA fish which consume a natural diet (Fernandez-Jover et al. unpubl. data). This may effect egg quality as farm-feeds contain low proportions of highly unsaturated fatty acids (HUFAs) and arachidonic acids, which are key to fertilization rates and egg quality [@pone.0015646-Salze1]. If the waste-feed dominated diet alters the fatty acid composition of saithe and cod livers and has a negative effect upon egg quality during vitellogenesis, the increased condition evident in FA fish may not translate to a proportional increase in spawning success. Experimental manipulations of wild saithe and cod fed diets containing different proportions of waste feed for various durations and the subsequent evaluation of the effect this has on egg and larval quality are required to determine the extent of this potentially negative effect. Some parasites were found in elevated abundances in FA fish. We hypothesised that mobile sea-lice would occur in higher abundances on FA fish due to direct transfer or greater infestation levels as larvae occurred in greater abundance. This was the case for saithe at Hitra and Ryfylke and cod in Øksfjord. Similarly the attached copepod *Clavella* sp. was detected in elevated abundances in FA saithe at Hitra and Øksfjord. In contrast to the mobile sea-lice and *Clavella* sp. loads, the gill parasite *Lernaeocera branchialis* and the internal parasite *Anisakis* simplex were only ever detected in lower levels in FA fish. For *L. branchialis*, significant differences between FA and UA fish were only detected in Øksfjord, where UA cod had higher levels. Significantly lower *A. simplex* infections occurred in FA saithe with HSIs\>10 in all three farming areas, suggesting that the longer-term residence at salmon farms required to generate an HSI\>10 [@pone.0015646-Gjster1] plays an important role in reducing the level of *A. simplex* infection. The strong trophic link between saithe and fish farms, with saithe diets containing \>70% by weight of lost feed pellets which are free of *A. simplex* A3 larvae, reduces the amount of potential hosts of A3 larvae such as small fish and crustaceans that saithe consume [@pone.0015646-Klimpel1]. Elevated levels of *Caligus* spp. and *Clavella* sp. detected in FA fish may have had detrimental effects upon condition. Limited information exists to assess the threshold levels at which *Caligus* spp. and *Clavella* sp. infestations cause reductions in condition in cod and saithe, although heavy infestation of *Clavella adunca* can produce a moderate reduction in cod condition [@pone.0015646-Hemmingsen1]. However, mobile sea-lice infestations of gadoids were generally close to the range of those typically recorded in Norwegian fjord and coastal waters (1 to 2 *C. elongatus* gadoid^−1^; [@pone.0015646-Heuch1]). *L. branchialis* is considered the most serious metazoan parasite of wild cod [@pone.0015646-Khan1], [@pone.0015646-Hemmingsen1] and can cause mortality, loss of condition and affect reproductive output. Similarly, heavy *Anisakis simplex* infestation has the capacity to reduce the condition of wild gadoids [@pone.0015646-Hemmingsen1]. The reduction of both of these parasites in FA fish at some locations was therefore likely to have led to increased average condition compared to control fish. However, multiple regression analyses revealed that farm-modified parasite loads did not have major effects on the somatic condition of cod. For saithe, *Clavella* sp. abundance was positively correlated with condition, while the *A. simplex* infestation index was strongly negatively correlated with condition. Regardless of these relationships, body condition was significantly higher for FA fish than UA fish for both cod and saithe across all farming locations. As the body condition index integrates all factors that influence the condition of a fish over its recent life history, including the effects of parasites upon condition, our data suggests that the trophic subsidy that farms provide elevates body condition such that any effects on condition related to modified parasite loads were negligible in comparison. In addition to the parasite species investigated here, gadoid fish such as *Gadus morhua* and *Pollachius virens* are infected by over 100 pathogens and parasites, at least 20 of which may be directly transferred among salmonids and gadoids [@pone.0015646-Bricknell1]. These include some of the most significant diseases prevalent in salmon aquaculture, including *Vibrio anguillarum*, salmonid alphavirus and infectious pancreatic necrosis virus [@pone.0015646-Graham1], [@pone.0015646-Wallace1]. If these pathogens are enhanced in wild fish aggregated at fish farms they could negatively affect condition and survival; further research is required in this field. Fish farms: ecological traps or population sources for wild fish? {#s4b} ----------------------------------------------------------------- In contrast to the detrimental effects of salmon farming detected at the population-level for wild salmonids (sea lice: [@pone.0015646-Krkoek1], [@pone.0015646-Costello1], [@pone.0015646-Krkoek2]; escapes: [@pone.0015646-Thorstad1], [@pone.0015646-Jensen1]), we did not detect significant negative effects of the co-occurrence of wild saithe and cod with salmon farms. The diet and condition data indicate that wild saithe and cod benefited from their associations with salmon farms through access to greater amounts of food which translated to enhanced condition. While *Caligus* spp. and *Clavella* sp. loads were elevated at some farming locations compared to controls and *Anisakis* sp. and *Lernaeocera branchialis* loads were lowered at some farming locations compared to controls, it appears that any effects these modified parasite loads may have had on the condition of wild cod and saithe were overridden by the trophic subsidy that farms supply. The results provide no evidence that salmon farms act as ecological traps for wild cod and saithe that aggregate in their vicinity, provided that: 1) the modified fatty acid distributions and elevated organohalogen levels in fat stores in livers that results from a fish farm modified diet [@pone.0015646-Bustnes1], [@pone.0015646-FernandezJover3] does not negatively affect physiological processes, vitellogenesis or egg and larval quality; 2) salmon farms do not amplify any of the numerous pathogens not investigated here that salmonids and gadoids share [@pone.0015646-Bricknell1]; and 3) that attraction to farms does not disrupt natural spawning migrations or behavior. Future research should seek to discern the effects of both salmon and cod farms during the spawning season for cod resident in fjords containing farms, as a range of different effects are possible during this period, including mass spawning of farmed cod in cod farms [@pone.0015646-Jrstad1] and possible avoidance of fjords containing salmon farms by spawning cod [@pone.0015646-Bjrn1]. As saithe and cod condition is enhanced by farms, an opportunity exists to protect wild fish around salmon farms where they are aggregated and vulnerable to fishing, thus enabling farms to act as a population source. Presently, fishing adjacent to salmon farms occurs [@pone.0015646-Maurstad1], although the importance of this activity to overall catches is unknown. Stocks of fjord cod in southern Norwegian waters, in particular, are depressed due to chronic overfishing [@pone.0015646-Berg1]. Therefore, to ensure farms do not act as ecological traps for cod via increased fishing mortality alone, restrictions on the fishing of cod in the vicinity of farms could be introduced. Spatial protection from fishing would allow an opportunity for the enhanced condition that cod and saithe generate due to their association with salmon farms to translate to enhanced spawning success. Fish farms have recently become targets of significant fishing pressure [@pone.0015646-Akyol1] in other coastal ecosystems, thus the principle of restricting fishing around farms to ensure they do not function as ecological traps may be broadly applicable. As large, multi-specific aggregations of wild fish aggregate around coastal fish farms wherever they occur [@pone.0015646-Dempster1], [@pone.0015646-Dempster2], we predict that significant conservation benefit would be derived through the protection of tens of thousands of tons of wild coastal fish in high spawning condition if this measure were implemented worldwide. We thank Dr Bengt Finstad (NINA) who assisted in identifying mobile sea lice. We thank the salmon farming companies Marine Harvest, Greig and Lerøy Midnor for access to farm locations throughout the study. **Competing Interests:**SINTEF Fisheries and Aquaculture is a private, not-for-profit research institute. It is not a commercial funder of this research. The authors have declared that no competing interests exist. **Funding:**Funding was provided by the Norwegian Research Council Havet og kysten program to the CoastACE project (no: 173384). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. [^1]: Conceived and designed the experiments: TD PSJ IU. Performed the experiments: TD PSJ DFJ JBS RN PAB IU. Analyzed the data: TD. Contributed reagents/materials/analysis tools: TD. Wrote the paper: TD.
{ "pile_set_name": "PubMed Central" }
Bisphosphonates and atrial fibrillation: clinical trial data suggest possible link. In 2007, an article describing an American placebo-controlled clinical trial of yearly zoledronic acid infusion at a dose of 5 mg mentioned a statistically significant excess of severe atrial fibrillation in postmenopausal women. Bisphosphonates had not previously been linked to this adverse effect. Several meta-analyses of clinical trials have been published, but they covered only a small number of the hundreds of comparative trials evaluating bisphosphonates, few of which mentioned atrial fibrillation. In 2010, a meta-analysis of placebo-controlled trials of bisphosphonates, in a total of 26 126 patients with osteoporosis, showed an increased risk of severe atrial fibrillation. A larger meta-analysis (40104 women) showed a nonsignificant increase in the risk of atrial fibrillation, regardless of severity. A meta-analysis published in 2010 included 7 placebo-controlled observational studies of bisphosphonates in patients with osteoporosis, two of which showed an increased risk of severe atrial fibrillation. This meta-analysis showed no statistically significant increase in the overall risk of severe atrial fibrillation. Our literature search, up to mid-2010, found no studies concerning the risk of atrial fibrillation in cancer patients treated with bisphosphonates. No cardiac adverse effects were mentioned in a report analysing two trials in patients with Paget's disease. Pending the publication of more data, the potential risk of severe atrial fibrillation in some patients treated with bisphosphonates should be taken into account. There is no evidence of an increased risk with a specific bisphosphonate, route of administration, patient subpopulation, or treatment duration.
{ "pile_set_name": "PubMed Abstracts" }
Google Virus Warning Message If you wish to eliminate spyware from your PC and prevent future spyware attacks, we recommend you buy SpyHunter's spyware removal tool, which includes full technical support and a Spyware HelpDesk You will need professional removal tools to fix this problem. C:\Users\Shane\Desktop\cmd.bat deleted successfully. One Dll file in the Start Up Leave a Reply Please DO NOT use this comment system for support or billing questions. This tool can detect and remove the infection, but it might not work with Happili redirect virus and other patest variantsKaspersky offers TDSSKiller. Take note of the value after "__ldpath__" 6. How To Remove Redirect Virus Manually How Spyware And The Weapons Against It Are Evolving Crimeware: Trojans & Spyware Windows System Update - Latest bug fixes for Microsoft Windows Disclaimer Information This website, its content or any If this does not fix the Google redirect problem, then you should search for professional help. Browser Redirect Virus Android The content provided on this website is intended for educational or informational purposes and is provided "AS IS" with no warranties, and confers no rights. You are not the only one trying to remove google redirect virus. https://support.google.com/websearch/answer/8091?hl=en For billing issues, please refer to our "Billing Questions or Problems?" page. Browser Redirect Virus Android Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. http://www.bleepingcomputer.com/forums/t/456241/google-search-results-redirecttrojanhappili-found/ This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster. Google Virus Warning Message By clicking "post comment" button you agree not to post any copyrighted, unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, profane, hateful, racially, ethnically or otherwise objectionable material of any kind. Google Redirect Virus Removal Tool Berta BilbaoBerta is the Editor-in-Chief of SensorsTechForum. These redirected pages might infect your PC even more. http://magicnewspaper.com/redirect-virus/google-any-search-results-are-redirected.html Apple support provides this informationF-secure developed flashback removal tool which can identify Happily redirect virus and remove it. How my laptop will get rid of same viruses??? The Google Redirect Virus in particular affects how your computer system connects to the Internet, also altering the search results on any legitimate online search so that they link to Happili.com. How To Block Redirects On Chrome Run the following command in Terminal for each of the filenames obtained in the previous step: defaults read ~/Library/LaunchAgents/%filename_obtained_in_step15% ProgramArguments 17. No matter which "button" that you click on, a download starts, installing Google Redirect Virus on your system. When you update the extension, they can install malware onto your computer. Distribution Method By clicking on a malicious link. All other translations were made for your convenience by automatic (machine) translation by Google. Google Url Redirect You must take a look at the system while it is not loaded - to get an idea of the real situation. Rootkits are written in such a way that, once it gets On the left, click Applications. For Windows 8, 8.1 and 10 systems: Step 1: Open the Start Menu Step 2: Whilst holding down Shift button, click on Power and then click on Restart. This means that an infected computer system will often present severe problems apart from redirects to Happili.com. REMOVAL VIDEOS View All virusresearch.org Webutation LATEST REMOVAL GUIDES Ads By InstallSight SDK For Analytics Virus Removal Remove Timesearchnow.com Homepage How to Remove Hrforlastnews.ru Redirect (Chrome, Firefox, IE, Edge) How to Help your visitors protect their computers! Google Virus Scan If you choose to click on any one of the resulting links generated by Google Redirect Virus, you will be automatically redirected to all kinds of malicious web domains that are By downloading any of provided Anti-spyware software you agree with our Privacy Policy and Agreement of Use. How Does Google Redirect Virus Affect the User’s Computer? I clicked on report, saw it, but can't right click it to copy it into this post. Sign In Sign Up Browse Back Browse Forums Guidelines Staff Online Users Members Activity Back Activity All Activity My Activity Streams Unread Content Content I Started Search Malwarebytes.com Back Malwarebytes.com Malwarebytes Share on Google Plus Share Loading... By opening an infected email attachment. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool. Either I nabbed it or it is lurking somewhere waiting to repopulate.
{ "pile_set_name": "Pile-CC" }
COMMERCIAL DESCRIPTIONThe citrus punch of a big IPA, minus the one-dimensional hop sledgehammer. Seven select European and domestic malts round out the edges for a complex, copper-colored brew. Like its namesake ski lift, itís an insiderís ride to fresh thrills. 12 oz bottle. Pours a nice golden copper color. Some off-white head, good lacing. Aroma is surprisingly malty, but there are citrus hop notes as well. Flavor is complex, with a strong caramel backbone and great pine and citrus notes throughout. Overall this is a great pale ale, and I hope itís not just a seasonal production, as the box said. Dark to medium copper color with a small off-white head. Aromas of pine ans spruce with a nice malt balance. Full body; long finish, mostly bitter but some malt also. Overall a very nicely balanced IPA. 2/12/15 - Finley Dunnes (Chicago) Draft - Decent offering - liked the citrus smell and taste. Hops were light, the texture was very light. Nice beer to complement a meal, but less strong in taste and strength than I typically look for in an pale ale. Good beer. Pour from a 12oz bottle. Browning amber brew with two finger of off white head. Nice aroma of tropical fruit, citrus, a littler resin. Taste is light malt and hops up front - a bitter back bone / resin - transitioning to a more crisp citrus hoppiness in the last half of the swallow. Finish is a little sweet and with a retreating hops presence ending with a final flourish of tropical fruit. A solid APA, verges towards an IPA in character. Glad to have Deschutes in Michigan! Bottle from Systembolaget. Amber to copper colour. A quite small, white head. Resin, malt, caramel, some alcohol nose. Medium thickness and oily mouth feel. Medium carbonation. Refreshing. Pine, some grapefruit, honey, citrus and lemon flavour. Probably a bit old. The swedish importer covers up the best before date (in this case 06/28/14) with a new one (in this case march 2015), stating that the original best before should be understood as a "freshest before date". Stupid idea in my opinion. I would rather drink this type of beer fresh than having an old bottle which is useful only for ticking... This was a good beer in itís prime though, thatís for sure! Join us! RateBeer is made by beer enthusiasts for the craft beer community. Your basic membership is free and allows you to read all beer ratings. Click here to create your account... and give your opinion!
{ "pile_set_name": "Pile-CC" }
/********************************************************************** * LeechCraft - modular cross-platform feature rich internet client. * Copyright (C) 2006-2014 Georg Rudoy * * Distributed under the Boost Software License, Version 1.0. * (See accompanying file LICENSE or copy at https://www.boost.org/LICENSE_1_0.txt) **********************************************************************/ #include "entitygeneratingpage.h" #include <interfaces/core/icoreproxy.h> #include <interfaces/core/ientitymanager.h> #include <interfaces/structures.h> namespace LC { namespace NewLife { EntityGeneratingPage::EntityGeneratingPage (const ICoreProxy_ptr& proxy, QWidget *parent) : QWizardPage { parent } , Proxy_ { proxy } { } void EntityGeneratingPage::SendEntity (const Entity& entity) const { Proxy_->GetEntityManager ()->HandleEntity (entity); } } }
{ "pile_set_name": "Github" }
Melatonin receptors on ovine pars tuberalis: characterization and autoradiographicai localization. Abstract The functional significance of the pars tuberalis (PT) of the mammalian adenohypophysis has remained an enigma (1, 2). One view of its function is that it acts as an auxiliary gland to support the endocrine role of the pars distalis (PD) (2), as it has been shown to contain immunocytochemically identifiable thyrotrophs and gonadotrophs (1). Many of the cells of the PT are, however, ultrastructurally unique suggesting an independent function for this tissue. Our recent demonstration that the PT of the rat is a major binding site for the ligand iodomelatonin lends further support to this idea (3). We have utilized the highly specific ligand [(125)l]melatonin, and have demonstrated that it binds exclusively, with very high affinity, to the PT but not the PD of the adult sheep adenohypophysis. These findings support the conclusion that the PT has a distinct role in relation to melatonin action and seasonal reproduction.
{ "pile_set_name": "PubMed Abstracts" }
Q: SSRS 3.0 Report Map + Map Report Part change position when run I have created a simple geographic map using Report Builder 3.0. In order to have a sub-section of the map to zoom in on, I published a report part from a different report and included it on my map like so: However when the report is run it moves the report part outside of the map like this: The print view shows a things back as I would expect. The eventual target for this map will be as a SharePoint PerformancePoint Services Report. Does anyone know why I am experiencing this odd behaviour? A: From the MSDN article about report rendering Overlapping Report Items Overlapping report items are not supported in HTML, MHTML, Word, Excel, in Preview, or the Report Viewer. If overlapping items exist, they are moved. The following rules are applied to overlapping report items: If the vertical overlap of report items is greater, one of the overlapping items is moved to the right. The left-most item remains where it is positioned. If the horizontal overlap of report items is greater, one of the overlapping items is moved down. The top-most item remains where it is positioned. If the vertical and horizontal overlap is equal, one of the overlapping items is moved to the right. The left-most item remains where it is positioned. If an item must be moved to correct overlapping, adjacent report items move down and/or to the right to maintain a minimum amount of spacing between the item and the report items that end above it and/or to the left of it. For example, suppose two report items overlap vertically and a third report item is 2 inches to the right of them. When the overlapping report item is moved to the right, the third report item moves to the right as well in order to maintain the 2 inches between itself and the report item to its left. Overlapping report items are supported in hard page-break formats, including print. See also.
{ "pile_set_name": "StackExchange" }
The two Chucks bro’ down, as reported by the WSJ blog: Defense secretary nominee Chuck Hagel “almost had tears in his eyes” when Sen. Chuck Schumer explained during a private meeting his objection to Mr. Hagel’s use of the term “Jewish lobby,” Mr. Schumer recalled Wednesday. During a 90-minute meeting [on January 15] shortly after Mr. Hagel’s name was floated for the spot, Mr. Schumer, a Democrat, “asked him about all the things he said that had troubled me, troubled you, troubled any of us who are supporters of Israel,” he said. Politico’s Maggie Haberman reports that Schumer described the meeting in a breakfast speech in New York at the Association for a Better New York and the Downtown Alliance: “He struck me as sincere, and you know, you have to be sitting there at the meeting obviously, but I also told him when he used the word Jewish lobby what it meant to Jewish people,” [Schumer] added. “And I told him what a double standard is. That Jewish people throughout the centuries have suffered a double standard. Everyone could be a farmer except Jewish people. Everyone could live in Moscow except Jewish people. I said when everyone else can lobby but all of a sudden when those of us who are pro-Israel lobby, it’s a negative, that’s a double standard. And I’m sure you didn’t mean it, but it harkens to the old days. “And he really, you know, he almost had tears in his eyes when he understood. So I believe he will be good.” Schumer noted that there is “not a major Jewish organization against” Hagel. “The main fight on Hagel is coming from the neocons, who you know well. And they resent Hagel’s apostasy on Iraq. You may remember — the neocons helped push Iraq — and Hagel was one of the first Republicans to say Iraq wasn’t working. And he was right. But that’s where it’s coming from.” Yes and why did you support the neocons’ idea of remaking Iraq, Senator? Interesting that in Schumer’s view it’s not the term Jewish lobby that rankles– after all, he cites all the Jewish organizations behind Hagel– it’s that non-Jews are not allowed to criticize it. Much as Elliott Abrams asserted to Brian Lehrer. So, I would respond, Are Jews as an American community persecuted outsiders, as we were in Russia in a historical memory that is so fresh to Senator Chuck Schumer; or are we empowered and accountable for our actions–i.e., is criticism allowed? This fundamental misprision of our power, our position is the error here.
{ "pile_set_name": "OpenWebText2" }
Overall Experience Reviews For Sport Clips Haircuts of New Providence I checked in on line and i was told 90 min Then I checked in upon arrival on time and proceeded to wait over an hour and before leaving with out getting attended too. What is the point of making appointments?? I thought I was next 3 times and kept getting skipped. The sad thing is I had been a regular for almost 2 years. I’m not totally surprised as it has been getting worse progressively but to day was bad. I can’t see my self ever going back. I came in today (Thursday 10/19) during my lunch break for the first time and was serviced from Nicolette. She was great! Very professional and attentive to my request. She ensured my haircut was exactly as I wanted and during the cut was very friendly and talkative (not too talkative... just the perfect amount). The other gentleman who was working that shift (Joel?) was friendly as well and introduced himself. The overall atmosphere of the place is very cool. Feels like a 'man cave'. Colors are sharp! Overall a great experience and I plan on coming again during my lunch break. Kudos to Nicolette! "I checked in on line and i was told 90 min Then I checked in upon arrival on time and proceeded to" ...show more I checked in on line and i was told 90 min Then I checked in upon arrival on time and proceeded to wait over an hour and before leaving with out getting attended too. What is the point of making appointments?? I thought I was next 3 times and kept getting skipped. The sad thing is I had been a regular for almost 2 years. I’m not totally surprised as it has been getting worse progressively but to day was bad. I can’t see my self ever going back. "I came in today (Thursday 10/19) during my lunch break for the first time and was serviced from Nico" ...show more I came in today (Thursday 10/19) during my lunch break for the first time and was serviced from Nicolette. She was great! Very professional and attentive to my request. She ensured my haircut was exactly as I wanted and during the cut was very friendly and talkative (not too talkative... just the perfect amount). The other gentleman who was working that shift (Joel?) was friendly as well and introduced himself. The overall atmosphere of the place is very cool. Feels like a 'man cave'. Colors are sharp! Overall a great experience and I plan on coming again during my lunch break. Kudos to Nicolette!
{ "pile_set_name": "Pile-CC" }